Tuesday, May 4, 2021

Which Of The Following Is The Correct Sequence Of Processes...

Please select the best answer from the choices provided T F. Imagine you have been convicted of a crime but you believe that procedural due process was not followed.What will be the result of the SELECT statement and what will display? SELECT last_name, salary, salary + 300 FROM employees; (1) Display the Which of the following best describes the meaning of the LIKE operator? (3) Match a character pattern. You need to change the default sort order of the...employer; employee. 2. The owner is personally liable _ the debts incurred by his firm. of. MEVE T. ML SABAR She has been Karting 4 Lyubov Andreeva wants to become a Formula 1 Champion of Kazakhstan four times but hopes to drive racing cars i … n the future.Consider the following 2D dataset: Which of the following figures correspond to possible values that PCA may return for (the first eigen vector / first principal component)? • Which of the following are recommended applications of PCA? Select all that apply.The process of arranging, selecting, and ordering is design. Comment. Complaint. At the top of Spanish colonial society were the A. creoles.

PDF Final Exam Semester 1

3. Which of the following operations is performed more efficiently by doubly linked list than by singly linked list? Given the representation, which of the following operation can be implemented in O(1) time?...the procedures followed while selecting the sample so that the results of the survey are seen arrange the elements of the population in some order and select terms at regular intervals from the list. How: Quota sampling is the non-probability equivalent of stratified sampling that we discussed...decline 5. The movement of the vertical _____ curve to the _____ reflects the increase in potential output on account of the development of new 8. A stagflation, simultaneous increase in both unemployment and inflation, is most likely to be the result of a(n): a. a simultaneous outward shift of...to explain the results of assessments administered to ensure inclusion in general education classes to explain the availability of resources through the local 21) All of the following are general factors that must be considered by team members developing an IEP except A) the communication needs of the...

PDF  Final Exam Semester 1

УМОЛЯЮ ПОМОГИТЕ ПОЖАЛУЙСТА! Очень срочное и важное...

The ORDER BY keyword is used to sort the result-set in ascending or descending order. ORDER BY Several Columns Example 2. The following SQL statement selects all customers from the "Customers" table, sorted ascending by the "Country" and descending by the "CustomerName" columnWhich of the following is generally a method to determine whether or not to include certain details into your research article? Which of the following is usually beyond the scope of the results section of a quantitative research report?No, it is the result of a process scientifically known as oxidation. Ordering your jewelry online can prove to be easy and efficient while getting a great product. Before ordering, look for deals and codes that can result in free shipping.8. The accumulator is the special memory cell in the arithmetic/logic unit in which the result is formed before it is transferred back to the memory unit. Answer the following questions: 1. What is the general purpose and function of the CPU?With this strategy the scheduler arranges processes with the least estimated processing time remaining to be next in the queue. Order of time unit allocation is based upon process arrival time, similar to FIFO. If Time-Slice is large it becomes FCFS /FIFO or if it is short then it becomes SJF/SRTF.

Question 1

Question

1. What is the number one concern about cloud computing?

Answer

• Too dear

• Security issues

• Too many platforms

• Accessibility

Question 2

Question

2. Google Docs is a type of cloud computing

Answer

True

False

Question 3

Question

3. Which one of those is not a cloud computing pricing model

Answer

• Pay Per Use

• Subscription

• Ladder

• Perpetual License

Question 4

Question

4. Which of these is now not a big sort of cloud computing usage

Answer

• Hardware as a service

• Platform as a provider

• Software as a provider

• Infrastructure as a carrier

Question 5

Question

5. An Internet connection is essential for cloud computing interaction

Answer

True

False

Question 6

Question

6. "Cloud" in cloud computing represents what

Answer

Wireless

Hard drives

People

Internet

Question 7

Question

7. Which of these will have to an organization imagine sooner than implementing cloud computing expertise. I: Employee pride, II: Potential price reduction, III: Information sensitivity

Answer

• Only I

• Only II

• Only III

• I, II, and III

Question 8

Question

8. What precisely is cloud computing

Answer

• A option to arrange desktop computers

• Lightweight tool that takes up little house on a hard pressure

• Computing sources that can be accessed on call for, like electricity from a utility

• The World Wide Web

Question 9

Question

9. What widely used provider is constructed on cloud-computing expertise? I: Twitter, II: Skype, III: Gmail, IV: YouTube.

Answer

• Only I

• Only II

• Only III and I

• I, II, III and IV

Question 10

Question

10. Cloud computing embraces many concepts that were in the past touted as the next big thing in data know-how. Which of these is no longer an antecedent(предшествующее) of the cloud?

