Computer Science & IT

Download Q&A
Q. Which of the following is a characteristic of a stack?
  • A. FIFO
  • B. LIFO
  • C. Sorted order
  • D. Random access
Q. Which of the following is a characteristic of arrays?
  • A. Dynamic size
  • B. Random access
  • C. Non-contiguous memory allocation
  • D. No fixed size
Q. Which of the following is a characteristic of AVL trees?
  • A. They can have a maximum height of log(n)
  • B. They allow duplicate values
  • C. They are always complete binary trees
  • D. They require less memory than Red-Black trees
Q. Which of the following is a characteristic of BFS?
  • A. Uses a stack
  • B. Uses a queue
  • C. Can find the longest path
  • D. Is recursive by nature
Q. Which of the following is a characteristic of Depth-First Search (DFS)?
  • A. Uses a queue
  • B. Can be implemented using recursion
  • C. Always finds the shortest path
  • D. Visits nodes level by level
Q. Which of the following is a characteristic of Dijkstra's algorithm?
  • A. It uses depth-first search.
  • B. It guarantees the shortest path in all cases.
  • C. It can be used for both directed and undirected graphs.
  • D. It requires all edge weights to be the same.
Q. Which of the following is a characteristic of dynamic programming?
  • A. It always uses recursion
  • B. It requires a greedy approach
  • C. It stores results of subproblems
  • D. It is only applicable to optimization problems
Q. Which of the following is a characteristic of fiber optic cables?
  • A. Susceptible to electromagnetic interference
  • B. Higher bandwidth than copper cables
  • C. Shorter transmission distances
  • D. Lower installation costs
Q. Which of the following is a characteristic of Heap Sort?
  • A. It is a stable sort
  • B. It is an in-place sort
  • C. It is a recursive sort
  • D. It requires additional memory
Q. Which of the following is a characteristic of hierarchical clustering?
  • A. It requires the number of clusters to be specified in advance
  • B. It can produce a dendrogram to visualize the clustering process
  • C. It is always faster than K-means
  • D. It only works with numerical data
Q. Which of the following is a characteristic of HTTP/2 compared to HTTP/1.1?
  • A. Text-based protocol
  • B. Single request-response per connection
  • C. Multiplexing of streams
  • D. No header compression
Q. Which of the following is a characteristic of HTTP/2?
  • A. Text-based protocol
  • B. Multiplexing
  • C. Single request-response
  • D. No header compression
Q. Which of the following is a characteristic of HTTP?
  • A. Connection-oriented
  • B. Stateful
  • C. Stateless
  • D. Reliable
Q. Which of the following is a characteristic of K-means clustering?
  • A. It can produce overlapping clusters
  • B. It is deterministic and produces the same result every time
  • C. It can handle noise and outliers effectively
  • D. It partitions data into non-overlapping clusters
Q. Which of the following is a characteristic of LL(1) parsing?
  • A. It uses a stack for parsing
  • B. It can handle left recursion
  • C. It requires backtracking
  • D. It is a top-down parsing method
Q. Which of the following is a characteristic of Merge Sort?
  • A. In-place sorting
  • B. Not stable
  • C. Divides the array into halves
  • D. Uses a single pivot
Q. Which of the following is a characteristic of neural networks?
  • A. They require structured data only
  • B. They can learn complex patterns through layers
  • C. They are only used for classification tasks
  • D. They do not require any training data
Q. Which of the following is a characteristic of Quick Sort?
  • A. Always stable
  • B. In-place sorting
  • C. Worst-case O(n log n)
  • D. Uses extra space
Q. Which of the following is a characteristic of Red-Black Trees?
  • A. Every node is either red or black
  • B. The root must be red
  • C. All leaves are black
  • D. Red nodes can have red children
Q. Which of the following is a characteristic of SVM?
  • A. It can only be used for binary classification
  • B. It is sensitive to outliers
  • C. It can handle multi-class classification using one-vs-one or one-vs-all strategies
  • D. It requires a large amount of labeled data
Q. Which of the following is a characteristic of TCP?
  • A. Connectionless protocol
  • B. Unreliable data transfer
  • C. Provides error recovery
  • D. Faster than UDP
Q. Which of the following is a characteristic of the HTTP protocol?
  • A. Connection-oriented
  • B. Stateful
  • C. Stateless
  • D. Reliable
Q. Which of the following is a characteristic of the Merge Sort algorithm?
  • A. In-place sorting
  • B. Not stable
  • C. Divides the array into halves
  • D. Uses a single loop
Q. Which of the following is a characteristic of the OSI model?
  • A. It is a protocol suite.
  • B. It has 5 layers.
  • C. It is a theoretical framework.
  • D. It defines hardware specifications.
Q. Which of the following is a characteristic of the Quick Sort algorithm?
  • A. It uses a pivot element
  • B. It is always stable
  • C. It requires O(n^2) space
  • D. It is a non-recursive algorithm
Q. Which of the following is a characteristic of the TCP protocol?
  • A. Connectionless
  • B. Unreliable
  • C. Ordered delivery
  • D. No error checking
Q. Which of the following is a characteristic of unsupervised learning in neural networks?
  • A. Requires labeled data
  • B. Focuses on classification tasks
  • C. Identifies patterns without labels
  • D. Optimizes for accuracy
Q. Which of the following is a Class C IP address?
  • A. 192.168.1.1
  • B. 10.0.0.1
  • C. 172.16.0.1
  • D. 255.255.255.0
Q. Which of the following is a classification problem in supervised learning?
  • A. Predicting house prices
  • B. Classifying emails as spam or not spam
  • C. Forecasting sales revenue
  • D. Estimating customer lifetime value
Q. Which of the following is a common activation function used in CNNs?
  • A. Sigmoid
  • B. ReLU
  • C. Tanh
  • D. Softmax
Showing 2521 to 2550 of 3237 (108 Pages)
Soulshift Feedback ×

On a scale of 0–10, how likely are you to recommend The Soulshift Academy?

Not likely Very likely