Please select the best answer from the choices provided T F. Imagine you have been convicted of a crime but you believe that procedural due process was not followed.What will be the result of the SELECT statement and what will display? SELECT last_name, salary, salary + 300 FROM employees; (1) Display the Which of the following best describes the meaning of the LIKE operator? (3) Match a character pattern. You need to change the default sort order of the...employer; employee. 2. The owner is personally liable _ the debts incurred by his firm. of. MEVE T. ML SABAR She has been Karting 4 Lyubov Andreeva wants to become a Formula 1 Champion of Kazakhstan four times but hopes to drive racing cars i … n the future.Consider the following 2D dataset: Which of the following figures correspond to possible values that PCA may return for (the first eigen vector / first principal component)? • Which of the following are recommended applications of PCA? Select all that apply.The process of arranging, selecting, and ordering is design. Comment. Complaint. At the top of Spanish colonial society were the A. creoles.
PDF Final Exam Semester 1
3. Which of the following operations is performed more efficiently by doubly linked list than by singly linked list? Given the representation, which of the following operation can be implemented in O(1) time?...the procedures followed while selecting the sample so that the results of the survey are seen arrange the elements of the population in some order and select terms at regular intervals from the list. How: Quota sampling is the non-probability equivalent of stratified sampling that we discussed...decline 5. The movement of the vertical _____ curve to the _____ reflects the increase in potential output on account of the development of new 8. A stagflation, simultaneous increase in both unemployment and inflation, is most likely to be the result of a(n): a. a simultaneous outward shift of...to explain the results of assessments administered to ensure inclusion in general education classes to explain the availability of resources through the local 21) All of the following are general factors that must be considered by team members developing an IEP except A) the communication needs of the...
УМОЛЯЮ ПОМОГИТЕ ПОЖАЛУЙСТА! Очень срочное и важное...
The ORDER BY keyword is used to sort the result-set in ascending or descending order. ORDER BY Several Columns Example 2. The following SQL statement selects all customers from the "Customers" table, sorted ascending by the "Country" and descending by the "CustomerName" columnWhich of the following is generally a method to determine whether or not to include certain details into your research article? Which of the following is usually beyond the scope of the results section of a quantitative research report?No, it is the result of a process scientifically known as oxidation. Ordering your jewelry online can prove to be easy and efficient while getting a great product. Before ordering, look for deals and codes that can result in free shipping.8. The accumulator is the special memory cell in the arithmetic/logic unit in which the result is formed before it is transferred back to the memory unit. Answer the following questions: 1. What is the general purpose and function of the CPU?With this strategy the scheduler arranges processes with the least estimated processing time remaining to be next in the queue. Order of time unit allocation is based upon process arrival time, similar to FIFO. If Time-Slice is large it becomes FCFS /FIFO or if it is short then it becomes SJF/SRTF.
Question 1
Question
1. What is the number one concern about cloud computing?
Answer
• Too dear
• Security issues
• Too many platforms
• Accessibility
Question 2Question
2. Google Docs is a type of cloud computing
Answer
True
False
Question 3Question
3. Which one of those is not a cloud computing pricing model
Answer
• Pay Per Use
• Subscription
• Ladder
• Perpetual License
Question 4Question
4. Which of these is now not a big sort of cloud computing usage
Answer
• Hardware as a service
• Platform as a provider
• Software as a provider
• Infrastructure as a carrier
Question 5Question
5. An Internet connection is essential for cloud computing interaction
Answer
True
False
Question 6Question
6. "Cloud" in cloud computing represents what
Answer
Wireless
Hard drives
People
Internet
Question 7Question
7. Which of these will have to an organization imagine sooner than implementing cloud computing expertise. I: Employee pride, II: Potential price reduction, III: Information sensitivity
Answer
• Only I
• Only II
• Only III
• I, II, and III
Question 8Question
8. What precisely is cloud computing
Answer
• A option to arrange desktop computers
• Lightweight tool that takes up little house on a hard pressure
• Computing sources that can be accessed on call for, like electricity from a utility
• The World Wide Web
Question 9Question
9. What widely used provider is constructed on cloud-computing expertise? I: Twitter, II: Skype, III: Gmail, IV: YouTube.
Answer
• Only I
• Only II
• Only III and I
• I, II, III and IV
Question 10Question
10. Cloud computing embraces many concepts that were in the past touted as the next big thing in data know-how. Which of these is no longer an antecedent(предшествующее) of the cloud?