Question 11

Question

11. What does SQL stand for

Answer

• Structured Query Language

• Strong Question Language

• Structured Question Language

• Structured Querty Language

Question 12

Question

12. Which SQL remark is used to extract knowledge from a database?

Answer

• Select

• GET

• OPEN

• Extract

Question 13

Question

13. Computerized representations of models and attributes of actual or simulated entities are?

Answer

• Data

• Knowledge

• Information

• Database

Question 14

Question

14. Representation of the results of a computational process, comparable to statistical research, or the transcripts of some meanings assigned via human beings is

Answer

• Data

• Knowledge

• Information

• Database

Question 15

Question

15. Representation of the results of a computer-simulated cognitive process, corresponding to belief, studying, affiliation, and reasoning is

Answer

• Data

• Knowledge

• Information

• Database

Question 16

Question

16. Continuous representation, similar to the precise data it represents is

Answer

• Analog data

• Digital knowledge

• Continuous data

• Discrete information

Question 17

Question

17. A discrete illustration, breaking the information up into separate(discrete) components is

Answer

• Analog data

• Digital data

• Continuous knowledge

• Discrete data

Question 18

Question

18. Two bits can represent

Answer

• Four issues

• Two issues

• Eight things

• Ten issues

Question 19

Question

19. The extended model of the ASCII persona set is no longer sufficient for world use

Answer

• Unicode

• Barcode

• EBCDIC

• Binary code

Question 20

Question

20. The Unicode personality set uses _________ in step with personality

Answer

• 16 bits

• 8 bits

• Four bits

• 32 bits

Question 21

Question

21. The first 256 characters in the Unicode character set correspond exactly to the prolonged ASCII persona set

Answer

True

False

Question 22

Question

22. List the ranges of computer systems from height to down

Answer

• users, application instrument, operating device instrument, and the hardware system

• software tool, running machine instrument, users, and the hardware gadget

• software software, customers,running device device, and the hardware system

• hardware system, running device tool, utility instrument, and customers

Question 23

Question

23. List the ranges of computer techniques from bottom to up

Answer

• customers, application instrument, working machine device, and the hardware gadget

• application tool, running machine instrument, customers, and the hardware machine

• utility instrument, customers,running machine device, and the hardware gadget

• hardware device, operating device tool, application instrument, and customers

Question 24

Question

24. Which device refers to application tool?

Answer

• Microsoft Word

• Microsoft Windows

• Unix

• Mac OS

Question 25

Question

25. Which tool refers to software software?

Answer

• Internet Explorer

• Microsoft Windows

• Unix

• Mac OS

Question 26

Question

26. Which instrument refers to utility software?

Question 27

Question

27. Which device refers to software device?

Answer

• Adobe Acrobat Reader

• Microsoft Windows

• Unix

• Mac OS

Question 28

Question

28. Which tool refers to device device?

Question 29

Question

29. Which tool refers to system device?

Question 30

Question

30. Which software refers to machine instrument?

Question 31

Question

31. What is the master controller for all activities that take place inside of a pc

Answer

• Operating System

• Application Software

• DBMS

• Word processor

Question 32

Question

32. What does ship data from a computer over a network, and collects incoming information sent by way of other computer systems

Question 33

Question

33. What is a device that permits data from a computer to be transmitted by the use of phone lines or tv cable strains to succeed in different computer systems on the Internet?

Question 34

Question

34. What was the first pc prototype used vacuum tubes?

Question 35

Question

35. What is the primary part that executes directions stored in the major reminiscence?

Answer

• Microprocessor

• Main memory

• Storage device

• Peripheral

Question 36

Question

36. What does store directions to be performed by way of the microprocessor?

Answer

• Microprocessor

• Main reminiscence

• Storage software

• Peripheral

Question 37

Question

37. What do store knowledge permanently even if the pc is grew to become off?

Answer

• Microprocessor

• Main memory

• Storage tool

• Peripheral

Question 38

Question

38. What enable data input and output?

Answer

• Microprocessor

• Main reminiscence

• Storage tool

• Peripheral

Question 39

Question

39. What acts as the traffic cop controlling the glide of data and coordinating interactions amongst parts in the machine?

Answer

• Microprocessor

• Main reminiscence

• Storage device

• Chipset

Question 40

Question

40. What does supply sockets for microprocessor and reminiscence chips, slots for circuit boards, and the circuitry that enable electric signals to commute from component to component?

Answer

• Motherboard

• Power provide

• Microprocessor

• Chipset

Question 41

Question

41. What does supply electric energy to the computer device?

Answer

• Motherboard

• Power supply

• Microprocessor

• Chipset

Question 42

Question

42. What does process directions stored in main memory?

Answer

• Motherboard

• Power provide

• Microprocessor

• Chipset

Question 43

Question

43. What does serve as a socket on the motherboard into which a diffusion card perhaps inserted?

Answer

• Expansion slot

• Motherboard

• Power supply

• Microprocessor

Question 44

Question

44. What does enable a computer to regulate peripheral units reminiscent of the observe and the microphone?

Answer

• Expansion card

• Motherboard

• Power provide

• Microprocessor

Question 45

Question

45. What does keep an eye on information drift amongst components?

Answer

• Chipset

• Motherboard

• Power supply

• Microprocessor

Question 46

Question

46. What does switch information from garage units to the motherboard?

Question 47

Question

47. What does store data permanently (even after the laptop is became off)?

Answer

• Disk drives

• Motherboard

• Power supply

• Microprocessor

Question 48

Question

48. What step of the fetch-execute cycle allows the keep an eye on unit of the CPU to decode the instruction and direct the vital data to be moved from reminiscence to the ALU?

