Diagnostic Test Part 2
Diagnostic Test Part 2
13. What would be the starting and ending index positions for the substring function to extract everything up to but not including
the “@” if you are given the following string: [email protected]?
(A) 0, 5
(B) 0, 6
(C) 1, 6
(D) 1, 7
16. While algorithms can be analyzed mathematically, what information does the testing process provide?
(A) How often program statements execute
(B) The maximum size dataset the algorithm can handle
(C) The validity of the algorithm
(D) The clarity of the algorithm
17. Why is there a need to find different algorithms for problems that already have a solution?
(A) Different algorithms could use heuristics rather than precise values.
(B) Different algorithms could be more efficient.
(C) Different algorithms could use frequency analysis.
(D) Different algorithms could provide intractability.
19. What is the most common way computer viruses are spread?
(A) By people clicking on an infected file
(B) From phishing attacks
(C) Through a rogue access point
(D) From random botnet attacks
20. Different levels of access to technological devices and the Internet due to economic or geographic reasons is referred to as:
(A) Binary split
(B) Demographic division
(C) Digital divide
(D) Technology rift