Regardless of whether you are an IT professional, passionate gamer, hardcore power user or simply a fan of exciting nerd knowledge-here you show everyone that you really have it!
The coolest knowledge test in the field of computer, gaming, software and hardware.
INFO
All questions are multiple choice
One or more answers can be correct
The maximum score is 100
In total 124 Questions (~ 32 Min)
Your result, pictures/photos as well as the explanation and sources come via email
Over 225 Topics pictures, photos and screenshots
No newsletter is subscribed to
Your data will not be saved
What can you expect in the IT & gaming quiz?
The IT & Gaming quiz takes you on an exciting journey through the world of computers, video games and technology. From legendary graphics cards to revolutionary operating systems to iconic cheat codes and curious IT facts-here you can demonstrate your knowledge. How did the first mouse come about and what made it so special? Which graphics cards have changed the gaming world forever? Why did a famous game of the 90s be the reason for the development of an essential Windows technology today? In this quiz you will learn more about the beginnings of computer hardware, networks and even about the most bizarre moments of technology history.
The world of games is not neglected either. From the first real 3D game to the milestones of Voxel technology-here you will encounter classics that have shaped the gaming industry. Discover what secrets are behind the biggest gimmicks and which famous bugs have influenced whole genres. Do you remember the iconic cheatcodes that were not missing in any game at the time? Or to the scandal that almost stopped one of the best-known open world games in history?
Technical revolutions such as the first portable computers, the introduction of hardware acceleration in games and the age of high-end graphics cards also play a major role. Networks and internet technologies are also dealt with. From the first internet messenger to the birth of the first registered domain to the origin of the notorious HTTP error code-the quiz leads through the most important stations of digital evolution.
There are also many exciting stories in the world of hackers and IT security. Which virus has deactivated themselves because someone registered a certain website by chance? What is behind the term 'bad twin' in the area of network security? And how did early hackers manage to manipulate telephone networks with the simplest means?
The quiz also deals with iconic hardware and software products that deserve their place in history. From the first personal computer with a graphical user interface to the first AI program from the 1960s to an operating system that was advertised with a world-famous song. Many of these developments are a matter of course today, but the stories behind it are often surprising. Even supposedly small details of technology history have a big impact.
Why does a CD have exactly 12 cm diameter and a term of 74 minutes? Why is a certain teapot to this day the best known 3D reference model? And why does every iPhone advertising photo contain a very specific time? This quiz is perfect for everyone who is enthusiastic about computers, gaming and digital technologies. Whether retro fan, IT professional or just curious-here you can prove that you are a real expert. Immerse yourself in the fascinating world of technology and ask yourself the tricky questions!
LET'S GO
1
What was GTA (Grand Theft Auto) originally supposed to be called? Erklärung: An unemployed Scotsman created a billion-dollar franchise and changed the gaming world forever. David Jones was just an ordinary citizen from Dundee, Scotland – no one knew his name until he lost his job. With his final severance pay, he bought an old computer and began programming in his bedroom – driven by a single idea: total freedom in a virtual city. With no money but a clear vision, he founded a small studio with friends – DMA Design. What started as a simple police game took a different turn by accident: it was far more fun to escape the police than to play them. Chaos became the principle – and that’s exactly what convinced BMG Interactive, a music publisher in search of digital hits. BMG financed the first version of Grand Theft Auto, which was released in 1997 and spread rapidly – raw, rebellious, revolutionary.
Later, Take-Two Interactive acquired the rights, founded Rockstar Games, and turned GTA into a global brand. What began as a small experiment became one of the most successful games in the world: Grand Theft Auto.
From cardboard models to a billion-dollar business: Grand Theft Auto is now one of the most important and successful brands in the entertainment industry – a milestone in gaming history. Yet the beginnings were anything but glamorous.
Originally conceived under the working title Race’n’Chase, the game was designed as a police-and-gangster scenario in which players could either commit crimes or uphold the law. Developed by the Scottish studio DMA Design (now Rockstar North), the project began in 1995 as a top-down racing game with simple mechanics. The vision was ambitious – the resources, however, were limited: the first city prototype was built out of cardboard to get a sense of the street layout, traffic flow, and gameplay potential. An improvised solution that symbolized the inventive spirit with which the team worked.
A random programming error – a so-called bug – caused the police units in the game to behave aggressively and unpredictably. Instead of fixing the issue, the team recognized its potential: chaos became the core gameplay. What began as a bug became a trademark – and thus the birth of a cult.
What followed was an unprecedented rise. With GTA III (2001), the series revolutionized the genre: an open 3D world, cinematic storytelling, social commentary, and unprecedented freedom of action defined a new chapter in video game history.
The most successful installment to date, GTA V (2013), sold over 190 million units and generated more than $8 billion in revenue – making it one of the most influential media products of all time. Its production costs amounted to around $265 million – a record that underscored Rockstar Games’ ambitions.
With the upcoming GTA VI (announced for 2026), the series reaches a new scale. According to estimates, development costs will exceed the $1 billion mark – a benchmark that puts even Hollywood to shame. From cardboard models to a billion-dollar global brand: Grand Theft Auto is no longer just a game. It is a cultural monument – born out of improvisation, shaped by courage, and driven by the will to redefine the medium.
2
How can you wake up a computer? Erklärung: A computer can be awakened (started) using Wake-on-LAN (WoL) with a Magic Packet. This special data packet is sent over the network to the network card of the sleeping PC. The prerequisite is that WoL is enabled both in the BIOS and in the operating system.
3
Which graphics card was considered the holy grail of real-time rendering for 9 years and was also the only one to exclusively support 8xSGSSAA (Sparse Grid Super Sampling Anti-Aliasing)? Erklärung: The Voodoo5 6000 was a legend – an unmatched piece of technology by 3dfx that was far ahead of its time. With four VSA-100 GPUs and true 8x SGSSAA, it delivered image quality that even modern cards wouldn't reach until years later. No other GPU offered this level of anti-aliasing perfection. The GeForce2 Ultra was fast, but lacked true SGSSAA. The ATi Rage Fury Maxx suffered from driver issues. The S3 Savage 2000 was a technical failure.
Yet despite its potential, the Voodoo5 6000 never officially made it to market – only a few prototypes exist today, highly sought after by collectors and retro enthusiasts. 3dfx collapsed just before its big breakthrough, was eventually acquired by NVIDIA, and vanished from the market.
To this day, 3dfx remains a myth – and the Voodoo5 6000 the unrivaled holy grail for graphics enthusiasts.
4
Which game(s) were the first flagship titles and pioneers of the 3Dfx era? Erklärung: The 3Dfx era revolutionized PC gaming with its Glide API and introduced stunning graphics. *Tomb Raider* received sharper textures and smoother animations with 3Dfx support. *Need for Speed 2 SE* was among the first to use 3D acceleration for more realistic cars and environments. *Unreal* set new standards with the Unreal Engine and brilliant lighting. While some games used Direct3D or OpenGL, these four titles were the pioneers that established 3Dfx as the king of graphics acceleration.
In the late 1990s, 3Dfx graphics cards with the Glide API brought a massive leap in PC gaming quality. Glide was specifically developed for 3Dfx hardware and offered excellent performance along with significantly enhanced visuals. Games ran more smoothly and looked better thanks to bilinear filtering, higher resolutions, fog and lighting effects, and transparency. Many developers optimized their games specifically for Glide, making these versions often the best-looking and fastest. Classics like *Unreal*, *Tomb Raider*, or *Quake II* greatly benefited – 3Dfx made real 3D gaming truly impressive for the first time.
5
Which expansion board allowed sound cards to be upgraded with a MIDI synthesizer to achieve better, more vibrant sound in games? Erklärung: The wavetable expansion board significantly improved the MIDI sound of sound cards by using real instrument-based samples instead of simple synthesis. This made music in games like *Doom* or *Monkey Island* more vibrant and realistic. Wavetable synthesizers provided high-quality MIDI audio and were developed by manufacturers such as Roland, Yamaha, and Creative as add-ons for ISA or PCI sound cards.
6
What is the term for infected program code that replicates itself and spreads autonomously? Erklärung: A worm is a type of malware that independently replicates and spreads, often through networks, without needing to infect a file. Famous examples include ILOVEYOU and Blaster.
7
What was the world's first website? Erklärung: The world's first website was info.cern.ch, created in 1991 by Tim Berners-Lee at CERN (the European Organization for Nuclear Research). It served as an introduction and documentation for the World Wide Web, explaining how the web works and how to create your own website.
8
On December 15, 2000, the graphics card king – 3Dfx – was acquired by Nvidia due to bankruptcy. Which graphics cards therefore never made it to market? Erklärung: On December 15, 2000, a significant era in graphics technology came to an end when Nvidia acquired the bankrupt company 3dfx Interactive. Due to this abrupt termination, some of the most promising graphics cards were never officially released. These included the spectacular Voodoo5 6000, a high-end flagship featuring four VSA-100 GPUs and 128 MB RAM, which was set to establish new standards in 3D graphics. Also affected was the Specter 4000, an advanced Rampage prototype intended to reclaim dominance over Nvidia and ATI.
In contrast, two other cards made it to market just in time: the Voodoo5 4500 with a single VSA-100 GPU, and the Voodoo5 5500 with two GPUs – serving as a kind of compromise for the unreleased 6000 model.
