INITIAL ROUNDS
Image Round
Tech Trivia
Tech Timeline
1:
2:
3:
Myths or Facts?
4:
INITIAL ROUNDS
Image Round
Tech Trivia
Tech Timeline
1:
2:
3:
Myths or Facts?
4:
Tech Trivia
• Standard question and answer round.
• Each team gets asked one question per cycle.
• The round runs for 3 full cycles, so every team answers 3 questions
in total.
• Questions will be asked in a fixed order, and no passing is allowed.
• Teams have 1 minute to answer each question.
What is the main purpose of an Operating System?
A
:
It allows users to watch
videos.
D:
It runs antivirus
programs.
B:
It manages hardware
and software resources.
C:
It connects computer to
the internet.
What is the main purpose of an Operating System?
A
:
It allows users to watch
videos.
D:
It runs antivirus
programs.
B:
It manages hardware
and software resources.
C:
It connects computer to
the internet.
Which one of the following is a search engine, not a browser or
app?
A
:
Mozilla Firebox
D: Bing
B: Safari
C: Tiktok
Which one of the following is a search engine, not a browser or
app?
A
:
Mozilla Firebox
D: Bing
B: Safari
C: Tiktok
Which of the following is not a mobile operating system?
A
:
Android
D: HarmonyOS
B: iOS
C: Windows 10
Which of the following is not a mobile operating system?
A
:
Android
D: HarmonyOS
B: iOS
C: Windows 10
Which file type is commonly used for data analysis and
calculations?
A
:
.docx
D: .xlsx
B: .pptx
C: .mp4
Which file type is commonly used for data analysis and
calculations?
A
:
.docx
D: .xlsx
B: .pptx
C: .mp4
What does HTTPS ensure while browsing websites?
A
:
Faster page load
D: Advertisement blocking
B: Better graphics
C:
Secure data transfer
using encryption
What does HTTPS ensure while browsing websites?
A
:
Faster page load
D: Advertisement blocking
B: Better graphics
C:
Secure data transfer
using encryption
What is the primary feature of a spreadsheet software like MS
Excel?
A
:
Organizing data in rows
and columns with formulas
D: Writing paragraphs
B: Playing multimedia
C
:
Creating resumes
What is the primary feature of a spreadsheet software like MS
Excel?
A
:
Organizing data in rows
and columns with formulas
D: Writing paragraphs
B: Playing multimedia
C
:
Creating resumes
Which platform offers online shopping and operates as an e-
commerce business?
A
:
Daraz
D: Paint
B: Quora
C: Google meet
Which platform offers online shopping and operates as an e-
commerce business?
A
:
Daraz
D: Paint
B: Quora
C: Google meet
Which of these file types is best suited for sharing
presentations?
A
:
.docx
D: .exe
B: .pptx
C: .xlsx
Which of these file types is best suited for sharing
presentations?
A
:
.docx
D: .exe
B: .pptx
C: .xlsx
What is phishing in terms of cyber security?
A
:
An email scam trying to trick
users into giving sensitive info
D: Uploading large files
B:
A way to clean virus
from a PC
C:
A method of password
creation
What is phishing in terms of cyber security?
A
:
An email scam trying to trick
users into giving sensitive info
D: Uploading large files
B:
A way to clean virus
from a PC
C:
A method of password
creation
Which key shortcut is used to rename a file or folder in
Windows?
A
:
Ctrl + R
D: Ctrl + Shift + R
B: Alt + F2
C: F2
Which key shortcut is used to rename a file or folder in
Windows?
A
:
Ctrl + R
D: Ctrl + Shift + R
B: Alt + F2
C: F2
What does GUI help users do?
A
:
Connect to the cloud
D: Write software code
B: Interact with computer using
icons and visual elements
C:
Type in commands
only
A
:
Connect to the cloud
D: Write software code
B:
Interact with computer using
icons and visual elements
C:
Type in commands
only
What does GUI help users do?
What is the main role of a browser?
A
:
Installing apps
D: Formatting documents
B: Controlling the OS
C:
Accessing and viewing
web pages
What is the main role of a browser?
A
:
Installing apps
D: Formatting documents
B: Controlling the OS
C:
Accessing and viewing
web pages
What is the main use of a firewall in a network?
A
:
Boost Wi-Fi speed
D:
Block unauthorized
access and protect data
B: Delete viruses
C: Store passwords
What is the main use of a firewall in a network?
A
:
Boost Wi-Fi speed
D:
Block unauthorized
access and protect data
B: Delete viruses
C: Store passwords
Which keyboard shortcut is used to open Task Manager
directly?
A
:
Ctrl + Shift + Esc
D: Ctrl + Alt + Del
B: Ctrl + T
C: Alt + Esc
Which keyboard shortcut is used to open Task Manager
directly?
A
:
Ctrl + Shift + Esc
D: Ctrl + Alt + Del
B: Ctrl + T
C: Alt + Esc
What is bandwidth in internet terms?
A
:
Number of devices on
Wi-Fi
D:
Maximum data transfer
rate of a network
B: File size limit
C: Quality of graphics
What is bandwidth in internet terms?
A
:
Number of devices on
Wi-Fi
D:
Maximum data transfer
rate of a network
B: File size limit
C: Quality of graphics
Which of the following is a cloud storage service?
A
:
VLC Media Player
D: OBS Studio
B: OneDrive
C: VS Code
Which of the following is a cloud storage service?
A
:
VLC Media Player
D: OBS Studio
B: OneDrive
C: VS Code
Which file extension is used for compressed files?
A
:
.zip
D: .mp3
B: .pdf
C: .docx
Which file extension is used for compressed files?
A
:
.zip
D: .mp3
B: .pdf
C: .docx
Which one of these file types is most suitable for non-editable
document sharing?
A
:
.xlsx
D: .pdf
B: .docx
C: .pptx
Which one of these file types is most suitable for non-editable
document sharing?
A
:
.xlsx
D: .pdf
B: .docx
C: .pptx
What is encryption mainly used for?
A
:
Making data smaller
D: Making websites
B: Locking the screen
C:
Converting data into a secure
code to prevent access
What is encryption mainly used for?
A
:
Making data smaller
D: Making websites
B: Locking the screen
C:
Converting data into a secure
code to prevent access
Which key combination is used to undo the last action in most
applications?
A
:
Ctrl + Y
D: Ctrl + A
B: Ctrl + Z
C: Ctrl + X
Which key combination is used to undo the last action in most
applications?
A
:
Ctrl + Y
D: Ctrl + A
B: Ctrl + Z
C: Ctrl + X
What type of software is Microsoft Word?
A
:
Word Processing
software
D: Operating system
B: Spreadsheet software
C: Presentation software
What type of software is Microsoft Word?
A
:
Word Processing
software
D: Operating system
B: Spreadsheet software
C: Presentation software
What does URL stand for?
A
:
Unique Resource Link
D: User Readable Link
B:
Uniform Resource
Locator
C: Universal Routing Line
What does URL stand for?
A
:
Unique Resource Link
D: User Readable Link
B:
Uniform Resource
Locator
C: Universal Routing Line
Which of the following is an example of system software?
