Advanced Topics

What is the purpose of the “visitor pattern” in software design? a) To create objects dynamically b) To separate algorithms from objects on which they operate c) To handle exceptions d) To manage memory allocation Answer: b) To separate algorithms from objects on which they operate Which of the following algorithms is used in cryptographic hash functions? a) RSA b) SHA-256 c) Dijkstra’s d) QuickSort Answer: b) SHA-256 What is the time complexity of the Fast Fourier Transform (FFT) algorithm? a) O(n log n) b) O(n^2) c) O(log n) d) O(n) Answer: a) O(n log n) In which programming paradigm is the concept of “monads” most commonly used? a) Object-oriented programming b) Functional programming c) Procedural programming d) Logic programming Answer: b) Functional programming Which data structure is used in the implementation of a LRU (Least Recently Used) cache? a) HashMap and Doubly Linked List b) Stack c) Queue d) Binary Search Tree Answer: a) HashMap and Doubly Linked List What is a “race condition” in concurrent programming? a) A situation where two or more processes attempt to change shared data simultaneously b) A situation where processes are executed in parallel c) A situation where a process waits indefinitely d) A situation where processes are synchronized correctly Answer: a) A situation where two or more processes attempt to change shared data simultaneously What is the primary purpose of “Garbage Collection” in programming languages like Java? a) To free up memory by automatically deallocating objects no longer in use b) To manage CPU scheduling c) To handle network communication d) To optimize database queries Answer: a) To free up memory by automatically deallocating objects no longer in use Which of the following techniques can be used to ensure thread safety in concurrent programming? a) Mutexes b) Segmentation c) Paging d) Virtual memory Answer: a) Mutexes What is a “deadlock” in the context of operating systems? a) A situation where two or more processes are unable to proceed because each is waiting for the other to release a resource b) A situation where a process is terminated by the operating system c) A situation where a process has finished executing d) A situation where a process is suspended Answer: a) A situation where two or more processes are unable to proceed because each is waiting for the other to release a resource Which algorithm is used to find the shortest path in a weighted graph? a) Dijkstra’s Algorithm b) Depth-First Search c) Breadth-First Search d) Kruskal’s Algorithm Answer: a) Dijkstra’s Algorithm In which type of database does “ACID” stand for Atomicity, Consistency, Isolation, and Durability? a) Relational databases b) NoSQL databases c) Graph databases d) Object-oriented databases Answer: a) Relational databases What is a “binary search tree”? a) A data structure where each node has at most two children, left child less than the node, right child greater b) A data structure where each node has exactly two children c) A tree where nodes are arranged in a random order d) A tree that represents hierarchical data Answer: a) A data structure where each node has at most two children, left child less than the node, right child greater Which of the following is a technique used in machine learning to prevent overfitting? a) Regularization b) Normalization c) Data augmentation d) All of the above Answer: d) All of the above What is “K-means clustering”? a) An unsupervised learning algorithm for partitioning data into K clusters b) A supervised learning algorithm for classification c) A method for dimensionality reduction d) A type of neural network Answer: a) An unsupervised learning algorithm for partitioning data into K clusters Which of the following is a commonly used method for encryption in network security? a) AES (Advanced Encryption Standard) b) HTTP c) FTP d) DNS Answer: a) AES (Advanced Encryption Standard) What is the purpose of the “MapReduce” programming model? a) To process and generate large data sets with a parallel, distributed algorithm b) To handle real-time data streams c) To optimize database queries d) To manage system resources Answer: a) To process and generate large data sets with a parallel, distributed algorithm What is the primary use of the “Bloom Filter” data structure? a) To test if an element is a member of a set with a possibility of false positives b) To store large sets of data c) To manage hierarchical data d) To sort data efficiently Answer: a) To test if an element is a member of a set with a possibility of false positives What is a “Hash Collision”? a) When two different inputs produce the same hash output b) When a hash function is not secure c) When hash functions are not used d) When hash values are stored in multiple locations Answer: a) When two different inputs produce the same hash output What is “Distributed Hash Table” (DHT)? a) A decentralized distributed system that provides a lookup service for storing and retrieving data b) A method for encrypting data c) A type of hash function d) A hierarchical database structure Answer: a) A decentralized distributed system that provides a lookup service for storing and retrieving data What does the term “data normalization” refer to in databases? a) Organizing data to minimize redundancy and improve data integrity b) Encrypting data c) Compressing data d) Indexing data Answer: a) Organizing data to minimize redundancy and improve data integrity In which type of algorithm is “divide and conquer” a key strategy? a) Merge Sort b) Breadth-First Search c) Dynamic Programming d) Linear Search Answer: a) Merge Sort What is a “Genetic Algorithm”? a) An optimization algorithm inspired by natural selection and genetics b) An algorithm for data encryption c) A type of sorting algorithm d) An algorithm for file compression Answer: a) An optimization algorithm inspired by natural selection and genetics Which of the following describes “In-Memory Databases”? a) Databases that store data in the system’s main memory for faster access b) Databases that store data on disk c) Databases that use cloud storage d) Databases that use optical media for storage Answer: a) Databases that store data in the system’s main memory for faster access What is the primary purpose of “Cache Coherence” in multiprocessor systems? a) To ensure that all processors have a consistent view of memory b) To handle disk storage c) To manage virtual memory d) To encrypt data Answer: a) To ensure that all processors have a consistent view of memory What is “Automatic