Unformatted text preview:

26 challenging multiple choice questions MCQs for computer science with answers 1 In algorithm analysis what does the term amortized analysis refer to A Analyzing the worst case scenario B Averaging the time complexity over a sequence of operations C Analyzing only the best case scenario D Ignoring the time complexity 2 Which of the following is an NP complete problem A Sorting B Primality testing C Traveling Salesman Problem D Binary Search 3 What is the purpose of the B trees in database systems A Efficient sorting B Fast lookup and insertion in large datasets C Handling recursion in algorithms D Minimizing space complexity 4 What is the significance of the Church Turing thesis in theoretical computer science A It defines the limits of computability B It describes the concept of polymorphism C It establishes principles of data encryption D It outlines principles of fault tolerance 5 What is the Halting Problem as introduced by Alan Turing A Determining if a program will finish running or continue indefinitely B Efficiently sorting a list of numbers C Verifying the correctness of a program D Analyzing the space complexity of an algorithm 6 Which of the following is a property of a context free language A Requires a stack for parsing B Can be recognized by a finite automaton C Allows left recursion D Supports backtracking in parsing 7 What is the primary purpose of the A algorithm in artificial intelligence A Sorting B Pathfinding C Compression D Clustering 8 In distributed systems what does the term two phase commit refer to A Ensuring atomicity of transactions across multiple nodes B Balancing load between servers C Simultaneous execution of two processes D Dynamic allocation of IP addresses 9 What is the purpose of the Gauss Seidel method in numerical analysis A Solving systems of linear equations iteratively B Finding prime numbers C Efficiently searching in a binary tree D Optimizing graph algorithms 10 Which cryptographic algorithm is commonly used for digital signatures A RSA B AES C SHA 256 D MD5 11 What is the concept of cache coherence in computer architecture A Ensuring consistency between different cache levels B Optimizing disk access speed C Minimizing cache size D Balancing CPU and memory speed 12 In computer graphics what does the term ray tracing involve A Optimizing database queries B Simulating the propagation of light in a scene C Reducing latency in network communication D Creating 3D models from 2D images 13 Which of the following is a property of a Huffman code used in data compression A Prefix free B Suffix free C Infix free D Postfix free 14 What is the purpose of the Floyd Warshall algorithm in graph theory A Finding the shortest paths between all pairs of vertices B Determining whether a graph is bipartite C Detecting cycles in a graph D Computing the maximum flow in a network 15 What is the role of a Bloom filter in data structures A Sorting elements in a linked list B Efficiently testing membership in a set C Balancing a binary search tree D Detecting and correcting errors in data 16 What does the term map reduce refer to in distributed computing A Optimizing SQL queries B Parallel processing of large datasets C Balancing loads in a network D Encrypting communication between nodes 17 Which of the following is a type of neural network architecture used for image recognition A Recurrent Neural Network RNN B Convolutional Neural Network CNN C Radial Basis Function Network RBFN D Hopfield Network 18 What is the purpose of the DUAL table in Oracle databases A Storing user credentials B Handling time zone conversions C Managing database privileges D Optimizing SQL queries A Factory Method B Abstract Factory C Builder D Prototype 19 Which design pattern is focused on creating an interface for a set of related or dependent objects 20 What is the primary goal of the Open Systems Interconnection OSI model A Simplifying data structures in programming B Defining a framework for networking protocols C Managing memory allocation in operating systems D Ensuring type safety in programming languages 21 In cybersecurity what does the term honeypot refer to A An intentionally vulnerable system used to attract and detect attackers B A secure password storage mechanism C A hardware firewall D A type of encryption algorithm 22 What is the purpose of the Jackson Structured Programming JSP method in software development A Managing project schedules B Enhancing code readability C Defining software architecture D Debugging source code A Hierarchical Model B Network Model C Relational Model D Object Oriented Model 23 Which database model is based on the concept of mathematical relations and uses tables to represent data 24 In computer networks what does the term subnetting involve A Allocating IP addresses to devices on a network B Dividing a network into smaller logical sub networks C Ensuring secure communication between devices D Balancing network traffic 25 What is the primary purpose of the Observer pattern in software design A Managing database connections B Defining interfaces for creating families of related or dependent objects C Notifying objects of state changes in a subject D Ensuring data consistency in distributed systems 26 What is the purpose of the RSA algorithm in cryptography A Symmetric key encryption B Digital signatures and C Public key authentication D Hash functions and integrity verification ANSWERS 1 B Averaging the time complexity over a sequence of operations 2 C Traveling Salesman Problem 3 A Integrated Development Environment 4 B Fast lookup and insertion in large datasets 5 A Determining if a program will finish running or continue indefinitely 6 A Requires a stack for parsing 7 B Pathfinding 8 A Ensuring atomicity of transactions across multiple nodes 9 A Solving systems of linear equations iteratively 10 A RSA 13 A Prefix free 11 A Ensuring consistency between different cache levels 12 B Simulating the propagation of light in a scene 14 A Finding the shortest paths between all pairs of vertices 15 B Efficiently testing membership in a set 16 B Parallel processing of large datasets 17 B Convolutional Neural Network CNN 18 B Handling time zone conversions 19 B Abstract Factory 20 B Defining a framework for networking protocols 21 A An intentionally vulnerable system used to attract and detect attackers 22 B Enhancing code readability 23 C Relational Model 24 B Dividing a network into smaller logical sub networks 25 C Notifying objects of state


View Full Document

UGA CSCI 1301 - MCQs

Documents in this Course
Load more
Download MCQs
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view MCQs and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view MCQs 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?