New
Register for Workshop on How to start for NABARD 2025 (Stepwise Plan) - Apr 26, 7 PM
Submit
Login / Signup
My Home
Dashboard
My Account
My Courses
My Performance
Packages
Logout
Free Videos
Youtube Videos
Live Classes RBI Grade B
Live Classes SEBI Grade A
Live Classes IBPS PO & RRB
Previous Year Paper
Exams
Online Course
Free Mock Test
General Awareness
Daily Practice
All Courses
Private Jobs
New
Testimonials
More Topics
Home
Questions
Computer
Important Computer Questions
Practice Important Computer Questions Questions and Answers
Question Listing
Data duplication wastes the space, but also promotes a more serious problem called
What is the mounting of file system?
Which of the following is a programming language for creating special programs like Applets?
A collection of conceptual tools for describing data, relationships, semantics and constraints is referred to as
Which of the following is known as the process of viewing cross-tab with a fixed value of one attribute?
The highest level in the hierarchy of data organization is called
DI stands for
Which forms has a relation that possesses data about an individual entity:
The __________________ contains a list of blocks that have been updated in the database buffer.
A process is thrashing if ____________
A graphical or text depiction of the relationship between different groups of content on a website is a:
The_____ operation allows the combining of two relations by merging pairs of tuples, one from each relation, into a single tuple.
The top level of the hierarchy consists of ______ each of which can contain _____.
The first Network was called ________
Which of the following is not an internal command of DOS?
The code that relational database management systems use to perform their database task is referred to as
File extensions are used in order to
What type of memory stores data in a swap file on a hard drive?
The attacker using a network of compromised devices is known as _____________
Which tool is used for Wi-Fi hacking?
Which of the following is not a stream cipher?
The cardinality property of a relation, refers to the
Three bits used To control access the in UNIX are represented by :
RTOS stands for
Internet works on _______
Which of the following is not an application layer service?
MICR stands for
Which of these output devices are used for the translation of information from any computer into a pictorial form on the papers?
Which of the following is used in main memory?
Wall maps are actually
The process of capturing satellite image is called
What is the function of the puck?
The mechanism that brings a page into memory when it is needed is called
Data integrity constraints are used to:
The program used in the digitization technique is
Which of the following map is also known as chorographical map?
............. is the functional key to display save-as box.
An HTTP request contains ......... parts
Hackers often gain entry to a network be pretending to be at a legitimate computer
It is a prepared application that takes advantage of a known weakness.
Page 4 of 11
Previous
1
2
3
4
5
6
7
...
10
11
Next
Last
More Topics
×
Browser Questions
Computer Architecture Questions
Computer Awarenes Questions
Computer Book Questions
Computer Language Questions
Computer Memory Questions
Computer Miscellaneous Questions
Computer paper Questions
Database Management System Questions
Email Questions
MS Office Questions
Network Questions
Software System Questions
Today's Class
There is no live class for today.
I Pledged to:
callback wala button
×
Please Enter Details
Please enter Name
We'll never share your email with anyone else.
Please enter Correct Mobile Number
We'll never share your email with anyone else.
Request a Call Back
Thank You
Update Address
Please enter complete address
Please enter pincode
Please enter State
Select State
Please enter City
Add Address
Download the app
×
×
Get Started with ixamBee
Start learning 50% faster. Sign in now
Please enter Mobile Number
Please enter valid Mobile Number
Please enter Mobile Number
Please enter valid Mobile Number
Email id already Exists
Please Enter valid Email Address
Please enter valid OTP
Mail sent on your email
Loading...
Get OTP & Continue
Register
Login
Choose a email
Verify Email