Open Competition TU Lecturer 2081 Subject ICT part 2

From ICTED-WIKI
Jump to navigation Jump to search

14. To access the services of the operating system, the interface is provided by the...............

A) Library

B) System calls

C) Assembly instructions

D) API

15. In priority scheduling algorithm......

A) CPU is allocated to the process with highest priority

B) CPU is allocated to the process with lowest priority

C) Equal priority processes cannot be scheduled

D) None of the above

16. What is the need for a circular queue?

A) effective uses of memory

B) easier computations

C) to delete elements based on priority

D) implement LIFO principle in queues

17..... is not suitable for accommodating any change.

A) Build and fix model

B) Waterfall model

C) JAD model

D) Prototype

18. How can we remove an object from array list?

A) remove() method

B) using Iterator

C) remove() method

D) delete() method

19. What are binary search tree's worst-case and average-case complexities?

A) O(n), O(n)

B) O(logn), O(logn)

C) O(Logn), O(n)

D) O(n),O(logn)

20. Which one of the following can be considered as the class of computer threats?

A) DOS Attack

B) Phishing

C) Soliciting

D) stalking

21. Which of the following is a super class of every class in java?

A) Array List

B) Abstract class

C) Object class

D) String

22. In computers, subtraction is generally carried out by.....

A) 9's complement

B) 10's complement

C) 1's complement

D) 2's complement

23. Which of the following code retrieves the body of the request as binary data?

A) DataInputStream data = new InputStream()

B) DataInputStream data = response.getInputStream()

C) DataInputStream data = request.getInputStream()

D) DataInputStream data = request.fetchInputStream()

24. Which of the following SQL commands can be used to modify existing data table?

A Update

B) Modify

C) New

D) Change

25. Switching in internet is done by using datagram approach to packet switching at the .......

A) network layer

B) application layer

C) data link layer

D) physical layer

26. In zero-address instruction method the operands are stored in......

A) Resisters

B) Accumulators

C) Push down stack

D) Cache

27. Which one of the following is an internet IP network? standard protocol for managing devices on an IP network ?

A) dynamic host configuration protocol

B) simple network manager

C) internet massage access protocol

D) media gateway protocol

28. Software Debugging is known as.....

A) identifying the task to be computerized

B) creating program code

C) creating the algorithm

D) finding and correcting errors in the program code

Previous

Next