Question 11Question
11. What does SQL stand for
Answer
• Structured Query Language
• Strong Question Language
• Structured Question Language
• Structured Querty Language
Question 12Question
12. Which SQL remark is used to extract knowledge from a database?
Answer
• Select
• GET
• OPEN
• Extract
Question 13Question
13. Computerized representations of models and attributes of actual or simulated entities are?
Answer
• Data
• Knowledge
• Information
• Database
Question 14Question
14. Representation of the results of a computational process, comparable to statistical research, or the transcripts of some meanings assigned via human beings is
Answer
• Data
• Knowledge
• Information
• Database
Question 15Question
15. Representation of the results of a computer-simulated cognitive process, corresponding to belief, studying, affiliation, and reasoning is
Answer
• Data
• Knowledge
• Information
• Database
Question 16Question
16. Continuous representation, similar to the precise data it represents is
Answer
• Analog data
• Digital knowledge
• Continuous data
• Discrete information
Question 17Question
17. A discrete illustration, breaking the information up into separate(discrete) components is
Answer
• Analog data
• Digital data
• Continuous knowledge
• Discrete data
Question 18Question
18. Two bits can represent
Answer
• Four issues
• Two issues
• Eight things
• Ten issues
Question 19Question
19. The extended model of the ASCII persona set is no longer sufficient for world use
Answer
• Unicode
• Barcode
• EBCDIC
• Binary code
Question 20Question
20. The Unicode personality set uses _________ in step with personality
Answer
• 16 bits
• 8 bits
• Four bits
• 32 bits
Question 21Question
21. The first 256 characters in the Unicode character set correspond exactly to the prolonged ASCII persona set
Answer
True
False
Question 22Question
22. List the ranges of computer systems from height to down
Answer
• users, application instrument, operating device instrument, and the hardware system
• software tool, running machine instrument, users, and the hardware gadget
• software software, customers,running device device, and the hardware system
• hardware system, running device tool, utility instrument, and customers
Question 23Question
23. List the ranges of computer techniques from bottom to up
Answer
• customers, application instrument, working machine device, and the hardware gadget
• application tool, running machine instrument, customers, and the hardware machine
• utility instrument, customers,running machine device, and the hardware gadget
• hardware device, operating device tool, application instrument, and customers
Question 24Question
24. Which device refers to application tool?
Answer
• Microsoft Word
• Microsoft Windows
• Unix
• Mac OS
Question 25Question
25. Which tool refers to software software?
Answer
• Internet Explorer
• Microsoft Windows
• Unix
• Mac OS
Question 26Question
26. Which instrument refers to utility software?
Question 27Question
27. Which device refers to software device?
Answer
• Adobe Acrobat Reader
• Microsoft Windows
• Unix
• Mac OS
Question 28Question
28. Which tool refers to device device?
Question 29Question
29. Which tool refers to system device?
Question 30Question
30. Which software refers to machine instrument?
Question 31Question
31. What is the master controller for all activities that take place inside of a pc
Answer
• Operating System
• Application Software
• DBMS
• Word processor
Question 32Question
32. What does ship data from a computer over a network, and collects incoming information sent by way of other computer systems
Question 33Question
33. What is a device that permits data from a computer to be transmitted by the use of phone lines or tv cable strains to succeed in different computer systems on the Internet?
Question 34Question
34. What was the first pc prototype used vacuum tubes?
Question 35Question
35. What is the primary part that executes directions stored in the major reminiscence?
Answer
• Microprocessor
• Main memory
• Storage device
• Peripheral
Question 36Question
36. What does store directions to be performed by way of the microprocessor?
Answer
• Microprocessor
• Main reminiscence
• Storage software
• Peripheral
Question 37Question
37. What do store knowledge permanently even if the pc is grew to become off?
Answer
• Microprocessor
• Main memory
• Storage tool
• Peripheral
Question 38Question
38. What enable data input and output?
Answer
• Microprocessor
• Main reminiscence
• Storage tool
• Peripheral
Question 39Question
39. What acts as the traffic cop controlling the glide of data and coordinating interactions amongst parts in the machine?
Answer
• Microprocessor
• Main reminiscence
• Storage device
• Chipset
Question 40Question
40. What does supply sockets for microprocessor and reminiscence chips, slots for circuit boards, and the circuitry that enable electric signals to commute from component to component?