The Rampage project, also known as “Specter,” was intended as a technological realignment for 3dfx. This graphics chip was designed to surpass the technical limits of the older Voodoo generation and to compete with Nvidia’s GeForce and ATI’s Radeon through a modern architecture. Planned features included true 32-bit color depth for brilliant image quality, advanced texture filtering, and – for the first time in a 3dfx product – integrated hardware support for Transformation & Lighting (T&L), comparable to GeForce and Radeon GPUs.
Additionally, Rampage was to offer programmable pixel shader–like functions, which at the time was a groundbreaking innovation. A fast DDR memory interface was also planned, enabling high bandwidth for graphics-intensive games. Particularly noteworthy was the planned support for an enhanced SLI (Scan Line Interleave) system, allowing multiple Rampage chips to be combined to significantly boost graphics performance.
In fact, Rampage prototypes had already been manufactured and successfully tested internally. These demonstrated that 3dfx was technologically competitive and close to a successful comeback. However, financial difficulties and development delays ultimately prevented a final market launch.
The premature end of 3dfx leaves Rampage as one of the biggest “what-if” scenarios in computer graphics history. Many of Rampage’s innovations later indirectly found their way into Nvidia and ATI technologies, leaving a lasting impact on the evolution of graphics hardware.
Did you know: A Russian engineer named Anthony managed to bring a fully functional version of the Voodoo5 6000 to life through extensive reverse engineering. With deep technical expertise, he reconstructed the card’s complex design and resolved known stability issues. Thanks to his work, the Voodoo5 6000 now runs more stably on modern hardware than ever before. This project is considered a true masterpiece in the retro hardware scene.
9
Which CLI.exe in Valve's Hammer Map Editor (e.g., for a Counter-Strike map) compiles the lightmaps based on the law of energy conservation? Erklärung: The rad.exe is responsible for calculating the lightmaps in BSP trees and uses the law of energy conservation to simulate realistic light distribution. It computes how light rays are reflected off surfaces and stores the results as static lighting. Other compiler tools have different roles: vis.exe optimizes geometry visibility for better performance, bsp2.exe converts raw geometry into BSP structures, and csg.exe processes the map geometry. Only rad.exe calculates the light distribution and generates the final lightmaps.
10
Which game was the primary reason Microsoft developed WinG and later DirectX? Erklärung: "The Lion King" (1994) was partly responsible for the development of WinG and later DirectX by Microsoft. While the game ran smoothly under MS-DOS, it suffered from major performance issues under Windows—mainly due to the lack of efficient graphics interfaces. This deficiency prompted Microsoft to develop WinG, an early graphics API that ultimately paved the way for DirectX. Ironically, it was "The Lion King" that triggered a fundamental improvement in the Windows gaming platform.
11
Which messenger is considered the first true internet messenger? Erklärung: ICQ ("Oh Oh") was the first true internet messenger and was released in 1996 by Mirabilis. It introduced features like online status, instant messaging, and user IDs (UINs), revolutionizing online communication. Other messengers appeared later or had a different focus: Yahoo Messenger (1998) and MSN Messenger (1999) came afterward, while AOL Instant Messenger (AIM, 1997) was limited to the AOL network. ICQ was the first universal messenger not tied to a specific service and shaped the modern instant messaging culture.
12
Which device was needed to remove the write protection on the backside of a 5¼-inch floppy disk to double its storage capacity? Erklärung: A disk notcher was necessary to remove the write protection of a 5¼-inch floppy disk and allow writing on the reverse side. These disks had a write-protect notch that drives would detect – by punching an additional hole on the opposite side, a single-sided disk could be used as double-sided, effectively doubling the storage capacity.
13
What could you do with a pencil? Erklärung: You could actually overclock a processor with a pencil! On AMD Athlon and Duron CPUs in the early 2000s, the L1 bridges on the processor surface were intentionally cut to lock the multiplier. Using a pencil, you could reconnect these bridges with the conductive graphite, allowing you to change the multiplier.
14
Which key could be used up to around the Pentium 1 era to change the processor speed so that games would run at their intended speed? Erklärung: The Turbo button was a unique feature on older PCs up to the Pentium 1 era that allowed users to reduce processor speed. Originally intended as a performance boost, it was ironically often used to slow down older games, since many DOS games were programmed for fixed CPU speeds and became unplayable on faster systems. Paradoxically, pressing the Turbo button usually made the computer slower – contrary to what the name might suggest.
15
Which escape sequence represents a carriage return plus line feed? Erklärung: The escape sequence CR LF stands for Carriage Return (CR) and Line Feed (LF), originating from the era of mechanical typewriters and teletypes. CR moves the print head to the beginning of the line, while LF moves it down one line. This combination is still used today in Windows as the standard for line breaks. It's particularly noticeable when opening Windows text files on Unix or Linux systems, where the extra CR characters often appear as disruptive control characters (e.g., ^M). CR LF also continues to play a technical role in many network protocols such as HTTP or SMTP, where it separates headers from content. For example, when you press the Enter key in Microsoft Word, these two commands – carriage return and line feed – are executed in the background to produce a full line break.
16
What was the first game to use a voxel engine instead of polygons? Erklärung: Comanche: Maximum Overkill (1992) by NovaLogic was the first game to use a voxel engine instead of traditional polygons. Developed by NovaLogic, the Voxel Space Engine allowed for extremely detailed, organic landscapes that were revolutionary at the time – ideal for the realistic terrain of a helicopter combat game. The Need for Speed (1994), Quake (1996), and Half-Life (1998), like nearly all 3D games, were based on polygons.
17
Which version of Windows 95 supported the FAT32 file system? Erklärung: Windows 95b (OSR2) and Windows 95c (OSR2.5) were the first versions of Windows 95 to support the FAT32 file system. FAT32 allowed for larger partitions (>2 GB) and more efficient storage management compared to FAT16, which was limited to 2 GB partitions. Earlier versions could not use FAT32: Windows 95 (RTM) and Windows 95a (Service Release 1) only supported FAT16. FAT32 was introduced with the later OEM Service Releases (OSR2/2.5), which were typically shipped only with new PCs and were not available as standard upgrades.
18
What was the name of the first commercially available microprocessor? Erklärung: The Intel 4004 was the first commercially available microprocessor and was released by Intel in 1971. It had a 4-bit architecture and was originally developed for calculators. It laid the foundation for modern CPUs. Other processors came later or served different purposes: the TMS1000 (1974) by Texas Instruments was the first microcontroller with integrated RAM and ROM. The Intel 8008 (1972) was a successor to the 4004 with an 8-bit architecture. The Z80 (1976) by Zilog became popular in home computers.
19
What are the origins of the Half-Life 1 engine GoldSrc? Erklärung: The GoldSrc engine, which powers Half-Life 1, is based on the Quake engine by id Software. Valve licensed the Quake engine (1996) and significantly expanded it with scripting, skeletal animation, improved AI, and more complex physics—enabling the unique immersion of Half-Life (1998). Other engines had different origins: the Doom engine (1993) was 2.5D and not fully 3D. The SAGE engine was developed later for real-time strategy games like Command & Conquer. The Unreal Engine by Epic was an entirely separate engine with different technologies.
20
What was the name of the graphics API introduced by 3Dfx for Voodoo graphics cards? Erklärung: Glide was the proprietary graphics API developed by 3Dfx, specifically optimized for Voodoo graphics cards. It offered high performance and enabled impressive 3D graphics with enhanced anti-aliasing and texture filtering, but was only compatible with 3Dfx hardware.
21
Which technology, introduced in 1998, allows multiple graphics cards to be linked together to distribute and increase processing power? Erklärung: SLI (Scan-Line Interleave) was introduced by 3Dfx in 1998 to link multiple Voodoo2 graphics cards and distribute the processing load. This nearly doubled performance by having each card render alternating scan lines. Nvidia later adopted and enhanced SLI for modern GPUs.
Today, however, SLI is considered outdated, as modern games and engines are rarely optimized for multi-GPU setups. The technical effort required for clean frame splitting, synchronization, and driver support is high, while actual performance gains often fall short of expectations. One particularly disruptive issue was so-called micro-stuttering—short, irregular delays in frame output. These occur when two GPUs fail to deliver frames in perfectly even intervals: for example, one frame appears very quickly, while the next takes longer, despite a high overall FPS count. The result: even with high theoretical frame rates, the image can feel choppy, as the human eye is sensitive to smooth motion. In fast-paced games, micro-stuttering significantly degrades the experience. Since modern GPUs now offer enough power to run demanding titles smoothly with a single card, Nvidia has largely discontinued traditional SLI in favor of professional technologies like NVLink.
22
Which texture mapping algorithm simulates pseudo-3D depth (depending on the viewing angle) without actual geometry modification (tessellation)? Erklärung: Parallax Mapping, Bump Mapping, and Normal Mapping are texture algorithms that create the illusion of depth without altering the actual geometry. They simulate light and shadow effects based on the viewing angle, giving surfaces a three-dimensional appearance without using additional polygons. Displacement Mapping, on the other hand, is not just a simulation—it actually modifies the geometry of a model through tessellation by converting height information into real geometric displacement. This requires more processing power and results in physically deformed surfaces. Only the other techniques leave the geometry unchanged.
