Python Syntax
History of Computing
Cybersecurity
Discrete Math
Tulane Comp Sci Clases
100

In Python, this symbol is used to start a single-line comment.

What is #?

100

This device, invented in 1964 by Douglas Engelbart, revolutionized how we interact with computers.

What is the computer mouse?

100

This basic security measure helps prevent unauthorized access by requiring a secret code to log in.

What is a password?

100

If set A has 3 elements and set B has 4 elements, how many elements are in A × B?

What is 12?

100

This is the introductory programming course for Computer Science majors at Tulane.

What is CMPS 1500 (Intro to Computer Science I)?

200

This Python operator is used for floor division.

What is // (double forward slash)?

200

This company released the first commercially successful personal computer, the Apple II, in 1977.

What is Apple?

200

This type of software is designed to detect and remove malicious programs from a computer.

What is antivirus software?

200

This term describes a set with no elements.

What is an empty set (or null set)?

200

Tulane's CS capstone project spans this many semesters.

What is two? (CMPS 4010 and 4020)

300

In Python, this built-in function is used to iterate over a sequence of numbers.

What is range()?

300

This programming language, created in the 1970s, is known for its use in web development.

What is JavaScript?

300

This common cyber attack involves tricking users into revealing sensitive information by posing as a trustworthy entity.

What is phishing?

300

In Boolean algebra, this operation returns true if at least one input is true.

What is OR?

300

Tulane's Computer Science program emphasizes this programming paradigm in its curriculum.

What is object-oriented programming?

400

In Python this function is used to get the length of a string or list.

What is len()?

400

This British mathematician is often considered the father of theoretical computer science and artificial intelligence.

Who is Alan Turing?

400

This type of malicious software encrypts a victim's files and demands payment for the decryption key.

What is ransomware?

400

This operation combines two sets to include all elements from both sets.

What is union (∪)?

400

The total number of credit hours required for Tulane's Computer Science Coordinate Major.

What is 30?

500

In Python, this method is used to add an item to the end of a list.

What is append()?

500

The first email was sent in this decade.

What is the 1970s?

500

This network security device monitors and controls incoming and outgoing network traffic.

What is a firewall?

500

This principle states that if you have n pigeons and m pigeonholes, and n > m, then at least one pigeonhole must contain more than one pigeon.

What is the Pigeonhole Principle?

500

The Chair of the Department of Computer Science.

Who is Carola Wenk?