SECTION 1
Questions 1-20
*Choose the word or phrase that best completes each sentence. Write the correct letter (A, B, C,
or D) in your answer sheet.*
Example: The process of identifying and fixing errors in code is known as ______.
A. compilation B. debugging
C. encryption D. virtualization
Answer: B
1. Machine Learning (ML) algorithms improve their performance through ______.
A. memorization B. trial and error
C. exposure to data D. manual programming
2. A distributed version control system like Git allows developers to ______.
A. write code collaboratively B. track changes across multiple branches
C. compile programs faster D. debug software remotely
3. The term "Big Data" refers to datasets that are too large to be processed by ______.
A. traditional databases B. cloud servers
C. quantum computers D. embedded systems
4. A compiler translates high-level code into ______.
A. machine code B. pseudocode
C. bytecode D. assembly language
5. The CAP theorem states that a distributed system cannot simultaneously guarantee
______.
A. consistency, availability, and partition tolerance
B. speed, security, and scalability
C. latency, throughput, and redundancy
D. concurrency, persistence, and fault tolerance
6. Docker containers are lightweight because they share the host operating system ______.
A. kernel B. filesystem
C. memory D. network stack
7. Which protocol is used to securely transfer files over a network?
A. HTTP (Hypertext Transfer Protocol)
B. FTP (File Transfer Protocol)
C. SFTP (Secure File Transfer Protocol)
D. SMTP (Simple Mail Transfer Protocol)
8. The "P vs NP" problem in computer science deals with ______.
A. parallel processing B. computational complexity
C. data compression D. network latency
9. The term "latency" in networking refers to ______.
A. data transfer speed B. signal strength
C. time delay D. bandwidth capacity
10. In cloud computing, "IaaS" stands for ______.
A. Internet as a Service B. Infrastructure as a Service
C. Integration as a Service D. Intelligence as a Service
11. The Open Systems Interconnection (OSI) model's Transport Layer is responsible for
______.
A. packet routing B. end-to-end communication
C. data encryption D. physical connections
12. A "race condition" occurs in multithreading when ______.
A. threads execute sequentially
B. threads access shared resources unsafely
C. deadlocks are resolved automatically
D. priority inversion is avoided
13. Which data structure follows the LIFO (Last-In-First-Out) principle?
A. Queue B. Stack
C. Heap D. Linked List
14. The term "refactoring" in software development means ______.
A. rewriting code from scratch
B. improving code structure without changing functionality
C. fixing critical bugs
D. optimizing database queries
Section 2:
21. SyntaxError: Missing parentheses in call to 'print'
A. The code is missing quotation marks around a string.
B. The print function is called without parentheses.
C. The code is attempting to print an undefined variable.
22. Warning: Unsafe TLS certificate detected. Proceed?
A. The website’s security certificate is invalid or expired.
B. The connection is encrypted with a trusted certificate.
C. The browser automatically blocked the website.
23. 404 Not Found: The requested URL was not found on this server.
A. The server is temporarily unavailable.
B. The webpage or resource does not exist.
C. The user’s internet connection is unstable.
24. TypeError: Can’t concatenate 'str' and 'int' objects
A. The code is trying to add a string and a number.
B. The code is using an incorrect variable name.
C. The code is missing an import statement.
25. CPU Overload: System cooling fans activated.
A. The CPU is idle and consuming minimal power.
B. The computer is running resource-intensive tasks.
C. The system is shutting down due to overheating.
26. Segmentation Fault (Core Dumped)
A. The program accessed memory it wasn’t allowed to.
B. The program completed execution successfully.
C. The program is stuck in an infinite loop.
27. SSL Handshake Failed: Unable to establish secure connection.
A. The server’s encryption protocol is outdated.
B. The client and server couldn’t agree on encryption settings.
C. The website is redirecting to an unsecured HTTP page.
28. OutOfMemoryError: Java heap space
A. The Java application ran out of allocated memory.
B. The Java Virtual Machine (JVM) crashed.
C. The disk storage is full.
29. Kernel Panic: Not syncing – No working init found.
A. The operating system failed to start properly.
B. The hard drive is corrupted.
C. The system is in sleep mode.
30. git merge conflict: CONFLICT (content)
