0% found this document useful (0 votes)
2 views4 pages

Quiz Bee Questions

Uploaded by

20-02393
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views4 pages

Quiz Bee Questions

Uploaded by

20-02393
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Easy (18 Questions)

Programming Fundamentals
1. You are designing a program that calculates the area of a rectangle. She wants to store the length and width
values provided by the user. Which programming concept should she use?
Answer: Variables
2. Ma’am Neliza is creating a calculator program where the user can choose operations like addition, subtraction,
multiplication, or division. What programming structure should he implement to handle these choices?
Answer: Conditionals (if-else)
Database System
3. Sir Jeric creates a database to track inventory at his store. He needs to ensure that each product in the inventory
has a unique identifier. What database concept should he use?
Answer: Primary Key
4. You need to fetch specific data from a database table based on conditions. Which SQL clause should she use?
Answer: WHERE
Software Development
5. A developer wants to ensure that changes made to the code don't affect the existing features. Which testing type
should they perform?
Answer: Regression testing
6. Sir Jerome's team follows a software development approach where they work in small iterations and regularly
deliver features to users. Which methodology are they using?
Answer: Agile
Networking and Cybersecurity

7. Which protocol is used to send email messages?


Answer: SMTP
8. Which type of malware locks files and demands payment to unlock them?

Answer: Ransomware

Artificial Intelligence and Machine Language


9. Which algorithm is commonly used for anomaly detection?
Answer: Autoencoders
Web and Mobile Development

10. Which of the following is a mobile operating system?


Answer: Android
11. What does HTML stand for?
Answer: Hyper Text Markup Language

12. What is the primary language used for Android app development?
Answer: Java

Emerging Technologies

13. Name the technology that allows users to experience and interact with a computer-generated environment as if it
were real.
a. Answer: Virtual Reality (VR).

Theoretical Foundations

14. Identify the British mathematician who is considered the father of theoretical computer science and artificial
intelligence.
a. Answer: Alan Turing.
15. Identify the programming paradigm based on the concept of 'objects' which contain data and code to manipulate
that data.
Answer: Object-oriented programming (OOP)

Ethics and Professionalism

16. A field of applied ethics that deals with ethical issues in the use, design, and management of information
technology.
Answer: Computer ethics.
Historical Aspects of Computing

17. Name the first electronic general-purpose computer, developed during World War II.
a. Answer: ENIAC (Electronic Numerical Integrator and Computer).
18. Identify the programming language developed by Sun Microsystems in 1995 that is widely used for building
platform-independent applications.
a. Answer: Java.

Average: (16 Questions)


Programming Fundamentals
1. Jay is currently debugging his code and encounters a situation where an error occurs because an integer is
divided by zero. What type of error has he encountered?
Answer: Runtime Error
2. A junior programmer is writing a code for a program where one class can derive properties and methods from
another class. What programming concept is he/she using?
Answer: Inheritance
Database System
3. Dan is designing a database and realizes that a lot of information is repeating across rows. To minimize
redundancy, he decides to organize the data into smaller, related tables. What process is James applying?
Answer: Normalization
4. CpET Major working on a database application where she needs to display data from two tables that share a
common column. Which SQL operation should she use?
Answer: JOIN
5. Benito is managing a Git repository. He wants to work on a new feature without affecting the main codebase.
What should he do?
Answer: Create a branch
Networking and Cybersecurity
6. Which encryption method uses two different keys, one for encryption and one for decryption?
Answer: Asymmetric encryption
Artificial Intelligence and Machine Language

7. Which algorithm is commonly used for classification tasks?


Answer: Decision Trees
8. Which of the following is NOT a type of neural network?
Answer: Sequential Decision Neural Network (SDNN)

Web and Mobile Development


9. What is Node.js mainly used for?
Answer: Backend development

Cloud Computing and Virtualization

10. Which cloud model provides access to a shared infrastructure that multiple organizations use?
Answer: Public Cloud

Emerging Technologies

11. Name the open-source operating system kernel that serves as the foundation for many operating systems,
including Android and various Linux distributions.

Answer: Linux kernel.

Theoretical Foundations

12. Identify the principle stating that the number of transistors on a microchip doubles approximately every 18
months, leading to the exponential growth of computing power.
Answer: Moore's Law.

Ethics and Professionalism

13. What is the term for the disparity between individuals who have access to modern information and communication
technology and those who do not?
Answer: Digital divide.
14. What is the term for the ethical theory that focuses on the consequences of actions to determine their moral
value, often summarized by the phrase "the greatest good for the greatest number"?

Answer: Utilitarianism.

Historical Aspects of Computing

15. Identify the 19th-century mathematician who is often credited as the world's first computer programmer due to her
work on Charles Babbage's Analytical Engine.
Answer: Ada Lovelace.

16. Identify the early computing device invented by Herman Hollerith that used punched cards to process data for the
1890 U.S. Census.

Answer: Punch Card Tabulator

Difficult (14 Questions)

Programming Fundamentals
1. Ermarc is developing an app and needs to sort a list of student scores in ascending order. Which sorting
algorithm should she choose for the best average time complexity?
Answer: Merge Sort
2. Rommerl is working on a project and needs to create a function that calls itself to solve smaller sub-problems.
What programming technique is Paul using?
Answer: Recursion
Database System
3. You are using a database where consistency, availability, and partition tolerance cannot be simultaneously
guaranteed. What theorem applies to this situation?
Answer: CAP theorem
4. Master Neliza needs to implement a database trigger that automatically updates a column whenever a specific
row is modified. What feature is she using?
Answer: Trigger
Software Development
5. You are working on a highly complex application. You decided to break down the software into smaller,
independently deployable components to improve scalability. What architecture are they following?
Answer: Microservices architecture
6. Master Jerome is tasked with improving the performance of an application. She decides to reduce technical debt by
optimizing poorly written code. What is this process called?
Answer: Refractoring
Networking and Cybersecurity

6. Which cloud security measure ensures that only authorized users can access cloud resources?
Answer: Identity and Access Management (IAM)

Web and Mobile Development

7. Which CSS preprocessor extends CSS with variables and functions?


Answer: Sass

8. Which mobile development framework uses Dart as its programming language?


Answer: Flutter
Cloud Computing and Virtualization

9. Which type of virtualization allows multiple operating systems to run on a single physical machine?
Answer: Server Virtualization
10. Which tool is commonly used for cloud infrastructure automation?
Answer: Kubernetes

Emerging Technologies

11. Name the concept referring to a hypothetical point in the future when technological growth becomes
uncontrollable and irreversible, resulting in unforeseeable changes to human civilization.
Answer: Technological singularity.
Theoretical Foundations

12. Identify the problem in theoretical computer science that involves determining whether every problem whose
solution can be quickly verified can also be solved quickly.
Answer: P versus NP problem.

Ethics and Professionalism

13. Identify the ethical framework that emphasizes the role of character and virtue in moral philosophy, rather than
either doing one's duty or acting to bring about good consequences.
Answer: Virtue ethics.

Historical Aspects of Computing

14. Name the 1970 declaration by computer scientist Niklaus Wirth that suggests software is getting slower more
rapidly than hardware becomes faster.
Answer: Wirth's Law.

You might also like