Cyber Security
Data Structures & Algorithms
Finance/
Business
Cloud Concepts
Data Analytics
100

Regarded as the world's foremost and widely-used network protocol analyzer. The name includes a predator of the ocean.

What is Wireshark?

100

This acronym refers to the order in which elements are operated upon within a stack.

What is LIFO?

100

This asset account is utilized to record the amount clients owe a business, but have yet to pay.

What is Accounts Receivable?

100

This fundamental technology of cloud computing allows multiple operating system hosts to run on a single server.

What is virtualization?

100

This term refers to an observation that lies an abnormal distance from other values in a random sample from a population 

What is outlier?

200

This form of attack utilizes many computers to overwhelm a system with requests.

What is DDoS (Distributed Denial of Service)

200

This form of tree traversal traverses nodes in the following order: (Left, Root, Right)

What is Inorder?

200

In economics, this term is used to describe demand that is resilient to changes in price.

What is inelastic demand?

200

This type of hypervisor is installed directly onto a system's hardware.

What is bare metal?

200

This method of statistical analysis examines the relationship of two or more variables of influence.

What is Regression Analysis?

300

Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual are potential symptoms of this.

What is a malware infection?

300

The worst-case runtime of inserting an element into an array.

What is O(n)?

300

This metric is represented by the following equation:

(revenue - cost of goods sold) / revenue

What is Gross Margin?

300

In the IaaS model, this is the first level where responsibility is transferred from the provider to the customer.

What is operating system?

300

This algorithm is used for matching a point with its closest k neighbours in a multi-dimensional space 

What is KNN (K-nearest neighbor)?

400

Released in 1988, this virus is activated every Friday the 13th and affects both .exe and .com files, and deletes any programs run on that day.

What is Jerusalem?

400

This convex hull algorithm utilizes a stack to detect and remove points that create concavity within the hull.

What is Graham Scan?

400

In options trading, this "Greek" measures the time decay of an option contract.

What is Theta?

400

The capability to expand/shrink systems both horizontally and vertically

What is Elasticity?

500

The weakest link in every computer system. The one who can through unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.

Who am I? (Who are you?)

500

Type of app architecture that involves splitting the app into a series of small independent services.

What is a Microservice?