Answer
• Motherboard
• Power provide
• Microprocessor
• Chipset
Question 41Question
41. What does supply electric energy to the computer device?
Answer
• Motherboard
• Power supply
• Microprocessor
• Chipset
Question 42Question
42. What does process directions stored in main memory?
Answer
• Motherboard
• Power provide
• Microprocessor
• Chipset
Question 43Question
43. What does serve as a socket on the motherboard into which a diffusion card perhaps inserted?
Answer
• Expansion slot
• Motherboard
• Power supply
• Microprocessor
Question 44Question
44. What does enable a computer to regulate peripheral units reminiscent of the observe and the microphone?
Answer
• Expansion card
• Motherboard
• Power provide
• Microprocessor
Question 45Question
45. What does keep an eye on information drift amongst components?
Answer
• Chipset
• Motherboard
• Power supply
• Microprocessor
Question 46Question
46. What does switch information from garage units to the motherboard?
Question 47Question
47. What does store data permanently (even after the laptop is became off)?
Answer
• Disk drives
• Motherboard
• Power supply
• Microprocessor
Question 48Question
48. What step of the fetch-execute cycle allows the keep an eye on unit of the CPU to decode the instruction and direct the vital data to be moved from reminiscence to the ALU?
Answer
• Interpret
• Fetch
• Execute
• Store
Question 49Question
49. What science research learn how to refine the design of products to optimize them for human use?
Answer
• Ergonomics
• HCI
• Economics
• ICT
Question 50Question
50. What DOS command is used to change the operating listing?
Answer
• сd
• md
• rd
• ren
Question 51Question
51. What DOS command is used to make a new directory?
Answer
• cd
• md
• rd
• ren
Question 52Question
52. What DOS command is used to take away an existing empty directory?
Answer
• cd
• md
• rd
• ren
Question 53Question
53. What DOS command is used to rename a file inside a directory?
Answer
• cd
• md
• rd
• ren
Question 54Question
54. The BIOS initiates the POST (Power-On Self Test) collection
Answer
• True
• False
Question 55Question
55. The BIOS permits the video card
Answer
• True
• False
Question 56Question
56. The BIOS counts and tests reminiscence
Answer
• True
• False
Question 57Question
57. The BIOS assessments for expansion cards and adapters and initializes them
Answer
• True
• False
Question 58Question
58. The BIOS follows a search order to seek out the Master Boot Record
Answer
• True
• False
Question 59Question
59. Interrupt Handler saves contents of registers prior to it saves the check in for its personal functions
Answer
• True
• False
Question 60Question
60. Interrupts can nest infinitely (гнездиться бесконечно)
Answer
• True
• False
Question 61Question
61. Interrupt Handler accepts the byte of incoming data
Answer
• True
• False
Question 62Question
62. Interrupt Handler places the byte in a garage area
Answer
• True
• False
Question 63Question
63. Interrupt handler cannot be interrupted by means of a better precedence interrupt
Answer
• True
• False
Question 64Question
64. Interrupt handler transfers regulate again to previous task
Answer
• True
• False
Question 65Question
65. Which of the following are commonplace behaviors of pc viruses? I. Self-replication; II. Infliction of bodily injury to the laptop's hardware; III Unwarranted file removal
Answer
• I and II simplest
• II and III most effective
• I and III handiest
• I, II, and III
Question 66Question
66. Which of the following laptop attack methods does not require a hardware or instrument device?
Answer
• Port scanning
• Social engineering
• Spoofing
• Packet sniffing
Question 67Question
67. What does a packet sniffer do?
Answer
• Captures data packets which might be transmitted via a network
• Renders a pc community unusable
• Causes one pc to impersonate some other
• Converts encrypted passwords to plain text
Question 68Question
68. A computer assault that makes use of handler computer systems to keep an eye on agent computer systems to assault a target pc is known as a _____ assault.
Question 69Question
69. Attacking a pc by means of sending it an excessive quantity of e mail messages is referred to as
Answer
• Smurfing
• Spoofing
• Spamming
• Pinging
Question 70Question
70. With admire to security on the Internet, what is the objective of digital signatures?
Answer
• To test the id of a message sender
• To request receipts for all sent messages
• To put up anonymous messages to bulletin boards
• To encrypt mail messages
Question 71Question
71. One of the most commonplace applications of encryption is transmitting knowledge securely over the Web is ______
Question 72Question
72. Which encryption approach uses a pair of virtual keys?
Question 73Question
73. Which of the following causes is (are) valid for why "IITU" is a nasty password? I. It is a word from the dictionary; II It does no longer contain numbers and symbols; III. It is the title of an institution
Answer
• I and II simplest
• II and III
• I, II, and III
• I and III most effective
Question 74Question
74. Embedding different types of knowledge, comparable to sound and graphics, within Internet piece of email requires which of the following formats for use for encoding the data?
Answer
• TCP/IP
• GIF
• MIME
• Encryption
Question 75Question
75. ISPs can be accessed through which of the following techniques? I. Telephone lines II. Cable television techniques III. Personal satellite tv for pc dishes
Answer
• I most effective
• I and II handiest
• I, II, and III
• II simplest
Question 76Question
76. The numbers in IP addresses are separated by
Answer
• issues
• sessions
• colons
• commas
Question 77Question
77. What knits the Internet in combination and permits data to shuttle smoothly over the communications hyperlinks provided by way of NSPs international?
