___________ is a memory management scheme where physical memory is divided into fixed-sized blocks, and each process is assigned contiguous blocks.

  • Fragmentation
  • Paging
  • Segmentation
  • Swapping
Paging is a memory management scheme where physical memory is divided into fixed-sized blocks called frames, and logical memory is divided into fixed-sized blocks called pages. Each process is then assigned contiguous blocks of frames for its pages. Paging helps in efficient memory utilization and reduces external fragmentation.

What is the purpose of the GROUP BY clause in SQL queries?

  • Aggregating data
  • Filtering data
  • Joining tables
  • Sorting data
The purpose of the GROUP BY clause in SQL queries is to aggregate data based on specified columns. It is used in conjunction with aggregate functions such as COUNT, SUM, AVG, etc., to group rows that have the same values in specified columns. This allows for summarizing data and performing calculations on grouped data sets.

In a file system, the ___________ keeps track of free and allocated disk blocks.

  • Allocation Table
  • Directory Entry
  • File Allocation Table
  • File Descriptor
The File Allocation Table (FAT) is a crucial component in a file system that maintains a record of which disk blocks are free and which are allocated to files. It's commonly used in older file systems like FAT32.

What does SSID stand for in the context of wireless networks?

  • Secure Socket ID
  • Service Set Identifier
  • Subscriber Server Identifier
  • System Software ID
SSID stands for Service Set Identifier. It is a unique name that identifies a specific wireless network. Devices use SSIDs to connect to the correct network among the multiple networks available in the vicinity.

Which layer of the OSI Model is responsible for routing and forwarding packets?

  • Network Layer
  • Data Link Layer
  • Transport Layer
  • Presentation Layer
The Network Layer (Layer 3) of the OSI Model is responsible for routing and forwarding packets. This layer handles logical addressing, routing, and traffic management within a network. It ensures that data packets are properly routed from the source to the destination across different networks, making decisions based on logical addressing information (such as IP addresses). Option 1 is correct because the Network Layer specifically deals with routing functions in the OSI Model.

What is the purpose of the Singleton design pattern?

  • Encapsulate data
  • Ensure a class has only one instance
  • Facilitate communication between objects
  • Provide a global point of access
The purpose of the Singleton design pattern is to ensure that a class has only one instance and provide a global point of access to it. This is particularly useful in scenarios where you want to control access to resources or manage shared resources efficiently. The pattern also helps in maintaining a single instance throughout the application's lifecycle, preventing unnecessary duplication and ensuring consistency in data and behavior.

What is the role of a firewall in web application security?

  • Enhancing UI/UX design
  • Filtering network traffic
  • Managing user authentication
  • Optimizing database queries
Firewalls play a crucial role in web application security by filtering network traffic to identify and block malicious or unauthorized requests. They act as a barrier between the internet and the web server, inspecting incoming and outgoing data packets based on predefined rulesets. By analyzing factors such as IP addresses, port numbers, and packet contents, firewalls can detect and thwart various cyber threats, including DDoS attacks, SQL injection attempts, and unauthorized access attempts. This proactive defense mechanism helps prevent malicious entities from compromising the web application's integrity, ensuring continuous availability and data confidentiality for users.

What are some common pitfalls to avoid when designing a dynamic programming solution?

  • Incorrect Base Cases
  • Not Optimizing Space Complexity
  • Not Optimizing Time Complexity
  • Overlapping Subproblems
Common pitfalls in dynamic programming include not recognizing overlapping subproblems, which leads to redundant computations; setting incorrect base cases, which can cause incorrect results; not optimizing space complexity, resulting in excessive memory usage; and not optimizing time complexity, leading to inefficient algorithms. Avoiding these pitfalls ensures efficient and correct dynamic programming solutions.

What is the main difference between TCP and UDP in the TCP/IP protocol suite?

  • Connection-oriented
  • Datagram-based
  • Error checking
  • Reliable
The main difference between TCP and UDP in the TCP/IP protocol suite is that TCP is connection-oriented and ensures reliable data delivery with error checking, while UDP is datagram-based and lacks built-in error checking and reliability mechanisms.

Which HTTP methods are commonly used in RESTful APIs for CRUD operations?

  • CREATE, READ, UPDATE, DELETE
  • FETCH, INSERT, MODIFY, REMOVE
  • GET, POST, PUT, DELETE
  • RECEIVE, ADD, CHANGE, DELETE
CRUD operations in RESTful APIs correspond to HTTP methods: GET for READ, POST for CREATE, PUT for UPDATE, and DELETE for DELETE. These methods provide a standardized way to interact with resources over the web.