You are on page 1of 3

Information Technology MARVIN MINSKY

EASY 7. ______________is characterized by abusers repeatedly


1. As of July 2015, what number Windows became the most sending an identical email message to a particular address
recent version of Windows for personal computers? EMAIL BOMBING
10

2. What country has the two letter domain name 'cn'? 8. What gave rise to the 'second generation' of computers by
CHINA replacing vacuum tubes in computer designs?
TRANSISTORS
3. In computing there are 8 bits to a byte, what are 4 bits
called? 9. Who is known as the Father of Internet?
NIBBLE VINT CERF

4. What is Spam related to e-mails? 10. A______________ contains specific rules and words that
UNSOLICITED/UNWANTED EMAIL express the logical steps of an algorithm
SYNTAX
5. What is the capacity of a standard PC floppy?
a. 1. 2MB
b. 1.44K DIFFICULT
c. 1.44MB 1. What name was given to the series of computers used by
d. 120MB British codebreakers in World War Two to break the Lorenz
cipher?
6. Founder of the social networking website 'Facebook'. Give COLOSSUS
his full name
MARK ELLIOT ZUCKERBERG 2. What frequency range is the High Frequency band?

7. "Stored Program Concept" is postulated by: a. 100 kHz


JOHN VON NEUMANN b. 1 GHz
c. 30 to 300 MHz
8. What does the 'F' stand for in the acronym FORTRAN? d. 3 to 30 MHz
FORMULA
3. What is the binary equivalent of 29?
9. A device that connects to a computer network without the 10110
use of cables is said to be:
WIRELESS 4. What type of attack do hackers use to gain information from
10. " Don't be evil" is The Tagline Of? you without the use of specialized computer programs?
GOOGLE SOCIAL ENGINEERING