Answer
• FTP
• TCP/IP
• HTTP
• URL
Question 78Question
78. What networks are useful in environments where wiring is tough to put in?
Answer
• Twisted pair
• Coaxial
• Wirefree
• Wireless
Question 79Question
79. What top-level domain belongs to computer systems in the category of commercial companies?
Answer
• bus
• com
• org
• bsn
Question 80Question
80. An IP cope with is a suite of 4 numbers between 0 and
Answer
• 128
• 24
• 16
• 255
Question 81Question
81. What top-level area belongs to computers in the class of networks and ISPs?
Answer
• adm
• int
• internet
• html
Question 82Question
82. What top-level area belongs to computer systems in the category of skilled and nonprofit organizations?
Answer
• com
• npo
• org
• edu
Question 83Question
83. Which of the following is (are) true about thick and thin purchasers in a client-server device? I. Thin clients carry out quite little paintings. II.A Web browser is an example of a thick client. III.A hand held computer is a regular example of a skinny Jstomer.
Answer
• I and III simplest
• I, II, and III
• III only
• I simplest
Question 84Question
84. When you ship an e mail to anyone, it is sent to
Answer
• the sender's e-mail server
• the sender's e mail Jstomer
• the recipient's computer
• the recipient's electronic mail server
Question 85Question
85. Using a(n) _____ protocol, the sender and the receiver are synchronized by way of a signal called a clock
Answer
• synchronous
• asynchronous
• analog
• block
Question 86Question
86. The bandwidth (пропускная способность) of a(n) _____ signal is generally measured in bits in line with 2nd.
Answer
• video
• digital
• satellite tv for pc
• analog
Question 87Question
87. What type of cable is normally used to carry cable tv indicators because its high capability allows it to carry indicators for greater than One hundred television channels simultaneously?
Answer
• BNC
• STP
• UTP
• Coaxial
Question 88Question
88. A communications _____ is a bodily trail or frequency for a signal transmission.
Answer
• band
• channel
• protocol
• bridge
Question 89Question
89. Which of the following phrases represents the transmission capacity of a communications channel?
Answer
• Indexing
• Frequency
• Bandwidth
• Resolution
Question 90Question
90. Which of the following are frequently used community topologies? I.Star II. Ring III.Modems
Answer
• I and II simplest
• III simplest
• II and III best
• I and III most effective
Question 91Question
91. When two devices keep up a correspondence, they should agree on protocols for I.beginning and ending a transmission II.spotting transmission errors III.determining the charge of information transmission
Answer
• II and III most effective
• I and II simplest
• I, II, and III
• I and III handiest
Question 92Question
92. Modems switch data between computer systems by way of converting between
Answer
• analog and virtual
• Ethernet and virtual
• video and sound
• analog and Ethernet
Question 93Question
93. Which of the following are potential communications hyperlinks? I. Telephone wiring II. Fiber-optic cable III. Satellite
Answer
• I and II only
• II most effective
• I, II, and III
• III best
Question 94Question
94. What sort of waves provides wi-fi transmission for cell communications, equivalent to cellular phones, and for desk bound communications the place it is tough or impossible to put in cabling, equivalent to in far flung, geographically rugged areas?
Answer
• Infrared
• Radio
• UTP
• Line-of-sight
Question 95Question
95. Which of the following are protocols associated with Internet e-mail? I.SMTP II.POP III. FTP
Answer
• I and III best
• I and II simplest
• I, II, and III
• II and III simplest
Question 96Question
96. Which of the following services and products is also equipped via an ISP? I. A temporary IP address II. An account on the ISP's e mail server III. Web webhosting of the buyer's Web page
Answer
• II and III most effective
• I, II, and III
• I and II best
• I and III most effective
Question 97Question
97. What is a backbone supplier (also known as a Network Service Provider)?
Answer
• A gaggle of small suppliers that work in combination to provide Internet access
• Any corporate that provides Web-based products and services
• A provider of nationwide and international network links for the Internet
• The greatest supplier of Internet get entry to inside a particular area
Question 98Question
98. With recognize to the Internet, routers are used to connect
Answer
• a pc and a modem
• a pc to the Internet
• any two computer systems
• different networks of computer systems
Question 99Question
99. With appreciate to the Internet, corporations wish to sign in a unique area identify when
Answer
• buying a brand new modem
• setting up an electronic commerce Web web site
• buying a new laptop
• connecting a new laptop to the Internet
Question 100Question
100. Which of the following are tasks carried out through a Web browser? I. Sending a request for a selected file to a server II. Formatting and exhibiting a document gained from a server III. Sending further requests to the server to retrieve any graphics elements similar to icons or pictures for a requested record
Answer
• I, II, and III
• I and III best
• II and III best
• I and II only
Question 101Question
101. What is the protocol used to switch Web pages?
Answer
• html
• http
• udp
• ftp
Question 102Question
102. What is the name of the Internet protocol used to make sure messages are reliably transmitted and received by the destination computer?
