General Technology Trivia 4 Flashcards
A URL which is easy to type and remember is described in which way?
Friendly
All blogs online and their interconnections is known as what?
Blogosphere
An end tag in HTML design has which other name?
Closing Tag
ASCII text is alternatively known as which sort of text?
Plain
And, not and or are known as which sorts of words?
Operators
A sound which tells you someone else is trying to get through to you is what?
Call Waiting
As of 2020, which continent has the lowest percentage of people online?
Afrika
A space created by moving the first line in a Word document has which name?
Indent
A small piece of data sent from a website and stored on a browser has which name?
Cookies
A virus which locks your system until you pay a release fee has which name?
Ransomware
Angry Birds was created by a company in which country?
Finland
What was the first decentralized cryptocurrency?
Bitcoin
Who is credited with creating Bitcoin?
Satoshi Nakamoto
What is the maximum supply limit of Bitcoin?
21 million
What is the term for the public ledger where all Bitcoin transactions are recorded?
Blockchain
Which cryptocurrency is known for its fast transaction confirmation times and low fees?
Litecoin
What is the name of the blockchain platform that introduced smart contracts?
Ethereum
Which cryptocurrency was created as a joke but gained significant popularity?
Dogecoin
What is the name of the second-largest cryptocurrency by market capitalization?
Ethereum
What is the consensus algorithm used by Ethereum?
Proof of Work( POW)
Which cryptocurrency introduced the concept of proof-of-stake?
Peercoin
What is the term for a digital currency that is pegged to a stable asset like the US Dollar?
Stablecoin
What is the process of converting fiat currency to cryptocurrency called?
Fiat-to-crypto conversion
Which cryptocurrency was created by the founder of TRON as a decentralized platform for content sharing?
TRON(trx)
What is the name of the cryptocurrency that aims to provide privacy and anonymity in transactions?
Monero
What is the name of the first cryptocurrency exchange to achieve a billion-dollar valuation?
Coinbase
Which cryptocurrency introduced the concept of zero-knowledge proofs for enhanced privacy?
Zcash
Which country is known for being the largest producer of Bitcoin due to its abundant supply of cheap electricity?
China
What is the term for an initial coin offering, where new cryptocurrencies are sold to investors?
ICO (Initial Coin Offering)
Who is the co-founder of Apple Inc. alongside Steve Jobs?
Steve Woznoik
What is the name of the microblogging platform founded by David Karp?
Tumblr
What is the name of the search engine founded by Jerry Yang and David Filo?
Yahoo
Who is the founder of Dell Technologies, a multinational technology company?
Michael Dell
What type of cyberattack involves flooding a network or website with excessive traffic to disrupt its normal functioning?
DDoS (Distributed Denial of Service) attack
What is the practice of tricking individuals into revealing sensitive information by posing as a trustworthy entity?
Phishing
What is the name for a type of malware that encrypts files on a victim’s computer and demands a ransom for their release?
Ransomware
What is the term for a cybersecurity attack that targets the vulnerabilities in a computer’s operating system or software?
Exploit
What is the act of intercepting and stealing private information transmitted over a network known as?
Eavesdropping
What type of attack involves an attacker gaining control over a victim’s computer or network without their knowledge?
Remote acess attack
What is the practice of guessing passwords or using automated tools to gain unauthorized access to a system called?
Bruteforce
What is the name for a program or code that spreads from one computer to another without the user’s knowledge or consent?
Worm
What is the term for a cyberattack that targets a specific individual or organization with the goal of stealing sensitive information?
Targeted Attack
What is the act of exploiting human psychology to manipulate individuals into performing certain actions or revealing sensitive information?
Social Engineering
What is the term for a type of malware that secretly records keystrokes on a victim’s computer?
Keylogger
What is the name for a cyberattack that involves infiltrating a network and exfiltrating sensitive data without detection?
Advanced Persistent Threat (APT)
What is the act of altering or manipulating data during transmission to gain unauthorized access or cause damage?
Man-in-the-Middle (MitM) attack
What is the practice of sending fraudulent emails that appear to come from reputable organizations in order to deceive recipients?
Spoofing
What is the act of redirecting network traffic to a fake website that resembles a legitimate one?
Pharming
What is the term for a cyberattack that involves stealing sensitive data by exploiting a weak point in a web application?
SQL injection