Cabinet Members Cybersecurity Web Development Data Science / AI Networking
100
What is Kanade?
This is Kylie’s actual first name in English.
100
What is a phishing attack?
This is a scam where a criminal pretends to be a trustworthy person or company to trick you into giving them personal information like passwords, bank details, or credit card numbers.
100
What is 404?
This is the HTTP status code for "page not found".
100
What is Python?
This programming language is most commonly used for machine learning.
100
What is a router?
This device connects multiple computers to form a local network.
200
What is Hide and Seek Club or Elizabethtown Gamer's Guild?
Brian is a board member of two other clubs. Name at least one.
200
What is Ethical Hacking?
The “white hat” hacker uses their skills for this purpose.
200
What is the client (front-end)?
JavaScript runs primarily on this side of a website.
200
What is supervised learning?
This process involves teaching an algorithm using labeled data.
200
What is Internet Protocol?
The "IP" in IP Address stands for this.
300
What is James?
This is Matt's middle name.
300
What is ransomware?
This type of malware encrypts files and demands payment to restore access, often teaching victims a very expensive lesson in backups.
300
What is the link tag?
In HTML, this element is used to link an external CSS file.
300
What is a decision tree?
This visual chart often looks like a branching tree - because it is.
300
What is a switch?
This device connects multiple devices on the same local network and forwards data using MAC addresses.
400
Who is Thomas Buck?
This is James Buck's brother.
400
What is a DDoS attack?
When a hacker floods a website with traffic to make it crash, it’s called this type of attack.
400
What is z-index?
In CSS, this property controls the stacking order of elements.
400
What is overfitting?
When a model performs perfectly on training data but poorly on new data, it's suffering from this.
400
What is a traceroute?
This tool helps trace the path data takes through a network.
500
Giuseppe
This is the spelling for Bella's brother's name.
(Daily Double)
500
What is defending and detecting intrusions?
During a penetration test, the “Red Team” simulates attackers while the “Blue Team” does this.
500
What is 418?
Defined in RFC 2324, this humorous HTTP status code indicates that a server refuses to brew coffee because it is a teapot.
500
What is the Turing Test?
Named after a 20th-century mathematician, this test evaluates whether a model’s outputs are indistinguishable from a human’s responses.
500
What is TLS (Transport Layer Security)?
This protocol, often described as a “handshake,” establishes a secure communication channel over an insecure network and is the foundation of HTTPS.






CS Club Jeopardy

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline