Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above
Last Answer : Provision of sequence number in the header of message
Description : Virus reproduces in living cells by A.replication B.duplication C.multiplication D.all of these
Last Answer : A.replication
Description : ________ is the unauthorized copying of an organization’s internally developed software or the illegal duplication of commercially available software. A. Software license B. Software Piracy C. Both (A) and (B) D. None of the above.
Last Answer : B. Software Piracy
Description : Duplication of data is known as (a) data security (b) data incomplete -Technology
Last Answer : (c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.
Description : Backup is duplication of data for restoring purpose at a later time. -Technology
Last Answer : True Backup is a process to copy the data and restore it, whenever required.
Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.
Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.
Description : Which among the following is correct about goals in cryptography: a) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps ... not be able to deny sending the message e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : Which of the following is FALSE A. The digital forensic investigator must maintain absolute objectivity B. It is the investigator's job to determine someone's guilt or innocence. C. It is the ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba
Last Answer : B. It is the investigator’s job to determine someone’s guilt or innocence.
Description : Which of the following is FALSE? a. The digital forensic investigator must maintain absolute objectivity b. It is the investigator's job to determine someone's guilt or innocence. c. It is ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba
Last Answer : b. It is the investigator’s job to determine someone’s guilt or innocence.
Description : Which of the following is not true? a. Misrepresenting and creating fraudulent data is dishonest b. Misrepresenting data is very easy to detect c. Misrepresenting data can be difficult to detect d. Breaking confidentiality is not a problem
Last Answer : b. Misrepresenting data is very easy to detect
Description : Research never occurred, but data reported is an example of? a. Anonymity b. Confidentiality c. Scientific misconduct d. Deception
Last Answer : c. Scientific misconduct
Description : Autonomy in clinical studied is defined as a) Freedom, dignity and confidentiality of the subject; right to choose i.e. whether or not to participate in the trial or to continue with ... . d) Observance of fairness, honesty and impartiality in obtaining, analyzing & communicating the data.
Last Answer : a) Freedom, dignity and confidentiality of the subject; right to choose i.e. whether or not to participate in the trial or to continue with it.
Description : ………………. refers to the unauthorised duplication of computer software. -Technology
Last Answer : software piracy refers to the unauthorised duplication of computer software.
Description : Synthesis of DNA is also known as (A) Duplication (B) Replication (C) Transcription (D) Translation
Last Answer : Answer : B
Description : How much time a bacterium take for the complete duplication? a. 30 min. b. 10 min. c. 20 min. d. 25 min.
Last Answer : Ans: C
Description : Truly effective communication: 1. Depends on using multiple channels 2. Depends on selecting the right method for each message and avoiding duplication, since everyone is overloaded with information 3. ... misunderstood 4. Can only be achieved by communication professional 5. a, b and c
Last Answer : 5. a, b and c
Description : One method of programming a computer to exhibit human intelligence is called modeling or __________ a) simulation b) cognitization c) duplication d) psychic amelioration
Last Answer : a) simulation
Description : The movement of a gene from one linkage group to another is called (a) translocation (b) crossing over (c) inversion (d) duplication
Last Answer : (c) inversion
Description : The mechanism that causes a gene to move from one linkage group to another is called (a) inversion (b) duplication (c) translocation (d) crossing-over.
Last Answer : (c) translocation
Description : A significant weakness of the multi-domestic arrangement is: a) dual reporting system. b) duplication of activities. c) cumbersome structure. d) does not respond to local needs
Last Answer : duplication of activities
Description : Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces
Last Answer : D) Reduces
Description : Which organization structure does not have duplication of work? a. Formal b. Informal c. Both (a) and (b) d. None of these
Last Answer : a. Formal
Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy
Last Answer : b. Pirated software
Description : The main goal of HDFS High availability is a) Faster creation of the replicas of primary namenode. b) To reduce the cycle time required to bring back a new primary namenode after existing ... data loss due to failure of primary namenode. d) Prevent the primary namenode form becoming single point
Last Answer : To reduce the cycle time required to bring back a new primary namenode after existing primary fails.
