A framework for managing and improving IT support and service delivery.
What is ITIL
A structured process that is used to design, develop, and test application.
What is SDLC?
How many planets in the solar system?
8
Programs used to prevent, detect and remove malicious software
What is antivirus or antimalware.
This 1993 film based on a true story, depicts a German businessman who saved over a thousand Jewish refugees during the Holocaust
What is Schindler's List
An unplanned interruption to application or infrastructure services or reduction in quality.
The 3 subatomic particles?
What is proton, neutron and electron
A device or software that monitors keyboard usage
what is a keyboard logger
This 1996 dark comedy thriller follows a botched kidnapping in snowy Minnesota, investigated by the persistent and pregnant police chief Marge Gunderson.
What is Fargo
A commitment between a service provider and a customer regarding service quality.
What is SLA?
The SDLC model appropriate for Maintenance and Support.
Agile or DevOps.
Emily has 48 apples and divides them between 6 friends, how many apples does each friend get?
8
A software that will secure data copied on a device placed into your computer
what is device encryption
This 1999 film follows a computer hacker who discovers that reality is a simulated illusion controlled by artificial intelligence and joins a rebellion to free humanity.
What is the Matrix
It's a single point of contact for users to report issues and request services.
What is Service Desk?
What is Spiral?
The continent which is the least populated
What is Antartica?
Someone who seeks out and exploits weaknesses in computer systems
what is a hacker
This 1997 film tells the tragic love story of Jack and Rose aboard a doomed ocean liner.
The practice of designing, delivering, and managing IT services to meet business needs.
Its one of the most widely utilized model in the IT industry.
If a train was supposed to arrive at 3:15pm and arrived 35minutes late, it arrived at what time?
What is 3:50pm
an attempt to acquire personal information such usernames, passwords, bank account or credit card information via email
what is phishing
This 1996 film, reimagines the classic tragedy of star-crossed lovers in a modern setting while keeping the original Shakespearean dialogue.
Romeo + Juliet