Answer

• Interpret

• Fetch

• Execute

• Store

Question 49

Question

49. What science research learn how to refine the design of products to optimize them for human use?

Answer

• Ergonomics

• HCI

• Economics

• ICT

Question 50

Question

50. What DOS command is used to change the operating listing?

Answer

• сd

• md

• rd

• ren

Question 51

Question

51. What DOS command is used to make a new directory?

Answer

• cd

• md

• rd

• ren

Question 52

Question

52. What DOS command is used to take away an existing empty directory?

Answer

• cd

• md

• rd

• ren

Question 53

Question

53. What DOS command is used to rename a file inside a directory?

Answer

• cd

• md

• rd

• ren

Question 54

Question

54. The BIOS initiates the POST (Power-On Self Test) collection

Answer

• True

• False

Question 55

Question

55. The BIOS permits the video card

Answer

• True

• False

Question 56

Question

56. The BIOS counts and tests reminiscence

Answer

• True

• False

Question 57

Question

57. The BIOS assessments for expansion cards and adapters and initializes them

Answer

• True

• False

Question 58

Question

58. The BIOS follows a search order to seek out the Master Boot Record

Answer

• True

• False

Question 59

Question

59. Interrupt Handler saves contents of registers prior to it saves the check in for its personal functions

Answer

• True

• False

Question 60

Question

60. Interrupts can nest infinitely (гнездиться бесконечно)

Answer

• True

• False

Question 61

Question

61. Interrupt Handler accepts the byte of incoming data

Answer

• True

• False

Question 62

Question

62. Interrupt Handler places the byte in a garage area

Answer

• True

• False

Question 63

Question

63. Interrupt handler cannot be interrupted by means of a better precedence interrupt

Answer

• True

• False

Question 64

Question

64. Interrupt handler transfers regulate again to previous task

Answer

• True

• False

Question 65

Question

65. Which of the following are commonplace behaviors of pc viruses? I. Self-replication; II. Infliction of bodily injury to the laptop's hardware; III Unwarranted file removal

Answer

• I and II simplest

• II and III most effective

• I and III handiest

• I, II, and III

Question 66

Question

66. Which of the following laptop attack methods does not require a hardware or instrument device?

Answer

• Port scanning

• Social engineering

• Spoofing

• Packet sniffing

Question 67

Question

67. What does a packet sniffer do?

Answer

• Captures data packets which might be transmitted via a network

• Renders a pc community unusable

• Causes one pc to impersonate some other

• Converts encrypted passwords to plain text

Question 68

Question

68. A computer assault that makes use of handler computer systems to keep an eye on agent computer systems to assault a target pc is known as a _____ assault.

Question 69

Question

69. Attacking a pc by means of sending it an excessive quantity of e mail messages is referred to as

Answer

• Smurfing

• Spoofing

• Spamming

• Pinging

Question 70

Question

70. With admire to security on the Internet, what is the objective of digital signatures?

Answer

• To test the id of a message sender

• To request receipts for all sent messages

• To put up anonymous messages to bulletin boards

• To encrypt mail messages

Question 71

Question

71. One of the most commonplace applications of encryption is transmitting knowledge securely over the Web is ______

Question 72

Question

72. Which encryption approach uses a pair of virtual keys?

Question 73

Question

73. Which of the following causes is (are) valid for why "IITU" is a nasty password? I. It is a word from the dictionary; II It does no longer contain numbers and symbols; III. It is the title of an institution

Answer

• I and II simplest

• II and III

• I, II, and III

• I and III most effective

Question 74

Question

74. Embedding different types of knowledge, comparable to sound and graphics, within Internet piece of email requires which of the following formats for use for encoding the data?

Answer

• TCP/IP

• GIF

• MIME

• Encryption

Question 75

Question

75. ISPs can be accessed through which of the following techniques? I. Telephone lines II. Cable television techniques III. Personal satellite tv for pc dishes

Answer

• I most effective

• I and II handiest

• I, II, and III

• II simplest

Question 76

Question

76. The numbers in IP addresses are separated by

Answer

• issues

• sessions

• colons

• commas

Question 77

Question

77. What knits the Internet in combination and permits data to shuttle smoothly over the communications hyperlinks provided by way of NSPs international?

