100+ MCQ & Answer Cyber Security | page-09 | Computer Course MCQ And Answer
81. A asymmetric-key (or public key ) cipher uses A. 1 key B. 2 key C. 3 key D. 4
Read More81. A asymmetric-key (or public key ) cipher uses A. 1 key B. 2 key C. 3 key D. 4
Read More91. ECC stands for A. Elliptic curve cryptography B. Enhanced curve cryptography C. Elliptic cone cryptography D. Eclipse curve cryptography
Read More91. Which of the following is an object pattern that encapsulates interchangeable algorithms in objects so the algorithm can vary
Read MoreWhat is Software Design? Software design is the process by which an agent creates a specification of a software artifact
Read More01. What are the characteristics of software? A. Software is developed or engineered; it is notmanufactured in the classical sense.
Read More11. Software consists of ______ A. Set of instructions + operating procedures B. Programs + documentation + operating procedures C.
Read More21. Number of clauses used in ISO 9001 to specify quality system requirements are _____ A. 15 B. 20 C.
Read More31. The model in which the requirements are implemented by its category is ______ . A. Evolutionary Development Model B.
Read More41. Requirement engineering process includes whichof these steps? A. Feasibility study B. Requirement Gathering C. Software Requirement specification & Validation
Read More51. _____ can model the behavior of an individual object. A. class B. state machine?? C. activity?? D. use case??
Read More