23
What was the very first game console? Erklärung: The Magnavox Odyssey was the very first game console and was developed by Ralph Baer in 1972. It used interchangeable modules but had no actual CPU—instead, it relied on simple logic circuits. Games like Table Tennis (a predecessor to Pong) were included. Other consoles came later: the Atari 2600 (1977) was the first console with cartridges and shaped the industry. The Coleco Telstar (1976) was a Pong console without real modules. The Interton Video 2000 (1978) was only released in Europe.
24
Which animal is commonly known as the symbol of a Trojan malware? Erklärung: The horse is the symbol of a Trojan because the term originates from the story of the Trojan Horse in Greek mythology. The Greeks hid soldiers inside a giant wooden horse to secretly infiltrate Troy—similarly, Trojan viruses embed malicious code within seemingly harmless programs.
25
For which platform was Cinema 4D Version 1.0 released? Erklärung: Cinema 4D Version 1.0 was released in 1990 exclusively for the Amiga. Developed by MAXON, it took advantage of the Amiga’s powerful graphics capabilities, which were especially popular in the demoscene and 3D animation at the time. The software offered early 3D modeling and rendering tools that were later further developed.
26
What was the name of the geometric basis on which the Nvidia NV1 from 1995 operated? Erklärung: The NV1 was developed based on Non-Uniform Rational B-Splines (NURBS) – mathematical curves and surfaces primarily used in CGI and CAD applications. Unlike polygon-based rasterization, NVIDIA pursued an innovative approach to redefine the future of graphics technology. However, it was not commercially successful, as only a few games supported this method. One of the few titles that actually utilized the NV1’s NURBS technology was *Virtua Fighter Remix*, a revised version of Sega’s popular fighting game.
27
Which bug/glitch gave GTA 1 (Grand Theft Auto) its breakthrough and eventual success? Erklärung: A bug in the police AI helped GTA 1 achieve its breakthrough. Originally, police officers were only supposed to chase the player, but a flaw caused them to behave extremely aggressively and recklessly—they rammed cars, ran over pedestrians, and escalated chases. This made the game more chaotic, entertaining, and unpredictable, which became the core appeal of GTA.
28
What was the name of the first mobile phone game? Erklärung: The first true mobile phone game was Snake, which appeared on the Nokia 6110 in 1997. It quickly became a cult classic due to its simplicity, addictiveness, and preinstallation on many Nokia models. Snake was one of the first games specifically developed for mobile phones and laid the foundation for mobile gaming. The other games are incorrect: Pac-Man, Asteroids, and Pong are early arcade classics but were not initially released on mobile phones. Pong (1972) was the first major video game, but not a mobile one.
29
A parameter error in the very first Tomb Raider game gave Lara Croft her iconic bust size. What was the resulting size? Erklärung: A parameter error in the modeling of Lara Croft in Tomb Raider (1996) by Core Design caused her bust size to be scaled to 150% instead of the originally intended value. This unintended figure was kept because it amused the design team and fit the character's stylized appearance.
30
What was the name of the scandalous mod (sex minigame) in GTA: San Andreas? Erklärung: The infamous Hot Coffee mod for GTA: San Andreas (2004) unlocked a hidden sex minigame that was originally present in the game’s code but not officially accessible. Through modifications, players could experience interactive sex scenes with in-game girlfriends instead of a fade-to-black screen. The scandal led to massive controversy, the game's re-rating to 'Adults Only' (AO), and product recalls.
31
Which ingredients are used in cryptography and encryption to prevent rainbow table attacks? Erklärung: In cryptography, the terms salt and pepper are used to make passwords more secure. Salt is a random value added to a password before hashing to prevent rainbow table attacks. Pepper is a secret, system-wide key that is also hashed with the password to make attacks even more difficult.
32
What BNC terminator resistor was required to properly terminate a 10BASE2 network during a LAN party? Erklärung: A 10BASE2 network (also known as Thin Ethernet or BNC network) had to be terminated at both ends with a 50-ohm terminator resistor. This resistor prevented signal reflections, which would otherwise interfere with the network and make data transmission unreliable. If one of these terminators was missing, electrical signals would reflect at the open end of the cable—leading to data collisions, packet loss, and potentially a complete network failure. Especially at LAN parties, a forgotten or loosely connected terminator often caused frustration: the entire network would fail to function until the missing resistor was found and properly connected.
33
What was the name of the first personal computer that featured a mouse and a graphical user interface? Erklärung: The Apple Lisa (1983) was the first personal computer with a mouse and a graphical user interface (GUI). Developed by Apple, it was based on technologies inspired by Xerox PARC. Lisa introduced many modern concepts but was expensive and commercially unsuccessful—the breakthrough came later with the Macintosh (1984).
34
Which graphics standard was used for the first Larry game, Leisure Suit Larry: In the Land of the Lounge Lizards? Erklärung: Leisure Suit Larry: In the Land of the Lounge Lizards (1987) ran using EGA (Enhanced Graphics Adapter), a 16-color graphics standard with a resolution of 640x350 pixels. EGA offered significantly better color representation than its predecessor CGA, making Larry’s humorous world appear more vibrant.
35
Where does the name 'Guybrush', the protagonist of Monkey Island, come from? Erklärung: The name Guybrush originated during the development of Monkey Island and has a humorous backstory: In Deluxe Paint, the graphics software used by the developers, the character was saved as 'guy.brush' — 'guy' as a placeholder for the character, and '.brush' as the file extension. The name stuck, and Guybrush Threepwood was born.
36
Which graphics card was the first to introduce the hardware Transform and Lighting (T&L) feature? Erklärung: The GeForce 256 by Nvidia (1999) was the first graphics card to feature hardware Transform & Lighting (T&L). This feature shifted geometry calculations from the CPU to the GPU, enabling more realistic 3D graphics and improved performance—a milestone in modern GPU development.
37
What do you call a legitimate-looking but fake Wi-Fi access point? Erklärung: An 'Evil Twin' is a fake Wi-Fi access point that poses as a legitimate network to trick users into connecting. Hackers use this method to intercept passwords, emails, or other data through man-in-the-middle attacks—especially dangerous in public Wi-Fi environments.
38
Which game is considered the first to contain an Easter egg? Erklärung: The first known Easter egg in a video game appeared in *Adventure* (1979) for the Atari 2600. Developer Warren Robinett hid his name in a secret room because Atari did not allow developers to be credited. Players had to pick up an invisible pixel and bring it to a specific wall to reveal the hidden message.
39
What is still the standard save icon today? Erklärung: The standard save icon is still the floppy disk, even though it has long been obsolete. In the 1980s and 1990s, the 3.5-inch floppy disk was the main medium for storing and transferring data. When graphical user interfaces emerged, it became the universal symbol for saving—and it has remained so to this day, even though many younger users have never used a real floppy disk.
40
Which of the following is not a programming language? Erklärung: HTML (HyperText Markup Language) is not a programming language but a markup language used to structure web pages. It defines layout and content but cannot perform logic or calculations—for that, languages like JavaScript are needed.
41
What is directly associated with an IBM keyboard? Erklärung: QWERTZ is directly associated with IBM keyboards, as it is the standardized keyboard layout for German typewriters and computers. IBM popularized many modern layouts with its legendary Model M keyboard (1985), including QWERTY (US) and QWERTZ (DE).
The layout does not follow an alphabetical order like ABCDEFG, because the mechanics of early typewriters did not function efficiently that way. An alphabetical arrangement would have placed frequently used letter pairs too close together, causing typebars to jam during fast typing. To prevent this, letters were deliberately distributed to reduce mechanical collisions—leading to the creation of layouts like QWERTY and later QWERTZ. This principle was retained in computer keyboards, even though the original technical limitations no longer apply.
42
Which file format supports an integrated (premultiplied alpha) alpha channel? Erklärung: An integrated alpha channel (premultiplied alpha) stores transparency information directly alongside color values, allowing smooth transitions and correct color blending. PNG, for example, uses 8 bits for the alpha channel—offering 256 levels of transparency. Formats like PNG and TIFF support premultiplied alpha, making them ideal for graphics with soft edges, shadows, or blended elements.
GIF, on the other hand, only supports binary transparency—a pixel can be either fully visible or fully invisible. It does not support semi-transparent pixels or smooth transitions between color and transparency. This becomes problematic for graphics with rounded shapes or curves, which usually rely on partially transparent edge pixels to create visually smooth transitions (antialiasing). Since GIF doesn't support those gradations, curves or circular objects often appear jagged and pixelated in GIF format. Visible color fringes may also occur when an image originally created on a colored background is exported as a GIF with binary transparency. These limitations make GIF unsuitable for modern, high-quality visuals with transparent backgrounds.
JPEG, meanwhile, does not support transparency at all—neither binary nor with an alpha channel—making it unfit for this purpose.
Although GIF is technically outdated—it supports only 256 colors and lacks true transparency—it remains widely used. The main reason is its broad support across nearly all browsers, apps, and platforms. It is also ideal for short, looping animations, which made it the standard for memes and reaction images on the internet. Its simplicity and universal compatibility keep it relevant, despite more modern alternatives like WebP or APNG.
