Description : The language made up of binary coded instructions. a) Machine b) C c) BASIC d) High level
Last Answer : Answer: a Explanation: The language made up of binary coded instructions built into the hardware of a particular computer and used directly by the computer is machine language
Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking
Last Answer : d. Remote networking
Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these
Last Answer : Answer :4
Description : Each coded instruction in a set of instructions is called as…… a.Words b.Alphabet c.Numbers d.Format
Last Answer : a.Words
Description : How are instructions coded by DNA translated into an organism physical traits?
Last Answer : Instructions coded by DNA sequences are translated into proteinswhich express an organism's physical traits.
Description : merchandising company using a perpetual system will make a. the same number of adjusting entries as a service company does. b. one more adjusting entry than a service company does. c. one ... than a service company does. d. different types of adjusting entries compared to a service company.
Last Answer : c. one less adjusting entry than a service company does.
Description : A UNIX file system has 1 KB block size and 4-byte disk addresses. What is the maximum file size if the inode contains ten direct block entries, one single indirect block entry, one double indirect block entry and one triple indirect block entry? (A) 30 GB (B) 64 GB (C) 16 GB (D) 1 GB
Last Answer : (C) 16 GB
Description : A unix file system has 1-KB blocks and 4-byte disk addresses. What is the maximum file size if i-nodes contain 10 direct entries and one single, double and triple indirect entry each? (A) 32 GB (B) 64 GB (C) 16 GB (D) 1 GB
Description : New entrants to an industry are more likely when (i.e., entry barriers are low when…) A. It is difficult to gain access to distribution channels. B. Economies of scale in the industry are high. C. Product differentiation in the industry is low. D. Capital requirements in the industry are high.
Last Answer : Product differentiation in the industry is low.
Description : If I'm going to return my computer to the store for a replacement or refund, what do I need to do to clear out any passwords or history from being visible to workers who may have access to the computer?
Last Answer : What browser are you using? If Firefox, you can press Ctrl+Shift+Del or click Tools->Clear Recent History. Other browsers probably have similar options.
Description : In the following table, every entry on the left column can match with any number of entries on the right side.
Last Answer : In the following table, every entry on the left column can match with any number of entries ... objects moving through it. S Non-conservative force
Description : To supply of saving bank ledger copy Rs _____ will be charged a) 10 per ledger copy b) Rs 5 per every thirty entry c) Rs 2 per every thirty entries or part there of d) Free
Last Answer : c) Rs 2 per every thirty entries or part there of
Description : The first required step in the accounting cycle is a. reversing entries. b. journalizing transactions in the book of original entry. c. analyzing transactions. d. posting transactions.
Last Answer : c. analyzing transactions.
Description : The instructions for starting the computer are house on A) Random access memory B) CD-Rom C) Read only memory chip D) All of above
Last Answer : Answer : C
Description : Which of the following is used to protect objects in computer system, in the absence of more complete protection schemes? (1) digital certificate (2) digital signature (3) passwords (4) tokens
Last Answer : passwords
Description : The simultaneous execution of two or more instructions is called- 1) Sequential Access 2) Reduced Instruction set computing 3) Multiprocessing 4) None of these
Last Answer : 3) Multiprocessing
Description : Do you believe that in 1947, a UFO crash-landed on a ranch near Roswell NM, and our federal government has been trying, since then, to conceal the facts of that incident from the public?
Last Answer : Ummm….. No. Why would they? I would think the advanced space travel technology would benefit us. At least it would be a way for the wealthy/government to go up and claim everything before all us “normies” therefore, making them richer by renting space gear and other planet land. Just my thoughts.
Description : A decorative framework to conceal curtain fixtures at the top of a window casing. -Do You Know?
Last Answer : The cornice juts away from the building enough that the rainwater flows away from the building. Not just for buildings, the word cornice can also describe raised decorative molding right under the ceiling in a room or a similar decorative topping that crowns some windows to hide curtain rods.
Description : Why does the mandarins daughter conceal herself when she advises her father?
