What delicious computer term did web browser programmer Lou Montulli coin to refer to the small amounts of information created by a web server while someone browses a website?
Cookies.
This tech founder renamed his online bookstore so that it started with the letter “A” in part because website listings at the time were alphabetized
Jeff Bezos.
In 2010, this popular social networking site experienced a privacy breach when user data was inadvertently made public due to unauthorized access by a third-party application developer.
Facebook.
What dynamic data structure can grow or shrink in size as needed and efficiently store ordered elements?
Linked list.
What widely used sorting algorithm divides the data into smaller sub-lists and repeatedly conquers each sub-list before merging them back together?
Merge sort
Often recognized as the first computer programmer, this woman worked on Charles Babbage’s analytical engine.
Ada Lovelace.
The lesser-known founder of Apple, this man first partnered with Steve Jobs to sell “blue boxes” for long-distance phone calls
Steve Wozniak.
What infamous computer virus, named after a term of endearment, spread rapidly through email in 2000, causing damage to millions of computers worldwide?
Lovebug Virus.
What data structure allows for efficient insertion and deletion from any position?
Array (accept: vector)
What popular search algorithm repeatedly halves the search space and discards the half known not to contain the target element?
Binary search.
THINK is the longstanding motto of this company often referred to as "Big Blue."
IBM.
The world’s 3rd largest PC manufacturer is named after this American founder.
Dell.
In 2013, a massive data breach at what retailer compromised millions of customers' credit card information?
Target.
Which data structure efficiently stores key-value pairs, allowing for fast retrieval based on the key?
Dictionary.
Which algorithm prioritizes the selection that seems best at the current moment to find an optimal solution for the whole problem?
Greedy algorithm.
This computing pioneer, who is now perhaps best known for the name of a tech conference, developed the first compiler in the early 1950s
Grace Hopper.
This founder of Bumble and co-founder of Tinder is the youngest woman to take a company public in the United States.
Herd.
The "Ashley Madison" data breach in 2015 exposed the personal information of users of what type of website?
Extramarital affair website.
Which data structure represents a collection of unique elements, ignoring order and duplicates?
Set
What pathfinding algorithm explores all possible paths from a starting point and retraces its steps when it reaches a dead end until it finds the shortest path to the destination?
Backtracking.
Doug Engelbart was the inventor of what computer accessory first made from wood?
Computer mouse.
This Taiwanese-born CEO and founder runs the world’s fourth most valuable public company, Nvidia.
Huang.
In 2017, a ransomware attack known as "WannaCry" targeted what specific type of systems, causing widespread disruption?
Microsoft Windows.
What linear data structure allows for adding and removing elements from both ends efficiently?
Deque
Which algorithm efficiently determines the shortest path between two nodes in a weighted graph?
Dijkstra's Algorithm.