Feeds

From post-coital squid to high-res Playboy bunnies: The 2012 'IT angle?!' quiz

Test your knowledge of the year's most stimulating stories

Secure remote control for conventional and virtual desktops

Cattle farts and sushi

31. Who or what did Australia's Livestock Methane Research Cluster employ to measure cattle farts?
     A. sniffer dogs
     B. lasers
     C. retired wine tasters
     D. fly traps
     Answer

32. A sushibot invented by Suzumo Machinery can crank out how many pieces of inari-sushi per hour?
     A. 60 to 120
     B. 240 to 480
     C. 960 to 1,920
     D. 1,200 to 2,500
     Answer

33. At what game is a Japanese robot capable of beating a human opponent 100 per cent of the time?
     A. snooker
     B. Jenga
     C. rock, paper, scissors
     D. Scrabble (either hiragana or katakana)
     Answer

34. Where did a retired US doctor claim to have found the controversial Gräfenberg Spot (aka G-spot)?
     A. in bonobos
     B. in Poland
     C. in a computer model of the adult female nervous system (but not in a living female)
     D. exactly where she told you it was all along
     Answer

35. Male bar-goers in Michigan are being advised by whom or what to take a cab rather than risk a drunk-driving arrest?
     A. talking urinal cakes
     B. off-duty prostitutes
     C. LED messages on the inside of the bottom of pint glasses
     D. bar employees wearing realistic police uniforms, complete with loaded guns
     Answer

36. What is an Australian restaurant legally recycling?
     A. uneaten food for meat and vegetable pies
     B. patron's urine for fertilizer
     C. trapped rodents for sausage meat
     D. paper plates, washed and dried
     Answer

37. The Pirate Bay warned its fans not to use websites that advertise themselves as what?
     A. The Pirate Bay
     B. torrent-user forums and chat rooms
     C. online storage and backup services
     D. alternatives to iTunes
     Answer

38. If you download a torrent from sites such as The Pirate Bay, how long will it be before your IP address has likely been logged by copyright enforcers?
     A. three seconds
     B. three minutes
     C. three hours
     D. three days
     Answer

39. Who shares the most photos online?
     A. American teenage girls
     B. Japanese teenage girls
     C. British teenage girls
     D. Australian teenage girls
     Answer

40. Who shares the fewest photos online?
     A. American teenage boys
     B. Japanese teenage boys
     C. British teenage boys
     D. Australian teenage boys
     Answer

41. On average, how many text messages do American teens send each day?
     A. one dozen
     B. three dozen
     C. five dozen
     D. who cares?
     Answer

42. How did an American IT pro respond to an anti-parental diatribe posted by his teenage daughter on Facebook?
     A. He drove over her MacBook Pro with his Ford F-350 pickup truck.
     B. He hacked the online applications to each college to which she was applying, adding the rant.
     C. He shot up her laptop with his .45 loaded with hollow-point bullets.
     D. He posted naked baby picture of her onto her Facebook page.
     Answer

43. How long did Taiwanese gamer Chen Rong-yu sit in an internet cafe, immobile, before other gamers noticed he was dead?
     A. two hours
     B. nine hours
     C. a day and a half
     D. until a power failure brought down all the computers in the cafe
     Answer

44. What did a team of Korean scientists discover to be the secret to a long life?
     A. frequent orgasms, whether alone or with a partner
     B. daily intake of 350ml of 40-proof soju (distilled grain or potato liquor)
     C. occasional outbursts of rage
     D. castration
     Answer

45. For what type of developers did the Melbourne company Flippa advertise?
     A. "angrier birds"
     B. "mediocre"
     C. "insanely great but Apple-averse"
     D. "independently wealthy"
     Answer

Security for virtualized datacentres

More from The Register

next story
Facebook's Zuckerberg in EBOLA VIRUS FIGHT: Billionaire battles bug
US Centers for Disease Control and Prevention contacted as site supremo coughs up
Space exploration is just so lame. NEW APPS are mankind's future
We feel obliged to point out the headline statement is total, utter cobblers
Down-under record: Australian gets $140k for pussy
'Tiffany' closes deal - 'it's more common to offer your wife', says agent
Internet finally ready to replace answering machine cassette tape
It's a simple message and I'm leaving out the whistles and bells
Win a year’s supply of chocolate (no tech knowledge required)
Over £200 worth of the good stuff up for grabs
Swiss wildlife park serves up furry residents to visitors
'It's ecological' says spokesman, now how would you like your Bambi done?
The iPAD launch BEFORE it happened: SPECULATIVE GUFF ahead of actual event
Nerve-shattering run-up to the pre-planned known event
STONER SHEEP get the MUNCHIES after feasting on £4k worth of cannabis plants
Baaaaaa! Fanny's Farm's woolly flock is high, maaaaaan
FedEx helps deliver THOUSANDS of spam messages DIRECT to its Blighty customers
Don't worry Wilson, I'll do all the paddling. You just hang on
Red Bull does NOT give you wings, $13.5m lawsuit says so
Website letting consumers claim $10 cash back crashes after stampede
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.