Cybersecurity
Engineering
Computer Science
Informatics
UAlbany
100

This term describes the practice of impersonating someone to gain confidential information, often through deceptive emails.

What is phishing?

100

This type of memory is volatile and is used for temporary storage while a computer is running.

What is RAM (Random Access Memory)?

100

This term refers to a set of rules that define the structure and behavior of a programming language.

What is syntax?

100

This IT role is responsible for maintaining and managing a company’s computer systems, including hardware and software troubleshooting.

What is a systems administrator?

100

This is the year the University at Albany was established, originally as a teacher's college.

What is 1844?

200

This acronym stands for the secure protocol used for transferring hypertext on the World Wide Web, commonly seen at the beginning of website addresses.

What is HTTPS?

200

This law states that the current flowing through a conductor between two points is directly proportional to the voltage across the two points.

What is Ohm's Law?
200

This process involves transforming source code written in a high-level language into machine code that a computer's processor can execute.

What is compilation?

200

This design technique involves creating low-fidelity sketches or wireframes to visualize layout and functionality before detailed design work begins.

What is prototyping?

200

This is the name of the newest gym on campus. 

What is The Well?

300

This tool is used to monitor network traffic for suspicious activity and potential security breaches.

What is an Intrusion Detection System (IDS)?

300

This electrical component is used to store energy in an electric field and is commonly found in circuits.

What is a capacitor?

300

This type of programming language is designed to be easy for humans to read and write, as opposed to machine code.

What is a high-level programming language?

300

This popular game engine, known for its flexibility and support for 2D and 3D game development, is widely used by indie developers and large studios alike.

What is Unity?

300

This service provides mental health support, counseling, and crisis intervention for students facing personal or academic challenges.

What is Counseling and Psychological Services (CAPS)?

400

This form of cyberattack involves using multiple sources to overwhelm a server with traffic, rendering it unavailable to legitimate users. 

What is a DDoS attack?

400

 This programming language, known for its use in embedded systems and hardware interfaces, is often used for low-level programming.

What is C?

400

In Java, this method is called to start the execution of a program, and it must be declared as public and static.

What is main?

400

This version control system is widely used for tracking changes in source code during software development, allowing multiple developers to collaborate.

What is Git?

400

This individual is the current president of UAlbany, who also serves on President Biden’s Advisory Commission on Advancing Educational Equity, Excellence, and Economic Opportunity for Hispanics.  

Who is Havidán Rodríguez?

500

This framework helps organizations assess and improve their security posture by providing guidelines and best practices.

What is the NIST Cybersecurity Framework?

500

This physicist formulated laws that govern current and voltage in circuits, including one stating that the total current at a junction must equal zero.

Who is Kirchhoff?

500

A professional who specializes in server-side logic and database management for web applications.  

What is a back-end developer?

500

This data visualization tool allows users to create interactive dashboards and reports to analyze data trends and metrics.

What is Tableau?

500

This is the number of pillars on the Academic Podium.

What is 1,248?