Tech Trivia
• Standardquestion and answer round.
• Each team gets asked one question per cycle.
• The round runs for 3 full cycles, so every team answers 3 questions
in total.
• Questions will be asked in a fixed order, and no passing is allowed.
• Teams have 1 minute to answer each question.
7.
What is themain purpose of an Operating System?
A
:
It allows users to watch
videos.
D:
It runs antivirus
programs.
B:
It manages hardware
and software resources.
C:
It connects computer to
the internet.
8.
What is themain purpose of an Operating System?
A
:
It allows users to watch
videos.
D:
It runs antivirus
programs.
B:
It manages hardware
and software resources.
C:
It connects computer to
the internet.
9.
Which one ofthe following is a search engine, not a browser or
app?
A
:
Mozilla Firebox
D: Bing
B: Safari
C: Tiktok
10.
Which one ofthe following is a search engine, not a browser or
app?
A
:
Mozilla Firebox
D: Bing
B: Safari
C: Tiktok
11.
Which of thefollowing is not a mobile operating system?
A
:
Android
D: HarmonyOS
B: iOS
C: Windows 10
12.
Which of thefollowing is not a mobile operating system?
A
:
Android
D: HarmonyOS
B: iOS
C: Windows 10
13.
Which file typeis commonly used for data analysis and
calculations?
A
:
.docx
D: .xlsx
B: .pptx
C: .mp4
14.
Which file typeis commonly used for data analysis and
calculations?
A
:
.docx
D: .xlsx
B: .pptx
C: .mp4
15.
What does HTTPSensure while browsing websites?
A
:
Faster page load
D: Advertisement blocking
B: Better graphics
C:
Secure data transfer
using encryption
16.
What does HTTPSensure while browsing websites?
A
:
Faster page load
D: Advertisement blocking
B: Better graphics
C:
Secure data transfer
using encryption
17.
What is theprimary feature of a spreadsheet software like MS
Excel?
A
:
Organizing data in rows
and columns with formulas
D: Writing paragraphs
B: Playing multimedia
C
:
Creating resumes
18.
What is theprimary feature of a spreadsheet software like MS
Excel?
A
:
Organizing data in rows
and columns with formulas
D: Writing paragraphs
B: Playing multimedia
C
:
Creating resumes
19.
Which platform offersonline shopping and operates as an e-
commerce business?
A
:
Daraz
D: Paint
B: Quora
C: Google meet
20.
Which platform offersonline shopping and operates as an e-
commerce business?
A
:
Daraz
D: Paint
B: Quora
C: Google meet
21.
Which of thesefile types is best suited for sharing
presentations?
A
:
.docx
D: .exe
B: .pptx
C: .xlsx
22.
Which of thesefile types is best suited for sharing
presentations?
A
:
.docx
D: .exe
B: .pptx
C: .xlsx
23.
What is phishingin terms of cyber security?
A
:
An email scam trying to trick
users into giving sensitive info
D: Uploading large files
B:
A way to clean virus
from a PC
C:
A method of password
creation
24.
What is phishingin terms of cyber security?
A
:
An email scam trying to trick
users into giving sensitive info
D: Uploading large files
B:
A way to clean virus
from a PC
C:
A method of password
creation
25.
Which key shortcutis used to rename a file or folder in
Windows?
A
:
Ctrl + R
D: Ctrl + Shift + R
B: Alt + F2
C: F2
26.
Which key shortcutis used to rename a file or folder in
Windows?
A
:
Ctrl + R
D: Ctrl + Shift + R
B: Alt + F2
C: F2
27.
What does GUIhelp users do?
A
:
Connect to the cloud
D: Write software code
B: Interact with computer using
icons and visual elements
C:
Type in commands
only
28.
A
:
Connect to thecloud
D: Write software code
B:
Interact with computer using
icons and visual elements
C:
Type in commands
only
What does GUI help users do?
29.
What is themain role of a browser?
A
:
Installing apps
D: Formatting documents
B: Controlling the OS
C:
Accessing and viewing
web pages
30.
What is themain role of a browser?
A
:
Installing apps
D: Formatting documents
B: Controlling the OS
C:
Accessing and viewing
web pages
31.
What is themain use of a firewall in a network?
A
:
Boost Wi-Fi speed
D:
Block unauthorized
access and protect data
B: Delete viruses
C: Store passwords
32.
What is themain use of a firewall in a network?
A
:
Boost Wi-Fi speed
D:
Block unauthorized
access and protect data
B: Delete viruses
C: Store passwords
33.
Which keyboard shortcutis used to open Task Manager
directly?
