Entrance Announcement
MICTE 2080
2080 Magh 07
Open Competition TU Lecturer 2081 Subject ICT part 2
14. To access the services of the operating system, the interface is provided by the...............
A) Library
B) System calls
C) Assembly instructions
D) API
15. In priority scheduling algorithm......
A) CPU is allocated to the process with highest priority
B) CPU is allocated to the process with lowest priority
C) Equal priority processes cannot be scheduled
D) None of the above
16. What is the need for a circular queue?
A) effective uses of memory
B) easier computations
C) to delete elements based on priority
D) implement LIFO principle in queues
17..... is not suitable for accommodating any change.
A) Build and fix model
B) Waterfall model
C) JAD model
D) Prototype
18. How can we remove an object from array list?
A) remove() method
B) using Iterator
C) remove() method
D) delete() method
19. What are binary search tree's worst-case and average-case complexities?
A) O(n), O(n)
B) O(logn), O(logn)
C) O(Logn), O(n)
D) O(n),O(logn)
20. Which one of the following can be considered as the class of computer threats?
A) DOS Attack
B) Phishing
C) Soliciting
D) stalking
21. Which of the following is a super class of every class in java?
A) Array List
B) Abstract class
C) Object class
D) String
22. In computers, subtraction is generally carried out by.....
A) 9's complement
B) 10's complement
C) 1's complement
D) 2's complement
23. Which of the following code retrieves the body of the request as binary data?
A) DataInputStream data = new InputStream()
B) DataInputStream data = response.getInputStream()
C) DataInputStream data = request.getInputStream()
D) DataInputStream data = request.fetchInputStream()
24. Which of the following SQL commands can be used to modify existing data table?
A Update
B) Modify
C) New
D) Change
25. Switching in internet is done by using datagram approach to packet switching at the .......
A) network layer
B) application layer
C) data link layer
D) physical layer
26. In zero-address instruction method the operands are stored in......
A) Resisters
B) Accumulators
C) Push down stack
D) Cache
27. Which one of the following is an internet IP network? standard protocol for managing devices on an IP network ?
A) dynamic host configuration protocol
B) simple network manager
C) internet massage access protocol
D) media gateway protocol
28. Software Debugging is known as.....
A) identifying the task to be computerized
B) creating program code
C) creating the algorithm
D) finding and correcting errors in the program code