Answer

• FTP

• TCP/IP

• HTTP

• URL

Question 78

Question

78. What networks are useful in environments where wiring is tough to put in?

Answer

• Twisted pair

• Coaxial

• Wirefree

• Wireless

Question 79

Question

79. What top-level domain belongs to computer systems in the category of commercial companies?

Answer

• bus

• com

• org

• bsn

Question 80

Question

80. An IP cope with is a suite of 4 numbers between 0 and

Answer

• 128

• 24

• 16

• 255

Question 81

Question

81. What top-level area belongs to computers in the class of networks and ISPs?

Answer

• adm

• int

• internet

• html

Question 82

Question

82. What top-level area belongs to computer systems in the category of skilled and nonprofit organizations?

Answer

• com

• npo

• org

• edu

Question 83

Question

83. Which of the following is (are) true about thick and thin purchasers in a client-server device? I. Thin clients carry out quite little paintings. II.A Web browser is an example of a thick client. III.A hand held computer is a regular example of a skinny Jstomer.

Answer

• I and III simplest

• I, II, and III

• III only

• I simplest

Question 84

Question

84. When you ship an e mail to anyone, it is sent to

Answer

• the sender's e-mail server

• the sender's e mail Jstomer

• the recipient's computer

• the recipient's electronic mail server

Question 85

Question

85. Using a(n) _____ protocol, the sender and the receiver are synchronized by way of a signal called a clock

Answer

• synchronous

• asynchronous

• analog

• block

Question 86

Question

86. The bandwidth (пропускная способность) of a(n) _____ signal is generally measured in bits in line with 2nd.

Answer

• video

• digital

• satellite tv for pc

• analog

Question 87

Question

87. What type of cable is normally used to carry cable tv indicators because its high capability allows it to carry indicators for greater than One hundred television channels simultaneously?

Answer

• BNC

• STP

• UTP

• Coaxial

Question 88

Question

88. A communications _____ is a bodily trail or frequency for a signal transmission.

Answer

• band

• channel

• protocol

• bridge

Question 89

Question

89. Which of the following phrases represents the transmission capacity of a communications channel?

Answer

• Indexing

• Frequency

• Bandwidth

• Resolution

Question 90

Question

90. Which of the following are frequently used community topologies? I.Star II. Ring III.Modems

Answer

• I and II simplest

• III simplest

• II and III best

• I and III most effective

Question 91

Question

91. When two devices keep up a correspondence, they should agree on protocols for I.beginning and ending a transmission II.spotting transmission errors III.determining the charge of information transmission

Answer

• II and III most effective

• I and II simplest

• I, II, and III

• I and III handiest

Question 92

Question

92. Modems switch data between computer systems by way of converting between

Answer

• analog and virtual

• Ethernet and virtual

• video and sound

• analog and Ethernet

Question 93

Question

93. Which of the following are potential communications hyperlinks? I. Telephone wiring II. Fiber-optic cable III. Satellite

Answer

• I and II only

• II most effective

• I, II, and III

• III best

Question 94

Question

94. What sort of waves provides wi-fi transmission for cell communications, equivalent to cellular phones, and for desk bound communications the place it is tough or impossible to put in cabling, equivalent to in far flung, geographically rugged areas?

Answer

• Infrared

• Radio

• UTP

• Line-of-sight

Question 95

Question

95. Which of the following are protocols associated with Internet e-mail? I.SMTP II.POP III. FTP

Answer

• I and III best

• I and II simplest

• I, II, and III

• II and III simplest

Question 96

Question

96. Which of the following services and products is also equipped via an ISP? I. A temporary IP address II. An account on the ISP's e mail server III. Web webhosting of the buyer's Web page

Answer

• II and III most effective

• I, II, and III

• I and II best

• I and III most effective

Question 97

Question

97. What is a backbone supplier (also known as a Network Service Provider)?

Answer

• A gaggle of small suppliers that work in combination to provide Internet access

• Any corporate that provides Web-based products and services

• A provider of nationwide and international network links for the Internet

• The greatest supplier of Internet get entry to inside a particular area

Question 98

Question

98. With recognize to the Internet, routers are used to connect

Answer

• a pc and a modem

• a pc to the Internet

• any two computer systems

• different networks of computer systems

Question 99

Question

99. With appreciate to the Internet, corporations wish to sign in a unique area identify when

Answer

• buying a brand new modem

• setting up an electronic commerce Web web site

• buying a new laptop

• connecting a new laptop to the Internet

Question 100

Question

100. Which of the following are tasks carried out through a Web browser? I. Sending a request for a selected file to a server II. Formatting and exhibiting a document gained from a server III. Sending further requests to the server to retrieve any graphics elements similar to icons or pictures for a requested record

Answer

• I, II, and III

• I and III best

• II and III best

• I and II only

Question 101

Question

101. What is the protocol used to switch Web pages?

Answer

• html

• http

• udp

• ftp

Question 102

Question

102. What is the name of the Internet protocol used to make sure messages are reliably transmitted and received by the destination computer?

