# | Track | Artist | Key | Camelot | BPM | |
---|---|---|---|---|---|---|
1 | Data breach | Jony Soon | D♭ Major | 3B | 125 | |
2 | Cloud storage | Jony Soon | B Minor | 10A | 150 | |
3 | Cyber attack | Jony Soon | E♭ Minor | 2A | 150 | |
4 | Quantum computing | Jony Soon | G Minor | 6A | 120 | |
5 | Firewall protection | Jony Soon | A Major | 11B | 126 | |
6 | Virtual reality | Jony Soon | B♭ Major | 6B | 126 | |
7 | Machine learning | Jony Soon | F♯ Major | 2B | 132 | |
8 | Encryption key | Jony Soon | D♭ Major | 3B | 135 | |
9 | Code optimization | Jony Soon | E Minor | 9A | 88 | |
10 | Debugging process | Jony Soon | A Major | 11B | 150 | |
11 | Binary code | Jony Soon | D♭ Major | 3B | 150 | |
12 | Algorithm design | Jony Soon | D♭ Major | 3B | 150 | |
13 | Network security | Jony Soon | D♭ Major | 3B | 150 | |
14 | API integration | Jony Soon | G Major | 9B | 126 | |
15 | Deep learning | Jony Soon | D♭ Major | 3B | 150 |