Which memory management technique involves dividing memory into fixed-sized partitions?

  • Buddy system
  • Demand paging
  • Paging
  • Segmentation
The memory management technique that involves dividing memory into fixed-sized partitions is called segmentation. In segmentation, memory is divided into variable-sized segments based on logical divisions, such as code, data, and stack segments. This allows for more flexible memory allocation compared to fixed-sized partitions, which are characteristic of techniques like paging.

What are the advantages and disadvantages of using a hash table to store strings?

  • Advantages: easy insertion and deletion, reduced search time; Disadvantages: increased memory overhead, hashing algorithm dependency
  • Advantages: fast lookup, efficient storage of key-value pairs; Disadvantages: potential for collisions, higher memory usage
  • Advantages: minimal collisions, constant-time lookups; Disadvantages: increased memory consumption, complexity of resizing
  • Advantages: reduced search time, adaptable to varying data sizes; Disadvantages: collision handling complexity, potential performance degradation
Hash tables are efficient for storing strings due to their constant-time lookup, but handling collisions and managing memory can be challenging. Depending on the hashing algorithm used, performance can vary significantly.

How does the OSI Model assist in troubleshooting network issues?

  • It facilitates communication between network devices for diagnosis.
  • It offers standardized protocols for systematic diagnostics.
  • It provides a structured approach to identify and isolate problems.
  • The OSI Model defines clear boundaries for different network layers.
The OSI Model aids in troubleshooting by breaking down the network into distinct layers, allowing technicians to pinpoint where issues occur and enabling systematic problem-solving through standardized protocols and clear boundaries between layers.

___________ is a wireless networking standard designed for low-power, short-range communication between devices in the Internet of Things (IoT) ecosystem.

  • Bluetooth Low Energy
  • LoRaWAN
  • Wi-Fi Direct
  • Zigbee
Bluetooth Low Energy (BLE) is specifically designed for IoT applications, offering low power consumption and short-range communication capabilities suitable for connected devices.

What does RDBMS stand for in the context of databases?

  • Recursive DBMS
  • Regular DBMS
  • Relational DBMS
  • Relationship DB
RDBMS stands for Relational Database Management System. It is a type of database management system that organizes data into tables, with each table having a unique key.

What is the purpose of primary keys in a relational database?

  • Filter data
  • Identify data
  • Sort data
  • Store data
The purpose of primary keys in a relational database is to uniquely identify each record in a table. They ensure data integrity by preventing duplicate records and are used as references in other tables.

How does the concept of interfaces promote flexibility and modularity in OOP?

  • Interfaces allow for multiple inheritance in OOP.
  • Interfaces are used for implementing data structures.
  • Interfaces define a contract that classes must adhere to.
  • Interfaces restrict access to class methods.
Interfaces in OOP provide a way to define a contract that classes must adhere to, promoting flexibility by allowing different classes to implement the same interface in their own way. This promotes modularity as it enables interchangeable components and reduces code dependencies.

How does HTTPS differ from HTTP in terms of security?

  • Authentication
  • Data Encryption
  • Port Number
  • Protocol
HTTPS uses data encryption to secure the communication between the client and server, while HTTP does not provide this level of encryption. Data encryption ensures that the data exchanged between the client and server is encoded, making it difficult for unauthorized users to intercept and understand the information being transmitted. This encryption is particularly crucial for sensitive data such as login credentials, payment information, and personal details.

What is the difference between an array and a linked list in terms of memory allocation?

  • Dynamic allocation
  • Heap allocation
  • Stack allocation
  • Static allocation
Arrays are statically allocated, meaning their size is fixed at compile time. In contrast, linked lists use dynamic allocation, allowing them to grow or shrink as needed during runtime. Static allocation is primarily used in arrays, where memory is allocated on the stack or heap, while dynamic allocation is more common in linked lists, providing flexibility in memory management.

Which type of testing focuses on finding defects by executing the software?

  • Dynamic testing
  • Non-functional testing
  • Static testing
  • Structural testing
Dynamic testing involves executing the software to find defects or bugs. It includes techniques like unit testing, integration testing, system testing, and acceptance testing, where the software is actively run to check its behavior and functionality. This type of testing is essential for identifying issues that may arise during actual usage of the software.