CSE MCQ
1167
1164
1264
1169
Initialization is a part of definition
It is a declaratrion
It is a formal parameter
All of these
"12345"
nothing since 12345 is an integer
S is an illegal name for string
%s cannot be used for reading in values of S
&x[i-1] + sizeof (int)
x + sizeof (int) * i
x+i
none of these
Two
Eight
Twenty
Theoratically no limit. The only practical limits are memory size and compilers
Constant expressions are evaluated at compile
String constants can be concatenated at compile time
Size of array should be known at compile time
True
False
both (a) and (b)
security model is based on the notion of user accounts
creates a security access token that includes the security ID for users
NT operates with client server model
all of these
grappling hook program
main program
determine how and when the problem occurred
what amount of damage was done
when security has been violated
one program
two programs
three programs
simply records the time
user
type of all access to an object
threat monitoring
audit log
could be included in a compiler
pose a difficult problem because, to detect them
the system can check for suspicious patterns of activity in an attempt to detect a security violation
a time sharing a system that counts the number of incorrect passwords given
A code segment that misuses its file is called Trojan horse
good for file accessing
preventation
practice of safe computing
purchasing unopened software from vendors
avoiding free or pirated copies from public sources
trap doors
Trojan Horse
are usually spread by users downloading viral programs from public bulletin boards or exchanging floppy disks containing an infection
are beneficial for program
the password is different in each instance
the password is same in each instance