This quiz was held at Cambridge School, Indirapuram on 9th November, 2015 as a part of the annual IT fest, Infoyage 2015, organized by In-X Union, the IT club of Cambridge.
The Final Round of the Sub-Junior Quiz at Access 2016, held on 16th and 17th of December, 2016
Prepared by - Apratim Chandra Singh, Ayan Marwaha, Paavas Bhasin
Hosted By - Ayan Marwaha
The Final Round of the Sub-Junior Quiz at Access 2016, held on 16th and 17th of December, 2016
Prepared by - Apratim Chandra Singh, Ayan Marwaha, Paavas Bhasin
Hosted By - Apratim Chandra Singh & Paavas Bhasin
This quiz was held at Cambridge School, Indirapuram on 9th November, 2015 as a part of the annual IT fest, Infoyage 2015, organized by In-X Union, the IT club of Cambridge.
The Final Round of the Sub-Junior Quiz at Access 2016, held on 16th and 17th of December, 2016
Prepared by - Apratim Chandra Singh, Ayan Marwaha, Paavas Bhasin
Hosted By - Ayan Marwaha
The Final Round of the Sub-Junior Quiz at Access 2016, held on 16th and 17th of December, 2016
Prepared by - Apratim Chandra Singh, Ayan Marwaha, Paavas Bhasin
Hosted By - Apratim Chandra Singh & Paavas Bhasin
This is the Finals of the Quiz conducted by conducted by Cryptex Quiz Club in the School Sri Sowdeswari Vidyalaya...! More than 1000 students participated in which 5 teams consisting of each 2 members were selected for the Finals.This Quiz was a great success that it created a awareness among the school students about quiz.
This is the Finals of the Quiz conducted by conducted by Cryptex Quiz Club in the School Sri Sowdeswari Vidyalaya...! More than 1000 students participated in which 5 teams consisting of each 2 members were selected for the Finals.This Quiz was a great success that it created a awareness among the school students about quiz.
Bosco Bit 2018 IT Quiz (Prelims+Finals)Annway Ghosh
An intra-school IT Quiz for classes IX-XII, conducted and researched by two first-time quizmasters, Nillohit Manna and Shaunak Sengupta, at Don Bosco School, Park Circus, Kolkata. Cutoffs in the preliminary round was 13 and highest was 23.5 with all stars. The winning team scored 175.
Background infoSteve Paul Jobs was born on February 24, 1955 t.docxwilcockiris
Background info
Steve Paul Jobs was born on February 24, 1955 to biological parents Joanne Carole Schieble and Abdulfattah Jandali. He was put up for adoption for unknown reasons, and was adopted by Justin and Clara Jobs of Mountain View, California. Jobs initially became interested in electronics around the age of 11 with a neighbor/friend Bill Fernandez. In 1972, Jobs graduated from Homestead High School. Bill introduced Jobs to Steve Wozniak. Jobs and Wozniak sold blue boxes and small devices that would allow the calling of international numbers for free. He enrolled in Reed College. Eventually, Jobs realized that higher education would not give him what he expected in life; after six months he dropped out. In 1974, he returned to the United States, and began to attend meetings of the Homebrew Computer Club with Wozniak. When he was 19, he got a job at Atari, with the primary goal of saving up for a spiritual trip to India. He traveled throughout India for a month, with his best friend Dan Kottke, looking for enlightenment. Instead of enlightenment, he experienced disappointment. When Jobs returned, he learned that Wozniak had created a design for a personal computer (which he called Apple I). This marked the beginning of Apple Computer Inc, on April 1st, 1976.
The first sale of the Apple I happened at a local computer store, The Byte Shop. They bought fifty Apple computers at $500 each. In April 1977 at the West Coast Computer Faire, the Apple II was introduced. Wozniak’s new design, with its compactness, performance, and disk drives became an instant success. After introducing the Apple II, Jobs started on the next great project, Lisa. The main feature of Lisa was its Graphical User Interface (GUI). Also, this machine came with the first affordable mouse. Because of his managerial style, and the tension with Apple’s president Mike Scott, this lead to Jobs' exclusion from the Lisa project. Instead, Steve Jobs was named Chairman of the Board. Later, Jobs moved on to taking over a small R&D group working on a computer called the Macintosh (Mac). Both the Lisa and the Apple III, were attempts to respond to the release of the IBM PC. The Lisa, which was released on January 19, 1983, was a failure because of its high price. On January 24, 1984, the Macintosh was released to great fanfare. Unfortunately, it did not sell well. It did have some successes on US college campuses. This lead to increased tensions between Jobs and the new CEO John Sculley, which resulted in Jobs being removed from the Mac and Lisa divisions.
