DSA 1st exam Flashcards

review

1
Q

a field of study
in which a cryptographic scheme is intentionally tried to breach in order to find flaws and insecurities. It
is used to make sure that the scheme is least vulnerable to attacks.

A

cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the operation ~waterTank() in water tank ADT is

A

a destructor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

integers, float and characters are what data type

A

hardware data type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data types give attention to the WHAT rather than the HOW

A

Abstract data type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The next oldest item becomes the topmost item after the ____ is performed on stack

A

POP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The other name for a __________________ algorithm is diminishing decrement sort as the distance between
comparisons decreases as the algorithm runs until the last phase

A

shell sort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Confidentiality, Data Integrity, and Authentication are ___________ of data security

A

Principles of data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a type of data structure which enable us to view something as a high-level object while temporarily ignoring the
enormous amount of underlying detail associated with that object

A

Abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a textual label used to refer to that variable or data in the text of the program

A

name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a process of packaging together a collection of data values together with the operations on those values

A

Data encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Top most element is deleted if ___ is called on a full stack

A

POP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

contains elements only of the same type

A

array

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Quick sort makes partitions of the input array about the pivot in order to implement sorting. Thus, its
method of sorting is called

A

partitioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an example of internal sorting because sorting of elements is done internally using an array

A

shell sort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In cryptography, the order of the letters in a message is rearranged by ______________________. In
____________, the order of letters in a plaintext message is shuffled using a pre-defined method.
Some of such ciphers are Rail fence cipher and Columnar transposition.

A

transpositional ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In asymmetric key cryptography, the ____________ is kept only by the receiver of the message. Its aim is to
make sure that only the intended receiver can decipher the messages

A

private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

happens if a PUSH operation is called on a full stack

A

Stack overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

an observer operation of the stack ADT which returns the topmost element

A

stackTop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The university was established in the year

A

1946

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Understanding complex systems and make things easy to absorb and manipulate are the benefits we can gain from using

A

abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is a leading higher learning institution in the region that provides quality transformative education
serving the nation and the world

A

the university of mindanao

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is an in-place sorting algorithm, it does not require additional storage which is an
advantage of selection sort over other sorting techniques

A

Selection sort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_______ data type frees programmers from the limits imposed by a given programming language regardless of how interesting or
powerful that language might be.

A

Abstract data types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is used to find some insecurity in a cryptographic scheme

A

cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Elements in an _______ are accessed randomly. In ____________, elements are accessed sequentially

A

Array; linked list

26
Q

Graduates of the university not only becomes competent leaders and productive members of the society but also becomes an

A

individual perfected with professionalism and ethic

27
Q

the attacker does
not modify any part of the data. His attempt is only to obtain the information and not to modify it.From
the mentioned options, this happens only in Traffic analysis in which the attacker monitors the pattern
of transmission. The rest other options are examples of active attacks.

A

passive attack

28
Q

____________ data type do not actually exist in the sense of being directly represented by the hardware in which the compiler creates these
data types such as arrays, structures, sets, and pointer

A

Virtual data type

29
Q

refers to one of the attributes of data abstraction that denotes its location in memory

A

address

30
Q

A new item is inserted and becomes the new last element If PUSH is called on

A

a non-empty and non-full stack

31
Q

____________________ are linear data structures and _______ are hierarchical data structures

A

Stacks and queues; trees

32
Q

The university is a ___________________ institution which provides a dynamic and supportive academic environment with the highest
standard of instruction, research, and extension service dedicated in providing students democratic access to education

A

non-sectarian

33
Q

inserts the element on top of the most recently inserted data.

A

PUSH operation

34
Q

To encrypt the plaintext, a ______________ algorithm works in combination with a key such as word,
number, or phrase. Word, number and phrase are used to encrypt the plaintext.

A

cryptographic

35
Q

an example of internal sorting because sorting of elements is done internally using an array.

A

shell sort

36
Q

removes the element currently pointed to by top

A

POP operation

37
Q

a security attacks is not an active (passive) attack

A

Traffic analysis

38
Q

algorithm divides the array into two halves and applies merge sort algorithm to each half
individually after which the two sorted halves are merged together. Thus, its method of sorting is called
____________

A

merge sort; merging

39
Q

a data structure implements last-in, first-out the technique

A

A stack

40
Q

Operation addWater() in watertank ADT is a

A

transformer

41
Q

a set of statements in the text of the source program in which the variable is said to be visible

A

scope

42
Q

Stack overflow If ____ is called on an empty stack

A

POP

43
Q

The stack is empty if isEmpty() methods returns

A

True

44
Q

is how to instantiate an array in Java

A

int arr[] = new int[3]

45
Q

implements sorting by merging the sorted versions of smaller parts of the array. Thus, its
method of sorting is called merging

A

merge sort

46
Q

General tree and binary trees are considered ______________ data structures

A

hierarchical

47
Q

is a cryptographic protocol used to secure HTTP connection; has
strong message authentication and key-material generation to prevent eavesdropping, tampering and
message forgery. It has been used since the year 1996

A

transport layer security (TLS)

48
Q

string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Integer
values, square matrix, and array of characters are capable of becoming a key in a cryptographic
algorithm

A

key

49
Q

The syntax to declare multidimensional array in java is

A

either int[][] arr; or int arr[][]

50
Q

The correct way to declare an array are

A

: int arr[] = new int[5], int [] arr = new int[5], int arr[] = new int[5]

51
Q

tree is said to be a ____ tree if it has at three child nodes

A

general tree

52
Q

merge sort uses the iterative method in order to implement sorting. It begins by merging a
pair of adjacent array of size 1 each and then merge arrays of size 2 each in the next step and so on.

A

bottom-up

53
Q

Voice privacy in GSM cellular telephone protocol is provided by __________. The _____________ was
published in the year 1996 and was cryptanalyzed in the same year within a month. It is use was
discontinued from the year 2006 as it was really weak

A

A5/2 cipher

54
Q

In Cryptography, _______ is a method to implement encryption and decryption of messages travelling in a
network. It’s used to increase the confidentiality of the messages

A

cipher

55
Q

provides a conducive learning environment equipped with state-of-the-art facilities; thus, allowing the
conduct of researches and other scholarly activities to generate new knowledge which improves the quality of life for all.
The institution not only serves the fortunate who can attend to formal education in school but also concerned with the condition of
the marginalized in the community.

A

academic institution

56
Q

are set of associations or relationships (structure) involving the combined elements

A

Data structure

57
Q

Creators, transformers, observers, and input/output are the operations involved in an __________ data types

A

Abstract data types

58
Q

The present president of the university is

A

Dr. Guillermo P. Torres, Jr.

59
Q

Hierarchical data structures has ____________ relationship

A

1 to many

60
Q

is the fastest known sorting algorithm because of its highly optimized inner loop

A

quick sort

61
Q

For sorting small arrays, ___________ runs even faster than quick sort. But it is impractical to sort large
arrays

A

insertion sort