A
:
Ctrl + Shift + Esc
D: Ctrl + Alt + Del
B: Ctrl + T
C: Alt + Esc
34.
Which keyboard shortcutis used to open Task Manager
directly?
A
:
Ctrl + Shift + Esc
D: Ctrl + Alt + Del
B: Ctrl + T
C: Alt + Esc
35.
What is bandwidthin internet terms?
A
:
Number of devices on
Wi-Fi
D:
Maximum data transfer
rate of a network
B: File size limit
C: Quality of graphics
36.
What is bandwidthin internet terms?
A
:
Number of devices on
Wi-Fi
D:
Maximum data transfer
rate of a network
B: File size limit
C: Quality of graphics
37.
Which of thefollowing is a cloud storage service?
A
:
VLC Media Player
D: OBS Studio
B: OneDrive
C: VS Code
38.
Which of thefollowing is a cloud storage service?
A
:
VLC Media Player
D: OBS Studio
B: OneDrive
C: VS Code
39.
Which file extensionis used for compressed files?
A
:
.zip
D: .mp3
B: .pdf
C: .docx
40.
Which file extensionis used for compressed files?
A
:
.zip
D: .mp3
B: .pdf
C: .docx
41.
Which one ofthese file types is most suitable for non-editable
document sharing?
A
:
.xlsx
D: .pdf
B: .docx
C: .pptx
42.
Which one ofthese file types is most suitable for non-editable
document sharing?
A
:
.xlsx
D: .pdf
B: .docx
C: .pptx
43.
What is encryptionmainly used for?
A
:
Making data smaller
D: Making websites
B: Locking the screen
C:
Converting data into a secure
code to prevent access
44.
What is encryptionmainly used for?
A
:
Making data smaller
D: Making websites
B: Locking the screen
C:
Converting data into a secure
code to prevent access
45.
Which key combinationis used to undo the last action in most
applications?
A
:
Ctrl + Y
D: Ctrl + A
B: Ctrl + Z
C: Ctrl + X
46.
Which key combinationis used to undo the last action in most
applications?
A
:
Ctrl + Y
D: Ctrl + A
B: Ctrl + Z
C: Ctrl + X
47.
What type ofsoftware is Microsoft Word?
A
:
Word Processing
software
D: Operating system
B: Spreadsheet software
C: Presentation software
48.
What type ofsoftware is Microsoft Word?
A
:
Word Processing
software
D: Operating system
B: Spreadsheet software
C: Presentation software
49.
What does URLstand for?
A
:
Unique Resource Link
D: User Readable Link
B:
Uniform Resource
Locator
C: Universal Routing Line
50.
What does URLstand for?
A
:
Unique Resource Link
D: User Readable Link
B:
Uniform Resource
Locator
C: Universal Routing Line
51.
Which of thefollowing is an example of system software?
A
:
MS Paint
D: Windows 11
B: Antivirus
C: Google Chrome
52.
Which of thefollowing is an example of system software?
A
:
MS Paint
D: Windows 11
B: Antivirus
C: Google Chrome
53.
Which key shortcutis used to find text within a document?
A
:
Ctrl + A
D: Ctrl + P
B: Ctrl + F
C: Ctrl + S
54.
Which key shortcutis used to find text within a document?
A
:
Ctrl + A
D: Ctrl + P
B: Ctrl + F
C: Ctrl + S
55.
Which of thefollowing file extensions is associated with audio
files?
A
:
.png
D: .html
B: .txt
C: .mp3
56.
Which of thefollowing file extensions is associated with audio
files?
A
:
.png
D: .html
B: .txt
C: .mp3
57.
What is thefunction of a hyperlink in a web page?
A
:
Makes text bold
D:
Connects to another
location or webpage
B: Adds animation
C: Highlights text
58.
What is thefunction of a hyperlink in a web page?
A
:
Makes text bold
D:
Connects to another
location or webpage
B: Adds animation
C: Highlights text
59.
Which device allowsyou to input text into a computer?
A
:
Monitor
D: Printer
B: Keyboard
C: Mouse
60.
Which device allowsyou to input text into a computer?
A
:
Monitor
D: Printer
B: Keyboard
C: Mouse
61.
What does the"refresh" button in a browser do?
A
:
Closes the browser
D: Zooms the page
B:
Reloads the current
page
C: Opens history
62.
What does the"refresh" button in a browser do?
A
:
Closes the browser
D: Zooms the page
B:
Reloads the current
page
C: Opens history
63.
Which of thefollowing is an online video conferencing tool?
A
:
Excel
D: Notepad
B: Google Meet
C: Powerpoint
64.
Which of thefollowing is an online video conferencing tool?
