1401. The Scrambling of DATA is known as___________________?
comments icon0

A. Sorting

B. Firewall

C. Code Protection

D. Encryption
1402. The IP address are based on________________?
comments icon0

A. 8-bit addresses

B. 64-bit addresses

C. 16-bit addresses

D. 32-bit addresses
1403. What is the term for how words will appear on a page ?
comments icon0

A. Character formatting

B. Typeface

C. Text formatting

D. Point size

1405. Which of the following is invalid filename ?
comments icon0

A. shutry

B. TRY

C. trial

D. None of the above
1407. This is one of the architecture paradigm________________?
comments icon0

A. Peer to peer

B. Client-server

C. HTTP

D. Both A and B
1408. What command is not used to list the files chap01, chap02 and chap04 ?
comments icon0
A. ls chap[124]

B. ls chap0[124]

C. ls chap*

D. ls x chap0[124]

1411. Where can system and mail logs be found in Ret Hat Linux ?
comments icon0
A. /var/log

B. /etc/log

C. All of the above

D. /mail

1415. A half byte is know is___________________?
comments icon0
A. Nibble

B. Half byte

C. Bit

D. Data

1416. Indicate which of the following is not true about an interpreter ?
comments icon0
A. Interpreter generates an object program from the source program

B. Interpreter is a kind of translator

C. All of the above

D. Interpreter analyses each source statement every time it is to be executed

1418. The task(s) of the Lexial analysis phase is/are__________________?
comments icon0

A. to build a uniform symbol table

B. to build a literal table and an identifier table

C. All of the above

D. to parse the source program into the basic elements or tokens of the language

1420. To run a CD in a computer we need _________________________?
comments icon0

A. F D drive

B. Zip drive

C. Pen drive

D. CD drive
1423. What does OSS stand for ?
comments icon0
A. Open Source Software

B. Original Source Software

C. Original System Server

D. Open System Software

1424. Indicate which of the following is not true about 4GL ?
comments icon0
A. 4GL does not support a high-level of screen interaction

B. All of the above

C. Many database management system packages support 4GLs

D. A 4GL is a software tool which is written, possibly, in some third generation language

1428. The function(s) of the Syntax phase is/ are__________________?
comments icon0
A. to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs

B. to parse the source program into the basic elements or tokens of the language

C. to build a uniform symbol table

D. to build a literal table and an identifier table

1430. Computers use the_____________ language to process data ?
comments icon0
A. binary

B. representational

C. processing

D. kilobyte

1433. What is the extension of a web user control file ?
comments icon0

A. .Ascx

B. None of these

C. .Asmx

D. .Aspx

1435. Which command sends the word count of the file infile to the newfile_______________?
comments icon0

A. wc newfile

B. wc infile newfile

C. wc infile | newfile

D. wc infile >newfile
1436. The cp command uses___________________?
comments icon0

A. standard input file

B. standard output file

C. both input and output file

D. neither standard input nor standard output file
1438. The chmod ugo+rw note command can be represented in octal notation as_____________?
comments icon0
A. chmod 666 note

B. chmod 333 note

C. chmod 444 note

D. chmod 555 note

1439. The first event triggers in an aspx page is__________________?
comments icon0

A. Page_Load()

B. Page_doubleclick()

C. Page_Init()

D. Page_click()

1440. Which command is used to display all the lines with the string sales from the file empl.lst ?
comments icon0
A. grep sales empl.lst

B. cut sales empl.lst

C. cat | /sales > empl.lst

D. /sales > empl.lst

1441. GNOME is based on________________?
comments icon0

A. OLE DB toolkit

B. ORE toolkit

C. COM/DCOM toolkit

D. CORBA toolkit
1443. How to implement authentication via web.config ?
comments icon0

A. Include the deny element.

B. Include the authentication element

C. Include the authorization element.

D. Include the identity element.

1450. Which of the following commands is used to copy a file wb from the programs directory into a file called wbx in the misc directory ?
comments icon0

A. tar programs/wb misc/wbx

B. copy a:programs/wb b:misc/wbx

C. cp programs/wb misc/wbx

D. copy programs/wb misc/wbx