Last Answer : Feel Free to Answer
Description : 18 clever hacks to conceal eyesores in your home?
Last Answer : Paint Kitchen CabinetsCabinets can be expensive to replace, but a simple paint job can make a world of difference. See the tutorial at centsationalgirl.com.Replace Drawer and Cabinet HardwareNew knobs and handles on drawers ... and don't like in a home, giving you a better idea of what to focus on.
Description : The auditor is most likely to presume that a high risk of fraud exists if a. The client is a multinational company that does business in numerous foreign countries. b. The client ... perpetrate and conceal thefts. d. Inadequate employee training results in lengthy EDP exception reports each month
Last Answer : Inadequate segregation of duties places an employee in a position to perpetrate and conceal thefts
Description : Is it illegal for an ex-wife to access my facebook messages or email messages if she finds my passwords?
Last Answer : Yes. Change everything. If she manages to do it again, get proof and take her to court.
Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology
Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.
Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data
Last Answer : (B) Passwords to prohibit unauthorised access to files.
Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening
Last Answer : c. Hacking
Description : Critical Region is: a) a set of instructions that access common shared resources which exclude one another in time b) the portion of the main memory which can be accessed only by one process at a time. c) Both of The Above d) None of The Above
Last Answer : a) a set of instructions that access common shared resources which exclude one another in time
Description : Which of the following entry will be made in BO a) To invoice remittance noting the details of cash( including stamps) sent to the branch office b) To confirm the accuracy of the daily account last ... to the branch office. d) To give instructions to the BPM whenever necessary e) All the above
Last Answer : e) All the above
Description : Which of the following behaves like the entry point of the monitor and reroutes the instructions of the virtual machine? A. Dispatcher B. Allocator C. Interpreter D. Both A and B
Last Answer : . Dispatcher
Description : The instructions for starting the computer are house on a. Random access memory b. CD-Rom c. Read only memory chip
Last Answer : c. Read only memory chip
Description : The instructions for starting the computer are house on a. Random access memory b. CD-Rom c. Read only memory chip d. All of above
Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These
Last Answer : d) None of These
Description : To contact people using the internet, you most often use their: a) domain names b) e-mail addresses c) usernames d) passwords e) None of these
Last Answer : b) e-mail addresses
Description : Which of the following will help you to improve your LAN security? 1) Change your passwords frequently 2) Install a firewall program 3) Use a proxy 4) All of the above
Last Answer : 3) Use a proxy
Description : Which of the following will help you to improve your LAN security? 1 Change your passwords frequently 2 Install a firewall program 3 Use a proxy 4 All of the above
Last Answer : 3 Use a proxy
Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation
Last Answer : A) Encryption
Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer
Last Answer : a) Hacker
Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer
Last Answer : 1) Hacker
Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer
Last Answer : 1 Hacker
Description : Social engineering the ____ of exploiting the human elements to gain access to unauthorized resources. a. Art b. Science c. Hacking d. Skill
Last Answer : a. Art
Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.
Last Answer : A. Social Engineering.
Description : Which of the following is correct full form of BCD? A) Binary Coded Decimal B) Bit Coded Decimal C) Binary Coded Digit D) Bit Coded Digit
Last Answer : Answer : A
Description : EBCDIC stands for A) Extended Binary Coded Decimal Interchange Code B) Extended Bit Code Decimal Interchange Code C) Extended Bit Case Decimal Interchange Code D) Extended Binary Case Decimal Interchange Code
Description : BCD is A) Binary Coded Decimal B) Bit Coded Decimal C) Binary Coded Digit D) Bit Coded Digit
Description : ASCII and EBCDIC are the popular character coding systems. What does EBCDIC stand for? A) Extended Binary Coded Decimal Interchange Code B) Extended Bit Code Decimal Interchange Code C) Extended Bit Case Decimal Interchange Code D) Extended Binary Case Decimal Interchange Code
Description : _________ is a device used for reading bar coded data (contains light and dark lines). A. Graphic Tablet B. Numeric pad C. Bar Code reader D. Magnetic Stripe reader
Last Answer : C. Bar Code reader