Home
Current Affairs January 2024

What is the correct answer?

4

Which sorting algorithm has the worst-case time complexity of O(n^2)?

A. QuickSort

B. MergeSort

C. BubbleSort

D. InsertionSort

Correct Answer :

C. BubbleSort


Related Questions

What is the correct answer?

4

What is a loop in programming?

A. A bug in the code

B. A function that repeats a specific task

C. A variable that stores multiple values

D. A conditional statement

What is the correct answer?

4

Which of the following is not a fundamental data type in Python?

A. int

B. float

C. list

D. char

What is the correct answer?

4

What is the purpose of the elif statement in Python?

A. It is used to define a new variable.

B. It is used to handle exceptions.

C. It is used to execute code if the if condition is false.

D. It is used to test multiple conditions sequentially.

What is the correct answer?

4

What is an IP address used for in computer networking?

A. To identify a specific website

B. To identify a specific computer or device on a network

C. To encrypt network traffic

D. To block spam emails

What is the correct answer?

4

What does the term protocol mean in the context of computer networking?

A. A set of rules and conventions for communication between devices

B. A type of hardware

C. A programming language

D. A software application

What is the correct answer?

4

Which of the following is not a valid type of computer network?

A. Local Area Network (LAN)

B. Wide Area Network (WAN)

C. Personal Area Network (PAN)

D. Personal Computer Network (PCN)

What is the correct answer?

4

What is a variable in programming?

A. A value that cannot be changed

B. A container for storing data

C. A type of loop

D. A function

What is the correct answer?

4

What is the purpose of the while loop in programming?

A. To execute a block of code a specific number of times

B. To define a function

C. To make decisions and execute code conditionally

D. To repeat a block of code while a condition is true

What is the correct answer?

4

In the context of cybersecurity, what does the term phishing refer to?

A. Catching harmful computer viruses

B. Fishing for personal information through deceptive emails or websites

C. Encrypting data for security

D. Scanning for network vulnerabilities

What is the correct answer?

4

Which of the following is not a type of computer memory?

A. RAM (Random Access Memory)

B. ROM (Read-Only Memory)

C. CPU (Central Processing Unit)

D. Cache

What is the correct answer?

4

What does the term ASCII stand for in the context of character encoding?

A. American Standard Code for Information Interchange

B. Advanced Standard Character Set Instruction

C. Automated System for Computer Information

D. Algorithmic Symbol Coding and Interpretation

What is the correct answer?

4

Which data structure is used to store a collection of elements with no duplicates?

A. Array

B. Set

C. List

D. Dictionary

What is the correct answer?

4

What does the term HTTP request refer to in web development?

A. A request for information sent from a web server to a web client

B. A request for information sent from a web client to a web server

C. A request to download a web page

D. A request to play a video on a web page

What is the correct answer?

4

What is the purpose of the try and except blocks in Python?

A. To define a function

B. To create graphics

C. To handle exceptions and errors

D. To write comments in code

What is the correct answer?

4

What does the term protocol mean in the context of computer networking?

A. A set of rules and conventions for communication between devices

B. A type of hardware

C. A programming language

D. A software application

What is the correct answer?

4

What does DNS stand for in the context of the internet?

A. Domain Name System

B. Dynamic Network Service

C. Digital Naming Service

D. Data Network System

What is the correct answer?

4

What is the purpose of a compiler in programming?

A. To execute code line by line

B. To translate high-level code into machine code

C. To debug code

D. To create user interfaces

What is the correct answer?

4

What is a network firewall used for?

A. To protect against physical intrusions

B. To block unwanted network traffic and protect a network from unauthorized access

C. To boost network speed

D. To filter spam emails

What is the correct answer?

4

What is the purpose of the finally block in a try-except-finally construct in Python?

A. To define a function

B. To execute code regardless of whether an exception occurred

C. To create graphics

D. To repeat a block of code

What is the correct answer?

4

What is the binary representation of the decimal number 8?

A. 1000

B. 1001

C. 100

D. 1010

What is the correct answer?

4

Which of the following is a valid way to define a variable in Python?

A. variableName = 42

B. variableName := 42

C. 42 = variableName

D. variableName -> 42

What is the correct answer?

4

What is the purpose of a conditional statement in programming?

A. To define a function

B. To repeat a block of code a specific number of times

C. To make decisions and execute code conditionally

D. To display information on the screen

What is the correct answer?

4

What is an algorithm in computer science?

A. A type of data structure

B. A step-by-step procedure for solving a problem

C. A type of programming language

D. A hardware component

What is the correct answer?

4

Which of the following is not a valid programming construct in Python?

A. if-else statement

B. switch statement

C. while loop

D. for loop

What is the correct answer?

4

Which of the following is not a valid data structure in Python?

A. List

B. Tuple

C. Stack

D. String

What is the correct answer?

4

Which of the following is not a valid relational operator in programming?

A. >

B. <=

C. ==

D. %

What is the correct answer?

4

What does the acronym SQL stand for?

A. Structured Query Language

B. Simple Query Language

C. System Query Language

D. Sequential Query Language

What is the correct answer?

4

Which programming paradigm is based on the concept of objects?

A. Functional programming

B. Procedural programming

C. Object-oriented programming

D. Declarative programming

What is the correct answer?

4

What is the maximum value that can be stored in a byte?

A. 128

B. 256

C. 64

D. 512

What is the correct answer?

4

What does the term bug refer to in programming?

A. An insect that disrupts the computer's operation

B. A hardware malfunction

C. An error or flaw in a program's code

D. A security vulnerability