1. …………….. are used in denial of service attacks, typically against targeted web sites.A) Worm B) ZombieC) VirusD) Trojan horse2. Select the correct order for the different phases of virus execution.i…
Solved MCQ of Computer Security set -1
1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities.A) ConfidentialityB) IntegrityC) AvailabilityD) Authenticity2. In computer security, ………
Solved MCQ of Operating System Set-6
1. …………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A) Partition managementB) Memory managementC) Disk managementD) All of the above2…
Solved MCQ of Operating System Set-5
1. The unit of dispatching is usually referred to as a …………..A) Thread B) Lightweight processC) ProcessD) Both A and B2. ……………….. is a example of an operating system that support single user process a…
MCQ of Operating System with answer set-4
1. .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference to other processes.A) SynchronizationB) Mutual ExclusionC) …
Solved MCQ of Java for Java Proficiency test set-3
1. All java classes are derived from A) java.lang.ClassB) java.util.NameC) java.lang.ObjectD) java.awt.Window2. The jdb is used to A) Create a jar archiveB) Debug a java programC) Create C header file…
MCQ of Java with answer set-2
1. The JDBC-ODBC bridge allows ……….. to be used as ……….. A) JDBC drivers, ODBC driversB) Drivers, ApplicationC) ODBC drivers, JDBC driversD) Application, drivers2. Which of the following is true about…
Solved MCQ of Computer Networking set-5
1. Which of the following is not the layer of TCP/IP protocol?A) Application LayerB) Session LayerC) Transport LayerD) Internetwork layer 2. ................... address use 7 bits for the and 24 bits…
MCQ of Database Management System with answer set-6
1. ............... joins are SQL server defaultA) OuterB) InnerC) EquiD) None of the above2. The ..................... is essentially used to search for patterns in target string.A) Like PredicateB) N…
Solved MCQ of Operating System Theory set-3
1. Which of the following is not the function of Micro kernel?A) File managementB) Low-level memory managementC) Inter-process communicationD) I/O interrupts management2. Match the following.i) Mutual…