Programming and History
Data Structures
Coding and Algorithms
Networking
Math
100

This language, created by Guido van Rossum in 1991, is known for its simplicity and readability.
A. Java
B. Python
C. C++
D. JavaScript

Python

100

This data structure uses a First-In-First-Out (FIFO) principle

A. Stack 

B. Queue 

C. Linked List 

D. Tree

Queue

100

Which of the following is the correct way to print "Hello, World!" in Python? 

A. echo "Hello, World!" 

B. println("Hello, World!") 

C. printf("Hello, World!") 

D. print("Hello, World!")

print("Hello, World!")

100

The acronym 'LAN' stands for this. 

A. Local Area Network 

B. Large Access Network 

C. Linked Access Network 

D. Long Area Network 

Local Area Network

100

What is 15% of 200?

A) 25

B) 30

C) 20

D) 15

30

200

This woman is considered the world's first computer programmer due to her work on Charles Babbage’s Analytical Engine.
A. Grace Hopper
B. Ada Lovelace
C. Margaret Hamilton
D. Hedy Lamarr

Ada Lovelace

200

In this data structure, each element points to the next element, and it has a head and tail. 

A. Stack 

B. Array 

C. Linked List 

D. Tree 

Linked List

200

Which of the following statements correctly creates a list of squares of numbers from 1 to 5 in Python using a list comprehension?

A) squares = [x**2 for x in range(1, 6)]

B) squares = [x2 for x in range(1, 6)]

C) squares = (x*2 for x in range(1, 6))

D) squares = list(x^2 for x in range(1, 6))

squares = [x**2 for x in range(1, 6)]

200

This device forwards data packets between networks and often acts as a gatekeeper for network traffic. 

A. Switch 

B. Router 

C. Modem 

D. Repeater

Router

200

What is the solution to the equation 2x − 4 = 10

7

300

This programming language was made in Japan. The language is used in the popular backend framework __ on Rails.

A. Kotlin

B. Swift

C. Ruby

D. Go

Ruby 

300

This data structure stores elements hierarchically, with each node having at most two children. 


Binary Tree

300

Explain an algorithm that checks if a value is even or odd. 

def is_even_or_odd(num):

    if num % 2 == 0:

        result = "Even"

    else:

        result = "Odd"

    return result

300

This protocol ensures secure communication over a computer network by using encryption, while its counterpart sends data in plaintext:

A) HTTP B) HTTPS C) FTP D) SSH

HTTPS

300
Define the circumference of a circle

the distance around the edge of the circle

400

Which theoretical device, introduced by Alan Turing, models a machine that manipulates symbols on a strip of tape according to a set of rules, helping define the limits of what can be computed?

A) Von Neumann Machine

B) Turing Machine

C) Babbage Engine

Turing Machine

400

This specialized data structure ensures that the parent node is always greater than or equal to the child nodes.

Max Heap

400

What is the name of the algorithm that finds the shortest path between nodes in a graph?

A) Kruskal’s Algorithm

B) Bellman-Ford Algorithm

C) Dijkstra’s Algorithm

Dijkstra’s Algorithm

400

This attack type overwhelms a network service with a flood of traffic, rendering it unusable:

A) Phishing attack 

B) Denial-of-Service (DoS) attack 

C) SQL injection 

D) Man-in-the-middle attack

Denial of Service

400

n mathematics, a set is best described as:

A) A collection of ordered elements. 

B) A collection of distinct objects. 

C) A sequence of numbers. D) A subset of integers.

collection of distinct objects

500

This programming language, known for its concurrency features and simplicity, was developed at Google in 2007.

Go

500

What is the data structure used to represent a collection of nodes connected by edges, often used to model relationships or networks like social connections or transportation systems?

Graph

500

Explain the Binary Search algorithm

Find the middle value and compare it to the value we're searching for. If it's not equal, narrow the search to either the left or right half of the array, depending on whether the middle value is greater or less than the target. This process is repeated recursively until the target value is found or the search space is empty, indicating that the value is not in the array.

500

This protocol is used for assigning IP addresses dynamically on a network. 


DHCP

500

What is 5! ?

120

M
e
n
u