Consider the following statements about Internet facility:
1) It serves as the largest one-line information system.
2) It provides the most dependable and latest mode for sending E-mail.
3) Recurring expenditure on communication E-mail is very high.
4) It is often misused and has triggered cyber-crimes.

1 Answer

Answer :

1) It serves as the largest one-line information system

Related questions

Description : They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? a) Gray Hat Hackers b) White Hat Hackers c) Hactivists d) Black Hat Hackers

Last Answer : d) Black Hat Hackers

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : Where can I find a dependable service for sending faxes free from computers?

Last Answer : When looking to fax something there is no free company that allows you send a fax from a computer. This is due to the way that data is transferred via phone lines.

Description : All are cyber crimes except a. Electronic fund transfer fraud b. Copyright violation. c. Kidnapping

Last Answer : c. Kidnapping

Description : An attackers can create an …....attack by sending hundreds or thousand of e-mail with very large attachment. a. Connection Attack b. Auto responder Attack c. Attachment overloading Attack d. All of the above

Last Answer : c. Attachment overloading Attack

Description : an attack can create and attack by sending hundreds or thousand of e-mail with very large attachment (a) connection attack (b) auto responder attack (c) attachment overloading attack (d) all of the above

Last Answer : (c) attachment overloading attack

Description : When sending an e-mail, the _____ line describes the contents of the message. 1) to 2) subject 3) contents 4) CC 5) None of these

Last Answer : Answer :2

Description : When sending an e-mail, the … line describe the contents of the message a) Subject b) To c) Contents d) CC e) None of these

Last Answer : a) Subject

Description : Revenue expenditure is ____________ in nature. (a) capital (b) outstanding (c) recurring (d) contingent

Last Answer : Revenue expenditure is ____________ in nature. (a) capital (b) outstanding (c) recurring (d) contingent

Description : The divisional supdt may sanction up tot Rs ___ in each case, non-recurring contingent expenditure, powers for which are not provided for specifically a) 5000/- b) 1500/- c) 4000/- d) 2500/

Last Answer : a) 5000/

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : _________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : Laws relating to protecting the internet and other online communication technology isa. Cyber Law b. Computer Law c. IT Law d. None of these

Last Answer : b. Computer Law

Description : The facility which enables to print a large number of letter/documents with more or less similar text. Under it same invitation letter has to be sent to invitees, Only the name and address are to be changed. It is called: a) E - Mail b) Spam Mail c) Mail Merge d) None of These

Last Answer : c) Mail Merge

Description : Which among the following is incorrect: a) Computer - Machine that will carry out the process described by program b) Person - Programmer who serves as the source of the communication c) Process - The ... - Actual System or environment where the problem arises e) None of These f) All of the above

Last Answer : e) None of These

Description : Answer: b, c The body contains fuel reserves which it can mobilize and utilize during times of starvation or stress. By far the greatest energy component is fat, which is calorically dense since it ... liver and free glucose have a trivial caloric value of less than 1000 kcal for a 70 kg male

Last Answer : Which of the following statement(s) is/are true concerning the indications and administration of nutritional support to cancer patients? a. Preoperative nutritional support should be provided to all ... total parenteral nutrition solutions maintain integrity of the small bowel e. None of the above

Description : How often do you use the services of the US Post Offices for sending mail/packages?

Last Answer : I frequently mail and receive packages, but it is often done through UPS, not USPS.

Description : Which of the following statem Which of the following statements does NOT apply to ents does NOT apply to a production plan? a production plan? a)Plans are consistent with company's strategic ... a bridge between the strategic and operational plans d)Provides a view of detailed work-force schedules

Last Answer : c)Serves as a bridge between the strategic and operational plans

Description : When sending an e-mail, the _____line describe the contents of the message: a) Subject b) Contents c) CC d) None of These

Last Answer : a) Subject

Description : Sending an E-mail is similar to: a) Drawing a Picture b) Talking On the Phone c) Writing a Letter d) None of These

Last Answer : c) Writing a Letter

Description : Which of these is not a means of personal communication on the internet? a) Chat b) Instant messaging c) Instanotes d) Electronic mail e) None of these

Last Answer : c) Instanotes

Description : Which one of the following statements BEST characterises marketing research? A)research is a continuous process, providing a constant flow of information B)research is conducted on a special- ... when routine information is required D)research is the basis for making recurring marketing decisions

Last Answer : B)research is conducted on a special-project basis

Description : Peat moss is used as a packing material for sending flowers and live plants to distant places because (a) it serves as a disinfectant (b) it is easily available (c) it is hygroscopic (d) it reduces transpiration.