A
:
MS Paint
D: Windows 11
B: Antivirus
C: Google Chrome
Which of the following is an example of system software?
A
:
MS Paint
D: Windows 11
B: Antivirus
C: Google Chrome
Which key shortcut is used to find text within a document?
A
:
Ctrl + A
D: Ctrl + P
B: Ctrl + F
C: Ctrl + S
Which key shortcut is used to find text within a document?
A
:
Ctrl + A
D: Ctrl + P
B: Ctrl + F
C: Ctrl + S
Which of the following file extensions is associated with audio
files?
A
:
.png
D: .html
B: .txt
C: .mp3
Which of the following file extensions is associated with audio
files?
A
:
.png
D: .html
B: .txt
C: .mp3
What is the function of a hyperlink in a web page?
A
:
Makes text bold
D:
Connects to another
location or webpage
B: Adds animation
C: Highlights text
What is the function of a hyperlink in a web page?
A
:
Makes text bold
D:
Connects to another
location or webpage
B: Adds animation
C: Highlights text
Which device allows you to input text into a computer?
A
:
Monitor
D: Printer
B: Keyboard
C: Mouse
Which device allows you to input text into a computer?
A
:
Monitor
D: Printer
B: Keyboard
C: Mouse
What does the "refresh" button in a browser do?
A
:
Closes the browser
D: Zooms the page
B:
Reloads the current
page
C: Opens history
What does the "refresh" button in a browser do?
A
:
Closes the browser
D: Zooms the page
B:
Reloads the current
page
C: Opens history
Which of the following is an online video conferencing tool?
A
:
Excel
D: Notepad
B: Google Meet
C: Powerpoint
Which of the following is an online video conferencing tool?
A
:
Excel
D: Notepad
B: Google Meet
C: Powerpoint
Which one is a valid email address?
A
:
email@website
D: email#domain.com
B: email@domain.com
C: www.email.com
Which one is a valid email address?
A
:
email@website
D: email#domain.com
B: email@domain.com
C: www.email.com
Which of the following is not a search engine?
A
:
Google
D: DuckDuckGo
B: Yahoo
C: Youtube
Which of the following is not a search engine?
A
:
Google
D: DuckDuckGo
B: Yahoo
C: Youtube
Which of these is an output device?
A
:
Monitor
D: Keynoard
B: Scanner
C: Mouse
Which of these is an output device?
A
:
Monitor
D: Keyboard
B: Scanner
C: Mouse
What is the purpose of a password?
A
:
To connect to the
internet
D: To speed up browsing
B:
To provide user
security
C: To store files
What is the purpose of a password?
A
:
To connect to the
internet
D: To speed up browsing
B:
To provide user
security
C: To store files
Which of the following is not an image file format?
A
:
.jpg
D: .png
B: .gif
C: .pdf
Which of the following is not an image file format?
A
:
.jpg
D: .png
B: .gif
C: .pdf
Which part of a computer stores data permanently?
A
:
RAM
D: Cache
B: Hard Disk
C: ROM
Which part of a computer stores data permanently?
A
:
RAM
D: Cache
B: Hard Disk
C: ROM
What does the shortcut Ctrl + S do?
A
:
Selects all text
D: Start a new page
B: Save the document
C:
Searches the
document
What does the shortcut Ctrl + S do?
A
:
Selects all text
D: Start a new page
B: Save the document
C:
Searches the
document
What is the term for malicious software designed to harm your
system?
A
:
Malware
D: Hardware
B: Driver
C: Shareware
What is the term for malicious software designed to harm your
system?
A
:
Malware
D: Hardware
B: Driver
C: Shareware
Which of these devices is used to capture photos or videos into
a computer?
A
:
Monitor
D: Webcam
B: Speaker
C: Mouse
Which of these devices is used to capture photos or videos into
a computer?
A
:
Monitor
D: Webcam
B: Speaker
C: Mouse
What is the full form of PDF?
A
:
Printable Document
Format
D: Programming Data File
B:
Portable Document
Format
C: Public Display Format
What is the full form of PDF?
A
:
Printable Document
Format
D: Programming Data File
B:
Portable Document
Format
C: Public Display Format
Which program is used to access websites?
A
:
Paint
D: Excel
B: Chrome
C: Word
Which program is used to access websites?
A
:
Paint
D: Excel
B: Chrome
C: Word
What is the function of the Recycle Bin in Windows?
A
:
Store copied files
D:
Temporarily store
deleted files
B: Delete system files
C:
Save recently opened
apps
What is the function of the Recycle Bin in Windows?
A
:
Store copied files
D:
Temporarily store
deleted files
B: Delete system files
C:
Save recently opened
apps
Which of the following is a presentation file format?
A
:
.docx
D: .exe
B: .xlsx
C: .pptx
Which of the following is a presentation file format?
A
:
.docx
D: .exe
B: .xlsx
C: .pptx
What is the shortcut key to copy selected text?
A
:
Ctrl + C
D: Ctrl + P
B: Ctrl + X
C: Ctrl + V
What is the shortcut key to copy selected text?
A
:
Ctrl + C
D: Ctrl + P
B: Ctrl + X
C: Ctrl + V
What type of software is antivirus?
A
:
Application software
D: Programming software
B: Utility software
C: Operating system
What type of software is antivirus?
A
:
Application software
D: Programming software
B: Utility software
C: Operating system
What is the function of Ctrl + P?
A
:
Print the document
D: Play a video
B: Paste text
C: Pause music
What is the function of Ctrl + P?
A
:
Print the document
D: Play a video
B: Paste text
C: Pause music
What is a Trojan horse in computer terms?
A
:
A backup software
D: A server
B:
A type of malware hidden
as legitimate software
C: A graphic tool
What is a Trojan horse in computer terms?
A
:
A backup software
D: A server
B:
A type of malware hidden
as legitimate software
C: A graphic tool
Which one of these is a spreadsheet application?
A
:
Powerpoint
D: Google Docs
B: MS Word
C: MS Excel
Which one of these is a spreadsheet application?
A
:
Powerpoint
D: Google Docs
B: MS Word
C: MS Excel
What happens when you press Ctrl + X?
A
:
Copies the text
D: Undoes the action
B: Cuts the text
C: Pastes the text
What happens when you press Ctrl + X?
A
:
Copies the text
D: Undoes the action
B: Cuts the text
C: Pastes the text
What does IP address stand for?
A
:
Internet Protocol
Address
D:
Internet Provider
Address
B: Internet Profile
C:
International Page
Address
What does IP address stand for?
A
:
Internet Protocol
Address
D:
Internet Provider
Address
B: Internet Profile
C:
International Page
Address
What is the purpose of software updates?
A
:
Clean your device
D: Reduce battery usage
B:
Fix bugs and add
features
C:
Change screen
resolution
What is the purpose of software updates?
A
:
Clean your device
D: Reduce battery usage
B:
Fix bugs and add
features
C:
Change screen
resolution
What does the file extension .txt stand for?
A
:
Text file
D: Toolkit
B: Template file
C: Table file
What does the file extension .txt stand for?
A
:
Text file
D: Toolkit
B: Template file
C: Table file
What does Ctrl + A do in most programs?
