Is that a Gadget in your Pocket or did you just finish seeing the new Star Wars
100
This person owns a dotcom Jungle -- not literally.
Who is Jeff Bezos
100
The collection of physical elements that constitutes a computer system.
What is hardware.
100
This process is named after a formation in nature where H2O flows over a vertical drop.
What is the waterfall process
100
In machine learning and cognitive science, this type of computational model are inspired by biology and are used to estimate or approximate functions that can depend on a large number of inputs and are generally unknown.
What is an Artificial Neural Network.
100
1,000 songs in your pocket.
What is the iPod.
200
She is often regarded as the first computer programmer and even had a computer language named after her.
Who is Ada Lovelace.
200
Any set of instructions that directs a computer to perform specific operations
What is software.
200
The process improvement training and appraisal program and service administered and marketed by Carnegie Mellon University (CMU) and required by many DoD and U.S. Government contracts, especially in software development.
What is CMMI.
200
In probability theory and statistics, this function describes the probability that a real-valued random variable X with a given probability distribution will be found to have a value less than or equal to x.
What is the cumulative distribution function (CDF).
200
Device used for voice communication in the universe of Star Trek.
What is the communicator.
300
He once was quoted as saying: "640K ought to be enough for anybody."
Who is Bill Gates.
300
Software whose usefulness is reduced because of the excessive disk space and memory it requires
What is bloatware.
300
The software release process is explained in this SWI.
What is SWI720
300
P(A|B) = P(B|A)P(A)
------------
P(B)
What is Bayes' Theorem.
300
The ultimate gadget -- used by the Jedi or the bad guys Sith.
What is a Lighsaber.
400
This non-politician invented the World Wide Web.
Who is Tim Berners-Lee.
400
Umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
What is malware.
400
A rugby analogy for a development methodology that allows a team to self-organize and make changes quickly.
What is a scrum.
400
A technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution
What is a heuristic.
400
This electronic device is worn on your fictional wrist manufactured by RobCo Industries. It's able to survive nuclear fallout!
What is the Pip-Boy
500
Creator of the C++ programming language.
Who is Bjarne Stroustrup.
500
Originally, this type of code was defined as the contents of a writable control store (a small specialized high speed memory), containing microcode that defined and implemented the computer's instruction set, and that could be reloaded to specialize or modify the instructions that the central processing unit (CPU) could execute.
What is firmware
500
This model states: "The main rule is always resolve the most important issue first."
What is the Chaos Model.
500
An algorithm for finding the shortest paths between nodes in a graph invented by this Dutch computer scientist.