Input Devices
Problem Solving
Cybersecurity
Innovation in Tech
Computer Science Department
100

What does the abbreviation 'www' stand for?

World Wide Web

100

What kind of search would you use to find a number in a phone book?

Binary

100

What does VPN stand for?

Virtual Private Network

100

This company was the first to release a commerical self-driving car.

Tesla

100

Who is the chairperson?

Dr. Lisa B Lancor

200

Name one TLD besides .com, .org, and .net

.mil, .edu, .gov, .uk

200

What digits are in a binary system?

0, 1

200

This type of attack involves overwhelming a server with traffic to render it unusable.

a DDos (Distributed Denial of Service) attack

200
Which groundbreaking technology is used in cryptocurrencies like Bitcoin to secure transactions?

Blockchain

200

Who is the graduate coordinator for the department?

Dr. Hrvoje Podnar

300

What is the most popular web browser world wide?

Google Chrome

300

Write a function in any language to find the first repeating character in a string. If there are no repeating characters, return null.

def first_repeat_char(s):

     seen = set()

     for char in s:

         if char in seen:

            return char

         seen.add(char)

     return None


300

A common method used by hackers to gain unauthorized access by exploiting a user's trust.

Phishing

300

What is the name of the computing paradigm that mimics the way the human brain processes information and is used in advanced AI systems?

Neural networks.

300

Which faculty member received their Bachelor's and Master's degree from Cairo University?

Dr. Amal Abd El-Raouf

400

What website calls itself the "front page of the Internet"?

Reddit

400

Write a Python function to check if a string is a palindrome.

def is_palindrome(s): return s == s[::-1]

400

This cybersecurity framework is used for controlling access to systems based on the roles of individual users.

Role-based access control (RBAC)

400

This component made its way from supercomputers to the commercial sector.

64-bit Processor

400

How many faculty have their Ph.D?

13

500
This specialized input device is used in virtual reality systems to detect the position and movement of a user within 3D space.

VR Tracking Sensor

500

Write a JavaScript function to check if a string is a palindrome.

function isPalindrome(str) {

     return str === str.split(' ').reverse().join(' ');

500

Explain the difference between symmetric and asymmetric encryption.

symmetric encryption uses the same key for both encryption and decryption. asymmetric encryption uses a pair of public and private keys, where one key encrypts and the other decrypts.

500
This supercomputer was developed by IBM and was the first computer to defeat a world chess champion. This system used the alpha-beta search algorithm.

Deep Blue

500

Which faculty member loves playing ping pong?

Dr. Ata Elahi