Tamoban Javnoi
IT Crafter
Message
etweets
0
Followers
13
Followings
8
Timeline
About
Mcqs
Question
Tweet
Past Paper
Article
Qualification
Master
Subject
COMPUTER SCIENCE & IT
Country
Lebanon
Gender
Male
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Database Management Systems
DDL is used to:
A. Represent the database structure.
B. Define and manage the structure of a database.
C. Deals with manipulation of data stored in the database.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Database Management Systems
Boyce Codd Normal Form:
A. Addresses certain type of multivalued dependencies.
B. Makes sure that data in each column is atomic.
C. Makes sure that every determinant is a candidate key.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Database Management Systems
A child entity in ER diagrams is:
A. The entity on the one side of a one to many relationship.
B. Entity that inherits attributes and relations from another entity.
C. A row of a table.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Data Structures & Algorithms
How much time would it take to add an element to the linked list asymptotically?
A. O(1).
B. O(n).
C. O(n?).
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Data Structures & Algorithms
What is the name of a linear collection of data components where the linear node is provided by a pointer?
A. Linked list.
B. Primitive List.
C. Node list.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Data Structures & Algorithms
Regarding Binary Trees, which of the following is true?
A. Every binary tree has two states: full and complete..
B. Every binary tree that is full is also a complete binary tree..
C. All complete binary trees are likewise full binary trees..
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Data Structures & Algorithms
When we attempt to add the eleventh element to a stack with a size of 10, we encounter a circumstance known as:
A. Garbage collection.
B. Underflow.
C. Overflow.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Cybersecurity
Which of the following malware types does not infect others and duplicate or clone itself?
A. Rootkits.
B. Trojans.
C. Worms.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Cybersecurity
After a certain amount of time, say thirty minutes, the online application, similar to banking websites, should prompt users to log in again. Which cybersecurity concept is this an example of?
A. Compromise recording.
B. Psychological acceptability.
C. Complete mediation.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Cybersecurity
If an employee requests root access to a UNIX system in which you serve as the administrator, you shouldn't provide them access or this authority unless their job necessitates it. Which cybersecurity notion is this an example of?
A. Least privileges.
B. Separation of Privileges.
C. Open Design.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Cybersecurity
Which of the following is considered as the world's first antivirus program?
A. Tinkered.
B. Reaper.
C. Creeper.
D. None of these.
Tamoban Javnoi
GENERAL KNOWLEDGE
-
Computer Skills
What is an example of system software from the list below?
A. Windows.
B. Google Chrome.
C. Adobe Photoshop.
D. None of these.
Tamoban Javnoi
GENERAL KNOWLEDGE
-
Computer Skills
Which component is responsible for providing power supply to all other components in a computer system?
A. Power Supply Unit (PSU).
B. Central Processing Unit (CPU).
C. Motherboard.
D. None of these.
Tamoban Javnoi
GENERAL KNOWLEDGE
-
Computer Skills
Which type of monitor technology offers the widest viewing angles and accurate color reproduction?
A. CRT (Cathode Ray Tube).
B. OLED (Organic Light-Emitting Diode).
C. LCD (Liquid Crystal Display).
D. None of these.
Tamoban Javnoi
GENERAL KNOWLEDGE
-
Computer Skills
Which of the following ports is used to connect external devices such as printers, scanners, and cameras to a computer?
A. USB (Universal Serial Bus).
B. HDMI (High-Definition Multimedia Interface).
C. Both (A) & (B).
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Programming
In the RISC architecture, the _____ is updated whenever a function is called:
A. Frame pointer and Return address register.
B. Stack pointer.
C. Both (A) & (B).
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Programming
Making a system store data in memory contiguously would:
A. Results in lesser computation while searching for data.
B. Results in more computation while searching data.
C. Makes storing data very easy as one doesn?t have to search for available memory to store.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Programming
Which of the following are computer architectures different from conventional von Neumann architecture?
