Computer History
Tech Acronyms
Security Threats
Emerging Technologies
Technology in Movies
100

This individual created a neurotechnology company with the goal of developing brain-computer interfaces? (100)

Who is Elon Musk? 

100

What is the term associated with the ability to communicate with smart devices such as thermostats, refridgerators, cars, televisions, etc. over the internet. (400)


What is Internet of Things

100

Malware named after Greek Mythology. The greeks used a giant wooden horse to hide their soldiers. (200)

What is a Trojan

100

Which phone company and model was the first to introduce facial recognition to their mobile devices? (500)

What is Apple Iphone X? 

100

A sentient computer named HAL 9000 becomes a central character and demonstrates the potential dangers of AI. What is this film? (200)

What is "2001: A Space Odyssey"

200

This major computer company that we use today files for its first ever U.S patent in 1907 for a punchcard system? (400)

What is IBM?

200

What is data that can be used to identify a specific individual (name, birth date, social security number etc.)? (100)

Personally Identifiable Information

200

What type of social engineering attack involves sending fradulent emails to trick individuals into revealing sensitive information (100)

What is phishing

200

What is the name of the decentralized, blockchain-based platform for developing smart contracts and decentralized applications? (300)


What is Ethereum?

200

This film follows a computer hacker who learns that the reality he knows is a simulation created by machines to enslave humans, to use them as an energy source; such as a battery.  What is the name of this film. ? (100)


What is "The Matrix?"


300

The origin of the term can be traced back to September 9, 1947, when a team of computer scientists and engineers reported the world’s first computer _______? (200)

What is Computer Bug 

300

What security measure enhances account protection by requiring users to provide multiple forms of verification?(200)

What is Multi-factor authentication?


300

This type of malicious software can lock you computer's files and demand a ransom to unlock them. What is it called? (300)

What is ransomware?

300

What is the terms for the fundamental unit of quantum information, analogous to a classical bit? (200)

What is "qubit"?

300

A lonely protagonist who develops a romantic relationship with the world's first advertised AI consciousness. (400)

What is "Her"?

400

In what year was the first iphone released, revolutionizing the world of mobile technology? (300)

What is 2007? 

400

What is the name of the security protocol that uses encrypted communication seen in websites?(300)

HTTPS - Hypertext Transfer Protocol Secure


400

What is a term for a cyberattack that floods a network or website with traffic, causing it to become slow or unavailable to users? (400)

What is DoS

400

What company, known for its advanced and lifelike robots like Spot and Atlas, is a leader in the field of robotics and automation? (400)


What is "Boston Dynamics"?

400

A young programmer is invited to administer a turing test to an advanced AI android, leading to a series of thought-provoking ethical dilemmas. (500)

What is Ex machina?

500

What is the name of the German cypher machines used in WWII? (500)

What is The Enigma? 

500

The set of rules and protocols that allow different software applications to communicate with each other (500) 

What is API?

500

What is the term for the act of trying various username and combinations to gain unauthorized access to an account?

What is a brute force attack? 

500

This is something you purchase and own as a one-of-a-kind digital art represented by a unique token? (100)

what is NFT? 

500

In this movie, this character uses garbage, such banana peels/soda cans/etc. to fuel his car, in which he can then travel to any timeline he wants. (300)

What is "Back to the Future?"