A
:
Aligns text
D: Auto saves file
B: Adds new page
C: Select all content
What does Ctrl + A do in most programs?
A
:
Aligns text
D: Auto saves file
B: Adds new page
C: Select all content
What does a domain name represent?
A
:
Email address
D: Type of virus
B:
Physical address of a
computer
C:
Human-readable web address
like www.example.com
What does a domain name represent?
A
:
Email address
D: Type of virus
B:
Physical address of a
computer
C:
Human-readable web address
like www.example.com
Which application is best for creating slide presentations?
A
:
Word
D: Powerpoint
B: Excel
C: Paint
Which application is best for creating slide presentations?
A
:
Word
D: Powerpoint
B: Excel
C: Paint
What is a browser cache used for?
A
:
Increase internet speed
D: Secure browsing
B:
Store frequently visited
pages for quicker loading
C: Backup data
What is a browser cache used for?
A
:
Increase internet speed
D: Secure browsing
B:
Store frequently visited
pages for quicker loading
C: Backup data
INITIAL ROUNDS
Image Round
Tech Trivia
Tech Timeline
1:
2:
3:
Myths or Facts?
4:
Image Round
• Each team will see one tech-related image (like a logo, gadget, or
famous personality).
• Teams must identify the image.
• Teams have 1 minute to answer.
Which company does this logo belong to?
Which company does this logo belong to?
An
s:
Nvidia
What type of hardware is shown in this image?
What type of hardware is shown in this image?
An
s:
Graphics Card
What is the name of this code editor?
What is the name of this code editor?
Ans: VS Code
Which platform is this?
Which platform is this?
Ans: GitHub
What is the image shown here?
What is the image shown here?
Ans
:
Vacuum Tubes
What is the image shown here?
What is the image shown here?
Ans
:
Pinterest
Whose picture is this?
Whose picture is this?
Ans
:
Sundar Pichai
Whose logo is this?
Whose log
Ans
:
Opera
What is the name of this web browser?
What is the name of this web browser?
Ans
:
Brave
What is the name of this device?
What is the name of this device?
Ans
:
Arduino
Which platform uses this logo?
Which platform uses this logo?
Ans
:
Adobe Reader
This logo represents which AI tool?
This logo represents which AI tool?
Ans
:
Copilot
Which security feature is shown in the image?
Which security feature is shown in the image?
Ans
:
Firewall
Which security feature is shown in the image?
Which security feature is shown in the image?
Ans
:
Linus Torvalds
Which search engine is represented by this logo?
Which search engine is represented by this logo?
Ans
:
Bing
This chip was used in which generation of computers?
This chip was used in which generation of computers?
Ans
:
3rd Generation
Identify this popular animation and visual effects software.
Identify this popular animation and visual effects software.
Ans
:
Blender
Identify the popular digital assistant.
Identify the popular digital assistant.
Ans
:
Siri
Identify this logo used to create and host websites.
Identify this logo used to create and host websites.
Ans
:
Wordpress
Which online meeting platform uses this logo?
Which online meeting platform uses this logo?
Ans
:
Skype
INITIAL ROUNDS
Image Round
Tech Trivia
Tech Timeline
1:
2:
3:
Myths or Facts?
4:
Timeline Round
• Teams get 4 tech events or product launches.
• They must put these events in the correct chronological order.
• Teams have 2 minutes per question for this round.
• There will be total 3 questions.
A: Launch of Windows XP.
D: Release of Windows 11.
B: Introduction of the iPhone.
C: Launch of Google Chrome.
1.
A: Founding of Facebook.
D: Founding of Microsoft
B: Launch of Android OS
C: Facebook changes it‘s name to Meta.
2.
A: Google acquires Youtube.
D: Elon Musk bought the twitter.
B: Whatsapp acquired by Facebook.
C: Release of ChatGPT.
3.
Myth or Fact ?
• Each team hears a statement about tech.
• They must say quickly whether each statement is a myth or a
fact.
• Teams get 30 seconds to answer.
“Incognito mode hides your browsing activity
from your internet provider.”
Myth Fact
“Incognito mode hides your browsing activity
from your internet provider.”
Myth Fact
“HTML is a programming language.”
Myth Fact
“HTML is a programming language.”
Myth Fact
“Bluetooth uses radio waves to transmit data.”
Myth Fact
“Bluetooth uses radio waves to transmit data.”
Myth Fact
“Charging your phone overnight damages the
battery significantly.”
Myth Fact
“Charging your phone overnight damages the
battery significantly.”
Myth Fact
“Cookies on websites are small files that store
user information.”
Myth Fact
“Cookies on websites are small files that store
user information.”
Myth Fact
“The term "bug" in computing originated from
a real insect.”
Myth Fact
“The term "bug" in computing originated from
a real insect.”
Myth Fact
“The Internet and Wi-Fi are same.”
Myth Fact
“The Internet and Wi-Fi are same.”
Myth Fact
“ A firewall helps protect your network from
unauthorized access.”
Myth Fact
“A firewall helps protect your network from
unauthorized access.”
Myth Fact
“Turning off Wi-Fi and Bluetooth when not in
use improves phone security.”
Myth Fact
“Turning off Wi-Fi and Bluetooth when not in
use improves phone security.”
Myth Fact
“Macs can’t get viruses.”
Myth Fact
“Macs can’t get viruses.”
Myth Fact
“The first computer programmer was a
woman.”
Myth Fact
“The first computer programmer was a
woman.”
Myth Fact
“Clearing cache helps fix website loading
issues.”
Myth Fact
“Clearing cache helps fix website loading
issues.”
Myth Fact
“1 Gigabyte equals 1000 Megabytes.”
Myth Fact
“1 Gigabyte equals 1000 Megabytes.”
Myth Fact
“All apps from official app stores are
guaranteed to be safe.”
Myth Fact
“All apps from official app stores are
guaranteed to be safe.”
Myth Fact
“Bluetooth can be used to transfer malware.”
Myth Fact
“Bluetooth can be used to transfer malware.”
Myth Fact
“RAM is the same as storage.”
Myth Fact
“RAM is the same as storage.”
Myth Fact
“Java and JavaScript are the same thing.”
Myth Fact
“Java and JavaScript are the same thing.”
Myth Fact
“Digital footprints can last forever.”
Myth Fact
“Digital footprints can last forever.”
Myth Fact
“Closing apps on your phone always improves
battery life.”
Myth Fact
“Closing apps on your phone always improves
battery life.”
Myth Fact
“Phishing is a type of cyberattack that tricks
users into revealing information.”
Myth Fact
“Phishing is a type of cyberattack that tricks
users into revealing information.”
Myth Fact
FINAL ROUNDS
Direct and Pass Round
Field Frienzy
Gambling Round
1:
2:
3:
FINAL ROUNDS
Direct and Pass Round
Field Frenzy
Gambling Round
1:
2:
3:
Field Frenzy
• This is a category-based round.
• There will be 5 different fields of computing (examples: AI,
Cybersecurity, Software, Web Development, Hardware).
• Each team must choose one field.
• They will be asked 1 question based on their selected field.
