Data Structures
Algorithms
Programming Languages
Hardware & Systems
Cybersecurity
100

This structure removes the most recently added item first.

What is a stack?

100

A search that checks each element in order.

What is linear search?

100

The scripting language that runs inside web browsers.

What is JavaScript?

100

The processor that carries out program instructions.

What is the CPU?

100

A deceptive email or website designed to trick users into giving away sensitive information.

What is phishing?

200

A structure that removes items based on importance rather than order.

What is a priority queue?

200

A search that repeatedly halves a sorted list.

What is binary search?

200

A language known for readability and widely used in automation and AI.

What is Python?

200

The component specialized for parallel math operations and graphics.

What is the GPU?

200

Malware that secretly captures keystrokes, screenshots or user activity for an attacker.

What is spyware (or a keylogger)?

300

This structure allows fast insertions/removals but slow random access because it’s stored as linked nodes.

What is a linked list?

300

This algorithm finds the shortest path in unweighted graphs.

What is breadth-first search?

300

This language compiles JVM byte code and focuses on null safety and conciseness.

What is Kotlin?

300

This type of storage uses NAND flash and is far faster than HDD’s.

What is an SSD?

300

An attack where an attacker injects malicious input into a database query to manipulate or read unintended data.

What is SQL Injection?

400

A tree that keeps elements sorted and allows efficient searching, but does not guarantee balance.

What is a binary search tree?

400

This algorithm uses a “visited” and “low-link” value to detect cycles and strongly connected components.

What is Tarjan’s algorithm?

400

This language gives manual memory control and is widely used in engines like Unreal.

What is C++?

400

This OS mechanism lets multiple processes share CPU time by rapidly switching between them.

What is preemptive multitasking?

400

This technique intercepts network traffic between two parties, allowing an attacker to eavesdrop or alter communications.

What is a man-in-the-middle attack?

500

This advanced data structure combines arrays and linked lists to allow fast ordered access, used in systems like Redis.

What is a skip list?

500

A divide-and-conquer sorting algorithm with average O(nlog(n)) time but worst-case O(n^2).

What is quicksort?

500

A paradigm where functions have no side effects and avoid modifying state.

What is functional programming?

500

Modern CPUs use this technique to run instructions before knowing which branch will occur.

What is speculative execution?

500

A vulnerability where untrusted input is executed by a browser as code, often through malicious scripts embedded in the web pages.

What is cross-site scripting (XSS)?