Last Answer : b) it is easily available

Description : is a branch of Science which deals with the helping machine find solutions to complex problems in a more human like fashion a. Artificial Intelligence b. Internet Od Things c. Embedded system d. cyber Security

Last Answer : a. Artificial Intelligence

Description : is a branch of science which deals with helping machine find solution to complex to problem in a more human like a fashion. (a) Artificial intelligence (b) Internet of think (c) Embided system (d) Cyber security

Last Answer : (a) Artificial intelligence

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : Digital Forensics entails _____. A. Accessing the system's directories viewing mode and navigating through the various systems files and folders B. Undeleting and recovering lost ... identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Last Answer : D. The identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Description : Unethical behavior is often triggered by A. pressure from higher management to achieve goals. B. an organizational atmosphere that condones such behavior. C. both a & b D. a system of checks and balances

Last Answer : C. both a & b

Description : 16. Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both _____ data, including full-motion video, high-speed internet access, and video conferencing. a) video data and ... voice and non-voice c) music and video d) video and audio e) None of these

Last Answer : b) voice and non-voice

Description : Explain the need to consider following factors in design matrix of embedded system: (i) Processor (ii) Memory (iii) Power (iv) Non- recurring engineering cost.

Last Answer : 1. Processor: Selection of processor depends upon amount of processing power and the register width required. Powerful 8bit, 16 bit, 32 bit & 64bit processors are available. The clock speed ... system is designed any number of units can be manufactured without incurring any additional design cost.

Description : To contact people using the internet, you most often use their: a) domain names b) e-mail addresses c) usernames d) passwords e) None of these

Last Answer : b) e-mail addresses

Description : To whom is the IP addresses were traced ? a. Internet Service Provider b. Cyber Crime Office c. Only (a) d. None of the above

Last Answer : a. Internet Service Provider

Description : Cyber trails are advantageous because: A. They are not connected to the physical world. B. Nobody can be harmed by crime on the Internet. C. They are easy to follow. D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Last Answer : D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Description : Synonym of Internet is (1) Gopher (2) Intranet (3) Cyber Space (4) World Wide Web (WWW)

Last Answer :  Cyber Space

Description : "Indira Gandhi Canal", which is around 450 km long, provides irrigation facility mainly to which of the following states? (a) Punjab (b) Haryana (c) Madhya Pradesh (d) Gujarat (e) Rajasthan shop.ssbcrack.com

Last Answer : Ans: (e)

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : Which of the following statements is true? (A) Smart cards do not require an operating system. (B) Smart cards and PCs use some operating system. (C) COS is smart card operating system. (D) The communication between reader and card is in full duplex mode.

Last Answer : (C) COS is smart card operating system

Description : An amount of INR 0.50 (50 paise) per article shall be charged for e-IOD service. The charge would be paid in the form of postage/frank etc. For example, for a Bill Mail Service article ... eIoD facility, the postage affixed/franked should be INR 3.50 Above statement is a) True b) False

Last Answer : a) True

Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above

Last Answer : d) All of the above

Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above

Last Answer : d. All of the above

Description : An attacker can create an________attack by sending hundreds or thousands of e-mails a with very large attachments. A. Connection Attack B. Auto responder Attack C. Attachment Overloading Attack D. All the above

Last Answer : B. Auto responder Attack

Description : Bruce walks around behind purchasing agent Shannon Wise as she looks at the pamphlet describing Hyster's new conveyer system. Shannon stands up and walks to a table on the other side of ... the __________ communication Shannon is sending. A)tactile B)proxemic C)kinesic D)verbal E)promotional

Last Answer : B)proxemic

Description : The MSA provides 300m obstacle clearance within how many miles radius of the navigation facility at the aerodrome? a. 20nm b. 30nm c. 25nm d. 15nm

Last Answer : c. 25nm