This term describes a bug that seems to disappear or change its behavior when you try to study it.
Heisenbug
This 8-character password consistently tops the list of the most common passwords in the world.
12345678
This "Father of AI" famously asked "Can machines think?" in his 1950 paper.
Alan Turing
This case style uses underscores between words, often looking like a long, thin reptile.
snake_case
This "insect" was famously found inside a Harvard Mark II computer in 1947.
Moth (The first "bug")
This 3-digit HTTP status code is the official response for "I'm a teapot."
418
This type of "hat" is worn by hackers who break into systems specifically to help fix vulnerabilities.
White Hat
This 3-letter acronym describes the "brain" behind models like ChatGPT, Claude, or Gemini.
LLM
This case style capitalizes the first letter of every word except the first.
camelCase
This 1999 "bug" had the world convinced that every computer would crash at midnight.
Y2K
This animal is the official mascot of the Linux kernel, often seen in sticker form on laptops.
Tux
This term refers to tricking people into giving up sensitive information.
Phishing
This occurs when you provide an AI with a few examples of a task before asking it to perform it.
Few-shot Prompting
This term describes code that is functional but so messy it's compared to a tangled Italian dish.
Spaghetti Code
This storage device’s icon is still the "Save" button, even though half the team has never seen one.
Floppy Disk
This testing practice uses a "dummy" object to mimic the behavior of a real, complex component.
Mocking
This type of physical attack involves following an authorized person into a secure area without a badge.
Tailgating or Piggybacking
This technique asks an AI to "think step-by-step" to improve its reasoning and accuracy.
Chain of Thought (CoT)
This "Law" states that any piece of software will eventually grow until it can send email.
Zawinski's Law
This was the very first domain name ever registered back in 1985 (ending in .com).
This specific type of test is performed at the very end to ensure the software actually meets the client's needs.
UAT
This 2014 vulnerability in OpenSSL was so famous it had its own logo of a bleeding heart.
Heartbleed
This term describes an AI's ability to perform a task it wasn't specifically trained for, like writing poetry in a specific code.
Zero-shot Learning
This process involves removing all unnecessary characters from source code to reduce file size.
Minification
This circa 1969 programming language was the direct predecessor to the C language
B