Tech History
Emerging Tech Trends
Cybersecurity
Tech Pop Culture
Tech Riddles
100

In 1947, William Shockley and his team at Bell Labs invented this semiconductor device that revolutionized electronics.

What is the transistor

100

This technology uses qubits and principles of superposition and entanglement to perform computations exponentially faster than classical computers.

What is Quantum Computing

100

This type of attack involves overwhelming a network or service with excessive traffic to render it unavailable.

What is a DOS attack

100

This HBO series accurately portrayed Silicon Valley startup culture through its compression algorithm storyline

What is Silicon Valley

100

I have keys but no locks, and space but no room. You can enter but can’t go outside. What am I?

What is a keyboard

200

This Legendary tech figure who is considered the father of computer science, cracked the Enigma machine during World War 2.

Who is Alan Turing

200

This 5G technology enables faster data transfer rates and lower latency by using a new radio frequency band.

What is Millimeter Wave

200

This form of malware encrypts files on a victim’s computer and demands payment to decrypt them.

What is ransomware

200

This video game series features a hacker group called DedSec fighting against corporate control and surveillance in a near-future setting.

what is watchdogs

200

I’m a programming concept that’s quite a treat, I let you do the same thing over and over, no need to repeat. What am I?

What is a loop

300

Developed in the 1960s, this network protocol suite became the technical foundation of the internet.

What is TCP/IP

300

This technology brings computation and data storage closer to the data sources to improve response times and save bandwidth.

What is Edge Computing

300

This term describes hardware or software that provides unauthorized access to a system by bypassing normal authentication processes.

What is a backdoor

300

This tech YouTuber's custom PC building stream became infamous when he made basic assembly errors

Who is The Verge

300

I’m a protocol that’s quite chatty, I help computers say “Hello” and “How are you?” in binary. What am I?

What is TCP (Transmission Control Protocol)

400

This woman was a pioneer in computer science, developing the first compiler and popularizing the term “debugging”

Who is Grace Hopper

400

This technology has transformed how companies deliver software by allowing them to deploy applications in isolated environments on shared infrastructure.

What are containers (or containerization)

400

This attack technique leverages trusted third-party relationships to infiltrate secured networks through legitimate channels

What is a supply chain attack

400

This long-running sci-fi series features a hacker named Lisbeth Salander, who uses her tech skills to investigate mysteries.

What is “The Girl with the Dragon Tattoo” series (Millennium series)

400

I’m a tool used in programming that can store information, but once assigned, it can’t be changed. What am I?

What is a constant

500

Released in 1983, this GUI-based computer introduced the desktop metaphor and mouse to mainstream users, though it was a commercial failure

Who is Apple Lisa

500

Abbreviated as “GAN,” this type of AI model consists of two neural networks contesting with each other to generate new, synthetic instances of data.

What is a Generative Adversarial Network

500

This attack exploits vulnerabilities in the Diffie-Hellman key exchange to downgrade secure connections to weaker cryptography.

what is the Logjam attack

500

In “Ghost in the Shell,” this term refers to the pervasive computer networks that allow cybernetic human brains to interface directly with the internet.

What is the cyberbrain or neural cyberization

500

I’m a networking model that’s quite a stack, with 7 layers from physical to application, I’ve got your back. What am I?

What is the OSI (Open Systems Interconnection) model