Algorithms/Data Structures
Operating Systems
Web/Mobile
Name that language!
Cybersecurity
100

This data structure uses the functions push() and pop() to add and remove items to it. It follows a last in, first out (LIFO) method of ordering its items.

What is a stack?

100

This operating system is free (although some versions are not) and open source. It was created by Linus Torvalds, a student at the University of Helsinki in Finland, in 1991.

What is Linux?

100

These mobile apps can be written in either Objective-C or Swift.

What are iOS apps?

100

def hello():
 print("Hello Hofstra DSC!")
def main():
 hello()
main()

What is Python?

100

This attack uses dangerous input from the user that then gets executed as code.

What is an injection attack?

200

The time complexity of merge sort.


MERGE-SORT(A, p, r)
  if p < r
   q = floor((p+r)/2)
   MERGE-SORT(A,p,q)
   MERGE-SORT(A,q+1,r)
   MERGE(A,p,q,r) 

What is O(n log(n))?

200

These operating system data structures are both used for memory allocation. However, one grows "down" and is used for static memory allocation, while the other grows "up" and is used for dynamic memory allocation.

What are the stack and the heap?


Note: Since the stack grows down, the top of the stack has a lower address than the base.

200

These HTML tags are both used to group chunks of code, except one is a block-line element, while the other is an in-line element.

What are div and span tags?

200

class Bucket{
    private float volumeFilled;
    private float totalVolume;
    private String color;
    Bucket(float volumeFilled, float totalVolume, String color) {
        this.volumeFilled = volumeFilled;
        this.totalVolume = totalVolume;
        this.color = color;
     }
 }

What is Java?

200

In type of injection attack, dangerous scripts are used as input.

What is cross site scripting (XSS) attack?

300

This algorithm searches for shortest paths in graphs. However, it can NOT handle negative-weighted edges.

What is Dijkstra's Algorithm?

300

This Linux command is used to print the current working directory.

What is pwd?

300

This open source framework is natively compiled and is used to develop multi-platform mobile and web apps.

What is Flutter?

300

fn largest<'a>(str1:&'a str, str2:&'a str) -> &'a str {
    if str1.len() > str2.len(){
        str1
    } else {
        str2
    }

What is Rust?

300

This type of cryptography uses two keys to encrypt and decrypt a message. For example, if Bob wanted to send a message to Alice, Bob would encrypt the message using Alice's public key. Alice would then decrypt the message using her private key.

What is Public-key or Asymmetric Cryptography?

400

This data structure can be implemented with a linked list, where each node has a parent node and two child nodes. It is used for searching for elements given a key value.

What is a binary search tree?

400

This occurs when each process in a set of processes is waiting for an event that only another process in the set can cause.

What is a deadlock?

400

This popular JavaScript library is used for making user interfaces.

What is React?

400

my $a = 5;

while($a > 0) {

    print "$a ";

    $a--;

}

print "\n";

What is Perl?

400

In this attack, the attacker manipulates the application’s execution path and overwrites elements of its memory, which leads the program’s execution path to damage existing files or expose data. This attack typically involves violating programming languages and overwriting the bounds of the buffers they exist on.

What is a buffer overflow attack?

500

These types of algorithms make the next optimal decision in hopes that continuously making the next best decision will lead to an overall optimal solution.

What are Greedy Algorithms?

500

In this page replacement algorithm, all the page frames are kept in a circular list. A pointer (called the hand) is kept at the oldest page. When a page fault occurs, the page that hand points to is inspected and the action taken depends on the reference (R) bit. If R = 0: Evict the page, if R = 1: Set R to 0 and advance the hand.

What is the clock page replacement algorithm?

500

The <ruby> HTML tag.

What is the HTML tag that handles ruby annotations, which is a pronunciation guide of the base text - usually used with East Asian characters as the base text?

Example:  明日 (Ashita) 

500

let filter123 x =

    match x with

    | 1 | 2 | 3 -> printfn "Found 1, 2, or 3!"

    | var1 -> printfn "%d" var1

for x in 1..10 do filter123 x

What is F#?

500

This attack exploits the speculative execution feature in the CPU in order to leak sensitive data.

What is the Spectre attack?

M
e
n
u