Back up of the data files will help to prevent -
1) loss of confidentiality
2) duplication of data
3) virus infection
4) loss of data

1 Answer

Answer :

4) loss of data

Related questions

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : Virus reproduces in living cells by A.replication B.duplication C.multiplication D.all of these

Last Answer : A.replication

Description : ________ is the unauthorized copying of an organization’s internally developed software or the illegal duplication of commercially available software. A. Software license B. Software Piracy C. Both (A) and (B) D. None of the above.

Last Answer : B. Software Piracy

Description : Duplication of data is known as (a) data security (b) data incomplete -Technology

Last Answer : (c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.

Description : Backup is duplication of data for restoring purpose at a later time. -Technology

Last Answer : True Backup is a process to copy the data and restore it, whenever required.

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : Which of the following is FALSE A. The digital forensic investigator must maintain absolute objectivity B. It is the investigator's job to determine someone's guilt or innocence. C. It is the ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba

Last Answer : B. It is the investigator’s job to determine someone’s guilt or innocence.

Description : Which of the following is FALSE? a. The digital forensic investigator must maintain absolute objectivity b. It is the investigator's job to determine someone's guilt or innocence. c. It is ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba

Last Answer : b. It is the investigator’s job to determine someone’s guilt or innocence.

Description : Which of the following is not true? a. Misrepresenting and creating fraudulent data is dishonest b. Misrepresenting data is very easy to detect c. Misrepresenting data can be difficult to detect d. Breaking confidentiality is not a problem

Last Answer : b. Misrepresenting data is very easy to detect

Description : Research never occurred, but data reported is an example of? a. Anonymity b. Confidentiality c. Scientific misconduct d. Deception

Last Answer : c. Scientific misconduct

Description : Autonomy in clinical studied is defined as a) Freedom, dignity and confidentiality of the subject; right to choose i.e. whether or not to participate in the trial or to continue with ... . d) Observance of fairness, honesty and impartiality in obtaining, analyzing & communicating the data.

Last Answer : a) Freedom, dignity and confidentiality of the subject; right to choose i.e. whether or not to participate in the trial or to continue with it.

Description : ………………. refers to the unauthorised duplication of computer software. -Technology

Last Answer : software piracy refers to the unauthorised duplication of computer software.

Description : Synthesis of DNA is also known as (A) Duplication (B) Replication (C) Transcription (D) Translation

Last Answer : Answer : B

Description : How much time a bacterium take for the complete duplication? a. 30 min. b. 10 min. c. 20 min. d. 25 min.

Last Answer : Ans: C

Description : Truly effective communication: 1. Depends on using multiple channels  2. Depends on selecting the right method for each message and avoiding duplication, since  everyone is overloaded with information  3. ... misunderstood  4. Can only be achieved by communication professional  5. a, b and c

Last Answer : 5. a, b and c

Description : One method of programming a computer to exhibit human intelligence is called modeling or __________ a) simulation b) cognitization c) duplication d) psychic amelioration

Last Answer : a) simulation

Description : The movement of a gene from one linkage group to another is called (a) translocation (b) crossing over (c) inversion (d) duplication

Last Answer : (c) inversion

Description : The mechanism that causes a gene to move from one linkage group to another is called (a) inversion (b) duplication (c) translocation (d) crossing-over.

Last Answer : (c) translocation

Description : A significant weakness of the multi-domestic arrangement is: a) dual reporting system. b) duplication of activities. c) cumbersome structure. d) does not respond to local needs

Last Answer : duplication of activities

Description : Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces

Last Answer : D) Reduces

Description : Which organization structure does not have duplication of work? a. Formal b. Informal c. Both (a) and (b) d. None of these

Last Answer : a. Formal

Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy

Last Answer : b. Pirated software

Description : The main goal of HDFS High availability is a) Faster creation of the replicas of primary namenode. b) To reduce the cycle time required to bring back a new primary namenode after existing ... data loss due to failure of primary namenode. d) Prevent the primary namenode form becoming single point

Last Answer : To reduce the cycle time required to bring back a new primary namenode after existing primary fails.

Description : Hamzah needs to email a large file to a classmate. Why might he need to use file compression to do so? A. Email services often only let you send compressed data files. B. Compressed files are ... . D. Email services often have maximum file sizes that prevent you sending files that are too large.

Last Answer : D. Email services often have maximum file sizes that prevent you sending files that are too large.

Description : What are the symptoms of virus infection in plants? -Biology

Last Answer : answer:

Description : The following statement(s) is/are true concerning viral infections. a. The most common post-transplantation viral infections are caused by herpes viruses and include CMV and herpes simplex virus ... HSV) infection primarily presents with a mononucleosis-type syndrome with fever, lethargy, and cough

Last Answer : Answer: a, c, Solid organ transplant patients are prone to develop viral infection by virtue of exogenous immunosuppression. The most common post-transplantation viral infections are those ... transplant patient or as painful herpes zoster in patients who have previously developed chicken pox

Description : The following statement(s) is/are true concerning newer detection methods of systemic infection. a. Enzyme-linked immunosorbent assay (ELISA) is a rapid immunologic assay used for ... detected using advanced molecular techniques include cytomegalovirus (CMV) and human immunodeficiency virus (HIV)

Last Answer : Answer: a, b, c, d Although the classic detection of infection based on clinical signs of infection and bacterial culture remain the most common clinical tools, increasing ... including CMV and HIV. Furthermore, preliminary investigations into possible detection of fungal pathogens are underway

Description : The necrotic ring spot disease of stone fruits (cherry, peach, plum, etc.) is caused by (a) a bacterium (b) fungal infection (c) molybdenum deficiency (d) virus

Last Answer : Ans:(d)

Description : AIDS is caused by the Human Immunodeficiency Virus (HIV) The transmission of HIV infection generally occurs through. (a) eating contaminated food and water (b) transfusion of contaminated blood and blood products (c) inhaling polluted air (d) shaking hand with infected person

Last Answer : Ans:(b)

Description : Which disease is caused by the infection of HIV virus?

