What does SQL stand for?
Structured Query Language
What is the main goal of business intelligence?
To support better business decision-making using data
What does SDLC stand for?
Systems Development Life Cycle
What does VPN stand for?
Virtual Private Network
Who plays Captain Jack Sparrow in the Pirates of the Caribbean series?
Johnny Depp
In a database, what is a “primary key”?
A unique identifier for each record
What does KPI stand for?
Key Performance Indicator
In Agile, what is a “sprint”?
A short development cycle (usually 1–4 weeks)
What is the purpose of multi-factor authentication (MFA)?
To add extra layers of security beyond a password
What sporting event has a strict dress code of all white?
Wimbledon
What type of database is structured in tables with rows and columns?
Relational database
What is data visualization used for?
To present data visually (charts, dashboards)
What is the main benefit of modular programming?
Easier maintenance, reuse, and scalability
An attacker tricks an employee into clicking a fake login link. What type of attack is this?
Phishing
What is the most sold game of all time?
Minecraft
What does a “JOIN” operation do in SQL?
Combines data from multiple tables based on a related column
What is the difference between descriptive and predictive analytics?
Descriptive analyzes past data; predictive forecasts future outcomes
A system frequently changes requirements. Which methodology is the most suitable?
Agile
What is the principle of least privilege?
Users only gain access needed for their task
What company was initially known as "Blue Ribbon Sports"?
Nike
What is the difference between a data warehouse and a transactional database?
Data warehouse = stores historical data for analysis transactional database = handles real-time operations
A company optimizes pricing using real-time data and models. What type of analytics is this?
Prescriptive analytics
What is the difference between functional and non-functional requirements?
Functional = what the system does
Non-functional = How a system operates
What type of attack involves overwhelming a server with traffic to make it unavailable?
Distributed Denial-of-Service (DDoS) attack
What is a group of pandas known as?
An embarrassment