Binary
Computer Potpourri
AI / ML
Computer Networks
Cyber / Info Security
100

Convert the binary number 10000 to decimal

What is 16?

100

Of all the ways to improve a password, this one has the greatest effect on resisting brute-force attacks.

What is making a password longer?

100

This paradox states that some tasks that are simple for humans to do are difficult for AI to do.

What is Moravec's Paradox?

100

There are two roles that a computer can assume when sending/receiving information.

What is Client/Server?

100

This type of attack exploits unknown vulnerabilities.

What is a Zero-Day Attack?

200

Convert the decimal number 26 to binary

What is 11010?  

200

Its components consist of 4 items: Memory, Input, CPU and Output

What is the Von Neumann Architecture

    

200

The recommendation engine that suggests movies on Netflix excels at predicting what you might watch next but cannot handle tasks outside that domain.

What is Narrow AI?

200

This aspect of the computer network defines the rules and standards for data exchange.

What is a protocol?

200

After exploiting vulnerabilities and infiltrating a system, an attacker may escalate privileges or install backdoors in this phase, so they don’t lose their hard-won foothold.

What is Maintaining Access?

300

The minimum number of bits required to represent 50 unique values. 

What is 6?

b = log2n

300

How we explain the balance of memory vs cost in computers

What is Memory Hierarchy?

300

This machine learning method takes unlabeled data and attempts to identify meaningful insights/groupings.

What is Unsupervised Learning?

300

When sending messages from one network to another network, it is the device that determines a path and forwards the packet onward.

What is a router?

300

This kind of attack takes advantage of people’s natural tendency to reveal sensitive information.

What is social engineering?

400

The number of unique values that can be represented with 7 bits.

What is 128?

n = 2b

400

A current GPU holds about 76 billion transistors. According to Moore’s law, a similar chip would need this many years to quadruple that count to 304 billion.”

What is 4 years?

400

This computational model, inspired by the human brain, forms the backbone of today’s large language models.  

What is a Neural Network?

400

A protocol that could be used to move a 200 MB dataset from your desktop to a server for processing.

What is FTP?

400

This cyber security principle is violated by a malware that is capable of deleting data from a person's computer.

What is Availability?

500

The number of bits equivalent to 13 KB

What is 106,496


1 bit = 8 Bytes

1 Byte = 1024 KB

500

The ability to break down a problem into a clear, step-by-step process that can be followed to solve it. It means thinking in terms of sequences, decisions, repetition, and inputs/outputs to design a logical solution.

What is Algorithmic Reasoning?

500

A machine learning model that has extremely low error on the training set but much higher error on the test set is exhibiting this problem.  

What is overfitting?

500

A lookup service contacted to resolve names your computer can't understand such as www.google.com.

What is DNS?

500

This is a foundational law of cybersecurity which states that if any system is usable, then there is inherent risk of attack.

What is No Perfect Security?

M
e
n
u