History of Computer Science
Data Structures
Popular Languages
AI/ML
Cybersecurity
100

The father of Computer Science?

Who is Alan Turing?

100

This fundamental programming concept is used to store data values and can hold different types of information, such as numbers or strings, allowing for easy retrieval and manipulation.

What is a variable?

100

Is Java a compiled or interpreted language?

What is compiled?

100

This type of learning involves training a model using labeled data, where both the input and output are known.

What is supervised learning?

100

This type of attack involves overwhelming a system with traffic to make it unavailable to users.

What is a Denial of Service (DoS) attack?

200

This female mathematician and writer is known for her work on Charles Babbage's Analytical Engine and is often regarded as the first computer programmer.

Who is Ada Lovelace?

200

This data structure follows a Last In, First Out (LIFO) principle, where the last element added is the first one to be removed.

What is a stack?

200

This programming language, created by Bjarne Stroustrup, is an extension of C and is widely used for system/software development and game programming.

What is C++?

200

In the context of optimization, this term refers to a point that is better than its neighbors but not necessarily the best overall solution.

What is a local maximum?

200

This security measure uses encryption to protect data in transit, commonly seen in web addresses that begin with "https://".

What is SSL/TLS?

300

In 1965, this computer scientist proposed Moore's Law, predicting that the number of transistors on a microchip would double approximately every two years.

Who is Gordon Moore?

300

This tree-based data structure maintains sorted data and allows for efficient insertion, deletion, and lookup operations.

What is a binary search tree? 

300

This language, primarily used for front-end web development, is a core technology alongside HTML and CSS, allowing for interactive web applications.

What is JavaScript?

300

This concept in machine learning refers to the trade-off between a model’s ability to minimize bias and its ability to minimize variance.

What is the bias-variance tradeoff?

300

This term refers to the practice of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability of unfortunate events.

What is risk management?

400

This early computer scientist developed the first compiler in 1952 and is often credited with popularizing the concept of high-level programming languages.

 Who is Grace Hopper?

400

This principle describes how elements are added and removed in a queue, where the first element added is the first one to be removed.

What is FIFO (First In, First Out)?

400

This programming paradigm, which emphasizes immutability and statelessness, is a defining characteristic of languages such as Erlang and Scala, often used in concurrent and distributed systems.

What is functional programming?

400

This term describes the phenomenon where a model performs well on training data but poorly on unseen data due to its complexity.

What is overfitting?

400

This cyber attack technique involves manipulating users into divulging confidential information by posing as a trustworthy entity, often exploited in targeted phishing campaigns.

What is social engineering?

500

This influential 1980s operating system, developed by AT&T’s Bell Labs, introduced a hierarchical file system and multi-user capabilities, becoming the foundation for many modern systems.

What is UNIX?

500

In a doubly linked list, this term refers to the ability of each node to have pointers to both the next and the previous nodes, allowing traversal in both directions.

What is bidirectional traversal?

500

This language, developed for system programming and known for its performance and low-level memory manipulation capabilities, introduced concepts like zero-cost abstractions and is used extensively in game development.

What is Rust?

500

This framework, used in reinforcement learning, models decision-making in situations where outcomes are partly random and partly under the control of a decision-maker, consisting of states, actions, rewards, and transition probabilities.

What is a Markov Decision Process (MDP)?

500

This term refers to a sophisticated cyber attack that typically involves multiple stages, including reconnaissance, exploitation, and exfiltration, often targeting specific organizations.

What is a multi-vector attack or advanced persistent threat (APT)?

M
e
n
u