Description : Explain errors occurred due to manipulation and sighting in plane tabling.
Last Answer : i) The board not being horizontal- This error affects chiefly the measurement of vertical angles. ii) The table not being accurately centered. The plotted position of the occupied station not ... and correct any displacement. v) The defective sighting- The object not being correctly sighted.
Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption
Last Answer : c) Encryption
Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption
Last Answer : (D) Encryption
Description : A modern electronic computer is a machine that is meant for A) Doing quick mathematical calculations B) Input, storage, manipulation and outputting of data C) Electronic data processing D) Performing repetitive tasks accurately
Last Answer : Answer : B
Description : Digital forensic is all of them except: a. Extraction of computer data b. Preservation of computer data c. Interpretation of computer data d. Manipulation of computer data
Last Answer : b. Preservation of computer data
Description : Digital forensics is all of them except: a. Extraction of computer data. b. Preservation of computer data. c. Interpretation of computer data. d. Manipulation of computer data.
Last Answer : d. Manipulation of computer data.
Description : Digital forensics is all of them except: (A) Extraction of computer data. (B) Preservation of computer data. (C) Interpretation of computer data. (D) Manipulation of computer data.
Last Answer : (D) Manipulation of computer data.
Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.
Last Answer : D. Manipulation of computer data.
Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding
Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer
Description : Majority of the errors blamed on computers are actually due to (1) programming errors (2) hardware failure (3) defects in media (4) data entry errors
Last Answer : data entry errors
Description : Transmission of printed material over telephone lines. A. Video text B. Facsimile C. Encoding D. Xerox copy
Last Answer : B. Facsimile
Description : In ATM, the _____ layer defines thetransmission medium,bit transmission,encoding, and electrical-to-optical transformation. A) physical B) ATM layer C) AAL D) none of the above
Last Answer : physical
Description : Rate of change of a signal on a transmission medium after encoding and modulation have occurred
Last Answer : baud rate
Description : The process of putting one's thoughts (meaning) into signs (symbols) is called A)decoding. B)noise. C)interference. D)transmission. E)encoding.
Last Answer : E)encoding.
Description : If some information is available on paper but you want to transferred it to the hard disc of the computer for further manipulation, which device you will use: a) Photoshop b) Scanner c) Printer d) None of These
Last Answer : b) Scanner
Description : Computer based record keeping system is known as (a) Data Manipulation System -Technology
Last Answer : (d) DBMS is a collection of programs that enable the user to create and maintain the database. Also, it is a computer-based record keeping system.
Description : In data transfer manipulation designing as instruction set for a system isa complex_ a. Art b. System Cc. Computer d. None of these
Last Answer : a. Art
Description : A modern electronic computer is a machine that is meant for a. Doing quick mathematical calculations b. Input, storage, manipulation and outputting of data c. Electronic data processing d. Performing repetitive tasks accuratel
Last Answer : Input, storage, manipulation and outputting of data
Description : A modern electronic computer is a machine that is meant for a. Doing quick mathematical calculations b. Input, storage, manipulation and outputting of data c. Electronic data processing d. Performing repetitive tasks accurately
Last Answer : b. Input, storage, manipulation and outputting of data
Description : Computer forensics do not involve_____activity. A. Preservation of computer data. B. Exraction of computer data. C. Manipulation of computer data. D. Interpretation of computer data.
Last Answer : C. Manipulation of computer data.
Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : a. backup
Description : The basic role of promotion is A)information. B)manipulation. C)communication. D)interpretation.
Last Answer : C)communication.
