New
FLASH SALE Dhamaka - Flat 60% Off on All Courses
Submit
Login / Signup
My Home
Dashboard
My Account
My Courses
My Performance
Packages
Logout
Free Videos
Youtube Videos
Live Classes RBI Grade B
Live Classes SEBI Grade A
Live Classes IBPS PO & RRB
Previous Year Paper
Exams
Online Course
Free Mock Test
General Awareness
Daily Practice
All Courses
Private Jobs
New
Testimonials
More Topics
Home
Questions
Information Technology Professional Knowledge
Basics of Computers
Practice Basics of Computers Questions and Answers
Question Listing
Which file structure allows for efficient retrieval of data using a hierarchical model?
Which of the following algorithm design techniques is characterized by breaking a problem into smaller sub-problems and solving each recursively? ...
Which type of cyber attack involves overwhelming a server with traffic to make it unavailable to users? ...
Which protocol is most commonly used in IoT devices for lightweight, efficient communication in constrained networks?
In software engineering, what is the primary purpose of the software development life cycle (SDLC)?
Which of the following is a non-relational database used for handling large volumes of diverse data types in Big Data environments?
Which of the following best describes supervised learning in machine learning?
In computer fundamentals, what is the primary purpose of the BIOS in a computer system?
Which phase of systems analysis and design focuses on specifying the functional requirements of a system?
Which data structure is most suitable for implementing a priority queue?
In database management systems (DBMS), which normalization form removes partial dependency?
In a network, which protocol is used to determine the MAC address corresponding to a given IP address?
Which of the following best describes the main advantage of a Management Information System (MIS)?
Which of the following is a characteristic feature of a Relational Database Management System (RDBMS)?
In data analytics, which algorithm is commonly used for predictive modeling when the target variable is categorical?
In an operating system, which of the following scheduling algorithms minimizes the average waiting time for all processes?
Which method is used to compute the inverse of a matrix in numerical computing efficiently?
In a Management Information System (MIS), which of the following is considered the primary objective?
In Numerical and Statistical Computing, which method is used for solving linear equations with large datasets?
In Hadoop’s distributed storage system, which of the following is responsible for managing and storing the actual data blocks?
Which component in a V-shaped software development model corresponds to the testing phase?
In deep learning, which type of neural network is most suitable for sequential data like time series?
In systems design, which of the following techniques is used to break down complex systems into smaller, more manageable components?
Which protocol is used for reliable communication in data communication and networking?
Which algorithm is most suitable for solving optimization problems in Numerical and Statistical Computing?
Which of the following query will return the third-highest salary from an Employee table in SQL?
In the context of Intelligent Systems, which of the following algorithms is primarily used for real-time pathfinding in robotics?
Consider a Binary Search Tree (BST) with the following values inserted in sequence: 45, 32, 50, 15, 40, 47, 60. What will be the in-order traversal of this...
In the Least Recently Used (LRU) page replacement algorithm, given the following reference string 4, 2, 4, 1, 5, 2, 3, 4, and assuming 3 frames, how many p...
Which of the following is not a valid difference between IPv4 and IPv6?
What is the primary advantage of using container orchestration tools like Kubernetes over traditional virtual machines (VMs) for managing applications in a...
In a CI/CD pipeline, which of the following represents the most critical failure point that could delay the entire software release cycle?
Which of the following best describes the concept of abstraction in object-oriented programming (OOP)?
Which of the following is not a method of inter-process communication (IPC) in modern operating systems?
Consider the following Java code that implements encapsulation: class BankAccount { private double balance; public BankAccount(double initialBa...
Which of the following accurately describes the primary benefit of server virtualization in a data center environment?
Which of the following is the correct CIDR notation for a network with a subnet mask of 255.255.255.240?
Consider a Binary Search Tree (BST) where every node stores a key and two child pointers. What is the time complexity of finding the Lowest Common Ancestor...
Which of the following sorting algorithms is NOT stable?
In object-oriented programming, what type of polymorphism is achieved at runtime?
Page 4 of 5
Previous
1
2
3
4
5
Next
Last
More Topics
×
Algorithms Questions
Analog and Digital Communication Questions
C Programming Questions
Compiler Design Questions
Computer Architecture and Design Questions
Data Analytics Languages Questions
Data Structure Questions
Data Warehousing Questions
IT DBMS Questions
IT Networking Questions
IT Operating System Questions
Memory Management Questions
Today's Class
There is no live class for today.
I Pledged to:
callback wala button
×
Please Enter Details
Please enter Name
We'll never share your email with anyone else.
Please enter Correct Mobile Number
We'll never share your email with anyone else.
Request a Call Back
Thank You
Update Address
Please enter complete address
Please enter pincode
Please enter State
Select State
Please enter City
Add Address
Download the app
×
×
Get Started with ixamBee
Start learning 50% faster. Sign in now
Please enter Mobile Number
Please enter valid Mobile Number
Please enter Mobile Number
Please enter valid Mobile Number
Email id already Exists
Please Enter valid Email Address
Please enter valid OTP
Mail sent on your email
Loading...
Get OTP & Continue
Register
Login
Choose a email
Verify Email