Computer Science & IT

Download Q&A
Q. Which operation is more expensive in terms of time complexity in AVL trees compared to Red-Black trees?
  • A. Insertion
  • B. Deletion
  • C. Searching
  • D. All of the above
Q. Which operation is not allowed in a Red-Black tree?
  • A. Insertion
  • B. Deletion
  • C. Searching
  • D. All operations are allowed
Q. Which operation is not allowed in a stack?
  • A. Push
  • B. Pop
  • C. Peek
  • D. Dequeue
Q. Which operation is not allowed in an AVL tree?
  • A. Insertion
  • B. Deletion
  • C. Traversal
  • D. Duplicate insertion
Q. Which operation is NOT performed during the insertion in a Red-Black tree?
  • A. Coloring the nodes
  • B. Rotations
  • C. Rebalancing
  • D. Sorting the nodes
Q. Which operation is NOT performed in a Red-Black tree during insertion?
  • A. Coloring the new node red
  • B. Rotating the tree
  • C. Recoloring nodes
  • D. Removing the root node
Q. Which operation is not typically associated with a stack?
  • A. Push
  • B. Pop
  • C. Enqueue
  • D. Peek
Q. Which operation is performed to maintain the balance of an AVL tree after an insertion?
  • A. Rotation
  • B. Recoloring
  • C. Splitting
  • D. Merging
Q. Which operation is performed to maintain the balance of an AVL tree after insertion?
  • A. Rotation
  • B. Recoloring
  • C. Splitting
  • D. Merging
Q. Which operation is used to maintain the balance of an AVL tree after insertion?
  • A. Recoloring
  • B. Rotations
  • C. Resizing
  • D. Reordering
Q. Which operation may require rebalancing in an AVL tree?
  • A. Searching
  • B. Insertion
  • C. Traversal
  • D. Deletion
Q. Which operator is used to access the value at the address stored in a pointer?
  • A. &
  • B. *
  • C. ->
  • D. []
Q. Which optimization algorithm is commonly used to minimize the loss function in neural networks?
  • A. Gradient Descent
  • B. K-Means
  • C. Principal Component Analysis
  • D. Random Forest
Q. Which optimization algorithm is commonly used to update weights in neural networks?
  • A. K-means
  • B. Stochastic Gradient Descent
  • C. Principal Component Analysis
  • D. Random Forest
Q. Which optimization technique can help reduce the number of memory accesses?
  • A. Loop fusion
  • B. Function inlining
  • C. Dead code elimination
  • D. Code hoisting
Q. Which optimization technique can lead to a trade-off between speed and memory usage?
  • A. Function inlining
  • B. Loop fusion
  • C. Code hoisting
  • D. Strength reduction
Q. Which optimization technique focuses on reducing the number of instructions executed?
  • A. Loop unrolling
  • B. Constant folding
  • C. Common subexpression elimination
  • D. Code motion
Q. Which optimization technique involves removing code that does not affect the program's output?
  • A. Loop unrolling
  • B. Dead code elimination
  • C. Constant folding
  • D. Inlining
Q. Which OSI layer is responsible for error detection and correction?
  • A. Session Layer
  • B. Transport Layer
  • C. Data Link Layer
  • D. Physical Layer
Q. Which OSI layer is responsible for establishing, managing, and terminating sessions?
  • A. Transport Layer
  • B. Session Layer
  • C. Presentation Layer
  • D. Application Layer
Q. Which parsing technique is generally more powerful, LL or LR?
  • A. LL
  • B. LR
  • C. Both are equally powerful.
  • D. Neither is powerful.
Q. Which port is commonly used by HTTP?
  • A. 21
  • B. 25
  • C. 80
  • D. 443
Q. Which property is NOT true for AVL trees?
  • A. They are height-balanced.
  • B. They allow duplicate values.
  • C. They require rebalancing after insertions.
  • D. They can have a maximum height of log n.
Q. Which property is NOT true for Red-Black Trees?
  • A. Every node is either red or black
  • B. The root is always black
  • C. All leaves are red
  • D. Red nodes cannot have red children
Q. Which property must a Red-Black Tree satisfy?
  • A. Every node is either red or black
  • B. The root must be red
  • C. All leaves must be red
  • D. Every red node must have two black children
Q. Which protocol is commonly used for dynamic IP address allocation?
  • A. ARP
  • B. RARP
  • C. DHCP
  • D. ICMP
Q. Which protocol is commonly used for dynamic IP address assignment?
  • A. DHCP
  • B. DNS
  • C. HTTP
  • D. FTP
Q. Which protocol is commonly used for sending emails?
  • A. HTTP
  • B. FTP
  • C. SMTP
  • D. IMAP
Q. Which protocol is commonly used to secure HTTP traffic?
  • A. FTP
  • B. SMTP
  • C. HTTPS
  • D. Telnet
Q. Which protocol is commonly used to transfer files over the web?
  • A. FTP
  • B. SMTP
  • C. HTTP
  • D. SNMP
Showing 3061 to 3090 of 3237 (108 Pages)
Soulshift Feedback ×

On a scale of 0–10, how likely are you to recommend The Soulshift Academy?

Not likely Very likely