Cabinet Members | Cybersecurity | Web Development | Data Science / AI | Networking |
---|---|---|---|---|
What is Kanade?
This is Kylie’s actual first name in English.
|
What is a phishing attack?
This is a scam where a criminal pretends to be a trustworthy person or company to trick you into giving them personal information like passwords, bank details, or credit card numbers.
|
What is 404?
This is the HTTP status code for "page not found".
|
What is Python?
This programming language is most commonly used for machine learning.
|
What is a router?
This device connects multiple computers to form a local network.
|
What is Hide and Seek Club or Elizabethtown Gamer's Guild?
Brian is a board member of two other clubs. Name at least one.
|
What is Ethical Hacking?
The “white hat” hacker uses their skills for this purpose.
|
What is the client (front-end)?
JavaScript runs primarily on this side of a website.
|
What is supervised learning?
This process involves teaching an algorithm using labeled data.
|
What is Internet Protocol?
The "IP" in IP Address stands for this.
|
What is James?
This is Matt's middle name.
|
What is ransomware?
This type of malware encrypts files and demands payment to restore access, often teaching victims a very expensive lesson in backups.
|
What is the link tag?
In HTML, this element is used to link an external CSS file.
|
What is a decision tree?
This visual chart often looks like a branching tree - because it is.
|
What is a switch?
This device connects multiple devices on the same local network and forwards data using MAC addresses.
|
Who is Thomas Buck?
This is James Buck's brother.
|
What is a DDoS attack?
When a hacker floods a website with traffic to make it crash, it’s called this type of attack.
|
What is z-index?
In CSS, this property controls the stacking order of elements.
|
What is overfitting?
When a model performs perfectly on training data but poorly on new data, it's suffering from this.
|
What is a traceroute?
This tool helps trace the path data takes through a network.
|
Giuseppe
This is the spelling for Bella's brother's name.
(Daily Double) |
What is defending and detecting intrusions?
During a penetration test, the “Red Team” simulates attackers while the “Blue Team” does this.
|
What is 418?
Defined in RFC 2324, this humorous HTTP status code indicates that a server refuses to brew coffee because it is a teapot.
|
What is the Turing Test?
Named after a 20th-century mathematician, this test evaluates whether a model’s outputs are indistinguishable from a human’s responses.
|
What is TLS (Transport Layer Security)?
This protocol, often described as a “handshake,” establishes a secure communication channel over an insecure network and is the foundation of HTTPS.
|