Tech History
Emerging Tech Trends
Cybersecurity
Tech Pop Culture
Tech Riddles
100

This Legendary tech figure who is considered the father of computer science, cracked the Enigma machine during World War 2.

Who is Alan Turing

100

This technology uses qubits and principles of superposition and entanglement to perform computations exponentially faster than classical computers.

What is Quantum Computing

100

This type of attack involves overwhelming a network or service with excessive traffic to render it unavailable.

What is a DOS attack

100

In the film “Blade Runner,” this term is used for bioengineered humans designed for labor in off-world colonies.

What are Replicants

100

I have keys but no locks, and space but no room. You can enter but can’t go outside. What am I?

What is a keyboard

200

In 1947, William Shockley and his team at Bell Labs invented this semiconductor device that revolutionized electronics.

What is the transistor

200

This 5G technology enables faster data transfer rates and lower latency by using a new radio frequency band.

What is Millimeter Wave

200

This form of malware encrypts files on a victim’s computer and demands payment to decrypt them.

What is ransomware

200

This long-running sci-fi series features a hacker named Lisbeth Salander, who uses her tech skills to investigate mysteries.

What is “The Girl with the Dragon Tattoo” series (Millennium series)

200

I’m a programming concept that’s quite a treat, I let you do the same thing over and over, no need to repeat. What am I?

What is a loop

300

This woman was a pioneer in computer science, developing the first compiler and popularizing the term “debugging”

Who is Grace Hopper

300

This technology brings computation and data storage closer to the data sources to improve response times and save bandwidth.

What is Edge Computing

300

This term describes malware that disguises itself as legitimate software but provides unauthorized access to a user’s system.

what is a Trojan horse

300

In the video game “Portal,” this malevolent AI oversees the Aperture Science Facility and serves as the game’s antagonist.

Who is GLaDOS

300

I’m a protocol that’s quite chatty, I help computers say “Hello” and “How are you?” in binary. What am I?

What is TCP (Transmission Control Protocol)

400

Developed in the 1960s, this network protocol suite became the technical foundation of the internet.

What is TCP/IP

400

This technology uses machine learning algorithms to enable devices to learn from data and make decisions without human intervention, often used in applications like image and speech recognition.

What is Deep Learning

400

This advanced side-channel attack, disclosed in 2018, leverages speculative execution in CPUs to read privileged memory, including that of other processes.

what is the Spectre attack

400

This 1992 novel by Neal Stephenson features a virtual reality world called the Metaverse and introduces the term “avatar” in its modern sense.

What is “Snow Crash”

400

I’m a tool used in programming that can store information, but once assigned, it can’t be changed. What am I?

What is a constant

500

In the early 1800s, this French weaver invented a loom that used punch cards to automate weaving complex patterns.

Who is Joseph Marie Jacquard

500

Abbreviated as “GAN,” this type of AI model consists of two neural networks contesting with each other to generate new, synthetic instances of data.

What is a Generative Adversarial Network

500

This attack exploits vulnerabilities in the Diffie-Hellman key exchange to downgrade secure connections to weaker cryptography.

what is the Logjam attack

500

In “Ghost in the Shell,” this term refers to the pervasive computer networks that allow cybernetic human brains to interface directly with the internet.

What is the cyberbrain or neural cyberization

500

I’m a networking model that’s quite a stack, with 7 layers from physical to application, I’ve got your back. What am I?

What is the OSI (Open Systems Interconnection) model