Entrance Announcement
MICTE 2080
2080 Magh 07
Open Competition TU Lecturer 2081 Subject ICT part 2
14. To access the services of the operating system, the interface is provided by the...............
A) Library
B) System calls
C) Assembly instructions
D) API
15. In priority scheduling algorithm......
A) CPU is allocated to the process with highest priority
B) CPU is allocated to the process with lowest priority
C) Equal priority processes cannot be scheduled
D) None of the above
16. What is the need for a circular queue?
A) effective uses of memory
B) easier computations
C) to delete elements based on priority
D) implement LIFO principle in queues
17..... is not suitable for accommodating any change.
A) Build and fix model
B) Waterfall model
C) JAD model
D) Prototype
18. How can we remove an object from array list?
A) remove() method
B) using Iterator
C) remove() method
D) delete() method
19. What are binary search tree's worst-case and average-case complexities?
A) O(n), O(n)
B) O(logn), O(logn)
C) O(Logn), O(n)
D) O(n),O(logn)
20. Which one of the following can be considered as the class of computer threats?
A) DOS Attack
B) Phishing
C) Soliciting
D) stalking
21. Which of the following is a super class of every class in java?
A) Array List
B) Abstract class
C) Object class
D) String
22. In computers, subtraction is generally carried out by.....
A) 9's complement
B) 10's complement
C) 1's complement
D) 2's complement
23. Which of the following code retrieves the body of the request as binary data?
A) DataInputStream data = new InputStream()
B) DataInputStream data = response.getInputStream()
C) DataInputStream data = request.getInputStream()
D) DataInputStream data = request.fetchInputStream()
24. Which of the following SQL commands can be used to modify existing data table?
A Update
B) Modify
C) New
D) Change
25. Switching in internet is done by using datagram approach to packet switching at the .......
A) network layer
B) application layer
C) data link layer
D) physical layer
26. In zero-address instruction method the operands are stored in......
A) Resisters
B) Accumulators
C) Push down stack
D) Cache
27.
28.