Open Competition TU Lecturer 2081 Subject ICT part 2

From ICTED-WIKI
Revision as of 05:05, 24 November 2024 by WikiSysop (talk | contribs) (Created page with "'''14. To access the services of the operating system, the interface is provided by the...............''' A) Library B) System calls C) Assembly instructions D) API '''15. In priority scheduling algorithm......''' A) CPU is allocated to the process with highest priority B) CPU is allocated to the process with lowest priority C) Equal priority processes cannot be scheduled D) None of the above '''16. What is the need for a circular queue?''' A) effective uses...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

14. To access the services of the operating system, the interface is provided by the...............

A) Library

B) System calls

C) Assembly instructions

D) API

15. In priority scheduling algorithm......

A) CPU is allocated to the process with highest priority

B) CPU is allocated to the process with lowest priority

C) Equal priority processes cannot be scheduled

D) None of the above

16. What is the need for a circular queue?

A) effective uses of memory

B) easier computations

C) to delete elements based on priority

D) implement LIFO principle in queues

17..... is not suitable for accommodating any change.

A) Build and fix model

B) Waterfall model

C) JAD model

D) Prototype

18. How can we remove an object from array list?

A) remove() method

B) using Iterator

C) remove() method

D) delete() method

19. What are binary search tree's worst-case and average-case complexities?

A) O(n), O(n)

B) O(logn), O(logn)

C) O(Logn), O(n)

D) O(n),O(logn)

20. Which one of the following can be considered as the class of computer threats?

A) DOS Attack

B) Phishing

C) Soliciting

D) stalking

21. Which of the following is a super class of every class in java?

A) Array List

B) Abstract class

C) Object class

D) String

22. In computers, subtraction is generally carried out by.....

A) 9's complement

B) 10's complement

C) 1's complement

D) 2's complement

23. Which of the following code retrieves the body of the request as binary data?

A) DataInputStream data = new InputStream()

B) DataInputStream data = response.getInputStream()

C) DataInputStream data = request.getInputStream()

D) DataInputStream data = request.fetchInputStream()

24. Which of the following SQL commands can be used to modify existing data table?

A Update

B) Modify

C) New

D) Change

25. Switching in internet is done by using datagram approach to packet switching at the .......

A) network layer

B) application layer

C) data link layer

D) physical layer

26. In zero-address instruction method the operands are stored in......

A) Resisters

B) Accumulators

C) Push down stack

D) Cache

27.

28.