Browse Definitions :
Quiz

Quiz: Believe it or Not: Do you speak Geek?

The world of technology is full of wild and wacky facts. We've assembled a collection of them here, with some outlandish fibs thrown in for good measure. Take our April Fool's quiz to see if we can fool you!

1. The first computer ever designed, called the Difference Engine, was powered by a wind-up crank on the side. True or false?
Answer

2. It would take approximately 86 trillion years to download a 1-yottabyte file. True or false?
Answer

3. The Melissa virus was named after Melissa Gilbert, star of "Little House on the Prairie." True or false?
Answer

4. In this era of politically correct language, McAfee (the antivus company) has decided use the term "PUPs" (potentially unwanted programs) rather than "spyware." True or false?
Answer

5. You may remember Bill Gates encountering the blue screen of death when he demonstrated Windows 98 at Comdex. At a recent show, he topped that by crashing both the Media Center PC and the X-box. True or false?
Answer

6. The term virus comes from a Latin word meaning slimy liquid or poison. True or false?
Answer

7. A kludge is a defective copy of a software application. True or false?
Answer

8. The complete works of Shakespeare requires less storage space than a single minute of high fidelity audio. True or false?
Answer

9. If you toss a coin five times and each time the result is heads-up, the odds are that the next toss will result in tails. True or false?
Answer

10. A megaflop is the lowest consumer rating for a computer. True or false?
Answer

 

How many could you guess correctly without peeking? Let us know!

This was last updated in August 2008

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close