Search Header Logo
CYBER THINK QUEST

CYBER THINK QUEST

Assessment

Presentation

Computers

University

Practice Problem

Hard

Created by

Ruben Madriaga

Used 2+ times

FREE Resource

12 Slides • 30 Questions

1

CYBER THINK QUEST

2

1 ONCE IN FOR ALL
2 DOUBLE THE FUN
3 TRIPLE TREAT

3

ONCE IN FOR ALL

media

4

Multiple Choice

  1. Which of the following is a type of volatile memory?

1

ROM

2

Hard Disk

3

RAM

4

Flash Drive

5

Multiple Choice

  1. Which of the following is not a data type in Python? 

1

int

2

double

3

list

4

float

6

Multiple Choice

  1. What command is used to remove a record from a table in SQL?

1

DELETE

2

REMOVE

3

DROP

4

ERASE

7

Multiple Choice

  1. The protocol primarily used for secure web communication is:

1

HTTP

2

HTTPS

3

FTP

4

SSH

8

Multiple Choice

  1. A linked list where each node points to the next and previous nodes is called:

1

Single linked list

2

Double linked list

3

Circular linked list

4

Static linked list

9

Multiple Choice

  1. Which of these technologies is often used to enable IoT connectivity?

1

USB

2

Ethernet

3

SSD

4

Wi-Fi

10

Multiple Choice

  1. In computer networking, which device divides a network into multiple sub-networks?

1

Switch

2

Router

3

Hub

4

Modem

11

Multiple Choice

  1. The binary representation of the decimal number 10 is: 

1

1001

2

1100

3

1010

4

1111

12

Multiple Choice

  1. Which of these protocols is used for retrieving email messages? 

1

POP3

2

SMTP

3

FTP

4

HTTP

13

media

NO. 10
THINK TWICE
QUESTION

14

Fill in the Blanks

Type answer...

15

DOUBLE THE FUN

media

16

Multiple Choice

  1. Which type of data structure is used for implementing recursion?

1

Array

2

Queue

3

Linked List

4

Stack

17

Multiple Choice

  1. The command 'ping' is used to:

1

Display IP configuration

2

Open the command prompt

3

Check the network connection

4

Terminate network connections

18

media

NO. 3
THINK TWICE
QUESTION

19

Fill in the Blanks

Type answer...

20

Multiple Choice

  1. In programming, a loop that never ends is referred to as a(n): 

1

Infinite loop

2

Sequential loop

3

Terminal loop

4

Recurring loop

21

Multiple Choice

  1. In a relational database, what uniquely identifies a row in a table? 

1

Foreign key

2

Primary key

3

Composite key

4

Superkey

22

media

NO. 6
THINK TWICE
QUESTION

23

Fill in the Blanks

Type answer...

24

Multiple Choice

  1. IP addresses in IPv4 are composed of how many bits?

1

16

2

32

3

64

4

128

25

Multiple Choice

  1. Which protocol is responsible for delivering emails?

1

HTTP

2

FTP

3

SMTP

4

SNTP

26

Fill in the Blanks

Type answer...

27

Multiple Choice

  1. The process of maintaining a system up-to-date with security patches is known as: 

1

System backup

2

System recovery

3

Patch management

4

Data logging

28

TRIPLE TREAT

media

29

Multiple Choice

  1. Which of these operators is used to compare two values?

1

=

2

==

3

:=

4

!=

30

Multiple Choice

  1. In data structures, what does a hash table use to retrieve data quickly? 

1

Indexes

2

Array

3

Pointers

4

Keys

31

media

NO. 3
THINK TWICE
QUESTION

32

Fill in the Blanks

Type answer...

33

Fill in the Blanks

Type answer...

34

Multiple Choice

  1. A software program that manages multiple users and controls resources in a server environment is called a: 

1

Workstation 

2

Server OS 

3

Backup software 

4

Firewall 

35

Multiple Choice

  1. In which data structure is Breadth-First Search (BFS) commonly used? 

1

Array 

2

Stack

3

Queue

4

Link List

36

media

NO. 7
THINK TWICE
QUESTION

37

Fill in the Blanks

Type answer...

38

Multiple Choice

  1. Which of the following technologies is most associated with blockchain?

1

Internet of Things (IoT)

2

Cryptocurrency

3

Cloud Computing

4

Artificial Intelligence (AI)

39

media

NO. 9
THINK TWICE
QUESTION

40

Fill in the Blanks

Type answer...

41

Multiple Choice

  1. Which term refers to the ethical and responsible use of AI to ensure it does not harm society?

1

AI Citizenship

2

AI Governance

3

Quantum Computing

4

Machine Learning

42

media

THANK YOU!

CYBER THINK QUEST

Show answer

Auto Play

Slide 1 / 42

SLIDE