Data Structrues
Networks
Legal and Ethical
Databases
WildCard!!
100

This data structure follows the Last In, First Out principle.

What is a stack?

100

This protocol is used to transfer web pages over the internet.

What is HTTP?

100

This Act makes unauthorised access to computer systems illegal.

What is the Computer Misuse Act 1990?

100

What is algorithmic bias (or systemic bias in AI)?

What is a primary key?

100

This number system uses base 16.

What is hexadecimal?

200

This data structure uses nodes connected by references and does not require contiguous memory.

What is a linked list?

200

This device forwards packets between different networks.

What is a router?

200

This principle of the Data Protection Act requires data to be accurate and kept up to date.

What is the accuracy principle?

200

This normal form removes partial dependencies.

What is Second Normal Form (2NF)?

200

This Boolean operator outputs true only when both inputs differ.

What is XOR?

300

In this traversal method of a binary tree, the left subtree is visited, then the root, then the right subtree.

What is in-order traversal?

300

This network type covers a small geographical area such as a school building.

What is a LAN?

300

This ethical issue concerns algorithms making decisions without human intervention.

What is automated decision making?

300

This key in one table refers to the primary key in another table.

What is a foreign key?

300

This complexity class describes binary search.

What is O(log n)?

400

This data structure is most suitable for implementing breadth-first search.

What is a queue?

400

This part of the TCP/IP stack ensures reliable transmission through acknowledgements and retransmission.

What is TCP?

400

This Act regulates the interception and monitoring of communications.

What is the Regulation of Investigatory Powers Act 2000?

400

This property of ACID ensures a transaction is either fully completed or not performed at all.

What is Atomicity?

400

This CPU architecture uses separate memory for instructions and data.

What is Harvard architecture?

500

A hash table stores 1,000 records using a poor hash function that maps many keys to the same index.
This worst-case time complexity for searching may now degrade to this.

What is O(n)?

500

In packet switching, packets may arrive out of order.
This TCP mechanism reorders them and ensures none are missing before reconstruction.

What is sequence numbering and acknowledgement with retransmission?

500

A company uses AI to filter job applications, but the training data reflects historical hiring bias.
This ethical risk arises because past inequalities are embedded into the model’s outcomes.

What is algorithmic bias (or systemic bias in AI)?

500

A table contains attributes:
StudentID, StudentName, SubjectName, TeacherName

A student studies multiple subjects and each subject has one teacher.

To reach 3NF, this table must be decomposed because of this specific type of dependency.

What is a transitive dependency?

500

An algorithm divides a problem into two equal subproblems, solves them recursively, and combines the results.
Its recurrence relation is:
T(n) = 2T(n/2) + n

This is the time complexity.

What is O(n log n)?