Computer science jamb past questions and answers
Question: What does the acronym HTML stand for?
A) Hyperlink and Text Markup Language
B) Hyper Text Markup Language
C) High-level Text Markup Language
D) Hyper Transfer Markup Language
Answer: B) Hyper Text Markup Language
Question: Which programming language is often used for developing mobile applications?
A) C++
B) Swift
C) Ruby
D) Pascal
Answer: B) Swift
Question: What is the purpose of the Git version control system?
A) Code compilation
B) Code collaboration and version tracking
C) Network security
D) Data encryption
Answer: B) Code collaboration and version tracking
Question: What is the primary function of a router in a computer network?
A) Connect devices within a local network
B) Filter and forward data between different networks
C) Provide wireless access
D) Manage computer memory
Answer: B) Filter and forward data between different networks
Question: Which of the following is a statically-typed programming language?
A) Python
B) JavaScript
C) C#
D) Ruby
Answer: C) C#
Question: What is the purpose of the SQL SELECT statement?
A) Insert data into a table
B) Retrieve data from a database
C) Update existing records
D) Delete records from a table
Answer: B) Retrieve data from a database
Question: Which type of memory is volatile and loses its content when the power is turned off?
A) RAM (Random Access Memory)
B) ROM (Read-Only Memory)
C) Cache Memory
D) Hard Disk
Answer: A) RAM (Random Access Memory)
Question: What is the purpose of the "else" statement in programming?
A) Define a loop
B) Handle exceptions
C) Specify alternative code to execute
D) Declare variables
Answer: C) Specify alternative code to execute
Question: In binary code, what does each digit represent?
A) 0 or 1
B) 1 or 2
C) 0 or 2
D) 1 or 0 or 2
Answer: A) 0 or 1
Question: What is the role of the HTTP status code 404?
A) Server error
B) Page not found
C) Unauthorized access
D) Successful request
Answer: B) Page not found
Question: Which sorting algorithm has a time complexity of O(n log n) in the worst case?
A) BubbleSort
B) MergeSort
C) QuickSort
D) InsertionSort
Answer: B) MergeSort
Question: What is the purpose of a primary key in a database table?
A) Ensure data encryption
B) Uniquely identify each record
C) Control access permissions
D) Define table relationships
Answer: B) Uniquely identify each record
Question: What does the acronym VPN stand for?
A) Virtual Private Network
B) Very Personal Network
C) Volatile Public Network
D) Visual Processing Node
Answer: A) Virtual Private Network
Question: Which programming language is often used for artificial intelligence and machine learning?
A) Java
B) C#
C) Python
D) Ruby
Answer: C) Python
Question: What is the purpose of a constructor in object-oriented programming?
A) Destroy objects
B) Initialize objects
C) Define class methods
D) Override superclass methods
Answer: B) Initialize objects
Question: What is the difference between TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)?
A) TCP is connectionless, while UDP is connection-oriented
B) TCP provides reliable, ordered delivery, while UDP does not guarantee order or reliability
C) TCP is faster than UDP
D) UDP is only used for secure connections
Answer: B) TCP provides reliable, ordered delivery, while UDP does not guarantee order or reliability
Question: What is the purpose of the "break" statement in programming?
A) End the program
B) Exit a loop prematurely
C) Create a new function
D) Print a line of text
Answer: B) Exit a loop prematurely
Question: Which of the following is not a fundamental data type in programming languages?
A) Integer
B) Float
C) String
D) Array
Answer: D) Array
Question: What is the role of a compiler in programming?
A) Execute code line by line
B) Convert high-level code to machine code
C) Debug code errors
D) Manage memory allocation
Answer: B) Convert high-level code to machine code
Question: What is the purpose of the OSI model in networking?
A) Define the architecture of computer hardware
B) Provide a framework for understanding network functions
C) Specify encryption algorithms
D) Control access to network resources
Answer: B) Provide a framework for understanding network functions
Post a Comment