Pokémon
Computer Science
Nature/Outdoors
Anime
Hacking / Cyber Security
100

Who's that Pokémon?

Slugma Nuts

100


what is 1101 in binary?

  • 11
  • 15
  • 13
  • 10



13

100

What Tree do acorns come from?


Oak Tree

100

Who is this character?


Monkey D. Luffy


100

What is a VPN?

Virtual Private Network

200

What game was the fairy type introduced?

Gen 6: Pokémon X and Y

200

What is the name of the data structure that portrays the algorithm of Last In, First Out?

a) Queue

b) Stack 

c) Priority Queue

d) Array List

Stack


200

Name 2 Mountains in Hunterdon county


Point, Round, Cushetunk, Kipp, Musconetcong, Gravel Hill, Fox Hill, Goat Hill, Hell 

200

What anime is Gajeel Redfox from?

Fairy Tail

200

What is the first step in hacking?

  • Exploitation
  • Weaponization
  • Reconnaissance
  • Installation 

Reconnaissance


300

Name 3 type combinations that no Pokémon has

  • Normal/Ice
  • Normal/Bug
  • Normal/Rock
  • Normal/Steel
  • Fire/Fairy
  • Ice/Poison
  • Ground/Fairy
  • Bug/Dragon
  • Rock/Ghost
300

What is the Turing Test?

A test to see if an AI is indistinguishable from a human and has reached true sentience

300

Which snakes here are Venomous?


Copperhead, Coral


300

In Hunter X Hunter, how many types of Nen are there?

6

300

What was the Code that the British used to decipher German messages during WW2? 

The Enigma Code / Enigma Cipher:


400

What Gen / games did physical and special moves stop depending on the type?

Gen 4: Pokémon Diamond and Pearl

400

What is Assembly Code?

a) A programming language that uses high-level abstractions for easy understanding. 

b) A low-level programming language that corresponds closely to machine language.

c) A type of encryption used for secure communication. 

d) An advanced algorithm for optimizing code execution.

b) A low-level programming language that corresponds closely to machine language. 

400

What Tree do Morel Mushrooms tend to grow next too?

Elm Trees

400

In Dr. Stone, what chemical heals people from petrification?

Potassium Nitrate

400

What is a Honey Pot?

A computer or server with vulnerabilities designed to trap hackers.

500

What was the first game to have a 3d model of a Pokémon?

Smash 64

500

What is Dijkstra's shortest path algorithm used for?

Hint: Used in daily life

Maps!


500

Out of these 6 plants, pick the non poisonous ones:




500

Name all of the 9 Titans of Ymir from Attack on Titan

Female, Cart, Founding, Attack, Armored, Beast, Colossus, Jaw, Warhammer

500

Which of the following is an example of a "zero-day exploit"?

a) A vulnerability that has been known for several months but remains unpatched. 

b) An attack that occurs at exactly midnight. 

c) An exploit that takes advantage of a software vulnerability before it is known to the software vendor or the public.

d) A security measure that eliminates all potential threats.

c) An exploit that takes advantage of a software vulnerability before it is known to the software vendor or the public. 

M
e
n
u