This language is a top choice for AI and machine learning, thanks to TensorFlow and PyTorch.
What is Python?
This is the process of converting data into a secure format that cannot be easily read by unauthorized users.
What is encryption?
This search engine’s name was based on this number 10100
What is Google?
This type of programming paradigm is based on objects and classes.
What is object-oriented programming?
This internet used to disconnect when you pick up the phone.
What is dial-up
This language is commonly used for web development alongside HTML and CSS.
What is JavaScript?
This type of attack floods a system with excessive traffic to overwhelm it.
What is a DDoS attack?
In this popular Valve game TF2, when the image file was removed, the game broke.
What is a coconut.jpg
This algorithmic analysis measures how an algorithm's performance scales with input size.
What is Big O notation?
This is now the save icon on most word-processing applications
What is a floppy disk
This language is used a lot in Android app development and shares its name with coffee.
What is Java?
This cyber attack involves disguising malicious software as a legitimate program.
What is a Trojan horse?
This popular AI language model was first released by OpenAI in 2020.
What is GPT-3 (Generative Pre-trained Transformer - 3)?
In concurrency, this problem occurs when multiple threads attempt to modify shared data at the same time.
What is a race condition?
This programming language, commonly used in game development, is the primary language of the Unity engine.
What is C#?
A "zero-day exploit" refers to a vulnerability that is what?
What is unknown to the software vendor?
The name of this digital assistant on Windows is derived from a character in the Halo video game series.
What is Cortana?
This principle in object-oriented programming allows a child class to acquire the properties and behaviors of a parent class.
What is inheritance?
This mobile phone brand was known for its near-indestructible design and the game Snake.
What is Nokia?
This language is commonly used for writing bootloaders, operating systems, and firmware due to its direct interaction with CPU instructions.
What is Assembly?
This cryptographic hash function, commonly used in passwords, is considered weak due to its vulnerability to rainbow table attacks.
What is MD5?
The term “bug” in computing was popularized after a literal insect was found in this type of machine.
What is a computer relay?
This type of synchronization mechanism prevents multiple threads from modifying a resource simultaneously.
What is a mutex?
This media format was rewound with a pencil when it got tangled.
What is a cassette tape?