الخميس، 31 يناير 2013

MCQ of Computer Security with answer set – 2

1. …………….. are used in denial of service attacks, typically against targeted web sites.A) Worm B) ZombieC) VirusD) Trojan horse2. Select the correct order for the different phases of virus execution.i) Propagation phase                      ii) Dormant phaseiii) Execution phase                        ...

Solved MCQ of Computer Security set -1

1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities.A) ConfidentialityB) IntegrityC) AvailabilityD) Authenticity2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.A) ConfidentialityB) IntegrityC) AvailabilityD) Authenticity3. The type of threats on the...

الأربعاء، 30 يناير 2013

Solved MCQ of Operating System Set-6

1. …………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A) Partition managementB) Memory managementC) Disk managementD) All of the above2. A process that execute only in main memory is referred to as ……………… and that allocated in disk is referred to a …………….A) virtual memory, true memoryB) virtual memory, real memoryC) real memory, virtual...

الاثنين، 28 يناير 2013

Solved MCQ of Operating System Set-5

1. The unit of dispatching is usually referred to as a …………..A) Thread B) Lightweight processC) ProcessD) Both A and B2. ……………….. is a example of an operating system that support single user process and single thread.A) UNIXB) MS-DOSC) OS/2D) Windows 20003. State true or false.i) Unix, support multiple user process but only support one thread per process.ii) A java run time environment is an example...

MCQ of Operating System with answer set-4

1. .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference to other processes.A) SynchronizationB) Mutual ExclusionC) Dead lockD) Starvation2. Which of the following is not the approach to dealing with deadlock?A) PreventionB) AvoidanceC) DetectionD) Deletion3. Which of the following are the states of a five state process...

الأربعاء، 23 يناير 2013

Solved MCQ of Java for Java Proficiency test set-3

1. All java classes are derived from A) java.lang.ClassB) java.util.NameC) java.lang.ObjectD) java.awt.Window2. The jdb is used to A) Create a jar archiveB) Debug a java programC) Create C header fileD) Generate java documentation3. What would happen if "String[]args" is not included as argument in the main method.A) No errorB) Compilation errorC) Program won't runD) Program exit4. For execution of...

الثلاثاء، 22 يناير 2013

MCQ of Java with answer set-2

1. The JDBC-ODBC bridge allows ……….. to be used as ……….. A) JDBC drivers, ODBC driversB) Drivers, ApplicationC) ODBC drivers, JDBC driversD) Application, drivers2. Which of the following is true about Java.A) Java does not support overloading.B) Java has replaced the destructor function of C++C) There are no header files in Java.D) All of the above.3. ……………. are not machine instructions and therefore,...

Solved MCQ of Computer Networking set-5

1. Which of the following is not the layer of TCP/IP protocol?A) Application LayerB) Session LayerC) Transport LayerD) Internetwork layer 2. ................... address use 7 bits for the <network> and 24 bits for the <host> portion of the IP address.A) Class AB) Class BC) Class CD) Class D3. ............. addresses are reserved for multicasting.A) Class BB) Class CC) Class DD) Class...

الاثنين، 21 يناير 2013

MCQ of Database Management System with answer set-6

1. ............... joins are SQL server defaultA) OuterB) InnerC) EquiD) None of the above2. The ..................... is essentially used to search for patterns in target string.A) Like PredicateB) Null PredicateC) In PredicateD) Out Predicate3. Which of the following is/are the Database server functions?i) Data management            ...

الأحد، 20 يناير 2013

Solved MCQ of Operating System Theory set-3

1. Which of the following is not the function of Micro kernel?A) File managementB) Low-level memory managementC) Inter-process communicationD) I/O interrupts management2. Match the following.i) Mutual exclusion                          a) A process may hold allocated resources while...
يتم التشغيل بواسطة Blogger.