Connectors
Systems
Malicious Software
History 1
History 2
100

What category does the following word belong to?

- subsequently

time

100

Which system only uses 2 digits?

Binary System

100

How do you call the distorted letters and characters that users of an email or social-networking account are required to type to complete certain online forms?

Captchas

100

What is the name of the device for counting with beads that the Chinese invented around 2500 years ago?

Abacus

100

Which company was founded by Noyce and unveiled the microprocessor?

Intel

200

What category does the following word belong to?

- hence

result

200

What is the name of the system in which one counts by the tens?

Decimal System

200

How do you call a robust distributed program that invades workstations on a network and spreads by replications?

Worm

200

Who is considered to be the first computer programmer?

Ada of Lovelace - Augusta Ada Byron

200

Who invented an automatic device in 1642 that could add or subtract?

Blaise Pascal

300

What category does the following word belong to?

- whereas

contrast

300

What is the name of the system which provides mathematical methods and computation for protecting our online privacy and security?

Cryptography

300

How do you call a destructive program which is activated by a certain date?

Logic Bomb

300

Who developed a system of mathematical logic that solves problems with questions requiring only an answer of true or false and has 3 logical functions called AND, OR, NOT?

George Boole

300

Who was the first man to conceptualize a true computer in the 19th century that could do more than just calculate?

Charles Babbage

400

What category does the following word belong to?

- i.e.

explanation

400

What system entails sending data anonymously by using a procedure in which the data as well as the route it is to take are wrapped in multiple layers of encryption?

Onion Wrapping or Anonymous Channels

400

How do you call any bug inserted into a computer program that takes advantage of the trusted status of its host by secretly performing unintended functions?

Trojan Horse

400

Who suggested linking the computers at ARPA electronically so that investigators doing similar work in different parts of the country could share resources?

Robert Taylor

400

Who developed a machine that could do calculations over telephone wires and was the first display of remote data processing?

George Stibitz