IT
Software Engineering
Are U Smarter than a 5th Grader
The need for Security
I Love Movies
100

A framework for managing and improving IT support and service delivery.

What is ITIL

100

A structured process that is used to design, develop, and test application.

What is SDLC?

100

How many planets in the solar system?

8

100

Programs used to prevent, detect and remove malicious software

What is antivirus or antimalware.

100

This 1993 film based on a true story, depicts a German businessman who saved over a thousand Jewish refugees during the Holocaust

What is Schindler's List

200

An unplanned interruption to application or infrastructure services or reduction in quality.

What is Incident?
200
Fundamental model of software development where our client use and is considered obsolete.
What is Waterfall Model?
200

The 3 subatomic particles?

What is proton, neutron and electron

200

A device or software that monitors keyboard usage

what is a keyboard logger

200

This 1996 dark comedy thriller follows a botched kidnapping in snowy Minnesota, investigated by the persistent and pregnant police chief Marge Gunderson.

What is Fargo

300

A commitment between a service provider and a customer regarding service quality.

What is SLA?

300

The SDLC model appropriate for Maintenance and Support.

Agile or DevOps.

300

Emily has 48 apples and divides them between 6 friends, how many apples does each friend get?

8

300

A software that will secure data copied on a device placed into your computer

what is device encryption

300

This 1999 film follows a computer hacker who discovers that reality is a simulated illusion controlled by artificial intelligence and joins a rebellion to free humanity.

What is the Matrix

400

It's a single point of contact for users to report issues and request services.

What is Service Desk?

400
Suitable model for high-risk projects with evolving requirements.

What is Spiral?

400

The continent which is the least populated

What is Antartica?

400

Someone who seeks out and exploits weaknesses in computer systems

what is a hacker

400

This 1997 film tells the tragic love story of Jack and Rose aboard a doomed ocean liner.

What is Titanic
500

The practice of designing, delivering, and managing IT services to meet business needs.

What is Service Management?
500

Its one of the most widely utilized model in the IT industry.

Agile.
500

If a train was supposed to arrive at 3:15pm and arrived 35minutes late, it arrived at what time?

What is 3:50pm

500

an attempt to acquire personal information such usernames, passwords, bank account or credit card information via email

what is phishing

500

This 1996 film, reimagines the classic tragedy of star-crossed lovers in a modern setting while keeping the original Shakespearean dialogue.

Romeo + Juliet

M
e
n
u