What is called the brain of the computer?
Central Processing Unit (or CPU)
What is the most popular coding language?
Python
Should you wander in the corridors?
No.
What is commonly used as a computer pointing device?
Mouse
This protocol is used to load web pages.
HTTP.
This cybersecurity attack tries many passwords very quickly.
Brute force attack.
How much time do you have to present?
4 to 5 minutes.
I’m everywhere but take up no space.
You can share me, but still keep me.
What am I?
Information
What coding language anchors JavaScript to create an interactive website?
HTML
This term describes a named storage location that holds a value in a program.
Variable.
What is the full name of every single volunteer here?
Free points :)
I can be cracked, I can be strong,
I protect secrets all day long.
I’m not a lock, but I guard the door.
What am I?
Password
This software is designed to harm or spy on computers.
Malware.
This famous test determines whether a machine can act like a human.
Turing Test.
What time is lunch?
13:00
I have keys but no locks. I have space but no room. You can enter, but you can't go inside. What am I?
A keyboard.
What is bigger than a bit, but smaller than a byte.
Nibble.
This protocol translates domain names into IP addresses.
What time are the presentations?
15:00
In the game "Chess", what is the name of the famous AI system developed by IBM that defeated world champion Garry Kasparov in 1997?
Alpha Zero.