Who's that Pokémon?
Slugma Nuts
what is 1101 in binary?
13
What Tree do acorns come from?
Oak Tree
Who is this character?
Monkey D. Luffy
What is a VPN?
Virtual Private Network
What game was the fairy type introduced?
Gen 6: Pokémon X and Y
What is the name of the data structure that portrays the algorithm of Last In, First Out?
a) Queue
b) Stack
c) Priority Queue
d) Array List
Stack
Name 2 Mountains in Hunterdon county
Point, Round, Cushetunk, Kipp, Musconetcong, Gravel Hill, Fox Hill, Goat Hill, Hell
What anime is Gajeel Redfox from?
Fairy Tail
What is the first step in hacking?
Reconnaissance
Name 3 type combinations that no Pokémon has
What is the Turing Test?
A test to see if an AI is indistinguishable from a human and has reached true sentience
Which snakes here are Venomous?
Copperhead, Coral
In Hunter X Hunter, how many types of Nen are there?
6
What was the Code that the British used to decipher German messages during WW2?
The Enigma Code / Enigma Cipher:
What Gen / games did physical and special moves stop depending on the type?
Gen 4: Pokémon Diamond and Pearl
What is Assembly Code?
a) A programming language that uses high-level abstractions for easy understanding.
b) A low-level programming language that corresponds closely to machine language.
c) A type of encryption used for secure communication.
d) An advanced algorithm for optimizing code execution.
b) A low-level programming language that corresponds closely to machine language.
What Tree do Morel Mushrooms tend to grow next too?
Elm Trees
In Dr. Stone, what chemical heals people from petrification?
Potassium Nitrate
What is a Honey Pot?
A computer or server with vulnerabilities designed to trap hackers.
What was the first game to have a 3d model of a Pokémon?
Smash 64
What is Dijkstra's shortest path algorithm used for?
Hint: Used in daily life
Maps!
Out of these 6 plants, pick the non poisonous ones:
Name all of the 9 Titans of Ymir from Attack on Titan
Female, Cart, Founding, Attack, Armored, Beast, Colossus, Jaw, Warhammer
Which of the following is an example of a "zero-day exploit"?
a) A vulnerability that has been known for several months but remains unpatched.
b) An attack that occurs at exactly midnight.
c) An exploit that takes advantage of a software vulnerability before it is known to the software vendor or the public.
d) A security measure that eliminates all potential threats.
c) An exploit that takes advantage of a software vulnerability before it is known to the software vendor or the public.