Mythical Tech Creatures
Hardware Essentials
Computer Abbreviations
Silicon Chronicles
Software Engineering
100

This term is used to describe an error or flaw in software or hardware that produces an incorrect or unexpected result.

What is a bug?

100

This common input device allows users to input spatial data to a computer.

What is a mouse?

100

This protocol is used to securely transfer files over the internet.

What is SFTP (Secure File Transfer Protocol)?

100

The first successful personal computer to feature a mouse and a graphical user interface.

What is the Macintosh?

100

A version control system for tracking changes in source code during software development.

What is Git?

200

Often found lurking in email attachments, this type of malicious software replicates itself to spread to other computers.

What is a virus?

200

The primary circuit board of a computer that houses the CPU, memory, and other components.

What is a motherboard?

200

This term refers to the isolated environment in which Java programs run.

What is JVM (Java Virtual Machine)?

200

The World Wide Web was invented in this research facility in Europe.

What is CERN?

200

The principle of hiding the internal implementation details of a class and only exposing a public interface.

What is Encapsulation?

300

Named after a creature from Greek mythology, this type of software secretly records user activity.

What is a Trojan (or Trojan horse)?

300

The permanent storage used to hold data indefinitely, typically used for the operating system, programs, and other files.

What is a hard drive or SSD (Solid State Drive)?

300

This type of memory is volatile and is used to store data that is being actively used by the operating system.

What is RAM (Random Access Memory)?

300

This code-breaking machine developed during WWII is considered one of the first computers.

What is the Bombe?

300

A software development methodology that emphasizes iterative development, collaboration, and adaptability.

What is Agile?

400

This ‘creature’ is a self-replicating program that can spread independently within and between systems without needing to attach itself to a software file.

What is a worm?

400

This device is essential for cooling a computer's CPU and ensuring it does not overheat during operation.

What is a heatsink or CPU cooler?

400

A database system that organizes data into tables, and is known for its relational model.

What is SQL (Structured Query Language)?

400

This programming language created by Dennis Ritchie is known for its use in systems programming and its association with UNIX.

What is C?

400

A design pattern that separates an application into three main logical components: the model, the view, and the controller.

What is MVC (Model-View-Controller)?

500

Named after a water-dwelling mythical creature, this type of attack floods a server with traffic to make it unavailable to its intended users.

What is a DDoS attack (Distributed Denial of Service)?

500

This computer component is used to render images to a display.

What is a graphics card or GPU (Graphics Processing Unit)?

500

This standard is used for wireless networking and defines the protocols for computer communication over a network.

What is IEEE 802.11?

500

The first algorithmic programming language, designed in the 1950s for business data processing.

What is COBOL?

500

The acronym for a set of software development practices that combines software development (Dev) and IT operations (Ops) to shorten the systems development life cycle.

What is DevOps?