Feeds

From post-coital squid to high-res Playboy bunnies: The 2012 'IT angle?!' quiz

Test your knowledge of the year's most stimulating stories

Combat fraud and increase customer satisfaction

Cattle farts and sushi

31. Who or what did Australia's Livestock Methane Research Cluster employ to measure cattle farts?
     A. sniffer dogs
     B. lasers
     C. retired wine tasters
     D. fly traps
     Answer

32. A sushibot invented by Suzumo Machinery can crank out how many pieces of inari-sushi per hour?
     A. 60 to 120
     B. 240 to 480
     C. 960 to 1,920
     D. 1,200 to 2,500
     Answer

33. At what game is a Japanese robot capable of beating a human opponent 100 per cent of the time?
     A. snooker
     B. Jenga
     C. rock, paper, scissors
     D. Scrabble (either hiragana or katakana)
     Answer

34. Where did a retired US doctor claim to have found the controversial Gräfenberg Spot (aka G-spot)?
     A. in bonobos
     B. in Poland
     C. in a computer model of the adult female nervous system (but not in a living female)
     D. exactly where she told you it was all along
     Answer

35. Male bar-goers in Michigan are being advised by whom or what to take a cab rather than risk a drunk-driving arrest?
     A. talking urinal cakes
     B. off-duty prostitutes
     C. LED messages on the inside of the bottom of pint glasses
     D. bar employees wearing realistic police uniforms, complete with loaded guns
     Answer

36. What is an Australian restaurant legally recycling?
     A. uneaten food for meat and vegetable pies
     B. patron's urine for fertilizer
     C. trapped rodents for sausage meat
     D. paper plates, washed and dried
     Answer

37. The Pirate Bay warned its fans not to use websites that advertise themselves as what?
     A. The Pirate Bay
     B. torrent-user forums and chat rooms
     C. online storage and backup services
     D. alternatives to iTunes
     Answer

38. If you download a torrent from sites such as The Pirate Bay, how long will it be before your IP address has likely been logged by copyright enforcers?
     A. three seconds
     B. three minutes
     C. three hours
     D. three days
     Answer

39. Who shares the most photos online?
     A. American teenage girls
     B. Japanese teenage girls
     C. British teenage girls
     D. Australian teenage girls
     Answer

40. Who shares the fewest photos online?
     A. American teenage boys
     B. Japanese teenage boys
     C. British teenage boys
     D. Australian teenage boys
     Answer

41. On average, how many text messages do American teens send each day?
     A. one dozen
     B. three dozen
     C. five dozen
     D. who cares?
     Answer

42. How did an American IT pro respond to an anti-parental diatribe posted by his teenage daughter on Facebook?
     A. He drove over her MacBook Pro with his Ford F-350 pickup truck.
     B. He hacked the online applications to each college to which she was applying, adding the rant.
     C. He shot up her laptop with his .45 loaded with hollow-point bullets.
     D. He posted naked baby picture of her onto her Facebook page.
     Answer

43. How long did Taiwanese gamer Chen Rong-yu sit in an internet cafe, immobile, before other gamers noticed he was dead?
     A. two hours
     B. nine hours
     C. a day and a half
     D. until a power failure brought down all the computers in the cafe
     Answer

44. What did a team of Korean scientists discover to be the secret to a long life?
     A. frequent orgasms, whether alone or with a partner
     B. daily intake of 350ml of 40-proof soju (distilled grain or potato liquor)
     C. occasional outbursts of rage
     D. castration
     Answer

45. For what type of developers did the Melbourne company Flippa advertise?
     A. "angrier birds"
     B. "mediocre"
     C. "insanely great but Apple-averse"
     D. "independently wealthy"
     Answer

Top three mobile application threats

More from The Register

next story
Och aye! It's the Loch Ness Monster – but only Apple fanbois can see it
Fondleslab-friendly beastie's wake spotted... OR WAS IT?
Japanese boffin EYES up big bucks with strap-on digi-glasses
AgencyGlass saddles user with creepy OLED display
Sleuths find nosy NORKS drones on the Chinternet
UAVs likely to have been made in the Middle Kingdom
Spanish village called 'Kill the Jews' mulls rebranding exercise
Not exactly attractive to the Israeli tourist demographic
Dorian Nakamoto gets $23,000 payout over Bitcoin invention saga
Maintains he didn't create cryptocurrency, but will join community
Pirate Bay's 10 millionth upload: Colour us shocked, a SMUT FLICK
P2P badboys show online piracy is alive and humping
Teen girl arrested with 70-year-old man's four inch weapon inside her
Charged with introducing .22 snubbie to penile facility. It wasn't firing blanks
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.