Answer
• TCP
• ISP
• IP
• POP
Question 103Question
103. The World Wide Web is
Answer
• the same as the Internet
• a device package deal
• a shopper/server utility program used to get admission to the Internet
• a collection of Web servers throughout the global
Question 104Question
104. When an absolutely explicit URL similar to http://www.iitu.kz is equipped to an Internet browser, "http" refers to the identify of the
Answer
• domain where the Web server is living
• language in which the web page is written
• Web server containing the Web web page
• protocol used to accomplish the operation
Question 105Question
105. IP host addresses on the Internet are composed of which of the following?
Answer
• A 24-bit number
• A unmarried decimal number starting from Zero to 255
• Four decimal numbers starting from 0 to 255
• Any number of lowercase alphanumeric characters
Question 106Question
106. After gaining access to a computer device, hackers will generally do which of the following? I. Set up keep an eye on for additional attacks II.Take, adjust, or delete data III. Use the laptop gadget resources
Answer
• I, II, and III
• II and III only
• I and II only
• II only
Question 107Question
107. Which of the following is (are) true referring to community bandwidth attacks? I.They can be used to release a denial of service attack. II.They may cause a Web web site to transform unavailable. III.They paintings by flooding a network with visitors.
Answer
• I and II handiest
• II and III best
• I, II, and III
• I and III only
Question 108Question
108. Which of the following pc assaults is spoofing?
Answer
• Using a program to decrypt passwords
• Monitoring a community to intercept knowledge
• Using one laptop to impersonate any other
• Accessing an unprotected port on a computer
Question 109Question
109. The method of cracking a password through trying all imaginable alphanumeric combos is known as a _____ assault
Answer
• port scanning
• dictionary
• brute drive
• man-in-the-middle
Question 110Question
110. After loading a word processor record from a floppy, a consumer's computer starts to show symptoms of being inflamed by way of a deadly disease.Which of the following is true concerning this case?
Answer
• The document text will have contained an embedded virus.
• The phrase processing program tests all documents for viruses sooner than the usage of them, so the supply the virus used to be no longer the file.
• A record can not include a deadly disease, so the source of the virus was once now not the phrase processing record.
• The document may have contained a macro that contained a virus.
Question 111Question
111. Which of the following is electronic mail spoofing?
Answer
• Sending massive quantities of unsolicited e mail
• Sending viruses through electronic mail
• Modifying an electronic mail header to faux the e mail source
• Intercepting e-mail via monitoring a network
Question 112Question
112. Which of the following is (are) true relating to a Smurf assault? I.It can use the ping command to perform the assault.II.It lets in a hacker to scouse borrow information from a pc.III.It uses different computer systems on a network to attack a unmarried pc
Answer
• II and III simplest
• I and III only
• I and II handiest
• I, II, and III
Question 113Question
113. Which of the following consequences of executing a deadly disease on a PC is (are) imaginable? I.Files appear to be lacking or deleted from the laborious disk. II.Either the PC gadget board or a disk power is physically damaged. III.There is low pc memory on disks.
Answer
• II and III only
• I most effective
• I and III only
• I, II, and III
Question 114Question
114. Which of the following is (are) true relating to laptop security attacks? I. Hackers may cause home computer systems to assault different computer systems. II. Organizations in most cases enjoy extra laptop security breaches from inner body of workers than from people external to the organization.
Answer
• I only
• II best
• None
• I and II √
Question 115Question
115. Which of the following is (are) true referring to network connectivity attacks? I. A community connectivity attack can also be completed via producing numerous half-open connections to the target computer. II. A network connectivity assault may also be achieved by means of producing over the top quantity of traffic on the goal community.
Answer
• I and II
• None
• I simplest
• II only
Question 116Question
116. Which of the following can be used to prevent social engineering assaults? I. Verifying identities of folks asking for sensitive knowledge II. Using information encryption III. Being conscious of laptop fraud schemes
Answer
• II and III simplest
• I, II, and III
• I and III simplest
• III best
Question 117Question
117. Which of the following is (are) true about encryption of information? I.Given the excessive pace and low price CPUs available, even the most complicated encrypted knowledge is not completely secure for a long period of time. II.The more bits in the key of the encryption set of rules, the more difficult it is to damage the encryption. III.In public key encryption, the sender and the receiver of encrypted knowledge both use the similar key worth to encrypt and decrypt the data.
