General Technology Trivia 4 Flashcards

1
Q

A URL which is easy to type and remember is described in which way?

A

Friendly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

All blogs online and their interconnections is known as what?

A

Blogosphere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An end tag in HTML design has which other name?

A

Closing Tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ASCII text is alternatively known as which sort of text?

A

Plain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

And, not and or are known as which sorts of words?

A

Operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A sound which tells you someone else is trying to get through to you is what?

A

Call Waiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As of 2020, which continent has the lowest percentage of people online?

A

Afrika

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A space created by moving the first line in a Word document has which name?

A

Indent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A small piece of data sent from a website and stored on a browser has which name?

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A virus which locks your system until you pay a release fee has which name?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Angry Birds was created by a company in which country?

A

Finland

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What was the first decentralized cryptocurrency?

A

Bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who is credited with creating Bitcoin?

A

Satoshi Nakamoto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the maximum supply limit of Bitcoin?

A

21 million

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the term for the public ledger where all Bitcoin transactions are recorded?

A

Blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which cryptocurrency is known for its fast transaction confirmation times and low fees?

A

Litecoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the name of the blockchain platform that introduced smart contracts?

A

Ethereum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which cryptocurrency was created as a joke but gained significant popularity?

A

Dogecoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the name of the second-largest cryptocurrency by market capitalization?

A

Ethereum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the consensus algorithm used by Ethereum?

A

Proof of Work( POW)

21
Q

Which cryptocurrency introduced the concept of proof-of-stake?

A

Peercoin

22
Q

What is the term for a digital currency that is pegged to a stable asset like the US Dollar?

A

Stablecoin

23
Q

What is the process of converting fiat currency to cryptocurrency called?

A

Fiat-to-crypto conversion

24
Q

Which cryptocurrency was created by the founder of TRON as a decentralized platform for content sharing?

A

TRON(trx)

25
Q

What is the name of the cryptocurrency that aims to provide privacy and anonymity in transactions?

A

Monero

26
Q

What is the name of the first cryptocurrency exchange to achieve a billion-dollar valuation?

A

Coinbase

27
Q

Which cryptocurrency introduced the concept of zero-knowledge proofs for enhanced privacy?

A

Zcash

28
Q

Which country is known for being the largest producer of Bitcoin due to its abundant supply of cheap electricity?

A

China

29
Q

What is the term for an initial coin offering, where new cryptocurrencies are sold to investors?

A

ICO (Initial Coin Offering)

30
Q

Who is the co-founder of Apple Inc. alongside Steve Jobs?

A

Steve Woznoik

31
Q

What is the name of the microblogging platform founded by David Karp?

A

Tumblr

32
Q

What is the name of the search engine founded by Jerry Yang and David Filo?

A

Yahoo

33
Q

Who is the founder of Dell Technologies, a multinational technology company?

A

Michael Dell

34
Q

What type of cyberattack involves flooding a network or website with excessive traffic to disrupt its normal functioning?

A

DDoS (Distributed Denial of Service) attack

35
Q

What is the practice of tricking individuals into revealing sensitive information by posing as a trustworthy entity?

A

Phishing

36
Q

What is the name for a type of malware that encrypts files on a victim’s computer and demands a ransom for their release?

A

Ransomware

37
Q

What is the term for a cybersecurity attack that targets the vulnerabilities in a computer’s operating system or software?

A

Exploit

38
Q

What is the act of intercepting and stealing private information transmitted over a network known as?

A

Eavesdropping

39
Q

What type of attack involves an attacker gaining control over a victim’s computer or network without their knowledge?

A

Remote acess attack

40
Q

What is the practice of guessing passwords or using automated tools to gain unauthorized access to a system called?

A

Bruteforce

41
Q

What is the name for a program or code that spreads from one computer to another without the user’s knowledge or consent?

A

Worm

42
Q

What is the term for a cyberattack that targets a specific individual or organization with the goal of stealing sensitive information?

A

Targeted Attack

43
Q

What is the act of exploiting human psychology to manipulate individuals into performing certain actions or revealing sensitive information?

A

Social Engineering

44
Q

What is the term for a type of malware that secretly records keystrokes on a victim’s computer?

A

Keylogger

45
Q

What is the name for a cyberattack that involves infiltrating a network and exfiltrating sensitive data without detection?

A

Advanced Persistent Threat (APT)

46
Q

What is the act of altering or manipulating data during transmission to gain unauthorized access or cause damage?

A

Man-in-the-Middle (MitM) attack

47
Q

What is the practice of sending fraudulent emails that appear to come from reputable organizations in order to deceive recipients?

A

Spoofing

48
Q

What is the act of redirecting network traffic to a fake website that resembles a legitimate one?

A

Pharming

49
Q

What is the term for a cyberattack that involves stealing sensitive data by exploiting a weak point in a web application?

A

SQL injection