Binary
Computer Potpourri
AI / ML
Computer Networks
Cyber / Info Security
100

The binary number 10000 in decimal

What is 16?

100

Of all the ways to improve a password, this one has the greatest effect on resisting brute-force attacks.

What is making a password longer?

100

This paradox states that some tasks that are simple for humans to do are difficult for AI to do.

What is Moravec's Paradox?

100

There are two roles that a computer can assume when sending/receiving information.

What is Client/Server?

100

This type of attack exploits unknown vulnerabilities.

What is a Zero-Day Attack?

200

The decimal number 26 in binary

What is 11010?  

200

Its components consist of 4 items: Memory, Input, CPU and Output

What is the Von Neumann Architecture

    

200

The recommendation engine that suggests movies on Netflix excels at predicting what you might watch next but cannot handle tasks outside that domain.

What is Narrow AI?

200

An agreed upon set of rules for performing a task

What is a protocol?

200

After exploiting vulnerabilities and infiltrating a system, an attacker may escalate privileges or install backdoors in this phase, so they don’t lose their hard-won foothold.

What is Maintaining Access?

300

The minimum number of bits required to represent 50 unique values. 

What is 6?

b = log2n

300

How we explain the balance of memory vs cost in computers

What is Memory Hierarchy?

300

This machine learning method takes unlabeled data and attempts to identify meaningful insights/groupings.

What is Unsupervised Learning?

300

When sending messages from one network to another network, it is the device that determines a path and forwards the packet onward.

What is a router?

300

This kind of attack takes advantage of people’s natural tendency to reveal sensitive information.

What is social engineering?

400

The number of unique values that can be represented with 7 bits.

What is 128?

n = 2b

400

A current GPU holds about 76 billion transistors. According to Moore’s law, a similar chip would need this many years to quadruple that count to 304 billion.”

What is 4 years?

400

This computational model, inspired by the human brain, forms the backbone of today’s large language models.  

What is a Neural Network?

400

A protocol that could be used to move a 200 MB dataset from your desktop to a server for processing.

What is FTP?

400

This cyber security principle is violated by a malware that is capable of deleting data from a person's computer.

What is Availability?

500

The number of bits equivalent to 13 KB

What is 106,496


1 bit = 8 Bytes

1 Byte = 1024 KB

500

The component of the von Neumann Computer Architecture that processes data and executes programs (including the operating system, see below). It is responsible for all computation. 

What is the CPU (Central Processing Unit)?

500

A machine learning model that has extremely low error on the training set but much higher error on the test set is exhibiting this problem.  

What is overfitting?

500

A lookup service contacted to resolve names your computer can't understand such as www.google.com.

What is DNS?

500

This system uses asymmetric encryption, digital certificates, and trusted authorities to verify the identity of users and devices across a network.

What is PKI (Public Key Infrastructure)?