Answer
• I and III only
• I, II, and III
• II and III best
• I and II handiest
Question 118Question
118. How does a receiver of an encrypted message verify that the message originated from the sender?
Answer
• The receiver compares the message with the decrypted signature of the sender.
• The receiver compares the message hashed with the sender's signature.
• The receiver compares the message hashed with the decrypted signature of the sender.
• The receiver compares the gained message with the sender's signature.
Question 119Question
119. To encrypt a message using public-key encryption scheme, which of the following must be performed?
Answer
• Encrypt the message the use of the receiver's inner most key.
• Encrypt the message using the sender's deepest key.
• Encrypt the message using the receiver's public key.
• Encrypt the message the usage of the sender's public key.
Question 120Question
120. Which of the following will have to be integrated on a virtual certificates? I. The title of the entity and the expiration date II. The number of times the certificates has been considered III. The digital signature of the certificate authority
Answer
• II and III most effective
• I, and III
• I, II, and III
• I and II best
Question 121Question
121. Encryption is used to
Question 122Question
122. Of the following processes, which easiest characterizes the authentication process?
Answer
• Logging into a secure website
• Verifying that device that is in use is now not a pirated replica
• Authorizing use of some useful resource via a particular person
• Establishing a person identity
Question 123Question
123. Which of the following is (are) true regarding computer network intrusion detection techniques? I.They examine site visitors against a database of known attack signatures.II. They can generate false alarms.
Answer
• I best
• None
• II only
• I and II
Question 124Question
124. The security of knowledge may also be violated through which of the following? I.Malicious acts II.User errors III.Disasters
Answer
• II and III simplest
• I, II, and III
• I most effective
• I and III best
Question 125Question
125. Which of the following is (are) true regarding pc safety? I.Applying all to be had security measures might negatively impact device usability. II.Most intrusions result from exploitation of identified vulnerabilities that stay unpatched.
Answer
• None
• I and II
• II best
• I only
Question 126Question
126. Good laptop safety practices include which of the following? I.Never store online. II.Remove extra RAM from computers. III.Avoid sending email at evening.
Answer
• II and III best
• I and II best
• I, II, and III
• None
Question 127Question
127. Examples of network monitoring gear come with which of the following? I.Packet sniffers II.Antivirus software III.Security patches
Answer
• I best
• I and III best
• II best
• I, II, and III
Question 128Question
128. Which of the following is (are) true of anti-virus instrument? I.Typically, it scans each files and reminiscence. II.It is ineffective until it is updated regularly. III.It protects in opposition to network bandwidth assaults.
Answer
• II most effective
• I and II simplest
• I, II, and III
• I and III most effective
Question 129Question
129. Which of the following is (are) essential to ensuring computer safety? I.Keep applications and working system updated with the latest security patches. II.Replace motherboard batteries steadily. III.Use firewalls
Answer
• III most effective
• I, II, and III
• I and III simplest
• II and III handiest
Question 130Question
130. Which of the following statements is (are) true about sensible playing cards? I.They are vulnerable to Internet attacks. II.They can encrypt knowledge.
Answer
• II handiest
• None
• I and II
• I handiest
Question 131Question
131. Which of the following is right kind with appreciate to customers offering extremely personal knowledge throughout the Internet through digital commerce transactions?
Answer
131. Which of the following is proper with appreciate to consumers providing extremely private information throughout the Internet via digital trade transactions?
• Transactions are somewhat secure between the person and a company's Web website if the data is encrypted.
• It is unattainable for any one to see the transaction on the Internet excluding for the supposed Web web page accomplishing the transaction.
• If a transaction is encrypted, any unauthorized events intercepting the transaction will take ten or more years to decrypt the knowledge.
Question 132Question
132. Which of the following comparisons between public-key encryption schemes and private-key encryption schemes is true?
Answer
• It takes longer to transmit encrypted data the use of private-key encryption schemes than public-key encryption schemes.
• It is more uncomplicated to decrypt knowledge the usage of private-key encryption schemes than public-key encryption schemes.
• Private-key encryption schemes are extra protected than public-key encryption schemes.
• Public-key encryption schemes involve more computations than private-key encryption schemes.
Question 133Question
133. Which of the following is true about private-key encryption schemes?
Answer
• The sender and the receiver have different private keys.
• The sender and the receiver use the identical inner most key.
• The sender and the receiver have two inner most keys, one for encryption and one for decryption.
