Computer Science
Cybersecurity
Code
Songs
Movies
100

Who was the first programmer?

Who is Ada Lovelace?

100

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

Who are hackers?

100

7%2

What is 1?

100

What artist accepted an award in a raw meat outfit?

Who is Lady Gaga?

100

Name that movie! "Life was like a box of chocolates. You never know what you're gonna get."

What is Forrest Gump?

200

The act of doing something over and over again.

What is looping?

200

A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. They can have helpers or add-on functions incorporated by using interpreters to read the additional instructions and provide different web content types. Internet Explorer, Firefox and Safari are examples of these.

What is a web browser?

200

string i = "a";

int j = 3;

System.out.println( i + j );

What is a3?

200

Who is the iconic band that sings "Dancing Queen"?

Who is ABBA?

200

Name that movie! "Honey, where's my super suit?"

What is The Incredibles?

300

Programs or "rewards" that only run when certain parameters are met.

What are conditionals?

300

Passwords illegally collected through fake login page.

What is Login spoofing?

300

30-50% of all data loss due to the people already within the organization.

What is Insider Threat?

300

What artist sings "Hollaback Girls"?

Who is Gwen Stefani?

300

Name that movie! "Nobody puts baby in the corner"

What is Dirty Dancing?

400

Java, ColdFusion, C++, KASSHYK, Perl, Ruby, Scala. Which language is made up?

What is KASSHYK?

400

Automated software that plugs in common passwords.

What is Dictionary attacks?

400

Finish the Lyric: "Stop calling, stop callin..."

What is "I don't want to talk anymore"?

400

How many Harry Potter movies are there?

What is 8?

500

Two patterns that make up the binary system.

What are 1 and 0?

500

The weakest link in every computer system. The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.

Who are you?

500

Who is featured on Justin Bieber's "Beauty and a Beat" hit song?

Who is Nicki Minaj?

500

What is Alice Cullens vampire power in the Twilight Saga?

What is the ability to see the future?
M
e
n
u