🔓 CS ESCAPE ROOM
// Can You Hack Your Way Out?

> INCOMING TRANSMISSION...

A rogue AI has locked down the school network. Firewalls are up. Systems are encrypted. The only way out is to prove you know your Computer Science.

You have 50 MINUTES to solve 6 puzzles and obtain the master unlock code.

Each puzzle tests a different area: binary, hex, networks, hardware, and more. Solve one to unlock the next.

You have 3 HINTS — use them wisely.

> GOOD LUCK, OPERATIVES_

🏆 SYSTEM UNLOCKED
TEAM:
TIME:
HINTS USED: / 3
ATTEMPTS:
YOUR MASTER UNLOCK CODE:
Show this code to your teacher to confirm your escape!
TEAM: —
50:00
💡 HINTS: 3
PUZZLE 1 / 6 DATA REPRESENTATION
Binary Decryption
> The first firewall requires a denary passcode. The AI has left the code in binary. Convert it to break through.
The locked terminal is displaying: 11010110

Convert this 8-bit binary number to denary (decimal).

Tip: Remember your place values — 128, 64, 32, 16, 8, 4, 2, 1
PUZZLE 2 / 6 DATA REPRESENTATION
Hex Code Cracker
> Nice work! But the second layer uses hexadecimal encoding. The AI thinks students can't handle hex. Prove it wrong.
The screen flashes a hex value: B7

What is B7 in denary (decimal)?

Tip: B = 11 in denary. Each hex digit represents 4 bits.
PUZZLE 3 / 6 NETWORKS & SECURITY
Network Protocol Override
> You've broken through the data layers. Now the AI is testing whether you understand networks. Match the protocols to regain control.
Drag each description to match the correct network term.
Translates domain names to IP addresses
Ensures data packets arrive complete and in order
Used to upload/download files between computers
Encrypts web traffic between browser and server
DNS
TCP
FTP
HTTPS
Drop here...
Drop here...
Drop here...
Drop here...
PUZZLE 4 / 6 NETWORKS & SECURITY
Threat Detection
> The AI has planted malware across the network. You need to identify the correct security measures to neutralise each threat.
A company discovers that an attacker has been secretly recording all keyboard input on employee machines to steal passwords.

What type of malware is this, and what is the best combination of defences?
A Virus — install a firewall and use strong passwords
B Keylogger — use anti-malware software and two-factor authentication
C Phishing — train staff to recognise suspicious emails
D Ransomware — keep regular backups and pay the ransom
PUZZLE 5 / 6 HARDWARE & SOFTWARE
Component Identification
> Almost there! The AI has scrambled the hardware database. Reassign each description to the correct component to restore the system.
Match each description to the correct hardware component.
Fetches, decodes and executes instructions
Volatile memory that stores currently running programs
Non-volatile secondary storage with no moving parts
Specialised processor optimised for rendering graphics
CPU
RAM
SSD
GPU
Drop here...
Drop here...
Drop here...
Drop here...
PUZZLE 6 / 6 HARDWARE & SOFTWARE
Final Override — The Fetch-Decode-Execute Cycle
> THIS IS IT. The AI's core process is the CPU cycle itself. Put the steps in the correct order to shut it down and escape!
The CPU processes every instruction using the Fetch-Decode-Execute cycle. Drag these steps into the correct order (1 = first).
? The instruction is decoded (interpreted) by the Control Unit
? The Program Counter is incremented to point to the next instruction
? The next instruction is fetched from RAM using the address in the Program Counter
? The ALU executes the instruction (e.g. performs a calculation)