43
Which keys became the known gaming standard? Erklärung: The WASD keys became the gaming standard for first-person shooters and many other games. They allow for an ergonomic hand position, with the left hand on the keyboard and the right hand on the mouse. This layout became especially popular through games like Quake (1996).
44
What is commonly used as a synonym for programming errors or software anomalies? Erklärung: The term 'bug' is commonly used as a synonym for programming errors or software anomalies. The origin of the term dates back to an anecdote from 1947, when engineers working on a Harvard Mark II computer found an actual moth inside a relay that caused a malfunction. Since then, the term 'bug' has been used to describe software errors.
45
What does the Screen of Death represent after a BSoD critical system error? Erklärung: The Blue Screen of Death (BSoD) is the well-known error screen that appears during a critical system crash in Windows. It signals severe hardware or driver issues and often displays error messages or debug codes. The blue background was chosen because it stood out clearly from other UI elements.
46
Under which codename was Windows 95 developed? Erklärung: Windows 95 was developed under the codename Chicago. This codename was used internally by Microsoft during development and reflected the ambition to create a groundbreaking and user-friendly operating system. Windows 95 introduced many new features such as the Start Menu and Plug and Play. Other codenames are incorrect: Whistler was the codename for Windows XP. Interface Manager was the codename for Windows 1.0. Longhorn was an internal codename for Windows Vista.
47
What do some computer mice absolutely require in order to function? Erklärung: Earlier mechanical computer mice required a ball that rolled on a surface to detect movement. The ball was connected to wheels and sensors that translated the mouse’s motion into X and Y coordinates. This type of mouse was widespread before the introduction of optical mice.
48
Which map is not a Counter-Strike map? Erklärung: Deck16 is not a Counter-Strike map—it originally comes from the game Unreal Tournament and was also used in Quake. It was one of the most well-known deathmatch maps in those games and highly appreciated by the community. However, it was never officially part of the Counter-Strike game and is therefore not one of its classic maps. In contrast, Militia, 747, and Dust are official and iconic Counter-Strike maps frequently played in competitive matches and tournaments.
49
Into which pixel block size units does the JPEG compression algorithm divide an image? Erklärung: The JPEG compression algorithm divides an image into 8x8 pixel blocks to efficiently compress image data. Each block is then transformed into frequency components using the Discrete Cosine Transform (DCT), which removes redundant data and reduces file size. These 8x8 blocks are critical for compression efficiency.
The choice of exactly 8x8 blocks is a compromise between computational effort, memory usage, and compression quality. Smaller blocks would result in fewer visible artifacts under heavy compression but require more processing power. Larger blocks might compress more efficiently but produce more noticeable block artifacts. The 8x8 size strikes a technically sound balance and is well-suited for DCT, as efficient algorithms exist specifically for this size—especially considering the hardware limitations at the time JPEG was developed.
50
Which vehicle do you start with in GTA San Andreas? Erklärung: In GTA San Andreas, you start the game with a bicycle as the protagonist CJ returns to Los Santos after being picked up by the police. The bicycle is a lightweight means of transportation that allows you to quickly move through the city streets before gaining access to other vehicles.
51
Rise and Shine, Mr __________! Rise and Shine! Erklärung: The famous line 'Rise and shine, Mr. Freeman! Rise and shine!' comes from the game Half-Life 2 (2004) and is spoken by the G-Man to Gordon Freeman, the game's protagonist. G-Man awakens Freeman from his long stasis at the start of the game, marking the beginning of the story. The G-Man is one of the most mysterious figures in the Half-Life universe. His background remains largely unknown, and Valve has never provided a clear explanation of his origin or true intentions.
52
Which drive letters are historically—and partly for compatibility reasons—reserved for floppy drives? Erklärung: The drive letters A: and B: are historically and for compatibility reasons reserved for floppy drives. In the early days of PCs, floppy disks were the primary medium for storage and data transfer, so these drive letters were by default assigned to 1.44 MB 3.5-inch floppy drives. Even today, A: and B: are still reserved on many systems for floppy drives or used as placeholders for unconnected devices. Other letters like C: and D: are typically used for hard drives or other storage media.
53
Which game was not released on a 5¼-inch floppy disk? Erklärung: Cannon Fodder (1993) was not released on a 5¼-inch floppy disk but rather on a 3.5-inch disk, as it required greater storage capacity for its advanced graphics and extensive game content.
54
Which data type does not allow floating-point numbers? Erklärung: The Integer data type does not allow floating-point numbers because it only stores whole numbers without decimal places. Typical examples of integers are -1, 0, 1, 2, and so on. In contrast, Float, Double, and Single support the storage of floating-point numbers—i.e., numbers with decimal points—and define in programming languages how the data should be interpreted and processed in memory, assuming the underlying hardware (e.g., the CPU) efficiently supports floating-point operations. These data types differ in precision and memory usage: Float uses 32 bits, Double uses 64 bits, and Single is synonymous with Float in some languages.
Modern CPUs rely heavily on floating-point operations because many core tasks in engineering, science, graphics, physics engines, AI, and multimedia require precise and flexible number processing. Unlike integers, which allow only whole number steps, floating-point numbers can represent very large and very small values—including many decimal places. To perform such operations efficiently, CPUs and GPUs include specialized floating-point units (FPUs) designed to handle Float and Double data types. Without this hardware support, many modern applications would not be feasible.
55
In which programming language was Photoshop 1.0.1 primarily (about 75%) written? Erklärung: Photoshop 1.0.1 was primarily written in Pascal, with around 75% of the code written in this language. At the time, Pascal was a popular programming language for application development and helped the developers structure the complex code for such a graphically intensive piece of software.
56
What does NVIDIA mean? Erklärung: The name NVIDIA is derived from the Latin words 'Invidia' (envy) and 'Videre' (to see), essentially meaning 'to see' or 'the envy of seeing.' The name was chosen to emphasize the company's vision of revolutionizing graphics performance and technology while surpassing the competition.
57
What is the hexadecimal equivalent of the decimal number 255? Erklärung: The decimal number 255 corresponds to the hexadecimal value FF. This is because FF in the hexadecimal system represents the maximum value for 8 bits (1 byte), which equals 255 in decimal. The conversion works as follows: F = 15 in decimal, so F * 16^1 + F * 16^0 = 15 * 16 + 15 = 255. 1A equals 26 in decimal, 7D is 125, and C8 corresponds to 200.
The hexadecimal system was introduced because it offers a compact and readable representation of binary values. A single hex digit represents exactly 4 bits, so 1 byte (8 bits) can conveniently be written as two hex digits. This makes hexadecimal especially useful in computer science—for example, when debugging, displaying memory, working with machine code, or defining color values (such as #FF0000 for red). Compared to binary, hexadecimal is much shorter and more readable, yet still closely tied to the underlying hardware structure.
58
The blockbuster game Grand Theft Auto was originally developed by DMA Design. Which game made the studio famous? Erklärung: The studio DMA Design became famous with the game *Lemmings*, which was released in 1991. It was an innovative puzzle game where players had to guide a group of lemmings through dangerous environments by assigning them different abilities. *Lemmings* was a major success and helped establish DMA Design, which later went on to develop the world-famous *Grand Theft Auto*.
59
What was the first web browser, which was also developed on a Steve Jobs NeXT computer? Erklärung: The first web browser developed on a NeXT computer by Steve Jobs was Nexus. This browser was created in 1990 by Tim Berners-Lee and his team at CERN and was one of the first browsers used to display HTML documents. It played a crucial role in the birth of the World Wide Web. NCSA Mosaic (1993) was the first popular web browser, but it was not developed on a NeXT computer. Netscape Navigator (1994) was the first commercial browser and came later. Viola was an early browser as well, but not developed on NeXT machines.
60
What does the Millennium Bug (Y2K problem) refer to? Erklärung: The Millennium Bug, also known as the Y2K problem, primarily affected older computer systems that stored years using only two digits—for example, '99' instead of '1999'. When January 1, 2000 arrived, many of these systems interpreted '00' not as 2000, but as 1900. This led to incorrect calculations, faulty date comparisons, and in some cases, system crashes or malfunctions—in areas like financial systems, time tracking, flight booking, or industrial controls.
The root of this problem lay in early computing practices: from the 1960s to the 1980s, memory was extremely expensive and limited. To save resources, dates were often stored with just two digits. For millions of records—such as in banks or government databases—this meant substantial savings. Additionally, many developers assumed their software wouldn't be used for more than a few years—no one expected programs from the 1970s to still be running in 2000.
This seemingly minor design decision turned into a global IT concern decades later. Fears of potential disasters led to massive worldwide investments in testing, updates, and contingency plans. In the end, serious failures were largely avoided—not because the risk was small, but because it was addressed through extensive preparation. The Millennium Bug remains one of the most expensive yet instructive lessons in software development history.
61
Who built the world's first functional binary floating-point computer in 1941? Erklärung: In 1941, Konrad Zuse built the Z3, the world’s first functional binary floating-point computer. It was the first fully automatic, programmable computer and operated using binary floating-point arithmetic. Zuse’s work laid the foundation for modern computing.
