Computer Science & IT

Download Q&A
Q. In the context of web protocols, what does REST stand for?
  • A. Representational State Transfer
  • B. Remote Execution State Transfer
  • C. Real-time State Transfer
  • D. Resource State Transfer
Q. In the context of web protocols, what does SSL stand for?
  • A. Secure Socket Layer
  • B. Simple Socket Layer
  • C. Secure System Layer
  • D. Simple System Layer
Q. In the context of web protocols, what does the acronym 'REST' stand for?
  • A. Representational State Transfer
  • B. Remote Execution State Transfer
  • C. Real-time Event Stream Transfer
  • D. Resource Endpoint State Transfer
Q. In the context of web protocols, what does the acronym URI stand for?
  • A. Uniform Resource Identifier
  • B. Universal Resource Indicator
  • C. Uniform Resource Interface
  • D. Universal Resource Identifier
Q. In the context of web protocols, what does the acronym URL stand for?
  • A. Uniform Resource Locator
  • B. Universal Resource Link
  • C. Uniform Resource Link
  • D. Universal Resource Locator
Q. In the context of web protocols, what does the term 'stateless' refer to?
  • A. No data is stored on the server
  • B. Each request is independent
  • C. Data is encrypted
  • D. Sessions are maintained
Q. In the dynamic programming approach to the coin change problem, what does the dp array represent?
  • A. Number of coins used
  • B. Minimum number of coins for each amount
  • C. Total value of coins
  • D. Maximum number of coins
Q. In the dynamic programming solution for the longest common subsequence, what does the dp[i][j] cell represent?
  • A. Length of LCS for first i characters of string A and first j characters of string B
  • B. Total number of subsequences
  • C. Characters in the LCS
  • D. Length of the strings A and B
Q. In the Longest Common Subsequence problem, what is the time complexity of the dynamic programming solution?
  • A. O(m + n)
  • B. O(m * n)
  • C. O(m^2 + n^2)
  • D. O(m^2 * n^2)
Q. In the OSI model, which layer is responsible for data formatting and encryption?
  • A. Session Layer
  • B. Presentation Layer
  • C. Application Layer
  • D. Transport Layer
Q. In the OSI model, which layer is responsible for error detection and correction?
  • A. Physical Layer
  • B. Data Link Layer
  • C. Network Layer
  • D. Transport Layer
Q. In the OSI model, which layer is responsible for establishing, managing, and terminating sessions?
  • A. Application Layer
  • B. Transport Layer
  • C. Session Layer
  • D. Network Layer
Q. In the OSI model, which layer is responsible for routing packets between different networks?
  • A. Transport Layer
  • B. Network Layer
  • C. Session Layer
  • D. Physical Layer
Q. In the OSI model, which layer is responsible for routing packets?
  • A. Transport Layer
  • B. Network Layer
  • C. Session Layer
  • D. Physical Layer
Q. In the OSI model, which layer is responsible for session management?
  • A. Transport Layer
  • B. Session Layer
  • C. Presentation Layer
  • D. Application Layer
Q. In the OSI model, which layer is responsible for the physical transmission of data?
  • A. Application Layer
  • B. Transport Layer
  • C. Network Layer
  • D. Physical Layer
Q. In the TCP/IP model, which layer corresponds to the OSI model's Network Layer?
  • A. Application Layer
  • B. Transport Layer
  • C. Internet Layer
  • D. Link Layer
Q. In the TCP/IP model, which layer corresponds to the OSI model's Transport Layer?
  • A. Application Layer
  • B. Internet Layer
  • C. Transport Layer
  • D. Network Access Layer
Q. In the TCP/IP model, which layer corresponds to the OSI Transport Layer?
  • A. Application Layer
  • B. Internet Layer
  • C. Transport Layer
  • D. Network Access Layer
Q. In the worst case, what is the time complexity of Merge Sort?
  • A. O(n)
  • B. O(n log n)
  • C. O(n^2)
  • D. O(log n)
Q. In three-address code, how is a binary operation typically represented?
  • A. result = operand1 operator operand2
  • B. operand1 operator operand2 = result
  • C. result operator operand1 operand2
  • D. operand1 operand2 operator = result
Q. In three-address code, how many operands can each instruction have?
  • A. One
  • B. Two
  • C. Three
  • D. Four
Q. In what scenario would you use a doubly linked list instead of a singly linked list?
  • A. When memory usage is critical
  • B. When you need to traverse the list in both directions
  • C. When the list is static
  • D. When implementing a stack
Q. In what scenario would you use a doubly linked list?
  • A. When you need to traverse the list in both directions
  • B. When memory usage is a primary concern
  • C. When you need constant time access to elements
  • D. When implementing a stack
Q. In what way can binary trees assist in network routing?
  • A. By storing user data
  • B. By managing routing tables
  • C. By compressing data packets
  • D. By encrypting communication
Q. In which application are binary trees particularly useful for representing hierarchical data?
  • A. File systems
  • B. Network routing
  • C. Database indexing
  • D. Sorting data
Q. In which application are binary trees particularly useful for searching data?
  • A. Database indexing
  • B. Image processing
  • C. Network routing
  • D. File storage
Q. In which application are CNNs most commonly used?
  • A. Natural Language Processing
  • B. Image Recognition
  • C. Time Series Forecasting
  • D. Reinforcement Learning
Q. In which application are neural networks used to generate realistic images?
  • A. Image recognition
  • B. Generative Adversarial Networks (GANs)
  • C. Image compression
  • D. Image filtering
Q. In which application is DFS particularly useful?
  • A. Finding the shortest path in a graph
  • B. Cycle detection in a graph
  • C. Finding the minimum spanning tree
  • D. Network flow problems
Showing 541 to 570 of 3237 (108 Pages)
Soulshift Feedback ×

On a scale of 0–10, how likely are you to recommend The Soulshift Academy?

Not likely Very likely