(A) vulnerability
(B) Threat
(C) Risk
(D) Exposure
The answer is (A) vulnerability
(A) vulnerability
(B) Threat
(C) Risk
(D) Exposure
The answer is (A) vulnerability
(A) You can control where traffic goes in thr three networks
(B) you can do stateful packet filtering
(C) You can do load balancing
(D) improved network performance
The answer is (C) You can do load balancing
(A) Safe, may have a bug
(A) unsafe, may have a bug
(A) Safe, may not have a bug
(A) None of these
The answer is (A) Safe, may have a bug
(A) MMU stands for memory Management Unit and its Software Program
(B) MMU stands for Microprocessor Management Unit and it Hardware Device
(C) MMU stands for Multi-threading Management Unit and it is a Software Program
(D) MMU Stands for Memory Management Unit and it is hardware device
The answer is (D) MMU Stands for Memory Management Unit and it is hardware device
(A) Owner has all type of access rights
(B) Group has no any access right
(C) Public has right to execute it
(D) All of these
The answer is (A) Owner has all type of access rights
(A) The average arrival rate for new processes in the queue
(B) The average waiting time in the queue
(C) The average long term queue length
(D) None of these
The answer is (A) The average arrival rate for new processes in the queue
(A) Software Verification
(B) Software Validation
(C) Software design and implementation
(D) Software evolution
The answer is (A) Software Verification
MCQs is taken from www.sarthaks.com
(a) Central Processing System
(b) Continuous Physical System
(c) Cyber Physical System
(d) None of these
The answer is (c) Cyber Physical System
MCQs is taken from gtu-mcq.com
(a) Call appropriate service
(b) Hide implementation detail
(c) hide inter process communication
(d) Provide duplicate service.
The answer is (a) Call appropriate service
(A) Occam’s Razor
(B) Murphy’s law
(C) Hypothesis Optimization
(D) None of these
The answer is (A) Occam’s Razor