• The team with the highest score in the initial rounds/selection rounds
chooses first; others follow in order.
• There will be negative marking of 5 marks for the incorrect answer.
• Time limit: 1 minute per question
1: Cyber Security
4: Programming
2: Artficial Intelligence
3: Networking
5: Web development
What does VPN stand for?
A
:
Visual Protection
Network
D:
Verified Protection
Network
B:
Visual Protection
Network
C: Virtual Private Network
What does VPN stand for?
A
:
Visual Protection
Network
D:
Verified Protection
Network
B:
Visual Protection
Network
C: Virtual Private Network
Which of the following is an application of Artificial Intelligence?
A
:
MS Excel
D: Disk Cleanup Tool
B: Face Detection
C:
File Compression
Software
Which of the following is an application of Artificial Intelligence?
A
:
MS Excel
D: Disk Cleanup Tool
B: Face Detection
C:
File Compression
Software
What is the purpose of DNS in a network?
A
:
Align IP addresses
D: Increase Bandwidth
B: Transfer file security
C:
Convert domain names
to IP addresses
What is the purpose of DNS in a network?
A
:
Align IP addresses
D: Increase Bandwidth
B: Transfer file security
C:
Convert domain names
to IP addresses
Which of the following is used for web scripting on the client
side?
A
:
Java
D: JavaScript
B: Python
C: PHP
Which of the following is used for web scripting on the client
side?
A
:
Java
D: JavaScript
B: Python
C: PHP
What is the purpose of anchor tag (<a> tag) in HTML?
A
:
Add animation
D: Align text
B: Insert Audio
C: Create hyperlinks
What is the purpose of anchor tag (<a> tag) in HTML?
A
:
Add animation
D: Align text
B: Insert Audio
C: Create hyperlinks
FINAL ROUNDS
Direct and Pass Round
Field Frenzy
Gambling Round
1:
2:
3:
Direct and Pass Round
• Each team is asked one question in a fixed order.
• If the team answers correctly, they score points.
• If they cannot answer, the question is passed to the next team in order.
• The passed question carries 2 marks.
• The question is passed only once.
• No negative marking in this round.
• Time limit: 1 minute per question
Who invented the World Wide Web?
A
:
Bill Gates
D: Charles Babbage
B: Tim Berners-Lee
C: Steve Jobs
Who invented the World Wide Web?
A
:
Bill Gates
D: Charles Babbage
B: Tim Berners-Lee
C: Steve Jobs
Which language is primarily used for database queries?
A
:
HTML
D: SQL
B: Ruby
C: Python
Which language is primarily used for database queries?
A
:
HTML
D: SQL
B: Ruby
C: Python
What type of malware replicates itself to spread to other
computers ?
A
:
Trojan
D: Adware
B: Spyware
C: Worm
What type of malware replicates itself to spread to other
computers ?
A
:
Trojan
D: Adware
B: Spyware
C: Worm
What is the full form of HTML?
A
:
HypeText Machine
language
D: None
B:
Hypertext Markup
Language
C:
Hyperlink and Text
Marking Language
What is the full form of HTML?
A
:
HypeText Machine
language
D: None
B:
HyperText Markup
Language
C:
Hyperlink and Text
Marking Language
Which of the following is non-volatile type of memory?
A
:
Cache
D: Registers
B: ROM
C: RAM
Which of the following is non-volatile type of memory?
A
:
Cache
D: Registers
B: ROM
C: RAM
Which computer memory is fastest in terms of speed?
A
:
Cache
D: HDD
B: ROM
C: RAM
Which computer memory is fastest in terms of speed?
A
:
Cache
D: HDD
B: ROM
C: RAM
What does LAN refer to?
A
:
Local Area Network
D: Low Activity Network
B: Line Area Network
C: Long Access Node
What does LAN refer to?
A
:
Local Area Network
D: Low Activity Network
B: Line Area Network
C: Long Access Node
Which language is mainly used for web styling?
A
:
HTML
D: Python
B: CSS
C: Java Script
Which language is mainly used for web styling?
A
:
HTML
D: Python
B: CSS
C: Java Script
Which part of URL tells the browser which protocol to use?
A
:
www
D: Domain name
B: .com
C: https
Which part of URL tells the browser which protocol to use?
A
:
www
D: Domain name
B: .com
C: https
Which language translator is used by QBasic?
A
:
Compiler
D: Emulator
B: Assembler
C: Interpreter
Which language translator is used by QBasic?
A
:
Compiler
D: Emulator
B: Assembler
C: Interpreter
What is a “bit” in computer terms?
A
:
Virus
D: Coding Language
B: Storage device
C: Smallest unit of data
What is a “bit” in computer terms?
A
:
Virus
D: Coding Language
B: Storage device
C: Smallest unit of data
What is the main purpose of a cache memory?
A
:
Store data permanently
D:
Temporarily store
frequently used data
B: Perform Calculations
C: Run antivirus
What is the main purpose of a cache memory?
A
:
Store data permanently
D:
Temporarily store
frequently used data
B: Perform Calculations
C: Run antivirus
Which device is used to connect a computer to a network?
A
:
Modem
D: Switch
B: Scanner
C: Hub
Which device is used to connect a computer to a network?
A
:
Modem
D: Switch
B: Scanner
C: Hub
Which language is mainly used for AI development?
A
:
Python
D: JavaScript
B: SQL
C: CSS
Which language is mainly used for AI development?
A
:
Python
D: JavaScript
B: SQL
C: CSS
Which device is responsible for directing data packets between
networks?
A
:
Switch
D: Hub
B: Router
C: Modem
Which device is responsible for directing data packets between
networks?
A
:
Switch
D: Hub
B: Router
C: Modem
What does TCP stand for?
A
:
Transmission Control
Protocol
D:
Transmission
Computer Protocol
B:
Transfer Control
Program
C:
Technical Computer
Protocol
What does TCP stands for?
A
:
Transmission Control
Protocol
D:
Transmission
Computer Protocol
B:
Transfer Control
Program
C:
Technical Computer
Protocol
What does CLS stand for in Qbasic?
A
:
Clear Syntax
D: Clear Screen
B: Clear Statement
C:
Command Line
Structure
What does CLS stand for in QBasic?
A
:
Clear Syntax
D: Clear Screen
B: Clear Statement
C:
Command Line
Structure

Quiz template 300 pages advanced and Tech friendly

  • 4.
    INITIAL ROUNDS Image Round TechTrivia Tech Timeline 1: 2: 3: Myths or Facts? 4:
  • 5.
    INITIAL ROUNDS Image Round TechTrivia Tech Timeline 1: 2: 3: Myths or Facts? 4:
  • 6.
    Tech Trivia • Standardquestion and answer round. • Each team gets asked one question per cycle. • The round runs for 3 full cycles, so every team answers 3 questions in total. • Questions will be asked in a fixed order, and no passing is allowed. • Teams have 1 minute to answer each question.
  • 7.
    What is themain purpose of an Operating System? A : It allows users to watch videos. D: It runs antivirus programs. B: It manages hardware and software resources. C: It connects computer to the internet.
  • 8.
