Previous 10 Questions — AMU MCA 2025
Nearest first
1
2
3
4
5
6
7
8
9
10
Suppose that in a C program snippet, following statements are used:i) sizeof(int)ii) sizeof(int*)iii) sizeof(int**)Assu…
Topic: AMU MCA 2025
Depth First Search is a technique for:
Topic: AMU MCA 2025
What is a critical section?
Topic: AMU MCA 2025
Which one of the following statements is not true regarding Doubly Linked List?
Topic: AMU MCA 2025
Which one of the following statements is true regarding Compiler and Interpreter?
Topic: AMU MCA 2025
The number X is given in IEEE 32-bit floating point format. What is the equivalent decimal value?
$X = 1\ 10000011\ 11…
Topic: AMU MCA 2025
What is the output for the program given below?#include <stdio.h>void main(){ int i = 5;  …
Topic: AMU MCA 2025
In the following program, how many times ‘for’ loop will be executed?#include <stdio.h>void main(){ …
Topic: AMU MCA 2025
Which sequence represents a max heap?
Topic: AMU MCA 2025
Correct arrangement of memory types in decreasing order of access time:
Topic: AMU MCA 2025
Next 10 Questions — AMU MCA 2025
Ascending by ID
1
2
3
4
5
6
7
8
9
10
The Default and Maximum Size of Text Field in MS-Access is:
Topic: AMU MCA 2025
Sparse matrices have:
Topic: AMU MCA 2025
Every process consists of two steps CPU and I/O bursts. An I/O bound program will lead to:
Topic: AMU MCA 2025
The process of reclaiming the memory not used by any programming object is called:
Topic: AMU MCA 2025
What hardware architectures are not supported by Red Hat?
Topic: AMU MCA 2025
Initial value of the semaphore is to allow only one of the many processes to enter their critical section is:
Topic: AMU MCA 2025
The maximum number of leaves in a binary tree of height $n$ are:
Topic: AMU MCA 2025
What is the value of the postfix expression
$6\ 9\ 3\ 2\ +\ -\ *\ ?$
Topic: AMU MCA 2025
Which of the following sorting method is stable?
Topic: AMU MCA 2025
The time complexity of binary search algorithm is:
Topic: AMU MCA 2025