Steve Jobs
Bill Gates
John Mashey
John Bredi
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
Cyber attack
Computer security
Cryptography
Digital hacking
Confidentiality
Integrity
Availability
Hacking
To store data
To prevent unauthorized access
To accelerate internet speed
To diagnose network issues
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
Google Drive
Dropbox
OneDrive
USB Flash Drive
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
Virtual Machine
Neural Networks
Virtual Reality
Blockchain