Programming Languages
Architecture of Computer Systems
Cybersecurity
Input and Output Devices
University Trivia
100

What 3 languages are primarily used for creating websites?

HTML for structure, CSS for styling, and JavaScript for functionality.

100

What is the main function of the CPU in a computer?

The CPU, or Central Processing Unit, processes instructions and manages the operations of the computer.

100

What does the term "phishing" refer to in the context of cybersecurity?

Phishing is a technique where fraudulent emails are sent pretending to be from reputable sources to steal personal information.

100

Name a device that can serve both as an input and an output device.

Touchscreen.

100

Who is the rector at Kielce University of Technology?

prof. Zbigniew Koruba

200

What is the main use of Python in data science?

Python is used for data analysis, visualisation, machine learning, and automation due to its powerful libraries and simplicity.

200

Explain the purpose of RAM in a computer system.

RAM (Random Access Memory) temporarily stores data and programs that the CPU needs while performing tasks.

200

Name a common type of malware that is designed to replicate itself and spread to other computers.

Virus

200

What is the difference between an inkjet and a laser printer?

An inkjet printer sprays liquid ink through microscopic nozzles onto paper, while a laser printer uses a laser beam to transfer toner onto paper through heat.

200

What is the logo of the University Student Government Council (URSS)?

A witch riding a broomstick.

300

Explain the difference between statically typed and dynamically typed languages.

In statically typed languages, the type of variables is known at compile time, while in dynamically typed languages, types are understood at runtime.

300

What is the difference between a motherboard and a hard drive?

The motherboard is the main circuit board housing the CPU and other hardware components, whereas the hard drive is a storage device for data.

300

What is a "man-in-the-middle" attack?

It’s an attack where the attacker secretly intercepts and alters communication between two parties who believe they are directly talking to each other.

300

Explain the difference between a capacitive touchscreen and a resistive touchscreen.

Capacitive touchscreens detect touch through the electrical conductivity of the human body, while resistive touchscreens respond to pressure applied to the screen’s surface.

300

When was KUT established?

In 1965.

400

What are the primary features that distinguish C++ from C?

C++ supports object-oriented programming, offers more built-in libraries, and provides features like overloading and templates, which are not available in C.

400

Describe the role of the GPU and how it differs from the CPU.

The GPU (Graphics Processing Unit) handles graphical processing, making it critical for rendering images and videos, which frees the CPU to perform other computations.

400

Describe the difference between symmetric and asymmetric encryption.

Symmetric encryption uses the same key for both encryption and decryption, whereas asymmetric encryption uses a public key for encryption and a private key for decryption.

400

How do optical mice differ from mechanical mice in terms of input mechanism?

Optical mice use a light-emitting diode (LED) and optical sensor to detect movement relative to the surface, whereas mechanical mice use a rolling ball to detect motion.

400

Each faculty has its colour, what are they?

Civil Engineering and Architecture - Red

Electrical Engineering, Automatic Control and Computer Science - Orange

Environmental Engineering, Geomatics and Renewable Energy - Green

Mechatronics and Mechanical Engineering - Blue

Management and Computer Modelling - Grey

500

What programming language is known for its role in the development of early video games?

Assembly language.

500

Explain the concept of virtual memory and how it is used in modern computers.

Virtual memory extends the available memory on a computer by using part of the hard drive as temporary RAM, allowing more applications to run simultaneously.

500

What is a zero-day vulnerability?

A zero-day vulnerability is a software security flaw that is known to the software vendor but has no patch available, making it vulnerable to exploitation.

500

What is the difference between VR headsets and regular monitors in terms of output?

VR headsets provide immersive, 3D visual output by displaying two slightly different angles of the same scene to each eye, creating a stereoscopic effect. Regular monitors display a flat, 2D image and do not provide an immersive experience.

500

Where is a "small campus" of the university located?

In Dąbrowa.