This language, created by Guido van Rossum in 1991, is known for its simplicity and readability.
A. Java
B. Python
C. C++
D. JavaScript
Python
This data structure uses a First-In-First-Out (FIFO) principle
A. Stack
B. Queue
C. Linked List
D. Tree
Queue
Which of the following is the correct way to print "Hello, World!" in Python?
A. echo "Hello, World!"
B. println("Hello, World!")
C. printf("Hello, World!")
D. print("Hello, World!")
print("Hello, World!")
The acronym 'LAN' stands for this.
A. Local Area Network
B. Large Access Network
C. Linked Access Network
D. Long Area Network
Local Area Network
What is 15% of 200?
A) 25
B) 30
C) 20
D) 15
30
This woman is considered the world's first computer programmer due to her work on Charles Babbage’s Analytical Engine.
A. Grace Hopper
B. Ada Lovelace
C. Margaret Hamilton
D. Hedy Lamarr
Ada Lovelace
In this data structure, each element points to the next element, and it has a head and tail.
A. Stack
B. Array
C. Linked List
D. Tree
Linked List
Which of the following statements correctly creates a list of squares of numbers from 1 to 5 in Python using a list comprehension?
A) squares = [x**2 for x in range(1, 6)]
B) squares = [x2 for x in range(1, 6)]
C) squares = (x*2 for x in range(1, 6))
D) squares = list(x^2 for x in range(1, 6))
squares = [x**2 for x in range(1, 6)]
This device forwards data packets between networks and often acts as a gatekeeper for network traffic.
A. Switch
B. Router
C. Modem
D. Repeater
Router
What is the solution to the equation 2x − 4 = 10
7
This programming language was made in Japan. The language is used in the popular backend framework __ on Rails.
A. Kotlin
B. Swift
C. Ruby
D. Go
Ruby
This data structure stores elements hierarchically, with each node having at most two children.
Binary Tree
Explain an algorithm that checks if a value is even or odd.
def is_even_or_odd(num):
if num % 2 == 0:
result = "Even"
else:
result = "Odd"
return result
This protocol ensures secure communication over a computer network by using encryption, while its counterpart sends data in plaintext:
A) HTTP B) HTTPS C) FTP D) SSH
HTTPS
the distance around the edge of the circle
Which theoretical device, introduced by Alan Turing, models a machine that manipulates symbols on a strip of tape according to a set of rules, helping define the limits of what can be computed?
A) Von Neumann Machine
B) Turing Machine
C) Babbage Engine
Turing Machine
This specialized data structure ensures that the parent node is always greater than or equal to the child nodes.
Max Heap
What is the name of the algorithm that finds the shortest path between nodes in a graph?
A) Kruskal’s Algorithm
B) Bellman-Ford Algorithm
C) Dijkstra’s Algorithm
Dijkstra’s Algorithm
This attack type overwhelms a network service with a flood of traffic, rendering it unusable:
A) Phishing attack
B) Denial-of-Service (DoS) attack
C) SQL injection
D) Man-in-the-middle attack
Denial of Service
n mathematics, a set is best described as:
A) A collection of ordered elements.
B) A collection of distinct objects.
C) A sequence of numbers. D) A subset of integers.
collection of distinct objects
This programming language, known for its concurrency features and simplicity, was developed at Google in 2007.
Go
What is the data structure used to represent a collection of nodes connected by edges, often used to model relationships or networks like social connections or transportation systems?
Graph
Explain the Binary Search algorithm
Find the middle value and compare it to the value we're searching for. If it's not equal, narrow the search to either the left or right half of the array, depending on whether the middle value is greater or less than the target. This process is repeated recursively until the target value is found or the search space is empty, indicating that the value is not in the array.
This protocol is used for assigning IP addresses dynamically on a network.
DHCP
What is 5! ?
120