1. Honey pot is an example for:
- Security Auditing Software
- Encryption-decryption Software
- Instruction-detection Software
- Virus
เดซเดฏเตผเดตാเตพ เดเดฐു เดช്เดฐൊเด്เดเด്เดทเตป เดจเดฎ്เดฎുเดെ เดธെเตผเดตเตผ เดจു เดคเดฐുเดจ്เดจเด് เดชോเดฒെ.
เด
เดฑ്เดฑാเด്เดเตผ เดซเดฏเตผเดตാเตพ เดเดเดจ്เดจു เดจเดฎ്เดฎുเดെ เดธോเดซ്เดฑ്เดฑ്เดตെเดฏเตผ เด
เด്เดธเดธ്เดธ് เดെเดฏ്เดคാเตฝ เดเดฐു เดฒോเดിเตป เดൊเดുเดค്เดคു เดจเดฎുเด്เด് เด
เดช്เดชോเตพ เดคเดจ്เดจേเดฏ് เดเดฐു เด
เดฒെเตผเด് honeypot เดจเตฝเดുเดจ്เดจു .
honeypot เดเดฐു เด്เดฐാเดช് เดเดฃ് hackers-เดจു
Honey Port Security.
It's like a firewall giving our server protection.
If the attacker accesses our software through the firewall, it gives us a login to attacker and immediately gives us an alert.
2. Hibernate in Windows XP/Windows 7 means:
3. The unix shell is
6. An attribute of one table is matching the primary key of another table, is known as:
8. Which method uses small increments with minimum planning and iteration are short time frames?
A. To avoid collision
B. When it request i/o
C. Before the CPU time slice expires
D. None of the above
16. Application like Banking and Reservation require which type of operating system
A. Hard real time
B. Soft real time
C. Real time
D. Time sharing
17. which testing method is normally used as the acceptance test for a software system?
A. unit testing
B. Integration testing
C. Functional testing
D. Regression testing
18. Which among the following is the risk driven process model?
A . Prototyping
B. Spiral Model
C. Component based development
D. Waterfall model
19. In cyclomatic complexity, if E is the number of edges and N is the number of nodes, V(G), for a flow graph is defined as:
A.E-N+2
B. E-N-1
C. E+N-2
D. E+N-1
20. Which among the following is the programmable DMA controller in 8086?
A.8259
B.8257
C.8251
2. Hibernate in Windows XP/Windows 7 means:
A. Shutdown the computer without closing the running application.
B. Shutdown the computer terminating all running applications
C. Restart the computer
D. Restart the computer in safe mode
to start hibernate go to cmd: powercfg space -h space on
3. The unix shell is
A. A command line interpreter
B. set of user commands
C. A GUI interface
D. All of the above
4. If every non key attribute is functionally depend on primary key, then the relation will be :
A. First normal form
B. Second normal form
C. Third normal form
D. Fourth normal form
5.In tuple relation model, tuple is equivalent to :
A. Record
B. Table
C. File
D. Field
6. An attribute of one table is matching the primary key of another table, is known as:
A.
Secondary Key
B.
Foreign Key
C.
Candidate Key
D.
Composite Key
7.The maintenance activity to fin and fix error during operation of error is
A.
adaptive maintenance
B.
Corrective maintenance
C.
Perfective maintenance
D.
Preventive maintenance
8. Which method uses small increments with minimum planning and iteration are short time frames?
A.
Water fall Model
B.
Spiral Model
C.
Agile Model
D.
Prototype Model
9. Telnet is a
A Remote login
B.Television network
C.Network of telephone
D. None of the above
10. Trends to outsource IT functions t other countries is known as
A.
Outer outsourcing
B.
External outsourcing
C.
Foreign outsourcing
D.
Offshore
outsourcing
11. Which of the following method of channelization are used for mobile data internet working?
A.
Time division multiple access
B.
Frequency division Multiple access
C.
Code division Multiple access
D.
All of the above
12 .PN G Stands for:
A.
Packet network graphics
B.
Portable network graphics
C.
Protocol for network graphics
D.
None of the above
13. Mutual exclusion problem occurs between
A.
Process that share resources
B.
Process use s not the same resources
C.
Two disjoint process that do not interact
D.
None of the above
14. Time for the disk, rotate to the start of the desired
sector is known as:
A.
Seek time
B.
Transfer time
C.
Latency time
D.
Access time
15. Preemptive Scheduling is the strategy of temporally suspending a running process:A. To avoid collision
B. When it request i/o
C. Before the CPU time slice expires
D. None of the above
16. Application like Banking and Reservation require which type of operating system
A. Hard real time
B. Soft real time
C. Real time
D. Time sharing
17. which testing method is normally used as the acceptance test for a software system?
A. unit testing
B. Integration testing
C. Functional testing
D. Regression testing
18. Which among the following is the risk driven process model?
A . Prototyping
B. Spiral Model
C. Component based development
D. Waterfall model
19. In cyclomatic complexity, if E is the number of edges and N is the number of nodes, V(G), for a flow graph is defined as:
A.E-N+2
B. E-N-1
C. E+N-2
D. E+N-1
20. Which among the following is the programmable DMA controller in 8086?
A.8259
B.8257
C.8251
21. INT2 in 8086 is:
A. Single step interrupt
B. Non maskable interrupt
c C. Division by zero interrupt
D. Overflow interrupt
22. Which among the following is the maximum mod signal in 8085?
A. DT/R
B. HOLD
C. ALE
D. LOCK
c
A. Single step interrupt
B. Non maskable interrupt
c C. Division by zero interrupt
D. Overflow interrupt
22. Which among the following is the maximum mod signal in 8085?
A. DT/R
B. HOLD
C. ALE
D. LOCK
23.
