1. …………….. are used in denial of service attacks, typically against targeted web sites.A) Worm B) ZombieC) VirusD) Trojan horse2. Select the correct order for the different phases of virus execution.i) Propagation phase ii) Dormant phaseiii) Execution phase ...
الخميس، 31 يناير 2013
Solved MCQ of Computer Security set -1
Posted on 2:10:00 صby Abdelrahman Ahmed with No comments
1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities.A) ConfidentialityB) IntegrityC) AvailabilityD) Authenticity2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.A) ConfidentialityB) IntegrityC) AvailabilityD) Authenticity3. The type of threats on the...
الأربعاء، 30 يناير 2013
Solved MCQ of Operating System Set-6
Posted on 2:24:00 صby Abdelrahman Ahmed with No comments
1. …………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A) Partition managementB) Memory managementC) Disk managementD) All of the above2. A process that execute only in main memory is referred to as ……………… and that allocated in disk is referred to a …………….A) virtual memory, true memoryB) virtual memory, real memoryC) real memory, virtual...
الاثنين، 28 يناير 2013
Solved MCQ of Operating System Set-5
Posted on 8:56:00 مby Abdelrahman Ahmed with No comments
1. The unit of dispatching is usually referred to as a …………..A) Thread B) Lightweight processC) ProcessD) Both A and B2. ……………….. is a example of an operating system that support single user process and single thread.A) UNIXB) MS-DOSC) OS/2D) Windows 20003. State true or false.i) Unix, support multiple user process but only support one thread per process.ii) A java run time environment is an example...
MCQ of Operating System with answer set-4
Posted on 2:00:00 صby Abdelrahman Ahmed with No comments
1. .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference to other processes.A) SynchronizationB) Mutual ExclusionC) Dead lockD) Starvation2. Which of the following is not the approach to dealing with deadlock?A) PreventionB) AvoidanceC) DetectionD) Deletion3. Which of the following are the states of a five state process...
الأربعاء، 23 يناير 2013
Solved MCQ of Java for Java Proficiency test set-3
Posted on 1:00:00 صby Abdelrahman Ahmed with No comments
1. All java classes are derived from A) java.lang.ClassB) java.util.NameC) java.lang.ObjectD) java.awt.Window2. The jdb is used to A) Create a jar archiveB) Debug a java programC) Create C header fileD) Generate java documentation3. What would happen if "String[]args" is not included as argument in the main method.A) No errorB) Compilation errorC) Program won't runD) Program exit4. For execution of...
الثلاثاء، 22 يناير 2013
MCQ of Java with answer set-2
Posted on 11:10:00 مby Abdelrahman Ahmed with No comments
1. The JDBC-ODBC bridge allows ……….. to be used as ……….. A) JDBC drivers, ODBC driversB) Drivers, ApplicationC) ODBC drivers, JDBC driversD) Application, drivers2. Which of the following is true about Java.A) Java does not support overloading.B) Java has replaced the destructor function of C++C) There are no header files in Java.D) All of the above.3. ……………. are not machine instructions and therefore,...
Solved MCQ of Computer Networking set-5
Posted on 12:57:00 صby Abdelrahman Ahmed with No comments
1. Which of the following is not the layer of TCP/IP protocol?A) Application LayerB) Session LayerC) Transport LayerD) Internetwork layer 2. ................... address use 7 bits for the <network> and 24 bits for the <host> portion of the IP address.A) Class AB) Class BC) Class CD) Class D3. ............. addresses are reserved for multicasting.A) Class BB) Class CC) Class DD) Class...
الاثنين، 21 يناير 2013
MCQ of Database Management System with answer set-6
Posted on 10:51:00 مby Abdelrahman Ahmed with No comments
1. ............... joins are SQL server defaultA) OuterB) InnerC) EquiD) None of the above2. The ..................... is essentially used to search for patterns in target string.A) Like PredicateB) Null PredicateC) In PredicateD) Out Predicate3. Which of the following is/are the Database server functions?i) Data management ...
الأحد، 20 يناير 2013
Solved MCQ of Operating System Theory set-3
Posted on 10:49:00 مby Abdelrahman Ahmed with No comments
1. Which of the following is not the function of Micro kernel?A) File managementB) Low-level memory managementC) Inter-process communicationD) I/O interrupts management2. Match the following.i) Mutual exclusion a) A process may hold allocated resources while...
الاشتراك في:
الرسائل (Atom)
يتم التشغيل بواسطة Blogger.
التسميات
- Artificial Intelligence(AI)
- Backlinking
- Basic IT
- Best List
- Blogging Tips
- C
- C#
- C++
- Computer Architecture
- Computer Fundamental
- Computer Security
- Computer/IT Officer Exam
- CSS
- Data Mining and Warehousing
- Data Recovery Tools
- Data Structure
- Database Management System
- E-commerce
- E-government
- Internet & Web Designing
- IT Law
- IT Tips and Tricks
- IT Tutorials
- Java
- JavaScript
- Keyword Research Tools
- MIS
- Multiple Choice Question (MCQ)
- Networking
- Online Earning
- Online IT Jobs
- Operating System
- Oracle Forms and Reports
- Programming Guide
- Programming Language
- SEO
- Social Networking Sites
- Software Download
- Software Engineering
- System Analysis and Design
- Top List
- VB.Net