Steve Jobs
Python
Vector
GUI
Graphical User Interface
Name for type of malware where the program disguises itself as a non-harmful software. Also a prominent story in Greek mythology
Trojan Horse
British mathematician known as "the father of CS," also created a test to determine computer intelligence
Alan Turing
Versatile and memory efficient programming language built off of an already existing language. It is most often used for video games, operating systems, and graphical computing among other things.
C++
Theoretical representation for time complexity in algorithms and programs
Big O notation
RAM
Software that acts as an encrypted tunnel for your internet traffic. This software masks your IP by using a remote server to connect to the internet
Virtual Private Network (VPN)
This Finnish-American computer scientist is best known for the creation of the operating system Linux
Linus Torvalds
High-level programming language often used for web development and creating an interactable client-side to pair with a backend. Notable for using static typing.
JavaScript
Data structure in which the order of the items placed is also the order of the ones that are accessed.
Queue
HTML
Hypertext Markup Language
Type of malware that tracks your keystrokes, often used to steal passwords and other sensitive data
Keylogger
Dutch computer scientist best known for developing the "shortest path algorithm," which was named after him
Edsger W. Dijkstra
Powerful programming language used for managing databases and storing that data in an organized tabular format.
SQL
Data structure known for it's branching nodes and easy integration with recursion and binary search.
Binary Tree
API
Application Programming Interface
A type of cyberattack where an attacker floods a system, server, or network with excessive traffic to exhaust its resources and make it unavailable to users.
Famous computer scientist and engineer best known for his creation of TempleOS and Holy C as well an extensive history of mental illness
Terry Davis
A high-level programming language developed for scientific and numerical computation, excelling at array-based calculations. Created in 1950 and has not been widely used for decades
Fortran
Data structure that uses function to map values to unique indexes. Often used for encryption algorithms.
Hash table/Map
Uniform Resource Locator
This fortune 500 company famously had a massive data breach after a 3rd party vendor fell for a phishing scam, allowing hackers access to their network
Target