1. Why would a hacker use a proxy server ?

a. To create a stronger Connection with the target .
b. To create a ghost server on the network
c. To o btain a remote access connection
d. To hide malicious activity on the network

2. Which of the following creates a new type?

a. A class
b. Object
c. Attribute
d. Method

3. Which of the following creates a new type?

a. Concatenate
b. Append
c. Join
d. Add

4. DRY principle makes the code:

a. Reusable
b. Loop forever
c. Bad Repetitive
d. Complex

5. Which concept, enables programmers to assign a different meaning or usage to a variable, function, or an object in different contexts?

a. Inheritance
b. Message passing
c. Polymorphism
d. Abstraction

6. Techniques of using fixed words for machine code function is classified as :

a. Compiler
b. Translator
c. Mechanics
d. Mnemonics

7. Function which is used in step wise refinement of program is classified .

a. Procedure
b. Library Format
c. Routine Format
d. Subroutine format

8. The process to discover plain text or key is known as-

a. Cryptanalysis
b. Crypto design
c. Crypto process
d. Crypto graphic

9. A compiler can check ;

a. Logical error
b. syntax error
c. Both logical and syntax error
d. Non logical and Syntax error

10. A way of making a group of people all think about something at the same time to solve a problem is known as .

a. Cooperation
b. instruction
c. collaborating
d. brainstorming