Previous 10 Questions — AMU MCA 2025
Nearest first
1
2
3
4
5
6
7
8
9
10
The maximum number of leaves in a binary tree of height $n$ are:
Topic: AMU MCA 2025
Initial value of the semaphore is to allow only one of the many processes to enter their critical section is:
Topic: AMU MCA 2025
What hardware architectures are not supported by Red Hat?
Topic: AMU MCA 2025
The process of reclaiming the memory not used by any programming object is called:
Topic: AMU MCA 2025
Every process consists of two steps CPU and I/O bursts. An I/O bound program will lead to:
Topic: AMU MCA 2025
Sparse matrices have:
Topic: AMU MCA 2025
The Default and Maximum Size of Text Field in MS-Access is:
Topic: AMU MCA 2025
Adjacency Matrix is used for:
Topic: AMU MCA 2025
Suppose that in a C program snippet, following statements are used:i) sizeof(int)ii) sizeof(int*)iii) sizeof(int**)Assu…
Topic: AMU MCA 2025
Depth First Search is a technique for:
Topic: AMU MCA 2025
Next 10 Questions — AMU MCA 2025
Ascending by ID
1
2
3
4
5
6
7
8
9
10
Which of the following sorting method is stable?
Topic: AMU MCA 2025
The time complexity of binary search algorithm is:
Topic: AMU MCA 2025
In a Dequeue:
Topic: AMU MCA 2025
What is the value of $K$ in the following equation?
$(100000101100)_2 + (3654)8 = (K){16}$
Topic: AMU MCA 2025
A digital computer is based on the principle of:
Topic: AMU MCA 2025
The relational model uses some unfamiliar terminology. A tuple is equivalent to a:
Topic: AMU MCA 2025
The result of the UNION operation between $R_1$ and $R_2$ is a relation that includes:
Topic: AMU MCA 2025
The advantage of using prewritten software packages is:
Topic: AMU MCA 2025
The hexadecimal equivalent of $(10100111)_2$ is:
Topic: AMU MCA 2025
What does ‘BREAK’ keyword do in C programming language?
Topic: AMU MCA 2025