Search Header Logo
CYBER THINK QUEST

CYBER THINK QUEST

Assessment

Presentation

Computers

University

Practice Problem

Hard

Created by

Ruben Madriaga

Used 2+ times

FREE Resource

12 Slides • 30 Questions

1

CYBER THINK QUEST

2

1 ONCE IN FOR ALL
2 DOUBLE THE FUN
3 TRIPLE TREAT

3

ONCE IN FOR ALL

media

4

Multiple Choice

  1. Which of the following is a type of volatile memory?

1

ROM

2

Hard Disk

3

RAM

4

Flash Drive

5

Multiple Choice

  1. Which of the following is not a data type in Python? 

1

int

2

double

3

list

4

float

6

Multiple Choice

  1. What command is used to remove a record from a table in SQL?

1

DELETE

2

REMOVE

3

DROP

4

ERASE

7

Multiple Choice

  1. The protocol primarily used for secure web communication is:

1

HTTP

2

HTTPS

3

FTP

4

SSH

8

Multiple Choice

  1. A linked list where each node points to the next and previous nodes is called:

1

Single linked list

2

Double linked list

3

Circular linked list

4

Static linked list

9

Multiple Choice

  1. Which of these technologies is often used to enable IoT connectivity?

1

USB

2

Ethernet

3

SSD

4

Wi-Fi

10

Multiple Choice

  1. In computer networking, which device divides a network into multiple sub-networks?

1

Switch

2

Router

3

Hub

4

Modem

11

Multiple Choice

  1. The binary representation of the decimal number 10 is: 

1

1001

2

1100

3

1010

4

1111

12

Multiple Choice

  1. Which of these protocols is used for retrieving email messages? 

1

POP3

2

SMTP

3

FTP

4

HTTP

13

media

NO. 10
THINK TWICE
QUESTION

14

Fill in the Blank

  1. What is the output of the code snippet? for (int i=11; i>=5; i-=3) { SOP( i + " ") }

15

DOUBLE THE FUN

media

16

Multiple Choice

  1. Which type of data structure is used for implementing recursion?

1

Array

2

Queue

3

Linked List

4

Stack

17

Multiple Choice

  1. The command 'ping' is used to:

1

Display IP configuration

2

Open the command prompt

3

Check the network connection

4

Terminate network connections

18

media

NO. 3
THINK TWICE
QUESTION

19

Fill in the Blank

  1. The platform that provides a scalable environment for applications and services to run on-demand is known as:

20

Multiple Choice

  1. In programming, a loop that never ends is referred to as a(n): 

1

Infinite loop

2

Sequential loop

3

Terminal loop

4

Recurring loop

21

Multiple Choice

  1. In a relational database, what uniquely identifies a row in a table? 

1

Foreign key

2

Primary key

3

Composite key

4

Superkey

22

media

NO. 6
THINK TWICE
QUESTION

23

Fill in the Blank

  1. Which technology allows multiple operating systems to run on a single hardware platform?

24

Multiple Choice

  1. IP addresses in IPv4 are composed of how many bits?

1

16

2

32

3

64

4

128

25

Multiple Choice

  1. Which protocol is responsible for delivering emails?

1

HTTP

2

FTP

3

SMTP

4

SNTP

26

Fill in the Blank

  1. The process of converting high-level code into machine code is called: 

27

Multiple Choice

  1. The process of maintaining a system up-to-date with security patches is known as: 

1

System backup

2

System recovery

3

Patch management

4

Data logging

28

TRIPLE TREAT

media

29

Multiple Choice

  1. Which of these operators is used to compare two values?

1

=

2

==

3

:=

4

!=

30

Multiple Choice

  1. In data structures, what does a hash table use to retrieve data quickly? 

1

Indexes

2

Array

3

Pointers

4

Keys

31

media

NO. 3
THINK TWICE
QUESTION

32

Fill in the Blank

  1. Which layer in the OSI model is responsible for establishing a connection between hosts?

33

Fill in the Blank

  1. In database management, a field is also known as a:

34

Multiple Choice

  1. A software program that manages multiple users and controls resources in a server environment is called a: 

1

Workstation 

2

Server OS 

3

Backup software 

4

Firewall 

35

Multiple Choice

  1. In which data structure is Breadth-First Search (BFS) commonly used? 

1

Array 

2

Stack

3

Queue

4

Link List

36

media

NO. 7
THINK TWICE
QUESTION

37

Fill in the Blank

  1. What is the output of the code snippet?

    int[] numbers = new int[3]

    SOP(numbers[0]+" ");

    SOP(numbers[1]);

38

Multiple Choice

  1. Which of the following technologies is most associated with blockchain?

1

Internet of Things (IoT)

2

Cryptocurrency

3

Cloud Computing

4

Artificial Intelligence (AI)

39

media

NO. 9
THINK TWICE
QUESTION

40

Fill in the Blank

  1. In a binary search tree, nodes with no children are called:

41

Multiple Choice

  1. Which term refers to the ethical and responsible use of AI to ensure it does not harm society?

1

AI Citizenship

2

AI Governance

3

Quantum Computing

4

Machine Learning

42

media

THANK YOU!

CYBER THINK QUEST

Show answer

Auto Play

Slide 1 / 42

SLIDE