Browse Definitions:
Definition

Do you speek Geek in the Summer? A Science Fiction Quiz

Netscape co-founder and now blogger extraordinaire Marc Andreessen took some time from his busy schedule as an entrepreneur with social networking startup Ning to name his favorite up-and-coming science fiction writers . (He also was friendly enough to link to our cheat sheets and write some kind words -- thanks, Marc!) We'll be tracking down these authors at the Cambridge public library soon for some juicy beach reading. In the meantime, test your knowledge of the science fiction writers whose geeky ideas have, in many cases, been turned into reality. While there still aren't any flying cars or consumer jet packs, it's remarkable how far we've come in 2007.

1. The term robot first appeared in a 1920 play, not a novel, called R.U.R.: Rossum's Universal Robots . In the play, the robots eventually overthrow their human creators. Who coined the term "robot?" (Scroll to the end of the definition for the answer.)
Answer

2. What author is generally credited with coining, or at the least popularizing, the term cyberspace ?
Answer

3. This seminal science fiction writer's 3 Law of Robotics have been revived again and again as robots become integrated into real life. Who created the 3 Laws of Robotics ?
Answer

4. Cyberpunk is a sensibility or belief that a few outsiders, armed with their own individuality and technological capability, can fend off the tendencies of traditional institutions to use technology to control society. Where did the term originate?
Answer

5. Second Life was intended by founder Philip Rosedale to closely mirror the "metaverse," a 3D version of the Internet set in the near-future as described in the cyberpunk novel Snow Crash . Who wrote Snow Crash ?
Answer

6. If you know that to "grok" something is to understand something so well that it is fully absorbed into oneself, you may be familiar with the 1961 science fiction classic, Stranger in a Strange Land . Who wrote it?
Answer

7. Ogg Vorbis (sometimes just called Vorbis) is an open source patent-free audio compression format, developed as a replacement for proprietary digital audio encoding formats like MP3 , VQF, and AAC. While "Ogg" comes from the network game Netrek, "Vorbis" derives from a character in a book, Small Gods. Who wrote it? (Hint: He's perhaps better known for the Discworld series .)
Answer

8. This author edited Mirrorshades , an anthology of stories that largely defined the cyberpunk genre, along with authoring books like Holy Fire , Zeitgeist and, most recently, The Zenith Angle . He made headlines in 1995 for challenging a conference of computer artists and the world at large to help identify the extinct species in the new media taxonomy, initiating the Dead Media Project . Who is he?
Answer

9. Fred Saberhagen, one of the giants of 20th Century science fiction, passed away on June 29, 2007. Along with the Swords series, he's best known for the Berserker books. Saberhagen's masterwork describes an ongoing war between humanity and Berserkers, self-replicating probes programmed with one primary objective: Destroy all life. What are the probes more commonly called -- and what acclaimed computer scientist are they named after?
Answer

10. Mathematician and retired professor Vernor Vinge, best known for his Hugo Award-winning novels A Fire Upon the Deep and A Deepness in the Sky, , wrote an influential 1993 essay entitled "The Coming Technological Singularity." The Singularity now has its own conference and supporters, notably inventor and entrepreneur Ray Kurzweil. This much-hypothesized creation depends upon _____ to arrive at smarter-than-human entities which then rapidly accelerate technological progress beyond human comprehension. What technology does development of the Singularity primarily depend upon?
Answer

Did you enjoy this quiz? Try one of the many other quizzes at WhatIs.com!

This was last updated in July 2007

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close