Description : HBA stands for: a) Host Bus Adapters b) Host Base Adapters c) Hedged Base Adapters d) None of These
Last Answer : a) Host Bus Adapters
Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : After I get my HBa in Psych, how long is the masters program and the Phd program?
Last Answer : It depends entirely on the program. The one my friend is in is a doctoral program, and they just give you a masters along the way (not uncommon). I think the program is 3 years of classes and ... field work, but you don't get the doctorate until you're done with the internship and doctoral paper.
Description : Which amino acid is present at 6th position of β-chain of Hbs instead of glutamate in HbA? (A) Cysteine (B) Valine (C) Aspartate (D) Glutamate
Last Answer : Answer : B
Description : Glycocylated haemoglobin: a. is absent in the plasma of people without diabetes mellitus b. results from the combination of a HbA and a sugar c. when measured as HbA1c in plasma gives a more accurate retrospective estimates of blood sugar levels than other glycosylated products d. all above
Last Answer : all above
Description : Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned
Last Answer : All of the mentioned
Description : .Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned
Description : _________ is a computational model based on the structure of biological neural networks? (A) Artificial Neural Network (ANN) (B) Biological Network (C) Both(A) & (B) (D) None of the Above
Last Answer : (A) Artificial Neural Network (ANN)
Description : The software that is used to create text-based documents are referred to as ______ a) DBMS b) Suites c) Spreadsheets d) Word processors e) None of these
Last Answer : d) Word processors
Description : Compare peer to peer network and server based networks.
Last Answer : Peer to Peer Network Server Based Network It is a decentralized management It is centralized management It is easy to set up & no administrator required It is complex to set ... client has less power. Uses less expensive computer hardware. It is hardware intensive.
Description : Which among the following is correct features about LAN (Local Area Network): a) LANs are small size networks which only covers a few buildings or a campus up to few kilometers. b) LANs are widely used to connect ... to share printers in a Lab or in a department. d) None of These e) All of the Above
Last Answer : e) All of the Above
Description : Computer systems are comprised of: a) Hardware, Software, Procedures, Networks and People b) Hardware, Programs, Processors, Procedures and People c) Hardware Programs, Information, People and Networks d) None of These
Last Answer : a) Hardware, Software, Procedures, Networks and People
Description : Computer systems are comprised of a) hardware, programs, processors, procedures and people b) hardware, programs, information, people and procedures c) hardware, programs, information, people and networks d) hardware, software, procedures, networks and people e) None of these
Last Answer : d) hardware, software, procedures, networks and people
Description : 4. What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems
Last Answer : d. Open computer systems, communication systems, embedded systems
Description : What are the three general categories of computer systems that can contain digital evidence? a. Desktop, laptop, server b. Personal computer, Internet, mobile telephone c. Hardware, software, networks d. Open computer systems, communication systems, embedded systems
Description : What are the three general categories of computer systems that can contain digital evidence? A. Desktop, laptop, server B. Personal computer, Internet, mobile telephone C. Hardware, software, networks D. Open computer systems, communication systems, and embedded systems
Last Answer : D. Open computer systems, communication systems, and embedded systems
Description : In ____ the goal is for the software to use what it has learned in one area to solve problems in other areas. A. Machine Learning B. Deep Learning C. Neural Networks D. None of these
Last Answer : B. Deep Learning
Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above
Last Answer : A) i only
Description : Which of the following statements regarding the features of Information and Communication Technology (ICT) is/are true ? I. ICT are the main instruments for the creation of computer networks and the applications based on them. II. ... II only (B) I and III only (C) II and III only (D) I, II and III
Last Answer : (A) I and II only
Description : The ability of a single network to span multiple physical networks is known as ______ a. Subnetting b. Masking c. Fragmenting d. Hopping
Last Answer : a. Subnetting
Description : Components that provide internal storage to the CPU are ______ a) Registers b) Program Counters c) Controllers d) Internal chips
Last Answer : Answer: a Explanation: The Registers are the fast storage units. They are responsible for storing intermediate computational results in the CPU. The registers can be user accessible or inaccessible