    What is themain purpose of an Operating System? A : It allows users to watch videos. D: It runs antivirus programs. B: It manages hardware and software resources. C: It connects computer to the internet.
  • 9.
    Which one ofthe following is a search engine, not a browser or app? A : Mozilla Firebox D: Bing B: Safari C: Tiktok
  • 10.
    Which one ofthe following is a search engine, not a browser or app? A : Mozilla Firebox D: Bing B: Safari C: Tiktok
  • 11.
    Which of thefollowing is not a mobile operating system? A : Android D: HarmonyOS B: iOS C: Windows 10
  • 12.
    Which of thefollowing is not a mobile operating system? A : Android D: HarmonyOS B: iOS C: Windows 10
  • 13.
    Which file typeis commonly used for data analysis and calculations? A : .docx D: .xlsx B: .pptx C: .mp4
  • 14.
    Which file typeis commonly used for data analysis and calculations? A : .docx D: .xlsx B: .pptx C: .mp4
  • 15.
    What does HTTPSensure while browsing websites? A : Faster page load D: Advertisement blocking B: Better graphics C: Secure data transfer using encryption
  • 16.
    What does HTTPSensure while browsing websites? A : Faster page load D: Advertisement blocking B: Better graphics C: Secure data transfer using encryption
  • 17.
    What is theprimary feature of a spreadsheet software like MS Excel? A : Organizing data in rows and columns with formulas D: Writing paragraphs B: Playing multimedia C : Creating resumes
  • 18.
    What is theprimary feature of a spreadsheet software like MS Excel? A : Organizing data in rows and columns with formulas D: Writing paragraphs B: Playing multimedia C : Creating resumes
  • 19.
    Which platform offersonline shopping and operates as an e- commerce business? A : Daraz D: Paint B: Quora C: Google meet
  • 20.
    Which platform offersonline shopping and operates as an e- commerce business? A : Daraz D: Paint B: Quora C: Google meet
  • 21.
    Which of thesefile types is best suited for sharing presentations? A : .docx D: .exe B: .pptx C: .xlsx
  • 22.
    Which of thesefile types is best suited for sharing presentations? A : .docx D: .exe B: .pptx C: .xlsx
  • 23.
    What is phishingin terms of cyber security? A : An email scam trying to trick users into giving sensitive info D: Uploading large files B: A way to clean virus from a PC C: A method of password creation
  • 24.
    What is phishingin terms of cyber security? A : An email scam trying to trick users into giving sensitive info D: Uploading large files B: A way to clean virus from a PC C: A method of password creation
  • 25.
    Which key shortcutis used to rename a file or folder in Windows? A : Ctrl + R D: Ctrl + Shift + R B: Alt + F2 C: F2
  • 26.
    Which key shortcutis used to rename a file or folder in Windows? A : Ctrl + R D: Ctrl + Shift + R B: Alt + F2 C: F2
  • 27.
    What does GUIhelp users do? A : Connect to the cloud D: Write software code B: Interact with computer using icons and visual elements C: Type in commands only
  • 28.
    A : Connect to thecloud D: Write software code B: Interact with computer using icons and visual elements C: Type in commands only What does GUI help users do?
  • 29.
    What is themain role of a browser? A : Installing apps D: Formatting documents B: Controlling the OS C: Accessing and viewing web pages
  • 30.
    What is themain role of a browser? A : Installing apps D: Formatting documents B: Controlling the OS C: Accessing and viewing web pages
  • 31.
    What is themain use of a firewall in a network? A : Boost Wi-Fi speed D: Block unauthorized access and protect data B: Delete viruses C: Store passwords
  • 32.
    What is themain use of a firewall in a network? A : Boost Wi-Fi speed D: Block unauthorized access and protect data B: Delete viruses C: Store passwords
  • 33.
    Which keyboard shortcutis used to open Task Manager directly? A : Ctrl + Shift + Esc D: Ctrl + Alt + Del B: Ctrl + T C: Alt + Esc
  • 34.
    Which keyboard shortcutis used to open Task Manager directly? A : Ctrl + Shift + Esc D: Ctrl + Alt + Del B: Ctrl + T C: Alt + Esc
  • 35.
    What is bandwidthin internet terms? A : Number of devices on Wi-Fi D: Maximum data transfer rate of a network B: File size limit C: Quality of graphics
  • 36.
    What is bandwidthin internet terms? A : Number of devices on Wi-Fi D: Maximum data transfer rate of a network B: File size limit C: Quality of graphics
  • 37.
    Which of thefollowing is a cloud storage service? A : VLC Media Player D: OBS Studio B: OneDrive C: VS Code
  • 38.
    Which of thefollowing is a cloud storage service? A : VLC Media Player D: OBS Studio B: OneDrive C: VS Code
  • 39.
    Which file extensionis used for compressed files? A : .zip D: .mp3 B: .pdf C: .docx
  • 40.
    Which file extensionis used for compressed files? A : .zip D: .mp3 B: .pdf C: .docx
  • 41.
    Which one ofthese file types is most suitable for non-editable document sharing? A : .xlsx D: .pdf B: .docx C: .pptx
  • 42.
    Which one ofthese file types is most suitable for non-editable document sharing? A : .xlsx D: .pdf B: .docx C: .pptx
  • 43.
    What is encryptionmainly used for? A : Making data smaller D: Making websites B: Locking the screen C: Converting data into a secure code to prevent access
  • 44.
    What is encryptionmainly used for? A : Making data smaller D: Making websites B: Locking the screen C: Converting data into a secure code to prevent access
  • 45.
    Which key combinationis used to undo the last action in most applications? A : Ctrl + Y D: Ctrl + A B: Ctrl + Z C: Ctrl + X
  • 46.
    Which key combinationis used to undo the last action in most applications? A : Ctrl + Y D: Ctrl + A B: Ctrl + Z C: Ctrl + X
  • 47.
    What type ofsoftware is Microsoft Word? A : Word Processing software D: Operating system B: Spreadsheet software C: Presentation software
  • 48.
    What type ofsoftware is Microsoft Word? A : Word Processing software D: Operating system B: Spreadsheet software C: Presentation software
  • 49.
    What does URLstand for? A : Unique Resource Link D: User Readable Link B: Uniform Resource Locator C: Universal Routing Line
  • 50.
    What does URLstand for? A : Unique Resource Link D: User Readable Link B: Uniform Resource Locator C: Universal Routing Line
  • 51.
    Which of thefollowing is an example of system software? A : MS Paint D: Windows 11 B: Antivirus C: Google Chrome
  • 52.
    Which of thefollowing is an example of system software? A : MS Paint D: Windows 11 B: Antivirus C: Google Chrome
  • 53.
    Which key shortcutis used to find text within a document? A : Ctrl + A D: Ctrl + P B: Ctrl + F C: Ctrl + S
  • 54.
    Which key shortcutis used to find text within a document? A : Ctrl + A D: Ctrl + P B: Ctrl + F C: Ctrl + S
  • 55.
    Which of thefollowing file extensions is associated with audio files? A : .png D: .html B: .txt C: .mp3
  • 56.
