The value of pi to two decimal places
What is 3.14?
A common debugger for the C/C++ Programming language. It is also commonly used in reverse engineering binary code.
What is GDB?
The sum of the interior angles of a triangle
What is 180 degrees?
The year that the College of Information and Computer Sciences was founded
What is 2012?
A shape with 4 equal sides and 4 right angles
What is a square?
A computer program that runs as a background process.
What is a daemon?
An ethical hacker
What is a white hat?
A cybersecurity course designed and previously taught by undergraduate students from UMass Cybersecurity Club.
What is 390-R?
The number of concentrations in the Math department
What is 7?
A dinner special served at the UMass dining halls every Halloween
What is Lobster and Steak?
Potential computer errors related to the formatting and storage of calendar data for dates in and after the year 2000. Many programs represented four-digit years with only the final two digits, making the year 2000 indistinguishable from 1900.
What is the y2k bug?
An encryption method that uses one key to encrypt and another key to decrypt the input plaintext
What is asymmetric encryption?
Definition of symmetry in mathematics
What is a property where an object or figure remains unchanged under certain transformations, such as rotation, reflection or translation?
Female mathematician known for her work in topology
Who is Karen Uhlenbeck?
If you divide a heart-shaped chocolate into 4 equal pieces as , how many lines of symmetry would the resulting shape have?
What is 2 lines of symmetry?
A computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs
What is ILOVEYOU?
An attack on a previously unknown system vulnerability
What is a zero day attack?
Light, delicate Chinese gelatin-based dessert favored by a certain green-haired polearm-wielding character.
What is almond tofu?
The course code that refers to "Logic in Computer Science"
What is COMPSCI 513?
A famous condiment founded at UMass
(hint: it goes on pizza)
What is Mike's Hot Honey?
Gamified competitions in which participants are challenged to find and exploit vulnerabilities in a system to capture a "flag" or piece of information.
What is a CTF?
The top 1 most common web vulnerability released by OWASP in 2021. This occurs when a web application fails to properly enforce restrictions on what authenticated users are allowed to do.
What is Broken Access Control?
The first woman to win the Fields Medal often referred to the Nobel Prize of Math
Who is Maryam Mirzakhani?
Famous conjecture in number theory that if proven, would show that every even integer greater than 2 is the sum of two primes
What is the Goldbach Conjecture?
What is the Physical Sciences Building?