Browse Definitions :

Quiz: Do you eat Geek?

Do you eat Geek?

The Urban Dictionary defines Geek food as

Food that, stereotypically, computer geeks , specifically programmers, eat. The food falls into three categories: high in calories , easy to make, and high in caffeine. The idea of geek food comes from programmers staying late into the night, well, programming. In order to waste no time, they need sustenance that can be made quickly and can give them a caffeine boost. Some typical foods include hot pockets, ramen , Jolt cola , take-out Chinese and various chips.

We're inclined to agree. With that in mind, we ask if you too, "eat Geek." You know is always trying to keep you up to date with Geek Speak . After all, we live in the geekosphere ourselves. You probably remember bit stuffing from our Thanksgiving trivia last year, when we found out if you talked tech turkey . If you eat with a geeky family, the odds are that you'll find the children well on their way to being alpha geeks themselves. If a parent says that they should take smaller bites, it's likely to be confused with bytes . Asking for a bit more may result in similar confusion, even resulting in bit robbing between siblings. If you want to chop carrots and ask for a board , beware. Don't make them laugh, however, while you enjoy BlackBerry pie for dessert. They might bluesnarf out of their noses. Try and see if you can guess a few other geeky foods in this quiz.

1. If you're a geek eating Mexican, you might be confused about asking for a mole sauce. Instead of chocolate-based sauce, you might get a mole of sauce. How much would that be?

2. Ask a geek for a cookie and you're liable to get something installed on your Web browser instead of something sweet and delicious. What is it?

3. If you're not a geek, you might think an Avogadro is the basic ingredient of guacamole. If you know your math, you know Avogadro refers to something (and someone) quite different. Who is it?

4. If you put a geek in charge of plating out dinner for company, you might run into some pretty specific questions about the amount of substance that is supposed to be served. How much food is that?

5. A bechamel is a famous French sauce. Tell a geek to make one, however, and you risk getting a becquerel instead. What is it?

6. If you send a geek to go grocery shopping, you might be taking a risk. These days, many people are looking beyond beef for their burgers. Tuna, turkey or even veggies end up in the toasted buns. Ask a geek for bison, however, and you're liable to get this instead. What is it?

7. Hey! No feeding the dog from the table. While border collies and German Shepherds are known for being smart dogs, this cyberhound takes the geeky cake. What is it?

8. Beware sushi "specials," as eating some kinds of fish might make you rather sick. Blowfish might be quite safe while anything the restaurant bought from phishermen might be less so. Ask a geek for boilerplate to cook the fish, however, and you might end up with this instead of a heat source. What is it?

9. No one ever wants to find a bug in a glass of Wine . Geek culture, however, tends to thrive more on caffeine than alcohol. If you ask for beans to make a cup of coffee, however, you might get these instead. What are they?

10. Messy geeks might leave a trail of breadcrumbs on the break table; online they might be a bit more tidy. True of False: Would they be better of eating in a clean room ?

11. With attention spread thin between blog s, podcast s, webcast s, Internet radio , log file s, interoffice memo s, BlackBerry s, Treo s, email and help desk ticket s, geeks might well end up letting a meal burn . That's why geeks tend to love microwave s. Would doing a cook-off test first help?

12. No discussion of geeky food would be complete without at least one mention of spam. While you can take an entire quiz worth of spam if you like, we suggest you make yourself a lovely spam cocktail (a Cosmo ?) and guess what skit performed by a certain comedy troupe was the inspiration for the bulk email that fills our inboxes. What was it?

13. Ask a geek about crackers and you're not likely to hear about something that goes well with cheese. What is a geek more likely to think a cracker is?

14. Easter eggs are fun to find but not typically very tasty. You're not likely to make much of an omelet from a cuckoo egg , either. Are they good for anything else?

15. We've never heard of any geek making a decent steak from a dogcow . Would a geek ever try eating dogfood ?

16. Geeks returning from CES usually are exposed to a lot of eye candy , though it only leaves them hungry for more. Is eye candy ever good enough to eat?

17. Geeks admit it: long days and odd working hours can mean a lot of fast food consumption. If you're in a rush, will a fat Mac be as filling as a Big Mac?

18. Pietro Ferrero, an Italian pastry maker, created Nutella (a tasty blend of hazelnut and chocolate) while cocoa was scarce in WWII Europe. If you ask a geek for Nutella, however, what P2P service are you likely to receive a link to?

19. If you ask a geek to about the honeypot, you might just get an explanation of wireless security instead of something sweet. What is the geek talking about?

20. Beware of Web developers. Ask this particular class of geeks about ice, jello or liquid and you might hear about this instead. What is it?

21. Talk to a sysadmin about jam and you're more likely to hear about this than any fruit-based spread. Is jam always good to eat?

22. Last but not least, is it time to go out to lunch if you see a geek waving a dead chicken ?

Did you enjoy this quiz? Let us know how you did ( email us ) and then try out one of our many other fun geeky quizzes .

This was last updated in August 2008

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.


File Extensions and File Formats


  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...


  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...




  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • capacity management

    Capacity management is the broad term describing a variety of IT monitoring, administration and planning actions that are taken ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...