Practice Basics of Computers Questions and Answers
- Which component in a V-shaped software development model corresponds to the testing phase?
- In deep learning, which type of neural network is most suitable for sequential data like time series?
- In systems design, which of the following techniques is used to break down complex systems into smaller, more manageable components?
- Which protocol is used for reliable communication in data communication and networking?
- Which algorithm is most suitable for solving optimization problems in Numerical and Statistical Computing?
- Which of the following query will return the third-highest salary from an Employee table in SQL?
- In the context of Intelligent Systems, which of the following algorithms is primarily used for real-time pathfinding in robotics?
- Consider a Binary Search Tree (BST) with the following values inserted in sequence: 45, 32, 50, 15, 40, 47, 60. What will be the in-order traversal of this...
- In the Least Recently Used (LRU) page replacement algorithm, given the following reference string 4, 2, 4, 1, 5, 2, 3, 4, and assuming 3 frames, how many p...
- Which of the following is not a valid difference between IPv4 and IPv6?Â
- What is the primary advantage of using container orchestration tools like Kubernetes over traditional virtual machines (VMs) for managing applications in a...
- In a CI/CD pipeline, which of the following represents the most critical failure point that could delay the entire software release cycle?Â
- Which of the following best describes the concept of abstraction in object-oriented programming (OOP)?Â
- Which of the following is not a method of inter-process communication (IPC) in modern operating systems?Â
- Consider the following Java code that implements encapsulation: class BankAccount { Â Â private double balance; Â Â public BankAccount(double initialBa...
- Which of the following accurately describes the primary benefit of server virtualization in a data center environment?Â
- Which of the following is the correct CIDR notation for a network with a subnet mask of 255.255.255.240?Â
- Consider a Binary Search Tree (BST) where every node stores a key and two child pointers. What is the time complexity of finding the Lowest Common Ancestor...
- Which of the following sorting algorithms is NOT stable?Â
- In object-oriented programming, what type of polymorphism is achieved at runtime?Â
- In the context of web development, which of the following best describes the primary difference between HTTP and HTTPS?
- Which of the following HTTP methods is idempotent and used to completely replace a resource on the server?Â
- Which of the following design patterns violates the Open/Closed Principle of SOLID principles in object-oriented design?Â
- Which of the following scenarios violates the Isolation property in the ACID properties of a transaction?Â
- In the context of Cross-Site Scripting (XSS), what is the primary reason why stored XSS is considered more dangerous than reflected XSS?
- Which of the following is a primary reason for using digital signatures in modern cryptography?Â
- Which of the following best describes Third Normal Form (3NF) in a relational database?Â
- In an operating system, which of the following system calls is most likely to cause a process to enter a waiting state due to synchronization with another ...
- In the context of preemptive CPU scheduling, which of the following algorithms can potentially cause starvation, and how can this issue be mitigated?Â
- When using virtual memory, what happens when a page fault occurs and the operating system cannot find a free frame in physical memory?
- Which of the following page replacement algorithms results in the lowest page-fault rate for a given reference string but is often impractical to implement...
- In I/O scheduling, which of the following algorithms minimizes seek time but may lead to starvation of requests at the ends of the disk?Â
- In a hypervisor-based virtualization environment, which of the following storage solutions is best suited for providing high availability and scalability f...
- In terms of processor performance, which factor has the greatest impact on reducing instruction execution time for computationally heavy applications? ...
- In an enterprise environment, which of the following backup strategies provides the best balance between minimizing storage usage and ensuring data recover...
- Which of the following is the most effective method for ensuring that an organization complies with security and privacy regulations such as GDPR or HIPAA ...
- In Unix/Linux operating systems, which of the following commands is used to send a process to the background, allowing the terminal to continue accepting c...
- Which of the following types of networks is most suitable for securely connecting geographically distant branches of a multinational company, while ensurin...
- In a mission-critical network requiring fault tolerance and multiple redundant paths, which of the following topologies provides the highest level of redun...
- Which network device operates at both the data link and network layers of the OSI model, and is responsible for routing data packets between networks? ...
More Topics
- Algorithms Questions
- Analog and Digital Communication Questions
- Big Data Analytics Questions
- C Programming Questions
- Compiler Design Questions
- Computer Architecture and Design Questions
- Cyber Security Questions
- Data Analytics Languages Questions
- Data Structure Questions
- Data Warehousing Questions
- Digital Logic Questions
- IOT and mobile Computing Questions
- IT DBMS Questions
- IT Networking Questions
- IT Operating System Questions
- Machine Learning Questions
- Memory Management Questions
- Microsoft Office Questions
- Network Layer and IP Protocol Questions
- Numerical and Statistical Computing Questions
- Object Oriented Programming Questions
- OOPS Concepts Questions
- Python Questions
- Software Engineering and Web Technology Questions
- SQL Questions