Which option will be used with sort command to start sorting after the n-th column of the (m+1)th field ?
Previous 10 Questions — JECA MCA 2024
Nearest first
1
2
3
4
5
6
7
8
9
10
Baud means
Topic: JECA MCA 2024
When several processes access the same data concurrently and the outcome depends on the particular order in which the a…
Topic: JECA MCA 2024
Which command is used for printing the current working directory ?
Topic: JECA MCA 2024
Which command is used to set the three permissions for all the three categories of users of a file ?
Topic: JECA MCA 2024
Which one of the following is deadlock avoidance algorithm ?
Topic: JECA MCA 2024
Which of the following statement is correct ?
Topic: JECA MCA 2024
Which of the following is popular for applications such as storage of log files in a DBMS since it offers the best writ…
Topic: JECA MCA 2024
Numbers 7, 5, 1, 8, 3, 6, 0, 9, 4, 2 are inserted in that order into an initially empty binary search tree. The tree us…
Topic: JECA MCA 2024
A clustering index is defined on the fields which are of types
Topic: JECA MCA 2024
Which is the correct statement about operator overloading ?
Topic: JECA MCA 2024
Next 10 Questions — JECA MCA 2024
Ascending by ID
1
2
3
4
5
6
7
8
9
10
Which layer of the OSI model is responsible for routing and forwarding packets ?
Topic: JECA MCA 2024
Which command is used for displaying the beginning of a file in Unix ?
Topic: JECA MCA 2024
Three CPU-intensive processes (10, 20, 30 units) arrive at 0,2,6 respectively. Using shortest remaining time first sche…
Topic: JECA MCA 2024
What is the result of postfix expression ab*c+d+ where a=2, b=2, c=3, d=4 ?
Topic: JECA MCA 2024
Which one of the following does not have a Net ID and Host ID ?
Topic: JECA MCA 2024
Which command is used to extract specific columns from the file ?
Topic: JECA MCA 2024
In the OSI model, encryption and decryption are functions of the ____.
Topic: JECA MCA 2024
Which of the following is not a communication command ?
Topic: JECA MCA 2024
A deadlock avoidance algorithm dynamically examines the ____ to ensure circular wait never exists.
Topic: JECA MCA 2024
A Port address in TCP/IP is ____ bits long.
Topic: JECA MCA 2024