The use of floating-point numbers was a major advancement, as it allowed for efficient representation of both very large and very small numbers—with a dynamic range. Unlike integers, which cover fixed value ranges, floating-point numbers enable mathematically precise calculations across multiple orders of magnitude. This is essential for scientific computing, engineering, simulations, and graphics applications. The fact that Zuse implemented floating-point arithmetic in the Z3 as early as the 1940s highlights how visionary his work was—and why it is considered a milestone in the history of computing.
62
In which computer game was the SCUMM system used for the first time? Erklärung: The SCUMM system (Script Creation Utility for Maniac Mansion) was first used in *Maniac Mansion* (1987). Developed by Lucasfilm Games (later LucasArts), it enabled user-friendly controls and complex interactions in point-and-click adventure games, which became a hallmark of LucasArts titles. The other games are incorrect: *Leisure Suit Larry* used Sierra’s AGI system. *Zak McKracken* came later and also used SCUMM, but not first. *Out Run* was an arcade racing game and had nothing to do with SCUMM.
63
Which operating system was promoted with the song [Rolling Stones - Start Me Up]? Erklärung: Windows 95 was promoted with the famous Rolling Stones song 'Start Me Up.' Microsoft used the song in 1995 as part of a global advertising campaign to present the new operating system as innovative and user-friendly. The song symbolized the fast startup and a new era in personal computing.
64
How many characters could be sent in a single SMS? Erklärung: An SMS (Short Message Service) could originally contain a maximum of 160 characters. This standard was established to efficiently utilize mobile network technology and ensure high message availability. The limit is based on 7-bit character encoding, which allows for 160 characters.
65
What was the name of the first known computer virus from 1971? Erklärung: The first known computer virus from 1971 was called Creeper, developed by Ray Tomlinson. Creeper was an experimental virus that spread across ARPANET and replicated itself. It simply displayed the message 'I'M THE CREEPER, CATCH ME IF YOU CAN!' and had no malicious intent.
66
What was invented by Douglas C. Engelbart in 1963? Erklärung: Douglas C. Engelbart invented the computer mouse in 1963, a revolutionary input device that significantly simplified interaction with computers. The mouse was first publicly demonstrated in 1968 and was a key component of Engelbart's 'Augmenting Human Intellect' project, which aimed to improve how humans use computers.
67
Which pill in [The Matrix] takes Neo down the rabbit hole? Erklärung: In The Matrix, the blue pill represents the path of ignorance, allowing Neo to remain in his comfortable but false reality and forget the truth about the Matrix. The red pill, on the other hand, symbolizes the path to truth and enables Neo to leave the Matrix and see reality. Choosing the blue pill returns him to the system, while the red pill takes him down the rabbit hole to uncover the truth.
68
What does a carbon paper copy refer to? Erklärung: A carbon paper copy refers to the practice of creating a duplicate (CC, Carbon Copy) or a blind copy (BCC, Blind Carbon Copy) by applying pressure on the paper. These terms originate from the traditional use of carbon paper, which allowed for a physical copy of the original message to be made.
69
Which virus deactivated itself due to the randomly discovered kill switch via the registration of the domain [...surijfaewrwergwea.com]? Erklärung: The WannaCry virus (2017) deactivated itself after a security researcher randomly discovered and registered the domain iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com. The virus had this domain hardcoded, and once the domain became active, it prevented the malware from spreading further. Other viruses are incorrect: Maze (2019) was a ransomware trojan without a kill switch. MyDoom (2004) was a widespread worm with no such mechanism. Melissa (1999) was a virus but also lacked a kill switch.
70
Which audio format uses lossy compression due to its codec? Erklärung: OGG Vorbis and MP3 (MPEG-1 Layer 3) are lossy audio formats because they compress data by removing parts of the audio signal to reduce file size. This compression results in some loss of sound quality, although it may not always be noticeable. OGG FLAC and WAV (PCM) stand for Free Lossless Audio Codec and Pulse Code Modulation respectively, and are therefore not lossy formats.
71
What do you get when you decode the Matrix Code (Digital Rain) from [The Matrix]? Erklärung: In the movie The Matrix, the Matrix Code (also known as Digital Rain) was used as an artistic representation of the digital world. Interestingly, in the real world, the code actually contains a Japanese sushi recipe, which was inserted by designer Simon Whiteley as part of a humorous Easter egg.
72
Which virus was originally co-developed by William Birkin and served as the foundation for later mutations like the G-Virus in Resident Evil 2? Erklärung: The T-Virus (Tyrant Virus) was developed by the Umbrella Corporation, with William Birkin playing a major role in its research. It served as the basis for many further bio-weapon experiments, including the later development of the G-Virus. Although Birkin is primarily associated with the G-Virus in Resident Evil 2, his earlier work was crucial for the creation of the T-Virus, which plays a key role in the spread of the zombie outbreak.
73
What is a Rubik’s Cube? Erklärung: The Rubik’s Cube is a magic cube, a 3D puzzle invented in 1974 by Ernő Rubik. It consists of 27 smaller cubes, with each face displaying different colors. The goal is to make each side of the cube a single color by rotating the individual parts.
Did you know that Edward Snowden allegedly used a Rubik’s Cube to smuggle out classified NSA data? This claim has been mentioned in interviews and reports about his whistleblowing case, including in the film *Citizenfour* and articles by *The Guardian* — although some details, like the Rubik’s Cube, have not been officially confirmed and may be symbolic or dramatized.
74
For which first-person shooter was the modification [Counter-Strike] developed in 1999? Erklärung: The Counter-Strike modification was originally developed in 1999 for the first-person shooter Half-Life. Created by Minh Le and Jess Cliffe, the mod quickly gained popularity due to its tactical, team-oriented gameplay that took the game to a new level. Counter-Strike later became a standalone game.
75
What is behind the world-famous God Mode cheat code -IDDQD- from DOOM? Erklärung: The God Mode cheat code IDDQD from the game DOOM (1993) stands for 'Delta-Q-Delta' and activated invincibility, where the player could not be killed by enemies or environmental damage. The code became an iconic part of early PC game cheats.
76
Which file format is always lossy in its compression? Erklärung: JPEG is always lossy because it reduces data to minimize file size. This is done through irreversible compression that sacrifices image details. Other formats differ: PNG uses lossless compression and retains all data. JPEG 2000 can store data either losslessly or lossily. BMP stores raw image data without compression, meaning no quality is lost. Only JPEG always loses image information, making it suitable for photos but unsuitable for high-precision graphics like logos and icons.
77
What is a Williams tube, also known as the Williams-Kilburn tube? Erklärung: The Williams tube (also known as the Williams-Kilburn tube) was an early memory technology developed in the 1940s. It was used as random-access memory (RAM) in some of the first digital computers, notably the Manchester Mark I. The tube stored data as electrical charges on a phosphorescent screen, which were modified using an electron beam system.
78
What was the first real-time computer used as a flight simulator for the US Navy? Erklärung: The Whirlwind I was the first real-time computer used as a flight simulator for the US Navy. Developed at MIT in the late 1940s and early 1950s, it was capable of simulating aircraft movements in real time, marking a breakthrough in military training technology.
79
What is commonly considered the fastest keyboard layout? Erklärung: The Dvorak layout is considered the fastest keyboard layout because it was designed to place the most commonly used letters on the home row, allowing for more efficient typing and reduced finger movement. It was developed in 1936 by Dr. August Dvorak. Other layouts are less optimized: QWERTY is the standard layout originally designed for mechanical typewriters and not for speed. Colemak and Neo are alternative layouts that offer improvements, but Dvorak is widely regarded as the most speed-optimized layout.
80
What is the title of the first YouTube video uploaded by founder Jawed Karim on April 23, 2005? Erklärung: The first YouTube video, uploaded by founder Jawed Karim on April 23, 2005, is titled 'Me at the zoo'. In the video, Karim stands in front of an elephant at the San Diego Zoo and briefly talks about why he likes elephants. This video marks the beginning of YouTube, which would soon become one of the largest platforms for online videos.
81
What was used under DOS to extend the addressable memory limit from 640KB to 64MB? Erklärung: DOS4GW.EXE was an extended memory manager used under DOS to extend the addressable memory limit from 640 KB up to 64 MB. It enabled access to high memory and allowed running programs that required more memory than the standard 640 KB address range. HIMEM.SYS manages access to extended memory. FDISK.EXE is used to create hard disk partitions. MSCDEX.EXE is a driver for CD-ROMs.
82
Which animal is primarily responsible for naming conventions in programming languages? Erklärung: The camel is primarily responsible for naming conventions in programming languages, especially for the CamelCase format. In this style, compound words are written without spaces, with each new word starting with a capital letter except for the first one (e.g., myVariableName). This writing style, where uppercase letters are used within a word, is also called 'inner capitalization.' This convention is commonly used in many modern programming languages.
83
At what time did Steve Jobs unveil the first iPhone in 2007? Erklärung: The time 9:41 had a special significance. Steve Jobs chose this time because the iPhone presentation at Macworld 2007 started at 9:00 AM, and the iPhone was shown shortly after the introduction. 9:41 AM was the moment the iPhone teaser appeared on the screen and Jobs first presented the device. This time has been used in all iPhone advertisements and product photos to preserve the emotional connection to the unveiling and emphasize the importance of the moment.
