Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
Which of the following refers to a technique used to gain unauthorized access to a computer system or network?(i) cracking(ii) spamming(iii) phishing
Home
Education
Which of the following refers to a technique used...
asked
Dec 24, 2021
in
Education
by
JackTerrance
Which of the following refers to a technique used to gain unauthorized access to a computer system or network? (i) cracking (ii) spamming (iii) phishing (iv) hacking Select the correct answer from above options
computer-science-interview-questions
computer-science-questions
1
Answer
0
votes
answered
Dec 24, 2021
by
JackTerrance
Best answer
the correct ans is iv)hacking
Related questions
0
votes
Q: _____________ is the attack method for decoding user credentials. Using this technique an attacker can log on as a user & gain access to unauthorized data.
_____________ is the attack method for decoding user credentials. Using this technique an attacker can log on ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked
Oct 31, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: numbers.4. (a) When running a particular program with Nmemory accesses, a computer with a cacheand paged virtual memory generates atotal of M cache misses and F page faults.Ti is the time for a cache hit; T2 is thetime for a main memory hit and T3 is thetime to load a page into main memoryfrom the disk.(i) What is the cache hit ratio ?(ii) What is the main memory hit ratio ?That is, what percentage of mainmemory accesses do not generate apage fault?(iii) What is the overall effective accessOtime for the system ?
numbers. 4. (a) When running a particular program with N memory accesses, a computer with a cache and paged ... the system ? cribe Select the correct answer from above options...
asked
Dec 6, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: numbers.4. (a) When running a particular program with Nmemory accesses, a computer with a cacheand paged virtual memory generates atotal of M cache misses and F page faults.Ti is the time for a cache hit; T2 is thetime for a main memory hit and T3 is thetime to load a page into main memoryfrom the disk.(i) What is the cache hit ratio ?(ii) What is the main memory hit ratio ?That is, what percentage of mainmemory accesses do not generate apage fault?(iii) What is the overall effective accessOtime for the system ?
numbers. 4. (a) When running a particular program with N memory accesses, a computer with a cache and paged ... the system ? cribe Select the correct answer from above options...
asked
Nov 26, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system.
A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system. (a) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 3, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: (d) Which tool is used for drawing freehand shapes or paths?(i) Rectangle Tool(ii) Pencil Tool(iii) Line Tool
(d) Which tool is used for drawing freehand shapes or paths? (i) Rectangle Tool (ii) Pencil Tool (iii) Line Tool (iv) Ovey Tool Select the correct answer from above options...
asked
Dec 1, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: What would be the output of the following program segments? Give reasons to justify your answer.i) System.out.print(“Sum =”+6 + 2);ii) System.out.print(“Sum = ”+ ‘B’+ ‘2’);iii) System.out.print(“Sum = ”+ 6 + ‘B’);iv) System.out.print(“Sum = ”+ (‘B’ + ‘a’));
What would be the output of the following program segments? Give reasons to justify your answer. i) System.out.print( Sum ... + a ); Select the correct answer from above options...
asked
Nov 27, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: $(a) Which of the following is used to change the color of hyperlink from blue to anyother color?(i) Link(iii) IFRAME00(ii) <H2>(iv) none of these
$ (a) Which of the following is used to change the color of hyperlink from blue to any other color? (i) Link ... (iv) none of these 00 Select the correct answer from above options...
asked
Nov 30, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (d) Which of the following is used to turn off the word wrapping?(i) valign(ii) wrap(iii) align(iv) nowrapg
(d) Which of the following is used to turn off the word wrapping? (i) valign (ii) wrap (iii) align (iv) nowrap g 00 Select the correct answer from above options...
asked
Nov 29, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: A ________ is a computer to which a user doesn’t have physical access , which she can access or manipulate via some kind of computer network.
A ________ is a computer to which a user doesn't have physical access , which she can access or manipulate ... of computer network. Select the correct answer from above options...
asked
Dec 31, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (1) WOOne of the following is not an operating system:(1) MS-windows(ii) Mac OS(iii) MS-Office
(1) WO One of the following is not an operating system: (1) MS-windows (ii) Mac OS (iii) MS-Office (iv) none of these Select the correct answer from above options...
asked
Dec 17, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (b) Which tool is used to select irregular shapes?(i) Selection tool(ii) Lasoo Tool(iii) Pen Tool
(b) Which tool is used to select irregular shapes? (i) Selection tool (ii) Lasoo Tool (iii) Pen Tool (iv) Pencil Tool Select the correct answer from above options...
asked
Dec 1, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (C)Which tool is used to navigate the stage?(i) Zoom Tool(ii) Hand Tool(iii) Select Tool
(C) Which tool is used to navigate the stage? (i) Zoom Tool (ii) Hand Tool (iii) Select Tool (iv) Text Tool Select the correct answer from above options...
asked
Nov 30, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (a) Which tool is used for creating preset drawing effects?(i) Deco Tool(ii) Pencil Tool(iii) Fill Tool
(a) Which tool is used for creating preset drawing effects? (i) Deco Tool (ii) Pencil Tool (iii) Fill Tool (iv) Brush Tool Select the correct answer from above options...
asked
Nov 30, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: ______tool is used to draw a circle. (I). filter. (ii). ellipse. (iii). rectangle. gūys jaldi answer do exam chl rha hai! please!
______tool is used to draw a circle. (I). filter. (ii). ellipse. (iii). rectangle. gūys jaldi answer do exam chl rha hai! please! Select the correct answer from above options...
asked
Dec 14, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: (e) Which of the following is the mode for Pencil tool?(i) Smooth(ii) Straighten(iii) Both (a) and (b)
(e) Which of the following is the mode for Pencil tool? (i) Smooth (ii) Straighten (iii) Both (a) and (b) (iv) Curve Select the correct answer from above options...
asked
Dec 1, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
...