Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

CSIT Henyo

Rule:
- within 2 minutes the players must guess correctly the given word
- no coaching and cheating
- the words for the partner of the guesser are only OO, HINDI, PWEDE, YES, NO, & MAYBE
- additional 5 seconds to the overall time if the players violate the given rules.

WORDS:

1. Switch

2. Ethernet Cable

3. Charles Babbage

4. Motherboard

5. IntelliJ IDE

6. Eclipse

7. MySQL

8. Laptop

9. James Gosling

10. Mark Zuckerberg


Quiz Bee:

QUESTION CATEGOTY ANSWER

Number of layers in the OSI Networking (c) 7


(Open Systems Interconnection)
Model
(a) 9
(b) 3
(c) 7
(d) 11
Which one is the first fully General IT Concepts (c) Linux
supported 64-bit operating
system
(a) Windows Vista
(b) Mac
(c) Linux
(d) Windows XP
Who invented Java? Basic Programming Concepts (b) James Gosling
(a) Grace Murry Hopper
(b) James Gosling
(c) Ray Tomlinson
(d) J.M. Coetzee
What is Scareware? CyberSecurity (b) fake antivirus softwares
(a) virus
(b) fake antivirus softwares
(c) malware
(d) spyware
Which of the following IP Networking (d) 127.0.0.1
addresses is allocated for
localhost connections.
(a) 127.1.0.0
(b) 127.1.0.1
(c) 127.0.1.0
(d) 127.0.0.1
List of requirements provided Softwar Engineering (c) Backlogs
by the product owner in a
Scrum
(a) User Stories
(b) Sprint
(c) Backlogs
(d) Tasks
This is an agile approach where Softwar Engineering (b) Kanban
rules are not necessarily
defined and tasks may or may
not follow a start and end date.
(a) Scrum
(b) Kanban
(c) Incremental
(d) Sprint
What type of JOIN query is used Database (c) Inner Join
to selects records that have
matching values in both tables?
(a) LEFT JOIN
(b) RIGHT JOIN
(c) INNER JOIN
(d) CROSS JOIN
A security measure that CyberSecurity (c) Multi-factor Authentication
requires users to providetwo or
more form of authentication
before they can access an
account
(a) Cross-Factor Authentication
(b) Two-Factor Authentication
(c) Multi-Factor Authentication
(d) Adaptive-Factor
Authentication
The time taken for a signal to Networking (d) Round Trip Time
reach the destination and travel
back to the sender with the
acknowledgment
(a) Two-way Trip Delay Time
(b) Two-way Trip Time
(c) Round Trip Delay Time
(d) Round Trip Time
_______ operators are used to Algorithm and Logic Formulation Logical
combine conditional
statements. AND, OR, and NOT
belong to this operator
Two friends decided to write CyberSecurity Caesar's Cipher
their message in such a way
that each letter of the message
is replaced by a letter seven
positions down the alphabet.
So, instead of writing “Apple,”
they would write “hwwsl” (A ->
H, P -> W, L -> S, E -> L). To turn
the message back into its
original form, they’d have to
replace the letter seven
positions up the alphabet order.
What do you call this data
encryption which is also based
on the name of a known Roman
emperor and military general ?
In Scrum methodology, what do Softwar Engineering Scrum
you call the collection of people
together working on a sprint?
Which among the selection Database (d) SELECT * FROM
below is a valid query? employee_tbl WHERE
(a) SELECT * WHERE emp_type emp_type = 2 ORDER BY
= 2 FROM employee_tbl ORDER emp_age
BY emp_age
(b) SELECT * FROM
employee_tbl ORDER BY
emp_age WHERE emp_type = 2
(c) SELECT * WHERE emp_type
= 2 ORDER BY emp_age FROM
employee_tbl
(d) SELECT * FROM
employee_tbl WHERE
emp_type = 2 ORDER BY
emp_age
This is a type of method where Basic Programming Concepts abstract method
the implementation or the
method body is defined in
another class.
CIA Triad is a security model to CyberSecurity Integrity
ensure IT security. CIA stands
for confidentiality, integrity,
and availability. Which model
protects data from deletion or
modification by an unintended
person?
_____________ is an SDLC Softwar Engineering waterfall
model in which the next phase
starts only after the first phase
is completed
What do you call a sequence of Basic Programming Concepts Regular Expression
characters that forms a search
pattern? This is also
abbreviated as regex.
ChatGPT is an artificial- General IT Concepts OpenAI
intelligence chatbot launched in
November 2022 and developed
by ____________.
It is an exception often used to Basic Programming Concepts (c) IllegalArgumentException
capture errors when a provided
method value does not meet
expectations
(a) IllegalStateException
(b) ArithmeticException
(c) IllegalArgumentException
(d) NullPointerException
What is the output of the Algorithm and Logic Formulation result = true
program below?
int num1 = 16;
int num2 = 27;
int num3 = 9;
boolean result = ((num1 >=
num2) && (num2 <= num3)) ||
!(num3 >= num1);
System.out.print("result =
"+result);
What is the name for the HTTP Networking Internal server error
status code 500?
Type of testing the application Softwar Engineering white box testing
with the knowledge of the
internal structure and code
implementation.
The process of removing Database Normalization
redundant data from the
database by splitting the table
in a well-defined manner in
order to maintain data integrity
Allows a program to operate Basic Programming Concepts Threads/Java Threads
more efficiently by doing
multiple things at the same
time.
What is the name of the latest General IT Concepts Tiramisu
android OS version which is also
a cake flavor?
What is the binary equivalent of Algorithm and Logic Formulation 01000011 01000101 01010101
CEU if its hexadecimal
counterparts are 43, 45, and 55
respectively?
Unit exchanged between Networking packets
Networks
A short block of code which Basic Programming Concepts lambda expression
takes in parameters and returns
a value but they do not need a
name and they can be
implemented right in the body
of a method. It is also denoted
using an arrow operator.
It is an experimental General IT Concepts Google Bard AI
conversational AI service owned
by Google as a counter for
ChatGPT.

You might also like