Shortcuts
Famous Faces
Software
Hardware
Potpourri
100
To paste something on a computer, press CTRL-???

What is V?

100

In 2004, “thefacebook” was launched as a social networking site for Harvard by students led by which computer programming student who later dropped out to become the face of the site (so to speak)?

Who is Mark Zuckerberg?

100

It sounds like a circus performer from Taos and allows you to download PDFs with the greatest of ease. I'm talking about what A-word family of software?

Adobe Acrobat

100

Which acronym for a computer’s main memory system sounds like a Daft Punk album or a horned mountain animal?

RAM

100

When a password is limited strictly to numeric characters, the secret is often referred to as a PIN. What does that acronym stand for?

Personal Identification Number

200

To make letters uppercase while typing, hold this key down while typing a letter.

What is shift?

200

What website was co-founded by computer scientist Larry Page in 1998 under the name BackRub?

Google

200

The mobile app development company Niantic struck gold in 2016 with what smash-hit smartphone game that captured tens of millions of players within days of its release? The game became a global phenomenon with players largely playing outdoors.

Pokemon Go

200

While some typists would argue that the Dvorak model is more efficient, the majority of computer keyboards still use what layout, named for a certain six-letter sequence that's probably right in front of you?

qweryty

200

In the acronym BIOS, which refers to the firmware that provides runtime services for operating systems and programs, the "B" stands for "Basic" and the "S" for "System." What two words do the "I" and "O" stand for?

Input and Output

300
Scroll to the end of a website or document by pressing this button on the keyboard. 

What is "End"?

300

Not long after he founded Sequoia Capital, Don Valentine became one of the first investors in what fruity little tech startup by a computer engineer at Atari named Steve?

Apple

300

In the early ‘90s, Symantec acquired a software program developed by a computer programmer named Peter Norton. It’s since become one of the most commonly used and well-known of which kind of computer security software?

Antivirus

300

Now appearing prophetic, what device was announced in 2007 with the following slogan? "This is only the beginning."

iPhone

300

What three-letter internet initialism for audibly cackling debuted on Usenet in the ‘80s and was officially added to the Oxford English Dictionary in 2011?

LOL

400

To open the help files of most programs, press this function key that has the same name as a racing league. 

What is F1?

400

The first Android-powered device from Samsung Mobile also became the first in a long-running product line for the company. What was the name of this device?

Samsung Galaxy

400

What delicious computer term did web browser programmer Lou Montulli coin to refer to information that is sent from the browser to the web server?

Cookie

400

Doug Engelbart was the inventor of what computer accessory? The first one was made from wood.

Mouse

400

Although the exact origin is unknown, this piece of technology and calculating tool used beans or stones moved in grooves of sand to perform calculations. Although computers have mostly replaced it, this tool is still in use for teaching arithmetic to children in many parts of the world. What is it?

Abacus

500

Instead of using the spacebar to indent something in a document, this key will do it for you more easily. 

What is "Tab"?

500

Mendicant Bias and Offensive Bias are fictional AIs in what "holy" video game franchise that shares its name with a Beyonce´ song?

Halo

500

Since 2013, what technology company focused on payments has owned the popular smartphone cash transfer app Venmo?

PayPal

500

ChipTest, Hydra, Deep Blue, and HiTech are all computers or computer programs developed to play what?

Chess

500

Although cartoon bears might like it, a hacker might not enjoy being tricked into hacking what sweet-sounding, eight-letter decoy computer system that's purposely made to attract attackers to gain insight into how to decrease cybersecurity threats?

Honeypot

M
e
n
u