MCQ of Computer Security with answer set – 2

1. …………….. are used in denial of service attacks, typically against targeted web sites.A) Worm B) ZombieC) VirusD) Trojan horse2. Select the correct order for the different phases of virus execution.i) Propagation phase                      ii) Dormant phaseiii) Execution phase                         iv) Triggering phaseA) i, ii, iii, and ivB) i, iii, ii and ivC) ii, i, iv an iiiD) ii, iii, iv and i3. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.A) Stealth virusB) Polymorphic...

Solved MCQ of Computer Security set -1

1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities.A) ConfidentialityB) IntegrityC) AvailabilityD) Authenticity2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities.A) ConfidentialityB) IntegrityC) AvailabilityD) Authenticity3. The type of threats on the security of a computer system or network are ……………………..i) Interruption                   ii) Interception                  iii) Modificationiv) Creation                        ...

Solved MCQ of Operating System Set-5

1. The unit of dispatching is usually referred to as a …………..A) Thread B) Lightweight processC) ProcessD) Both A and B2. ……………….. is a example of an operating system that support single user process and single thread.A) UNIXB) MS-DOSC) OS/2D) Windows 20003. State true or false.i) Unix, support multiple user process but only support one thread per process.ii) A java run time environment is an example of a system of one process with multiple threads.A) True, FalseB) True, TrueC) False, TrueD) False, False4. …………… are very effective because a mode switch is not required to switch from one thread to another.A) Kernel-level threadsB) User-level threadsC) Alterable threadsD) Application level threads5. …………… is a condition in which there is a set of concurrent processes, only one of which is able...

MCQ of Operating System with answer set-4

1. .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference to other processes.A) SynchronizationB) Mutual ExclusionC) Dead lockD) Starvation2. Which of the following is not the approach to dealing with deadlock?A) PreventionB) AvoidanceC) DetectionD) Deletion3. Which of the following are the states of a five state process model?i) Running            ii) Ready               iii) New                 iv) Exit                   v) DestroyA)...

Solved MCQ of Java for Java Proficiency test set-3

1. All java classes are derived from A) java.lang.ClassB) java.util.NameC) java.lang.ObjectD) java.awt.Window2. The jdb is used to A) Create a jar archiveB) Debug a java programC) Create C header fileD) Generate java documentation3. What would happen if "String[]args" is not included as argument in the main method.A) No errorB) Compilation errorC) Program won't runD) Program exit4. For execution of DELETE SQL query in JDBC, ............. method must be used.A) executeQuery()B) executeDeleteQuery()C) executeUpdate()D) executeDelete()5. Which method will a web browser call on a new applet?A) main methodB) destroy methodC) execute methodD) init method6. Which of the following is not mandatory in variable declaration?A) a semicolonB) an identifierC) an assignmentD) a data type7. When a program...

MCQ of Java with answer set-2

1. The JDBC-ODBC bridge allows ……….. to be used as ……….. A) JDBC drivers, ODBC driversB) Drivers, ApplicationC) ODBC drivers, JDBC driversD) Application, drivers2. Which of the following is true about Java.A) Java does not support overloading.B) Java has replaced the destructor function of C++C) There are no header files in Java.D) All of the above.3. ……………. are not machine instructions and therefore, Java interpreter generates machine code that can be directly executed by the machine that is running the Java program.A) Compiled InstructionsB) Compiled codeC) byte codeD) Java mid code4. The command javacA) Converts a java program into binary codeB) Converts a java program into bytecodeC) Converts a java program into machine languageD) None of the above.5. Which of the following is not...

Solved MCQ of Computer Networking set-5

1. Which of the following is not the layer of TCP/IP protocol?A) Application LayerB) Session LayerC) Transport LayerD) Internetwork layer 2. ................... address use 7 bits for the <network> and 24 bits for the <host> portion of the IP address.A) Class AB) Class BC) Class CD) Class D3. ............. addresses are reserved for multicasting.A) Class BB) Class CC) Class DD) Class E4. State the following statement is true or false.i) In class B addresses a total of more than 1 billion addresses can be formed.ii) Class E addresses are reserved for future or experimental use.A) True, FalseB) True, TrueC) False, TrueD) False, False5. Which of the following statement is true?i) An address with all bits 1 is interpreted as all networks or all hosts.ii) The class A network 128.0.0.0...

MCQ of Database Management System with answer set-6

1. ............... joins are SQL server defaultA) OuterB) InnerC) EquiD) None of the above2. The ..................... is essentially used to search for patterns in target string.A) Like PredicateB) Null PredicateC) In PredicateD) Out Predicate3. Which of the following is/are the Database server functions?i) Data management            ii) Transaction managementiii) Compile queries            iv) Query optimizationA) i, ii, and iv onlyB) i, ii and iii onlyC) ii, iii and iv onlyD) All i, ii, iii, and iv4. To delete a database ................... command is usedA) delete database database_nameB) Delete database_nameC) drop database database_nameD) drop database_name5....

Solved MCQ of Operating System Theory set-3

1. Which of the following is not the function of Micro kernel?A) File managementB) Low-level memory managementC) Inter-process communicationD) I/O interrupts management2. Match the following.i) Mutual exclusion                          a) A process may hold allocated resources while waiting assignment.ii) Hold and wait                             b) No resource can be forcibly removed from a process holding it.iii) No preemption                           c) Only one process may...

Solved MCQ of Database Management System (DBMS) Set - 5

1. The relational model is based on the concept that data is organized and stored in two-dimensional tables called ……………………….A) FieldsB) RecordsC) RelationsD) Keys2. ……………….. contains information that defines valid values that are stored in a column or data type.A) ViewB) RuleC) IndexD) Default3. Which of the syntax is correct for insert statement?i) insert into <table_name> values <list of values>ii) insert into <table_name> (column list) values <list of values>A) i-onlyB) ii-onlyC) Both of themD) None of them4. ………………. First proposed the process of normalization.A) Edgar. WB) Edgar F. CoddC) Edward StephenD) Edward Codd5. For using a specific database …………… command is used.A) use databaseB) database name useC) Both A &BD) None of them6. Which of the following...

MCQ of Computer Networking with answer set-4

1. Which of the following is not the layer of TCP/IP protocol?A) Application LayerB) Session LayerC) Transport LayerD) Internetwork layer 2. ................... address use 7 bits for the <network> and 24 bits for the <host> portion of the IP address.A) Class AB) Class BC) Class CD) Class D3. ............. addresses are reserved for multicasting.A) Class BB) Class CC) Class DD) Class E4. State the following statement is true or false.i) In class B addresses a total of more than 1 billion addresses can be formed.ii) Class E addresses are reserved for future or experimental use.A) True, FalseB) True, TrueC) False, TrueD) False, False5. Which of the following statement is true?i) An address with all bits 1 is interpreted as all networks or all hosts.ii) The class A network 128.0.0.0...

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Cheap Web Hosting