CATEGORY: GENERAL KNOWLEDGE Flashcards
What does CPU stand for?
Answer: Central Processing Unit
Who is known as the father of the computer?
Answer: Charles Babbage
What is the full form of URL?
Answer: Uniform Resource Locator
What does HTTP stand for in web addresses?
Answer: HyperText Transfer Protocol
Which company developed the Windows operating system?
Answer: Microsoft
What is the most widely used programming language for web development?
Answer: JavaScript
What does AI stand for?
Answer: Artificial Intelligence
What is the binary number system based on?
Answer: 0s and 1s
Which search engine was created by Larry Page and Sergey Brin?
Answer: Google
What is the primary function of RAM in a computer?
Answer: Temporary storage for quick data access
What is the name of the first electronic general-purpose computer?
Answer: ENIAC (Electronic Numerical Integrator and Computer)
In which year was the World Wide Web (WWW) invented?
Answer: 1989
Who is the founder of Linux?
Answer: Linus Torvalds
Which company manufactured the first commercial microprocessor, the Intel 4004?
Answer: Intel
What is the Turing Test used for?
Answer: To determine if a machine can exhibit human-like intelligence
What is the main purpose of an IP address?
Answer: Identifies devices on a network
What does SQL stand for?
Answer: Structured Query Language
What is the name of the malicious software that locks users out of their own files until they pay a ransom?
Answer: Ransomware
What type of database model is commonly used for large-scale applications, such as NoSQL databases?
Answer: Document-based model
What is the primary purpose of a firewall in a network?
Answer: To filter and monitor incoming and outgoing network traffic for security
What sorting algorithm has the best worst-case time complexity of O(n log n)?
Answer: Merge Sort
What is the difference between IPv4 and IPv6?
Answer: IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses
What does DNS stand for in networking?
Answer: Domain Name System
What cybersecurity term describes an attack where a hacker intercepts communication between two parties?
Answer: Man-in-the-Middle (MITM) Attack
What programming concept describes a function calling itself?
Answer: Recursion
What is the name of the first-ever computer virus?
Answer: Creeper Virus
What does Moore’s Law predict about computing power?
Answer: The number of transistors on a microchip doubles approximately every two years
What is the most commonly used hashing algorithm for secure password storage?
Answer: SHA-256
Which type of attack is used to guess passwords by trying every possible combination?
Answer: Brute Force Attack
What does the term “Big-O Notation” refer to in computer science?
Answer: A way to describe the efficiency of an algorithm
What type of attack uses fraudulent emails to trick users into revealing sensitive information?
Answer: Phishing
What is the primary purpose of a Zero Trust security model?
Answer: Never trust, always verify—continuously authenticate users and devices.
Which encryption algorithm is widely used for securing HTTPS connections?
Answer: TLS (Transport Layer Security) with AES encryption
What is a Brute Force Attack, and how can it be mitigated?
Answer: Trying all possible password combinations; mitigated with multi-factor authentication and rate limiting.
What cybersecurity framework was created by NIST (National Institute of Standards and Technology)?
Answer: NIST Cybersecurity Framework
What AI system defeated world champion Lee Sedol in the game of Go?
Answer: AlphaGo
What is the difference between Supervised Learning and Unsupervised Learning?
Answer: Supervised Learning uses labeled data; Unsupervised Learning finds patterns without labels.
What is backpropagation in neural networks?
Answer: An algorithm to adjust weights in a neural network using gradient descent.
What AI model architecture is the foundation of GPT (Generative Pre-trained Transformer)?
Answer: Transformer
What is the Turing Test, and who created it?
Answer: A test to measure machine intelligence; created by Alan Turing.
What is the fundamental unit of information in quantum computing?
Answer: Qubit
What blockchain mechanism prevents double spending in cryptocurrencies?
Answer: Proof of Work (PoW) or Proof of Stake (PoS)
What is the primary communication protocol used by Internet of Things (IoT) devices?
Answer: MQTT (Message Queuing Telemetry Transport)
What is the purpose of a smart contract in blockchain?
Answer: Self-executing contracts with pre-defined rules stored on a blockchain.
What is the name of Google’s quantum supremacy experiment?
Answer: Sycamore
What is the Big-O complexity of QuickSort in the worst case?
O(n^2)
What does SOLID stand for in software engineering principles?
Answer: Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation, Dependency Inversion
What programming language is used to build smart contracts on Ethereum?
Answer: Solidity
What is a race condition, and how can it be prevented?
Answer: A concurrency issue where multiple processes access shared data unpredictably; mitigated with locks or semaphores.
What is the difference between interpreted and compiled languages?
Answer: Interpreted languages run line by line (Python), while compiled languages are translated into machine code before execution (C++).