Description : Manipulation of DNA in genetic engineering became possible due to the discovery of (a) restriction endonuclease (b) DNA ligase (c) transcriptase (d) primase
Last Answer : (a) restriction endonuclease
Description : A selectivity achieved due to manipulation of time of application is called a).Biochemical b). Chronological c). Chemical d). Physical
Last Answer : b). Chronological
Description : How many types of basically Data manipulation: 1 2 3 ap 4
Last Answer : 3
Description : Which is data manipulation types are. a. Arithmetic instruction b. Shift instruction c. Logical and bit manipulation instructions d. All of these
Last Answer : d. All of these
Description : In which instruction are used to perform Boolean operation on non-numerical data: a. Logical and bit manipulation b. Shift manipulation c. Circular manipulation d. None of these
Last Answer : a. Logical and bit manipulation
Description : Which application-level protocol plays a crucial role in carrying out the data definition and manipulation in addition to X-500 features? a. TCP b. LDAP c. FTP d. None of the above
Last Answer : b. LDAP
Description : What is DML (Data Manipulation Language)?
Last Answer : This language that enable user to access or manipulate data as organised by appropriate data model. ∙ Procedural DML or Low level: DML requires a user to specify what data are needed and how to ... : DML requires a user to specify what data are needed without specifying how to get those data.
Description : Which of the following statements best describes the auditor's responsibility regarding the detection of material errors and frauds? a. The auditor is responsible for the failure to detect material ... unrecorded transactions even if there is no evidence that material errors and frauds may exist
Last Answer : The audit should be designed to provide reasonable assurance that material errors and frauds are detected
Description : Which of the following statements best describes the auditor's responsibility to detect material errors and fraud? a. The auditor is responsible for the failure to detect material errors and ... detect unrecorded transactions even if there is no evidence that material errors and frauds may exis
Last Answer : The audit should be designed to provide reasonable assurance that material errors and fraud are detected.
Description : The primary advantage of key-to-tape data entry system is A) A large percentage of editing can be performed at the time of data entry B) Key verification is easily performed C) The tape is reusable D) Keying errors can be detected as they occur.
Last Answer : Answer : C
Description : The ASCII encoding of binary data is called a. base 64 encoding b. base 32 encoding c. base 16 encoding d. base 8 encoding
Last Answer : a. base 64 encoding
Description : What method for encoding digital data enables you to store more data in less space by limiting the distance between pulses on a hard disk?
Last Answer : Run length-limited (RLL) encoding.
Description : Older, single-sided, single-density floppy disk drives would probably use what method for encoding digital data onto the floppy disk?
Last Answer : Frequency-modulation encoding.
Description : What are the three most popular methods for encoding digital data onto magnetic disks?
Last Answer : a. Frequency modulation (FM). b. Modified frequency modulation (MFM). c. Run length limited (RLL).
Description : Which digital data encoding method helps overcome a tape recorder’s low-frequency response problems by recording two logic levels for each incoming data bit?
Last Answer : Bi-phase level encoding.
Description : Which method of digital data encoding does NOT return the tape to neutral between pulses but, instead, saturates the tape positively or negatively as the incoming data changes between zero and one?
Last Answer : Non-return-to-zero (NRZ) encoding.
Description : Which digital data encoding method records a digital one as a positive pulse and a digital (zero) as a negative pulse and returns the tape to neutral between pulses?
Last Answer : Return-to-zero (RZ) encoding.
Description : Which digital data tape encoding method presets the magnetic tape to all zeros and then records digital ones onto the tape?
Last Answer : Return-to-bias (RB) encoding.
Description : Which of the eight methods for encoding digital data onto magnetic tape is most widely used because it’s accurate, simple, and reliable?
Description : Variation of biphase that is used for encoding SMPTE time code data and for recording on video tapes
Last Answer : Biphase – M
Description : When is Run Length Encoding used? A. When we want to compress patterns of data B. When we want to decompress patterns of data C. When we want to encode running videos
Last Answer : A. When we want to compress patterns of data
Description : Huffman coding is an encoding algorithm used for A. lossless data compression B. files greater than 1 Mbit C. broadband systems D. lossy data compression
Last Answer : A. lossless data compression
Description : What process is done by the data compression while encoding the data ? a) Identifying repetition in the data b) Reducing repetition in the data c) Eliminating repetition in the data d) All of these
Last Answer : d) All of these
Description : Huffman coding is an encoding algorithm used for a. lossless data compression b. files greater than 1 Mbit c. broadband systems d. lossy data compression
Last Answer : a. lossless data compression
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size