Quiz Bee Questions
Quiz Bee Questions
Programming Fundamentals
1. You are designing a program that calculates the area of a rectangle. She wants to store the length and width
values provided by the user. Which programming concept should she use?
Answer: Variables
2. Ma’am Neliza is creating a calculator program where the user can choose operations like addition, subtraction,
multiplication, or division. What programming structure should he implement to handle these choices?
Answer: Conditionals (if-else)
Database System
3. Sir Jeric creates a database to track inventory at his store. He needs to ensure that each product in the inventory
has a unique identifier. What database concept should he use?
Answer: Primary Key
4. You need to fetch specific data from a database table based on conditions. Which SQL clause should she use?
Answer: WHERE
Software Development
5. A developer wants to ensure that changes made to the code don't affect the existing features. Which testing type
should they perform?
Answer: Regression testing
6. Sir Jerome's team follows a software development approach where they work in small iterations and regularly
deliver features to users. Which methodology are they using?
Answer: Agile
Networking and Cybersecurity
Answer: Ransomware
12. What is the primary language used for Android app development?
Answer: Java
Emerging Technologies
13. Name the technology that allows users to experience and interact with a computer-generated environment as if it
were real.
a. Answer: Virtual Reality (VR).
Theoretical Foundations
14. Identify the British mathematician who is considered the father of theoretical computer science and artificial
intelligence.
a. Answer: Alan Turing.
15. Identify the programming paradigm based on the concept of 'objects' which contain data and code to manipulate
that data.
Answer: Object-oriented programming (OOP)
16. A field of applied ethics that deals with ethical issues in the use, design, and management of information
technology.
Answer: Computer ethics.
Historical Aspects of Computing
17. Name the first electronic general-purpose computer, developed during World War II.
a. Answer: ENIAC (Electronic Numerical Integrator and Computer).
18. Identify the programming language developed by Sun Microsystems in 1995 that is widely used for building
platform-independent applications.
a. Answer: Java.
10. Which cloud model provides access to a shared infrastructure that multiple organizations use?
Answer: Public Cloud
Emerging Technologies
11. Name the open-source operating system kernel that serves as the foundation for many operating systems,
including Android and various Linux distributions.
Theoretical Foundations
12. Identify the principle stating that the number of transistors on a microchip doubles approximately every 18
months, leading to the exponential growth of computing power.
Answer: Moore's Law.
13. What is the term for the disparity between individuals who have access to modern information and communication
technology and those who do not?
Answer: Digital divide.
14. What is the term for the ethical theory that focuses on the consequences of actions to determine their moral
value, often summarized by the phrase "the greatest good for the greatest number"?
Answer: Utilitarianism.
15. Identify the 19th-century mathematician who is often credited as the world's first computer programmer due to her
work on Charles Babbage's Analytical Engine.
Answer: Ada Lovelace.
16. Identify the early computing device invented by Herman Hollerith that used punched cards to process data for the
1890 U.S. Census.
Programming Fundamentals
1. Ermarc is developing an app and needs to sort a list of student scores in ascending order. Which sorting
algorithm should she choose for the best average time complexity?
Answer: Merge Sort
2. Rommerl is working on a project and needs to create a function that calls itself to solve smaller sub-problems.
What programming technique is Paul using?
Answer: Recursion
Database System
3. You are using a database where consistency, availability, and partition tolerance cannot be simultaneously
guaranteed. What theorem applies to this situation?
Answer: CAP theorem
4. Master Neliza needs to implement a database trigger that automatically updates a column whenever a specific
row is modified. What feature is she using?
Answer: Trigger
Software Development
5. You are working on a highly complex application. You decided to break down the software into smaller,
independently deployable components to improve scalability. What architecture are they following?
Answer: Microservices architecture
6. Master Jerome is tasked with improving the performance of an application. She decides to reduce technical debt by
optimizing poorly written code. What is this process called?
Answer: Refractoring
Networking and Cybersecurity
6. Which cloud security measure ensures that only authorized users can access cloud resources?
Answer: Identity and Access Management (IAM)
9. Which type of virtualization allows multiple operating systems to run on a single physical machine?
Answer: Server Virtualization
10. Which tool is commonly used for cloud infrastructure automation?
Answer: Kubernetes
Emerging Technologies
11. Name the concept referring to a hypothetical point in the future when technological growth becomes
uncontrollable and irreversible, resulting in unforeseeable changes to human civilization.
Answer: Technological singularity.
Theoretical Foundations
12. Identify the problem in theoretical computer science that involves determining whether every problem whose
solution can be quickly verified can also be solved quickly.
Answer: P versus NP problem.
13. Identify the ethical framework that emphasizes the role of character and virtue in moral philosophy, rather than
either doing one's duty or acting to bring about good consequences.
Answer: Virtue ethics.
14. Name the 1970 declaration by computer scientist Niklaus Wirth that suggests software is getting slower more
rapidly than hardware becomes faster.
Answer: Wirth's Law.