A
:
Excel
D: Notepad
B: Google Meet
C: Powerpoint
65.
Which one isa valid email address?
A
:
email@website
D: email#domain.com
B: email@domain.com
C: www.email.com
66.
Which one isa valid email address?
A
:
email@website
D: email#domain.com
B: email@domain.com
C: www.email.com
67.
Which of thefollowing is not a search engine?
A
:
Google
D: DuckDuckGo
B: Yahoo
C: Youtube
68.
Which of thefollowing is not a search engine?
A
:
Google
D: DuckDuckGo
B: Yahoo
C: Youtube
69.
Which of theseis an output device?
A
:
Monitor
D: Keynoard
B: Scanner
C: Mouse
70.
Which of theseis an output device?
A
:
Monitor
D: Keyboard
B: Scanner
C: Mouse
71.
What is thepurpose of a password?
A
:
To connect to the
internet
D: To speed up browsing
B:
To provide user
security
C: To store files
72.
What is thepurpose of a password?
A
:
To connect to the
internet
D: To speed up browsing
B:
To provide user
security
C: To store files
73.
Which of thefollowing is not an image file format?
A
:
.jpg
D: .png
B: .gif
C: .pdf
74.
Which of thefollowing is not an image file format?
A
:
.jpg
D: .png
B: .gif
C: .pdf
75.
Which part ofa computer stores data permanently?
A
:
RAM
D: Cache
B: Hard Disk
C: ROM
76.
Which part ofa computer stores data permanently?
A
:
RAM
D: Cache
B: Hard Disk
C: ROM
77.
What does theshortcut Ctrl + S do?
A
:
Selects all text
D: Start a new page
B: Save the document
C:
Searches the
document
78.
What does theshortcut Ctrl + S do?
A
:
Selects all text
D: Start a new page
B: Save the document
C:
Searches the
document
79.
What is theterm for malicious software designed to harm your
system?
A
:
Malware
D: Hardware
B: Driver
C: Shareware
80.
What is theterm for malicious software designed to harm your
system?
A
:
Malware
D: Hardware
B: Driver
C: Shareware
81.
Which of thesedevices is used to capture photos or videos into
a computer?
A
:
Monitor
D: Webcam
B: Speaker
C: Mouse
82.
Which of thesedevices is used to capture photos or videos into
a computer?
A
:
Monitor
D: Webcam
B: Speaker
C: Mouse
83.
What is thefull form of PDF?
A
:
Printable Document
Format
D: Programming Data File
B:
Portable Document
Format
C: Public Display Format
84.
What is thefull form of PDF?
A
:
Printable Document
Format
D: Programming Data File
B:
Portable Document
Format
C: Public Display Format
85.
Which program isused to access websites?
A
:
Paint
D: Excel
B: Chrome
C: Word
86.
Which program isused to access websites?
A
:
Paint
D: Excel
B: Chrome
C: Word
87.
What is thefunction of the Recycle Bin in Windows?
A
:
Store copied files
D:
Temporarily store
deleted files
B: Delete system files
C:
Save recently opened
apps
88.
What is thefunction of the Recycle Bin in Windows?
A
:
Store copied files
D:
Temporarily store
deleted files
B: Delete system files
C:
Save recently opened
apps
89.
Which of thefollowing is a presentation file format?
A
:
.docx
D: .exe
B: .xlsx
C: .pptx
90.
Which of thefollowing is a presentation file format?
A
:
.docx
D: .exe
B: .xlsx
C: .pptx
91.
What is theshortcut key to copy selected text?
A
:
Ctrl + C
D: Ctrl + P
B: Ctrl + X
C: Ctrl + V
92.
What is theshortcut key to copy selected text?
A
:
Ctrl + C
D: Ctrl + P
B: Ctrl + X
C: Ctrl + V
93.
What type ofsoftware is antivirus?
A
:
Application software
D: Programming software
B: Utility software
C: Operating system
94.
What type ofsoftware is antivirus?
A
:
Application software
D: Programming software
B: Utility software
C: Operating system
95.
What is thefunction of Ctrl + P?
A
:
Print the document
D: Play a video
B: Paste text
C: Pause music
96.
What is thefunction of Ctrl + P?
A
:
Print the document
D: Play a video
B: Paste text
C: Pause music
97.
What is aTrojan horse in computer terms?
A
:
A backup software
D: A server
B:
A type of malware hidden
as legitimate software
C: A graphic tool
98.
What is aTrojan horse in computer terms?
A
:
A backup software
D: A server
B:
A type of malware hidden
as legitimate software
C: A graphic tool
99.
