Algorithms & Data Structures
Programming Languages
Computer Hardware
Operating Systems
Networking
100

Which data structure uses LIFO (Last In, First Out) ordering?

Stack

100

Which company made Java?

Sun Microsystems (technically incorrect but can accept Oracle)

100

What volatile memory device is used to store data that the CPU needs to access quickly?

RAM (Random Access Memory)

100

What is the core software component of a computer system that manages hardware and software resources?

Operating System

100

What protocol is responsible for routing messages between networks?

 IP (Internet Protocol)

200

What is the result of performing a breadth-first search on a binary tree? What kind of way is it ordered? 

Level-order traversal of the nodes

200

What language do the following libraries belong to: Flask, Django, Pandas, Scikit-Learn

Python

200

What were the three main sizes of floppy disks?

8 inch, 5.25 inch, and 3.5 inch diskettes

200

 Name the Microsoft Windows feature that allows users to restore their system to a previous state.

System Restore

200

What does DNS stand for, and what is its primary function?

 DNS stands for Domain Name System, and it translates domain names to IP addresses.

300

 In graph theory, what algorithm finds the shortest path from a single source node to all other nodes in a weighted graph?

Dijkstra's algorithm

300

What was Java's original name and what is it named after?

Oak; it is named after a type of coffee from Indonesia.

300

Which component in a computer is primarily responsible for executing instructions and carrying out computation?

CPU (Central Processing Unit)

300

Which Unix command lists the contents of a directory?

ls

300

Explain what a VPN does in terms of network privacy. Go in depth as to how it works. 

A VPN (Virtual Private Network) extends a private network across a public network, allowing users to send and receive data as if their computing devices were directly connected to the private network, enhancing security and privacy.

400

Describe an algorithm to detect a cycle in a directed graph.

Depth-First Search (DFS) with a recursion stack

400

What is the name of the pointer arithmetic and direct memory access feature in C that is both powerful and prone to errors?

Pointer dereferencing

400

What hardware part is responsible for rendering images to a display?

GPU (Graphics Processing Unit)

400

What is the purpose of a swap space in Linux?

To provide extra virtual memory by using disk space to temporarily hold data from RAM

400

Explain the difference between TCP and UDP.

TCP establishes a secure connection by sending a handshake signal initially. It makes sure all the packets are transferred and in the correct order. UDP is a less secure connection. It just starts sending packets and does not resend packets that are lost or corrupt. It is used when speed is prioritized over data transfer, such as video games.

500

What keyword is used in Java to define a class that cannot be instantiated, but can be subclassed?

abstract

500

Which programming language introduced the concept of Coroutines in its standard library with the release of version 3.5?

Python

500

Explain the difference between an SSD and an HDD.

An SSD (Solid State Drive) uses flash memory with no moving parts, offering faster read/write speeds and durability, whereas an HDD (Hard Disk Drive) uses mechanical platters and a moving read/write head, generally slower and more prone to physical damage.

500

Describe the primary difference between process and thread.

A process is an independent unit of execution with its own memory space, while a thread is a lighter, more efficient subset of a process that shares the same memory space but can execute independently.

500

What cryptographic network protocol is successor to SSL and commonly used for secure communication over a computer network?

TLS (Transport Layer Security)

M
e
n
u