Description : Comparing with secondary storage, primary storage is ______ A. Slow and expensive B. Slow and inexpensive C. Fast and inexpensive D. Fast and expensive
Last Answer : D. Fast and expensive
Description : USB refers to a ______ A. storage device B. processor C. port type D. None of the Above
Last Answer : C. port type
Description : The most common type of storage devices are ______: a) Persistent b) Optical c) Magnetic d) Flash e) Steel
Last Answer : b) Optical
Description : A tree topology (hierarchical topology) can be viewed as a collection of _______in a hierarchy: a) Bus Networks b) Star Networks c) Both of Above d) None of These
Last Answer : b) Star Networks
Description : Firewalls are used to protect: a) Home Networks b) Corporate Networks c) Both of Above d) None of These
Description : Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____: a) Intranets b) Extranets c) Both of Above d) None of These
Last Answer : a) Intranets
Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Last Answer : C) Both A and B
Description : Most semantic networks are not cognitive based. a) True b) False
Last Answer : b) False
Description : Which of the following is an extension of the semantic network? a) Expert Systems b) Rule Based Expert Systems c) Decision Tree Based networks d) Partitioned Networks
Last Answer : d) Partitioned Networks
Description : The two main types of Internet based B2B commerce are...... A. Net marketplaces and private industrial networks B. EDI and collaborative commerceC. Net marketplaces and collaborative commerce D. EDI and private industrial networks
Last Answer : D. EDI and private industrial networks
Description : 2. ______ do not guarantee optimal/any solutions A. Heuristic B. Critical C. Value based D. Analytical
Last Answer : A. Heuristic
Description : Which of the following is the storage area whit in the computer itself which Holds data only Temporarily as the computer processes instructions? 1) The Hard Disk 2) Main Memory 3) The Control unit 4) Read Only Memory
Last Answer : 4) Read Only Memory
Description : ______________ refers to hardware, software (computer programs), and computer networks.
Last Answer : Fill in the Blank: _____________ refers to hardware, software (computer programs), and computer networks.
Description : Are there software programs that link to networks for people with similar hobbies to video chat on or e-mail through?
Last Answer : I could not find any of these software programs. You may be able to find people with similar hobbies by signing up with Myspace and then browsing through their different groups.
Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned
Last Answer : Ethernet Hardware Addresses
Description : Which resources are typically provided by an Infrastructure as a Service cloud computing delivery model? A. applications B. virtual machines C. virtual private networks D. middleware software stacks
Last Answer : middleware software stacks
Last Answer : virtual machines
Description : Which of the following factor has helped spur the popularity of collaborative software for conferencing and workgroup support? A. emergence of cloud networks B. high cost of computing C. lowered cost of travel D. All of the above
Last Answer : emergence of cloud networks
Description : What is the process of copying software programs from secondary storage media to the hard disk called? 1) Configuration 2) Download 3) Storage 4) Upload 5) Installation
Last Answer : Answer :5
Description : Which among the following is a distinctive feature by which a CD ROM drive is classified in a personal computer ? (1) Software bundle (2) Data transfer rate (3) Memory capacity (4) Storage period
Last Answer : Data transfer rate
Description : ______ is the first layer of software loaded into computer memory when it starts up. A. Device Drivers B. Language translators C. System Utilities D. Operating system
Last Answer : D. Operating system
Description : Technique of placing software/programs in a ROM semiconductor chip is called ______ A. PROM B. EPROM C. Firmware D. None of the above
Last Answer : C. Firmware
Description : Unauthorized copying of software to be used for personal gain instead of for personal backup is called ______: a) program thievery b) data snatching c) software piracy d) program looting e) data looting
Last Answer : c) software piracy
Description : The primary purpose of software is to turn data into ______: a) websites b) information c) programs d) objects e) None of The Above
Last Answer : b) information
Description : ______ is used by public and private enterprises to publish and share financial information with each other and industry analysis across all computer platforms and the Internet. a) Extensible ... Language c) Enterprise Application Integration d) Sales Force Automation Software e) None of these
Last Answer : b) Extensible Business Reporting Language
Description : 1. ______ is used for AI because it supports the implementation of software that computes with symbols very well. A. LISP B. ELIZA C. PROLOG D. NLP
Last Answer : A. LISP