Description : Hamzah needs to email a large file to a classmate. Why might he need to use file compression to do so? A. Email services often only let you send compressed data files. B. Compressed files are ... . D. Email services often have maximum file sizes that prevent you sending files that are too large.
Last Answer : D. Email services often have maximum file sizes that prevent you sending files that are too large.
Description : As a resolution of the conflict in the application of fundamental principles, the auditor, after considering the ethical issues and relevant facts may do any of the following, ... from, the relevant professional body without breaching confidentiality if significant conflict cannot be resolved.
Last Answer : Must immediately resign from the engagement or the employing entity
Description : What are the symptoms of virus infection in plants? -Biology
Last Answer : answer:
Description : The following statement(s) is/are true concerning viral infections. a. The most common post-transplantation viral infections are caused by herpes viruses and include CMV and herpes simplex virus ... HSV) infection primarily presents with a mononucleosis-type syndrome with fever, lethargy, and cough
Last Answer : Answer: a, c, Solid organ transplant patients are prone to develop viral infection by virtue of exogenous immunosuppression. The most common post-transplantation viral infections are those ... transplant patient or as painful herpes zoster in patients who have previously developed chicken pox
Description : The following statement(s) is/are true concerning newer detection methods of systemic infection. a. Enzyme-linked immunosorbent assay (ELISA) is a rapid immunologic assay used for ... detected using advanced molecular techniques include cytomegalovirus (CMV) and human immunodeficiency virus (HIV)
Last Answer : Answer: a, b, c, d Although the classic detection of infection based on clinical signs of infection and bacterial culture remain the most common clinical tools, increasing ... including CMV and HIV. Furthermore, preliminary investigations into possible detection of fungal pathogens are underway
Description : The necrotic ring spot disease of stone fruits (cherry, peach, plum, etc.) is caused by (a) a bacterium (b) fungal infection (c) molybdenum deficiency (d) virus
Last Answer : Ans:(d)
Description : AIDS is caused by the Human Immunodeficiency Virus (HIV) The transmission of HIV infection generally occurs through. (a) eating contaminated food and water (b) transfusion of contaminated blood and blood products (c) inhaling polluted air (d) shaking hand with infected person
Last Answer : Ans:(b)
Description : Which disease is caused by the infection of HIV virus?
Last Answer : AIDS
Description : Which form of drug abuse involves most risk of infection with the HIV (AIDS) virus ? A. Cigarette smoking B. Using alcholo C. Injection of heroine (Answer) D. Taking too much aspirin E. None of these
Last Answer : C. Injection of heroine (Answer)
Description : Egg drop syndrome virus infection results decreased egg production and B A. Lameness in the laying hens B. weak shelled eggs C. Watery albumin of eggs D. None of the these
Last Answer : weak shelled eggs
Description : At which stage of HIV infection does one usually show symptoms of AIDS? (a) Within 15 days of sexual contact with an infected person (b) When the infected retro virus enters host cells (c) ... large number of helper T - lymphocytes (d) When the viral DNA is produced by reverse transcriptase
Last Answer : (c) When HIV damages large number of helper T - lymphocytes
Description : Which one of the following statements about interferon is FALSE? a. Interferon is produced in response to a viral infection. b. Interferon is a naturally produced protein. c. Interferon puts uninfected cells in an antiviral state. d. Interferon is a protein that binds to RNA virus genomes.
Last Answer : d. Interferon is a protein that binds to RNA virus genomes.
Description : Mononucleosis is an infection of________ cells by the _____. a. T; cytomegalovirus b. B; Epstein-Barr virus c. Lung; cytomegalovirus d. red blood; Epstein.Barr virus
Last Answer : d. red blood; Epstein.Barr virus
Description : Tissue tropism refers to a. what tissues grow due to a viral infection. b. what tissues are resistant to viral infection. c. what organisms a virus infects. d. what cells or tissues a virus infects.