Which one ofthese is a spreadsheet application?
A
:
Powerpoint
D: Google Docs
B: MS Word
C: MS Excel
100.
Which one ofthese is a spreadsheet application?
A
:
Powerpoint
D: Google Docs
B: MS Word
C: MS Excel
101.
What happens whenyou press Ctrl + X?
A
:
Copies the text
D: Undoes the action
B: Cuts the text
C: Pastes the text
102.
What happens whenyou press Ctrl + X?
A
:
Copies the text
D: Undoes the action
B: Cuts the text
C: Pastes the text
103.
What does IPaddress stand for?
A
:
Internet Protocol
Address
D:
Internet Provider
Address
B: Internet Profile
C:
International Page
Address
104.
What does IPaddress stand for?
A
:
Internet Protocol
Address
D:
Internet Provider
Address
B: Internet Profile
C:
International Page
Address
105.
What is thepurpose of software updates?
A
:
Clean your device
D: Reduce battery usage
B:
Fix bugs and add
features
C:
Change screen
resolution
106.
What is thepurpose of software updates?
A
:
Clean your device
D: Reduce battery usage
B:
Fix bugs and add
features
C:
Change screen
resolution
107.
What does thefile extension .txt stand for?
A
:
Text file
D: Toolkit
B: Template file
C: Table file
108.
What does thefile extension .txt stand for?
A
:
Text file
D: Toolkit
B: Template file
C: Table file
109.
What does Ctrl+ A do in most programs?
A
:
Aligns text
D: Auto saves file
B: Adds new page
C: Select all content
110.
What does Ctrl+ A do in most programs?
A
:
Aligns text
D: Auto saves file
B: Adds new page
C: Select all content
111.
What does adomain name represent?
A
:
Email address
D: Type of virus
B:
Physical address of a
computer
C:
Human-readable web address
like www.example.com
112.
What does adomain name represent?
A
:
Email address
D: Type of virus
B:
Physical address of a
computer
C:
Human-readable web address
like www.example.com
113.
Which application isbest for creating slide presentations?
A
:
Word
D: Powerpoint
B: Excel
C: Paint
114.
Which application isbest for creating slide presentations?
A
:
Word
D: Powerpoint
B: Excel
C: Paint
115.
What is abrowser cache used for?
A
:
Increase internet speed
D: Secure browsing
B:
Store frequently visited
pages for quicker loading
C: Backup data
116.
What is abrowser cache used for?
A
:
Increase internet speed
D: Secure browsing
B:
Store frequently visited
pages for quicker loading
C: Backup data
Image Round
• Eachteam will see one tech-related image (like a logo, gadget, or
famous personality).
• Teams must identify the image.
• Teams have 1 minute to answer.
Timeline Round
• Teamsget 4 tech events or product launches.
• They must put these events in the correct chronological order.
• Teams have 2 minutes per question for this round.
• There will be total 3 questions.
161.
A: Launch ofWindows XP.
D: Release of Windows 11.
B: Introduction of the iPhone.
C: Launch of Google Chrome.
1.
162.
A: Founding ofFacebook.
D: Founding of Microsoft
B: Launch of Android OS
C: Facebook changes it‘s name to Meta.
2.
163.
A: Google acquiresYoutube.
D: Elon Musk bought the twitter.
B: Whatsapp acquired by Facebook.
C: Release of ChatGPT.
3.
164.
Myth or Fact?
• Each team hears a statement about tech.
• They must say quickly whether each statement is a myth or a
fact.
• Teams get 30 seconds to answer.
Field Frenzy
• Thisis a category-based round.
• There will be 5 different fields of computing (examples: AI,
Cybersecurity, Software, Web Development, Hardware).
• Each team must choose one field.
• They will be asked 1 question based on their selected field.
• The team with the highest score in the initial rounds/selection rounds
chooses first; others follow in order.
• There will be negative marking of 5 marks for the incorrect answer.
• Time limit: 1 minute per question
208.
1: Cyber Security
4:Programming
2: Artficial Intelligence
3: Networking
5: Web development
209.
What does VPNstand for?
A
:
Visual Protection
Network
D:
Verified Protection
Network
B:
Visual Protection
Network
C: Virtual Private Network
210.
What does VPNstand for?
A
:
Visual Protection
Network
D:
Verified Protection
Network
B:
Visual Protection
Network
C: Virtual Private Network
211.
Which of thefollowing is an application of Artificial Intelligence?
A
:
MS Excel
D: Disk Cleanup Tool
B: Face Detection
C:
File Compression
Software
212.
Which of thefollowing is an application of Artificial Intelligence?
