PROGRAMMING
CYBERSECURITY
DATA SCIENCE
PROJECT MANAGEMENT
TECH HISTORY & INNOVATIONS
100

What does "HTML" stand for?

What is Hypertext Markup Language

100

This type of attack tricks users into revealing sensitive information by pretending to be a trustworthy entity.

What is phishing?

100

This is the most commonly used programming language for data science.

What is Python?

100

This is the document that defines the project's scope, objectives, and participants.

What is the Project Charter?

100

This company created the Windows operating system.

What is Microsoft?

200

 This is the process of finding and fixing errors in a program.

What is debugging?

200

This three-letter acronym represents the fundamental principles of cybersecurity: keeping data private, unaltered, and accessible.

What is CIA (Confidentiality, Integrity, Availability)?

200

This visualization tool is used to create dashboards and analyze data interactively.

What is Tableau

200

This chart is used in project management to represent a project’s schedule, showing the tasks, their durations, and dependencies.

What is a Gantt Chart?

200

This type of storage device replaced floppy disks and CDs for data transfer.


What is a USB flash drive?

300

This type of loop repeats code as long as a condition is true.

What is a while loop?

300

This type of malware disguises itself as legitimate software but performs malicious actions when executed.

What is a Trojan horse?

300

This type of chart is commonly used to visualize the relationship between an X and Y value and can help identify patterns, correlations, or outliers in data.
This chart can have many data points and multiple variables.

What is a scatter plot?

300

This project management methodology emphasizes flexibility, collaboration, and iterative progress, often used in software development.

What is the Agile Method?

300

This person, known as the "father of modern computing," developed the concept of a theoretical machine that could solve any mathematical problem using algorithms, which later became the foundation of modern computers.

Who is Alan Turing?

400

This SQL command is used to retrieve data from a database.

What is SELECT?

400

This security practice ensures that users only have the minimum access necessary to perform their tasks.

What is the principle of least privilege?

400

This statistical measure describes how spread out the data points are from the mean.


What is standard deviation?

400

The term for the formal process of evaluating, prioritizing, and mitigating risks in a project.

What is Risk Management?

400

This programming language, created in 1995, is now one of the most widely used for web development and powers sites like Google and YouTube.

What is JavaScript?

500

This version control system is widely used for tracking code changes.


What is Git?

500

This type of attack exploits a system vulnerability before the software vendor has released a fix, making it particularly dangerous and difficult to defend against.

What is a zero-day attack?

500

This unsupervised machine learning algorithm groups data points into a set number of categories by minimizing the distance between points and their assigned center.


What is K-Means?

500

This is a widely used framework for managing complex projects with short, iterative cycles, focusing on delivering continuous value.

What is Scrum?

500

This company developed the first commercially successful graphical web browser, Mosaic, in 1993.

What is Netscape?

M
e
n
u