Raspberry Pi
Programming
Python is a ________ -based programming language.
(Fill in the blank)
What is text?
This is the result of 1101 XOR 1001.
What is 0100?
This is intrusive software designed to damage or destroy computers and computer systems.
What is malware?
This is the other prime factor of 143, given that one of them is 13.
What is 11?
Scratch 3 is a ________ -based programming language. (Fill in the blank)
What is visual?
This elementary school-level math problem is crucial for the security of modern cryptography on the Internet.
What is factoring a number?
This type of digital attack tries every possible combination of characters to find the correct password.
What is a brute force attack?
Booleans and numbers are examples of this basic way to define the kind of value a variable can hold.
What is a data type in programming?
This Python function is used to display messages or results to the screen.
What is print()?
This is a method of sending data or secret messages by hiding them in plain sight or in other data, for example, inside an image posted online.
What is steganography?
This is what MFA stands for in cybersecurity.
What is Multi-Factor Authentication?
These hackers use pre-made scripts to attack systems without understanding the code.
What are script kiddies?
This Python function is used to collect data typed by the user during program execution.
What is input()?
Use the permutation block with first row 12345 and second row 54132 to decrypt the message OCMXY XEFEF.
What is my coffee or MYXCOFFEEX?
These people are the insiders. (Name one)
What are an organization’s own employees, contractors, and business partners?
Selection and loops are examples of this essential concept used to control the flow of a program.
What is a control structure in programming?
In programming, this term refers to the information a program sends to the screen, file, or other device, often using the print( ) function in Python.
What is output?
Decrypt the cipher text REM by converting it to ASCII binary, and then using the one-time pad key 00011000 00001010 00001111, and then convert the result back to text.
What is JOB?
These are three categories of people who carry out cyberattacks.
Who are cybercriminals, script kiddies, brokers, insiders, hacktivists and state-sponsored attackers?
Using both a Caesar shift cipher with key k=3 (A becomes D) and the permutation block with first row 12345 and second row 45123, decrypt ADBRX DAUHA GAQHU.
What is You are a nerd or YOUXAREXAXNERD?