A. Two branches modified the same file differently.
B. The Git repository is corrupted.
C. The remote repository is offline.
31. Buffer Overflow: Stack smashing detected
A. A program wrote data beyond allocated memory bounds.
B. The network buffer is full.
C. The disk write operation failed.
32. WARNING: Deprecated API usage – Update your code.
A. The code uses outdated functions that may stop working.
B. The API is unavailable due to server maintenance.
C. The code is optimized for performance.
33. DNS_PROBE_FINISHED_NXDOMAIN
A. The domain name doesn’t exist or couldn’t be resolved.
B. The internet connection is down.
C. The website’s SSL certificate is invalid.
34. ImportError: No module named 'numpy'
A. The Python library ‘numpy’ is not installed.
B. The script has a syntax error in the import statement.
C. The module is installed but corrupted.
35. Blue Screen of Death (BSOD): CRITICAL_PROCESS_DIED
A. A Windows system process crashed irrecoverably.
B. The GPU drivers need updating.
C. The BIOS settings are incorrect.
36. WARNING: High disk usage (100%) on /dev/sda1
A. The disk is full or experiencing heavy read/write activity.
B. The disk is disconnected.
C. The filesystem is read-only.
37. KeyError: 'username' not found in dictionary
A. The code tried to access a non-existent dictionary key.
B. The dictionary is empty.
C. The key ‘username’ is misspelled.
38. ConnectionRefusedError: [Errno 111] Connection refused
A. The target machine actively rejected the connection.
B. The network cable is unplugged.
C. The firewall is blocking all traffic.
39. AssertionError: Expected 5, got 3
A. A test or condition failed because values didn’t match.
B. The function returned an incorrect data type.
C. The variable was not initialized.
40. Machine Learning: Overfitting occurs when a model…
A. Performs well on training data but poorly on unseen data.
B. Fails to learn patterns from the training data.
C. Requires more computational resources.
Section 3
Artificial Intelligence: Transforming the Modern World
Artificial Intelligence (AI) has become a cornerstone of technological advancement,
revolutionizing industries and everyday life. By enabling machines to simulate human intelligence,
AI systems can learn, reason, and make decisions with minimal human intervention. This
transformative technology is reshaping fields such as healthcare, finance, and transportation,
offering unprecedented efficiency and innovation.
One of the foundational elements of AI is machine learning, where algorithms analyze vast
amounts of data to identify patterns and improve their performance over time. For example,
recommendation systems used by streaming platforms leverage machine learning to suggest
content tailored to individual preferences. These systems continuously refine their predictions
based on user interactions, enhancing accuracy and user satisfaction.
Another critical aspect of AI is natural language processing (NLP), which allows machines to
understand and generate human language. Virtual assistants like Siri and Alexa rely on NLP to
interpret voice commands and provide relevant responses. Advances in NLP have also enabled
real-time language translation, breaking down communication barriers across the globe.
AI also plays a pivotal role in computer vision, enabling machines to interpret and analyze visual
data. Applications range from facial recognition for security purposes to autonomous vehicles that
navigate roads by processing real-time images from cameras and sensors. These systems depend
on deep learning models trained on millions of labeled images to achieve high precision.
Despite its benefits, AI raises ethical and societal concerns. Issues such as algorithmic bias, data
privacy, and job displacement require careful consideration. For instance, biased training data can
lead to discriminatory outcomes, while the automation of tasks may reduce employment
opportunities in certain sectors. Addressing these challenges necessitates robust regulations and
transparent AI development practices.
To harness AI’s full potential, collaboration between researchers, policymakers, and industries is
essential. By prioritizing ethical guidelines and equitable access, society can ensure that AI serves
as a force for good, driving progress while minimizing risks.
Questions 26-30
Choose the letter (A, B, C, or D) that corresponds to the correct answer.
26. What is a primary goal of artificial intelligence?
A. To replace human decision-making entirely
B. To simulate human intelligence in machines
C. To eliminate the need for data analysis
D. To reduce reliance on technology
27. How does machine learning improve recommendation systems?
A. By eliminating the need for user input
B. By analyzing data to refine predictions over time
C. By generating random content suggestions
D. By relying solely on pre-programmed rules
28. What is the role of natural language processing (NLP) in AI?
A. To process visual data from cameras and sensors
B. To enable machines to understand and generate human language
C. To replace human translators in all industries
D. To automate financial transactions
29. Why is computer vision important for autonomous vehicles?
A. It allows vehicles to operate without any sensors.
B. It processes visual data to navigate roads safely.
C. It eliminates the need for human drivers permanently.
D. It reduces the cost of vehicle manufacturing.
30. What is a societal concern associated with AI?
A. Increased reliance on human labor
B. Algorithmic bias due to flawed training data
C. Slower technological advancements
D. Reduced data storage requirements
SECTION 4
Questions 31-40
Read the text below and fill each of the blanks with ONE suitable word from the box. For questions
31-40, write the correct word in boxes 31-40 on your answer sheet.
scalable infrastructure latency hybrid providers
encryption downtime analyzing cost-effective virtual
The Rise of Cloud Computing: A Digital Revolution
Cloud computing has emerged as a transformative (31) _____________,
infrastructure enabling businesses and
individuals to access computing resources over the internet. By leveraging remote servers hosted
by cloud (32) ____________,
providers organizations can store data, run applications, and deploy services
without maintaining physical hardware.
scalable nature. Businesses can easily
One of the key advantages of cloud computing is its (33) _________
adjust their resource usage based on demand, avoiding over-provisioning or underutilization. This
flexibility makes cloud solutions highly (34) __________
cost-effectivecompared to traditional IT setups.
latency
Performance is another critical factor. Cloud systems minimize (35) _________ to ensure fast data
retrieval and seamless user experiences. Advanced tools assist in (36) analyzing
_________ large datasets,
supporting real-time decision-making. For enhanced security, data is protected through (37)
___________, ensuring confidentiality even if breaches occur.
encryption
To address diverse needs, cloud models like public, private, and (38) _________
hybrid clouds offer
tailored solutions. However, reliance on cloud services also introduces risks, such as potential (39)
_________ during outages. Despite these challenges, the (40) __________
downtime virtual nature of cloud
computing lies in its ability to democratize technology, empowering even small businesses to
compete globally.