84
For which game did Microsoft write exclusive code in Windows 95 to fix a memory bug? Erklärung: Microsoft wrote exclusive code for Windows 95 to fix a memory bug in the popular simulation game SimCity 2000. Upon its release on the new operating system, the game experienced significant stability issues, especially with memory management, leading to frequent crashes. Instead of leaving the problem solely to the developers at Maxis, Microsoft intervened with a custom system-level solution.
The special aspect of this was that it was not a general patch but a targeted exception deeply integrated into the OS and applied only for this one game. When SimCity 2000 was launched, Windows 95 detected the game and activated a specially developed code path that compensated for the faulty memory usage. Such a tailored compatibility fix was — and still is — extremely rare in OS history.
Microsoft’s effort demonstrated not only the popularity of SimCity 2000 but also the company’s commitment to making the new Windows work smoothly with existing software. This form of fix — a concrete OS-level adjustment solely for one game — was almost unprecedented.
85
Which object has been the most famous test model since 1975, widely used as a 3D reference model in computer graphics? Erklärung: The teapot—specifically the 'Utah Teapot'—has been the most famous test model in computer graphics since 1975 and sparked a small revolution in its humble form. It was developed by computer scientist Martin Newell at the University of Utah, one of the birthplaces of modern computer graphics. He chose the teapot as a test object because it had an ideal geometry for the time: neither too simple nor too complex, featuring smooth curves, cavities, and a recognizable silhouette—perfect for testing rendering, shading, and lighting algorithms.
What made the teapot special was not only its shape but also its availability. Newell made the data publicly available, quickly making it a standard. In an era with hardly any standardized 3D models, the teapot offered a common basis for developers, researchers, and software manufacturers. It served as a kind of 'Hello World' for the 3D world—a uniform object with which rendering engines, shaders, light models, and even the first ray tracing algorithms could be tested and compared.
Due to its widespread use, it became not only a symbol of progress in computer graphics but also a running joke among graphic artists—still appearing as an Easter egg in games, films, and 3D software today. The Utah Teapot thus marked not only a technical milestone but also became a cultural artifact of digital visualization.
86
What did Microsoft originally call the operating system before it was renamed Windows? Erklärung: Before Microsoft named its operating system Windows, it was originally called 'Interface Manager.' The name was changed to better emphasize the graphical user interface and window-based operation, which aligned more closely with the Windows concept.
87
For which special IBM clock speed was a unique PC case button introduced? Erklärung: The Turbo button was used to reduce the clock speed to improve compatibility with older programs and devices that did not work properly at the full 4.77 MHz speed. When the Turbo button was not pressed, the PC ran at full clock speed.
88
What do you need to activate the emergency eject of a CD-ROM drive? Erklärung: To activate the emergency eject of a CD-ROM drive, you typically need a paperclip. It can be inserted into the small hole on the front of the drive to unlock the mechanism and manually open the drive when it cannot be opened by normal means.
89
Why is [111-1111111] a valid Windows 95 license key? Erklärung: The license number 111-1111111 was formally valid for Windows 95 because it satisfied a specific mathematical check: the Windows 95 product key algorithm required that the sum of all digits be divisible by 7 (i.e., sum mod 7 = 0). This so-called modulo-7 check allowed seemingly simple or arbitrary serial numbers like '111-1111111' to be recognized as valid—at least from the algorithm’s perspective.
However, the prefix part of the number, '111-', was commonly used in test or example keys. Because it was so simple and widespread, it was later included in internal blacklists to prevent misuse of such generic numbers. That’s why '111-' often appears associated with blacklists today—even though the key itself passed the mathematical test.
90
What does the Konami Code stand for? Erklärung: The Konami Code is a famous cheat code first used in the 1980s in Konami video games. The code consists of a specific sequence of button presses (e.g., ↑ ↑ ↓ ↓ ← → ← → B A) that allowed players to unlock bonus features or advantages in the game, such as extra lives or infinite energy. The code became an iconic part of video game culture.
91
Which logo unites Norway and Denmark? Erklärung: The Bluetooth logo unites Norway and Denmark, as it is named after the Danish King Harald Bluetooth. Harald Bluetooth united the two countries in the 10th century and introduced Christianity. The name was used for the wireless communication technology to symbolize the connection and cooperation between different devices, similar to how Harald united the land.
92
What is a 'Klammeraffe'? Erklärung: The '@' symbol, also known as 'Klammeraffe' in German, is today primarily known from email addresses, but its history goes back to the Middle Ages. Originally, it was a ligature of the Latin letters 'a' and 'd', which together meant 'ad'—meaning 'at' or 'to'. It was used in commerce, for example in price listings like '7 items @ 2 denarii'. An early example appears in the illustrated Manasses Chronicle, a Byzantine world chronicle from the 14th century. In a miniature depicted in the book 'Miniatures from the Manasses Chronicle' (1962, Sofia), an '@'-like symbol appears in a manuscript—probably also as an abbreviation for 'ad'. The symbol survived through the centuries and was used in 1971 by computer scientist Ray Tomlinson for the first email simply because it was available on the keyboard and rarely used otherwise. Thus, a medieval abbreviation became a symbol of modern digital communication.
93
What was the first webcam in the world, developed in 1991 at the Laboratory for Computer Science at Cambridge University, used for? Erklärung: The world's first webcam, developed in 1991 at the Laboratory for Computer Science at Cambridge University, was used to monitor a coffee machine. The camera was positioned so that employees could see if the coffee pot was still full without having to leave their desks. This webcam laid the foundation for the later use of webcams in various fields.
94
Which was the first domain registered worldwide in 1985? Erklärung: The first domain registered worldwide was symbolics.com, registered on March 15, 1985, by Symbolics, Inc., a computer manufacturer, for their internet presence. This domain marks an important milestone in the history of the internet.
95
Which HTTP client error code is based on the name of a room at CERN, the origin of the World Wide Web? Erklärung: The HTTP error code 404 - Not Found is based on the original room name at CERN. The error code was used to indicate that a webpage or resource could not be found. It is believed that the room where the World Wide Web prototype was developed was labeled '404,' which influenced the origin of this code.
96
Which laptop was the world's first portable computer? Erklärung: The Osborne 1 was the world's first portable computer, released in 1981 by Osborne Computer Corporation. Weighing about 11 kilograms with a 5-inch screen, it was considered 'portable' for its time. It was primarily marketed as a solution for business travelers who needed a computer on the go.
The Osborne 1 was a well-designed CP/M system that came with a complete suite of user software. Included were a BASIC interpreter and compiler, the SuperCalc spreadsheet, and the WordStar word processor—making it the first fully functional mobile workstation for many users.
The only downside was the relatively small 5-inch screen, rumored to have come from leftover IBM 5100 production stock. However, it was possible to connect an external monitor for more comfortable work.
97
What is the common term for a gathering of many computers connected in a network that led to social events? Erklärung: The term LAN party refers to a gathering of many computers connected over a local area network (LAN), where players often come together for social events to play video games collaboratively. These events were especially popular in the 1990s and early 2000s, as internet connections at the time were often not fast enough for online gaming.
There is ongoing discussion about which event was the first esports tournament. Most agree that the 'National Space Invaders Championships' in 1980 was the first major competitive tournament. The event attracted around 10,000 people and established competitive gaming as a serious hobby. The 'Spacewar' tournament at Stanford University in 1972 was an important step in competitive video gaming and inspired others to hold their own events. One of the earliest large tournaments was 'Battle by the Bay'—a Street Fighter LAN event in California. Forty people participated in the first event, which eventually evolved into what is now known as EVO.
98
Which military computer network laid the foundation for today's World Wide Web Internet? Erklärung: ARPANET was the first military computer network that served as the foundation for today's World Wide Web (Internet). It was developed in the late 1960s by the US Department of Defense to enable communication between research institutions. ARPANET introduced the concept of packet switching, which became the basis of modern Internet technology.
99
Which term in computer graphics describes the visual effect of light rays shining through atmospheric particles? Erklärung: The term God Rays in computer graphics describes the visual effect of light rays shining through atmospheric particles such as dust or fog. This effect is often depicted as 'light shafts' and contributes to a dramatic and realistic rendering of scenes.
100
What does the codename (SST-1) of the first Voodoo Graphics stand for? Erklärung: The codename SST-1 of the first Voodoo Graphics card stands for Smith, Sellers, and Tarolli, the founders of 3Dfx Interactive, the company behind the Voodoo card. This early graphics accelerator card revolutionized 3D graphics in computing and ushered in a new era for PC gaming.
101
Which gaming graphics card was the only one to mechanically switch between 2D and 3D using a relay? Erklärung: The Orchid Righteous 3D was the only gaming graphics card to mechanically switch between 2D and 3D using a relay. This technique was used to switch the card from 2D graphics to 3D acceleration by physically toggling the circuitry with a relay, which was an unusual solution for the technology of the time.
102
Which technology enables the mystery of mirrors (Planar Reflections) in computer games to function physically correctly? Erklärung: Parallel Inverted Game Worlds and Real-Time Ray Tracing are technologies that enable physically accurate planar reflections in computer games.
In Parallel Inverted Game Worlds, a second, mirrored version of the actual game world is created beneath the original world to simulate realistic reflections. Not only is the environment inverted, but the player character is also respawned in this mirrored world and simulated with inverted controls. This mirrored figure acts synchronously with the actual player character, allowing correct and dynamic reflections in real time.