• The sender will have to notify the receiver sooner than sending a message.
Question 134Question
134. Which of the following is (are) true relating to network monitoring equipment? I. They should handiest be put in in a single location on a network. II. Monitoring best must be finished when an issue is suspected.
Answer
• None
• I and II
• II best
• I simplest
Question 135Question
135. Anti-virus instrument with updated virus definitions most often protects towards which of the following? I. Worms II. Trojan horse methods
Answer
• I simplest
• None
• I and II
• II only
Question 136Question
136. Which of the following trail formats can be utilized to specify the value of the href attribute of the<xmp><a></xmp> tag? I. An absolute path II. A relative path
Answer
• I and II
• I only
• None
• II most effective
Question 137Question
137. ANSI stands for
Answer
• All National Standard of Information
• American National System Information
• American National Standards Institute √
• All National Standards Institute
Question 138Question
138. _________ receives input from the user and processes this enter thru the laptop to produce output.
Answer
• Hardware
• Software
• Computer gadget
• Network gadget
Question 139Question
139. ________________is the prolong between the time when the reminiscence device receives an cope with and the time when the first bit of information is available from the memory software.
Answer
• Latency
• RAM
• Capacity
• DRAM
Question 140Question
140. Who designed a general-purpose calculating device, the Analytical Engine?
Answer
• Augusta Ada King
• Gordon Moore
• Jack Kilby
• Charles Babbage
Question 141Question
141. PCI stands for
Answer
• Peripheral Component Interconnect
• Peripheral Computer Internet
• Peripheral Component Interaction
• Peripheral Computer Interaction
Question 142Question
141.1. Convert the binary number 01011 to decimal
Answer
• 11
• 110
• 1011
• 10
Question 143Question
142. Convert the decimal quantity 63 to binary
Answer
• 111111
• 110111
• 0110111
• 11011111
Question 144Question
143. Convert the hexadecimal textual content D9 to binary
Answer
• 1101 1001
• 1010 0111
• 1110 0100
• 1110 1101
Question 145Question
144. Convert this binary number 010101 to decimal
Answer
• 21
• 20
• 25
• 22
Question 146Question
145. Convert this hexadecimal number 8F to decimal
Answer
• 143
• 142
• 141
• 140
Question 147Question
146. Convert this decimal number 125 to binary
Answer
• 1111101
• 1101011
• 1111011
• 1101001
Question 148Question
147. Convert this hexadecimal quantity A3 to binary
Answer
• 1010 0011
• 0110 1111
• 0110 1100
• 0111 1111
Question 149Question
148. Convert this decimal number 117 to hexadecimal
Answer
• 75
• 0111 1111
• 85
• 0110 1111
Question 150Question
150. Convert this binary number 10001001 to hexadecimal
Answer
• 89h
• 99a
• 0111 0111
• 89
Question 151Question
151. Match the differing kinds of buses
Answer
Front side bus Bus on the motherboard that transfers information between the CPU and the chipset
PCI Predominant bus for newer systems
AGP Very speedy, running at 66 MHz with a 32-bit phrase size, and transferring 266 MBps
IDE bus Transfers data between garage devices and the chipset
USB Not rated with a MHz velocity; rated by peak switch charge
FireWire High switch charge designed for high-speed exterior peripherals similar to DVD-ROM and arduous disk drives
Question 152Question
152. This implies that each and every layer needs only a restricted amount of wisdom to do its process
Answer
• Encapsulation
• Abstraction
• Deduction
• E-learning
Question 153Question
153. What is the use of a variety of modern data and applied sciences through govt to fortify efficiency, carrier and many others. i.e. Internet,mobile,native area network?
Answer
• E-Commerce
• E-Learning
• E-Governance
• E-Bussiness
Question 154Question
154. What is referring to knowledge in digital shape, which is logically associated with other knowledge in digital shape and which is used by the signatory to sign?
Answer
• Cryptographic
• Electronic signature
• Telegraph signatures
• Faxed signatures
Question 155Question
155. Components of a Multimedia System (fit them with their examples):
Answer
Capture units Video Camera, Video Recorder, Audio Microphone, Keyboards, mice, graphics tablets, three-D enter devices, tactile sensors, VR units. Digitising/Sampling Hardware
Storage Devices Hard disks, CD-ROMs, Jaz/Zip drives, DVD
Communication Networks Ethernet, Token Ring, FDDI, ATM, Intranets, Internets
Computer Systems Multimedia Desktop machines, Workstations, MPEG/VIDEO/DSP Hardware
Display Devices CD-quality audio system, HDTV,SVGA, Hi-Resolution screens, Color printers
Question 156Question
156. _____________provides us a means by way of which we will be able to get admission to the packages as utilities, over the Internet. It permits us to create, configure, and customise packages online.
