NCO- Cyber Olympiad (SOF) Class 12: Questions 488 - 493 of 520

Access detailed explanations (illustrated with images and videos) to 520 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Unlimited Access for Unlimited Time! View Sample Explanation or View Features.

Rs. 350.00 or

How to register?

Question number: 488

» Computer » Open Source Terminologies

Edit

Appeared in Year: 2014

MCQ▾

Question

In April 2014, which online retailer has acquired a digital comics company known ComiXology? (SET-A)

Choices

Choice (4)Response

a.

Flipkart

b.

Amazon

c.

Future Group

d.

Jabong

Question number: 489

» Computer » Networking & Topologies

Edit
MCQ▾

Question

In ________ transmission, several bits of data are transmitted concurrently through separate communication lines.

Choices

Choice (4)Response

a.

Half Duplex

b.

Parallel

c.

Serial

d.

Full Duplex

Question number: 490

» Computer » Networking & Topologies

Edit
MCQ▾

Question

Which of the following do not belong to queues for process?

Choices

Choice (4)Response

a.

Device Queue

b.

Job Queue

c.

PCB Queue

d.

Ready Queue

Question number: 491

» Computer » Database Concepts

Edit
MCQ▾

Question

In DBMS, ________ key provides sole tuple-level addressing mechanism within the relational model.

Choices

Choice (4)Response

a.

Candidate

b.

Unique

c.

Primary

d.

Foreign

Question number: 492

» Verbal Reasoning » Alphabet Test

Edit

Appeared in Year: 2014

MCQ▾

Question

In the below letter series, some of the letters are missing which are given in that order as one of the options below it. Choose the correct option. (SET-B)

a_bbc_aab_cca_bbcc

Choices

Choice (4)Response

a.

bacb

b.

acba

c.

abba

d.

baaa

Question number: 493

» Computer » Network Security Concepts

Edit

Appeared in Year: 2014

MCQ▾

Question

Which of the following statements best describes IP spoofing? (SET-B)

Choices

Choice (4)Response

a.

Gaining unauthorized access to someone’s computer by creating TCP/IP packets using somebody else’s IP address.

b.

Breaking up a single IP into multiple packets.

c.

Introducing bug in the operating system so that it prevents users to access any resource.

d.

None of the above

Developed by: