Women in Tech
The Cloud
Fox
AI/Machine Learning
Cyber Security
100

In 1843, this mathematician and writer published the first algorithm intended for a machine, making her the world’s first computer programmer.

Who is Ada Lovelace?

100

Amazon's cloud computing platform, launched in 2006, powers everything from startups to enterprise solutions globally.

What is AWS (Amazon Web Services)?

100

This Fox drama, which aired from 2004 to 2010, followed a man who deliberately went to prison to help his wrongly accused brother.

What is Prison Break?

100

In 1997, IBM's chess-playing computer defeated world champion Garry Kasparov, marking a milestone in AI history.

What is Deep Blue?

100

This technique, often used by hackers, exploits a system's failure to validate user input, allowing malicious SQL queries to manipulate databases.

What is SQL injection?

200

In 2017, this woman became the CEO of Vimeo, transforming the platform into a leading video software company for creators and businesses.

Who is Anjali Sud?  

200

This term describes a rotating, funnel-shaped cloud that extends from a thunderstorm and is a key indicator of tornado activity.

What is a wall cloud?

200

Before becoming a household name, this Family Guy creator got his start at Fox in 1999, blending irreverent comedy and pop culture references.

Who is Seth MacFarlane?

200

This AI framework developed by Google is widely used for machine learning and deep learning tasks.

What is TensorFlow?

200

The CIA Triad is a foundational principle in cybersecurity. The "C" represents confidentiality, and the "A" stands for availability. This is what the "I" represents.

What is integrity?

300

As the CEO of YouTube from 2014 to 2023, this tech executive played a key role in Google’s acquisition of the platform.

Who is Susan Wojcicki?

300

This cloud storage service from Google allows users to store files, share them, and collaborate in real-time.

What is Google Drive?

300

Premiering in 2016, this Fox series told the origin story of Batman's allies and villains, focusing on Detective Jim Gordon's rise in a crime-ridden city.

What is Gotham?

300

In machine learning, this two-word term refers to the process of adjusting model parameters to minimize prediction errors.

What is gradient descent?

300

This advanced cyber-attack technique involves injecting malicious code directly into a system’s memory to evade detection by traditional antivirus software.

What is fileless malware?

400

This African-American mathematician, portrayed in Hidden Figures, calculated flight trajectories for NASA, helping send John Glenn to space.

Who is Katherine Johnson?

400

In meteorology, these dark, towering storm clouds are responsible for heavy rain, lightning, and sometimes hail or tornadoes.

What are cumulonimbus clouds?

400

Fox's network coverage of this global event in 2022 marked a milestone as it was the first time the tournament aired on a U.S. broadcast network in the winter.

What is the FIFA World Cup?

400

Created by OpenAI, this large language model launched in 2023 is known for generating human-like text and revolutionizing generative AI.

What is GPT-4?

400

This type of cybersecurity attack floods a system, server, or network with traffic to exhaust resources and make it unavailable to users.

What is a DDoS attack (Distributed Denial of Service)?

500

The founder of Girls Who Code, this advocate works to close the gender gap in technology and inspire young women to pursue computer science.

Who is Reshma Saujani?

500

This cloud computing concept allows organizations to deploy applications across multiple cloud providers, reducing risk and vendor lock-in.

What is multi-cloud?

500

In 1985, Rupert Murdoch acquired this independent television station group, using it to launch the Fox Broadcasting Company in 1986.

What is Metromedia?

500

This term describes the challenge in machine learning where a model performs well on training data but fails to generalize to new, unseen data.

What is overfitting?

500

Used to detect and exploit buffer overflow vulnerabilities, this two-word cybersecurity term involves sending more data than a buffer can hold to overwrite memory.

What is fuzz testing (or fuzzing)?

M
e
n
u