A. MIT architecture.
B. Harvard architecture.
C. Turing architecture.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Data Structures & Algorithms
Which type of algorithms are applicable to scheduling resources in operating systems?
A. State space search.
B. Machine learning.
C. Bayesian learning.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Data Structures & Algorithms
The time complexity of finding a shortest path in a network is:
A. Fairly low with Dijkstra?s algorithm.
B. Very efficient with A* search given spatial heuristics.
C. Better than the above two using some randomization mechanism in large networks.
D. None of these.
Tamoban Javnoi
GENERAL KNOWLEDGE
-
Computer Skills
Why is it important to have antivirus software installed on a computer?
A. To increase internet speed.
B. To reduce the number of pop-up ads.
C. To protect the computer from malware and viruses.
D. To improve the quality of the display.
Tamoban Javnoi
GENERAL KNOWLEDGE
-
Computer Skills
Who is known as the father of computers?
A. Steve Jobs.
B. Bill Gates.
C. Alan Turing.
D. Charles Babbage.
Tamoban Javnoi
GENERAL KNOWLEDGE
-
Computer Skills
Where is the operating system typically stored in a computer?
A. In the CPU.
B. In the RAM.
C. In the Hard Drive.
D. In the Network Interface Card.
Tamoban Javnoi
GENERAL KNOWLEDGE
-
Computer Skills
When does a computer perform a boot-up process?
A. When a file is opened.
B. When the computer is turned on.
C. When a software update is available.
D. When the printer is connected.
Tamoban Javnoi
GENERAL KNOWLEDGE
-
Computer Skills
What is the main function of the Central Processing Unit (CPU) in a computer?
A. To store data permanently.
B. To execute instructions and process data.
C. To manage network connections.
D. To control peripheral devices.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Data Structures & Algorithms
Which data structure is most suitable for implementing an LRU (Least Recently Used) cache?
A. Stack.
B. Queue.
C. HashMap and Doubly Linked List.
D. Binary Search Tree.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Data Structures & Algorithms
Why is the space complexity of a recursive algorithm often higher than its iterative counterpart?
A. Due to the creation of additional variables.
B. Because recursion requires additional stack space for each function call.
C. Because recursive algorithms are slower.
D. Due to the use of dynamic memory allocation.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Data Structures & Algorithms
Where is a heap data structure typically used?
A. To implement a priority queue.
B. To perform depth-first search (DFS).
C. To store adjacency lists.
D. To implement hash tables.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Data Structures & Algorithms
When does the Dijkstra's algorithm fail to find the shortest path in a graph?
A. When the graph is disconnected.
B. When the graph contains negative weight edges.
C. When the graph contains cycles.
D. When the graph is undirected.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Data Structures & Algorithms
What is the time complexity of inserting an element into a Binary Search Tree (BST) in the worst case?
A. O(log n).
B. O(n).
C. O(n log n).
D. O(1).
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Operating Systems
When is the "thrashing" condition likely to occur in a system using virtual memory?
A. When the CPU is idle.
B. When the system has insufficient physical memory and excessive paging occurs.
C. When there are too many open files.
D. When the disk space is full.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Operating Systems
Why do modern operating systems use preemptive multitasking?
A. To simplify process management.
B. To enhance user interactivity and system responsiveness.
C. To minimize the number of processes.
D. To increase the size of the swap space.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Operating Systems
Which memory management scheme allows the physical address space of a process to be non-contiguous?
A. Paging.
B. Segmentation.
C. Contiguous allocation.
D. Swapping.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Operating Systems
How to resolve the critical section problem in concurrent programming?
A. Using virtual memory.
B. Implementing a semaphore.
C. Applying context switching.
D. Utilizing file permissions.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Operating Systems
What mechanism does an operating system use to handle the execution of multiple processes that require frequent access to the CPU?
A. Multithreading.
B. Swapping.
C. Round-robin scheduling.
D. Memory segmentation.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Operating Systems
Where is the Page Table typically stored in a computer system?