    Which of thefollowing file extensions is associated with audio files? A : .png D: .html B: .txt C: .mp3
  • 57.
    What is thefunction of a hyperlink in a web page? A : Makes text bold D: Connects to another location or webpage B: Adds animation C: Highlights text
  • 58.
    What is thefunction of a hyperlink in a web page? A : Makes text bold D: Connects to another location or webpage B: Adds animation C: Highlights text
  • 59.
    Which device allowsyou to input text into a computer? A : Monitor D: Printer B: Keyboard C: Mouse
  • 60.
    Which device allowsyou to input text into a computer? A : Monitor D: Printer B: Keyboard C: Mouse
  • 61.
    What does the"refresh" button in a browser do? A : Closes the browser D: Zooms the page B: Reloads the current page C: Opens history
  • 62.
    What does the"refresh" button in a browser do? A : Closes the browser D: Zooms the page B: Reloads the current page C: Opens history
  • 63.
    Which of thefollowing is an online video conferencing tool? A : Excel D: Notepad B: Google Meet C: Powerpoint
  • 64.
    Which of thefollowing is an online video conferencing tool? A : Excel D: Notepad B: Google Meet C: Powerpoint
  • 65.
    Which one isa valid email address? A : email@website D: email#domain.com B: email@domain.com C: www.email.com
  • 66.
    Which one isa valid email address? A : email@website D: email#domain.com B: email@domain.com C: www.email.com
  • 67.
    Which of thefollowing is not a search engine? A : Google D: DuckDuckGo B: Yahoo C: Youtube
  • 68.
    Which of thefollowing is not a search engine? A : Google D: DuckDuckGo B: Yahoo C: Youtube
  • 69.
    Which of theseis an output device? A : Monitor D: Keynoard B: Scanner C: Mouse
  • 70.
    Which of theseis an output device? A : Monitor D: Keyboard B: Scanner C: Mouse
  • 71.
    What is thepurpose of a password? A : To connect to the internet D: To speed up browsing B: To provide user security C: To store files
  • 72.
    What is thepurpose of a password? A : To connect to the internet D: To speed up browsing B: To provide user security C: To store files
  • 73.
    Which of thefollowing is not an image file format? A : .jpg D: .png B: .gif C: .pdf
  • 74.
    Which of thefollowing is not an image file format? A : .jpg D: .png B: .gif C: .pdf
  • 75.
    Which part ofa computer stores data permanently? A : RAM D: Cache B: Hard Disk C: ROM
  • 76.
    Which part ofa computer stores data permanently? A : RAM D: Cache B: Hard Disk C: ROM
  • 77.
    What does theshortcut Ctrl + S do? A : Selects all text D: Start a new page B: Save the document C: Searches the document
  • 78.
    What does theshortcut Ctrl + S do? A : Selects all text D: Start a new page B: Save the document C: Searches the document
  • 79.
    What is theterm for malicious software designed to harm your system? A : Malware D: Hardware B: Driver C: Shareware
  • 80.
    What is theterm for malicious software designed to harm your system? A : Malware D: Hardware B: Driver C: Shareware
  • 81.
    Which of thesedevices is used to capture photos or videos into a computer? A : Monitor D: Webcam B: Speaker C: Mouse
  • 82.
    Which of thesedevices is used to capture photos or videos into a computer? A : Monitor D: Webcam B: Speaker C: Mouse
  • 83.
    What is thefull form of PDF? A : Printable Document Format D: Programming Data File B: Portable Document Format C: Public Display Format
  • 84.
    What is thefull form of PDF? A : Printable Document Format D: Programming Data File B: Portable Document Format C: Public Display Format
  • 85.
    Which program isused to access websites? A : Paint D: Excel B: Chrome C: Word
  • 86.
    Which program isused to access websites? A : Paint D: Excel B: Chrome C: Word
  • 87.
    What is thefunction of the Recycle Bin in Windows? A : Store copied files D: Temporarily store deleted files B: Delete system files C: Save recently opened apps
  • 88.
    What is thefunction of the Recycle Bin in Windows? A : Store copied files D: Temporarily store deleted files B: Delete system files C: Save recently opened apps
  • 89.
    Which of thefollowing is a presentation file format? A : .docx D: .exe B: .xlsx C: .pptx
  • 90.
    Which of thefollowing is a presentation file format? A : .docx D: .exe B: .xlsx C: .pptx
  • 91.
    What is theshortcut key to copy selected text? A : Ctrl + C D: Ctrl + P B: Ctrl + X C: Ctrl + V
  • 92.
    What is theshortcut key to copy selected text? A : Ctrl + C D: Ctrl + P B: Ctrl + X C: Ctrl + V
  • 93.
    What type ofsoftware is antivirus? A : Application software D: Programming software B: Utility software C: Operating system
  • 94.
    What type ofsoftware is antivirus? A : Application software D: Programming software B: Utility software C: Operating system
  • 95.
    What is thefunction of Ctrl + P? A : Print the document D: Play a video B: Paste text C: Pause music
  • 96.
    What is thefunction of Ctrl + P? A : Print the document D: Play a video B: Paste text C: Pause music
  • 97.
    What is aTrojan horse in computer terms? A : A backup software D: A server B: A type of malware hidden as legitimate software C: A graphic tool
  • 98.
    What is aTrojan horse in computer terms? A : A backup software D: A server B: A type of malware hidden as legitimate software C: A graphic tool
  • 99.
    Which one ofthese is a spreadsheet application? A : Powerpoint D: Google Docs B: MS Word C: MS Excel
  • 100.
    Which one ofthese is a spreadsheet application? A : Powerpoint D: Google Docs B: MS Word C: MS Excel
  • 101.
    What happens whenyou press Ctrl + X? A : Copies the text D: Undoes the action B: Cuts the text C: Pastes the text
  • 102.
    What happens whenyou press Ctrl + X? A : Copies the text D: Undoes the action B: Cuts the text C: Pastes the text
  • 103.
    What does IPaddress stand for? A : Internet Protocol Address D: Internet Provider Address B: Internet Profile C: International Page Address
  • 104.
    What does IPaddress stand for? A : Internet Protocol Address D: Internet Provider Address B: Internet Profile C: International Page Address
  • 105.
    What is thepurpose of software updates? A : Clean your device D: Reduce battery usage B: Fix bugs and add features C: Change screen resolution
  • 106.
    What is thepurpose of software updates? A : Clean your device D: Reduce battery usage B: Fix bugs and add features C: Change screen resolution
  • 107.
    What does thefile extension .txt stand for? A : Text file D: Toolkit B: Template file C: Table file
  • 108.
    What does thefile extension .txt stand for? A : Text file D: Toolkit B: Template file C: Table file
  • 109.
    What does Ctrl+ A do in most programs? A : Aligns text D: Auto saves file B: Adds new page C: Select all content
  • 110.
    What does Ctrl+ A do in most programs? A : Aligns text D: Auto saves file B: Adds new page C: Select all content
  • 111.
    What does adomain name represent? A : Email address D: Type of virus B: Physical address of a computer C: Human-readable web address like www.example.com
  • 112.
