"It Works On My Machine" (QA)
The "S" in IoT
(Security)
Prompt Engineering
(AI)
Naming is Hard
(Coding)
Legacy Lore
(History)
100

This term describes a bug that seems to disappear or change its behavior when you try to study it.

Heisenbug

100

This 8-character password consistently tops the list of the most common passwords in the world.

12345678

100

This "Father of AI" famously asked "Can machines think?" in his 1950 paper.

Alan Turing

100

This case style uses underscores between words, often looking like a long, thin reptile.

snake_case

100

This "insect" was famously found inside a Harvard Mark II computer in 1947.

Moth (The first "bug")

200

This 3-digit HTTP status code is the official response for "I'm a teapot."

418

200

This type of "hat" is worn by hackers who break into systems specifically to help fix vulnerabilities.

White Hat

200

This 3-letter acronym describes the "brain" behind models like ChatGPT, Claude, or Gemini.

LLM

200

This case style capitalizes the first letter of every word except the first.

camelCase

200

This 1999 "bug" had the world convinced that every computer would crash at midnight.

Y2K

300

This animal is the official mascot of the Linux kernel, often seen in sticker form on laptops.

Tux

300

This term refers to tricking people into giving up sensitive information.

Phishing

300

This occurs when you provide an AI with a few examples of a task before asking it to perform it.

Few-shot Prompting

300

This term describes code that is functional but so messy it's compared to a tangled Italian dish.

Spaghetti Code

300

This storage device’s icon is still the "Save" button, even though half the team has never seen one.

Floppy Disk

400

This testing practice uses a "dummy" object to mimic the behavior of a real, complex component.

Mocking

400

This type of physical attack involves following an authorized person into a secure area without a badge.

Tailgating or Piggybacking

400

This technique asks an AI to "think step-by-step" to improve its reasoning and accuracy.

Chain of Thought (CoT)

400

This "Law" states that any piece of software will eventually grow until it can send email.

Zawinski's Law

400

This was the very first domain name ever registered back in 1985 (ending in .com).

500

This specific type of test is performed at the very end to ensure the software actually meets the client's needs.

UAT

500

This 2014 vulnerability in OpenSSL was so famous it had its own logo of a bleeding heart.

Heartbleed

500

This term describes an AI's ability to perform a task it wasn't specifically trained for, like writing poetry in a specific code.

Zero-shot Learning

500

This process involves removing all unnecessary characters from source code to reduce file size.

Minification

500

This circa 1969 programming language was the direct predecessor to the C language

B

M
e
n
u