Coded entries which are used to gain access to a computer system are called:
a) Passwords
b) Coded Instructions
c) Conceal Feed Entry
d) None of These

1 Answer

Answer :

a) Passwords

Related questions

Description : The language made up of binary coded instructions. a) Machine b) C c) BASIC d) High level

Last Answer : Answer: a Explanation: The language made up of binary coded instructions built into the hardware of a particular computer and used directly by the computer is machine language

Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking

Last Answer : d. Remote networking

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : Each coded instruction in a set of instructions is called as…… a.Words b.Alphabet c.Numbers d.Format

Last Answer : a.Words

Description : How are instructions coded by DNA translated into an organism physical traits?

Last Answer : Instructions coded by DNA sequences are translated into proteinswhich express an organism's physical traits.

Description : merchandising company using a perpetual system will make a. the same number of adjusting entries as a service company does. b. one more adjusting entry than a service company does. c. one ... than a service company does. d. different types of adjusting entries compared to a service company.

Last Answer : c. one less adjusting entry than a service company does.

Description : A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry? (A) 30 GB (B) 64 GB (C) 16 GB (D) 1 GB

Last Answer : (C) 16 GB

Description : A unix file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size if i-nodes contain 10 direct entries and one single, double and triple indirect entry each? (A) 32 GB (B) 64 GB (C) 16 GB (D) 1 GB

Last Answer : (C) 16 GB

Description : New entrants to an industry are more likely when (i.e., entry barriers are low when…) A. It is difficult to gain access to distribution channels. B. Economies of scale in the industry are high. C. Product differentiation in the industry is low. D. Capital requirements in the industry are high.

Last Answer : Product differentiation in the industry is low.

Description : New entrants to an industry are more likely when (i.e., entry barriers are low when…) A. It is difficult to gain access to distribution channels. B. Economies of scale in the industry are high. C. Product differentiation in the industry is low. D. Capital requirements in the industry are high.

Last Answer : Product differentiation in the industry is low.

Description : If I'm going to return my computer to the store for a replacement or refund, what do I need to do to clear out any passwords or history from being visible to workers who may have access to the computer?

Last Answer : What browser are you using? If Firefox, you can press Ctrl+Shift+Del or click Tools->Clear Recent History. Other browsers probably have similar options.

Description : In the following table, every entry on the left column can match with any number of entries on the right side.

Last Answer : In the following table, every entry on the left column can match with any number of entries ... objects moving through it. S Non-conservative force

Description : To supply of saving bank ledger copy Rs _____ will be charged a) 10 per ledger copy b) Rs 5 per every thirty entry c) Rs 2 per every thirty entries or part there of d) Free

Last Answer : c) Rs 2 per every thirty entries or part there of

Description : The first required step in the accounting cycle is a. reversing entries. b. journalizing transactions in the book of original entry. c. analyzing transactions. d. posting transactions.

Last Answer : c. analyzing transactions.

Description : The instructions for starting the computer are house on A) Random access memory B) CD-Rom C) Read only memory chip D) All of above

Last Answer : Answer : C

Description : Which of the following is used to protect objects in computer system, in the absence of more complete protection schemes? (1) digital certificate (2) digital signature (3) passwords (4) tokens

Last Answer : passwords

Description : The simultaneous execution of two or more instructions is called- 1) Sequential Access 2) Reduced Instruction set computing 3) Multiprocessing 4) None of these

Last Answer : 3) Multiprocessing

Description : Do you believe that in 1947, a UFO crash-landed on a ranch near Roswell NM, and our federal government has been trying, since then, to conceal the facts of that incident from the public?

Last Answer : Ummm….. No. Why would they? I would think the advanced space travel technology would benefit us. At least it would be a way for the wealthy/government to go up and claim everything before all us “normies” therefore, making them richer by renting space gear and other planet land. Just my thoughts.

Description : A decorative framework to conceal curtain fixtures at the top of a window casing. -Do You Know?

Last Answer : The cornice juts away from the building enough that the rainwater flows away from the building. Not just for buildings, the word cornice can also describe raised decorative molding right under the ceiling in a room or a similar decorative topping that crowns some windows to hide curtain rods.