Answer

• TCP

• ISP

• IP

• POP

Question 103

Question

103. The World Wide Web is

Answer

• the same as the Internet

• a device package deal

• a shopper/server utility program used to get admission to the Internet

• a collection of Web servers throughout the global

Question 104

Question

104. When an absolutely explicit URL similar to http://www.iitu.kz is equipped to an Internet browser, "http" refers to the identify of the

Answer

• domain where the Web server is living

• language in which the web page is written

• Web server containing the Web web page

• protocol used to accomplish the operation

Question 105

Question

105. IP host addresses on the Internet are composed of which of the following?

Answer

• A 24-bit number

• A unmarried decimal number starting from Zero to 255

• Four decimal numbers starting from 0 to 255

• Any number of lowercase alphanumeric characters

Question 106

Question

106. After gaining access to a computer device, hackers will generally do which of the following? I. Set up keep an eye on for additional attacks II.Take, adjust, or delete data III. Use the laptop gadget resources

Answer

• I, II, and III

• II and III only

• I and II only

• II only

Question 107

Question

107. Which of the following is (are) true referring to community bandwidth attacks? I.They can be used to release a denial of service attack. II.They may cause a Web web site to transform unavailable. III.They paintings by flooding a network with visitors.

Answer

• I and II handiest

• II and III best

• I, II, and III

• I and III only

Question 108

Question

108. Which of the following pc assaults is spoofing?

Answer

• Using a program to decrypt passwords

• Monitoring a community to intercept knowledge

• Using one laptop to impersonate any other

• Accessing an unprotected port on a computer

Question 109

Question

109. The method of cracking a password through trying all imaginable alphanumeric combos is known as a _____ assault

Answer

• port scanning

• dictionary

• brute drive

• man-in-the-middle

Question 110

Question

110. After loading a word processor record from a floppy, a consumer's computer starts to show symptoms of being inflamed by way of a deadly disease.Which of the following is true concerning this case?

Answer

• The document text will have contained an embedded virus.

• The phrase processing program tests all documents for viruses sooner than the usage of them, so the supply the virus used to be no longer the file.

• A record can not include a deadly disease, so the source of the virus was once now not the phrase processing record.

• The document may have contained a macro that contained a virus.

Question 111

Question

111. Which of the following is electronic mail spoofing?

Answer

• Sending massive quantities of unsolicited e mail

• Sending viruses through electronic mail

• Modifying an electronic mail header to faux the e mail source

• Intercepting e-mail via monitoring a network

Question 112

Question

112. Which of the following is (are) true relating to a Smurf assault? I.It can use the ping command to perform the assault.II.It lets in a hacker to scouse borrow information from a pc.III.It uses different computer systems on a network to attack a unmarried pc

Answer

• II and III simplest

• I and III only

• I and II handiest

• I, II, and III

Question 113

Question

113. Which of the following consequences of executing a deadly disease on a PC is (are) imaginable? I.Files appear to be lacking or deleted from the laborious disk. II.Either the PC gadget board or a disk power is physically damaged. III.There is low pc memory on disks.

Answer

• II and III only

• I most effective

• I and III only

• I, II, and III

Question 114

Question

114. Which of the following is (are) true relating to laptop security attacks? I. Hackers may cause home computer systems to assault different computer systems. II. Organizations in most cases enjoy extra laptop security breaches from inner body of workers than from people external to the organization.

Answer

• I only

• II best

• None

• I and II √

Question 115

Question

115. Which of the following is (are) true referring to network connectivity attacks? I. A community connectivity attack can also be completed via producing numerous half-open connections to the target computer. II. A network connectivity assault may also be achieved by means of producing over the top quantity of traffic on the goal community.

Answer

• I and II

• None

• I simplest

• II only

Question 116

Question

116. Which of the following can be used to prevent social engineering assaults? I. Verifying identities of folks asking for sensitive knowledge II. Using information encryption III. Being conscious of laptop fraud schemes

Answer

• II and III simplest

• I, II, and III

• I and III simplest

• III best

Question 117

Question

117. Which of the following is (are) true about encryption of information? I.Given the excessive pace and low price CPUs available, even the most complicated encrypted knowledge is not completely secure for a long period of time. II.The more bits in the key of the encryption set of rules, the more difficult it is to damage the encryption. III.In public key encryption, the sender and the receiver of encrypted knowledge both use the similar key worth to encrypt and decrypt the data.

Answer

• I and III only

• I, II, and III

• II and III best

• I and II handiest

Question 118

Question

118. How does a receiver of an encrypted message verify that the message originated from the sender?

Answer

• The receiver compares the message with the decrypted signature of the sender.

• The receiver compares the message hashed with the sender's signature.

• The receiver compares the message hashed with the decrypted signature of the sender.

• The receiver compares the gained message with the sender's signature.

Question 119

Question

119. To encrypt a message using public-key encryption scheme, which of the following must be performed?

Answer

• Encrypt the message the use of the receiver's inner most key.

• Encrypt the message using the sender's deepest key.

• Encrypt the message using the receiver's public key.

• Encrypt the message the usage of the sender's public key.

