Multiple Choice Questions

Advertisement

A ............ is an agreement between the communicating parties on how communication is to proceed.

  • Path

  • SLA

  • Bond

  • Bond


D.

Bond

51 Views

Advertisement

............... is a type of computing that performs computation, storage and even applications as a service across a network.

  • Cloud Computing

  • Distributed Computing

  • Parallel Computing

  • Parallel Computing

51 Views

In IT, associative memory is called as

  • Virtual memory

  • Cache memory

  • Content addressable memory

  • Content addressable memory

45 Views

The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as

  • Access control

  • Congestion

  • Error propagation

  • Error propagation

42 Views

In IT, the method for updating the main memory as soon as a word is removed from the cache is called

  • Write-through

  • Write-back

  • Protected-write

  • Protected-write

53 Views

Advertisement

Find the odd one out.

  • Linux

  • Windows 98

  • C++

  • C++

44 Views

Which of the following uses the spawn mechanism to duplicate itself?

  • Trojan horse

  • Worm

  • Keystore logger

  • Keystore logger

57 Views

In IT networking, which of the following device is used in physical layer?

  • Repeater

  • Router

  • Transport Gateway

  • Transport Gateway

48 Views

WIMAX stands for

  • Wireless Interoperability for Microwave Access

  • Wired Interoperability for Microwave Access

  • Worldwide Interoperability for Microwave Access

  • Worldwide Interoperability for Microwave Access

49 Views

Advertisement
<

In a computer processing, .............. selects processes from the pool and loads them into memory for execution

  • Job Scheduler

  • Resource Scheduler

  • CPU Scheduler

  • CPU Scheduler

49 Views

Advertisement