DSA 1st exam Flashcards

review

1
Q

a field of study
in which a cryptographic scheme is intentionally tried to breach in order to find flaws and insecurities. It
is used to make sure that the scheme is least vulnerable to attacks.

A

cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the operation ~waterTank() in water tank ADT is

A

a destructor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

integers, float and characters are what data type

A

hardware data type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data types give attention to the WHAT rather than the HOW

A

Abstract data type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The next oldest item becomes the topmost item after the ____ is performed on stack

A

POP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The other name for a __________________ algorithm is diminishing decrement sort as the distance between
comparisons decreases as the algorithm runs until the last phase

A

shell sort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Confidentiality, Data Integrity, and Authentication are ___________ of data security

A

Principles of data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a type of data structure which enable us to view something as a high-level object while temporarily ignoring the
enormous amount of underlying detail associated with that object

A

Abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a textual label used to refer to that variable or data in the text of the program

A

name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a process of packaging together a collection of data values together with the operations on those values

A

Data encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Top most element is deleted if ___ is called on a full stack

A

POP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

contains elements only of the same type

A

array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Quick sort makes partitions of the input array about the pivot in order to implement sorting. Thus, its
method of sorting is called

A

partitioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an example of internal sorting because sorting of elements is done internally using an array

A

shell sort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In cryptography, the order of the letters in a message is rearranged by ______________________. In
____________, the order of letters in a plaintext message is shuffled using a pre-defined method.
Some of such ciphers are Rail fence cipher and Columnar transposition.

A

transpositional ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In asymmetric key cryptography, the ____________ is kept only by the receiver of the message. Its aim is to
make sure that only the intended receiver can decipher the messages

A

private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

happens if a PUSH operation is called on a full stack

A

Stack overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

an observer operation of the stack ADT which returns the topmost element

A

stackTop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The university was established in the year

A

1946

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Understanding complex systems and make things easy to absorb and manipulate are the benefits we can gain from using

A

abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is a leading higher learning institution in the region that provides quality transformative education
serving the nation and the world

A

the university of mindanao

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is an in-place sorting algorithm, it does not require additional storage which is an
advantage of selection sort over other sorting techniques

A

Selection sort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_______ data type frees programmers from the limits imposed by a given programming language regardless of how interesting or
powerful that language might be.

A

Abstract data types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is used to find some insecurity in a cryptographic scheme

A

cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Elements in an _______ are accessed randomly. In ____________, elements are accessed sequentially
Array; linked list
26
Graduates of the university not only becomes competent leaders and productive members of the society but also becomes an
individual perfected with professionalism and ethic
27
the attacker does not modify any part of the data. His attempt is only to obtain the information and not to modify it.From the mentioned options, this happens only in Traffic analysis in which the attacker monitors the pattern of transmission. The rest other options are examples of active attacks.
passive attack
28
____________ data type do not actually exist in the sense of being directly represented by the hardware in which the compiler creates these data types such as arrays, structures, sets, and pointer
Virtual data type
29
refers to one of the attributes of data abstraction that denotes its location in memory
address
30
A new item is inserted and becomes the new last element If PUSH is called on
a non-empty and non-full stack
31
____________________ are linear data structures and _______ are hierarchical data structures
Stacks and queues; trees
32
The university is a ___________________ institution which provides a dynamic and supportive academic environment with the highest standard of instruction, research, and extension service dedicated in providing students democratic access to education
non-sectarian
33
inserts the element on top of the most recently inserted data.
PUSH operation
34
To encrypt the plaintext, a ______________ algorithm works in combination with a key such as word, number, or phrase. Word, number and phrase are used to encrypt the plaintext.
cryptographic
35
an example of internal sorting because sorting of elements is done internally using an array.
shell sort
36
removes the element currently pointed to by top
POP operation
37
a security attacks is not an active (passive) attack
Traffic analysis
38
algorithm divides the array into two halves and applies merge sort algorithm to each half individually after which the two sorted halves are merged together. Thus, its method of sorting is called ____________
merge sort; merging
39
a data structure implements last-in, first-out the technique
A stack
40
Operation addWater() in watertank ADT is a
transformer
41
a set of statements in the text of the source program in which the variable is said to be visible
scope
42
Stack overflow If ____ is called on an empty stack
POP
43
The stack is empty if isEmpty() methods returns
True
44
is how to instantiate an array in Java
int arr[] = new int[3]
45
implements sorting by merging the sorted versions of smaller parts of the array. Thus, its method of sorting is called merging
merge sort
46
General tree and binary trees are considered ______________ data structures
hierarchical
47
is a cryptographic protocol used to secure HTTP connection; has strong message authentication and key-material generation to prevent eavesdropping, tampering and message forgery. It has been used since the year 1996
transport layer security (TLS)
48
string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Integer values, square matrix, and array of characters are capable of becoming a key in a cryptographic algorithm
key
49
The syntax to declare multidimensional array in java is
either int[][] arr; or int arr[][]
50
The correct way to declare an array are
: int arr[] = new int[5], int [] arr = new int[5], int arr[] = new int[5]
51
tree is said to be a ____ tree if it has at three child nodes
general tree
52
merge sort uses the iterative method in order to implement sorting. It begins by merging a pair of adjacent array of size 1 each and then merge arrays of size 2 each in the next step and so on.
bottom-up
53
Voice privacy in GSM cellular telephone protocol is provided by __________. The _____________ was published in the year 1996 and was cryptanalyzed in the same year within a month. It is use was discontinued from the year 2006 as it was really weak
A5/2 cipher
54
In Cryptography, _______ is a method to implement encryption and decryption of messages travelling in a network. It’s used to increase the confidentiality of the messages
cipher
55
provides a conducive learning environment equipped with state-of-the-art facilities; thus, allowing the conduct of researches and other scholarly activities to generate new knowledge which improves the quality of life for all. The institution not only serves the fortunate who can attend to formal education in school but also concerned with the condition of the marginalized in the community.
academic institution
56
are set of associations or relationships (structure) involving the combined elements
Data structure
57
Creators, transformers, observers, and input/output are the operations involved in an __________ data types
Abstract data types
58
The present president of the university is
Dr. Guillermo P. Torres, Jr.
59
Hierarchical data structures has ____________ relationship
1 to many
60
is the fastest known sorting algorithm because of its highly optimized inner loop
quick sort
61
For sorting small arrays, ___________ runs even faster than quick sort. But it is impractical to sort large arrays
insertion sort