This type of attack uses fake emails to steal sensitive data.
What is phishing?
The Big O notation for accessing an array element directly.
What is O(1)?
The largest decimal number 4 bits can represent.
What is 15?
Linux is an example of this type of software license.
What is open-source?
The hex code for medium-gray.
What is #9a9a9a?
A password like "T4ke@H1keI2023" is an example of this.
What is a strong password?
The result of "TRUE && FALSE" in Boolean logic.
What is FALSE?
Binary code directly executable by a CPU.
What is machine language?
The Git command to stage all modified files.
What is git add .
The RGB value for #ff0044.
What is (255, 0, 68)?
This attack involves falsifying data to impersonate a trusted entity.
What is spoofing?
The primary purpose of a function in programming.
What is code reusability?
How Node.js executes JavaScript code.
What is interpreting line-by-line at runtime?
The correct sequence to push changes to a remote repository.
What is clone, add remote origin, add, commit, push?
The data type for storing a user’s password.
What is a string?
This vulnerability allows injecting scripts into web pages.
What is Cross-Site Scripting (XSS)?
This operator gives the remainder of division
What is modulo? (%)
The decimal equivalent of binary 11111111.
What is 255?
This Git concept allows parallel development paths.
What is Branching?
A common use of the modulo operator.
What is creating circular buffers?
Legitimate organizations rarely do this via email.
What is requesting private information?
A key reason to use Big O notation.
What is comparing algorithm efficiency?
The part of a machine instruction that specifies "what to do."
What is the opcode?
Legal instruments governing the use or redistribution of software.
What is Software licensing?
#00A9FF