General Technology Trivia 4 Flashcards

(49 cards)

1
Q

A URL which is easy to type and remember is described in which way?

A

Friendly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

All blogs online and their interconnections is known as what?

A

Blogosphere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An end tag in HTML design has which other name?

A

Closing Tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ASCII text is alternatively known as which sort of text?

A

Plain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

And, not and or are known as which sorts of words?

A

Operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A sound which tells you someone else is trying to get through to you is what?

A

Call Waiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As of 2020, which continent has the lowest percentage of people online?

A

Afrika

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A space created by moving the first line in a Word document has which name?

A

Indent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A small piece of data sent from a website and stored on a browser has which name?

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A virus which locks your system until you pay a release fee has which name?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Angry Birds was created by a company in which country?

A

Finland

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What was the first decentralized cryptocurrency?

A

Bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who is credited with creating Bitcoin?

A

Satoshi Nakamoto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the maximum supply limit of Bitcoin?

A

21 million

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the term for the public ledger where all Bitcoin transactions are recorded?

A

Blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which cryptocurrency is known for its fast transaction confirmation times and low fees?

A

Litecoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the name of the blockchain platform that introduced smart contracts?

A

Ethereum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which cryptocurrency was created as a joke but gained significant popularity?

A

Dogecoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the name of the second-largest cryptocurrency by market capitalization?

A

Ethereum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the consensus algorithm used by Ethereum?

A

Proof of Work( POW)

21
Q

Which cryptocurrency introduced the concept of proof-of-stake?

22
Q

What is the term for a digital currency that is pegged to a stable asset like the US Dollar?

23
Q

What is the process of converting fiat currency to cryptocurrency called?

A

Fiat-to-crypto conversion

24
Q

Which cryptocurrency was created by the founder of TRON as a decentralized platform for content sharing?

25
What is the name of the cryptocurrency that aims to provide privacy and anonymity in transactions?
Monero
26
What is the name of the first cryptocurrency exchange to achieve a billion-dollar valuation?
Coinbase
27
Which cryptocurrency introduced the concept of zero-knowledge proofs for enhanced privacy?
Zcash
28
Which country is known for being the largest producer of Bitcoin due to its abundant supply of cheap electricity?
China
29
What is the term for an initial coin offering, where new cryptocurrencies are sold to investors?
ICO (Initial Coin Offering)
30
Who is the co-founder of Apple Inc. alongside Steve Jobs?
Steve Woznoik
31
What is the name of the microblogging platform founded by David Karp?
Tumblr
32
What is the name of the search engine founded by Jerry Yang and David Filo?
Yahoo
33
Who is the founder of Dell Technologies, a multinational technology company?
Michael Dell
34
What type of cyberattack involves flooding a network or website with excessive traffic to disrupt its normal functioning?
DDoS (Distributed Denial of Service) attack
35
What is the practice of tricking individuals into revealing sensitive information by posing as a trustworthy entity?
Phishing
36
What is the name for a type of malware that encrypts files on a victim's computer and demands a ransom for their release?
Ransomware
37
What is the term for a cybersecurity attack that targets the vulnerabilities in a computer's operating system or software?
Exploit
38
What is the act of intercepting and stealing private information transmitted over a network known as?
Eavesdropping
39
What type of attack involves an attacker gaining control over a victim's computer or network without their knowledge?
Remote acess attack
40
What is the practice of guessing passwords or using automated tools to gain unauthorized access to a system called?
Bruteforce
41
What is the name for a program or code that spreads from one computer to another without the user's knowledge or consent?
Worm
42
What is the term for a cyberattack that targets a specific individual or organization with the goal of stealing sensitive information?
Targeted Attack
43
What is the act of exploiting human psychology to manipulate individuals into performing certain actions or revealing sensitive information?
Social Engineering
44
What is the term for a type of malware that secretly records keystrokes on a victim's computer?
Keylogger
45
What is the name for a cyberattack that involves infiltrating a network and exfiltrating sensitive data without detection?
Advanced Persistent Threat (APT)
46
What is the act of altering or manipulating data during transmission to gain unauthorized access or cause damage?
Man-in-the-Middle (MitM) attack
47
What is the practice of sending fraudulent emails that appear to come from reputable organizations in order to deceive recipients?
Spoofing
48
What is the act of redirecting network traffic to a fake website that resembles a legitimate one?
Pharming
49
What is the term for a cyberattack that involves stealing sensitive data by exploiting a weak point in a web application?
SQL injection