This data structure uses the functions push() and pop() to add and remove items to it. It follows a last in, first out (LIFO) method of ordering its items.
What is a stack?
This operating system is free (although some versions are not) and open source. It was created by Linus Torvalds, a student at the University of Helsinki in Finland, in 1991.
What is Linux?
These mobile apps can be written in either Objective-C or Swift.
What are iOS apps?
def hello():
print("Hello Hofstra DSC!")
def main():
hello()
main()
What is Python?
This attack uses dangerous input from the user that then gets executed as code.
What is an injection attack?
The time complexity of merge sort.
MERGE-SORT(A, p, r)
if p < r
q = floor((p+r)/2)
MERGE-SORT(A,p,q)
MERGE-SORT(A,q+1,r)
MERGE(A,p,q,r)
What is O(n log(n))?
These operating system data structures are both used for memory allocation. However, one grows "down" and is used for static memory allocation, while the other grows "up" and is used for dynamic memory allocation.
What are the stack and the heap?
Note: Since the stack grows down, the top of the stack has a lower address than the base.
These HTML tags are both used to group chunks of code, except one is a block-line element, while the other is an in-line element.
What are div and span tags?
class Bucket{
private float volumeFilled;
private float totalVolume;
private String color;
Bucket(float volumeFilled, float totalVolume, String color) {
this.volumeFilled = volumeFilled;
this.totalVolume = totalVolume;
this.color = color;
}
}
What is Java?
In type of injection attack, dangerous scripts are used as input.
What is cross site scripting (XSS) attack?
This algorithm searches for shortest paths in graphs. However, it can NOT handle negative-weighted edges.
What is Dijkstra's Algorithm?
This Linux command is used to print the current working directory.
What is pwd?
This open source framework is natively compiled and is used to develop multi-platform mobile and web apps.
What is Flutter?
fn largest<'a>(str1:&'a str, str2:&'a str) -> &'a str {
if str1.len() > str2.len(){
str1
} else {
str2
}
}
What is Rust?
This type of cryptography uses two keys to encrypt and decrypt a message. For example, if Bob wanted to send a message to Alice, Bob would encrypt the message using Alice's public key. Alice would then decrypt the message using her private key.
What is Public-key or Asymmetric Cryptography?
This data structure can be implemented with a linked list, where each node has a parent node and two child nodes. It is used for searching for elements given a key value.
What is a binary search tree?
This occurs when each process in a set of processes is waiting for an event that only another process in the set can cause.
What is a deadlock?
This popular JavaScript library is used for making user interfaces.
What is React?
my $a = 5;
while($a > 0) {
print "$a ";
$a--;
}
print "\n";
What is Perl?
In this attack, the attacker manipulates the application’s execution path and overwrites elements of its memory, which leads the program’s execution path to damage existing files or expose data. This attack typically involves violating programming languages and overwriting the bounds of the buffers they exist on.
What is a buffer overflow attack?
These types of algorithms make the next optimal decision in hopes that continuously making the next best decision will lead to an overall optimal solution.
What are Greedy Algorithms?
In this page replacement algorithm, all the page frames are kept in a circular list. A pointer (called the hand) is kept at the oldest page. When a page fault occurs, the page that hand points to is inspected and the action taken depends on the reference (R) bit. If R = 0: Evict the page, if R = 1: Set R to 0 and advance the hand.
What is the clock page replacement algorithm?
The <ruby> HTML tag.
What is the HTML tag that handles ruby annotations, which is a pronunciation guide of the base text - usually used with East Asian characters as the base text?
Example: 明日 (Ashita)
let filter123 x =
match x with
| 1 | 2 | 3 -> printfn "Found 1, 2, or 3!"
| var1 -> printfn "%d" var1
for x in 1..10 do filter123 x
What is F#?
This attack exploits the speculative execution feature in the CPU in order to leak sensitive data.
What is the Spectre attack?