The main threat of Cloud based provisioning is
Which of the following programming helps you to learn Androied programming
Which one is modern light weight massage exchange format?
In which model prototype can be developed?
The time communicate between Bangladesh and USA is the same as that to communicate between two adjacent houses mask used should be:
E-mail is a protocol of the following layer___
ALU stores the computed result immediately in
Which of the following is a project scheduling method that can be applied to software development/
Which protocol is used for secured web browing
Which tool could be used for detecting vulnerability through SQL Injection
Which software is mostly used for virtualization?
Which of the following is the security equipment?
Trojan can be introduced through ?
How many layer Internet Protocol suite?
Which of the following data structure is non- linear type?
The operation of processing each element in the list is known as
Which of the folowing data structures are indexed structures/
The term push and pop is related to the
POP3 is a protocol for
Which of the following is not tool for remote access for maintenance
Generally what type of OS is chosen where security concern is a great issue?
The command password issued without an argument with change the password of-
The step by step instructions that solve a problem are called.
An acronym for conference of Data systems language is _____
According to Boolean algebra the value of (A+AB).(B+AB) is
Which O/OS is recommended for real time systems?
Which of the following requires the most time in SDLC
Test case is written by
Which one of the following is not an example redundancy?
Which one loads first when you boot up your computer?
Which kind of software testing strategy stars with testing the fundamental components first?
Compared to CISC, RISC processors (at the same clock) are
Which of the following is not a type Web search engine?
The action of decoding a modulated signal is know as
The only language understood by a digital computer is called
You need to determine whether IP information has been assigned to your Windows NT. Which utility should you use?
How many pairs of stations can simulataneously communicate on Ethernet LAN?
In SQL, the ____ command is used to recompile a view
Which of the following terms refers to the degree to which data in a database system are accurate and correct/
A path carrying signals between a source and a destination is known as
Which of the flowing is not a standard synchronous communication protocol?
Distributed Queue Dual Bus is a standard for
Which of the following medium is used for broadband local networks?
Which of the standard protocol for network managment feature?
A network that requires human invention of route signals is called A
Which of the following tags is used to create a paragraph in HTML?
content
A communication network which is used by large organizations over regional national or global area is called___
Fiber optical cable is used for?
What is not the advantage of IPV6 over IPV4 ?
In Java, which operation is used to create an object?