Question 120

Question

120. Which of the following will have to be integrated on a virtual certificates? I. The title of the entity and the expiration date II. The number of times the certificates has been considered III. The digital signature of the certificate authority

Answer

• II and III most effective

• I, and III

• I, II, and III

• I and II best

Question 121

Question

121. Encryption is used to

Question 122

Question

122. Of the following processes, which easiest characterizes the authentication process?

Answer

• Logging into a secure website

• Verifying that device that is in use is now not a pirated replica

• Authorizing use of some useful resource via a particular person

• Establishing a person identity

Question 123

Question

123. Which of the following is (are) true regarding computer network intrusion detection techniques? I.They examine site visitors against a database of known attack signatures.II. They can generate false alarms.

Answer

• I best

• None

• II only

• I and II

Question 124

Question

124. The security of knowledge may also be violated through which of the following? I.Malicious acts II.User errors III.Disasters

Answer

• II and III simplest

• I, II, and III

• I most effective

• I and III best

Question 125

Question

125. Which of the following is (are) true regarding pc safety? I.Applying all to be had security measures might negatively impact device usability. II.Most intrusions result from exploitation of identified vulnerabilities that stay unpatched.

Answer

• None

• I and II

• II best

• I only

Question 126

Question

126. Good laptop safety practices include which of the following? I.Never store online. II.Remove extra RAM from computers. III.Avoid sending email at evening.

Answer

• II and III best

• I and II best

• I, II, and III

• None

Question 127

Question

127. Examples of network monitoring gear come with which of the following? I.Packet sniffers II.Antivirus software III.Security patches

Answer

• I best

• I and III best

• II best

• I, II, and III

Question 128

Question

128. Which of the following is (are) true of anti-virus instrument? I.Typically, it scans each files and reminiscence. II.It is ineffective until it is updated regularly. III.It protects in opposition to network bandwidth assaults.

Answer

• II most effective

• I and II simplest

• I, II, and III

• I and III most effective

Question 129

Question

129. Which of the following is (are) essential to ensuring computer safety? I.Keep applications and working system updated with the latest security patches. II.Replace motherboard batteries steadily. III.Use firewalls

Answer

• III most effective

• I, II, and III

• I and III simplest

• II and III handiest

Question 130

Question

130. Which of the following statements is (are) true about sensible playing cards? I.They are vulnerable to Internet attacks. II.They can encrypt knowledge.

Answer

• II handiest

• None

• I and II

• I handiest

Question 131

Question

131. Which of the following is right kind with appreciate to customers offering extremely personal knowledge throughout the Internet through digital commerce transactions?

Answer

131. Which of the following is proper with appreciate to consumers providing extremely private information throughout the Internet via digital trade transactions?

• Transactions are somewhat secure between the person and a company's Web website if the data is encrypted.

• It is unattainable for any one to see the transaction on the Internet excluding for the supposed Web web page accomplishing the transaction.

• If a transaction is encrypted, any unauthorized events intercepting the transaction will take ten or more years to decrypt the knowledge.

Question 132

Question

132. Which of the following comparisons between public-key encryption schemes and private-key encryption schemes is true?

Answer

• It takes longer to transmit encrypted data the use of private-key encryption schemes than public-key encryption schemes.

• It is more uncomplicated to decrypt knowledge the usage of private-key encryption schemes than public-key encryption schemes.

• Private-key encryption schemes are extra protected than public-key encryption schemes.

• Public-key encryption schemes involve more computations than private-key encryption schemes.

Question 133

Question

133. Which of the following is true about private-key encryption schemes?

Answer

• The sender and the receiver have different private keys.

• The sender and the receiver use the identical inner most key.

• The sender and the receiver have two inner most keys, one for encryption and one for decryption.

• The sender will have to notify the receiver sooner than sending a message.

Question 134

Question

134. Which of the following is (are) true relating to network monitoring equipment? I. They should handiest be put in in a single location on a network. II. Monitoring best must be finished when an issue is suspected.

Answer

• None

• I and II

• II best

• I simplest

Question 135

Question

135. Anti-virus instrument with updated virus definitions most often protects towards which of the following? I. Worms II. Trojan horse methods

Answer

• I simplest

• None

• I and II

• II only

Question 136

Question

136. Which of the following trail formats can be utilized to specify the value of the href attribute of the<xmp><a></xmp> tag? I. An absolute path II. A relative path

Answer

• I and II

• I only

• None

• II most effective

Question 137

Question

137. ANSI stands for

Answer

• All National Standard of Information

• American National System Information

• American National Standards Institute √

• All National Standards Institute

Question 138

Question

138. _________ receives input from the user and processes this enter thru the laptop to produce output.

Answer

• Hardware

• Software

• Computer gadget

• Network gadget

Question 139

Question

139. ________________is the prolong between the time when the reminiscence device receives an cope with and the time when the first bit of information is available from the memory software.

