• Difficulty - Hard
    Total Plays - 18
    Allowed Time - 15 sec
    Best time - 15

    What is the maximum length of a strong Wi-Fi password (WPA2/WPA3)?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    WPA2/WPA3 passphrases are limited to 8–63 ASCII characters. Longer, complex passphrases increase resilience against brute force attacks.
  • Difficulty - Easy
    Total Plays - 13
    Allowed Time - 5 sec
    Best time - 1.983

    Which is NOT an example of an output device?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Keyboards are input devices (they send data to the computer). Printers, monitors, and speakers are typical output devices that present data (visual or audio).
  • Difficulty - Medium
    Total Plays - 16
    Allowed Time - 10 sec
    Best time - 3.698

    What does VPN mainly provide?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    A VPN encrypts traffic and hides a user’s IP from remote sites (hides user identity online), improving privacy and bypassing some network restrictions.
  • Difficulty - Medium
    Total Plays - 17
    Allowed Time - 10 sec
    Best time - 3.133

    What does “formatting a disk” do?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Formatting erases all contents and creates a file system structure (e.g., NTFS, FAT32, exFAT) on a disk. Quick format writes a new file table without wiping all sectors; full format may check and zero sectors. Always back up important data before formatting and choose the filesystem appropriate for the OS and usage.
  • Difficulty - Hard
    Total Plays - 8
    Allowed Time - 15 sec
    Best time - 3.548

    What’s the main function of Active Directory?

    Tip: Click "Play" to reveal options and start playing.

    Used in Windows environments to manage users, groups, and permissions centrally.

    #A
    #B
    #C
    #D
    Explanation:
    AD is Microsoft’s central authentication and authorization system for managing users and policies.
  • Difficulty - Easy
    Total Plays - 7
    Allowed Time - 5 sec
    Best time - 0.791

    Which key is often used to enter Safe Mode in older Windows versions?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    In older Windows (7 and earlier), F8 at boot opened Advanced Boot Options including Safe Mode. Modern Windows boots faster and often requires different methods (Shift + Restart or recovery options) to access safe modes. For legacy systems, F8 remains useful if fast boot isn’t enabled.
  • Difficulty - Easy
    Total Plays - 16
    Allowed Time - 5 sec
    Best time - 2.032

    Which key combo opens Task Manager?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Ctrl + Shift + Esc - opens Task Manager directly, bypassing the need to use Ctrl + Alt + Del and then selecting Task Manager. It's faster and especially useful when diagnosing performance issues.
  • Job Expired
    C

    Cloud Engineer

    Centenary Technology ServicesFull TimeNA

    Uganda Posted: Feb 13, 2026
    Job description
    The Cloud Engineer is responsible for designing, implementing, managing, and supporting the organisation’s cloud infrastructure and services. This role ensures secure, scalable, and highly available cloud environments that support business applications, data, and digital transformation initiatives.The Cloud Engineer should optimize hybrid infrastructure, improve operational efficiency, enforce cloud security standards, and...
  • Job Expired
    C

    IT Service Desk Officer

    Centenary Technology ServicesFull TimeNA

    Uganda Posted: Feb 13, 2026
    Job description
    The IT Service Desk Officer is the first point of contact for all IT-related incidents, service requests, and inquiries. The role ensures efficient and customer-focused support by logging, prioritizing, resolving, and escalating issues in line with ITIL best practices and service-level agreements (SLAs). The IT Service Desk Officer plays a...
  • Job Expired
    C

    Manager, IT Operations and Data Centre

    Centenary Technology ServicesFull TimeNA

    Uganda Posted: Feb 13, 2026
    Job description
    The Manager, IT Operations and Data Centre Will be responsible for the management, supervision and maintenance of the all Data Centers and Disaster Recovery Site Infrastructure and Applications.Also, for ensuring the effective, reliable, secure, and efficient operation of the organization’s IT infrastructure and Data Centre environments. he role oversees day-to-day...
  • Job Expired
    C

    Network & Security Officer

    Centenary Technology ServicesFull TimeNA

    Uganda Posted: Feb 13, 2026
    Job description
    The Network & Security Officer is responsible for ensuring the stability, integrity, and secure operation of the organization’s IT network and security infrastructure.The role involves planning, implementing, maintaining, and troubleshooting network and security systems, enforcing security policies, supporting the Data Centre environment, and ensuring high availability and protection of critical...
  • Job Expired
    B

    Information Security Architect

    BambooHRFull TimeNA

    Hybrid (Utah) Posted: Feb 12, 2026
    Job description
    The Information Security Architect will lead hands-on security architecture design across BambooHR’s cloud environment and corporate information systems, partnering with engineering, IT, and security teams to embed security into platforms, processes, and day-to-day technology decisions. A typical day includes leading architecture and design reviews, defining secure cloud and corporate security...
  • Job Expired
    B

    Cloud Engineer

    BambooHRFull TimeNA

    Remote (Utah) Posted: Feb 12, 2026
    Job description
    Job DutiesAs a Cloud Infrastructure Engineer, you will play a pivotal role in designing, implementing, and maintaining our cloud infrastructure. You will collaborate closely with cross-functional teams to ensure the reliability, scalability, and security of our cloud-based systems. The ideal candidate is passionate about cloud technologies, possesses strong problem-solving skills,...