Algorithms and Complexity MCQs (Part-10)

What is the primary purpose of genetic algorithms?

A Solving optimization problems
B Searching for patterns
C Sorting large data
D Encrypting data

Which of these is a common application of hashing techniques?

A Data encryption
B Sorting arrays
C Storing passwords securely
D Solving NP-Hard problems

Which of the following is a widely used cryptographic algorithm?

A Dijkstra’s Algorithm
B Quick Sort
C Merge Sort
D RSA

In a genetic algorithm, what does the crossover operation do?

A Mutates solutions randomly
B Selects the best solution
C Combines solutions to produce offspring
D Reduces solution size

What is a common use of hashing in data structures?

A Compression
B Searching data
C Cryptography
D Sorting data

Which cryptographic algorithm is most commonly used for symmetric encryption?

A AES
B Diffie-Hellman
C RSA
D SHA-256

In the context of genetic algorithms, what is mutation?

A Selecting the best solution
B Combining two solutions
C Evaluating the fitness of solutions
D Randomly changing parts of a solution

Which of the following is a disadvantage of hashing techniques?

A High encryption time
B Slow lookup time
C Collisions can occur
D High memory usage

What is the main advantage of using genetic algorithms for optimization problems?

A Works well with large search spaces
B Guarantees optimal solution
C Requires minimal computation
D Always finds a quick solution

Which of these cryptographic algorithms is used for creating message digests?

A Diffie-Hellman
B RSA
C AES
D SHA-256

What is a primary use case for public-key cryptography?

A Generating random numbers
B Digital signatures and secure key exchange
C Encrypting large files
D Storing passwords

Which of the following best describes a hash table?

A A table for key-value pairs
B Linear data structure
C Sorted data structure
D A recursive data structure

In a genetic algorithm, what determines the fitness of a solution?

A The amount of data it stores
B The number of offspring it produces
C The solution’s quality or performance
D Its ability to mutate

What is the typical key size used in AES encryption?

A 1024 bits
B 128 bits
C 512 bits
D 256 bits

Which of the following hashing algorithms is most commonly used for file integrity checks?

A DES
B SHA-1
C SHA-256
D MD5