5. McAfee, the internet security company, became a subsidiary


AVERAGE of which of these in 2011?
1. When is Computer Literacy Day? a. Intel
DECEMBER 2 b. Microsoft
c. Dell
2. Who Is The Author Of "Weaving The Web"? d. IBM
TIM BERNERS-LEE
6. In the early 1990s, users were advised not to run their PCs
3. Which general-purpose high-level programming language on March 6, the activation date for a dormant computer virus.
was created by Guido van Rossum in the Netherlands? This virus came to be named after which famous Renaissance
PYTHON artist born on March 6?
MICHELANGELO
4. '.INI' extension refers usually to what kind of file?
SYSTEM FILE 7. In May 2000 this worm, which shares a name with a Disney
film, spread through e-mail. What was one of its names?
5. Why is the domain Symbolics.com famous? I LOVE YOU
FIRST DOMAIN NAME (March 5, 1985)
8. The Stuxnet worm, discovered in June 2010, primarily
6. Who is considered to be The Father of Artificial Intelligence? attacked computer systems in which country?
IRAN BROADWELL – New architecture of the new Intel processor
PASCAL – New Architecture of the New Nvidia GPU or 10’s
9. In February 2001, which tennis star was the supposed series
subject of an e-mail attachment which actually carried a virus? POLARIS – New Architecture of the new AMD Radeo RX480
FREDRIK IDESTAM, LEO MECHELIN – Founders of Nokia
a. Anna Kournikova POKEMON GO – developer: Niantic, Inc.; publisher: The
b. Maria Sharapova Pokemon Company; initial release date: July 6, 2016
c. Serena Williams (Australia, New Zealand, US); Genre: Augmented Reality
d. Jennifer Capriati LASER - Light Amplification by Stimulated Emission of
Radiation
10. In July 2001 the Code Red worm caused affected web sites MICROSOFT AUGMENTED REALITY – AR
to display which phrase? VR: HTC Vile VR, Oculus Rift, Google Cardboard (VR)
QUALCOMM – Mobile CPU
a. Hacked by Chinese! QUALCOMM SNAPDRAGON – GPU
b. Infection in progress! GPS – Global Positioning System
c. You've been schooled! ISP – Internet Service Provider
d. Gremlins got you! TELSTRA – Australia's largest telecommunications and media
company
CLINCHER GOOGLE GLASS – developed by Google X; Augmented Reality
1. Yes or No. In Microsoft Excel '97, if I hit CTRL+B in a cell LTE – Long-Term Evolution
before typing in it, the resultant type would be bold. PHYSX - a proprietary realtime physics engine middleware
YES SDK. PhysX was authored at NovodeX, an ETH Zurich spin-off.
In 2004 NovodeX was acquired by Ageia, and in February 2008
2. What does SAN stand for? Ageia was acquired by Nvidia.
STORAGE AREA NETWORK ALAN TURING – AI
BJARNE STROUSTRUP – C++
3. In 1984, Apple Computer kicked off its campaign for the CHARLES BABBAGE – Difference Engine and Analytical
Macintosh computer in a $1.5 million Super Bowl ad. What was Engine, two punched-card controlled general purpose
the name of the $10,000 flop the Mac replaced? calculators
LISA GORDON MOORE – Intel
GEORGE BOOLE, ROBERT NOYCE – modern symbolic logic
4. What type of memory is used to temporarily store MARC ANDREESSEN – Netscape
information that the computer is currently working with? SHAWN FANNING – Napster
RAM CHARLES GOLDFARB – SGML
LINUS TORVALDS – Linux OS
5. True or False. In 1997, a computer named Deep Purple beat KONRAD ZUSE – first binary digit Z1
chess wizard Garry Kasparov. LARRY PAGE, SERGEY BRIN - GOOGLE
TRUE MARK ELLIOT ZUCKERBERG – FACEBOOK
STEVE JOBS, RONALD WAYNE, STEVE WOZNIAK – APPLE
6. This software programs' main function is typically to enable BILL GATES, PAUL ALLEN - MICROSOFT
an attacker to have a complete control of their victim's PC ADA LOVELACE – COMPUTER PROG MOTHER
TROJAN JERRY SANDERS - ADVANCED MICRO DEVICES (AMD)
LARRY ELLISON - ORACLE
7. What are the first six (6) letters that appear on the - AMERICA ONLINE
traditional computer keyboard? TED NELSON – FATHER OF HYPEETEXT
QWERTY RASMUS LERDORF – PHP
PHIL ZIMMERMANN – PGP/Pretty Good Privacy: data
8. What is the general term given for keys such as ALT, SHIFT, encryption and decryption computer program that provides
or CTRL? cryptographic privacy and authentication for data
MODIFIER KEYS communication
JAMES GOSLING – JAVA
9. What is the term used for a method of capturing and FRED COHEN – coined ‘virus’
recording a person's keystrokes when typing on a keyboard? HISTORY
KEY LOGGING 1st Gen (1937-1946)
ABC (Atanasoff Berry Computer) – 1937, 1st electronic digital
10. What network operating system is Solaris a version of? computer by Dr. John V. Atanasoff and Clifford Berry
UNIX Colossus – electronic computer built for the military
ENIAC (Electronic Numerical Integrator and Computer) –
1946, first general-purpose digital computer
2nd Gen (1947-1962)
UNIVAC 1 (Universal Automatic Computer) – first computer
for commercial use, 1951
IBM (International Business Machine) 650 and 700 – 1953
3rd Gen (1963-Present)
Integrated circuit – invented
MS-DOS (Microsoft Disk Operating System) – 1980
PERSONAL COMPUTER (PC) – 1981, IBM
ABACUS – mathematical equations
PASCALINE – 1642, Blaise Pascal
JACQUARD’S LOOM – Joseph Marie Jacquard
DIFFERENCE ENGINE AND ANALYTIC ENGINE – Charles
Babbage 1822
ADA BYRON LOVELACE – mother of computer programming
COBOL – Rear Admiral Grace Hopper
The first hard disk drive was created in 1979 by Seagate. Its
capacity was a whopping (not) 5 MB.
“The Dirty Dozen” – codename of the 12 engineers at IBM that
developed the IBM PC
Intel 4004 – first microprocessor
Shakuntala Devi - Human computer
WIKI – What I Know Is
RICHARD MATHEW STALMAN – Open source program
DOUGLAS ENGELBART – computer mouse
CHRISTOPHER SHOLES - QWERTY type keyboard
JAMES RUSSELL - COMPACT DISC (CD)
VINT CERF – Father of Internet
TIM BERNERS-LEE - Father of WWW
PARAM – Super computer, India
ASCII - American Standard Code for Information Interchange
ALAN CURTIS KAY – GUI
INTERNET BACKBONE - main routes that data travels over the
internet

You might also like