🔓 CS ESCAPE ROOM
// Can You Hack Your Way Out?
> INCOMING TRANSMISSION...
A rogue AI has locked down the school network. Firewalls are up. Systems are encrypted. The only way out is to prove you know your Computer Science.
You have 50 MINUTES to solve 6 puzzles and obtain the master unlock code.
Each puzzle tests a different area: binary, hex, networks, hardware, and more. Solve one to unlock the next.
You have 3 HINTS — use them wisely.
> GOOD LUCK, OPERATIVES_
Binary Decryption
> The first firewall requires a denary passcode. The AI has left the code in binary. Convert it to break through.
The locked terminal is displaying: 11010110
Convert this 8-bit binary number to denary (decimal).
Tip: Remember your place values — 128, 64, 32, 16, 8, 4, 2, 1
Hex Code Cracker
> Nice work! But the second layer uses hexadecimal encoding. The AI thinks students can't handle hex. Prove it wrong.
The screen flashes a hex value: B7
What is B7 in denary (decimal)?
Tip: B = 11 in denary. Each hex digit represents 4 bits.
Network Protocol Override
> You've broken through the data layers. Now the AI is testing whether you understand networks. Match the protocols to regain control.
Drag each description to match the correct network term.
Translates domain names to IP addresses
Ensures data packets arrive complete and in order
Used to upload/download files between computers
Encrypts web traffic between browser and server
Drop here...
Drop here...
Drop here...
Drop here...
Threat Detection
> The AI has planted malware across the network. You need to identify the correct security measures to neutralise each threat.
A company discovers that an attacker has been secretly recording all keyboard input on employee machines to steal passwords.
What type of malware is this, and what is the best combination of defences?
A Virus — install a firewall and use strong passwords
B Keylogger — use anti-malware software and two-factor authentication
C Phishing — train staff to recognise suspicious emails
D Ransomware — keep regular backups and pay the ransom
Component Identification
> Almost there! The AI has scrambled the hardware database. Reassign each description to the correct component to restore the system.
Match each description to the correct hardware component.
Fetches, decodes and executes instructions
Volatile memory that stores currently running programs
Non-volatile secondary storage with no moving parts
Specialised processor optimised for rendering graphics
Drop here...
Drop here...
Drop here...
Drop here...
Final Override — The Fetch-Decode-Execute Cycle
> THIS IS IT. The AI's core process is the CPU cycle itself. Put the steps in the correct order to shut it down and escape!
The CPU processes every instruction using the Fetch-Decode-Execute cycle. Drag these steps into the correct order (1 = first).
?
The instruction is decoded (interpreted) by the Control Unit
?
The Program Counter is incremented to point to the next instruction
?
The next instruction is fetched from RAM using the address in the Program Counter
?
The ALU executes the instruction (e.g. performs a calculation)