Here we are going to discuss top 50 css multiple choice questions. these questions will help you at the many places like in examinations. in an interview etc. So lets start--
16.Joystick allows the movements with
(A) 90 degree angle (B) 180 degree angle
(C) 360 degree angle (D) 45 degree angle
Ans:- C
17.To protect system, there is how many levels of security level?
(A) One (B) Two
(C) Three (D) Four
Ans:- C
18.Lowest level of security system is
(A) A (B) B
(C) C (D) D
Ans:- A
19.The security of a system can be improved by
(A) Audit log (B) Threat monitoring
(C) Both (a) and (b) (D) None of these
Ans:- B
20.How many capabilities in CAP?
(A) One (B) Two
(C) Three (D) Four
Ans:- B
21.CAP is
(A) Simple and greater power than that of hydra
(B) Complex and less powerful than that of hydra
(C) Simpler and less powerful than that of hydra
(D) None of these
Ans:- C
22.Which one of the following is a key function of firewall?
(A) Copying (B) Moving
(C) Deleting (D) Monitoring
Ans:- D
23.Which memory is nonvolatile and may be written only once?
(A) PROM (B) RAM
(C) EP-ROM (D) SRAM
Ans:- D
24.Unauthorized copying of software to be used for personal gain of personal backups is called
(A) Program looting (B) Program thievery
(C) Data snatching (D) Software piracy
Ans:- D
25.Like a virus , it is a self-replicating program it also propagates through computer network
(A) Phishing scam (B) Worm
(C) Spyware (D) Cracker
Ans:- A
26.Multiple processor configurations
(A) Are very efficient, but only on some applications
(B) Work equally well on all applications
(C) Are less efficient than scalar configurations
(D) Are more efficient than scalar configurations
Ans:- A
27.Applications
(A) Must usually be re-complied to use multiple processors
(B) Can always be made efficient on multiple processors
(C) Immediately run on multiple processors
(D) Cannot run on multiple processors
Ans:- A
28.Seeks analysis is
(A) Only shown on real-time displays
(B) Used for analyzing control-unit busy problems
(C) Used for analyzing device busy problems
(D) Used for analyzing paging problems
Ans:- C
29.The most common security failure is
(A) Depending on passwords
(B) Carelessness by users
(C) Too much emphasis on preventing physical access
(D) Insufficient technology used to prevent breaches
Ans:- D
30.Trojan-Horse programs
(A) Usually are immediately discovered
(B) Really do not usually work
(C) Are hacker programs that do not show up on the system
(D) Are legitimate programs that allow unauthorized access
Ans:- D
Click here more questions:- 1 2 3
Recommended post:-
Hackerearth Problems:-
- Very Cool numbers | Hacker earth solution
- Birthday party | Hacker earth solution
- Most frequent | hacker earth problem solution
- program to find symetric difference of two sets
- cost of balloons | Hacker earth problem solution
- Chacha o chacha | hacker earth problem solution
- jadu and dna | hacker earth solution
- Bricks game | hacker earth problem
- Anti-Palindrome strings | hacker earth solution
- connected components in the graph | hacker earth data structure
- odd one out || hacker earth problem solution
- Minimum addition | Hackerearth Practice problem
- The magical mountain | Hackerearth Practice problem
- The first overtake | Hackerearth Practice problem
Data structure:-
- Program to find cycle in the graph
- Implementation of singly link list
- Implementation of queue by using link list
- Algorithm of quick sort
- stack by using link list
- program to find preorder post order and inorder of the binary search tree
- Minimum weight of spanning tree
- Preorder, inorder and post order traversal of the tree
Key points:-
- How to set limit in the floating value in python
- What is boolean data type
- How to print any character without using format specifier
0 Comments