What does “IoT” stand for in technology?
Internet of Things
What does KPI stand for in data storytelling?
Key Performance Indicator
What type of program translates entire high-level source code into machine code before execution?
Compiler
A model that predicts a number (like price or temperature) is doing... what? (One word)
Regression
This secret combination of letters, numbers, or symbols is the most common way to protect an online account.
Password
Which tech CEO coined the phrase “metaverse” for his company’s vision?
Mark Zuckerberg
What chart is commonly used to show trends over time?
Line Chart
A group of 8 bits is commonly called a... what? (One Word)
Byte
The process of adjusting a model's weights using "gradient descent" is called... what? (One word)
Backpropagation
This type of cyberattack tricks people into giving away personal information, often through fake emails or websites.
Phishing
Which software tool is most commonly used for containerization?
Docker
What tool is part of Microsoft’s suite and used for data visualization?
Microsoft Power BI/Power BI
What fundamental data structure uses LIFO (Last-In, First-Out) ordering?
Stack
What metric is defined as True Positives / (True Positives + False Negatives)? (One word)
Recall
What does the “https” at the beginning of a website URL indicate and stand for?
Secure/Uses Encryption
https—Hypertext Transfer Protocol Secure
In CPU architecture, what does the term “clock speed” measure?
The number of cycles per second, measured in Hertz (GHz).
What does a histogram display?
Frequency distribution of data
True or False: In Big O notation, O(1) time complexity means the algorithm's runtime grows with the size of the input.
False (O(1)
True or False: 'L1 (Lasso)' regularization can shrink some feature weights to exactly zero, effectively performing feature selection.
True
What is the term for a program that locks your files and demands payment to unlock them?
Ransomware
What company developed the deep learning framework “PyTorch”?
Meta (Facebook)
What visualization would you use to represent the relationship between two numerical variables?
Scatter Plot
What is the core component of an operating system that manages the CPU and memory? (One word)
Kernel
Representing words as dense vectors where similar words are closer together is "Word ..."? (One word)
Embedding
In cybersecurity, what is the name of the attack where a hacker secretly intercepts and possibly alters communication between two parties who believe they are communicating directly with each other?
Man-in-the-Middle (MITM) attack