General CS
Cybersecurity
Coding
IT Infrastructure
Cryptography & Algorithms
100

What should you do first if your computer encounters issues?

A. Cry

B. Buy a new one

C. Call tech support

D. Restart your computer

D. Restart your computer

100

What is 2FA?

A. Too Fancy Algorithm

B. Two-Faced Account

C. Two-Factor Authentication

D. Twice Fast Access

C. Two-Factor Authentication

100

In programming, what is a variable?

A. A box you can never open.

B. Your mood while debugging code.

C. A storage location that holds a value that can change.

D. A math problem you can’t solve.

C. A storage location that holds a value that can change.

100

What is a server?

A. A computer that provides resources, data, or services to other computers.

B. A device that connects two computers directly together.

C. A program that stores files only for personal use.

D. A type of computer that is used only for gaming.

A. A computer that provides resources, data, or services to other computers.

100

A Caesar cipher is a simple encryption method where each letter in a message is shifted a fixed number of places down the alphabet. Using a Caesar cipher with a shift of 4, encrypt the word 'MEET'.

A. IIAA

B. QIIX

C. OIIV

D. QIIT

B. QIIX

200

What does CPU stand for?

A. Computer Performance Unit

B. Control Program Utility

C. Central Processing Unit

D. Core Processing Utility

C. Central Processing Unit

200

What do you call it when hackers trick you into giving away personal information (e.g. links, emails, texts)?

A. Fishing

B. Phishing

C. Hack-and-Snack

D. Identity Guessing

B. Phishing

200

What does a loop do?

A. Runs a program only once and stops.

B. Repeats a set of instructions until a condition is met.

C. Stores information for later use.

D. Connects different pieces of code together.

B. Repeats a set of instructions until a condition is met.

200

What is the cloud?

A. A weather system that interferes with Wi-Fi signals.

B. A folder on your personal computer where backups are kept.

C. A single hard drive used by multiple people in the same office.

D. A network of remote servers that store and manage data over the internet.

D. A network of remote servers that store and manage data over the internet.

200

A Caesar cipher is a simple encryption method where each letter in a message is shifted a fixed number of places down the alphabet. If "SHREK" becomes "YNXKQ", how much is the shift?

A. 5

B. 6

C. 7

D. 8

B. 6

300

What does HTTP stand for?

A. HyperText Transfer Protocol

B. Hyperlink Text Transmission Program

C. HyperTool Transmission Process

D. HyperText Transmission Path

A. HyperText Transfer Protocol

300

What does HTTPS stand for?

A. HyperText Transfer Protocol Secure

B. Hyperlink Text Transfer Service

C. High-Tech Transfer System

D. HyperText Transmission Security

A. HyperText Transfer Protocol Secure

300

In many programming languages, what does == mean?

A. It assigns a value to a variable.

B. It ends a loop.

C. It creates a new function.

D. It checks if two values are equal.

D. It checks if two values are equal.

300

What is a firewall used for?

A. To make your internet run faster.

B. To physically cool down overheated servers.

C. To block unauthorised access and protect your network.

D. To store backups of your files.

C. To block unauthorised access and protect your network.

300

Using Dijkstra’s shortest path algorithm, what is the shortest path from node A to node D in this graph?

A. A → B → D

B. A → C → D 

C. A → D

D. A → B → C → D

A. A → B → D

400

What does USB stand for?

A. Ultimate Storage Backup

B. User System Bridge

C. Unstoppable Super Bit

D. Universal Serial Bus

D. Universal Serial Bus

400

Which of these viruses were invented by a Filo guy?

A. WannaCry

B. Mydoom

C. Melissa

D. ILOVEYOU

D. ILOVEYOU

400

What will this print?:

x = 2

x = 2 + 3

print(x)


A. 5

B. 2

C. 3

D. 2 + 3

A. 5

400

What does IP in IP Address stand for?

A. Internal Process.

B. Internet Protocol.

C. Information Packet.

D. Internet Permission.

B. Internet Protocol.

400

A message was encoded using a reverse alphabet cipher (A -> Z, B -> Y, C -> X). If the message is "HDVVG", what is the decoded word?

A. HELLO

B. WORLD

C. SWEET

D. CELLO

C. SWEET

500

What does the binary number 101 equal in decimal (i.e. 1, 2, 3, 4, 5, etc.)?

A. 10

B. 5

C. 101

D. 30

B. 5

500

What do you call the network that bounces your internet traffic through multiple LAYERS of servers to hide your identity?

A. Virtual Private Network (VPN)

B. Local Area Network (LAN)

C. The Onion Router (TOR)

D. Wide Area Network (WAN)

C. The Onion Router (TOR)

500

What will this print when number = 7?

if number % 2 == 0:

       print("Even")

else:

       print("Odd")

A. Even

B. Odd

C. Neither

D. Both

B. Odd

500

What is load balancing used for?

A. Reducing the workload on a single server.

B. Managing server performance during peak demand.

C. Distributing traffic across multiple servers.

D. Increasing your Wi-Fi signal.

C. Distributing traffic across multiple servers.

500

Using the Bellman-Ford shortest path algorithm, what is the shortest path from node A to node D in this graph?

A. A → C → D 

B. A → B → C → D

C. A → B → D 

D. No path exists

B. A → B → C → D