Computer Science
Data Structures
Information Technology
Philippine Sports
200

This fundamental concept in programming refers to a named storage location in memory.

What is a variable?

200

This linear data structure follows the Last-In-First-Out (LIFO) principle.

What is a stack?

200

This protocol is used for securely transferring files between a client and server over a network.

What is FTP (File Transfer Protocol) or SFTP (Secure File Transfer Protocol)

200

This Filipino basketball player, known as "The Kraken," plays center for the San Miguel Beermen.

Who is June Mar Fajardo?

400

This sorting algorithm has an average time complexity of O(n log n) and uses a divide-and-conquer approach.

What is quicksort?

400

This tree-based data structure satisfies the heap property and is commonly used to implement priority queues.

What is a heap?

400

This cloud computing service model provides virtualized computing resources over the internet.

What is Infrastructure as a Service (IaaS)?

400

This Filipino boxer, nicknamed "Pac-Man," is the only eight-division world champion in boxing history.

Who is Manny Pacquiao?

600

This principle in object-oriented programming allows a class to inherit properties and methods from another class.

What is inheritance?

600

This data structure uses a hash function to map keys to array indices for efficient data retrieval.

What is a hash table?

600

This type of network topology connects all devices to a central hub or switch.

What is a star topology?

600

This annual collegiate athletic association in the Philippines is known for its basketball rivalry between Ateneo and La Salle.

What is the UAAP (University Athletic Association of the Philippines)?

800

This programming paradigm, based on the concept of "objects" containing data and code, focuses on the creation of reusable software components.

What is Object-Oriented Programming (OOP)?

800

This self-balancing binary search tree maintains its height to be logarithmic in the number of nodes.

What is an AVL tree?

800

This cybersecurity technique involves intentionally placing monitored, fake vulnerabilities in a network to detect attacks.

What is honeypot?

800

This Filipino athlete, nicknamed "The Phenom," is considered one of the greatest pool players of all time.

Who is Efren "Bata" Reyes?