Latest Posts
الخميس، 31 يناير 2013
الأربعاء، 30 يناير 2013
الاثنين، 28 يناير 2013
الأربعاء، 23 يناير 2013
الثلاثاء، 22 يناير 2013
الاثنين، 21 يناير 2013
الأحد، 20 يناير 2013
Sidebar Ads
Video Widget
Find us on Facebook
Recent Posts
-
OLAP Cube illustration (Photo credit: Wikipedia ) 1. Data warehouse architecture is based on ....................... A) DBMS B) RDBMS C) Syb...
-
Q.1 ………… is a sort of blueprint of the system Development Effort. A) MDP B) DMP C) MPD D) DPM Q. 2 Data store in a DFD represents. A) a sequ...
-
1) Which of the following is not a recovery technique? A. Deferred update B. Immediate update C. Two-phase commit D. Recovery management 2)C...
-
1. ...................... is an essential process where intelligent methods are applied to extract data patterns. A) Data warehousing B) Dat...
-
1. Using a ________ variable does not enable us to create read-only properties that are often required by a class. A. public B. private C. p...
-
1. The computer code for the interchange of information between terminal is .. A) ASCII Example of how to construct a NAND gate from NOR gat...
-
1) The operation of processing each element in the list is known as ...... A. sorting B. merging C. inserting D. traversal 2) Other name for...
-
1) When you insert an excel file into a word document. The data are A. Hyper-linked place in a word table B. Linked C. Embedded D. Use the w...
-
1) Which of the following is crucial time while accessing data on the disk? A. Seek time B. Rotational time C. Transmission time D. Waiting ...
-
1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Inte...
Latest Tweets
Top Social Icons
Recent comments
Tag Cloud
- Artificial Intelligence(AI)
- Backlinking
- Basic IT
- Best List
- Blogging Tips
- C
- C#
- C++
- Computer Architecture
- Computer Fundamental
- Computer Security
- Computer/IT Officer Exam
- CSS
- Data Mining and Warehousing
- Data Recovery Tools
- Data Structure
- Database Management System
- E-commerce
- E-government
- Internet & Web Designing
- IT Law
- IT Tips and Tricks
- IT Tutorials
- Java
- JavaScript
- Keyword Research Tools
- MIS
- Multiple Choice Question (MCQ)
- Networking
- Online Earning
- Online IT Jobs
- Operating System
- Oracle Forms and Reports
- Programming Guide
- Programming Language
- SEO
- Social Networking Sites
- Software Download
- Software Engineering
- System Analysis and Design
- Top List
- VB.Net
Archives
-
▼
2013
-
▼
يناير
- MCQ of Computer Security with answer set – 2
- Solved MCQ of Computer Security set -1
- Solved MCQ of Operating System Set-6
- Solved MCQ of Operating System Set-5
- MCQ of Operating System with answer set-4
- Solved MCQ of Java for Java Proficiency test set-3
- MCQ of Java with answer set-2
- Solved MCQ of Computer Networking set-5
- MCQ of Database Management System with answer set-6
- Solved MCQ of Operating System Theory set-3
- Solved MCQ of Database Management System (DBMS) Se...
- MCQ of Computer Networking with answer set-4
- Solved MCQ of Computer networking set-3
- MCQ of Computer Networking with answer set-2
- Solved MCQ of Computer networking set-1
- MCQ of Database Management System with answer set-4
- MCQ of Operating System with answer set-2
- Solved MCQ of Operating System Principles set-1
-
▼
يناير
يتم التشغيل بواسطة Blogger.
International
Auto News
Labels
- Artificial Intelligence(AI)
- Backlinking
- Basic IT
- Best List
- Blogging Tips
- C
- C#
- C++
- Computer Architecture
- Computer Fundamental
- Computer Security
- Computer/IT Officer Exam
- CSS
- Data Mining and Warehousing
- Data Recovery Tools
- Data Structure
- Database Management System
- E-commerce
- E-government
- Internet & Web Designing
- IT Law
- IT Tips and Tricks
- IT Tutorials
- Java
- JavaScript
- Keyword Research Tools
- MIS
- Multiple Choice Question (MCQ)
- Networking
- Online Earning
- Online IT Jobs
- Operating System
- Oracle Forms and Reports
- Programming Guide
- Programming Language
- SEO
- Social Networking Sites
- Software Download
- Software Engineering
- System Analysis and Design
- Top List
- VB.Net
Entertainment
About Me
Fun & Fashion
Popular Posts
-
OLAP Cube illustration (Photo credit: Wikipedia ) 1. Data warehouse architecture is based on ....................... A) DBMS B) RDBMS C) Syb...
-
Q.1 ………… is a sort of blueprint of the system Development Effort. A) MDP B) DMP C) MPD D) DPM Q. 2 Data store in a DFD represents. A) a sequ...
-
1) Which of the following is not a recovery technique? A. Deferred update B. Immediate update C. Two-phase commit D. Recovery management 2)C...
-
1. ...................... is an essential process where intelligent methods are applied to extract data patterns. A) Data warehousing B) Dat...
-
1. Using a ________ variable does not enable us to create read-only properties that are often required by a class. A. public B. private C. p...
-
1. The computer code for the interchange of information between terminal is .. A) ASCII Example of how to construct a NAND gate from NOR gat...
-
1) The operation of processing each element in the list is known as ...... A. sorting B. merging C. inserting D. traversal 2) Other name for...
-
1) When you insert an excel file into a word document. The data are A. Hyper-linked place in a word table B. Linked C. Embedded D. Use the w...
-
1) Which of the following is crucial time while accessing data on the disk? A. Seek time B. Rotational time C. Transmission time D. Waiting ...
-
1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Inte...
Popular Posts
-
OLAP Cube illustration (Photo credit: Wikipedia ) 1. Data warehouse architecture is based on ....................... A) DBMS B) RDBMS C) Syb...
-
Q.1 ………… is a sort of blueprint of the system Development Effort. A) MDP B) DMP C) MPD D) DPM Q. 2 Data store in a DFD represents. A) a sequ...
-
1) Which of the following is not a recovery technique? A. Deferred update B. Immediate update C. Two-phase commit D. Recovery management 2)C...
-
1. ...................... is an essential process where intelligent methods are applied to extract data patterns. A) Data warehousing B) Dat...
-
1. Using a ________ variable does not enable us to create read-only properties that are often required by a class. A. public B. private C. p...
-
1. The computer code for the interchange of information between terminal is .. A) ASCII Example of how to construct a NAND gate from NOR gat...
-
1) The operation of processing each element in the list is known as ...... A. sorting B. merging C. inserting D. traversal 2) Other name for...
-
1) When you insert an excel file into a word document. The data are A. Hyper-linked place in a word table B. Linked C. Embedded D. Use the w...
-
1) Which of the following is crucial time while accessing data on the disk? A. Seek time B. Rotational time C. Transmission time D. Waiting ...
-
1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Inte...
- TwitterFollow us
- FacebookBecome our fan
- Google+Join our circle
- RSSSubscribe now
- NewsletterGet latest updates
0 التعليقات: