Programming Puzzles


Languages


Arduino Programming

Which of the following are variable types in this language?
What goes in front of an array name to declare an array with values that cannot be changed?


How can you write a comment in an Arduino sketch?



Which statement will print out the phrase "Hello World!" to the console in Arduino?


Functions

LEDs

Which function turns on an LED by controlling the voltage of a specified pin?


Which function sets up an LED pin as an input or output and is included in void setup()?


Which function reads the value of an LED pin as either HIGH or LOW?


Website Design

HTML

True or false: HTML is considered a programming language.
The tag is considered semantic HTML, while the tag is not.
Which of the following tags are self-closing?



CSS

True or false: CSS is considered a programming language.
The symbol is used to select an element's class name, while the symbol is used to select an element's id name.
If you want to change an element's color, you can do so by writing "color: " and...


JavaScript

True or false: JavaScript is an object-oriented language.
The interface that connects HTML and JavaScript is known as the , and it represents web documents as collections of elements.
JavaScript is used for...


Ethical Hacking

How can ethical hacking be defined?

What is the goal of ethical hacking?


Which organization offers the Certified Ethical Hacker certification?


What is the term for a simulated cyber attack used to test a system's security?


Name a tool that is used for network scanning.


What is social engineering in the context of cybersecurity?


Are hackers required to know programming?

Which fields have uses for ethical hackinig?


Where can you practice hacking skills?


Hat Types

What kind of hacker hacks with authorization and without malicious intentions?
What kind of hacker hacks without authorization and with malicious intentions?
What kind of hacker hacks without authorization or malicious intentions?
What kind of hacker acts as a vigilante and prevents malicious hackers from accessing unauthorized information?
What kind of hacker is hired by tech companies to locate security vulnerabilities or test products?
What kind of hacker is just beginning to develop their skills?