    What does adomain name represent? A : Email address D: Type of virus B: Physical address of a computer C: Human-readable web address like www.example.com
  • 113.
    Which application isbest for creating slide presentations? A : Word D: Powerpoint B: Excel C: Paint
  • 114.
    Which application isbest for creating slide presentations? A : Word D: Powerpoint B: Excel C: Paint
  • 115.
    What is abrowser cache used for? A : Increase internet speed D: Secure browsing B: Store frequently visited pages for quicker loading C: Backup data
  • 116.
    What is abrowser cache used for? A : Increase internet speed D: Secure browsing B: Store frequently visited pages for quicker loading C: Backup data
  • 117.
    INITIAL ROUNDS Image Round TechTrivia Tech Timeline 1: 2: 3: Myths or Facts? 4:
  • 118.
    Image Round • Eachteam will see one tech-related image (like a logo, gadget, or famous personality). • Teams must identify the image. • Teams have 1 minute to answer.
  • 119.
    Which company doesthis logo belong to?
  • 120.
    Which company doesthis logo belong to? An s: Nvidia
  • 121.
    What type ofhardware is shown in this image?
  • 122.
    What type ofhardware is shown in this image? An s: Graphics Card
  • 123.
    What is thename of this code editor?
  • 124.
    What is thename of this code editor? Ans: VS Code
  • 125.
  • 126.
    Which platform isthis? Ans: GitHub
  • 127.
    What is theimage shown here?
  • 128.
    What is theimage shown here? Ans : Vacuum Tubes
  • 129.
    What is theimage shown here?
  • 130.
    What is theimage shown here? Ans : Pinterest
  • 131.
  • 132.
    Whose picture isthis? Ans : Sundar Pichai
  • 133.
  • 134.
  • 135.
    What is thename of this web browser?
  • 136.
    What is thename of this web browser? Ans : Brave
  • 137.
    What is thename of this device?
  • 138.
    What is thename of this device? Ans : Arduino
  • 139.
  • 140.
    Which platform usesthis logo? Ans : Adobe Reader
  • 141.
    This logo representswhich AI tool?
  • 142.
    This logo representswhich AI tool? Ans : Copilot
  • 143.
    Which security featureis shown in the image?
  • 144.
    Which security featureis shown in the image? Ans : Firewall
  • 145.
    Which security featureis shown in the image?
  • 146.
    Which security featureis shown in the image? Ans : Linus Torvalds
  • 147.
    Which search engineis represented by this logo?
  • 148.
    Which search engineis represented by this logo? Ans : Bing
  • 149.
    This chip wasused in which generation of computers?
  • 150.
    This chip wasused in which generation of computers? Ans : 3rd Generation
  • 151.
    Identify this popularanimation and visual effects software.
  • 152.
    Identify this popularanimation and visual effects software. Ans : Blender
  • 153.
    Identify the populardigital assistant.
  • 154.
    Identify the populardigital assistant. Ans : Siri
  • 155.
    Identify this logoused to create and host websites.
  • 156.
    Identify this logoused to create and host websites. Ans : Wordpress
  • 157.
    Which online meetingplatform uses this logo?
  • 158.
    Which online meetingplatform uses this logo? Ans : Skype
  • 159.
    INITIAL ROUNDS Image Round TechTrivia Tech Timeline 1: 2: 3: Myths or Facts? 4:
  • 160.
    Timeline Round • Teamsget 4 tech events or product launches. • They must put these events in the correct chronological order. • Teams have 2 minutes per question for this round. • There will be total 3 questions.
  • 161.
    A: Launch ofWindows XP. D: Release of Windows 11. B: Introduction of the iPhone. C: Launch of Google Chrome. 1.
  • 162.
    A: Founding ofFacebook. D: Founding of Microsoft B: Launch of Android OS C: Facebook changes it‘s name to Meta. 2.
  • 163.
    A: Google acquiresYoutube. D: Elon Musk bought the twitter. B: Whatsapp acquired by Facebook. C: Release of ChatGPT. 3.
  • 164.
    Myth or Fact? • Each team hears a statement about tech. • They must say quickly whether each statement is a myth or a fact. • Teams get 30 seconds to answer.
  • 165.
    “Incognito mode hidesyour browsing activity from your internet provider.” Myth Fact
  • 166.
    “Incognito mode hidesyour browsing activity from your internet provider.” Myth Fact
  • 167.
    “HTML is aprogramming language.” Myth Fact
  • 168.
    “HTML is aprogramming language.” Myth Fact
  • 169.
    “Bluetooth uses radiowaves to transmit data.” Myth Fact
  • 170.
    “Bluetooth uses radiowaves to transmit data.” Myth Fact
  • 171.
    “Charging your phoneovernight damages the battery significantly.” Myth Fact
  • 172.
    “Charging your phoneovernight damages the battery significantly.” Myth Fact
  • 173.
    “Cookies on websitesare small files that store user information.” Myth Fact
  • 174.
    “Cookies on websitesare small files that store user information.” Myth Fact
  • 175.
    “The term "bug"in computing originated from a real insect.” Myth Fact
  • 176.
    “The term "bug"in computing originated from a real insect.” Myth Fact
  • 177.
    “The Internet andWi-Fi are same.” Myth Fact
  • 178.
    “The Internet andWi-Fi are same.” Myth Fact
  • 179.
    “ A firewallhelps protect your network from unauthorized access.” Myth Fact
  • 180.
    “A firewall helpsprotect your network from unauthorized access.” Myth Fact
  • 181.
    “Turning off Wi-Fiand Bluetooth when not in use improves phone security.” Myth Fact
  • 182.
    “Turning off Wi-Fiand Bluetooth when not in use improves phone security.” Myth Fact
  • 183.
    “Macs can’t getviruses.” Myth Fact
  • 184.
    “Macs can’t getviruses.” Myth Fact
  • 185.
    “The first computerprogrammer was a woman.” Myth Fact
  • 186.
    “The first computerprogrammer was a woman.” Myth Fact
  • 187.
    “Clearing cache helpsfix website loading issues.” Myth Fact
  • 188.
    “Clearing cache helpsfix website loading issues.” Myth Fact
  • 189.
    “1 Gigabyte equals1000 Megabytes.” Myth Fact
  • 190.
    “1 Gigabyte equals1000 Megabytes.” Myth Fact
  • 191.
    “All apps fromofficial app stores are guaranteed to be safe.” Myth Fact
  • 192.
    “All apps fromofficial app stores are guaranteed to be safe.” Myth Fact
  • 193.
    “Bluetooth can beused to transfer malware.” Myth Fact
  • 194.
    “Bluetooth can beused to transfer malware.” Myth Fact
  • 195.
    “RAM is thesame as storage.” Myth Fact
  • 196.
    “RAM is thesame as storage.” Myth Fact
  • 197.
    “Java and JavaScriptare the same thing.” Myth Fact
  • 198.
    “Java and JavaScriptare the same thing.” Myth Fact
  • 199.
    “Digital footprints canlast forever.” Myth Fact
  • 200.
    “Digital footprints canlast forever.” Myth Fact
  • 201.
    “Closing apps onyour phone always improves battery life.” Myth Fact
  • 202.
