Helping Hand: Take this quiz

Photo by ThisIsEngineering on Pexels.com
The situation
The job market has changed. No surprise there, yet I receive emails and calls from college students and young professionals about opportunities in the oh-so-popular metro Atlanta job market.
My advice ranges from updating their resumes to knowing the lingo in the brave new world of COVID and soon, post-COVID job searches.
I also hear from employers and veteran workers who complain that the new-day job applicants are not as sharp about all-things technology. In an effort to do my part, let’s start with the so-called easy things.
Define these terms:
Algorithim
Artificial Intelligence
Cyptography
Database
Internet of things
Public-key Cyptography
Robotic Process Automation

The answers
Algorithm: This refers to a procedure or finite list of instructions or rules, normally followed by a computer, to calculate and solve a mathematical problem. It refers to a finite sequence which is computer-implementable instructions to perform a computation.
Blockchain Technology: It refers to a system that records information transparently and with consensus from other participants that make information immutable or difficult to change. It refers to a database that contains all the historical records that are publicly available and accessible to all the participants.
Cryptography: Also known as cryptology, it is the practice and study of techniques to ensure protect information and secure communications using codes such that only the intended recipient can read and process it.
Database: Refers to an organized collection of data or information stored in a structured form, usually in a computer, and accessed electronically from a computer system. It is controlled through a database management system and is modelled in rows and columns in a series of tables for efficient processing and querying of data.
Internet of Things: This refers to a system of interconnected and interrelated devices, network, software, electronics, mechanical and digital machines which are embedded with sensors to enable them to automatically collect and exchange data without requiring human-to-human or human-to-computer interaction.
Public-Key Cryptography: Also known as asymmetric cryptography, it is a method of encrypting data with two pairs of keys, namely, public key which is available for anyone to use, and the private key known only to the owner.
Robotic Process Automation: Refers to a computer software or robot or bot that can be configured to mimic human actions with business systems to perform a business process. The steps used to train a software robot are illustrative.