Description : Why does the mandarins daughter conceal herself when she advises her father?

Last Answer : Feel Free to Answer

Description : 18 clever hacks to conceal eyesores in your home?

Last Answer : Paint Kitchen CabinetsCabinets can be expensive to replace, but a simple paint job can make a world of difference. See the tutorial at centsationalgirl.com.Replace Drawer and Cabinet HardwareNew knobs and handles on drawers ... and don't like in a home, giving you a better idea of what to focus on.

Description : The auditor is most likely to presume that a high risk of fraud exists if a. The client is a multinational company that does business in numerous foreign countries. b. The client ... perpetrate and conceal thefts. d. Inadequate employee training results in lengthy EDP exception reports each month

Last Answer : Inadequate segregation of duties places an employee in a position to perpetrate and conceal thefts

Description : Is it illegal for an ex-wife to access my facebook messages or email messages if she finds my passwords?

Last Answer : Yes. Change everything. If she manages to do it again, get proof and take her to court.

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening

Last Answer : c. Hacking

Description : Critical Region is: a) a set of instructions that access common shared resources which exclude one another in time b) the portion of the main memory which can be accessed only by one process at a time. c) Both of The Above d) None of The Above

Last Answer : a) a set of instructions that access common shared resources which exclude one another in time

Description : Which of the following entry will be made in BO a) To invoice remittance noting the details of cash( including stamps) sent to the branch office b) To confirm the accuracy of the daily account last ... to the branch office. d) To give instructions to the BPM whenever necessary e) All the above

Last Answer : e) All the above

Description : Which of the following behaves like the entry point of the monitor and reroutes the instructions of the virtual machine? A. Dispatcher B. Allocator C. Interpreter D. Both A and B

Last Answer : . Dispatcher

Description : The instructions for starting the computer are house on a. Random access memory b. CD-Rom c. Read only memory chip

Last Answer : c. Read only memory chip

Description : The instructions for starting the computer are house on a. Random access memory b. CD-Rom c. Read only memory chip d. All of above

Last Answer : c. Read only memory chip

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : To contact people using the internet, you most often use their: a) domain names b) e-mail addresses c) usernames d) passwords e) None of these

Last Answer : b) e-mail addresses

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which of the following will help you to improve your LAN security? 1) Change your passwords frequently 2) Install a firewall program 3) Use a proxy 4) All of the above

Last Answer : 3) Use a proxy

Description : Which of the following will help you to improve your LAN security? 1 Change your passwords frequently 2 Install a firewall program 3 Use a proxy 4 All of the above

Last Answer : 3 Use a proxy

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer

Last Answer : a) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer

Last Answer : 1) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer

Last Answer : 1 Hacker

Description : Social engineering the ____ of exploiting the human elements to gain access to unauthorized resources. a. Art b. Science c. Hacking d. Skill

Last Answer : a. Art

Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.

Last Answer : A. Social Engineering.

Description : Which of the following is correct full form of BCD? A) Binary Coded Decimal B) Bit Coded Decimal C) Binary Coded Digit D) Bit Coded Digit

Last Answer : Answer : A

Description : EBCDIC stands for A) Extended Binary Coded Decimal Interchange Code B) Extended Bit Code Decimal Interchange Code C) Extended Bit Case Decimal Interchange Code D) Extended Binary Case Decimal Interchange Code

Last Answer : Answer : A

Description : BCD is A) Binary Coded Decimal B) Bit Coded Decimal C) Binary Coded Digit D) Bit Coded Digit

Last Answer : Answer : A

Description : ASCII and EBCDIC are the popular character coding systems. What does EBCDIC stand for? A) Extended Binary Coded Decimal Interchange Code B) Extended Bit Code Decimal Interchange Code C) Extended Bit Case Decimal Interchange Code D) Extended Binary Case Decimal Interchange Code

Last Answer : Answer : A

Description : _________ is a device used for reading bar coded data (contains light and dark lines). A. Graphic Tablet B. Numeric pad C. Bar Code reader D. Magnetic Stripe reader

Last Answer : C. Bar Code reader