What is software security?
an idea implemented to protect software against malicious attack and other hacker risks so that the software continues to function correctly under such potential risks
What is the binary sequence 1111 in decimal form?
15
What is shaped like a ball and goes in a basket
basketball
Who is Mr. Karlik's best bud
Nate Galiyas
Which anime rhymes with Gunter x Gunter
Hunter x Hunter
When you see a popup on your computer saying to pay money or else your files will be corrupted, should you: a. Pay money to get out of the situation?
b. Download an antivirus to try and fix the problem?
c. Spend 500 to a computer company to fix it?
The best solution: download an antivirus to try and fix the problem to not waste money
What is the device that stores data and information in a computer?
The hard drive
What sport does nobody like
Golf
Who is the current Vice Principal of Montour High School?
Kylee Crawshaw
Which Korean show did Mr. Karlik watch earlier this year
Swuid Game
What is Vulnerability management
It is designed to proactively mitigate or prevent the exploitation of technical vulnerabilities
(T/F) Hardware Trojan is a malicious modification of the bytes of an integrated circuit
False, it is a malicious modification of the CIRCUITRY of an integrated circuit
Who is the current leading scorer of the NBA
Kareem Abdul-Jabaar
What is the name of the teacher that rhymes with Winda Leaver?
Linda Weaver
Which anime features 1000 years of death
naruto
What is a firewall?
attempts to control incoming and outgoing traffic between networks
(T/F) The turing machine was the first machine to implement hardware security
True
Which NBA team won last year, and who was Finals MVP
Bucks, Giannis Antentiktokepoono
Which teacher used to be a swimmer who also has a brother that broke a record?
Doug Macek
Who ate a Devil Fruit that made him stretchy
Monkey D. Luffy
What is the difference between spyware and virus?
Spyware is software that gathers your information, while viruses are programs or bits of code that are loaded onto one's computer without the user knowing or wanting them
What is a technical vulnerability?
They are problems specifically built into technology
Who would win in a 1v1, Karlik or Kobe
Karlik, cus he's alive
Which teacher used to play soccer at Pitt Johnstown?
Mike Waldron
How many Dragon Balls are there
7 draggin balls