This is especially challenging in first-person shooters, as the player's character often doesn't fully exist in the game world—in first-person perspective, usually only the hands and weapons are rendered, not the entire body. To still display a complete reflection in the parallel world, a full 3D model of the character must be specially created and animated for the mirrored view, even though it is not visible during normal gameplay.
Real-Time Ray Tracing, on the other hand, traces light rays in real time to produce physically accurate reflections, including mirrors.
Other technologies are less precise: Screen-Space Reflections (SSR) rely only on the image content of the screen and thus provide incomplete or faulty reflections. Cube Maps generate reflections based on pre-rendered textures, which do not always reflect the physical accuracy of the actual game world.
103
Which methods are used to obtain true random numbers (unpredictable patterns), not pseudo-random numbers? Erklärung: True random numbers (not pseudo-random) can be generated using lava lamps (optical noise) and atmospheric noise. These methods rely on physical, unpredictable phenomena: lava lamps create noise through the chaotic movement of wax blobs, and atmospheric noise uses random fluctuations of air molecules.
Other methods such as the Mersenne Twister and Monte Carlo simulations are pseudo-random number generators based on mathematical algorithms and therefore do not produce true random numbers. Specifically with the Mersenne Twister, if the seed (initial value) is known, the entire sequence of generated numbers can be exactly predicted and partially reversed. The algorithm is deterministic—making it efficient but problematic for security purposes as it does not provide true unpredictability.
104
What was the storage capacity of the world's first hard disk [IBM 305 RAMAC] from 1956? Erklärung: The world's first hard disk, the IBM 305 RAMAC, was introduced in 1956 and had a storage capacity of 5 megabytes. This hard disk was revolutionary as it provided mass storage technology for the first time, enabling large amounts of data to be stored and retrieved quickly.
105
What was the name of the first real AI program from the 1960s that acted as a simple psychotherapist and gave users reflective answers? Erklärung: The first real AI program from the 1960s that acted as a simple psychotherapist was called ELIZA. Developed by Joseph Weizenbaum at MIT, it simulated a conversation with a psychotherapist by giving reflective answers to user inputs. The program relied on simple pattern matching and became popular because it gave the impression of having a real conversation.
106
What was the original idea behind YouTube? Erklärung: The original idea behind YouTube was to create a video dating platform where users could introduce themselves and find potential partners. Founders Chad Hurley, Steve Chen, and Jawed Karim wanted to provide an easy way to upload and share videos, especially for dating purposes.
107
What did John Draper (one of the first hackers in the world) use for phone phreaking to make free long-distance calls? Erklärung: John Draper, an early hacker, enabled phone phreaking (the practice of manipulating telephone systems to make free long-distance calls) by using a Cap’n Crunch toy whistle (2600 Hz) from a box of cornflakes. This whistle emitted a specific tone that tricked the telephone system into allowing free long-distance calls by mimicking the telephone company’s control signals.
108
Why does a CD (Compact Disc) have exactly a 12 cm diameter and a playback time of 74 minutes? Erklärung: The CD (Compact Disc) was originally developed with a 12 cm diameter and a playback time of 74 minutes because the developers from Sony and Philips based the capacity on the length of Beethoven's 9th Symphony. They wanted a storage capacity that could hold the entire symphony without interruption, which at the time corresponded to 74 minutes.
109
What is the Unix Epoch date? Erklärung: The Unix Epoch date is January 1, 1970, 00:00:00 UTC. It represents the starting point for the Unix timestamp system, where time is counted as the number of seconds elapsed since this moment. This choice was based on the development of the Unix operating system and served as a practical and standardized reference point.
110
What do we owe to the hidden Easter Egg (!NETSCAPE2.0) in Netscape Navigator 2.0 that is still present in modern browsers? Erklärung: The hidden Easter Egg (!NETSCAPE2.0) in Netscape Navigator 2.0 enabled GIFs to play in an infinite loop. This was one of the first implementations of this feature in a web browser and helped popularize animated GIFs, revolutionizing the use of graphics on the web.
111
Which game or games featured a so-called Boss Key (Boss Screen)? Erklärung: A Boss Key was a handy feature in many PC games from the 1980s and 1990s that allowed players to instantly hide or minimize the game—such as when a supervisor unexpectedly entered the room. Notably, titles like Leisure Suit Larry (1987) and Moorhuhn 2 (2000) creatively used this trick. In Leisure Suit Larry, pressing Ctrl + B displayed a fake spreadsheet—but with the side effect of immediately exiting the game, a tongue-in-cheek nod to the risks of secret gaming. Moorhuhn 2 offered a more modern version: a convincingly real Word document appeared, giving the impression that one was diligently doing office work.
112
Which website has remained unchanged since its launch? Erklärung: The website https://www.spacejam.com/1996/ has remained almost unchanged since its launch in 1996. It was created as the official site for the film Space Jam and has kept its original design ever since, making it a curious relic of the internet.
113
Which movie features a real Unix user interface (IRIX by Silicon Graphics) with the 3D file management system FSN (File System Navigator)? Erklärung: In the film Jurassic Park (1993), a real Unix user interface (IRIX by Silicon Graphics) with the 3D file management system FsN (File System Navigator) is shown. This depiction was an early example of real technology used in a Hollywood movie and showcased the futuristic Unix system interface used to manage dinosaur data. Other films like The Matrix or 2001: A Space Odyssey featured futuristic computer graphics, but not the IRIX system with FSN. Only Jurassic Park presented this real Unix interface.
114
On what mathematical basis is the original Tetris built? Erklärung: The shapes of the Tetris blocks (also called Tetrominos) come from mathematics, specifically from the geometry of polyominoes. A Tetromino is a special type of polyomino consisting of exactly four square units. The Russian developer Alexey Pajitnov, who created Tetris in 1984, was inspired by pentominoes—figures made of five squares commonly used in puzzles. However, since these were too complex for smooth gameplay, he reduced the game pieces to four squares—the Tetrominos. This resulted in exactly seven possible shapes: I, O, T, L, J, S, and Z. Why are there only 7 Tetrominos in Tetris? Mathematically, there are actually 19 different tetromino shapes if mirrored variants are counted as distinct. But since Tetris does not distinguish mirror images and only allows rotations, the number is reduced to 7 unique shapes.
115
Why was the Titanic unable to reach the supposedly nearby ship SS Californian on the night it sank in 1912, even though it was visible? Erklärung: On the icy night of April 14 to 15, 1912, an unusual refraction effect caused the SS Californian to appear much closer than it actually was due to an optical illusion (Fata Morgana). This distortion occurred because light bent differently through strong temperature differences in the air. The refractive index of air (approx. 1.0003) changes with temperature, causing light to curve and falsely suggest distances. For comparison: water has a refractive index of about 1.33, strongly bending light underwater. Glass ranges between 1.5 and 1.9, making it transparent but reflective. These physical principles are essential for computer graphics (CGI) and ray tracing engines that realistically simulate light refraction. Programs like Blender, Unreal Engine, or V-Ray use refraction values (IOR – Index of Refraction) to create realistic effects for glass, water, or transparent materials. Without accurate calculations, reflections and refractions would appear unnatural. In the Titanic case, this refraction effect made officers believe the SS Californian was within sight and should have seen their distress signals—in reality, it was farther away, preventing a life-saving intervention.
116
What only looks realistic due to Subsurface Scattering (SSS)? Erklärung: Subsurface Scattering (SSS) is an effect where light penetrates a material, scatters inside it, and exits at another point. This makes surfaces appear softer and more natural. Gummy bears consist of gelatin, allowing light to penetrate deeply and scatter diffusely—especially visible when held up to a light source. Skin uses SSS to scatter light through its upper layers, giving it a realistic, lifelike appearance. Marble also exhibits subsurface scattering: light enters the stone, scatters within its fine crystalline structures, and creates the characteristic soft, slightly translucent look—especially visible in thinner areas or when light hits from the side. Titanium, however, shows no subsurface scattering because metals reflect light directly at the surface without allowing it to penetrate, which is why metals always appear shiny or matte but never translucent. The first three feature films to use Subsurface Scattering (SSS) for realistic rendering of translucent materials were: Shrek (2001) – DreamWorks Animation used SSS to make character skin look more natural; The Lord of the Rings: The Two Towers (2002) – Weta Digital used SSS to render Gollum lifelike; Matrix Reloaded (2003) – SSS was used to make the digital doubles of actors appear more realistic.
117
What are the characteristic light patterns called that form due to refraction or reflection on transparent or curved surfaces, such as at the bottom of a pool? Erklärung: Caustics are light patterns created by the concentration of light rays when they are refracted or reflected by curved or transparent surfaces like water or glass. This causes light to focus in certain areas, resulting in distinctive, often shimmering patterns—such as on the bottom of a swimming pool or behind a glass object. Physically, this is based on the laws of geometric optics: light rays bend at the interface between two media with different refractive indices (e.g., air and water). This bending causes rays to overlap and illuminate certain zones more intensely. In computer games, accurately calculating such effects is computationally expensive because it relies on complex ray tracing—tracking light rays through the scene including refraction, reflection, and scattering. To make this feasible in real-time, developers use various tricks. Animated textures or projected decals often simulate these typical patterns. Shaders also create dynamic distortions depending on wave motion or light sources. In The Legend of Zelda: Breath of the Wild, such techniques create lively water surfaces with subtle light play. Far Cry 5 uses caustic effects mainly in rivers and on glass surfaces to make lighting conditions appear more natural. Minecraft RTX employs real ray tracing, producing physically correct caustics—such as underwater or sunlight passing through colored glass blocks. These effects are visually impressive but require modern graphics hardware. Overall, caustics demonstrate how deep physical concepts are creatively adapted in games to balance performance and visual quality.