A
:
MS Excel
D: Disk Cleanup Tool
B: Face Detection
C:
File Compression
Software
213.
What is thepurpose of DNS in a network?
A
:
Align IP addresses
D: Increase Bandwidth
B: Transfer file security
C:
Convert domain names
to IP addresses
214.
What is thepurpose of DNS in a network?
A
:
Align IP addresses
D: Increase Bandwidth
B: Transfer file security
C:
Convert domain names
to IP addresses
215.
Which of thefollowing is used for web scripting on the client
side?
A
:
Java
D: JavaScript
B: Python
C: PHP
216.
Which of thefollowing is used for web scripting on the client
side?
A
:
Java
D: JavaScript
B: Python
C: PHP
217.
What is thepurpose of anchor tag (<a> tag) in HTML?
A
:
Add animation
D: Align text
B: Insert Audio
C: Create hyperlinks
218.
What is thepurpose of anchor tag (<a> tag) in HTML?
A
:
Add animation
D: Align text
B: Insert Audio
C: Create hyperlinks
Direct and PassRound
• Each team is asked one question in a fixed order.
• If the team answers correctly, they score points.
• If they cannot answer, the question is passed to the next team in order.
• The passed question carries 2 marks.
• The question is passed only once.
• No negative marking in this round.
• Time limit: 1 minute per question
221.
Who invented theWorld Wide Web?
A
:
Bill Gates
D: Charles Babbage
B: Tim Berners-Lee
C: Steve Jobs
222.
Who invented theWorld Wide Web?
A
:
Bill Gates
D: Charles Babbage
B: Tim Berners-Lee
C: Steve Jobs
223.
Which language isprimarily used for database queries?
A
:
HTML
D: SQL
B: Ruby
C: Python
224.
Which language isprimarily used for database queries?
A
:
HTML
D: SQL
B: Ruby
C: Python
225.
What type ofmalware replicates itself to spread to other
computers ?
A
:
Trojan
D: Adware
B: Spyware
C: Worm
226.
What type ofmalware replicates itself to spread to other
computers ?
A
:
Trojan
D: Adware
B: Spyware
C: Worm
227.
What is thefull form of HTML?
A
:
HypeText Machine
language
D: None
B:
Hypertext Markup
Language
C:
Hyperlink and Text
Marking Language
228.
What is thefull form of HTML?
A
:
HypeText Machine
language
D: None
B:
HyperText Markup
Language
C:
Hyperlink and Text
Marking Language
229.
Which of thefollowing is non-volatile type of memory?
A
:
Cache
D: Registers
B: ROM
C: RAM
230.
Which of thefollowing is non-volatile type of memory?
A
:
Cache
D: Registers
B: ROM
C: RAM
What is a“bit” in computer terms?
A
:
Virus
D: Coding Language
B: Storage device
C: Smallest unit of data
242.
What is a“bit” in computer terms?
A
:
Virus
D: Coding Language
B: Storage device
C: Smallest unit of data
243.
What is themain purpose of a cache memory?
A
:
Store data permanently
D:
Temporarily store
frequently used data
B: Perform Calculations
C: Run antivirus
244.
What is themain purpose of a cache memory?
A
:
Store data permanently
D:
Temporarily store
frequently used data
B: Perform Calculations
C: Run antivirus
245.
Which device isused to connect a computer to a network?
A
:
Modem
D: Switch
B: Scanner
C: Hub
246.
Which device isused to connect a computer to a network?
A
:
Modem
D: Switch
B: Scanner
C: Hub
247.
Which language ismainly used for AI development?
A
:
Python
D: JavaScript
B: SQL
C: CSS
248.
Which language ismainly used for AI development?
A
:
Python
D: JavaScript
B: SQL
C: CSS
249.
Which device isresponsible for directing data packets between
networks?
A
:
Switch
D: Hub
B: Router
C: Modem
250.
Which device isresponsible for directing data packets between
networks?
A
:
Switch
D: Hub
B: Router
C: Modem
251.
What does TCPstand for?
A
:
Transmission Control
Protocol
D:
Transmission
Computer Protocol
B:
Transfer Control
Program
C:
Technical Computer
Protocol
252.
What does TCPstands for?
A
:
Transmission Control
Protocol
D:
Transmission
Computer Protocol
B:
Transfer Control
Program
C:
Technical Computer
Protocol
253.
What does CLSstand for in Qbasic?
A
:
Clear Syntax
D: Clear Screen
B: Clear Statement
C:
Command Line
Structure
254.
What does CLSstand for in QBasic?
A
:
Clear Syntax
D: Clear Screen
B: Clear Statement
C:
Command Line
Structure