New
FLASH SALE Dhamaka - Flat 60% Off on All Courses
Submit
Login / Signup
My Home
Dashboard
My Account
My Courses
My Performance
Packages
Logout
Free Videos
Youtube Videos
Live Classes RBI Grade B
Live Classes SEBI Grade A
Live Classes IBPS PO & RRB
Previous Year Paper
Exams
Online Course
Free Mock Test
General Awareness
Daily Practice
All Courses
Private Jobs
New
Testimonials
More Topics
Home
Questions
Information Technology Professional Knowledge
IT Networking
Practice IT Networking Questions and Answers
Question Listing
Match the following a. calloc( ) ------- i. Frees previouslyallocated space. b. free( ) ----------- ii. Modifiespreviouslyallocated space. c. ma...
Trace the output int main() { int a=12,b=39; printf ("%d",a&b); return 0; }
Physical limitation of a signal is called?
Suppose that x is a one dimensional array, then choose the correct answer regarding array.
Join in which generated result contain right side tuple of table even without a match is
The communication structure that we need in socket programming is called as _________.
What is the difference between Token Ring and Ethernet?
State true or false The interface identifier portion of an Ipv6 address is directly derived from MAC address.
Fill in the blanks ______ is defined as the end to end time required for the signal to travel from transmitter to receiver and ____ is defined as the varia...
Deleting top element of stack?
From the following algorithm design techniques which one is used to find all the pairs of shortest distances in a graph?
Which specification that provides runtime environment in which java byte code can be executed?
‘/?’ is used for what in C++
When trying to access a URL, the following message is displayed on the browser: Server; Error 403. What could be the reason for the message? ...
Various IPC mechanisms are: ...
Which condition is shown in given picture? ...
The important aspect of the data warehouse environment is that data found within the data warehouse is___________. ...
Mention any two indirect measures of product.
Which database level is closest to the users?
A trigger is ?
The time required to delete a node x from a doubly linked list having n nodes is
Which of the following is not the required condition for binary search algorithm?
A goal of data mining includes which of the following?
The attributes that do not exist in the physical database
Binary relationship has how many participating entities?
Which of the following is not a limitation of binary search algorithm?
Which is not in relation to the database.
Firewall is a type of
Transit time and response time measures the ______of network?
Unauthorised access to network is?
State true/false Once the email is compromised, all other sites and services online associated with this email can be compromised.
PGP is abbreviated as _______________
The full form of Malware is ________
Which of the following is a type of virus?
Which of the following is/are ideal of ways of spreading virus
State true/false Trojan works in background and steal data which is sensitive
State true/false Trojans can sometimes acts in favour of ransomware and ask for ransom.
Which of the following shows the count of arguments passed to the script?
Which of the following is not shell?
Which command will help you to find the time of how long the system is being running?
Page 6 of 33
Previous
1
2
...
4
5
6
7
8
...
32
33
Next
Last
More Topics
×
Algorithms Questions
Analog and Digital Communication Questions
Basics of Computers Questions
C Programming Questions
Compiler Design Questions
Computer Architecture and Design Questions
Data Analytics Languages Questions
Data Structure Questions
Data Warehousing Questions
IT DBMS Questions
IT Operating System Questions
Memory Management Questions
Today's Class
There is no live class for today.
I Pledged to:
callback wala button
×
Please Enter Details
Please enter Name
We'll never share your email with anyone else.
Please enter Correct Mobile Number
We'll never share your email with anyone else.
Request a Call Back
Thank You
Update Address
Please enter complete address
Please enter pincode
Please enter State
Select State
Please enter City
Add Address
Download the app
×
×
Get Started with ixamBee
Start learning 50% faster. Sign in now
Please enter Mobile Number
Please enter valid Mobile Number
Please enter Mobile Number
Please enter valid Mobile Number
Email id already Exists
Please Enter valid Email Address
Please enter valid OTP
Mail sent on your email
Loading...
Get OTP & Continue
Register
Login
Choose a email
Verify Email