The Big-O notation for a nested loop like for i in range(n): for j in range(n): is this.
What is O(n²)?
The binary sum of 1011.01 and 110.11 is this.
What is 10001.00?
This CPU cycle involves fetching, decoding, and executing instructions.
What is the fetch-decode-execute cycle?
This security measure requires users to verify their identity using two or more authentication methods.
What is multi-factor authentication (MFA)?
Changing a variable inside a function does not affect the original variable. This is true in languages like C and Java (for primitive types).
What is pass-by-value?
This algorithm efficiently sorts data in O(n log n) time.
What is Quick Sort (or Merge Sort)?
In two’s complement, the 8-bit representation of -18 is this.
What is 11101110?
The Von Neumann bottleneck refers to this limitation in CPU design.
What is shared memory slowing data transfer?
This encryption algorithm is widely used to secure online transactions and uses a public and private key pair.
What is RSA?
This Python function uses recursion to calculate the factorial of a number.
What is def factorial(n): return 1 if n == 1 else n * factorial(n-1)?
Comparing O(n log n) and O(n²), this one scales better for large inputs.
What is O(n log n)?
This bitwise operator in Python performs a logical AND.
What is &?
The Harvard architecture has this key advantage over Von Neumann.
What is separate memory for instructions and data?
This law protects personal data and requires companies to obtain user consent before collecting data.
What is GDPR?
The best-case time complexity for QuickSort occurs when the pivot evenly splits the data.
What is O(n log n)?
This method of searching uses hashing to achieve O(1) time complexity.
What is direct access (or hashing)?
The binary equivalent of -29 using two’s complement (8-bit) is this.
What is 11100011?
This CPU register holds the address of the next instruction to execute.
What is the Program Counter (PC)?
A man-in-the-middle attack occurs when a hacker does this.
What is intercepting communication between two parties?
This type of allocation uses a type of data structure and is freed automatically when a function exits.
What is stack memory allocation?
The Fibonacci sequence can be optimized using this approach instead of recursion.
What is dynamic programming?
This mathematical property allows binary shifting to speed up multiplication.
What is bitwise multiplication?
This type of CPU cache stores recently executed instructions for quick reuse.
What is the instruction cache?
This cloud security risk occurs when multiple tenants share the same infrastructure.
What is data leakage (or shared resource vulnerability)?
This sorting algorithm only swaps adjacent elements and is inefficient for large datasets, you can't sort those soapy things, can you?
What is Bubble Sort?