General IT Knowledge
Data Viz and Storytelling
Computer Science
AI/ML
Cybersecurity
100

What does “IoT” stand for in technology?

Internet of Things

100

What does KPI stand for in data storytelling?

Key Performance Indicator

100

What type of program translates entire high-level source code into machine code before execution?

Compiler

100

A model that predicts a number (like price or temperature) is doing... what? (One word)

Regression

100

This secret combination of letters, numbers, or symbols is the most common way to protect an online account.

Password

100

Which tech CEO coined the phrase “metaverse” for his company’s vision?

Mark Zuckerberg

100

What chart is commonly used to show trends over time?

 Line Chart

100

A group of 8 bits is commonly called a... what? (One Word)

Byte

100

The process of adjusting a model's weights using "gradient descent" is called... what? (One word)

Backpropagation

100

This type of cyberattack tricks people into giving away personal information, often through fake emails or websites.

Phishing

200

Which software tool is most commonly used for containerization?

Docker

200

What tool is part of Microsoft’s suite and used for data visualization?

Microsoft Power BI/Power BI

200

What fundamental data structure uses LIFO (Last-In, First-Out) ordering?

Stack

200

What metric is defined as True Positives / (True Positives + False Negatives)? (One word)

Recall

200

What does the “https” at the beginning of a website URL indicate and stand for?

Secure/Uses Encryption

https—Hypertext Transfer Protocol Secure

300

In CPU architecture, what does the term “clock speed” measure?

The number of cycles per second, measured in Hertz (GHz).

300

What does a histogram display?

Frequency distribution of data

300

True or False: In Big O notation, O(1) time complexity means the algorithm's runtime grows with the size of the input.

False (O(1)

300

True or False: 'L1 (Lasso)' regularization can shrink some feature weights to exactly zero, effectively performing feature selection.

True

300

What is the term for a program that locks your files and demands payment to unlock them?

Ransomware

500

What company developed the deep learning framework “PyTorch”?

Meta (Facebook)

500

What visualization would you use to represent the relationship between two numerical variables?

Scatter Plot

500

What is the core component of an operating system that manages the CPU and memory? (One word)

Kernel

500

Representing words as dense vectors where similar words are closer together is "Word ..."? (One word)

 Embedding

500

In cybersecurity, what is the name of the attack where a hacker secretly intercepts and possibly alters communication between two parties who believe they are communicating directly with each other?

Man-in-the-Middle (MITM) attack

M
e
n
u