Share this Post

(a) open source programmable circuit board

(b) proprietary programmable circuit board

(c) open source non programmable circuit board

(d) None of the above

(a) 2003

(b)2004

(c) 2005

(d) 2006

(a) Steve Jobs

(b) Massimo Banzi

(c) Nakumo Yamamuto

(d) Sundar pichai

(a) Arduino Due milanove

(b)Arduino Diecimila

(c) Arduino N G Rev. C

(d) Arduino Uno

(a) Analog Reference

(b) Anchor Reference

(c) Arduino Reference

(d) None of the above

(a) Fortran

(b) C

(c) Python

(d) Java

(a) Crumb board

(b) bread board

(c) slice board

(d) loaf board

(a) drawing

(b) painting

(c) sketch

(d) none of the above

(a) Internal Development Environment

(b) Inter Development Environment

(c) internet work Development Environment

(d)Integrated Development Environment

(a) void setup(), void loop ()

(b) void setup(), void main ()

(c) void main ()void loop ()

(d)void setup(), void event ()

(a) Behaviour

(b) personality

(c) trait

(d) sense

(a) personality determinants

(b) personality identifiers

(c) personality finder

(d) none of the above

(a) surrounding experiences

(b) environmental experiences

(c) social experiences

(d) none of the above

(a) adulthood

(b) childhood

(c) teenage

(d) conception

(a) Awareness

(b) self- awareness

(c) knowing

(d) recognizing

(a) Habit

(b) Behaviour

(c) Heredity

(d) none of the above

(a) psychological awareness

(b) self- awareness

(c) emotional self awareness

(d)awareness

(a) psychological awareness

(b) self- awareness

(c) emotional self awareness

(d)awareness

(a) interior & exterior

(b) intrinsic & extrinsic

(c) inner & outer

(d) none of the above

(a) psychological awareness

(b)self- awareness

(c)self discipline

(d) self- motivation

(a) Auditing

(b) Authorisation

(c) Authentication

(d) accounting

(a) Authentication

(b) Authoring

(c)Authorisation

(d)accounting

(a)Bio metric Data

(b) passwords

(c) private data

(d) backup

(a) Encryption

(b) decryption

(c) locking

(d) registering

(a) Auditing

(b) actuation

(c) Authentication

(d) Access control

(a) Mirai botnet

(b) cipher

(c) stuxnet

(d) none of the above

(a) configure authentication

(b) physically secure a network

(c)configure ACL

(d) configure encryption

(a) PIN

(b) PAN

(c) Digital certificates

(d) Biometrics

(a) brute force attack

(b) main in the middle attack

(c)smurf attack

(d) dictionary attack

(a)cloud initiated communication

(b) TLS/SSL

(B) IPS (Intrusion prevention system)

(d) Firewall


Share this Post

Leave a Reply

Your email address will not be published. Required fields are marked *