IN 8086 Microprocessor of the following has the highest
priority among all the type of interrupt:
A.
NM 1
B.
type 255
C.
over flow
D.
Div 0
24. the self complementing unweighted code is :
A. 8421
B. 2421
C. Excess 3
D. Gray code
25. AB+B((B+C')+B'C) can be simplified to
A. AB+BC
b B. B+BC
C. B+C
D. None of the above
26. DeMorgan's theorem says that a NOR gate is equivalent to -------------- gate.
A. Bubbled XOR
B. Bubbled AND
C. NOR
D. Bubbled NOR
27. The 10'; complement of 13250 is :
A. 86740
B. 86750
C. 97850
D. 97859
28. If an encoder has 2^n (or less) input files. Then output line is :
A) n/2
B) n
C) 2^n
D) n-1
29. IN SR flip-flop, if S=R=1 then q(t+1) will be:
A. Q(t)
B. 0
C. 1
D. indeterminate state
30. Managers salary details are hidden from employees. This is :
A. Conceptual level of data hiding
B. Physical level data hiding
C. External level data hiding
D. None of these
31. For each attribute of a relation , there is a set of permitted values, called the ------------- of that attribute
A. Domain
B. Relation
C. Set
D. Schema
32. The most commonly used operation in relational algebra for projecting a set of tuple from a relation is :
A. Join
B. Projection
C. Select
D. Union
33. The result which operation contains all pairs of tuples from the two relations, regardless of whether their attribute values match?
A. Join
B. Cartesian Product
C. Intersection
D. Set difference
34. SCTP is a --------------------- layer protocol.
A. Session Layer
B. Application Layer
C. DLL
D. Transport Layer
35. UDP is a :
A. Connection unreliable protocol
B. Reliable and connection oriented protocol
C. Connectionless reliable protocol
D. Connection oriented unreliable protocol
36. GSM is a digital cellular phone system using:
A. TDMA and Packet switching
B. CDMA and Packet switching
C. TDMA and FDMA
D. FDAM and CDMA
37. An example for cell switched network is :
A. SONET
B. ATM
C. UPSR
D. None of these
38. The IEEE standard for Wifi is :
A. 802.4
B. 802.1
C. 802.2
D. 802.11
39. one channel carries all transmissions simultaneously in
A. TDMA
B. CDMA
C. FDMA
D. PDMA
40. Encryption is done at :
A. Presentation Layer
B. Application Layer
C. Session Layer
D. Transport Layer
41. The service not provided by PPP is :
A. network address configuration
B. authentication
C. Flow Control
D. none of these
42. The bit oriented protocol for communication over point to point and multi point links is :
A. HDLC
B. Stop and Wait Protocol
C. PPP
D. PAP
43 . RG-59 category cables are used for:
A. Telephone
B. LAN
C. Cable TV networks
D. None of these
44. The digital multiplexing technique for combining several low-rate channels into high rate one:
A. TDM
B. FDM
C. CDM
D. None of these
45. Eight channels each with a 100 -kHz bandwidth are to be
26. DeMorgan's theorem says that a NOR gate is equivalent to -------------- gate.
A. Bubbled XOR
B. Bubbled AND
C. NOR
D. Bubbled NOR
27. The 10'; complement of 13250 is :
A. 86740
B. 86750
C. 97850
D. 97859
28. If an encoder has 2^n (or less) input files. Then output line is :
A) n/2
B) n
C) 2^n
D) n-1
29. IN SR flip-flop, if S=R=1 then q(t+1) will be:
A. Q(t)
B. 0
C. 1
D. indeterminate state
30. Managers salary details are hidden from employees. This is :
A. Conceptual level of data hiding
B. Physical level data hiding
C. External level data hiding
D. None of these
31. For each attribute of a relation , there is a set of permitted values, called the ------------- of that attribute
A. Domain
B. Relation
C. Set
D. Schema
32. The most commonly used operation in relational algebra for projecting a set of tuple from a relation is :
A. Join
B. Projection
C. Select
D. Union
33. The result which operation contains all pairs of tuples from the two relations, regardless of whether their attribute values match?
A. Join
B. Cartesian Product
C. Intersection
D. Set difference
34. SCTP is a --------------------- layer protocol.
A. Session Layer
B. Application Layer
C. DLL
D. Transport Layer
35. UDP is a :
A. Connection unreliable protocol
B. Reliable and connection oriented protocol
C. Connectionless reliable protocol
D. Connection oriented unreliable protocol
36. GSM is a digital cellular phone system using:
A. TDMA and Packet switching
B. CDMA and Packet switching
C. TDMA and FDMA
D. FDAM and CDMA
37. An example for cell switched network is :
A. SONET
B. ATM
C. UPSR
D. None of these
38. The IEEE standard for Wifi is :
A. 802.4
B. 802.1
C. 802.2
D. 802.11
39. one channel carries all transmissions simultaneously in
A. TDMA
B. CDMA
C. FDMA
D. PDMA
40. Encryption is done at :
A. Presentation Layer
B. Application Layer
C. Session Layer
D. Transport Layer
41. The service not provided by PPP is :
A. network address configuration
B. authentication
C. Flow Control
D. none of these
42. The bit oriented protocol for communication over point to point and multi point links is :
A. HDLC
B. Stop and Wait Protocol
C. PPP
D. PAP
43 . RG-59 category cables are used for:
A. Telephone
B. LAN
C. Cable TV networks
D. None of these
44. The digital multiplexing technique for combining several low-rate channels into high rate one:
A. TDM
B. FDM
C. CDM
D. None of these
45. Eight channels each with a 100 -kHz bandwidth are to be
c
Comments
Post a Comment