CS & Math
MORE Cybersecurity
Random
CICS&Math/Stats
UMass and Fun!
100

The value of pi to two decimal places

What is 3.14?

100

A common debugger for the C/C++ Programming language. It is also commonly used in reverse engineering binary code. 

What is GDB?

100

The sum of the interior angles of a triangle

What is 180 degrees?

100

The year that the College of Information and Computer Sciences was founded

What is 2012?

100

A shape with 4 equal sides and 4 right angles

What is a square?

200

A computer program that runs as a background process. 

What is a daemon?

200

An ethical hacker

What is a white hat?

200

A cybersecurity course designed and previously taught by undergraduate students from UMass Cybersecurity Club.

What is 390-R?

200

The number of concentrations in the Math department 

What is 7?

200

A dinner special served at the UMass dining halls every Halloween

What is Lobster and Steak?

300

Potential computer errors related to the formatting and storage of calendar data for dates in and after the year 2000. Many programs represented four-digit years with only the final two digits, making the year 2000 indistinguishable from 1900.

What is the y2k bug?

300

An encryption method that uses one key to encrypt and another key to decrypt the input plaintext

What is asymmetric encryption?

300

Definition of symmetry in mathematics

What is a property where an object or figure remains unchanged under certain transformations, such as rotation, reflection or translation? 

300

Female mathematician known for her work in topology

Who is Karen Uhlenbeck?

300

If you divide a heart-shaped chocolate into 4 equal pieces as , how many lines of symmetry would the resulting shape have?

What is 2 lines of symmetry? 

400

A computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs

What is ILOVEYOU?

400

An attack on a previously unknown system vulnerability 

What is a zero day attack?

400

Light, delicate Chinese gelatin-based dessert favored by a certain green-haired polearm-wielding character.

What is almond tofu?

400

The course code that refers to "Logic in Computer Science"

What is COMPSCI 513?

400

A famous condiment founded at UMass

(hint: it goes on pizza)

What is Mike's Hot Honey?

500

Gamified competitions in which participants are challenged to find and exploit vulnerabilities in a system to capture a "flag" or piece of information.

What is a CTF?

500

The top 1 most common web vulnerability released by OWASP in 2021. This occurs when a web application fails to properly enforce restrictions on what authenticated users are allowed to do.

What is Broken Access Control?

500

The first woman to win the Fields Medal often referred to the Nobel Prize of Math

Who is Maryam Mirzakhani?

500

Famous conjecture in number theory that if proven, would show that every even integer greater than 2 is the sum of two primes

What is the Goldbach Conjecture?

500

What is the Physical Sciences Building?