1. …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse 2. Select...
Solved MCQ of Computer Security set -1
1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Inte...
Solved MCQ of Operating System Set-6
1. …………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A) Partition manageme...
Solved MCQ of Operating System Set-5
1. The unit of dispatching is usually referred to as a ………….. A) Thread B) Lightweight process C) Process D) Both A and B 2. ……………….. is a e...
MCQ of Operating System with answer set-4
1. .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference...
Solved MCQ of Java for Java Proficiency test set-3
1. All java classes are derived from A) java.lang.Class B) java.util.Name C) java.lang.Object D) java.awt.Window 2. The jdb is used to A) Cr...
MCQ of Java with answer set-2
1. The JDBC-ODBC bridge allows ……….. to be used as ……….. A) JDBC drivers, ODBC drivers B) Drivers, Application C) ODBC drivers, JDBC driver...
Solved MCQ of Computer Networking set-5
1. Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork laye...
MCQ of Database Management System with answer set-6
1. ............... joins are SQL server default A) Outer B) Inner C) Equi D) None of the above 2. The ..................... is essentially u...
Solved MCQ of Operating System Theory set-3
1. Which of the following is not the function of Micro kernel? A) File management B) Low-level memory management C) Inter-process communicat...