Advanced Topics

What is the purpose of the “visitor pattern” in software design?
a) To create objects dynamically
b) To separate algorithms from objects on which they operate
c) To handle exceptions
d) To manage memory allocation
Answer: b) To separate algorithms from objects on which they operate

Which of the following algorithms is used in cryptographic hash functions?
a) RSA
b) SHA-256
c) Dijkstra’s
d) QuickSort
Answer: b) SHA-256

What is the time complexity of the Fast Fourier Transform (FFT) algorithm?
a) O(n log n)
b) O(n^2)
c) O(log n)
d) O(n)
Answer: a) O(n log n)

In which programming paradigm is the concept of “monads” most commonly used?
a) Object-oriented programming
b) Functional programming
c) Procedural programming
d) Logic programming
Answer: b) Functional programming

Which data structure is used in the implementation of a LRU (Least Recently Used) cache?
a) HashMap and Doubly Linked List
b) Stack
c) Queue
d) Binary Search Tree
Answer: a) HashMap and Doubly Linked List

What is a “race condition” in concurrent programming?
a) A situation where two or more processes attempt to change shared data simultaneously
b) A situation where processes are executed in parallel
c) A situation where a process waits indefinitely
d) A situation where processes are synchronized correctly
Answer: a) A situation where two or more processes attempt to change shared data simultaneously

What is the primary purpose of “Garbage Collection” in programming languages like Java?
a) To free up memory by automatically deallocating objects no longer in use
b) To manage CPU scheduling
c) To handle network communication
d) To optimize database queries
Answer: a) To free up memory by automatically deallocating objects no longer in use

Which of the following techniques can be used to ensure thread safety in concurrent programming?
a) Mutexes
b) Segmentation
c) Paging
d) Virtual memory
Answer: a) Mutexes

What is a “deadlock” in the context of operating systems?
a) A situation where two or more processes are unable to proceed because each is waiting for the other to release a resource
b) A situation where a process is terminated by the operating system
c) A situation where a process has finished executing
d) A situation where a process is suspended
Answer: a) A situation where two or more processes are unable to proceed because each is waiting for the other to release a resource

Which algorithm is used to find the shortest path in a weighted graph?
a) Dijkstra’s Algorithm
b) Depth-First Search
c) Breadth-First Search
d) Kruskal’s Algorithm
Answer: a) Dijkstra’s Algorithm

In which type of database does “ACID” stand for Atomicity, Consistency, Isolation, and Durability?
a) Relational databases
b) NoSQL databases
c) Graph databases
d) Object-oriented databases
Answer: a) Relational databases

What is a “binary search tree”?
a) A data structure where each node has at most two children, left child less than the node, right child greater
b) A data structure where each node has exactly two children
c) A tree where nodes are arranged in a random order
d) A tree that represents hierarchical data
Answer: a) A data structure where each node has at most two children, left child less than the node, right child greater

Which of the following is a technique used in machine learning to prevent overfitting?
a) Regularization
b) Normalization
c) Data augmentation
d) All of the above
Answer: d) All of the above

What is “K-means clustering”?
a) An unsupervised learning algorithm for partitioning data into K clusters
b) A supervised learning algorithm for classification
c) A method for dimensionality reduction
d) A type of neural network
Answer: a) An unsupervised learning algorithm for partitioning data into K clusters

Which of the following is a commonly used method for encryption in network security?
a) AES (Advanced Encryption Standard)
b) HTTP
c) FTP
d) DNS
Answer: a) AES (Advanced Encryption Standard)

What is the purpose of the “MapReduce” programming model?
a) To process and generate large data sets with a parallel, distributed algorithm
b) To handle real-time data streams
c) To optimize database queries
d) To manage system resources
Answer: a) To process and generate large data sets with a parallel, distributed algorithm

What is the primary use of the “Bloom Filter” data structure?
a) To test if an element is a member of a set with a possibility of false positives
b) To store large sets of data
c) To manage hierarchical data
d) To sort data efficiently
Answer: a) To test if an element is a member of a set with a possibility of false positives