Steve Jobs, hired five people away from Apple, and created a new company NeXT Computer, Inc. Jobs initially aimed to make the perfect company, with first-class offices on the Stanford University campus, and a $100,000 logo created by the renowned Yale professor Paul Rand. On October 12th 1988, NeXT Computer released the NeXT Cube. It was an elegant machine with new technologies including an magneto-optical drive, Digital Signa.
This was the quiz that was used for an inter-school tech fest, Incognito 2016, held at Somerville School, Noida. The quiz had a Game of Thrones theme and was a huge success.
Notable questions : Round 1 - #1, Round 2 - #1,6,8, Round 3 - #1,4,5,7, Round 4 - #1
The powerpoint file of the SciTech/IT quiz I hosted at Pailan's Antimatter fest on 3rd march 2015. Top 2 teams finished at 140 and 165 respectively.
These are the questions asked in the main round of Cybermania - a computer quiz held at Loyola School, Jamshedpur, India. The quiz was for students of standard 6 to 10.
If you have any doubts or further questions, contact the quizmaster at Twitter: @divyekapoor or on Google+ at http://gplus.to/divyekapoor
I'll be happy to share the slides with you if you ask me politely on any of these social networks. :)
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
2. Primus
• Direct question :- +10 for right answer.
• Passed question :- +5 points for right answer.
• No negative points for wrong answer.
• No infinite loop.
3. Q1
__________________ , was an
English mathematician and writer chiefly
known for her work on Charles Babbage's
early mechanical general-purpose
computer, the Analytical Engine. Her notes on
the engine include what is recognized as the
first algorithm intended to be processed by a
machine. Because of this, she is often
considered the world's first
computer programmer !
5. Q2
_____________ is a phrase that has become
widely adopted to refer to employees who
bring their own computing devices – such
as smartphones, laptops and PDAs – to the
workplace for use and connectivity on the
corporate network.
13. Q6
On 8 June 1954, X’s cleaner found him dead. He
had committed suicide the previous day. A post-
mortem examination established that the cause
of death was cyanide poisoning.
On 10 September 2009, following an Internet
campaign, British Prime Minister Gordon
Brown made an official public apology on behalf
of the British government for "the appalling way
X was treated". Identify X
15. Link-It-Up
• Connect the images to get the answer.
• Direct question : +20 for right answer, -10 for
wrong answer.
• Passed question : +10 for right answer, -5 for
wrong answer.
• No infinite loop.
28. 3’s a Company
• It’s a buzzer round.
• 3 clues per question each leading to a single
COMPANY.
• If answered after first clue, +30 points.
• If answered after second clue, +20 points.
• If answered after third clue, +10 points.
• Half the points deducted for wrong answer !
33. C1
This American multinational company holds
a Royal Warrant from HM Queen Elizabeth
II and the Prince of Wales which enables
them to advertise the fact that they supply to
the royal family.
34. C2
It was founded in 1906 in Rochester as The
Haloid Photographic Company, which
originally manufactured photographic paper
and equipment.
37. Buzzinga
• It’s a buzzer round
• +20 for right answer, -5 for wrong answer.
• If a question is being read, it won’t be read
further on the buzzer being pressed.
50. Bid-2-Win
• Place your bid( 30/20/10 ) before selecting the
topic of your choice.
• Points awarded for correct answer.
• Half the points bid deducted for wrong
answer.
51. Topics
• Gaming
• Operating System
• Automobiles
• Social Networks
• Nobel Prize Winner
• Programming Language
• Entertainment
Exit
52.
53. Gaming
X is a video game franchise created by Jordan
Mechner, originally developed for and
released on the Apple II Computer in 1989.
The original game and its first sequel were
2D platform games, but the series made the
switch to three-dimensional following the
release of X 3D in 1999. Id X.
59. Automobile
Originally, 18.28% of X was owned by
the Indian government, and 54.2% by Y of
Japan. The BJP-led government held an initial
public offering of 25% of the company in June
2003. As of May 2007, the government of
India sold its complete share to Indian
financial institutions and no longer has any
stake in X. Id X & Y.
62. Social Networks
Mark Zuckerberg wrote X, the predecessor to
Facebook, on October 28, 2003, while
attending Harvard as a sophomore. According
to The Harvard Crimson, the site was
comparable to Hot or Not, and "used photos
compiled from the online facebooks of nine
houses, placing two next to each other at a
time and asking users to choose the 'hotter'
person“. Id X.
68. Programming Language
X named in honor of the French
mathematician and philosopher Y, was
developed by Niklaus Wirth. Before his work
on X, Wirth had developed Euler and ALGOL
W and later went on to develop the X-like
languages Modula-2 and Oberon.
71. Entertainment
X is a nationwide network of radio stations
in India. It is owned by the Entertainment
Network India Ltd (ENIL), which is one of the
subsidiaries of The Times Group. Identify X.