A. In the CPU registers.
B. In the main memory (RAM).
C. On the hard disk.
D. In the cache memory.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Operating Systems
When does a deadlock occur in a system?
A. When there is a lack of memory resources.
B. When multiple processes are blocked, each waiting for a resource held by another process.
C. When the CPU usage reaches 100%.
D. When a process is terminated abnormally.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Operating Systems
What is the main purpose of a context switch in an operating system?
A. To increase the clock speed of the CPU.
B. To switch the CPU from executing one process to another.
C. To allocate more memory to running processes.
D. To shutdown non-responsive processes.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Computer Networks & Security
Why is it important to regularly update software and firmware in network devices?
A. To increase network bandwidth.
B. To improve network performance.
C. To fix security vulnerabilities and bugs.
D. To enhance network reliability.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Computer Networks & Security
Who is responsible for managing digital certificates in a Public Key Infrastructure (PKI) system?
A. Certificate Authority (CA).
B. Network Administrator.
C. End-users.
D. Internet Service Provider (ISP).
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Computer Networks & Security
Where is the most secure location to place a firewall within a network architecture?
A. Between the router and the internal network.
B. Outside the demilitarized zone (DMZ).
C. Inside the DMZ, but before the web server.
D. After the switch, but before the router.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Computer Networks & Security
When should an organization implement two-factor authentication (2FA) for remote access to its network resources?
A. During regular business hours.
B. After a security breach has occurred.
C. Whenever employees work remotely or access sensitive data.
D. Only for executive-level employees.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Computer Networks & Security
What is the purpose of a subnet mask in IP networking?
A. To identify the network portion of an IP address.
B. To prevent IP spoofing attacks.
C. To encrypt data packets for secure transmission.
D. To assign unique IP addresses to devices on a network.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Database Management Systems
Which type of database index is typically used to improve the speed of queries that involve range searches?
A. Hash index.
B. B-tree index.
C. Bitmap index.
D. Full-text index.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Database Management Systems
How to ensure ACID properties are maintained in a transaction?
A. By using appropriate indexing.
B. By defining primary keys and foreign keys.
C. By using database transaction management features.
D. By normalizing the database.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Database Management Systems
Where would you typically find the definition of a database schema?
A. In the application code.
B. In the database management system metadata.
C. In the user interface.
D. In the transaction logs.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Database Management Systems
When is a database said to be in the Third Normal Form (3NF)?
A. When it is free of multivalued dependencies.
B. When it has no partial dependency.
C. When it has no transitive dependency.
D. When it has a single candidate key.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Database Management Systems
What is the primary purpose of normalization in database design?
A. To improve query performance.
B. To reduce data redundancy.
C. To increase data integrity.
D. To simplify database schemas.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Web Design & Development
Can you explain which HTTP method is idempotent and should be used for updating a resource in RESTful web services?
A. GET.
B. POST.
C. PUT.
D. DELETE.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Web Design & Development
How to prevent a form from submitting when a required field is empty using HTML5?
A. Use JavaScript to check for empty fields.
B. Set the 'required' attribute on the input fields.
C. Set the 'novalidate' attribute on the form tag.
D. Use CSS to highlight empty fields.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Web Design & Development
Where is the correct location to place the meta charset="UTF-8" tag in an HTML document?
A. Inside the body tag.
B. Within the head tag.
C. Before the DOCTYPE declaration.
D. After the closing html tag.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Web Design & Development
When should you use the 'defer' attribute in a script tag in HTML?
A. When you want the script to load before the HTML content.
B. When you want the script to execute after the HTML content has been parsed.
C. When you want the script to block the HTML parsing until it loads.
D. When you want the script to load asynchronously.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Web Design & Development
What is the primary purpose of using media queries in responsive web design?
A. To apply CSS rules based on the user's internet speed.
B. To optimize the website for search engines.
C. To apply CSS rules based on the device's screen size.
D. To increase the website's loading speed.