Browse Definitions:
Definition

Do you speek Geek in the Summer? A Science Fiction Quiz

Netscape co-founder and now blogger extraordinaire Marc Andreessen took some time from his busy schedule as an entrepreneur with social networking startup Ning to name his favorite up-and-coming science fiction writers . (He also was friendly enough to link to our cheat sheets and write some kind words -- thanks, Marc!) We'll be tracking down these authors at the Cambridge public library soon for some juicy beach reading. In the meantime, test your knowledge of the science fiction writers whose geeky ideas have, in many cases, been turned into reality. While there still aren't any flying cars or consumer jet packs, it's remarkable how far we've come in 2007.

1. The term robot first appeared in a 1920 play, not a novel, called R.U.R.: Rossum's Universal Robots . In the play, the robots eventually overthrow their human creators. Who coined the term "robot?" (Scroll to the end of the definition for the answer.)
Answer

2. What author is generally credited with coining, or at the least popularizing, the term cyberspace ?
Answer

3. This seminal science fiction writer's 3 Law of Robotics have been revived again and again as robots become integrated into real life. Who created the 3 Laws of Robotics ?
Answer

4. Cyberpunk is a sensibility or belief that a few outsiders, armed with their own individuality and technological capability, can fend off the tendencies of traditional institutions to use technology to control society. Where did the term originate?
Answer

5. Second Life was intended by founder Philip Rosedale to closely mirror the "metaverse," a 3D version of the Internet set in the near-future as described in the cyberpunk novel Snow Crash . Who wrote Snow Crash ?
Answer

6. If you know that to "grok" something is to understand something so well that it is fully absorbed into oneself, you may be familiar with the 1961 science fiction classic, Stranger in a Strange Land . Who wrote it?
Answer

7. Ogg Vorbis (sometimes just called Vorbis) is an open source patent-free audio compression format, developed as a replacement for proprietary digital audio encoding formats like MP3 , VQF, and AAC. While "Ogg" comes from the network game Netrek, "Vorbis" derives from a character in a book, Small Gods. Who wrote it? (Hint: He's perhaps better known for the Discworld series .)
Answer

8. This author edited Mirrorshades , an anthology of stories that largely defined the cyberpunk genre, along with authoring books like Holy Fire , Zeitgeist and, most recently, The Zenith Angle . He made headlines in 1995 for challenging a conference of computer artists and the world at large to help identify the extinct species in the new media taxonomy, initiating the Dead Media Project . Who is he?
Answer

9. Fred Saberhagen, one of the giants of 20th Century science fiction, passed away on June 29, 2007. Along with the Swords series, he's best known for the Berserker books. Saberhagen's masterwork describes an ongoing war between humanity and Berserkers, self-replicating probes programmed with one primary objective: Destroy all life. What are the probes more commonly called -- and what acclaimed computer scientist are they named after?
Answer

10. Mathematician and retired professor Vernor Vinge, best known for his Hugo Award-winning novels A Fire Upon the Deep and A Deepness in the Sky, , wrote an influential 1993 essay entitled "The Coming Technological Singularity." The Singularity now has its own conference and supporters, notably inventor and entrepreneur Ray Kurzweil. This much-hypothesized creation depends upon _____ to arrive at smarter-than-human entities which then rapidly accelerate technological progress beyond human comprehension. What technology does development of the Singularity primarily depend upon?
Answer

Did you enjoy this quiz? Try one of the many other quizzes at WhatIs.com!

This was last updated in July 2007

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

SearchSecurity

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

  • keylogger (keystroke logger or system monitor)

    A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

  • CompactFlash card (CF card)

    A CompactFlash card (CF card) is a memory card format developed by SanDisk in 1994 that uses flash memory technology to store ...

  • email archiving

    Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close