What is a “Hash Collision”?
a) When two different inputs produce the same hash output
b) When a hash function is not secure
c) When hash functions are not used
d) When hash values are stored in multiple locations
Answer: a) When two different inputs produce the same hash output

What is “Distributed Hash Table” (DHT)?
a) A decentralized distributed system that provides a lookup service for storing and retrieving data
b) A method for encrypting data
c) A type of hash function
d) A hierarchical database structure
Answer: a) A decentralized distributed system that provides a lookup service for storing and retrieving data

What does the term “data normalization” refer to in databases?
a) Organizing data to minimize redundancy and improve data integrity
b) Encrypting data
c) Compressing data
d) Indexing data
Answer: a) Organizing data to minimize redundancy and improve data integrity

In which type of algorithm is “divide and conquer” a key strategy?
a) Merge Sort
b) Breadth-First Search
c) Dynamic Programming
d) Linear Search
Answer: a) Merge Sort

What is a “Genetic Algorithm”?
a) An optimization algorithm inspired by natural selection and genetics
b) An algorithm for data encryption
c) A type of sorting algorithm
d) An algorithm for file compression
Answer: a) An optimization algorithm inspired by natural selection and genetics

Which of the following describes “In-Memory Databases”?
a) Databases that store data in the system’s main memory for faster access
b) Databases that store data on disk
c) Databases that use cloud storage
d) Databases that use optical media for storage
Answer: a) Databases that store data in the system’s main memory for faster access

What is the primary purpose of “Cache Coherence” in multiprocessor systems?
a) To ensure that all processors have a consistent view of memory
b) To handle disk storage
c) To manage virtual memory
d) To encrypt data
Answer: a) To ensure that all processors have a consistent view of memory

What is “Automatic Differentiation” used for in machine learning?
a) To compute gradients of functions efficiently
b) To normalize data
c) To handle missing values
d) To perform data encryption
Answer: a) To compute gradients of functions efficiently

Which of the following is a key characteristic of “NoSQL” databases?
a) Schema-less design and ability to handle unstructured data
b) Strict adherence to SQL standards
c) Fixed schema design
d) Relational data model
Answer: a) Schema-less design and ability to handle unstructured data

What does the “MapReduce” paradigm focus on?
a) Parallel processing of large data sets
b) Encryption of data
c) Managing network security
d) Sorting data
Answer: a) Parallel processing of large data sets

Which of the following algorithms is used for solving convex optimization problems?
a) Gradient Descent
b) Dijkstra’s Algorithm
c) QuickSort
d) A* Search
Answer: a) Gradient Descent

What does the “Y-Combinator” help to implement in functional programming?
a) Recursive functions
b) Sorting algorithms
c) Data encryption
d) Iterative processes
Answer: a) Recursive functions

In a “Multithreaded Application,” what is the main advantage of using “Thread Pools”?
a) To manage and reuse a pool of worker threads efficiently
b) To handle memory leaks
c) To encrypt sensitive data
d) To increase network bandwidth
Answer: a) To manage and reuse a pool of worker threads efficiently

Which data structure is used in the implementation of a Trie?
a) Tree
b) Hash Table
c) Stack
d) Queue
Answer: a) Tree

What is the main advantage of “Inverted Index” in search engines?
a) It allows fast full-text searches by mapping terms to document locations
b) It manages network traffic
c) It handles real-time data processing
d) It encrypts search queries
Answer: a) It allows fast full-text searches by mapping terms to document locations

Which of the following techniques is used for dimensionality reduction?
a) Principal Component Analysis (PCA)
b) Gradient Descent
c) K-Means Clustering
d) Hashing
Answer: a) Principal Component Analysis (PCA)