Last Answer : AIDS

Description : Which form of drug abuse involves most risk of infection with the HIV (AIDS) virus ? A. Cigarette smoking B. Using alcholo C. Injection of heroine (Answer) D. Taking too much aspirin E. None of these

Last Answer : C. Injection of heroine (Answer)

Description : Egg drop syndrome virus infection results decreased egg production and B A. Lameness in the laying hens B. weak shelled eggs C. Watery albumin of eggs D. None of the these

Last Answer : weak shelled eggs

Description : At which stage of HIV infection does one usually show symptoms of AIDS? (a) Within 15 days of sexual contact with an infected person (b) When the infected retro virus enters host cells (c) ... large number of helper T  - lymphocytes (d) When the viral DNA is produced by reverse transcriptase

Last Answer : (c) When HIV damages large number of helper T  - lymphocytes

Description : Which one of the following statements about interferon is FALSE? a. Interferon is produced in response to a viral infection. b. Interferon is a naturally produced protein. c. Interferon puts uninfected cells in an antiviral state. d. Interferon is a protein that binds to RNA virus genomes.

Last Answer : d. Interferon is a protein that binds to RNA virus genomes.

Description : Mononucleosis is an infection of________ cells by the _____. a. T; cytomegalovirus b. B; Epstein-Barr virus c. Lung; cytomegalovirus d. red blood; Epstein.Barr virus

Last Answer : d. red blood; Epstein.Barr virus

Description : Tissue tropism refers to a. what tissues grow due to a viral infection. b. what tissues are resistant to viral infection. c. what organisms a virus infects. d. what cells or tissues a virus infects.

Last Answer : d. what cells or tissues a virus infects.

Description : Which of the following infection(s) can be diagnosed by the use of polymerase chain reaction? A- HIV-1 and HIV-2 viruses B- Hepatitis B virus C- Mycobacterium tuberculosis D- All of these

Last Answer : All of these

Description : Recombination of virus genomes occurs A- by transduction B- by transcription C- simultaneous infection of a host cell by two viruses with homologous chromosomes D- by transformation

Last Answer : simultaneous infection of a host cell by two viruses with homologous chromosomes

Description : Which of the following statements reflects the nursing management of the patient with West Nile Virus infection? There is no treatment for West Nile Virus infection. Patients are supported by fluid replacement ... the virus to animals and humans. There is no human-to-human transmission of virus.

Last Answer : a) The incubation period is three to five days. The incubation period (from mosquito bite until onset of symptoms) is between 5–15 days.

Description : The most common cause of acute encephalitis in the United States is a) Herpes Simplex Virus (HSV). Viral infection is the most common cause of encephalitis. HSV is the most common ... may cause fungal encephalitis. Fungal infections of the central nervous system occur rarely in healthy people.

Last Answer : a) Herpes Simplex Virus (HSV). Viral infection is the most common cause of encephalitis. HSV is the most common cause of acute encephalitis in the U.S.

Description : The nurse teaches the patient who demonstrates herpes zoster (shingles) that a) the infection results from reactivation of the chickenpox virus. It is assumed that herpes zoster represents a ... is arrested if oral antiviral agents are administered within 24 hours of the initial eruption.

Last Answer : a) the infection results from reactivation of the chickenpox virus. It is assumed that herpes zoster represents a reactivation of latent varicella (chickenpox) virus and reflects lowered immunity.

Description : A history of infection specifically caused by group A betahemolytic streptococci is associated with which of the following disorders? a) Acute glomerulonephritis Acute glomerulonephritis is ... chronic glomerulonephritis, systemic lupus erythematosus, multiple myeloma, and renal vein thrombosis.

Last Answer : a) Acute glomerulonephritis Acute glomerulonephritis is also associated with varicella zoster virus, hepatitis B, and Epstein-Barr virus.

Description : Ganciclovir is mainly used for the treatment of infection caused by (A) Cytomegalovirus (B) Candida albicans (C) Herpes zoster virus (D) Hepatitis B virus

Last Answer : Ans. A & C

Description : Which one of the following is true about oral hairy leukoplakia?** ADC M07 A. Associated with HIV virus infection and is commonly seen on the dorsal of the tongue B. Associated with HIV ... Always associated with trauma to the lateral side of the tongue E. Always associated with pernicious anaemia

Last Answer : B. Associated with HIV virus infection and is commonly seen on the lateral side of the tongue C. Usually caused by Candida species

Description : What is true about human interferon α: A. It is used to treat HIV infection B. It is used to treat Kaposi‘s sarcoma in AIDS patients C. It is curative for hepatitis B virus infection D. It is active orally

Last Answer : B. It is used to treat Kaposi‘s sarcoma in AIDS patients

Description : 6 Interferons are produced by virus infected cells to protect healthy plants from virus infection. Identify the type of barrier it represents. a. cytokine b. physical c. cellular d. physiological

Last Answer : Ans. cytokine

Description : What is the name of the phenomenon that occurs when tissue culture is infected with one type of virus that causes the culture to resist infection by a second type of virus?

Last Answer : ANSWER: VIRAL INTERFERENCE or INTERFERENCE

Description : Which best describes Lossless Compression? A. No information is lost but file size is increased B. There is no loss in information at all after compression C. Files which have the exact same data after compression D. Compression that involves an algorithm

Last Answer : B. There is no loss in information at all after compression