Trojan-Horse programs
A. | are legitimate programs that allow unauthorized access |
B. | are hacker programs that do not show up on the system |
C. | really do not usually work |
D. | usually are immediately discovered |
Option: A Explanation : Click on Discuss to view users comments. |
Seeks analysis
A. | is used for analyzing paging problems |
B. | is used for analyzing device busy problems |
C. | is used for analyzing control-unit busy problems |
D. | is only shown on real-time displays |
Option: B Explanation : Click on Discuss to view users comments. |
Link encryption
A. | is more secure than end-to-end encryption |
B. | is less secure than end-to-end encryption |
C. | cannot be used in a large network |
D. | is used only to detect errors |
Option: B Explanation : Click on Discuss to view users comments. |
Syllabus covered in this section is-
This Section covers Operating System Questions Answers .These questions can be used for the preparation of various competitive and academic exams like
Who can benefit
Various search terms used for This section are