Acronyms
Technology Companies and Startups
Programming and Languages
Computers and Hardware
Cybersecurity and Privacy
100

What does RAM stand for?

Random Access Memory

100

What company first introduced their Chromebook hardware in 2011? The product's low price point proved popular with teachers as a 2018 estimate indicated that over 60% of classroom mobile devices in the U.S. were Chromebooks

Google

100

HTML and CSS are computer languages commonly used to create what?

websites

100

What computer operating system, launched in 1991 and known for its penguin mascot named Tux, is popular among developers?

Linux

100

Frequently involving a mobile device or email correspondence, what does the security term MFA refer to when dealing with computer-granted access?

Multi-factor authentication

200

What is the acronym of the portable document format developed by Adobe?

PDF

200

The European internet company Skype was purchased by eBay in 2005 for $2.5 billion, but only six years later the video chat company was purchased by what other tech firm for a new purchase price of $8.5 billion?

Microsoft

200

What is the programming language developed by James Gosling at Sun Microsystems and named after the type of coffee from Indonesia?

Java

200

The Atanasoff-Berry Computer, the world’s first electronic digital computer, was built during the 1930s in what U.S. state?

Iowa

200

What term is used for the most basic level or core of an operating system, responsible for resource allocation, file management and security? In a different context, this word can also mean the seed and hard husk of a cereal.

Kernel

300

What does SSD stand for?

Solid State Drive

300

All of these famous tech companies started in a garage, except...

(A) Amazon     (B) Apple

(C) eBay         (D) Google

       (E) Microsoft

eBay

300

A dude named Chip Morningstar received the first JSON message, a format derived from what core language?

JavaScript

300

In 2005, Linus Torvalds developed a version control software to track changes in files for the Linux kernel. What is the three-letter name of this software?

Git
300

What “M” computer security company, founded by namesake John in 1987 before being acquired by Intel in 2011, is well known for its anti-virus software that is available to individual consumers?

MacAfee

400

What does the acronym USB represent?

Universal Serial Bus

400

Internet mogul Richard Barton founded the online travel companyExpedia, the employment search engine and company review website Glassdoor, and what internet-based real estate company?

Zillow

400

Unicode, the standard for character encoding used to represent multilingual text as binary, is the successor of what US encoding standard?

ASCII

400

Where did the name "Bluetooth" come from?

(A) A medieval Scandinavian king

(B) An electric eel with blue teeth 

(C) A bear that loves blueberries

(D) A Native American chieftain 

A medieval Scandinavian king

400

What is the two word term for the type of cybersecurity breach in which a user is convinced to disclose secrets due to an exploitation of trust and reliance on cognitive biases? In short, this is a type of attack focused on human gatekeepers of information rather than the computer system itself.

Social Engineering

500

What does URL stand for?

Uniform Resource Locator

500

What 2008-founded internet company with a "fowl" name was founded as a privacy-focused alternative to Google's search engine and has a name only a few letters shy of a well-known children's game? As of 2020, the company has fundraised more than $10 million in venture capital.

DuckDuckGo

500

Before the name Java, the coding language was known by what arboreal name that also has a professor in the Pokemon universe?

Oak

500

While working at the Xerox Palo Alto Research Center during the 1970s, computer scientist Larry Tesler coined what three common computer commands first used to edit documents on a word processor he co-created called Gypsy?

Cut, copy, paste

500

As of January 2019, what company is the source of the largest data breach in known history? This former tech favorite admitted that up to three billion accounts had secure information compromised in 2013 by a suspected state-actor.

Yahoo

M
e
n
u