The father of Computer Science?
Who is Alan Turing?
This fundamental programming concept is used to store data values and can hold different types of information, such as numbers or strings, allowing for easy retrieval and manipulation.
What is a variable?
Is Java a compiled or interpreted language?
What is compiled?
This type of learning involves training a model using labeled data, where both the input and output are known.
What is supervised learning?
This type of attack involves overwhelming a system with traffic to make it unavailable to users.
What is a Denial of Service (DoS) attack?
This female mathematician and writer is known for her work on Charles Babbage's Analytical Engine and is often regarded as the first computer programmer.
Who is Ada Lovelace?
This data structure follows a Last In, First Out (LIFO) principle, where the last element added is the first one to be removed.
What is a stack?
This programming language, created by Bjarne Stroustrup, is an extension of C and is widely used for system/software development and game programming.
What is C++?
In the context of optimization, this term refers to a point that is better than its neighbors but not necessarily the best overall solution.
What is a local maximum?
This security measure uses encryption to protect data in transit, commonly seen in web addresses that begin with "https://".
What is SSL/TLS?
In 1965, this computer scientist proposed Moore's Law, predicting that the number of transistors on a microchip would double approximately every two years.
Who is Gordon Moore?
This tree-based data structure maintains sorted data and allows for efficient insertion, deletion, and lookup operations.
What is a binary search tree?
This language, primarily used for front-end web development, is a core technology alongside HTML and CSS, allowing for interactive web applications.
What is JavaScript?
This concept in machine learning refers to the trade-off between a model’s ability to minimize bias and its ability to minimize variance.
What is the bias-variance tradeoff?
This term refers to the practice of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability of unfortunate events.
What is risk management?
This early computer scientist developed the first compiler in 1952 and is often credited with popularizing the concept of high-level programming languages.
Who is Grace Hopper?
This principle describes how elements are added and removed in a queue, where the first element added is the first one to be removed.
What is FIFO (First In, First Out)?
This programming paradigm, which emphasizes immutability and statelessness, is a defining characteristic of languages such as Erlang and Scala, often used in concurrent and distributed systems.
What is functional programming?
This term describes the phenomenon where a model performs well on training data but poorly on unseen data due to its complexity.
What is overfitting?
This cyber attack technique involves manipulating users into divulging confidential information by posing as a trustworthy entity, often exploited in targeted phishing campaigns.
What is social engineering?
This influential 1980s operating system, developed by AT&T’s Bell Labs, introduced a hierarchical file system and multi-user capabilities, becoming the foundation for many modern systems.
What is UNIX?
In a doubly linked list, this term refers to the ability of each node to have pointers to both the next and the previous nodes, allowing traversal in both directions.
What is bidirectional traversal?
This language, developed for system programming and known for its performance and low-level memory manipulation capabilities, introduced concepts like zero-cost abstractions and is used extensively in game development.
What is Rust?
This framework, used in reinforcement learning, models decision-making in situations where outcomes are partly random and partly under the control of a decision-maker, consisting of states, actions, rewards, and transition probabilities.
What is a Markov Decision Process (MDP)?
This term refers to a sophisticated cyber attack that typically involves multiple stages, including reconnaissance, exploitation, and exfiltration, often targeting specific organizations.
What is a multi-vector attack or advanced persistent threat (APT)?