What is the purpose of the “Command Pattern” in design patterns?
a) To encapsulate requests as objects, thereby allowing parameterization and queuing of requests
b) To manage memory efficiently
c) To handle network communication
d) To encrypt data
Answer: a) To encapsulate requests as objects, thereby allowing parameterization and queuing of requests

Which of the following is a property of “Functional Programming”?
a) First-class functions and immutability
b) Object-oriented classes
c) Explicit memory management
d) Direct hardware manipulation
Answer: a) First-class functions and immutability

What is “Concurrency Control” in databases?
a) Mechanisms to ensure that concurrent transactions do not lead to inconsistencies
b) Techniques for encrypting data
c) Methods for managing memory
d) Tools for data visualization
Answer: a) Mechanisms to ensure that concurrent transactions do not lead to inconsistencies

In which context is the “Observer Pattern” used?
a) To define a one-to-many dependency between objects so that when one object changes state, all its dependents are notified
b) To handle data encryption
c) To manage memory allocation
d) To perform sorting operations
Answer: a) To define a one-to-many dependency between objects so that when one object changes state, all its dependents are notified

What is “Deadlock Prevention” in operating systems?
a) Strategies to ensure that a system never enters a deadlock state
b) Methods to recover from a deadlock
c) Techniques to monitor system performance
d) Tools for data encryption
Answer: a) Strategies to ensure that a system never enters a deadlock state

Which algorithm is used for “Graph Traversal”?
a) Breadth-First Search (BFS)
b) QuickSort
c) Dijkstra’s Algorithm
d) A* Search
Answer: a) Breadth-First Search (BFS)

What is the primary use of “Decision Trees” in machine learning?
a) For classification and regression tasks
b) For handling data encryption
c) For network traffic management
d) For memory management
Answer: a) For classification and regression tasks

Which of the following is a technique for “Caching” in web applications?
a) Storing frequently accessed data in a temporary storage location
b) Encrypting sensitive data
c) Managing database connections
d) Handling real-time data streams
Answer: a) Storing frequently accessed data in a temporary storage location

What does “Reentrant Code” mean?
a) Code that can be safely interrupted and resumed without side effects
b) Code that is used for data encryption
c) Code that handles memory allocation
d) Code that manages network connections
Answer: a) Code that can be safely interrupted and resumed without side effects

In which scenario is “Backpropagation” used?
a) Training artificial neural networks
b) Handling network errors
c) Encrypting data
d) Managing database transactions
Answer: a) Training artificial neural networks

What is “Symbolic Execution” in software testing?
a) Analyzing programs by tracking symbolic values rather than actual values
b) Encrypting data for security
c) Managing system resources
d) Performing binary search
Answer: a) Analyzing programs by tracking symbolic values rather than actual values

Which of the following is a “Peer-to-Peer” network characteristic?
a) Each node can act as both a client and a server
b) Centralized server management
c) Single point of failure
d) Hierarchical data management
Answer: a) Each node can act as both a client and a server

What is the purpose of “Load Balancing” in distributed systems?
a) To distribute workloads evenly across multiple servers
b) To manage memory usage
c) To encrypt data
d) To handle real-time data processing
Answer: a) To distribute workloads evenly across multiple servers

What is “Latency” in network systems?
a) The delay between sending and receiving data
b) The bandwidth of the network
c) The encryption level used
d) The number of active connections
Answer: a) The delay between sending and receiving data

Which data structure is most suitable for implementing a “Priority Queue”?
a) Heap
b) Stack
c) Queue
d) Linked List
Answer: a) Heap

What is “Concurrency” in computing?
a) The ability of a system to execute multiple tasks simultaneously
b) The encryption of data
c) The management of database transactions
d) The optimization of memory usage
Answer: a) The ability of a system to execute multiple tasks simultaneously

Which of the following is an example of “NoSQL” database?
a) MongoDB
b) MySQL
c) PostgreSQL
d) SQLite
Answer: a) MongoDB

All Copyrights Reserved 2025 Reserved by T4Tutorials