New
FLASH SALE Dhamaka - Flat 60% Off on All Courses
Submit
Login / Signup
My Home
Dashboard
My Account
My Courses
My Performance
Packages
Logout
Free Videos
Youtube Videos
Live Classes RBI Grade B
Live Classes SEBI Grade A
Live Classes IBPS PO & RRB
Previous Year Paper
Exams
Online Course
Free Mock Test
General Awareness
Daily Practice
All Courses
Private Jobs
New
Testimonials
More Topics
Home
Questions
Information Technology Professional Knowledge
IT Operating System
Practice IT Operating System Questions and Answers
Question Listing
If a series is already sorted, which sorting technique will finish in the least time?
What is the best case time complexity of merge sort?
Which is not an IoT OS?
Fill the blank In K-Means algorithm, we calculate the distance between each point of the dataset to every ________ initialized.
Which is relational Database
In datawarehouse , a fact table consist of
State True or False Kernel level thread cannot share the code segment.
State True or False Semi-structured data is data that does not conform to a data model but has some structure. It lacks a fixed or rigid schema. It is...
The latency of a network is
Which is computer object code?
Predict the output list1 = ['physics', 'chemistry', 1997, 2000] list2 = [1, 2, 3, 4, 5, 6, 7 ] print "list1[0]: ", list1[0] ...
Which algorithm approach focus on Local Optimum solution?
There is a BST and below is the Pre order of the BST, What will be it’s In order 150 70 60 80 250 200 350
Which is correct version of delete query in SQL
Fill in the blanks R _________are the same as the arrays in C language which are used to hold ____________data values of the same type
What is the output for the below code MyList = ["New York", "London", "Paris", "New Delhi"] MyFile=open('output.txt','w') for element in MyList: ...
Which involve two factor authentication
State true or false MD5 Hashing Algorithm was invented by RSA Labs (Ronald Rivest) in 1991. MD5 was invented to replace its previous version, MD4. When Da...
Bourne-style shells uses which below symbol
Predict the output list1 = ['physics', 'chemistry', 1997, 2000] list2 = [1, 2, 3, 4, 5, 6, 7 ] print "list1[0]: ", list1[0] ...
Which is not the property of Data warehouse
OLAP and OLTP differs in
Data warehouse has historical data
fill the blank for space 14.
Which layer is not in OSI but in TCP/IP
Which is best fit for blank space 16?
Router is responsible for packet forwarding, including routing. Router works at which layer?
The _____________ deals with the coordination of the data transfer between end systems and hosts.
fill the blank for 19.
Which is not a access modifier in java?
Which is correct way to write methods in java?
Which is used for C shell?
A single-line comment starts with
To exit from a loop in shell we can use?
Fill in the correct option for 26 blank space.
In public key cryptography ___ key is used for encryption and ____ key is used for decryption. ...
Which refers to the creation of Internet Protocol (IP) packets with a false source IP address to i mpersonate another computer system. ...
cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal fun...
State true or false A ping of death attack involves sending a malformed packet to a targeted machine, resulting in deleterious behavior such as system c...
What is the best case time complexity of merge sort?
Page 1 of 6
Previous
1
2
3
4
5
6
Next
Last
More Topics
×
Algorithms Questions
Analog and Digital Communication Questions
Basics of Computers Questions
C Programming Questions
Compiler Design Questions
Computer Architecture and Design Questions
Data Analytics Languages Questions
Data Structure Questions
Data Warehousing Questions
IT DBMS Questions
IT Networking Questions
Memory Management Questions
Today's Class
There is no live class for today.
I Pledged to:
callback wala button
×
Please Enter Details
Please enter Name
We'll never share your email with anyone else.
Please enter Correct Mobile Number
We'll never share your email with anyone else.
Request a Call Back
Thank You
Update Address
Please enter complete address
Please enter pincode
Please enter State
Select State
Please enter City
Add Address
Download the app
×
×
Get Started with ixamBee
Start learning 50% faster. Sign in now
Please enter Mobile Number
Please enter valid Mobile Number
Please enter Mobile Number
Please enter valid Mobile Number
Email id already Exists
Please Enter valid Email Address
Please enter valid OTP
Mail sent on your email
Loading...
Get OTP & Continue
Register
Login
Choose a email
Verify Email