The Finishing Gates
Operator
Left-Overs
On the Shoulders of Giants
Help! Murder! Police!
100
The default view in Microsoft Word 2013
What is Print View?
100
This protocol assigns an IP address to the computer from a list of possible addresses
What is DHCP (Dynamic Host Configuration Protocol)?
100
An established set of rules or code of behavior.
What is a protocol?
100
Often considered the Father of Computing.
Who is Charles Babbage?
100
This non-self-replicating type of malware program, named after a ploy used by the Greeks in the war against Troy, contains malicious code that, when executed, causes loss or theft of data, and possible system harm.
What is a Trojan Horse?
200
When you click on the File tab in any Microsoft Office 2013 program, you are presented with such options as Save, Print, Open, Close, and so forth. This is the term Microsoft uses to describe this area.
What is Backstage?
200
This is a complex set of electronic components and their interconnections that ar etched or imprinted on a computer chip.e
What is an integrated circuit?
200
Use this protocol when sending a copy of a message to someone without the original recipient's knowledge.
What is BCC (Blind Carbon Copy)?
200
This 19th Countess is often considered the first programmer.
Who is Ada Lovelace?
200
An example of this criminal act is a student taking an exam for his friend.
What is identity theft?
300
A customizable toolbar that contains a set of commands that are independent of the tab on the ribbon that is currently displayed.
What is Quick Access (toolbar)?
300
A combination of encryption and decryption methods.
What is a cryptosystem?
300
You receive an email from your bank informing you that they are performing an audit and find possible problems with your account and asking you to log in to resolve the issue. This is an example of this type of scam.
What is phishing/spear phishing?
300
In 1947 William Shockley, John Bardeen, and Walter Brattain invented this device which permitted the first wave of electronic miniaturization.
What is a transistor?
300
Using of someone else's work as your own.
What is plagiarism?
400
This computer-related company has created more millionaires than any other company in the world.
What is Microsoft??
400
The standard network protocol for transferring files from one computer to another over the Internet.
What is FTP (File Transfer Protocol)?
400
The owner of a botnet recruits computers to run malicious software programs. These computers are often referred to using the same terminology used to describe the walking dead.
What is a zombie?
400
Mathematical operators used in search queries carry the name of their inventor.
What is a Boolean Operator?
400
A loosely associated international network of activist and hacktivist entities whose members wear the Guy Fawkes mask to hide their true identities.
What is Anonymous?
500
This Harvard drop-out started his fortune by leasing an Operating System to IBM.
Who is Bill Gates?
500
In the URL http://www.cs.washington.edu/homes/book/index.html, this is the domain name.
500
The mode in which a virus, worm, or other malware gets into your computer.
What is a vector of attack?
500
He invented the World Wide Web.
Who is Tim Berners-Lee?
500
This contract between the user and the software company usually gives the user the right to run the program on one computer and to make backup copies for personal use. However, even though the user paid for the program, s/he does not own program.
What is a software license?
M
e
n
u