Tech History
Gadgets & Devices
Software & Internet
Cybersecurity
Feminism & Technology
100

Who is credited with inventing the World Wide Web?

Tim Berners-Lee

100

Which company created the Kindle e-reader?

Amazon

100

What does “URL” stand for?

Uniform Resource Locator

100

What is the term for a program that steals personal information?

Malware

100

Who was the first computer programmer, a woman in the 1800s?

Ada Lovelace

200

In what year was the first iPhone released?

2007

200

What is the main function of a GPU?

Graphics processing / rendering images

200

What is the most popular operating system for smartphones?

Android

200

What does “VPN” stand for?

Virtual Private Network

200

What organization is known for advocating for women in tech?

Women Who Code (or Girls Who Code)

300

Who is considered the “father of computing” for his work on the Analytical Engine?

Charles Babbage

300

Which device is primarily used for measuring steps, heart rate, and activity?

Fitness tracker / smartwatch

300

What programming language is known as the backbone of web development?

JavaScript

300

Which common password is considered the least secure?

123456 (or “password”)

300

What is a “gender gap” in technology?

The underrepresentation of women in tech jobs and education

400

What was the first commercially successful personal computer?

Apple II

400

What technology allows wireless charging of devices like phones and smartwatches?

Inductive charging

400

What year was Facebook founded?

2004

400

What is phishing?

Tricking someone into giving personal info via fake emails or websites 

400

Which programming language was originally developed by a woman named Grace Hopper?

COBOL

500

What year was Google founded?

1998

500

The Raspberry Pi is primarily used as what type of device?

A mini-computer / learning computer

500

What does “open-source software” mean?

Software whose source code is freely available for anyone to use, modify, and share

500

What is two-factor authentication (2FA) used for?

Extra security for accounts by requiring two forms of verification

500

Who led the creation of the ENIAC programming team, one of the first computer programs?

The “ENIAC women”: Kay McNulty, Betty Jennings, Betty Snyder, Marlyn Wescoff, Fran Bilas, Ruth Lichterman