Previous 10 Questions — JECA MCA 2024
Nearest first
1
2
3
4
5
6
7
8
9
10
A deadlock avoidance algorithm dynamically examines the ____ to ensure circular wait never exists.
Topic: JECA MCA 2024
Which of the following is not a communication command ?
Topic: JECA MCA 2024
In the OSI model, encryption and decryption are functions of the ____.
Topic: JECA MCA 2024
Which command is used to extract specific columns from the file ?
Topic: JECA MCA 2024
Which one of the following does not have a Net ID and Host ID ?
Topic: JECA MCA 2024
What is the result of postfix expression ab*c+d+ where a=2, b=2, c=3, d=4 ?
Topic: JECA MCA 2024
Three CPU-intensive processes (10, 20, 30 units) arrive at 0,2,6 respectively. Using shortest remaining time first sche…
Topic: JECA MCA 2024
Which command is used for displaying the beginning of a file in Unix ?
Topic: JECA MCA 2024
Which layer of the OSI model is responsible for routing and forwarding packets ?
Topic: JECA MCA 2024
Which option will be used with sort command to start sorting after the n-th column of the (m+1)th field ?
Topic: JECA MCA 2024
Next 10 Questions — JECA MCA 2024
Ascending by ID
1
2
3
4
5
6
7
8
Worst case time complexity of inserting into an empty linear linked list, if list must remain sorted?
Topic: JECA MCA 2024
In IPv4 network ID and host ID in Class A is:
Topic: JECA MCA 2024
What is the worst case complexity of inserting a node in doubly linked list ?
Topic: JECA MCA 2024
Virtual memory is normally implemented by ____.
Topic: JECA MCA 2024
Which sorting algorithm is most efficient if elements are already in sorted order ?
Topic: JECA MCA 2024
____ server is used to create a secure tunnel connection.
Topic: JECA MCA 2024
What is the prefix of expression A-B/(C*D^E) ?
Topic: JECA MCA 2024
Hamming code is used for ____.
Topic: JECA MCA 2024