This practice involves creating complex, unique combinations of letters, numbers, and symbols to secure your accounts.
What is using strong passwords?
Niel Armstrong
Famous Astronaut from Purdue?
This language uses indentation instead of curly braces and is popular for data science
What is Python?
This company, founded by Steve Jobs, Steve Wozniak, and Ronald Wayne, introduced the first personal computer in 1976
What is Apple?
Who was the recent YouTube/social media star that recently visited Purdue?
Logan Paul
This type of cyberattack tricks users into revealing sensitive information by pretending to be a trusted entity.
What is phishing?
ITaP(Information Technology at Purdue)
What is Purdue’s official school-wide technology support service called?
This low-level language extension of C introduced object-oriented programming
What is C++?
Known as the "father of the computer," this mathematician designed the Analytical Engine in the 19th century
Who is Charles Babbage?
“Have you tried turning it off and on again?”
The sacred words of IT support
A virtual tool that encrypts your internet connection and hides your IP address for safer browsing.
What is a VPN (Virtual Private Network)?
8th in the nation
In the US News and World Report of Best Engineering Schools 2025, Purdue’s College of Engineering is ranked what?
This computer scientist invented C programming language at Bell Labs?
Dennis Ritchie
This British scientist created the World Wide Web in 1989 while working at CERN.
Who is Tim Bernes-Lee?
What’s the universal sign of a programmer in distress?
Stack Overflow open in 15 different tabs!
This term describes software designed to detect and remove malicious programs like viruses and spyware.
Purdue Quantum Science and Engineering Institute (PQSEI)
Purdue has been at the forefront of quantum computing research. What is the name of the initiative that leads this research?
4 bytes
The size of an integer in 64-bit architecture
The first electronic general-purpose computer, built in 1945, was known by this acronym.
What is ENIAC (Electronic Numerical Integrator and Computer)
Page not found!
If you get a 404 error, what does that mean?
his cybersecurity principle requires verifying a user's identity through two or more methods, such as a password and a fingerprint.
What is two-factor authentication?
The Concept Virus (used for cybersecurity research, though not malicious in intent)
In the 1990s, Purdue was involved in developing one of the earliest computer viruses for research purposes. What was its name?
A system is __ when it places the most significant byte at the lowest address in memory
Big Endian
This programming pioneer developed the first compiler and contributed to the creation of COBOL, a major programming language still used today.
Who is Grace Hopper?
Why did the Java developer wear glasses?
Because he couldn't C#