Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN
Last Answer : B) VPN
Description : ______ is used by public and private enterprises to publish and share financial information with each other and industry analysis across all computer platforms and the Internet. a) Extensible ... Language c) Enterprise Application Integration d) Sales Force Automation Software e) None of these
Last Answer : b) Extensible Business Reporting Language
Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above
Last Answer : d. all of the above
Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these
Last Answer : a)Intranet
Description : A company wants to build a test environment to test software updates and new solutions. The environment should mirror the production environment and be secure and inaccessible from outside the company ... requirements? A. Public Cloud B. Private Cloud C. External Cloud D. Virtual Private Cloud
Last Answer : Virtual Private Cloud
Description : What is Virtual Private Network (VPN) ?
Last Answer : Answer : VPN provides a secure connection for the user when the user is connected to the company's network server using the Internet.
Description : VPN stands for: a) Virtual Perfect Network b) Virtual Power Network c) Virtual Private Network d) None of These
Last Answer : c) Virtual Private Network
Description : 3 Long Form of the VPN A)Virtual Private Network B)Virtual Personal Network C)Both D)None
Last Answer : A)Virtual Private Network
Description : Long Form of the VPN A)Virtual Private Network B)Virtual Personal Network C)Both D)None
Description : 'Golden Handshake Scheme' is associated with - (1) inviting foreign companies (2) private investment in public enterprises (3) establishing joint enterprises (4) voluntary retirement
Last Answer : (4) voluntary retirement Explanation: The voluntary retirement scheme (VRS) is the most humane technique to provide overall reduction in the existing strength of the employees. It is a technique used by companies ... . It is also known as 'Golden Handshake' as it is the golden route to retrenchment.
Description : Golden Handshake Scheme is associated with - (1) Inviting foreign companies (2) Private investment in public enterprises (3) Establishing joint enterprises (4) Voluntary retirement
Last Answer : (4) Voluntary retirement Explanation: A golden handshake is a clause in an executive employment contract that provides the executive with a significant severance package in the case that the executive ... , and other benefits, and is often accompanied by an accelerated vesting of stock options.
Description : In an economy, the sectors are classified into public and private on the basis of - (1) employment conditions (2) nature of economic activities (3) ownership of enterprises (4) use of raw materials
Last Answer : (3) ownership of enterprises Explanation: The classical breakdown of all economic sectors is: primary, secondary and tertiary. However, on the basis of ownership, the sectors are: business sector, private sector (privately run businesses), public sector (state sector) and voluntary sector.
Description : Departmental undertakings, statutory corporations and government companies comes under the category of a. Public Private Partnership b. Private Sector Enterprises b. Incorporated Enterprises d. Public or State Enterprises
Last Answer : d. Public or State Enterprises
Description : In an economy, the sectors are classified into public and private on the basis of (1) employment conditions (2) nature of economic activities (3) ownership of enterprises (4) use of raw materials
Last Answer : ownership of enterprises
Description : ‘Golden Handshake Scheme’ is associated with (1) inviting foreign companies (2) private investment in public enterprises (3) establishing joint enterprises (4) voluntary retirement
Last Answer : voluntary retirement
Description : In RSA public key cryptosystem suppose n=p*q where p and q are primes. (e,n) and (d,n) are public and private keys respectively. Let M be an integer such that 0
Last Answer : (2) I and III
Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder
Last Answer : Breaks compliance regulations
Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder
Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point
Last Answer : A) Chock point
Description : What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? a. Client/server network b. Intranet c. Extranet d. Thin client
Last Answer : c. Extranet
Description : S/MIME in Internet technology stands for (A) Secure Multipurpose Internet Mail Extension (B) Secure Multimedia Internet Mail Extension (C) Simple Multipurpose Internet Mail Extension (D) Simple Multimedia Internet Mail Extension
Last Answer : (A) Secure Multipurpose Internet Mail Extension
Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client
Last Answer : b. Intranet
Description : EDI use a. requires an extranet b. requires value added network c. can be done on internet d. requires a corporate intranet
Last Answer : c. can be done on internet
Description : How secure is a wireless network router, will my neighbors be able to use my connection?
Last Answer : Wireless networking can be very tightly secured, but with default settings the connection is easily stolen by neighbors with the appropriate knowledge.
Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False
Last Answer : D) False, False
Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.
Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.
Description : How can we make government constantly increase its efficiency like private enterprises do?
Last Answer : Easy: Make it more like private enterprise.
