Q. In the context of web protocols, what does REST stand for?
A.
Representational State Transfer
B.
Remote Execution State Transfer
C.
Real-time State Transfer
D.
Resource State Transfer
Show solution
Solution
REST stands for Representational State Transfer, an architectural style for designing networked applications.
Correct Answer:
A
— Representational State Transfer
Learn More →
Q. In the context of web protocols, what does SSL stand for?
A.
Secure Socket Layer
B.
Simple Socket Layer
C.
Secure System Layer
D.
Simple System Layer
Show solution
Solution
SSL stands for Secure Socket Layer, which is a protocol for establishing a secure connection between a web server and a client.
Correct Answer:
A
— Secure Socket Layer
Learn More →
Q. In the context of web protocols, what does the acronym 'REST' stand for?
A.
Representational State Transfer
B.
Remote Execution State Transfer
C.
Real-time Event Stream Transfer
D.
Resource Endpoint State Transfer
Show solution
Solution
REST stands for Representational State Transfer, which is an architectural style for designing networked applications.
Correct Answer:
A
— Representational State Transfer
Learn More →
Q. In the context of web protocols, what does the acronym URI stand for?
A.
Uniform Resource Identifier
B.
Universal Resource Indicator
C.
Uniform Resource Interface
D.
Universal Resource Identifier
Show solution
Solution
URI stands for Uniform Resource Identifier, which is a string of characters used to identify a resource on the Internet.
Correct Answer:
A
— Uniform Resource Identifier
Learn More →
Q. In the context of web protocols, what does the acronym URL stand for?
A.
Uniform Resource Locator
B.
Universal Resource Link
C.
Uniform Resource Link
D.
Universal Resource Locator
Show solution
Solution
URL stands for Uniform Resource Locator, which is the address used to access resources on the web.
Correct Answer:
A
— Uniform Resource Locator
Learn More →
Q. In the context of web protocols, what does the term 'stateless' refer to?
A.
No data is stored on the server
B.
Each request is independent
C.
Data is encrypted
D.
Sessions are maintained
Show solution
Solution
HTTP is considered stateless because each request from a client to a server is treated as an independent transaction, with no stored context.
Correct Answer:
B
— Each request is independent
Learn More →
Q. In the dynamic programming approach to the coin change problem, what does the dp array represent?
A.
Number of coins used
B.
Minimum number of coins for each amount
C.
Total value of coins
D.
Maximum number of coins
Show solution
Solution
The dp array in the coin change problem represents the minimum number of coins needed to make each amount.
Correct Answer:
B
— Minimum number of coins for each amount
Learn More →
Q. In the dynamic programming solution for the longest common subsequence, what does the dp[i][j] cell represent?
A.
Length of LCS for first i characters of string A and first j characters of string B
B.
Total number of subsequences
C.
Characters in the LCS
D.
Length of the strings A and B
Show solution
Solution
The dp[i][j] cell in the longest common subsequence problem represents the length of the LCS for the first i characters of string A and the first j characters of string B.
Correct Answer:
A
— Length of LCS for first i characters of string A and first j characters of string B
Learn More →
Q. In the Longest Common Subsequence problem, what is the time complexity of the dynamic programming solution?
A.
O(m + n)
B.
O(m * n)
C.
O(m^2 + n^2)
D.
O(m^2 * n^2)
Show solution
Solution
The time complexity of the dynamic programming solution for the Longest Common Subsequence problem is O(m * n), where m and n are the lengths of the two sequences.
Correct Answer:
B
— O(m * n)
Learn More →
Q. In the OSI model, which layer is responsible for data formatting and encryption?
A.
Session Layer
B.
Presentation Layer
C.
Application Layer
D.
Transport Layer
Show solution
Solution
The Presentation Layer is responsible for data formatting, encryption, and decryption.
Correct Answer:
B
— Presentation Layer
Learn More →
Q. In the OSI model, which layer is responsible for error detection and correction?
A.
Physical Layer
B.
Data Link Layer
C.
Network Layer
D.
Transport Layer
Show solution
Solution
The Data Link Layer (Layer 2) is responsible for error detection and correction to ensure reliable data transfer.
Correct Answer:
B
— Data Link Layer
Learn More →
Q. In the OSI model, which layer is responsible for establishing, managing, and terminating sessions?
A.
Application Layer
B.
Transport Layer
C.
Session Layer
D.
Network Layer
Show solution
Solution
The Session Layer (Layer 5) is responsible for establishing, managing, and terminating sessions between applications.
Correct Answer:
C
— Session Layer
Learn More →
Q. In the OSI model, which layer is responsible for routing packets between different networks?
A.
Transport Layer
B.
Network Layer
C.
Session Layer
D.
Physical Layer
Show solution
Solution
The Network Layer (Layer 3) is responsible for routing packets between different networks, determining the best path for data transmission.
Correct Answer:
B
— Network Layer
Learn More →
Q. In the OSI model, which layer is responsible for routing packets?
A.
Transport Layer
B.
Network Layer
C.
Session Layer
D.
Physical Layer
Show solution
Solution
The Network Layer (Layer 3) is responsible for routing packets across different networks.
Correct Answer:
B
— Network Layer
Learn More →
Q. In the OSI model, which layer is responsible for session management?
A.
Transport Layer
B.
Session Layer
C.
Presentation Layer
D.
Application Layer
Show solution
Solution
The Session Layer (Layer 5) is responsible for managing sessions between applications.