Answer

• Latency

• RAM

• Capacity

• DRAM

Question 140

Question

140. Who designed a general-purpose calculating device, the Analytical Engine?

Answer

• Augusta Ada King

• Gordon Moore

• Jack Kilby

• Charles Babbage

Question 141

Question

141. PCI stands for

Answer

• Peripheral Component Interconnect

• Peripheral Computer Internet

• Peripheral Component Interaction

• Peripheral Computer Interaction

Question 142

Question

141.1. Convert the binary number 01011 to decimal

Answer

• 11

• 110

• 1011

• 10

Question 143

Question

142. Convert the decimal quantity 63 to binary

Answer

• 111111

• 110111

• 0110111

• 11011111

Question 144

Question

143. Convert the hexadecimal textual content D9 to binary

Answer

• 1101 1001

• 1010 0111

• 1110 0100

• 1110 1101

Question 145

Question

144. Convert this binary number 010101 to decimal

Answer

• 21

• 20

• 25

• 22

Question 146

Question

145. Convert this hexadecimal number 8F to decimal

Answer

• 143

• 142

• 141

• 140

Question 147

Question

146. Convert this decimal number 125 to binary

Answer

• 1111101

• 1101011

• 1111011

• 1101001

Question 148

Question

147. Convert this hexadecimal quantity A3 to binary

Answer

• 1010 0011

• 0110 1111

• 0110 1100

• 0111 1111

Question 149

Question

148. Convert this decimal number 117 to hexadecimal

Answer

• 75

• 0111 1111

• 85

• 0110 1111

Question 150

Question

150. Convert this binary number 10001001 to hexadecimal

Answer

• 89h

• 99a

• 0111 0111

• 89

Question 151

Question

151. Match the differing kinds of buses

Answer

Front side bus Bus on the motherboard that transfers information between the CPU and the chipset

PCI Predominant bus for newer systems

AGP Very speedy, running at 66 MHz with a 32-bit phrase size, and transferring 266 MBps

IDE bus Transfers data between garage devices and the chipset

USB Not rated with a MHz velocity; rated by peak switch charge

FireWire High switch charge designed for high-speed exterior peripherals similar to DVD-ROM and arduous disk drives

Question 152

Question

152. This implies that each and every layer needs only a restricted amount of wisdom to do its process

Answer

• Encapsulation

• Abstraction

• Deduction

• E-learning

Question 153

Question

153. What is the use of a variety of modern data and applied sciences through govt to fortify efficiency, carrier and many others. i.e. Internet,mobile,native area network?

Answer

• E-Commerce

• E-Learning

• E-Governance

• E-Bussiness

Question 154

Question

154. What is referring to knowledge in digital shape, which is logically associated with other knowledge in digital shape and which is used by the signatory to sign?

Answer

• Cryptographic

• Electronic signature

• Telegraph signatures

• Faxed signatures

Question 155

Question

155. Components of a Multimedia System (fit them with their examples):

Answer

Capture units Video Camera, Video Recorder, Audio Microphone, Keyboards, mice, graphics tablets, three-D enter devices, tactile sensors, VR units. Digitising/Sampling Hardware

Storage Devices Hard disks, CD-ROMs, Jaz/Zip drives, DVD

Communication Networks Ethernet, Token Ring, FDDI, ATM, Intranets, Internets

Computer Systems Multimedia Desktop machines, Workstations, MPEG/VIDEO/DSP Hardware

Display Devices CD-quality audio system, HDTV,SVGA, Hi-Resolution screens, Color printers

Question 156

Question

156. _____________provides us a means by way of which we will be able to get admission to the packages as utilities, over the Internet. It permits us to create, configure, and customise packages online.

Answer

• Cloud computing

• E-commerce

• E-learning

• Data facilities

Question 157

Question

157. What is a time period for all sorts of technology-enhanced studying (TEL), where know-how is used to beef up the studying process?

Answer

• Cloud computing

• E-commerce

• E-learning

• Data centers

Question 158

Question

158. Match the sorts of E-Commerce

Answer

Business-to-Business(B-to-B) Is a site that is dedicated to exchange of data, items and services and products to different business fairly than final customers.

Business-to-Customer(B-to-C) Is a website the place all transactions happen between a trade area and the final consumer

Consumers-to-businesses (C2B) Consumers make identified a specific need for a product or service, and suppliers compete to provide the product or service to consumers.

Consumer-to-consumer Is a website online the place all the transactions take place between a consumer and the web page acting asa platform that brings the buyer and the supplier in combination

Question 159

Question

159. Match the Layers of instrument 1 2 3 4 5 6 7 8 9 10

Question 160

Question

160. Match the definitions of the sorts of the interfaces

Answer

Command line interface the person types a command on the keyboard, the computer executes the command and supplies textual output

Graphical user interface makes use of windows, icons, menus and guidelines (WIMP) which will also be manipulated through a mouse (and frequently to an extent by a keyboard as neatly).

Question 161

Question

161. What is a continuing representation, analogous to the exact information it represents?

Answer

• Analog information

• Data

• Information

• Knowledge

Question 162

Question

162. What is the expertise that uses computing with high speed communication links to spread data from one place to some other

Question 163

Question

163. _______are complicated units, coping with a limiteless array of data classes

Answer

• Information

• Data

• Knowledge

• Computing systems

Question 164

Question

164. In cryptography, what is cipher? I. algorithm for appearing encryption and decryption II. encrypted message

Answer

• Only I

• Only II

• Both I and II

• None

Question 165

Question

165. In asymmetric key cryptography, the inner most key is saved via

Question 166

Question

166. ____________is a collection of laptop directions or information.

