Sorting Algorithms
Databases
Operating Systems
Security and Networks
Output / Debugging
100

Best Case Time Complexity of Merge Sort?

O(nlogn)

100

What type of database is optimized for OLAP?

Data Warehouse

100

In which scheduling algorithm does the operating system give each process a slice of time in a circular order?

Robin Round

100

  4th layer of OSI model is called

Transport Layer

100

def reverse_string (string) :

   reversed string = ""

   for i in range (len (string), -1, -1): 

       reversed string += string[i] 

   return reversed _string

print (reverse_string("hello world"))

It should be len(string)-1

200

Which non-comparison-based sorting algorithm is highly efficient for sorting integers?

Radix

200

What does ORM stand for in database management?

Object Relational Mapping

200

In which year was the first version of the Linux operating system released?

1991

200

What is the inclusion of a secret message in otherwise unencrypted text or images called?

Steganography

200

class MyClass:    

    def __init__(self, value):        

       self.value = value 

obj1 = MyClass(5) 

obj2 = MyClass(10) 

result = obj1 + obj2

What kind of error will this code throw?

TypeError

300

In the context of sorting algorithms, what is a 'stable' sort?

Preserves Input Order

300

What type of index in a database improves the performance of queries but can slow down data modification operations?

B-Tree

300

Which Linux directory contains system configuration files?

/etc

300

Mr. John is a small businessman who runs Hardware. He has been experiencing problems with his small accounting department, which he depends on to provide sales reports. Mr. John wants to share information between his 7 computer stations and have on central printing area. What type of network would you recommend to Mr. John?

LAN

300

public class A { 

    public static void main(String[] args) 

    { 

        System.out.println('j' + 'a' + 'v' + 'a'); 

    } 

418

400

Which sorting algorithm is considered optimal for lists that are already mostly sorted?

Insertion

400

Which normal form is concerned with the removal of transitive dependency?

Third Normal Form

400

Name three Unix-like operating system

Linux, BSD, Solaris, AIX, HP-UX

400

Until when will 2,048-bit RSA keys be sufficient?

2030

400

d = {}

d['1']=1

d[1.0]=2

d[1]=3

sum=0

for k in d:

    sum+=d[k]

print(sum)

4

500

Which sorting algo does Python use and its time complexity?

Timsort

  1. Best Case: O(n)
  2. Average Case: O(n log n)
  3. Worst Case: O(n log n)
500

What do you call a precompiled collection of one or more SQL statements that are stored under a name and processed as a unit?

Stored Procedure

500

What is the default file system for Windows?

NFTS

500

List the 6 common types of cybersecurity attacks.

  • Malware 

  • SQL Injection Attack

  • Cross-Site Scripting (XSS) 

  • Denial-of-Service (DoS)

  • Man-in-the-Middle Attacks 

  • Credential Reuse 

  • Phishing

  • Session Hijacking

500

fruit_list1 = ['Apple', 'Berry', 'Cherry', 'Papaya'] 

fruit_list2 = fruit_list1 

fruit_list3 = fruit_list1[:] 

fruit_list2[0] = 'Guava' 

fruit_list3[1]='Kiwi' 

sum=0


for ls in (fruit_list1, fruit_list2, fruit_list3):


    if ls[0]=='Guava':


        sum += 1


    if ls[1] == 'Kiwi':


        sum += 20


print (sum)

22

M
e
n
u