Correct Answer:
B
— Session Layer
Learn More →
Q. In the OSI model, which layer is responsible for the physical transmission of data?
A.
Application Layer
B.
Transport Layer
C.
Network Layer
D.
Physical Layer
Show solution
Solution
The Physical Layer is responsible for the physical transmission of data over the network medium.
Correct Answer:
D
— Physical Layer
Learn More →
Q. In the TCP/IP model, which layer corresponds to the OSI model's Network Layer?
A.
Application Layer
B.
Transport Layer
C.
Internet Layer
D.
Link Layer
Show solution
Solution
The Internet Layer in the TCP/IP model corresponds to the Network Layer in the OSI model, handling routing and addressing.
Correct Answer:
C
— Internet Layer
Learn More →
Q. In the TCP/IP model, which layer corresponds to the OSI model's Transport Layer?
A.
Application Layer
B.
Internet Layer
C.
Transport Layer
D.
Network Access Layer
Show solution
Solution
The Transport Layer in the TCP/IP model corresponds directly to the Transport Layer in the OSI model, handling end-to-end communication.
Correct Answer:
C
— Transport Layer
Learn More →
Q. In the TCP/IP model, which layer corresponds to the OSI Transport Layer?
A.
Application Layer
B.
Internet Layer
C.
Transport Layer
D.
Network Access Layer
Show solution
Solution
The Transport Layer in the TCP/IP model corresponds directly to the OSI Transport Layer.
Correct Answer:
C
— Transport Layer
Learn More →
Q. In the worst case, what is the time complexity of Merge Sort?
A.
O(n)
B.
O(n log n)
C.
O(n^2)
D.
O(log n)
Show solution
Solution
The worst-case time complexity of Merge Sort is O(n log n) because it always divides the array into halves.
Correct Answer:
B
— O(n log n)
Learn More →
Q. In three-address code, how is a binary operation typically represented?
A.
result = operand1 operator operand2
B.
operand1 operator operand2 = result
C.
result operator operand1 operand2
D.
operand1 operand2 operator = result
Show solution
Solution
Three-address code represents binary operations in the form 'result = operand1 operator operand2', which clearly indicates the result of the operation.
Correct Answer:
A
— result = operand1 operator operand2
Learn More →
Q. In three-address code, how many operands can each instruction have?
A.
One
B.
Two
C.
Three
D.
Four
Show solution
Solution
Three-address code typically allows for at most three operands: two source operands and one destination operand.
Correct Answer:
C
— Three
Learn More →
Q. In what scenario would you use a doubly linked list instead of a singly linked list?
A.
When memory usage is critical
B.
When you need to traverse the list in both directions
C.
When the list is static
D.
When implementing a stack
Show solution
Solution
A doubly linked list is used when you need to traverse the list in both directions, allowing for more flexible navigation.
Correct Answer:
B
— When you need to traverse the list in both directions
Learn More →
Q. In what scenario would you use a doubly linked list?
A.
When you need to traverse the list in both directions
B.
When memory usage is a primary concern
C.
When you need constant time access to elements
D.
When implementing a stack
Show solution
Solution
A doubly linked list is used when you need to traverse the list in both directions, allowing for more flexible operations.
Correct Answer:
A
— When you need to traverse the list in both directions
Learn More →
Q. In what way can binary trees assist in network routing?
A.
By storing user data
B.
By managing routing tables
C.
By compressing data packets
D.
By encrypting communication
Show solution
Solution
Binary trees can be used to manage routing tables in networks, allowing for efficient pathfinding and data transmission.
Correct Answer:
B
— By managing routing tables
Learn More →
Q. In which application are binary trees particularly useful for representing hierarchical data?
A.
File systems
B.
Network routing
C.
Database indexing
D.
Sorting data
Show solution
Solution
Binary trees can represent hierarchical structures such as file systems, where directories and files can be organized in a tree-like format.
Correct Answer:
A
— File systems
Learn More →
Q. In which application are binary trees particularly useful for searching data?
A.
Database indexing
B.
Image processing
C.
Network routing
D.
File storage
Show solution
Solution
Binary trees are used in database indexing to allow for efficient searching, insertion, and deletion of records.
Correct Answer:
A
— Database indexing
Learn More →
Q. In which application are CNNs most commonly used?
A.
Natural Language Processing
B.
Image Recognition
C.
Time Series Forecasting
D.
Reinforcement Learning
Show solution
Solution
CNNs are most commonly used in image recognition tasks due to their ability to capture spatial hierarchies in images.
Correct Answer:
B
— Image Recognition
Learn More →
Q. In which application are neural networks used to generate realistic images?
A.
Image recognition
B.
Generative Adversarial Networks (GANs)
C.
Image compression
D.
Image filtering
Show solution
Solution
Generative Adversarial Networks (GANs) are a type of neural network used to generate realistic images.
Correct Answer:
B
— Generative Adversarial Networks (GANs)
Learn More →
Q. In which application is DFS particularly useful?
A.
Finding the shortest path in a graph
B.
Cycle detection in a graph
C.
Finding the minimum spanning tree
D.
Network flow problems
Show solution
Solution
DFS is particularly useful for cycle detection in a graph as it can track visited nodes and backtrack effectively.
Correct Answer:
B
— Cycle detection in a graph
Learn More →
Showing 541 to 570 of 3237 (108 Pages)