History of CS
Tech Mogul Mysteries
Hacking Headlines
Data Structures
Algorithms
100

What delicious computer term did web browser programmer Lou Montulli coin to refer to the small amounts of information created by a web server while someone browses a website?

Cookies.

100

This tech founder renamed his online bookstore so that it started with the letter “A” in part because website listings at the time were alphabetized

Jeff Bezos.

100

In 2010, this popular social networking site experienced a privacy breach when user data was inadvertently made public due to unauthorized access by a third-party application developer.

Facebook.

100

What dynamic data structure can grow or shrink in size as needed and efficiently store ordered elements?

Linked list.

100

What widely used sorting algorithm divides the data into smaller sub-lists and repeatedly conquers each sub-list before merging them back together?

Merge sort

200

Often recognized as the first computer programmer, this woman worked on Charles Babbage’s analytical engine.

Ada Lovelace.

200

The lesser-known founder of Apple, this man first partnered with Steve Jobs to sell “blue boxes” for long-distance phone calls

Steve Wozniak.

200

What infamous computer virus, named after a term of endearment, spread rapidly through email in 2000, causing damage to millions of computers worldwide?

Lovebug Virus.

200

What data structure allows for efficient insertion and deletion from any position?

Array (accept: vector)

200

What popular search algorithm repeatedly halves the search space and discards the half known not to contain the target element?

Binary search.

300

THINK is the longstanding motto of this company often referred to as "Big Blue."

IBM.

300

The world’s 3rd largest PC manufacturer is named after this American founder.

Dell.

300

In 2013, a massive data breach at what retailer compromised millions of customers' credit card information?

Target.

300

Which data structure efficiently stores key-value pairs, allowing for fast retrieval based on the key?

Dictionary.

300

Which algorithm prioritizes the selection that seems best at the current moment to find an optimal solution for the whole problem?

Greedy algorithm.

400

This computing pioneer, who is now perhaps best known for the name of a tech conference, developed the first compiler in the early 1950s

Grace Hopper.

400

This founder of Bumble and co-founder of Tinder is the youngest woman to take a company public in the United States.

Herd.

400

The "Ashley Madison" data breach in 2015 exposed the personal information of users of what type of website?

Extramarital affair website.

400

Which data structure represents a collection of unique elements, ignoring order and duplicates?

Set

400

What pathfinding algorithm explores all possible paths from a starting point and retraces its steps when it reaches a dead end until it finds the shortest path to the destination?

Backtracking.

500

Doug Engelbart was the inventor of what computer accessory first made from wood?

Computer mouse.

500

This Taiwanese-born CEO and founder runs the world’s fourth most valuable public company, Nvidia.

Huang.

500

In 2017, a ransomware attack known as "WannaCry" targeted what specific type of systems, causing widespread disruption?

Microsoft Windows.

500

What linear data structure allows for adding and removing elements from both ends efficiently?

Deque

500

Which algorithm efficiently determines the shortest path between two nodes in a weighted graph?

Dijkstra's Algorithm.

M
e
n
u