This term describes the practice of impersonating someone to gain confidential information, often through deceptive emails.
What is phishing?
This type of memory is volatile and is used for temporary storage while a computer is running.
What is RAM (Random Access Memory)?
This term refers to a set of rules that define the structure and behavior of a programming language.
What is syntax?
This IT role is responsible for maintaining and managing a company’s computer systems, including hardware and software troubleshooting.
What is a systems administrator?
This is the year the University at Albany was established, originally as a teacher's college.
What is 1844?
This acronym stands for the secure protocol used for transferring hypertext on the World Wide Web, commonly seen at the beginning of website addresses.
What is HTTPS?
This law states that the current flowing through a conductor between two points is directly proportional to the voltage across the two points.
This process involves transforming source code written in a high-level language into machine code that a computer's processor can execute.
What is compilation?
This design technique involves creating low-fidelity sketches or wireframes to visualize layout and functionality before detailed design work begins.
What is prototyping?
This is the name of the newest gym on campus.
What is The Well?
This tool is used to monitor network traffic for suspicious activity and potential security breaches.
What is an Intrusion Detection System (IDS)?
This electrical component is used to store energy in an electric field and is commonly found in circuits.
What is a capacitor?
This type of programming language is designed to be easy for humans to read and write, as opposed to machine code.
What is a high-level programming language?
This popular game engine, known for its flexibility and support for 2D and 3D game development, is widely used by indie developers and large studios alike.
What is Unity?
This service provides mental health support, counseling, and crisis intervention for students facing personal or academic challenges.
What is Counseling and Psychological Services (CAPS)?
This form of cyberattack involves using multiple sources to overwhelm a server with traffic, rendering it unavailable to legitimate users.
What is a DDoS attack?
This programming language, known for its use in embedded systems and hardware interfaces, is often used for low-level programming.
What is C?
In Java, this method is called to start the execution of a program, and it must be declared as public and static.
What is main?
This version control system is widely used for tracking changes in source code during software development, allowing multiple developers to collaborate.
What is Git?
This individual is the current president of UAlbany, who also serves on President Biden’s Advisory Commission on Advancing Educational Equity, Excellence, and Economic Opportunity for Hispanics.
Who is Havidán Rodríguez?
This framework helps organizations assess and improve their security posture by providing guidelines and best practices.
What is the NIST Cybersecurity Framework?
This physicist formulated laws that govern current and voltage in circuits, including one stating that the total current at a junction must equal zero.
Who is Kirchhoff?
A professional who specializes in server-side logic and database management for web applications.
What is a back-end developer?
This data visualization tool allows users to create interactive dashboards and reports to analyze data trends and metrics.
What is Tableau?
This is the number of pillars on the Academic Podium.
What is 1,248?