Description : Which term refers for modifying a computer in a way which was not originally intended to view Information? A. Metadata B. Live analysis C. Hacking D. Bit Copy
Last Answer : C. Hacking
Description : A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the ... of the information for analysis. D. The frequency of a particular item occurring in a data set.
Last Answer : D. The frequency of a particular item occurring in a data set.
Description : Which one of the following tools is used to view the metadata information contained in a .NET assembly? Select Answer: 1. al.exe 2. ilasm.exe 3. vbx.exe 4. csc.exe 5. ildasm.exe
Last Answer : 5. ildasm.exe
Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors
Last Answer : b)Virus
Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors
Last Answer : B) Virus
Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data
Last Answer : a. Identifying weakness in computer system or networks
Last Answer : d. Protocols of corrupting data
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : Kleenex tissues were originally intended as what in 1915?
Last Answer : WW1 Gas mask filters
Description : Kleenex tissues were originally intended as what in 1915
Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking
Last Answer : d) Ethics in black hat hacking
Description : _________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking
Description : Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________. a. Cracking b. Analysis c. Hacktivism d. Exploitation
Last Answer : d. Exploitation
Description : Which of the following is used to portray data more specifically and is helpful in determining the background of digital evidence? a. Data b. Metadata c. Cookies d. History
Last Answer : b. Metadata
Description : A ‘Bit’ refers to (1) Binary informatics (2) Bilingual information (3) Binary terminator (4) Binary digit
Last Answer : Binary digit
Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above
Last Answer : 4) All of the above
Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems
Last Answer : b. A procedure to find the Digital Evidence
Description : The figure shows the front view of a convex lens, which originally had only one edge. Five holes of different shapes, namely triangle, square, pentagon, hexagon and circle, were drilled through it at points P ... . What is the total number of edges in the lens after the holes were drilled?
Last Answer : 57
Description : Changing an existing document is called _____ the document. 5 1) Creating 2) Editing 3) Modifying 4) Adjusting 5) None of these
Last Answer : Answer :2
Description : Presentations password protected for opening or modifying can be opened by: a) Power Point Analyzer b) Power Point Viewer c) Power Point Conductor d) None of These
Last Answer : b) Power Point Viewer
Description : Areceived sith a bit error will be closer to the originally transmitted code word than to any other code word: a. Code word b. Noncode word c. Decoding d. All of these
Last Answer : b. Noncode word
Description : . In which year the term hacking was coined? a) 1965-67 b) 1955-60 c) 1970-80 d) 1980-82
Last Answer : c) 1970-80
Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms
Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity
Description : Is there a way to tag text in word processing docs with metadata?
Last Answer : Can’t think of this off the top of my head, but you might see if there’s an OpenOffice extension to do this for you.
Description : Which refers to any program that is not copy righted? A. Freeware B. Shareware C. Open Source Software D. Public Domain Software
Last Answer : D. Public Domain Software
Description : Hard Copy refers to: a) Hardware b) Print Out of Document c) Duplicate Memory Data d) None of These
Last Answer : b) Print Out of Document
Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Last Answer : c) penetration testing
Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Description : Which of the following statements is true? a. Assurance engagements do not require independence. b. The term auditor is broader in scope compared to the term practitioner. c. Assurance ... be provided by the practitioner is inversely related to the scope of procedures performed and their results
Last Answer : Assurance engagements performed by professional accountants are intended to enhance the credibility of information.
Description : Help me fix my metadata confusion?
Last Answer : first, let's not deal with A, B, and C. They are too abstract. Let's deal with MM DD YYYY (month day year). Let's also assign the following values: 1) the PDF was created ... follow Windows date management protocols, so if the document was posted and downloaded from the cloud, anything can happen.
Description : Attention fluther SEO experts... Does current Google read photo metadata and does my plan of action help natural SEO?
Last Answer : answer:Hi, I think this is several questions in one. Firstly. EXIT metadata in images I believe Google can and does read but does not currently contribute towards page ranking in any way. Alt ... data that help identify the content of your page rather than just adding in keywords. Hope this helps
Description : How would you examine Exif metadata on a photo posted on the internet?
Last Answer : answer:If you saw johnpowell's excellent response to this question yesterday, then you'd know. Here it is. As to how to disable the GPS indicators, etc., you want to find in your phone or ... course, you could take and examine a photo of your own to see whether you had accomplished your objective.
Description : What's the metadata for a brain?
Last Answer : I don’t organize my own thinking. I don’t think it’d be possible for me. Come to think of it, I don’t know if that’s really possible for anyone. Then again, I could just be saying that because it’s really that impossible for me.
Description : Data that describes other data. For example, a digital image may include metadata that describe the size of the image, number of colors, or resolution. A. Metadata B. Emdata C. Tridata D. Perameter
Last Answer : D. Perameter
Description : The pure object oriented programming language with extensive metadata available and modifiable at run time is (A) Small talk (B) C++ (C) Java (D) Eiffel
Last Answer : (A) Small talk
Description : Data which improves the performance and accessibility of the database are called: (A) Indexes (B) User Data (C) Application Metadata (D) Data Dictionary
Last Answer : (A) Indexes
Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : An error in computer program is called: a) Hacking b) Virus c) Bug d) None of These
Last Answer : c) Bug
Description : Which is not an Ethical Hacking related career a. Back-End Developer b. Software Tester c. Software Developer d. Computer Networking Specialist
Last Answer : b. Software Tester
Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening
Last Answer : c. Hacking