    “Closing apps onyour phone always improves battery life.” Myth Fact
  • 203.
    “Phishing is atype of cyberattack that tricks users into revealing information.” Myth Fact
  • 204.
    “Phishing is atype of cyberattack that tricks users into revealing information.” Myth Fact
  • 205.
    FINAL ROUNDS Direct andPass Round Field Frienzy Gambling Round 1: 2: 3:
  • 206.
    FINAL ROUNDS Direct andPass Round Field Frenzy Gambling Round 1: 2: 3:
  • 207.
    Field Frenzy • Thisis a category-based round. • There will be 5 different fields of computing (examples: AI, Cybersecurity, Software, Web Development, Hardware). • Each team must choose one field. • They will be asked 1 question based on their selected field. • The team with the highest score in the initial rounds/selection rounds chooses first; others follow in order. • There will be negative marking of 5 marks for the incorrect answer. • Time limit: 1 minute per question
  • 208.
    1: Cyber Security 4:Programming 2: Artficial Intelligence 3: Networking 5: Web development
  • 209.
    What does VPNstand for? A : Visual Protection Network D: Verified Protection Network B: Visual Protection Network C: Virtual Private Network
  • 210.
    What does VPNstand for? A : Visual Protection Network D: Verified Protection Network B: Visual Protection Network C: Virtual Private Network
  • 211.
    Which of thefollowing is an application of Artificial Intelligence? A : MS Excel D: Disk Cleanup Tool B: Face Detection C: File Compression Software
  • 212.
    Which of thefollowing is an application of Artificial Intelligence? A : MS Excel D: Disk Cleanup Tool B: Face Detection C: File Compression Software
  • 213.
    What is thepurpose of DNS in a network? A : Align IP addresses D: Increase Bandwidth B: Transfer file security C: Convert domain names to IP addresses
  • 214.
    What is thepurpose of DNS in a network? A : Align IP addresses D: Increase Bandwidth B: Transfer file security C: Convert domain names to IP addresses
  • 215.
    Which of thefollowing is used for web scripting on the client side? A : Java D: JavaScript B: Python C: PHP
  • 216.
    Which of thefollowing is used for web scripting on the client side? A : Java D: JavaScript B: Python C: PHP
  • 217.
    What is thepurpose of anchor tag (<a> tag) in HTML? A : Add animation D: Align text B: Insert Audio C: Create hyperlinks
  • 218.
    What is thepurpose of anchor tag (<a> tag) in HTML? A : Add animation D: Align text B: Insert Audio C: Create hyperlinks
  • 219.
    FINAL ROUNDS Direct andPass Round Field Frenzy Gambling Round 1: 2: 3:
  • 220.
    Direct and PassRound • Each team is asked one question in a fixed order. • If the team answers correctly, they score points. • If they cannot answer, the question is passed to the next team in order. • The passed question carries 2 marks. • The question is passed only once. • No negative marking in this round. • Time limit: 1 minute per question
  • 221.
    Who invented theWorld Wide Web? A : Bill Gates D: Charles Babbage B: Tim Berners-Lee C: Steve Jobs
  • 222.
    Who invented theWorld Wide Web? A : Bill Gates D: Charles Babbage B: Tim Berners-Lee C: Steve Jobs
  • 223.
    Which language isprimarily used for database queries? A : HTML D: SQL B: Ruby C: Python
  • 224.
    Which language isprimarily used for database queries? A : HTML D: SQL B: Ruby C: Python
  • 225.
    What type ofmalware replicates itself to spread to other computers ? A : Trojan D: Adware B: Spyware C: Worm
  • 226.
    What type ofmalware replicates itself to spread to other computers ? A : Trojan D: Adware B: Spyware C: Worm
  • 227.
    What is thefull form of HTML? A : HypeText Machine language D: None B: Hypertext Markup Language C: Hyperlink and Text Marking Language
  • 228.
    What is thefull form of HTML? A : HypeText Machine language D: None B: HyperText Markup Language C: Hyperlink and Text Marking Language
  • 229.
    Which of thefollowing is non-volatile type of memory? A : Cache D: Registers B: ROM C: RAM
  • 230.
    Which of thefollowing is non-volatile type of memory? A : Cache D: Registers B: ROM C: RAM
  • 231.
    Which computer memoryis fastest in terms of speed? A : Cache D: HDD B: ROM C: RAM
  • 232.
    Which computer memoryis fastest in terms of speed? A : Cache D: HDD B: ROM C: RAM
  • 233.
    What does LANrefer to? A : Local Area Network D: Low Activity Network B: Line Area Network C: Long Access Node
  • 234.
    What does LANrefer to? A : Local Area Network D: Low Activity Network B: Line Area Network C: Long Access Node
  • 235.
    Which language ismainly used for web styling? A : HTML D: Python B: CSS C: Java Script
  • 236.
    Which language ismainly used for web styling? A : HTML D: Python B: CSS C: Java Script
  • 237.
    Which part ofURL tells the browser which protocol to use? A : www D: Domain name B: .com C: https
  • 238.
    Which part ofURL tells the browser which protocol to use? A : www D: Domain name B: .com C: https
  • 239.
    Which language translatoris used by QBasic? A : Compiler D: Emulator B: Assembler C: Interpreter
  • 240.
    Which language translatoris used by QBasic? A : Compiler D: Emulator B: Assembler C: Interpreter
  • 241.
    What is a“bit” in computer terms? A : Virus D: Coding Language B: Storage device C: Smallest unit of data
  • 242.
    What is a“bit” in computer terms? A : Virus D: Coding Language B: Storage device C: Smallest unit of data
  • 243.
    What is themain purpose of a cache memory? A : Store data permanently D: Temporarily store frequently used data B: Perform Calculations C: Run antivirus
  • 244.
    What is themain purpose of a cache memory? A : Store data permanently D: Temporarily store frequently used data B: Perform Calculations C: Run antivirus
  • 245.
    Which device isused to connect a computer to a network? A : Modem D: Switch B: Scanner C: Hub
  • 246.
    Which device isused to connect a computer to a network? A : Modem D: Switch B: Scanner C: Hub
  • 247.
    Which language ismainly used for AI development? A : Python D: JavaScript B: SQL C: CSS
  • 248.
    Which language ismainly used for AI development? A : Python D: JavaScript B: SQL C: CSS
  • 249.
    Which device isresponsible for directing data packets between networks? A : Switch D: Hub B: Router C: Modem
  • 250.
    Which device isresponsible for directing data packets between networks? A : Switch D: Hub B: Router C: Modem
  • 251.
    What does TCPstand for? A : Transmission Control Protocol D: Transmission Computer Protocol B: Transfer Control Program C: Technical Computer Protocol
  • 252.
    What does TCPstands for? A : Transmission Control Protocol D: Transmission Computer Protocol B: Transfer Control Program C: Technical Computer Protocol
  • 253.
    What does CLSstand for in Qbasic? A : Clear Syntax D: Clear Screen B: Clear Statement C: Command Line Structure
  • 254.
    What does CLSstand for in QBasic? A : Clear Syntax D: Clear Screen B: Clear Statement C: Command Line Structure