Which of the following accurately describes the role of virtual memory in modern operating systems?
Which protocol is used by devices to obtain an IP address automatically in a network?
Which attack can be mitigated using DNSSEC (Domain Name System Security Extensions)?
In the context of Management Information Systems (MIS), which of the following best describes the role of a decision support system (DSS)?
Which of the following is a key advantage of digital signatures?
Which of the following is a primary advantage of using a star schema in a data warehouse design?
Which of the following is a key objective of the Requirement Analysis phase in the Software Development Lifecycle (SDLC)?
In CI/CD pipelines, which of the following is NOT a key benefit of Continuous Integration (CI)?
Which design pattern is best suited for ensuring that a class has only one instance and provides a global point of access to it?
Which of the following is the primary reason why polymorphism is useful in Object-Oriented Programming (OOP)?