Answer

• Software

• Hardware

• Disk pressure

• Memory

Question 167

Question

167. What supplies connections among computers to permit computer systems to share knowledge (e.g. paperwork), hardware (e.g. printers), and tool assets (e.g. application programs)?

Answer

• Drivers

• CPU

• Network

• Memory

Question 168

Question

168. What is the IDE (Integrated Drive Electronics) cable

Answer

• Rolls knowledge glide amongst part

• Transfers information from garage gadgets to the motherboard

• Stores knowledge permanently

• Serves as a socket on the motherboard

Question 169

Question

169. What permit users to automate sequences of movements they perform regularly?

Answer

• Script

• Macros

• Script and macros

• None

Question 170

Question

170. What is the Trap?

Answer

• An match precipitated by means of an exterior sign

• Keeps monitor of all the processes operating

• Places the byte in a storage space

• A sign informing a program that an event has happened

Question 171

Question

171. _________ is the rapid show of a sequence of images of 2-D or three-D art work or model positions to be able to create an phantasm of movement.

Answer

• Text

• Animation

• Video conferencing

• Picture

Question 172

Question

172. How we call the process, when every person has a single view of the to be had assets, independently of how they are arranged in terms of bodily units?

Question 173

Question

173. Indicate working models for cloud computing:

Question 174

Question

174. Which of the following cloud deployment fashions lets in programs and services and products to be available inside an organization?

Answer

• Public Cloud

• Community Cloud

• Private Cloud

• None

Question 175

Question

175. What are the Service Models?

Answer

• They are the reference fashions on which the Cloud Computing is based

• They permit methods and services and products to be obtainable by way of group of organizations

• They allow programs and services and products to be easily obtainable to the general public

• None

Question 176

Question

176. What supplies access to basic assets akin to bodily machines, digital machines, digital garage?

Answer

• SaaS

• IaaS

• PaaS

• None

Question 177

Question

177. What supplies the runtime setting for packages, construction & deployment gear?

Answer

• SaaS

• IaaS

• PaaS

• None

Question 178

Question

178. Which style allows the usage of tool applications as a carrier to finish customers?

Answer

• SaaS

• IaaS

• PaaS

• None

Question 179

Question

179. What supplies a uniform abstraction of the underlying physical gadget?

Answer

• Abstraction

• Virtualization

• Hypervision

• None

Question 180

Question

180. What has the identical form as a URL but won't determine a real location on the Internet?

Answer

• URI

• URN

• URL

• DNS

Guitar - Guitar Method Book

Guitar - Guitar Method Book

a) displays the differential cross section dσ th /dΩ for ...

a) displays the differential cross section dσ th /dΩ for ...

Document Definition Filtering

Document Definition Filtering

Guitar - Guitar Method Book

Guitar - Guitar Method Book

Guitar - Guitar Method Book

Guitar - Guitar Method Book

Guitar - Guitar Method Book

Guitar - Guitar Method Book

Guitar - Guitar Method Book

Guitar - Guitar Method Book

Guitar - Guitar Method Book

Guitar - Guitar Method Book

What is the difference between procurement and purchasing ...

What is the difference between procurement and purchasing ...

Twitter Party | 1-800-FLOWERS

Twitter Party | 1-800-FLOWERS

Facts You Should Know About Property Managers - American ...

Facts You Should Know About Property Managers - American ...

Grafía Callada on Behance

Grafía Callada on Behance

Jacob Lawrences Going Home fig 33 pg 60 would be ...

Jacob Lawrences Going Home fig 33 pg 60 would be ...

Procurement Process Flow | A Guide to Procurement in Business

Procurement Process Flow | A Guide to Procurement in Business

Multiple Choice Questions - MG3047 - StuDocu

Multiple Choice Questions - MG3047 - StuDocu

ART 100 test 1 - 1 2 3 4 Size relationships between parts ...

ART 100 test 1 - 1 2 3 4 Size relationships between parts ...

ART 1301 Unit IV Assessment.docx - Course ART 1301-14C ...

ART 1301 Unit IV Assessment.docx - Course ART 1301-14C ...

Guitar - Guitar Method Book

Guitar - Guitar Method Book

AHP-Based Evaluation Model for Optimal Selection Process ...

AHP-Based Evaluation Model for Optimal Selection Process ...

Art quiz 4.docx - Save and Submit A RT Q U I Z 4 QUESTION ...

Art quiz 4.docx - Save and Submit A RT Q U I Z 4 QUESTION ...

Guitar - Guitar Method Book

Guitar - Guitar Method Book

Share this

0 Comment to "Which Of The Following Is The Correct Sequence Of Processes..."

Post a Comment