Which programming construct allows the execution of a block of code multiple times based on a condition?
- Array
- Function
- Loop
- Pointer
In programming, a 'loop' is a control structure that allows you to execute a block of code repeatedly as long as a certain condition is met. This is commonly used for repetitive tasks in coding.
Which cryptographic attack involves trying every possible key until the correct one is found?
- Brute Force Attack
- DDoS Attack
- Man-in-the-Middle
- SQL Injection
A 'Brute Force Attack' is an approach where an attacker tries every possible key or combination until the correct one is found. It's used to crack passwords, encryption, or authentication mechanisms.
In most programming languages, which arithmetic operation is performed first if no parentheses are used?
- Addition
- Division
- Multiplication
- Subtraction
In the absence of parentheses, most programming languages follow the order of operations, and 'multiplication' is performed before addition, subtraction, and division.
Which design principle suggests that objects should be open for extension but closed for modification?
- Abstraction
- Inheritance
- Open-Closed Principle
- Polymorphism
The 'Open-Closed Principle' is a fundamental design principle in object-oriented programming. It suggests that software entities (such as classes) should be open for extension (new functionality can be added) but closed for modification (existing code remains unchanged). This encourages modularity and maintainability.
In the context of data storage, what does deduplication refer to?
- Accelerating data access
- Encrypting data
- Increasing data capacity
- Reducing data redundancy
'Deduplication' is a data reduction technique that involves eliminating duplicate copies of data, thus reducing data redundancy. This process saves storage space and improves efficiency.
For HPC applications that require vast amounts of data processing in real-time, which memory characteristic is crucial?
- Bandwidth
- Capacity
- Latency
- Volatility
In High-Performance Computing (HPC), applications often require massive data processing in real-time. In this context, 'memory bandwidth' is crucial because it determines how quickly data can be read from and written to memory. A high memory bandwidth is essential for feeding the processors with data at a rate that matches their processing capabilities, ensuring efficient execution of HPC tasks.
In data visualization, what technique would you use to visualize high-dimensional data in two or three dimensions?
- Bar Charts
- Histograms
- Pie Charts
- Principal Component Analysis (PC
'Principal Component Analysis (PCA)' is a commonly used technique in data visualization to reduce the dimensionality of high-dimensional data while preserving as much variance as possible, making it suitable for 2D or 3D visualization.
Which software engineering principle emphasizes that a system should have only one reason to change?
- DRY (Don't Repeat Yourself)
- OOP (Object-Oriented Programming)
- SRP (Single Responsibility Principle)
- YAGNI (You Ain't Gonna Need It)
The 'SRP' (Single Responsibility Principle) is a principle in software engineering that states that a module, class, or function should have only one reason to change. This helps in maintaining a system by reducing the impact of modifications.
In the context of information security, what does the acronym "CIA" stand for?
- Central Intelligence Agency
- Computer Information Access
- Confidentiality, Integrity, Availability
- Cybersecurity and Information Assurance
In information security, "CIA" stands for 'Confidentiality, Integrity, and Availability.' These three principles are fundamental to ensuring the security and reliability of data and systems.
A company is undergoing a major digital transformation initiative. They are looking to adopt a cloud-first strategy. Which governance consideration should be a priority to ensure data protection and compliance?
- Cost Reduction and Efficiency
- Data Residency and Compliance
- Innovation and Experimentation
- Vendor Lock-In
In the context of a cloud-first strategy, 'Data Residency and Compliance' is a priority because it ensures that data is stored in compliance with legal and regulatory requirements, minimizing the risk of non-compliance and data breaches.