New
FLASH SALE Dhamaka - Flat 60% Off on All Courses
Submit
Login / Signup
My Home
Dashboard
My Account
My Courses
My Performance
Packages
Logout
Free Videos
Youtube Videos
Live Classes RBI Grade B
Live Classes SEBI Grade A
Live Classes IBPS PO & RRB
Previous Year Paper
Exams
Online Course
Free Mock Test
General Awareness
Daily Practice
All Courses
Private Jobs
New
Testimonials
More Topics
Home
Questions
Information Technology Professional Knowledge
Basics of Computers
Practice Basics of Computers Questions and Answers
Question Listing
Which component in a V-shaped software development model corresponds to the testing phase?
In deep learning, which type of neural network is most suitable for sequential data like time series?
In systems design, which of the following techniques is used to break down complex systems into smaller, more manageable components?
Which protocol is used for reliable communication in data communication and networking?
Which algorithm is most suitable for solving optimization problems in Numerical and Statistical Computing?
Which of the following query will return the third-highest salary from an Employee table in SQL?
In the context of Intelligent Systems, which of the following algorithms is primarily used for real-time pathfinding in robotics?
Consider a Binary Search Tree (BST) with the following values inserted in sequence: 45, 32, 50, 15, 40, 47, 60. What will be the in-order traversal of this...
In the Least Recently Used (LRU) page replacement algorithm, given the following reference string 4, 2, 4, 1, 5, 2, 3, 4, and assuming 3 frames, how many p...
Which of the following is not a valid difference between IPv4 and IPv6?
What is the primary advantage of using container orchestration tools like Kubernetes over traditional virtual machines (VMs) for managing applications in a...
In a CI/CD pipeline, which of the following represents the most critical failure point that could delay the entire software release cycle?
Which of the following best describes the concept of abstraction in object-oriented programming (OOP)?
Which of the following is not a method of inter-process communication (IPC) in modern operating systems?
Consider the following Java code that implements encapsulation: class BankAccount { private double balance; public BankAccount(double initialBa...
Which of the following accurately describes the primary benefit of server virtualization in a data center environment?
Which of the following is the correct CIDR notation for a network with a subnet mask of 255.255.255.240?
Consider a Binary Search Tree (BST) where every node stores a key and two child pointers. What is the time complexity of finding the Lowest Common Ancestor...
Which of the following sorting algorithms is NOT stable?
In object-oriented programming, what type of polymorphism is achieved at runtime?
In the context of web development, which of the following best describes the primary difference between HTTP and HTTPS?
Which of the following HTTP methods is idempotent and used to completely replace a resource on the server?
Which of the following design patterns violates the Open/Closed Principle of SOLID principles in object-oriented design?
Which of the following scenarios violates the Isolation property in the ACID properties of a transaction?
In the context of Cross-Site Scripting (XSS), what is the primary reason why stored XSS is considered more dangerous than reflected XSS?
Which of the following is a primary reason for using digital signatures in modern cryptography?
Which of the following best describes Third Normal Form (3NF) in a relational database?
In an operating system, which of the following system calls is most likely to cause a process to enter a waiting state due to synchronization with another ...
In the context of preemptive CPU scheduling, which of the following algorithms can potentially cause starvation, and how can this issue be mitigated?
When using virtual memory, what happens when a page fault occurs and the operating system cannot find a free frame in physical memory?
Which of the following page replacement algorithms results in the lowest page-fault rate for a given reference string but is often impractical to implement...
In I/O scheduling, which of the following algorithms minimizes seek time but may lead to starvation of requests at the ends of the disk?
In a hypervisor-based virtualization environment, which of the following storage solutions is best suited for providing high availability and scalability f...
In terms of processor performance, which factor has the greatest impact on reducing instruction execution time for computationally heavy applications? ...
In an enterprise environment, which of the following backup strategies provides the best balance between minimizing storage usage and ensuring data recover...
Which of the following is the most effective method for ensuring that an organization complies with security and privacy regulations such as GDPR or HIPAA ...
In Unix/Linux operating systems, which of the following commands is used to send a process to the background, allowing the terminal to continue accepting c...
Which of the following types of networks is most suitable for securely connecting geographically distant branches of a multinational company, while ensurin...
In a mission-critical network requiring fault tolerance and multiple redundant paths, which of the following topologies provides the highest level of redun...
Which network device operates at both the data link and network layers of the OSI model, and is responsible for routing data packets between networks? ...
Page 5 of 5
Previous
1
2
3
4
5
Next
More Topics
×
Algorithms Questions
Analog and Digital Communication Questions
C Programming Questions
Compiler Design Questions
Computer Architecture and Design Questions
Data Analytics Languages Questions
Data Structure Questions
Data Warehousing Questions
IT DBMS Questions
IT Networking Questions
IT Operating System Questions
Memory Management Questions
Today's Class
There is no live class for today.
I Pledged to:
callback wala button
×
Please Enter Details
Please enter Name
We'll never share your email with anyone else.
Please enter Correct Mobile Number
We'll never share your email with anyone else.
Request a Call Back
Thank You
Update Address
Please enter complete address
Please enter pincode
Please enter State
Select State
Please enter City
Add Address
Download the app
×
×
Get Started with ixamBee
Start learning 50% faster. Sign in now
Please enter Mobile Number
Please enter valid Mobile Number
Please enter Mobile Number
Please enter valid Mobile Number
Email id already Exists
Please Enter valid Email Address
Please enter valid OTP
Mail sent on your email
Loading...
Get OTP & Continue
Register
Login
Choose a email
Verify Email