Description : In Java, when we implement an interface method, it must be declared as: (A) Private (B) Protected (C) Public (D) Friend
Last Answer : (C) Public
Description : When the inheritance is private, the private methods in base class are.................. in the derived class (in C++). (A) inaccessible (B) accessible (C) protected (D) public
Last Answer : (A) inaccessible
Description : How do I secure my internet connection?
Last Answer : Do you have a wireless router? If you don’t they can’t do it by piggybacking. Or Wardriving.
Description : How can I secure my home internet connection?
Last Answer : it's actually not difficult in either case. you're referring to a wireless network, correct? and when you write log on what exactly do you mean? i don't know any people that have to log on ... their machine is configured. i use comcast as well and it's great. what model router are you using?
Last Answer : answer:The security of your connection to the internet is a two way street: your computer is happy to encrypt the data you send over the internet, but the server receiving the data needs to be happy to ... will only let certain devices (which you have to specify) connect to it. Hope that helps :-]
Description : Which of the following is true of cloud computing? A. It's always going to be less expensive and more secure than local computing. B. You can access your data from any computer in the world, ... connection. C. Only a few small companies are investing in the technology, making it a risky venture.
Last Answer : You can access your data from any computer in the world, as long as you have an Internet connection.
Description : A ………….. is a temporary connection that uses the Public Switched Telephone Network (PSTN) to connect to the Internet. -Technology
Last Answer : dial-up connection
Description : The characteristics of well designed system are a) Practical b) Effective c) Secure d) Reliable e) Flexible f) Economical A) a, b, c and d B) a, c, d and e C) a, b, c, d and e D) a, b, c, d, e and f
Last Answer : D) a, b, c, d, e and f
Description : How can I secure an extension cord into its outlet?
Last Answer : Tie the cord in a knot around the foot of the bed closest to the outlet, leaving yourself enough cord to plug it in. Then, if you accidentally kick the cord, you’re pulling on the knot, not the plug in the outlet. I do this with the cord on my electric leaf blower around a post in my garage.
Description : Intranet means a) A network within a single company b) Between different groups c) Communication between customers and sellers d) Cannot say
Last Answer : a) A network within a single company
Description : A group of computers and other devices connected together is called ……………. A. Network B. Networking C. Intranet D. both b and c
Last Answer : A. Network
Description : A group of computers and other devices connected together is called ……………. a. Intranet b. Network c. None of these d. Networking
Last Answer : b. Network
Description : Java Servlet i) is key component of server side java development ii) is a small pluggable extension to a server that enhances functionality iii) runs only in Windows Operating System iv) allows developers to customize any java ... & iv are true C) ii, iii & iv are true D) i, ii & iv are true
Last Answer : D) i, ii & iv are true
Description : C++ is an extension of C with a major addition of the class construct feature of …………….. A) Simula67 B) Simula57 C) Simula47 D) Simula87
Last Answer : A) Simula67
Description : Cohesion is an extension of: (A) Abstraction concept (B) Refinement concept (C) Information hiding concept (D) Modularity
Last Answer : (C) Information hiding concept
Description : ...............tag is an extension to HTML that can enclose any number of Javascript statements. (A)< SCRIPT> (B)< BODY> (C)< HEAD> (D)
Last Answer : Answer: A
Description : Point out the wrong statement. a) Large cloud providers with geographically dispersed sites worldwide, therefore, achieve reliability rates that are hard for private systems to achieve b) Private data ... ) A network backbone is a very low-capacity network connection d) None of the mentioned
Last Answer : A network backbone is a very low-capacity network connection
Description : Match the following. a) Java 1) is a tool for debugging java program b) Javah 2) is a tool for creating C-like header files c) Javap 3) runs java bytecode d) jdb 4) prints java code representation A) a-3, b-2,c-1 B) a-3, b-1, c-4, d-2 C) a-1, b-2, c-3, d-4 D) a-2, b-1, c-3, d-4
Last Answer : B) a-3, b-1, c-4, d-2
Description : Java servlets are an efficient and powerful solution for creating ………….. for the web. A) Dynamic content B) Static content C) Hardware D) Both a and b
Last Answer : A) Dynamic content
Description : …………. Is the process of creating new classes, called derived classes from existing classes called base class. A) Inheritance B) Encapsulation C) Polymorphism D) Overloading
Last Answer : A) Inheritance
Description : WOW32 is a: (A) Win 32 API library for creating processes and threads. (B) Special kind of file system to the NT name space. (C) Kernel - mode objects accessible through Win32 API (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.
Last Answer : (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.
Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process
Last Answer : (C) It is a chip to map virtual address to physical address
Description : How do I set up a VPN network and connect it to my iPod Touch 1st gen?
Last Answer : please answer!