In 1947, William Shockley and his team at Bell Labs invented this semiconductor device that revolutionized electronics.
What is the transistor
This technology uses qubits and principles of superposition and entanglement to perform computations exponentially faster than classical computers.
What is Quantum Computing
This type of attack involves overwhelming a network or service with excessive traffic to render it unavailable.
What is a DOS attack
This HBO series accurately portrayed Silicon Valley startup culture through its compression algorithm storyline
What is Silicon Valley
I have keys but no locks, and space but no room. You can enter but can’t go outside. What am I?
What is a keyboard
This Legendary tech figure who is considered the father of computer science, cracked the Enigma machine during World War 2.
Who is Alan Turing
This 5G technology enables faster data transfer rates and lower latency by using a new radio frequency band.
What is Millimeter Wave
This form of malware encrypts files on a victim’s computer and demands payment to decrypt them.
What is ransomware
This video game series features a hacker group called DedSec fighting against corporate control and surveillance in a near-future setting.
what is watchdogs
I’m a programming concept that’s quite a treat, I let you do the same thing over and over, no need to repeat. What am I?
What is a loop
Developed in the 1960s, this network protocol suite became the technical foundation of the internet.
What is TCP/IP
This technology brings computation and data storage closer to the data sources to improve response times and save bandwidth.
What is Edge Computing
This term describes hardware or software that provides unauthorized access to a system by bypassing normal authentication processes.
What is a backdoor
This tech YouTuber's custom PC building stream became infamous when he made basic assembly errors
Who is The Verge
I’m a protocol that’s quite chatty, I help computers say “Hello” and “How are you?” in binary. What am I?
What is TCP (Transmission Control Protocol)
This woman was a pioneer in computer science, developing the first compiler and popularizing the term “debugging”
Who is Grace Hopper
This technology has transformed how companies deliver software by allowing them to deploy applications in isolated environments on shared infrastructure.
What are containers (or containerization)
This attack technique leverages trusted third-party relationships to infiltrate secured networks through legitimate channels
What is a supply chain attack
This long-running sci-fi series features a hacker named Lisbeth Salander, who uses her tech skills to investigate mysteries.
What is “The Girl with the Dragon Tattoo” series (Millennium series)
I’m a tool used in programming that can store information, but once assigned, it can’t be changed. What am I?
What is a constant
Released in 1983, this GUI-based computer introduced the desktop metaphor and mouse to mainstream users, though it was a commercial failure
Who is Apple Lisa
Abbreviated as “GAN,” this type of AI model consists of two neural networks contesting with each other to generate new, synthetic instances of data.
What is a Generative Adversarial Network
This attack exploits vulnerabilities in the Diffie-Hellman key exchange to downgrade secure connections to weaker cryptography.
what is the Logjam attack
In “Ghost in the Shell,” this term refers to the pervasive computer networks that allow cybernetic human brains to interface directly with the internet.
What is the cyberbrain or neural cyberization
I’m a networking model that’s quite a stack, with 7 layers from physical to application, I’ve got your back. What am I?
What is the OSI (Open Systems Interconnection) model