Multiple Choice Questions

Advertisement

Which of the following uses the spawn mechanism to duplicate itself?

  • Trojan horse

  • Worm

  • Keystore logger

  • Keystore logger


B.

Worm

57 Views

Advertisement

A ............ is an agreement between the communicating parties on how communication is to proceed.

  • Path

  • SLA

  • Bond

  • Bond

51 Views

............... is a type of computing that performs computation, storage and even applications as a service across a network.

  • Cloud Computing

  • Distributed Computing

  • Parallel Computing

  • Parallel Computing

51 Views

Find the odd one out.

  • Linux

  • Windows 98

  • C++

  • C++

44 Views

In IT, associative memory is called as

  • Virtual memory

  • Cache memory

  • Content addressable memory

  • Content addressable memory

45 Views

Advertisement

The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as

  • Access control

  • Congestion

  • Error propagation

  • Error propagation

42 Views

In IT, the method for updating the main memory as soon as a word is removed from the cache is called

  • Write-through

  • Write-back

  • Protected-write

  • Protected-write

53 Views

In a computer processing, .............. selects processes from the pool and loads them into memory for execution

  • Job Scheduler

  • Resource Scheduler

  • CPU Scheduler

  • CPU Scheduler

49 Views

WIMAX stands for

  • Wireless Interoperability for Microwave Access

  • Wired Interoperability for Microwave Access

  • Worldwide Interoperability for Microwave Access

  • Worldwide Interoperability for Microwave Access

49 Views

Advertisement
<

In IT networking, which of the following device is used in physical layer?

  • Repeater

  • Router

  • Transport Gateway

  • Transport Gateway

48 Views

Advertisement