Tamoban Javnoi

IT Crafter


Message

Qualification Master
Subject COMPUTER SCIENCE & IT
Country Lebanon
Gender Male

DDL is used to:


Boyce Codd Normal Form:


A child entity in ER diagrams is:


Regarding Binary Trees, which of the following is true?


Which of the following is considered as the world's first antivirus program?


What is an example of system software from the list below?


Which component is responsible for providing power supply to all other components in a computer system?


Which type of monitor technology offers the widest viewing angles and accurate color reproduction?


Which of the following ports is used to connect external devices such as printers, scanners, and cameras to a computer?


In the RISC architecture, the _____ is updated whenever a function is called:


Making a system store data in memory contiguously would:


Which of the following are computer architectures different from conventional von Neumann architecture?


Which type of algorithms are applicable to scheduling resources in operating systems?


The time complexity of finding a shortest path in a network is:


Why is it important to have antivirus software installed on a computer?


Who is known as the father of computers?


Where is the operating system typically stored in a computer?


When does a computer perform a boot-up process?


What is the main function of the Central Processing Unit (CPU) in a computer?


Which data structure is most suitable for implementing an LRU (Least Recently Used) cache?


Why is the space complexity of a recursive algorithm often higher than its iterative counterpart?


Where is a heap data structure typically used?


When does the Dijkstra's algorithm fail to find the shortest path in a graph?


When is the "thrashing" condition likely to occur in a system using virtual memory?


Why do modern operating systems use preemptive multitasking?


Which memory management scheme allows the physical address space of a process to be non-contiguous?


How to resolve the critical section problem in concurrent programming?


Where is the Page Table typically stored in a computer system?


When does a deadlock occur in a system?


What is the main purpose of a context switch in an operating system?


Why is it important to regularly update software and firmware in network devices?


Who is responsible for managing digital certificates in a Public Key Infrastructure (PKI) system?


Where is the most secure location to place a firewall within a network architecture?


When should an organization implement two-factor authentication (2FA) for remote access to its network resources?


What is the purpose of a subnet mask in IP networking?


How to ensure ACID properties are maintained in a transaction?


Where would you typically find the definition of a database schema?


When is a database said to be in the Third Normal Form (3NF)?


What is the primary purpose of normalization in database design?


How to prevent a form from submitting when a required field is empty using HTML5?


Where is the correct location to place the meta charset="UTF-8" tag in an HTML document?


When should you use the 'defer' attribute in a script tag in HTML?


What is the primary purpose of using media queries in responsive web design?