Differentiation” used for in machine learning? a) To compute gradients of functions efficiently b) To normalize data c) To handle missing values d) To perform data encryption Answer: a) To compute gradients of functions efficiently Which of the following is a key characteristic of “NoSQL” databases? a) Schema-less design and ability to handle unstructured data b) Strict adherence to SQL standards c) Fixed schema design d) Relational data model Answer: a) Schema-less design and ability to handle unstructured data What does the “MapReduce” paradigm focus on? a) Parallel processing of large data sets b) Encryption of data c) Managing network security d) Sorting data Answer: a) Parallel processing of large data sets Which of the following algorithms is used for solving convex optimization problems? a) Gradient Descent b) Dijkstra’s Algorithm c) QuickSort d) A* Search Answer: a) Gradient Descent What does the “Y-Combinator” help to implement in functional programming? a) Recursive functions b) Sorting algorithms c) Data encryption d) Iterative processes Answer: a) Recursive functions In a “Multithreaded Application,” what is the main advantage of using “Thread Pools”? a) To manage and reuse a pool of worker threads efficiently b) To handle memory leaks c) To encrypt sensitive data d) To increase network bandwidth Answer: a) To manage and reuse a pool of worker threads efficiently Which data structure is used in the implementation of a Trie? a) Tree b) Hash Table c) Stack d) Queue Answer: a) Tree What is the main advantage of “Inverted Index” in search engines? a) It allows fast full-text searches by mapping terms to document locations b) It manages network traffic c) It handles real-time data processing d) It encrypts search queries Answer: a) It allows fast full-text searches by mapping terms to document locations Which of the following techniques is used for dimensionality reduction? a) Principal Component Analysis (PCA) b) Gradient Descent c) K-Means Clustering d) Hashing Answer: a) Principal Component Analysis (PCA) What is the purpose of the “Command Pattern” in design patterns? a) To encapsulate requests as objects, thereby allowing parameterization and queuing of requests b) To manage memory efficiently c) To handle network communication d) To encrypt data Answer: a) To encapsulate requests as objects, thereby allowing parameterization and queuing of requests Which of the following is a property of “Functional Programming”? a) First-class functions and immutability b) Object-oriented classes c) Explicit memory management d) Direct hardware manipulation Answer: a) First-class functions and immutability What is “Concurrency Control” in databases? a) Mechanisms to ensure that concurrent transactions do not lead to inconsistencies b) Techniques for encrypting data c) Methods for managing memory d) Tools for data visualization Answer: a) Mechanisms to ensure that concurrent transactions do not lead to inconsistencies In which context is the “Observer Pattern” used? a) To define a one-to-many dependency between objects so that when one object changes state, all its dependents are notified b) To handle data encryption c) To manage memory allocation d) To perform sorting operations Answer: a) To define a one-to-many dependency between objects so that when one object changes state, all its dependents are notified What is “Deadlock Prevention” in operating systems? a) Strategies to ensure that a system never enters a deadlock state b) Methods to recover from a deadlock c) Techniques to monitor system performance d) Tools for data encryption Answer: a) Strategies to ensure that a system never enters a deadlock state Which algorithm is used for “Graph Traversal”? a) Breadth-First Search (BFS) b) QuickSort c) Dijkstra’s Algorithm d) A* Search Answer: a) Breadth-First Search (BFS) What is the primary use of “Decision Trees” in machine learning? a) For classification and regression tasks b) For handling data encryption c) For network traffic management d) For memory management Answer: a) For classification and regression tasks Which of the following is a technique for “Caching” in web applications? a) Storing frequently accessed data in a temporary storage location b) Encrypting sensitive data c) Managing database connections d) Handling real-time data streams Answer: a) Storing frequently accessed data in a temporary storage location What does “Reentrant Code” mean? a) Code that can be safely interrupted and resumed without side effects b) Code that is used for data encryption c) Code that handles memory allocation d) Code that manages network connections Answer: a) Code that can be safely interrupted and resumed without side effects In which scenario is “Backpropagation” used? a) Training artificial neural networks b) Handling network errors c) Encrypting data d) Managing database transactions Answer: a) Training artificial neural networks What is “Symbolic Execution” in software testing? a) Analyzing programs by tracking symbolic values rather than actual values b) Encrypting data for security c) Managing system resources d) Performing binary search Answer: a) Analyzing programs by tracking symbolic values rather than actual values Which of the following is a “Peer-to-Peer” network characteristic? a) Each node can act as both a client and a server b) Centralized server management c) Single point of failure d) Hierarchical data management Answer: a) Each node can act as both a client and a server What is the purpose of “Load Balancing” in distributed systems? a) To distribute workloads evenly across multiple servers b) To manage memory usage c) To encrypt data d) To handle real-time data processing Answer: a) To distribute workloads evenly across multiple servers What is “Latency” in network systems? a) The delay between sending and receiving data b) The bandwidth of the network c) The encryption level used d) The number of active connections Answer: a) The delay between sending and receiving data Which data structure is most suitable for implementing a “Priority Queue”? a) Heap b) Stack c) Queue d) Linked List Answer: a) Heap What is “Concurrency” in computing? a) The ability of a system to execute multiple tasks simultaneously b) The encryption of data c) The management of database transactions d) The optimization of memory usage Answer: a) The ability of a system to execute multiple tasks simultaneously Which of the following is an example of “NoSQL” database? a) MongoDB b) MySQL c) PostgreSQL d) SQLite Answer: a) MongoDB
All Copyrights Reserved 2025 Reserved by T4Tutorials