The Internet
Gaming Evolution
Computer Science
Cybersecurity
Emerging Technology
100

What is the term for a malicious software designed to disrupt or damage systems?

What is malware?

100

This classic arcade game features a yellow character who eats dots while avoiding ghosts.

What is Pac-Man?

100

This coding language is primarily used for creating web pages.

What is HTML?

100

This type of malware encrypts a victim's files and demands payment for the decryption key.

What is ransomware?

100

This technology involves creating machines that can think and learn like humans.

What is artificial intelligence?

200

What type of attack overwhelms a server with traffic to disrupt services?

What is a DDoS attack (Distributed Denial of Service)?

200

This gaming console, released in the 1980s, popularized home video gaming.

What is the Nintendo Entertainment System (NES)?

200

This foundational concept in computer science describes a step-by-step procedure for solving a problem or completing a task.

What is an algorithm?

200

This security measure involves using two different methods to verify a user’s identity.

What is two-factor authentication?

200

This technology allows for the creation of digital currencies that operate on decentralized networks.

What is blockchain?

300

What is the term for a digital footprint created by online activities?

What is your online presence?

300

This genre of games features complex narratives and character development

What is role-playing games (RPGs)?

300

A set of rules governs how data is transmitted over a network.

What is a protocol?

300

This term describes a network of compromised computers controlled by a malicious actor.

What is a botnet?

300

This futuristic concept aims to integrate human brains with computer systems for enhanced capabilities.

What is brain-computer interface (BCI)?

400

This term refers to the process of optimizing a website to rank higher in search engine results.

What is search engine optimization (SEO)?

400

This company is known for producing the gaming franchise that includes "Call of Duty."

What is Activision?

400

This algorithmic process enables machines to learn from data without explicit programming.

What is machine learning?

400

This practice involves testing a system for vulnerabilities to improve its security.

What is penetration testing?

400

This technology uses algorithms to analyze large data sets and is essential for making predictions in various fields.

What is big data analytics?

500

This protocol is used for transferring files over the internet.  

What is FTP (File Transfer Protocol)?

500

This technology allows players to immerse themselves in a simulated environment using specialized headsets.

What is virtual reality (VR)?

500

This protocol is commonly used for communication in IoT devices, allowing them to connect and share data efficiently.

What is MQTT (Message Queuing Telemetry Transport)?

500

This malicious software is designed to gain unauthorized access to a system, often for the purpose of stealing sensitive information.

What is a Trojan horse?

500

This form of technology combines the physical and digital worlds, allowing users to interact with virtual elements in real time.

What is augmented reality (AR)?