Answer
• Cloud computing
• E-commerce
• E-learning
• Data facilities
Question 157Question
157. What is a time period for all sorts of technology-enhanced studying (TEL), where know-how is used to beef up the studying process?
Answer
• Cloud computing
• E-commerce
• E-learning
• Data centers
Question 158Question
158. Match the sorts of E-Commerce
Answer
Business-to-Business(B-to-B) Is a site that is dedicated to exchange of data, items and services and products to different business fairly than final customers.
Business-to-Customer(B-to-C) Is a website the place all transactions happen between a trade area and the final consumer
Consumers-to-businesses (C2B) Consumers make identified a specific need for a product or service, and suppliers compete to provide the product or service to consumers.
Consumer-to-consumer Is a website online the place all the transactions take place between a consumer and the web page acting asa platform that brings the buyer and the supplier in combination
Question 159Question
159. Match the Layers of instrument 1 2 3 4 5 6 7 8 9 10
Question 160Question
160. Match the definitions of the sorts of the interfaces
Answer
Command line interface the person types a command on the keyboard, the computer executes the command and supplies textual output
Graphical user interface makes use of windows, icons, menus and guidelines (WIMP) which will also be manipulated through a mouse (and frequently to an extent by a keyboard as neatly).
Question 161Question
161. What is a continuing representation, analogous to the exact information it represents?
Answer
• Analog information
• Data
• Information
• Knowledge
Question 162Question
162. What is the expertise that uses computing with high speed communication links to spread data from one place to some other
Question 163Question
163. _______are complicated units, coping with a limiteless array of data classes
Answer
• Information
• Data
• Knowledge
• Computing systems
Question 164Question
164. In cryptography, what is cipher? I. algorithm for appearing encryption and decryption II. encrypted message
Answer
• Only I
• Only II
• Both I and II
• None
Question 165Question
165. In asymmetric key cryptography, the inner most key is saved via
Question 166Question
166. ____________is a collection of laptop directions or information.
Answer
• Software
• Hardware
• Disk pressure
• Memory
Question 167Question
167. What supplies connections among computers to permit computer systems to share knowledge (e.g. paperwork), hardware (e.g. printers), and tool assets (e.g. application programs)?
Answer
• Drivers
• CPU
• Network
• Memory
Question 168Question
168. What is the IDE (Integrated Drive Electronics) cable
Answer
• Rolls knowledge glide amongst part
• Transfers information from garage gadgets to the motherboard
• Stores knowledge permanently
• Serves as a socket on the motherboard
Question 169Question
169. What permit users to automate sequences of movements they perform regularly?
Answer
• Script
• Macros
• Script and macros
• None
Question 170Question
170. What is the Trap?
Answer
• An match precipitated by means of an exterior sign
• Keeps monitor of all the processes operating
• Places the byte in a storage space
• A sign informing a program that an event has happened
Question 171Question
171. _________ is the rapid show of a sequence of images of 2-D or three-D art work or model positions to be able to create an phantasm of movement.
Answer
• Text
• Animation
• Video conferencing
• Picture
Question 172Question
172. How we call the process, when every person has a single view of the to be had assets, independently of how they are arranged in terms of bodily units?
Question 173Question
173. Indicate working models for cloud computing:
Question 174Question
174. Which of the following cloud deployment fashions lets in programs and services and products to be available inside an organization?
Answer
• Public Cloud
• Community Cloud
• Private Cloud
• None
Question 175Question
175. What are the Service Models?
Answer
• They are the reference fashions on which the Cloud Computing is based
• They permit methods and services and products to be obtainable by way of group of organizations
• They allow programs and services and products to be easily obtainable to the general public
• None
Question 176Question
176. What supplies access to basic assets akin to bodily machines, digital machines, digital garage?
Answer
• SaaS
• IaaS
• PaaS
• None
Question 177Question
177. What supplies the runtime setting for packages, construction & deployment gear?
Answer
• SaaS
• IaaS
• PaaS
• None
Question 178Question
178. Which style allows the usage of tool applications as a carrier to finish customers?
Answer
• SaaS
• IaaS
• PaaS
• None
Question 179Question
179. What supplies a uniform abstraction of the underlying physical gadget?
Answer
• Abstraction
• Virtualization
• Hypervision
• None
Question 180Question
180. What has the identical form as a URL but won't determine a real location on the Internet?
Answer
• URI
• URN
• URL
• DNS
0 Comment to "Which Of The Following Is The Correct Sequence Of Processes..."
Post a Comment