What should you do first if your computer encounters issues?
A. Cry
B. Buy a new one
C. Call tech support
D. Restart your computer
D. Restart your computer
What is 2FA?
A. Too Fancy Algorithm
B. Two-Faced Account
C. Two-Factor Authentication
D. Twice Fast Access
C. Two-Factor Authentication
In programming, what is a variable?
A. A box you can never open.
B. Your mood while debugging code.
C. A storage location that holds a value that can change.
D. A math problem you can’t solve.
C. A storage location that holds a value that can change.
What is a server?
A. A computer that provides resources, data, or services to other computers.
B. A device that connects two computers directly together.
C. A program that stores files only for personal use.
D. A type of computer that is used only for gaming.
A. A computer that provides resources, data, or services to other computers.
A Caesar cipher is a simple encryption method where each letter in a message is shifted a fixed number of places down the alphabet. Using a Caesar cipher with a shift of 4, encrypt the word 'MEET'.
A. IIAA
B. QIIX
C. OIIV
D. QIIT
B. QIIX
What does CPU stand for?
A. Computer Performance Unit
B. Control Program Utility
C. Central Processing Unit
D. Core Processing Utility
C. Central Processing Unit
What do you call it when hackers trick you into giving away personal information (e.g. links, emails, texts)?
A. Fishing
B. Phishing
C. Hack-and-Snack
D. Identity Guessing
B. Phishing
What does a loop do?
A. Runs a program only once and stops.
B. Repeats a set of instructions until a condition is met.
C. Stores information for later use.
D. Connects different pieces of code together.
B. Repeats a set of instructions until a condition is met.
What is the cloud?
A. A weather system that interferes with Wi-Fi signals.
B. A folder on your personal computer where backups are kept.
C. A single hard drive used by multiple people in the same office.
D. A network of remote servers that store and manage data over the internet.
D. A network of remote servers that store and manage data over the internet.
A Caesar cipher is a simple encryption method where each letter in a message is shifted a fixed number of places down the alphabet. If "SHREK" becomes "YNXKQ", how much is the shift?
A. 5
B. 6
C. 7
D. 8
B. 6
What does HTTP stand for?
A. HyperText Transfer Protocol
B. Hyperlink Text Transmission Program
C. HyperTool Transmission Process
D. HyperText Transmission Path
A. HyperText Transfer Protocol
What does HTTPS stand for?
A. HyperText Transfer Protocol Secure
B. Hyperlink Text Transfer Service
C. High-Tech Transfer System
D. HyperText Transmission Security
A. HyperText Transfer Protocol Secure
In many programming languages, what does == mean?
A. It assigns a value to a variable.
B. It ends a loop.
C. It creates a new function.
D. It checks if two values are equal.
D. It checks if two values are equal.
What is a firewall used for?
A. To make your internet run faster.
B. To physically cool down overheated servers.
C. To block unauthorised access and protect your network.
D. To store backups of your files.
C. To block unauthorised access and protect your network.
Using Dijkstra’s shortest path algorithm, what is the shortest path from node A to node D in this graph?
A. A → B → D
B. A → C → D
C. A → D
D. A → B → C → D
A. A → B → D
What does USB stand for?
A. Ultimate Storage Backup
B. User System Bridge
C. Unstoppable Super Bit
D. Universal Serial Bus
D. Universal Serial Bus
Which of these viruses were invented by a Filo guy?
A. WannaCry
B. Mydoom
C. Melissa
D. ILOVEYOU
D. ILOVEYOU
What will this print?:
x = 2
x = 2 + 3
print(x)
A. 5
B. 2
C. 3
D. 2 + 3
A. 5
What does IP in IP Address stand for?
A. Internal Process.
B. Internet Protocol.
C. Information Packet.
D. Internet Permission.
B. Internet Protocol.
A message was encoded using a reverse alphabet cipher (A -> Z, B -> Y, C -> X). If the message is "HDVVG", what is the decoded word?
A. HELLO
B. WORLD
C. SWEET
D. CELLO
C. SWEET
What does the binary number 101 equal in decimal (i.e. 1, 2, 3, 4, 5, etc.)?
A. 10
B. 5
C. 101
D. 30
B. 5
What do you call the network that bounces your internet traffic through multiple LAYERS of servers to hide your identity?
A. Virtual Private Network (VPN)
B. Local Area Network (LAN)
C. The Onion Router (TOR)
D. Wide Area Network (WAN)
C. The Onion Router (TOR)
What will this print when number = 7?
if number % 2 == 0:
print("Even")
else:
print("Odd")
A. Even
B. Odd
C. Neither
D. Both
B. Odd
What is load balancing used for?
A. Reducing the workload on a single server.
B. Managing server performance during peak demand.
C. Distributing traffic across multiple servers.
D. Increasing your Wi-Fi signal.
C. Distributing traffic across multiple servers.
Using the Bellman-Ford shortest path algorithm, what is the shortest path from node A to node D in this graph?
A. A → C → D
B. A → B → C → D
C. A → B → D
D. No path exists
B. A → B → C → D