MARTIN - ICPEP Challenge Quiz Bowl
MARTIN - ICPEP Challenge Quiz Bowl
What is the term for a data structure that follows the First-In-First-Out (FIFO) principle, where the
first element added is the first one to be removed?
A) Stack
B) Queue
C) Hash Table
D) Binary Search Tree
Answer:
B) Queue
Which logic gate outputs true only when both of its inputs are true?
Options:
A) OR Gate
B) AND Gate
C) XOR Gate
D) NOR Gate
Answer:
B) AND Gate
In computer systems, which component is responsible for performing arithmetic and logical
operations?
Options:
A) Control Unit
B) Arithmetic Logic Unit (ALU)
C) Memory
D) Input/Output Controller
Answer:
B) Arithmetic Logic Unit (ALU)
Answer:
B) Perform calculations
Which principle of engineering ethics emphasizes the importance of ensuring public safety and
welfare in engineering practices?
Options:
A) Professional Integrity
B) Social Responsibility
C) Confidentiality
D) Environmental Sustainability
Answer:
B) Social Responsibility
Answer:
B) To manage hardware and software resources
Answer:
B) To forward data packets between different networks
Answer:
B) To evaluate and understand user requirements
Answer:
B) Building and maintaining software applications
Average
Which sorting algorithm repeatedly divides the array in half, recursively sorts the halves, and then
merges them back together?
Options:
A) Quick Sort
B) Bubble Sort
C) Merge Sort
D) Insertion Sort
Answer:
C) Merge Sort
In Karnaugh Maps (K-Maps), what is the minimum number of cells that can be grouped together to
form a valid simplification?
Options:
A) 1
B) 2
C) 4
D) 3
Answer:
B) 2
In the context of cache memory, what is the term for the technique that places new data in cache
based on the assumption that nearby data will be accessed soon?
Options:
A) Temporal Locality
B) Spatial Locality
C) Random Replacement
D) Least Recently Used (LRU)
Answer:
B) Spatial Locality
Which of the following bus types connects the CPU to the main memory in a microprocessor system?
Options:
A) Data Bus
B) Address Bus
C) Control Bus
D) I/O Bus
Answer:
A) Data Bus
In the Philippines, what does the Data Privacy Act of 2012 primarily aim to protect?
Options:
A) Intellectual property rights
B) Personal information of individuals
C) Freedom of expression on social media
D) Trade secrets of corporations
Answer:
B) Personal information of individuals
Answer:
C) Multiple applications can run simultaneously
Answer:
C) SMTP
Which of the following is a common diagram used in systems design to represent the flow of data?
Options:
A) Entity-Relationship Diagram (ERD)
B) Gantt Chart
C) Use Case Diagram
D) Data Flow Diagram (DFD)
Answer:
D) Data Flow Diagram (DFD)
Which of the following is a common technique used in software testing to identify bugs?
Options:
A) Code review
B) Requirement gathering
C) User training
D) Marketing analysis
Answer:
A) Code review
Difficult
In tarjan's algorithm for finding strongly connected components (SCCs) of a directed graph, what
data structure is used to maintain the list of vertices?
Options:
A) Queue
B) Stack
C) Priority Queue
D) Binary Heap
Answer:
B) Stack
What is the minimum number of select lines required for an 8-to-1 multiplexer?
Options:
A) 1
B) 3
C) 8
D) 2
Answer:
B) 3
In pipelined processors, what is the term for the condition where an instruction depends on the
result of a previous instruction that has not yet completed?
Options:
A) Structural Hazard
B) Data Hazard
C) Control Hazard
D) Pipeline Stalling
Answer:
B) Data Hazard
Which of the following best describes the function of a memory management unit (MMU) in a
microprocessor?
Options:
A) It executes instructions from the CPU.
B) It converts virtual addresses to physical addresses.
C) It manages data flow between the CPU and peripherals.
D) It controls the clock speed of the processor.
Answer:
B) It converts virtual addresses to physical addresses.
In the Philippines, what is the consequence of violating the Anti-Cybercrime Law, specifically
regarding online libel?
Options:
A) Imprisonment of up to six months
B) A fine of up to ₱50,000
C) Imprisonment of up to 12 years
D) A warning from law enforcement
Answer:
C) Imprisonment of up to 12 years
Answer:
B) To provide an interface between user programs and the OS
What is the purpose of the Transmission Control Protocol (TCP) in computer networking?
Options:
A) To ensure secure data transmission
B) To provide connectionless communication
C) To guarantee the reliable delivery of data packets
D) To handle the encryption of data in transit
Answer:
C) To guarantee the reliable delivery of data packets
In the context of agile methodology, what does the term "sprint" refer to?
Options:
A) A long-term project phase with extensive planning
B) A focused period for completing a specific set of tasks
C) A final review of the project's outcomes
D) A method for testing the system's performance
Answer:
B) A focused period for completing a specific set of tasks