This game inspired the widely loved Anime Arcane
What is League of Legends
This letter is not found in any state name
what is Q
This artist rereleased multiple albums after disputes over copyright
Who is Taylor swift
Who is MLK jr.
The application that serves as SHA's Enterprise Resource Planning Software
What is JD Edwards Enterprise One (E1)
This game is Famous for its nonsensical looking patch notes
What is the Sims
this state after being freed declared independence for 10 years between 1836 and 1845
what is Texas
In 2025 this app was supposed to be banned in the United States twice but didn't stay gone for long
What is Tik Tok
this country holds the distinction of having the only non-rectangular flag in the world
what is Nepal
The governing body that votes to approve major SHA IT Projects
What is the IT Steering Committee?
What is Advanced Warfare
This state is the only place you can travel south to all bordering states
What is Arkansas
This famous horror director was also the lead director for the childhood classic ET
Who is Steven Spielberg
this name often used in chemistry can get confused with a common subterranean mammal
What is a Mol
The Relational Database platform used by SHA IT Applications
What is SQL Server
What are Minecraft and Terraria
This US state also happens to be Maroon 5's least favorite
what is Missouri
this childhood classic starring Tom Hanks and Tim Allen, holds the honor of the first ever fully CGI movie
What is Toy Story
In color theory, Cyan, Magenta, and Yellow are all known as these kinds of colors
What are Primary colors
The Technology that IT utilizes for virtualization (creates virtual servers)
What is Nutanix? Or What is VDI?
This pokemon is the only one to ever have 3 x2 weaknesses
What is Parasect
this state is famous for being the only place in the world landlocked not once, not twice, but three times
this southern college is known country wide for its all-out sorority rush
what is Alabama
this author is known for his classic book "Of Mice and Men"
Who is John Steinback
The service SHA IT uses to identify cybersecurity threats by performing threat hunting, monitoring, and response.
What is Managed Detection & Response (MDR)