Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer
Last Answer : a) Hacker
Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer
Last Answer : 1) Hacker
Description : A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a– (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer
Last Answer : hacker
Description : Personnel who design, program, operates and maintains computer equipment refers to A) Console-operator B) Programmer C) Peopleware D) System Analyst
Last Answer : Answer : C
Description : Informal term for a programmer is: a) Coder b) Hacker c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst
Last Answer : Peopleware
Last Answer : c. Peopleware
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack
Last Answer : A. Remote attack
Last Answer : D. Internal attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? Local access Remote attack Internal attack Physical access
Last Answer : Remote attack
Description : A hacker who gains access to system with a view to fix the identified weaknesses is known as a. White hat hackers b. Grey hath hackers c. Red hat hackers d. Hacktivist
Last Answer : a. White hat hackers
Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.
Last Answer : d. To hide malicious activity on the network.
Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access
Last Answer : b. Remote attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack
Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker
Last Answer : A)Phreaker
Description : A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker
Last Answer : A)Phreake
Description : How did a spammer get a hold of my friend's email account and send spam from her email address?
Last Answer : She must have downloaded an infested file (with a spyware or adware attached) which used her address book to send spam. She should run a virus test. Most likely she is unaware of this. There ... called AdAware-a free version is available and might help rid her computer of many spy and adware.
Description : Crop logging’ is the method of? a. Soil fertility evaluation b. Plan analyst for assessing requirements for nutrients for crop production c. Assessing crop damage d. Testing suitability of fertilizers e. None of these
Last Answer : e. None of these
Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Last Answer : c) penetration testing
Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Description : Hackers _______: a) all have the same motive b) after people who maintain c) may legally break into computers d) are people who are allergic to computers e) break into other people's computers
Last Answer : e) break into other people's computers
Description : Which of the following is incorrect regarding a compilation engagement? a. The CPA uses his auditing expertise to collect, classify and summarize financial information. b. The CPA should exercise due ... . d. The procedures performed do not enable the accountant to express any form of assurance.
Last Answer : The CPA uses his auditing expertise to collect, classify and summarize financial information
Description : Which of the following is incorrect regarding a compilation engagement? a. The CPA uses his auditing expertise to collect, classify and summarize financial information. b. The CPA should exercise due ... form. d. The procedures performed do not enable the accountant to express any form of assurance
Last Answer : The CPA uses his auditing expertise to collect, classify and summarize financial information.
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : An ethical hacker must ensure that proprietary information of the firm does not get leaked. a) True b) False
Last Answer : a) True
Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access
Last Answer : c)Hacker or Cracker
Description : A person who designs the programs in a software package is called : a) User b) Software Manager c) System Developer d) System Programmer
Last Answer : Answer: d Explanation: The programs included in a system software package are called system programs. The programmers who design them and prepare them are called system programmers
Description : A person who creates software is called a: a) Programmer b) Software Engineer c) Software Developer d) All of the Above e) None of These
Last Answer : d) All of the Above
Description : Which among the following is incorrect: a) Computer - Machine that will carry out the process described by program b) Person - Programmer who serves as the source of the communication c) Process - The ... - Actual System or environment where the problem arises e) None of These f) All of the above
Last Answer : e) None of These
Description : The person who writes and tests computer programs is called a: a) Programmer b) Software Engineer c) Project Developer d) None of These
Last Answer : b) Software Engineer
Description : The person who writes and tests computer programs is called a a) programmer b) computer scientist c) software engineer d) project developer e) None of these
Last Answer : c) software engineer
Description : Credit Card Fraud includes: a) Credit cards are illegally get and used to get movable or immovable property b) Unauthorized and illegal use of credit cards c) Both of Above d) None of These
Description : Evidence contained in a document provided to prove that statements made in court are True is referred to as: a. Inadmissible evidence b. Illegally obtained evidence c. Hearsay evidence d. Direct evidence
Last Answer : c. Hearsay evidence
Description : With early computers, the programmer had to translate instructions into what type of language form?
Last Answer : Machine.
Description : What is it called when a hacker pretends to be a valid user on the system? A. Impersonation B. Third-person authorization C. Help desk D. Valid user
Last Answer : A. Impersonation
Description : Lauren, a systems analyst, has excellent interpersonal skills. To take advantage of her skills, the functional lead of the project should assign her to program in Java and C++
Last Answer : Ans: False
Description : The writ of Prohibition is issued by a superior court - (1) to prevent an inferior court or tribunal from exceeding its jurisdiction or acting contrary to the rules of natural justice (2) to an ... the office (4) to an authority to produce an illegally detained person before the court for trial.
Last Answer : (1) to prevent an inferior court or tribunal from exceeding its jurisdiction or acting contrary to the rules of natural justice Explanation: The writ of Prohibition is an order from a superior ... because the lower court does not have proper jurisdiction to hear or determine the matters before it.
Description : Injury denotes any harm whatever illegally caused to any person- a) In body b) In mind c) In reputation d) All the above
Last Answer : d) All the above
Description : A person has worked as a programmer in a company ; But the company did not pay its dues ; In that case, he can sell some of the company's programs to earn his own money ? I used to work ... I can sell it and get halal profit. These programs include some of the ones I developed during my tenure.
Last Answer : If someone works as a programmer in a company then the programs will be owned by the company. He can claim his unjust rights ; That is by mentioning his name in the program. If the company does not ... a person who has been able to acquire something similar to his debt ; If not similar, then not.
Description : President Trump suggested that all people who cross the border illegally (“invade” was the term he used) should be deported summarily, without a court hearing. Not Constitutional Law but is it another step in Trump running the country his way?
Last Answer : I mean, the guy did say that he would like people to treat him like the North Koreans treat Kim. He wants to be a dictator.
Description : Do the Mods prefer us to flag the spammer or the spam when we see it?
Last Answer : I think flagging the question is more useful. It notifies the mods about both the question and the poster.