Artificial Intelligence
Computer Engineering
Cybersecurity
Programming & Software
Real-World
100

This branch of AI focuses on systems that learn from data

What is machine learning?

100

This is the basic unit of information in computing, represented as 0 or 1

What is a bit?

100

The is the practice of disguising information so only authorized parties can read it

What is encryption?

100

This data structure follows a Last-In-First-Out (LIFO) order for adding and removing elements

What is a stack?

100
She is credited as the world's first computer programmer

Who is Ada Lovelace?

200

This type of learning uses labeled training data to predict outcomes

What is supervised learning?

200

This component of a CPU executes arithmetic and logical operations

What is the Arithmetic Logic Unit (ALU)?

200
In 1988, this "worm" caused one of the first major Internet shutdowns, slowing down thousands of computers

What is the Morris Worm?

200

In object-oriented programming, this feature allows different classes to have methods with the same name but different implementations

What is polymorphism?

200

This type of software license allows users to view, modify, and distribute source code freely

What is open-source?

300

This is a theoretical type of AI that possesses human-level cognitive abilities and can understand and learn knowledge across a broad range of tasks

What is Artificial General Intelligence (AGI)

300

This universal gate can be combined to implement any Boolean function, making it a cornerstone of circuit design

What is a NAND gate?

300
This framework, often abbreviated CIA, describes the 3 core goals of security
What is confidentiality, integrity, and availability?
300

This divide-and-conquer sorting algorithm repeatedly splits an array in half, sorts the halves, then combines them back together

What is merge sort?

300

This was the name of the first electronic general-purpose computer

What is ENIAC?

400

In natural language processing, this type of model architecture, introducted in 2017, powers ChatGPT

What is the Transformer?

400

This pipeline hazard occurs when the CPU must wait for data from a previous instruction

What is a data hazard?

400

This type of attack exploits vulnerabilities in a web application's database queries, allowing an attacker to read, modify, or delete data without authorization

What is SQL injection?

400

This memory management technique automatically reclaims memory that is no longer reachable by the program to prevent leaks

What is garbage collection?

400

In 2016, this AI from DeepMind surprised the world by defeating a Go world champion, a feat previously thought to be impossible for machines

What is AlphaGo?

500

This phenomenon occurs when a large language model (LLM) generates outputs that are syntactically plausible, but factually incorrect

What is hallucination?

500

This sequential circuit stores a single bit of data and has a feedback loop to maintain its state

What is a flip-flop?

500
This cryptographic technique allows a party to prove knowledge of a secret without revealing the secret itself, often used in authentication protocols

What is zero knowledge proofs (ZKPs)?

500

This front-end framework created by Facebook allows users to develop and build interactive UI using components

What is React?

500

This 2013 breach exposed the data of over 3 billion user accounts, making it the largest known data breach in history

What is the Yahoo breach?

M
e
n
u