Previous 10 Questions — JECA MCA 2024
Nearest first
1
2
3
4
5
6
7
8
9
10
A computer with a 32 bit wide data bus uses 4k × 8 static RAM memory chips. The smallest memory this computer is
Topic: JECA MCA 2024
The small extremely fast RAM's are termed as ______(A) Heap(B) Accumulators(C) Stack(D) Cache
Topic: JECA MCA 2024
What is the maximum number of level-2 DFD possible if the number of
processes in level-1 DFD is n ?(A) $\frac{n}{2}$(B)…
Topic: JECA MCA 2024
The keyword friend does not appear in(A) the class allowing access to another class.(B) the class desiring access to an…
Topic: JECA MCA 2024
An artificially intelligent car decreases its speed based on its distance from the car in front of it. Which method is …
Topic: JECA MCA 2024
How many parameters does a default constructor require ? (A) 1(B) 2 (C) 0(D) 3
Topic: JECA MCA 2024
Relational calculus is a (A) Procedural language (B) Non-procedural language(C) Data definition language …
Topic: JECA MCA 2024
Each stage in pipelining should be completed within _________cycles.(A) 1 (b) 2(C) 3 (D) 4
Topic: JECA MCA 2024
ROM is a (A) Combinational Circuit (B) Static Circuit(C) Sequential Circuit (D) Magnetic Circuit
Topic: JECA MCA 2024
What is the output of the following code snippet? #include <stdio.h>
main() {
int x = 65, *p = &x;…
Topic: JECA MCA 2024
Next 10 Questions — JECA MCA 2024
Ascending by ID
1
2
3
4
5
6
7
8
9
10
The store and forward mechanism is used in
Topic: JECA MCA 2024
What is the output of the following C-program?#includeint main() { const int a=10; printf("%d", +a); ret…
Topic: JECA MCA 2024
How can you display a list of all files including the hidden files?
Topic: JECA MCA 2024
Which C keyword is used to extend the visibility of variables?
Topic: JECA MCA 2024
Which of the following should not have transitive dependency?
Topic: JECA MCA 2024
Regression is a type of:
Topic: JECA MCA 2024
What is the output of the following C-program?\n#include\n#define CUBE(x) (x*x*x)\nint main() { int a, b=3; a = CUBE(b+…
Topic: JECA MCA 2024
The _____ is an asymmetric key cryptographic algorithm.
Topic: JECA MCA 2024
What is the purpose of the confusion matrix in machine learning?
Topic: JECA MCA 2024
In DMA transfers, the required signals and addresses are given by the ____.
Topic: JECA MCA 2024