1. …………….. are used in denial of service attacks, typically against targeted web sites.A) Worm B) ZombieC) VirusD) Trojan...
Solved MCQ of Computer Security set -1
1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities.A) ConfidentialityB)...
Solved MCQ of Operating System Set-6
1. …………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A)...
Solved MCQ of Operating System Set-5
1. The unit of dispatching is usually referred to as a …………..A) Thread B) Lightweight processC) ProcessD) Both A and B2....
MCQ of Operating System with answer set-4
1. .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor...
Solved MCQ of Java for Java Proficiency test set-3
1. All java classes are derived from A) java.lang.ClassB) java.util.NameC) java.lang.ObjectD) java.awt.Window2. The jdb...
MCQ of Java with answer set-2
1. The JDBC-ODBC bridge allows ……….. to be used as ……….. A) JDBC drivers, ODBC driversB) Drivers, ApplicationC) ODBC...
Solved MCQ of Computer Networking set-5
1. Which of the following is not the layer of TCP/IP protocol?A) Application LayerB) Session LayerC) Transport LayerD) Internetwork...
MCQ of Database Management System with answer set-6
1. ............... joins are SQL server defaultA) OuterB) InnerC) EquiD) None of the above2. The ..................... is...
Solved MCQ of Operating System Theory set-3
1. Which of the following is not the function of Micro kernel?A) File managementB) Low-level memory managementC) Inter-process...
الاشتراك في:
الرسائل (Atom)