Last Answer : d. what cells or tissues a virus infects.
Description : Which of the following infection(s) can be diagnosed by the use of polymerase chain reaction? A- HIV-1 and HIV-2 viruses B- Hepatitis B virus C- Mycobacterium tuberculosis D- All of these
Last Answer : All of these
Description : Recombination of virus genomes occurs A- by transduction B- by transcription C- simultaneous infection of a host cell by two viruses with homologous chromosomes D- by transformation
Last Answer : simultaneous infection of a host cell by two viruses with homologous chromosomes
Description : Which of the following statements reflects the nursing management of the patient with West Nile Virus infection? There is no treatment for West Nile Virus infection. Patients are supported by fluid replacement ... the virus to animals and humans. There is no human-to-human transmission of virus.
Last Answer : a) The incubation period is three to five days. The incubation period (from mosquito bite until onset of symptoms) is between 5–15 days.
Description : The most common cause of acute encephalitis in the United States is a) Herpes Simplex Virus (HSV). Viral infection is the most common cause of encephalitis. HSV is the most common ... may cause fungal encephalitis. Fungal infections of the central nervous system occur rarely in healthy people.
Last Answer : a) Herpes Simplex Virus (HSV). Viral infection is the most common cause of encephalitis. HSV is the most common cause of acute encephalitis in the U.S.
Description : The nurse teaches the patient who demonstrates herpes zoster (shingles) that a) the infection results from reactivation of the chickenpox virus. It is assumed that herpes zoster represents a ... is arrested if oral antiviral agents are administered within 24 hours of the initial eruption.
Last Answer : a) the infection results from reactivation of the chickenpox virus. It is assumed that herpes zoster represents a reactivation of latent varicella (chickenpox) virus and reflects lowered immunity.
Description : A history of infection specifically caused by group A betahemolytic streptococci is associated with which of the following disorders? a) Acute glomerulonephritis Acute glomerulonephritis is ... chronic glomerulonephritis, systemic lupus erythematosus, multiple myeloma, and renal vein thrombosis.
Last Answer : a) Acute glomerulonephritis Acute glomerulonephritis is also associated with varicella zoster virus, hepatitis B, and Epstein-Barr virus.
Description : Ganciclovir is mainly used for the treatment of infection caused by (A) Cytomegalovirus (B) Candida albicans (C) Herpes zoster virus (D) Hepatitis B virus
Last Answer : Ans. A & C
Description : Which one of the following is true about oral hairy leukoplakia?** ADC M07 A. Associated with HIV virus infection and is commonly seen on the dorsal of the tongue B. Associated with HIV ... Always associated with trauma to the lateral side of the tongue E. Always associated with pernicious anaemia
Last Answer : B. Associated with HIV virus infection and is commonly seen on the lateral side of the tongue C. Usually caused by Candida species
Description : What is true about human interferon α: A. It is used to treat HIV infection B. It is used to treat Kaposi‘s sarcoma in AIDS patients C. It is curative for hepatitis B virus infection D. It is active orally
Last Answer : B. It is used to treat Kaposi‘s sarcoma in AIDS patients
Description : 6 Interferons are produced by virus infected cells to protect healthy plants from virus infection. Identify the type of barrier it represents. a. cytokine b. physical c. cellular d. physiological
Last Answer : Ans. cytokine
Description : What is the name of the phenomenon that occurs when tissue culture is infected with one type of virus that causes the culture to resist infection by a second type of virus?
Last Answer : ANSWER: VIRAL INTERFERENCE or INTERFERENCE
Description : Which best describes Lossless Compression? A. No information is lost but file size is increased B. There is no loss in information at all after compression C. Files which have the exact same data after compression D. Compression that involves an algorithm
Last Answer : B. There is no loss in information at all after compression