New
FLASH SALE Dhamaka - Flat 60% Off on All Courses
Submit
Login / Signup
My Home
Dashboard
My Account
My Courses
My Performance
Packages
Logout
Free Videos
Youtube Videos
Live Classes RBI Grade B
Live Classes SEBI Grade A
Live Classes IBPS PO & RRB
Previous Year Paper
Exams
Online Course
Free Mock Test
General Awareness
Daily Practice
All Courses
Private Jobs
New
Testimonials
More Topics
Home
Questions
Information Technology Professional Knowledge
IT Networking
Practice IT Networking Questions and Answers
Question Listing
The time required to delete a node x from a doubly linked list having n nodes is
Which of the following is not the required condition for binary search algorithm?
A goal of data mining includes which of the following?
The attributes that do not exist in the physical database
Binary relationship has how many participating entities?
Which of the following is not a limitation of binary search algorithm?
Which is not in relation to the database.
Firewall is a type of
Transit time and response time measures the ______of network?
Unauthorised access to network is?
State true/false Once the email is compromised, all other sites and services online associated with this email can be compromised.
PGP is abbreviated as _______________
The full form of Malware is ________
Which of the following is a type of virus?
Which of the following is/are ideal of ways of spreading virus
State true/false Trojan works in background and steal data which is sensitive
State true/false Trojans can sometimes acts in favour of ransomware and ask for ransom.
Which of the following shows the count of arguments passed to the script?
Which of the following is not shell?
Which command will help you to find the time of how long the system is being running?
Which of the following shows the process id which went to background recently.
How can we set default rwx permission to all users on every file which is created on the current shell?
Which of the following is not a stable sort algorithm?
Consider the following sorting algorithms. I. Quicksort II. Heapsort III. Mergesort Which of them perform in least time in the worst case?
State true/false Merge sort uses Divide and Conquer approach to sort the elements.
__________ is a subject-oriented, integrated, time-variant, nonvolatile collection of data in support of management decisions.
State true/false A SQL query will not work if there are no indexes on the relations
Major type of computer chip
Which of these signifies Not a value?
Storage capacity of magnetic disk depends on
In reverse polish notation , expression A*B+C*D is written as
Which of the following is lowest in memory hierarchy?
Write through technique is used in which memory for data updating
Microinstructions are stored in control memory groups, with each group specify a
Performance of cache memory is frequently measured in terms of
Which is the level of implementation of data structure
In the _____ traversal we process all of the vertex descendant before we move to an adjacent vertex.
Sending a packet to all destination simultaneously is called
Count to infinity problem occur in
Why probe packets are transmitted in the network
Page 7 of 33
Previous
1
2
...
5
6
7
8
9
...
32
33
Next
Last
More Topics
×
Algorithms Questions
Analog and Digital Communication Questions
Basics of Computers Questions
C Programming Questions
Compiler Design Questions
Computer Architecture and Design Questions
Data Analytics Languages Questions
Data Structure Questions
Data Warehousing Questions
IT DBMS Questions
IT Operating System Questions
Memory Management Questions
Today's Class
There is no live class for today.
I Pledged to:
callback wala button
×
Please Enter Details
Please enter Name
We'll never share your email with anyone else.
Please enter Correct Mobile Number
We'll never share your email with anyone else.
Request a Call Back
Thank You
Update Address
Please enter complete address
Please enter pincode
Please enter State
Select State
Please enter City
Add Address
Download the app
×
×
Get Started with ixamBee
Start learning 50% faster. Sign in now
Please enter Mobile Number
Please enter valid Mobile Number
Please enter Mobile Number
Please enter valid Mobile Number
Email id already Exists
Please Enter valid Email Address
Please enter valid OTP
Mail sent on your email
Loading...
Get OTP & Continue
Register
Login
Choose a email
Verify Email