Sneaky Snakes
Bits and Bytes
Connected World
System Central
Codebreakers
200

% is the symbol used for this operator.

Modulus.
SNAKE'S BITE: Write a function that will return the largest item in a list. (30s)

200

A byte is 8 bits. A nibble is this many bits.

4.

200

A system of interlinked hypertext documents and multimedia content accessible via the Internet.

World Wide Web (WWW).

200

Responsible for arithmetic and logical operations, this component mirrors the region in the brain involved in executing motor functions and reflex-level decisions.

Arithmetic Logic Unit (ALU).

200

The original term for a message in Caesar cipher before it’s encrypted.

Plaintext. 

400

This method is automatically used to initialise objects when a new instance of a class is created.

__init__()

SNAKE'S BITE: Write a function to check if a number is odd. (45s)

400

1TB is equal to this number of bytes.

1024.

400

.COM, .NET and .CO.UK are all examples of these.

Top Level Domains (TLD).

400

Similar to the brain’s prefrontal cortex - managing planning and coordination - this component doesn’t execute instructions itself, but orchestrates the activities of others.

Control Unit (CU)

400

This algorithm produces a fixed-length output from variable-length input.

Hashing.

600

This method of parameter passing is used when a data structure needs to be used within a subroutine, but cannot be changed.

Passing by value.

SNAKE'S BITE: Write a function to check if a string starts with a vowel. (50s)

600

 This type of binary shift is used when dividing a binary number by 2 and can result in the loss of the least significant bit.

Arithmetic right shift.

600

This markup language structures the skeleton of every web page, using tags to define elements like headings, links, and images - but it doesn’t handle how they look or behave.

Hypertext Markup Language (HTML).

600

Like the brain's central executive system, this core hardware component combines control, decision-making, and execution at the heart of the computer.

Central Processing Unit (CPU).

600

In Caesar cipher notation, this letter is commonly used to denote the shift amount in modular arithmetic.

K.

800

This keyword is used when the subroutine is defined but the code hasn't been written yet. It is used to leave the body of the function empty.

Pass.

SNAKE'S BITE: Write a function that calculates the sum of all numbers in a list. (55s)

800

The hexadecimal number "7D" is equal to this decimal number.

125.

800

This protocol operates at the network layer and is responsible for routing data packets between different networks.

Internet Protocol (IP).

800

Often compared to neural impulses, this low-level language consists of binary instructions that can be directly decoded and executed without translation.

Machine code.

800

This type of cyber attack tricks users into revealing confidential information by mimicking legitimate websites or communications.

Whaling.

1000

This term describes when a function calls itself within its own definition, and includes a condition to prevent infinite calls — a fundamental feature of divide-and-conquer algorithms.

Recursion with a base case.

SNAKE'S BITE: Write a function to calculate the sum of the first n natural numbers. (60s)

1000

This error occurs when the result of adding two 8-bit two’s complement numbers is a negative value that incorrectly appears positive, or vice versa — even though no carry bit is lost.

Signed overflow.
1000

This protocol is used for dynamic host configuration in IP networks and allows devices to automatically receive their IP address, subnet mask, default gateway, and other network settings when they connect to a network.

Dynamic Host Configuration Protocol (DHCP).

1000

Like the brain’s learned vocabulary bank, this architecture-specific collection defines the binary patterns a CPU understands - with RISC and CISC representing contrasting versions of its design.

Instruction set.

1000

This large-scale cyber attack overwhelms a target system using multiple compromised devices, often coordinated through a botnet, with the goal of making services unavailable.

Distributed Denial of Service Attack (DDoS).