MCQ of Computer Security with answer set – 2

0

1. …………….. are used in denial of service attacks, typically against targeted web sites.A) Worm B) ZombieC) VirusD) Trojan horse2. Select the correct order for the different phases of virus execution.i) Propagation phase                      ii) Dormant phaseiii) Execution phase                         iv) Triggering phaseA) i, ii, iii, and ivB) i, iii, ii...[ أكمل القراءه ]

Solved MCQ of Computer Security set -1

0

1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities.A) ConfidentialityB) IntegrityC) AvailabilityD) Authenticity2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.A) ConfidentialityB) IntegrityC) AvailabilityD) Authenticity3. The type of threats...[ أكمل القراءه ]

Solved MCQ of Operating System Set-6

0

1. …………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A) Partition managementB) Memory managementC) Disk managementD) All of the above2. A process that execute only in main memory is referred to as ……………… and that allocated in...[ أكمل القراءه ]

Solved MCQ of Operating System Set-5

0

1. The unit of dispatching is usually referred to as a …………..A) Thread B) Lightweight processC) ProcessD) Both A and B2. ……………….. is a example of an operating system that support single user process and single thread.A) UNIXB) MS-DOSC) OS/2D) Windows 20003. State true or false.i) Unix, support multiple...[ أكمل القراءه ]

MCQ of Operating System with answer set-4

0

1. .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference to other processes.A) SynchronizationB) Mutual ExclusionC) Dead lockD) Starvation2. Which of the following is not the approach to dealing with deadlock?A) PreventionB) AvoidanceC) DetectionD) Deletion3....[ أكمل القراءه ]

Solved MCQ of Java for Java Proficiency test set-3

0

1. All java classes are derived from A) java.lang.ClassB) java.util.NameC) java.lang.ObjectD) java.awt.Window2. The jdb is used to A) Create a jar archiveB) Debug a java programC) Create C header fileD) Generate java documentation3. What would happen if "String[]args" is not included as argument in the main method.A) No errorB)...[ أكمل القراءه ]

MCQ of Java with answer set-2

0

1. The JDBC-ODBC bridge allows ……….. to be used as ……….. A) JDBC drivers, ODBC driversB) Drivers, ApplicationC) ODBC drivers, JDBC driversD) Application, drivers2. Which of the following is true about Java.A) Java does not support overloading.B) Java has replaced the destructor function of C++C) There are no header files...[ أكمل القراءه ]

Solved MCQ of Computer Networking set-5

0

1. Which of the following is not the layer of TCP/IP protocol?A) Application LayerB) Session LayerC) Transport LayerD) Internetwork layer 2. ................... address use 7 bits for the <network> and 24 bits for the <host> portion of the IP address.A) Class AB) Class BC) Class CD) Class D3. ............. addresses...[ أكمل القراءه ]

MCQ of Database Management System with answer set-6

0

1. ............... joins are SQL server defaultA) OuterB) InnerC) EquiD) None of the above2. The ..................... is essentially used to search for patterns in target string.A) Like PredicateB) Null PredicateC) In PredicateD) Out Predicate3. Which of the following is/are the Database server functions?i) Data management        ...[ أكمل القراءه ]

Solved MCQ of Operating System Theory set-3

0

1. Which of the following is not the function of Micro kernel?A) File managementB) Low-level memory managementC) Inter-process communicationD) I/O interrupts management2. Match the following.i) Mutual exclusion                          a) A process may hold allocated resources while waiting assignment.ii) Hold and wait                ...[ أكمل القراءه ]

أرشيف المدونة الإلكترونية

يتم التشغيل بواسطة Blogger.