
IEEE Coding Cybersecurity
Authored by Zeenat AlKassim
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the OUTPUT?
boolean v1 = true;
boolean v2 = false;
System.out.println((v1 & v2));
0
1
true
false
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the OUTPUT?
String abc = "I" + "like" + "Java";
System.out.println(abc);
I
Java
like
IlikeJava
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the process of defining multiple methods inside the same class but with different parameters' list?
Method Overriding
Multiple Methods
Method Overloading
None of the above
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The following is a protocol for breaking and sending packets to an address across a network.
DNS
Socket
Proxy Server
TCP/IP
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Good hackers who help in finding vulnerabilities in a system are called
White Hat Hackers
Grey Hat Hackers
Black Hat Hackers
Red Hat Hackers
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the OUTPUT?
String abc = "I LIKE IEEE";
System.out.println(abc.length());
9
10
11
12
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
_______________________ masks your IP address.
Firewall
Incognito mode
VPN
Antivirus
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?