This company, founded in a garage in 1976 by Steve Jobs, Steve Wozniak, and Ronald Wayne, revolutionized personal computing.
Apple
This type of cyberattack tricks people into providing sensitive information by pretending to be a trustworthy entity.
Phishing
In web development, HTML stands for this
HyperText Markup Language
This AI model, developed by OpenAI, can generate human-like text responses.
ChatGPT
This billionaire tech entrepreneur, played by Robert Downey Jr., is the alter ego of Iron Man.
Tony Stark
The first website was created in 1991 by this British scientist.
Tim Berners-Lee
The S in HTTPS stands for this, indicating encrypted communication on websites.
Secure
A loop that never ends in programming is called this.
Infinite Loop
This field of AI focuses on training computers to recognize patterns and make decisions with minimal human input.
ML
In "The Matrix," this color pill represents choosing to learn the truth
Red Pill
This programming language, named after a famous TV sketch comedy group, was released in 1991.
Python
This type of malware locks users out of their systems and demands payment to restore access.
Ransomware
The "C" in CSS stands for this.
Cascading
This law states that computing power doubles approximately every two years.
Moore’s Law
In Spider-Man: Into the Spider-Verse, Miles Morales learns about a futuristic, AI-powered villain who can open portals between dimensions. What is the villain’s name?
Kingpin
In 1983, this term was coined by researcher Fred Cohen to describe self-replicating computer programs
computer virus
A hacker who uses their skills for ethical purposes, such as finding security vulnerabilities, is called this.
In JavaScript, this keyword is used to declare a variable that cannot be reassigned after its initial value is set
const
This AI-powered image generation model, developed by OpenAI, can create highly realistic images from text descriptions.
DALL·E
In the movie Everything Everywhere All at Once, characters use futuristic Bluetooth-like earpieces to access skills from different versions of themselves. This device is called a ____.
Verse-jump headset
The floppy disk, once a common data storage method, was first introduced by this company
IBM
A method where cybercriminals secretly capture keystrokes to steal login credentials
Keylogging
In programming, this common data structure follows the Last In, First Out (LIFO) principle and is used in function calls and undo features.
Stack
This AI technique allows models like ChatGPT to generate text based on the probability of word sequences.
Transformer model
The first iPhone was unveiled in 2007, but this 1960s sci-fi TV show featured a similar touchscreen communicator decades earlier.
Star Trek