THIS COMPANY DEVELOPED THE TENSOR FLOW LIBRARY
WHAT IS GOOGLE?
THIS SCIENCE FICTION NOVEL COINED THE TERM "META VERSE".
WHAT IS SNOW CRASH?
ALL ELEMENTS OF THIS DATA STRUCTURE ARE ARRANGED IN A SEQUENCE.
WHAT IS LINEAR DATA STRUCTURE.
AN ESTABLISHED SET OF RULES THAT DETERMINES HOW DATA IS TRANSMITTED BETWEEN DIFFERENT DEVICES IN THE SAME NETWORK.
DEFINE PROTOCOL.
CYBER-ATTACK WHERE USERS OF WEBSITE ARE UNABLE TO ACCESS IT DUE TO FLOODING OF FAKE NETWORK TRAFFIC.
WHAT IS DENIAL OF SERVICE ATTACK?
THIS COMMAND DISPLAYS THE STATE OF THE WORKING DIRECTORY (HINT : VERSION CONTROL)
WHAT IS "GIT STATUS"?
JENSEN HUANG, THE CEO OF OF THIS COMPANY, DEEP FAKED HIMSELF FOR A KEYNOTE SPEECH, TO SHOW OFF THE SIMULATION POWER OF ITS TECHNOLOGY.
WHAT IS NVIDIA?
THE POST FIX EXPRESSION IS (A+B)*C-(D-E)*(F-G).
AB+C*DE-FG+*-
DJANGO IS AN EXAMPLE OF THIS SUB-TYPE OF FRAMEWORK.
WHAT IS FULL-STACK FRAMEWORK?
A TYPE OF CLIENT-SIDE INJECTION ATTACK THAT INVOLVES INJECTING MALACIOUS CODE INTO A VICTIM'S WEB BROWSER TO EXECUTE MALACIOUS SCRIPTS.
WHAT IS CROSS SITE SCRIPTING?
THE ERROR STATUS WHEN YOU FALSELY REJECT NULL HYPOTHESIS.
WHAT IS TYPE 1 ERROR?
THIS IS THE NAME OF THE COMPANY THAT MADE THE AUGMENTED REALITY GAME "POKEMON GO".
WHAT IS NIANTIC?
THE MINIMUM NUMBER OF MOVES REQUIRED TO SOLVE AN 8 DISK, 3 PEG, TOWER OF HANOI PROBLEM.
WHAT IS 255?
COOKIES ARE DESIGNED FOR THIS SIDE OF PROGRAMMING
WHAT IS SERVER SIDE PROGRAMMING?
A PRIVATE NETWORK BASED ON TCP/IP PROTOCOLS ACCESSIBLE ONLY BY COMPANY'S MEMBER OR A PERSON WITH SOME AUTHORIZATION.
WHAT IS INTRANET?
THESE ARE THE THREE LANGUAGES THAT ARE USED IN MACHINE LEARNING.
PROLOG (PROGRAMMING LOGIC), LISP (LIST PROCESSING), PYTHON
THIS IS THE MOST SECURE HASHING FUNCTION ON MARKET AND A PATENTED CRYPTOGRAPHIC HASH FUNCTION THAT OUTPUTS VALUES THAT ARE 256 BITS LONG.
WHAT IS SHA-256?
THE DIFFERENCE BETWEEN HEIGHT OF LEFT AND RIGHT SUB-TREES AND CHECKING THAT THE DISTANCE IS NOT GREATER THAN 1.
WHAT IS BALANCE FACTOR?
THIS ATTRIBUTE IS USED TO DEFINE A NEW NAMESPACE IN XML DOCUMENTS.
WHAT IS XMLNS?
THIS OCCURS WHEN MISTRUSTED DATA IS USED TO ABUSE LOGIC OF AN APPLICATION.
WHAT IS INSECURE DE-SERIALIZATION?
THE TWO MAIN HIDDEN LAYERS IN THE CONVOLUTIONAL NEURAL NETWORK.
CONVOLUTIONAL LAYER AND POOLING LAYER
THIS IS ALSO KNOWN AS WEB 3.0. IT IS AN EXTENSION OF WORLD WIDE WEB THROUGH STANDARDS SET BY W3C WITH A GOAL TO MAKE INTERNET DATA MACHINE READABLE.
WHAT IS SEMANTIC WEB ?
TYPE OF DATA STRUCTURE THAT SUPPORTS EFFICIENT MODIFICATIONS TO A SEQUENCE OF OPERATIONS THAT HAVE BEEN PERFORMED ON THE STRUCTURE.
WHAT IS RETROACTIVE DATA STUCTURE?
IT IS A CSS TECHNIQUE THAT SETS THE STYLE WHEN AN ELEMENT CHANGES ITS STATE
WHAT IS PSEUDO CLASS?
THIS OFTEN ALLOWS ATTACKER TO INTERACT WITH BACK END OR EXTERNAL SYSTEMS THAT APP ITSELF CAN ACCESS AND CAN ALLOW ATTACKER TO READ FILE ON THAT SYSTEM.
WHAT IS XXE (EXTERNAL ENTITY) ATTACK