118
Which device is considered the first commercial device with a touchscreen interface? Erklärung: The IBM Simon was released in 1994 and was the first commercial device with a touchscreen. It combined a phone, calendar, notepad, and email functionality into one—operated via a pressure-sensitive LCD touchscreen with a stylus. It was far ahead of its time and is also regarded as the world's first smartphone.
119
Which method tries to find passwords by systematically trying all possible combinations? Erklärung: Brute-force attacks aim to obtain credentials like passwords by automatically and systematically trying all possible character and word combinations. They do not exploit technical vulnerabilities or human factors. Social engineering specifically targets human behavior or trust to obtain sensitive information—such as through personal manipulation. Phishing is a form of social engineering that uses fraudulent emails or websites to trick users into revealing data. SQL injection attacks database systems by exploiting security flaws in the backend with manipulated inputs. In contrast, brute-force relies purely on endurance and computing power.
120
Which of the following games was one of the first to popularize the shareware distribution method by offering the first episode for free download? Erklärung: Wolfenstein 3D (1992) was one of the first games to popularize the shareware distribution method by offering the first episode as a free download. This method allowed players to try the game before purchasing the full version and helped make shareware distribution an important business model in the 1990s. Shareware games of that time often included a hotline or order form within the game for players to order the full version by mail.
Another well-known example of a shareware game from this era is Jazz Jackrabbit. It was also released with a free episode, giving players the chance to test the game before buying the full version. Jazz Jackrabbit is another example of how shareware became a successful business model for PC games in the early 1990s.
121
Which of the following rendering techniques have proven effective in computer games to this day? Erklärung: Billboarding is a well-established technique in computer games where flat 2D graphics (sprites) are oriented in 3D space to always face the camera—regardless of the player's viewing angle. This saves computing power and is especially used for rendering vegetation like trees, grass, or bushes, particularly in large open worlds or on hardware with limited resources. A classic example is the original Gran Turismo on the PlayStation, where trees along race tracks were rendered as billboards to simulate a realistic environment with minimal computational effort. Billboards were also used in the legendary Doom (1993), where all enemies and objects were rendered this way.
Fog of War refers to the deliberate hiding of areas in the game world that are outside the player's or their units' line of sight. This technique increases suspense and strategic depth and is still widely used across many genres—for example, in Command & Conquer, where enemy activity is only visible when own units are nearby, or in Tomb Raider, where caves or ruins have dark, unexplored sections obscured by fog or shadows until the player enters.
Token Ring is an older network protocol where computers are connected in a ring, and a special “token” circulates—only the computer holding the token may transmit at that time to avoid collisions.
Zero-Day Exploit refers to a software security vulnerability unknown to the developers—hackers can exploit it before a patch or fix is available.
122
Why can many CDs or DVDs still play error-free even with severe scratches? Erklärung: Imagine data like cars traveling on a highway—not scattered randomly, but following a fixed, mathematically defined path called a polynomial. When some “cars” are lost during transmission or storage (e.g., due to a scratch on the CD), the system can still recognize the original path and mathematically fill in the gaps because the course of the road (the polynomial) is known. This is the principle of Reed-Solomon coding: you know how the data path should look and can simply recalculate missing pieces.
When a CD or DVD plays flawlessly despite visible scratches or dirt, it’s no coincidence—it’s mathematics at work. More precisely: Reed-Solomon coding is an error correction method based on representing data by polynomials and protecting them with redundancy. These polynomials operate not in the usual number space but in a special mathematical world called Galois fields. In these finite number systems (e.g., with only 256 possible values), the arithmetic rules differ—but that’s exactly what makes them perfect for the digital world: every calculation step is unambiguous and lossless.
At its core, Reed-Solomon works like this: the original data (e.g., music or video data) is encoded into a polynomial and evaluated at multiple points—more than needed to reconstruct it later. These extra points carry no new information but are mathematically derived—and they allow reconstructing the original polynomial even if some values are corrupted or lost. So a CD player can simply “recalculate” when encountering a scratch instead of stopping.
What makes Reed-Solomon groundbreaking is its ability to correct arbitrary errors on a symbol level (e.g., whole bytes), not just individual bits. Moreover, the method is deterministic, requires no assumptions about the errors, and does not need retransmissions or queries like other coding types. It’s an extremely robust solution for unstable transmission media.
Reed-Solomon codes are used not only in CDs and DVDs but also in: – QR codes: even if a quarter of the code is damaged, the content can still be read. – Satellite communication: e.g., NASA probes like Voyager sending weak signals over billions of kilometers. – DSL and mobile networks to compensate for packet loss. – Hard drives (RAID systems) to recover data from hardware failures. – Digital TV and streaming, where audio or video signals often contain small errors.
The name comes from its inventors: Irving S. Reed and Gustave Solomon, who developed the code in 1960 at MIT Lincoln Labs. Their idea revolutionized the digital world—now invisible but omnipresent in everything that needs to work reliably.
Conclusion: Without Reed-Solomon, many modern technologies wouldn’t be robust enough for everyday use. Every scratch on a CD, every crumpled QR code, every radio disturbance could lead to data loss. Instead: mathematics saves the day—with the help of polynomials and Galois fields.
123
What caused a lengthy legal dispute behind the scenes of the TV series The X-Files? Erklärung: The iconic “I Want to Believe” poster from The X-Files series is based on a photo by the controversial Swiss UFO contactee Billy Meier. In the 1970s, Meier claimed regular contact with extraterrestrials and presented numerous photos of so-called “beamships” (UFOs), allegedly taken in the Zurich Oberland. Many of these images were later exposed as fakes, likely depicting model aircraft staged with simple methods.
The original poster, seen in Agent Mulder’s office during the first three seasons of The X-Files, used one of Meier’s photos without permission, which later led to a copyright dispute. As a result, from the fourth season onwards, the series replaced the poster with a slightly altered version featuring a different UFO image to avoid legal issues.
Although the authenticity of Meier’s photos is highly doubted, the poster became a pop culture symbol of the desire to believe in the unknown. It reflects Mulder’s inner conflict between skepticism and hope and has established itself beyond the series as an expression of belief in the supernatural.
124
Which mysterious number revolutionized real-time 3D graphics through faster vector calculations? Erklärung: In 3D graphics, vectors constantly need to be normalized – that is, adjusted to a length of 1 – for example, to calculate light reflections correctly. For this, you need the reciprocal of the square root. Mathematically, this is simple, but for the processor it was an expensive operation – especially back in the 1990s.
In Quake III Arena, a clever trick was therefore used: the so-called Fast Inverse Square Root. The key idea: take the bit representation of a floating-point number (treating it as raw 32 bits), perform a shift, and subtract the result from the magic number 0x5F3759DF (line 10 of the code) – and you get an astonishingly accurate approximation.
This allowed Quake III to perform millions of such calculations per second, even though the code now looks almost like black magic. The algorithm combines clever bit manipulation with the Newton–Raphson method to further refine the approximation.
The idea likely came from Greg Walsh, inspired by reverse engineering and mathematical intuition. Modern CPUs now have specialized instructions that perform these calculations faster and more precisely.
The Fast Inverse Square Root hack achieved the same operation in about 4–5 cycles (plus Newton–Raphson correction to about 9–10 cycles). In the best case, this meant a 2–3× speed-up – and in some measurements even up to 4×, thanks to pipeline effects and avoiding costly divisions.
Yet the Fast Inverse Square Root remains a prime example of low-level optimization, brilliantly pushing the limits of the hardware of its time.
It is not just a technical masterpiece – it has long since become part of the pop culture of the programming world.
YOUR RESULT
DISCLAIMER Participation in the quiz takes place voluntarily and is free of charge. The personal data collected as part of the quiz (e.g. name and email address) are processed exclusively for evaluation and transmission of your quiz results. The legal basis is your consent in accordance with Art. 6 Para. 1 lit. a GDPR. Your data is only saved as long as is required for the implementation and processing of the quiz. They will then be deleted if there are no statutory retention obligations (e.g. commercial or tax law requirements). There is no transfer to third parties. You can revoke your consent at any time with effect for the future, e.g. B. by email to info [ad] paris-studios.de. The legality of the processing carried out until the revocation remains unaffected. The quiz serves exclusively for entertainment. The questions and answers are based on the state of knowledge at the time of creation and can change through new developments. The legal process is excluded. In the event of violations of the conditions of participation (e.g. by manipulation or false information), we reserve the right to exclude participants from the quiz. If the quiz is used as part of a specific event and an event code is specified, the conditions of participation of the respective event also apply. Please note the corresponding information in the context of the respective event. The content of this page is subject to copyright. Despite careful examination, we accept no liability for external links. Further information on the disclaimer and data protection can be found in the imprint.