Latest MCQ's

Q Multiplexing technique used by AM and FM radios is _________.

  • A FDM
  • B WDM
  • C TDM
  • D None of these

Q Which of the following is a form of DoS attack?

  • A Vulnerability attack
  • B Bandwidth Flooding
  • C Connection Flooding
  • D All of these

Q Elapsed time between initiating a query and receiving a response is called ________.

  • A Response Time
  • B Waiting Time
  • C Processing Time
  • D Turnaround Time

Q Which of the following are never inherited?

  • A Public data members
  • B Constructor function
  • C Void functions
  • D Overload + Operator

Q How many objects can be created from a abstract class?

  • A Zero
  • B One
  • C Two
  • D As many as you want

Q In which of the storage placement strategies a program is placed in the largest available hole in the main memory

  • A Best-fit
  • B First-fit
  • C Next-fit
  • D Worst-fit

Q Bankers algorithm in Operating Systems is used for_____________.

  • A Deadlock prevention
  • B Deadlock avoidance
  • C Deadlock recovery
  • D Mutual exclusion

Q Frames from one LAN can be transmitted to another LAN via __________.

  • A Router
  • B Bridge
  • C Repeater
  • D Modem