What a complexion!
Let's Calculate
You're an architect
We're not in Cyberjaya
The Concepts are Advanced
200

The Big-O notation for a nested loop like for i in range(n): for j in range(n): is this.

What is O(n²)?

200

The binary sum of 1011.01 and 110.11 is this.

What is 10001.00?

200

This CPU cycle involves fetching, decoding, and executing instructions.

What is the fetch-decode-execute cycle?

200

This security measure requires users to verify their identity using two or more authentication methods.

What is multi-factor authentication (MFA)?

200

Changing a variable inside a function does not affect the original variable. This is true in languages like C and Java (for primitive types).

What is pass-by-value?

400

This algorithm efficiently sorts data in O(n log n) time.

What is Quick Sort (or Merge Sort)?

400

In two’s complement, the 8-bit representation of -18 is this.

What is 11101110?

400

The Von Neumann bottleneck refers to this limitation in CPU design.

What is shared memory slowing data transfer?

400

This encryption algorithm is widely used to secure online transactions and uses a public and private key pair.

What is RSA?

400

This Python function uses recursion to calculate the factorial of a number.

What is def factorial(n): return 1 if n == 1 else n * factorial(n-1)?

600

Comparing O(n log n) and O(n²), this one scales better for large inputs.

What is O(n log n)?

600

This bitwise operator in Python performs a logical AND.

What is &?

600

The Harvard architecture has this key advantage over Von Neumann.

What is separate memory for instructions and data?

600

This law protects personal data and requires companies to obtain user consent before collecting data.

What is GDPR?

600

The best-case time complexity for QuickSort occurs when the pivot evenly splits the data.

What is O(n log n)?

800

This method of searching uses hashing to achieve O(1) time complexity.

What is direct access (or hashing)?

800

The binary equivalent of -29 using two’s complement (8-bit) is this.

What is 11100011?

800

This CPU register holds the address of the next instruction to execute.

What is the Program Counter (PC)?

800

A man-in-the-middle attack occurs when a hacker does this.

What is intercepting communication between two parties?

800

This type of allocation uses a type of data structure and is freed automatically when a function exits.

What is stack memory allocation?

1000

The Fibonacci sequence can be optimized using this approach instead of recursion.

What is dynamic programming?

1000

This mathematical property allows binary shifting to speed up multiplication.

What is bitwise multiplication?

1000

This type of CPU cache stores recently executed instructions for quick reuse.

What is the instruction cache?

1000

This cloud security risk occurs when multiple tenants share the same infrastructure.

What is data leakage (or shared resource vulnerability)?

1000

This sorting algorithm only swaps adjacent elements and is inefficient for large datasets, you can't sort those soapy things, can you?

What is Bubble Sort?

M
e
n
u