Entrance Announcement
MICTE 2080
2080 Magh 07
Open Competition TU Lecturer 2081 Subject ICT part 4
43. What is the special feature of modern web applications?
A) Must load the document to manipulate
B) Can alter contents without loading document
C) Can't be altered at all
D) Remains Static
44. Which of these is not a data type fundamental in C++?
A) int
B) float
C) string
D) char
45 The operating system and the other processes are protected from being modified by already running process because......
A) every address generated by the CPU is being checked against the relocation and limit registers
B) they have a protection algorithm
C) they are in different memory spaces
D) they are in different logical addresses
46. Which of the following scenarios may lead to an irrecoverable error in a database system?
A) A transaction reads a data item after it is written by an uncommitted transaction
B) A transaction reads a data item after it is written by a committed transaction
C) A transaction reads a data item after it is read by an uncommitted transaction
D) A transaction writes a data item after it is read by an uncommitted transaction
47. What is the result of int X=10; X=3; in C++?
A) 33
B) 30
C) 13
D) 10
48. What are the characteristics of anomay-based IDS?
A) It detects based on signature
B) It doesn't detect novel attacks
C) Anything distinct from the noise is not assumed to be intrusion activity
D) It models the normal usage of a network as a noise characterization
49. Which of the following is not a vulnerability of the network layer?
A) Route Spoofing
B) Identity and Resource ID Vulnerability
C) IP Address Spoofing
D) Weak or Non-existence Authentication
50. Which of the following tools is used to generate API documentation in HTML format from doc comments in source code?
A) Javap tool
B) Javan command
C) Java doc tool
D) Java command