Intro to CS
Security in AI
MISC
NN
Know your Instructors
100

This keyword lets your program make a decision.

What is an if statement?

100

The "C" in the CIA Triad stands for this

What is Confidentiality

100

Artificial Intelligence focuses on this.

What is making computers think and learn like humans?

100

This machine learning model is inspired by the human brain.

What is a Neural Network?

100

This instructor has had 7 hair colors in the last 2 years.

Who is Matthew?

200

This data type can be represented as "Miguel"

What is a string?

200

This part of the CIA Triad ensures that they systems are accessible when needed?

What is Availability?

200

This part of a decision tree is the first question asked. 

What is the Root Node?

200

A Neural Network improves by doing this with examples.

What is Training?

200

This instructor plays violin for the UTEP mariachi.

Who is Emily?

300

These two symbols represent not equal to when coding.

What is !=

300

This example of an attacker using a printed photo to bypass a facial recognition system is violating this principle.

What is Integrity?

300

A decision tree splits at these points based on different conditions.

What are Decision Nodes?

300

CNN Stands for this type of neural network, used especially for images.

What is Convolution Neural Network?

300

This instructor loves rollercoasters anything adrenaline related.

Who is Cristina?

400

This keyword is used to repeat a block of code for a set number of times.

what is a for or while loop?

400

The statistical relationship where two variables move together, BUT DOES NOT imply one causes the other.

What is Correlation?

400

PII stands for this

What is Personal Identifiable Information?

400

This model starts with noise and learns to turn it into realistic images over time.

What is a Diffusion Model?

400

This instructor wants to work in Bioinformatics. 

Who is Sofia?

500

This function lets your program ask the user a question.

What is input()?

500

This term refers to good personal practices like using strong passwords and logging out.

What is Security Hygiene?

500

When a decision has possible outcomes this is created

What is a Branch?

500

These two parts of a GAN work against each other to create realistic images.

What are the Generator and the Discriminator?

500

This instructor is doing research with rat brains.

Who is Ivan?