Column A
Column B
Column C
Column D
Column E
100

After firing her in 1968, IBM finally recognized this computer scientist and transgender activist in 2020 for her major contribution of very large scale integration (VLSI), which transformed the global microelectronics industry.

Who is Lynn Conway?

100

The author of the first computer program who also translated Luigi Menabrea's article about Babbage's Analytical Engine.

Who is Ada Lovelace?

100
Developed fundamental contributions to the concepts and practices underlying modern darabase systems as demonstrated in their development of PostgreSQL.

Who is Michael Stonebraker? 

100

Santa needs to sort his naughty and nice list efficiently. If he uses the Merge Sort algorithm, what is the average time complexity of this sorting method? 

What is the O (n log n)?

100

Sam keeps his vast fortune in a money bin. What asset classifications would this enormous pile of cash fall under on a balance sheet?

What is current Asset?


200

The first computer scientist to win the Nobel Prize for their work in neural networks. 

Who is Geoff Hinton?

200

If Santa's workshop depreciates its sleigh over 5 yrs using the straight-line method, and the sleigh originally cost $10,000 with no salvage value, what is the annual depreciation expense?

What is $2,000?

200

Santa's gift delivery system stores presents in a special structure that follows the Last-In-First-Out (LIFO) principal. What data structure does ths describe?

What is A stack?

200

Computer architecture featuring separate storage and signal pathways for instructions and data is named for what Ivy League school?

What is Harvard?

200

This type of leader, much like Santa, is known for inspiring others with a vision, bringing joy, and motivating people to work together toward a shared goal.

What is a Transformational leader?

300

By embedding zero bytes into web applications that do not handle postfix string terminators properly, an attacker can use this technique to exploit system.

What is a poison NUL byte attack?

300

This kind of context free grammar can parse certain inputs with more than one possible parse tree.

What is an ambiguous grammar?

300

What popular operating system launched in 1991, and also has its own mascot, Tux the penguin?

What is Linux?

300

What are the two lowest levels programming languages of the Von Neumann computer acrchitecture?

What is Microprogramming and above it the Assembly Macroprogramming?

300

The year Advanced Encryption Standard (AES) was officially adopted as a federal standard.

What is 2002?

400

In September 1983, between 10 and 20 semi-trailer truckloads of Atari boxes, cartridges, and systems from a Atari store house in El Paso, Texas were crushed and buried at the landfill in this New Mexico town?

Where is Alamogordo?

400

Renowned for his work on algorithms and the analysis of algorithms, particularly in his seminal work "The Art of Computer Programming.

Who is Donald Knuth?

400

The first female Turing Award winner, recognized, for her contributions to optimizing compliers.  

Who is Frances Allen?

400

A retailer offers a "BOGO 50% off" deal on Christmas decorations. What accounting principal requires the retailer to recognize the revenue from this sale at the new amount (after the discount)?

What is Revenue Recognition Principal?

400

A sudden increase in demand for a particular toy just before Christmas, coupled with limited supply, can lead to what economic phenomenon?

What is price surge or inflation?


500

The 2017 ransomeware that spread globally across 150 countries and caused losses of approximately $4 billion.

What was the WannaCry ransomware?

500

Buddy the Elf starts a cookie decorating business. What is the term for the initial funds he invests in his business?

Whats is Seed capital or Start-up capital?

500

In RSA Algorithm the "R" stands for?

What is Rivest?

500

The market structure bet describes the market for Christmas trees, where many sellers offer similar but not identical products.

What is Monopolistic Competition?

500

This is written to do harm and be classified into many categories based on how they propagate and behave.

What is a Computer virus?

M
e
n
u