Programming Languages
Hardware & Networking
Tech History
Cybersecurity
IT Acronyms & Jargon
100

Which of the following is NOT a programming language?
a) JavaScript
b) HTML
c) Python
d) C++
 

b) HTML

100

In computer architecture, what component of the CPU is responsible for fetching, decoding, and executing instructions?

Control Unit (CU)

100

Which company introduced the first-ever smartphone, called Simon, in 1992? 

A) Nokia

B) IBM

C) Motorola

D) Apple

B) IBM

100

What does the acronym VPN stand for?

Virtual Private Network 

VPNs help encrypt internet connections, making them essential for privacy and secure remote access.

100

What do you call the amount of data that can be transmitted over an internet connection in a given time, measured in Mbps or Gbps?

Bandwidth

200

What is the term for a method inside a class that does NOT require an instance of the class to be called?

Static Method

200

What networking protocol is commonly used to assign dynamic IP addresses to devices on a network?

 DHCP (Dynamic Host Configuration Protocol)

200

What was the first commercially available personal computer?  

  • A) IBM PC
  • B) Apple I
  • C) Altair 8800
  • D) Commodore 64

The Altair 8800, released in 1975, is considered the first successful personal computer.

200

Which common cyber attack tricks users into providing sensitive information by pretending to be a trustworthy entity?

Phishing 

Phishing attacks account for over 90% of data breaches. The term comes from ‘fishing,’ as attackers "bait" victims into revealing information.

200

BIOS is firmware that initializes hardware when a computer starts up. Modern computers use UEFI (Unified Extensible Firmware Interface) instead of BIOS for faster boot times and better security. What does the BIOS stand for?

Basic Input/Output System

300

What is the term for a variable that is declared inside a method and exists only during the method execution?

Local Variable

300

What type of memory is used to store the firmware of a computer system, allowing it to remain intact even when the power is off?

ROM (Read-Only Memory)

300

In 2025, Amazon unveiled its first quantum computing chip. What is it called? 

A) Quasar
B) Ocelot
C) QuantumX
D) Nebula

B) Ocelot

Amazon's Ocelot chip aims to reduce the costs of quantum error correction by up to 90%, marking a significant step in quantum computing development.

300

A cyber attack that exploits database vulnerabilities by injecting malicious SQL code.

SQL Injection

300

What do you call the hidden part of the internet that isn’t indexed by search engines, often associated with anonymity and illegal activities but also used for secure communications?

Dark Web

400

What is the name of the built-in C# class that serves as the base class for all exceptions?

System.Exception

400

GPT is an advanced deep-learning model used to understand and generate natural language. What does "GPT" stand for?

GPT stands for Generative Pre-trained Transformer.

400

What company introduced the 'Cybercab' robotaxi, a vehicle with no steering wheel or pedals?

Tesla

400

The CIA Triad is the foundation of cybersecurity and is used by governments, banks, and corporations to protect sensitive data. What does the CIA stand for?

Confidentiality, Integrity, and Availability

400

What technology processes data closer to the source (e.g., IoT devices) rather than relying on centralized cloud servers, improving speed and reducing latency?

Edge Computing

500

Given the expression: a3 = (w * y * z) % 3 * (x / y); What will be the value of a3 when: w = 6, y = 2 ,       z = 4, x = 8?


0

500

As of March 2025, the latest official version of the Android operating system is Android 15. Google released Android 15 to the Android Open Source Project (AOSP) on September 3, 2024.  What is the internal codename for Android 15?

Vanilla Ice Cream

500

Who is the famous tech CEO who dropped out of Harvard before founding a company that revolutionized personal computing?  

Bill Gates

Bill Gates dropped out of Harvard in 1975 to co-found Microsoft with Paul Allen.  

500

What cybersecurity attack targets Internet of Things (IoT) devices to create a botnet?

Mirai Attack 

In 2016, the Mirai botnet caused one of the largest DDoS attacks, temporarily shutting down major websites like Twitter and Netflix.

500

What do you call a set of rules that allows different software applications to communicate with each other?

API (Application Programming Interface)