Description : _____is the product of data processing: a) Data b) Information c) A Computer d) None of The Above
Last Answer : b) Information
Description : _____is the process of finding errors in software code. 1) Compiling 2) Testing 3) Running 4) Debugging 6 5) None of these
Last Answer : Answer :4
Description : _____is the science that attempts to produce machines that display the same type of intelligence that humans do. 1) Nano science 2) Nanotechnology 3) Simulation 4) Artificial intelligence (AI) 5) None of these
Description : _____is an abbreviation for binary digit: a) bingit b) base c) bit d) None of The Above
Last Answer : c) bit
Description : A _____is defined as "some sort of hardware architecture or software framework (including application frameworks), that allows software to run: a) Antalogy b) Platforms c) Toylogy d) None of These
Last Answer : b) Platforms
Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These
Last Answer : a) Trojan Horses
Description : Errors in a software program are referred to as: a) Viruses b) Bugs c) Computer Fault d) None of These
Last Answer : b) Bugs
Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? A) Memory address registers B) Memory data registers C) Instruction register D) Program counter
Last Answer : Answer : C
Description : Which among the following is correct about "Hacking": a) Hacking is an illegal intrusion into a computer system and/or network. b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is ... their own account followed by withdrawal of money. e) All of the Above f) None of These
Last Answer : e) All of the Above
Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware
Last Answer : a) To think like hackers and know how to defend such attacks
Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware
Description : _____is referred as both fund based and fee based financial service.(a) Higher purchase b) underwriting c) Factoring)
Last Answer : b) underwriting
Description : ______ is the first layer of software loaded into computer memory when it starts up. A. Device Drivers B. Language translators C. System Utilities D. Operating system
Last Answer : D. Operating system
Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These
Last Answer : a) File Infector Viruses
Description : _____is not an allotrope of carbon. (1) Buckminsterfullerene (2) Carbon Doxide (3) Diamond (4) Graphite
Last Answer : (2) Carbon Doxide Explanation: Carbon is capable of forming many allotropes due to its valency. Well-known forms of carbon include diamond and graphite. Other allotropes in clude: include buckyballs (fullerenes), amorphous carbon, glassy carbon, carbon nanofoam, nanotubes,and others.
Description : _____is the nematode that causes the blackhead disease in banana crop? A. Pratylenchus coffee B. Heterodera oryzicola C. Radopholus similis D. Helicotylenchus multicinctus
Last Answer : C. Radopholus similis
Description : _____is used to detect wireless networks on the windows platform a) Medusa b) NetStumbler c) SQLMap d) Iraon WASP
Last Answer : b) NetStumbler
Last Answer : Hygroscopicity is the property of absorbing moisture from atmosphere.
Description : _____is viscoelastic.
Last Answer : Rubber is viscoelastic.
Description : _____is an open loop control system.
Last Answer : Field controlled D.C. motor is an open loop control system.
Description : _____is a closed loop system.
Last Answer : Auto-pilot for an aircraft is a closed loop system.
Description : Before checking the program for errors in translating code into machine language the high level language code is loaded into __ a. Register b. Memory c. Data d. CPU
Last Answer : b. Memory
Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access
Last Answer : D. Physical access
Description : what type of ethical hack test access to the physical infra structure (a) internal network (b) remote network (c) external network (d) physical network
Last Answer : (d) physical network
Last Answer : Answer. Option D.
Description : What type of ethical hack tests access to the physical infrastructure? ∙ A. Internal network ∙ B. Remote network ∙ C. External network ∙ D. Physical access
Description : Which among the following is correct about the Antivirus Programs: a) They contain a database of signatures for all known viruses and worms b) The software searches a computer for the presence of these signatures c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address registers b. Memory data registers c. Instruction register d. Program counter
Last Answer : Instruction register
Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address register b. Memory data register c. Instruction registers d. Program counter
Last Answer : c. Instruction registers
Last Answer : c. Instruction register
Description : Which among the following is correct regarding the Boot Sector Viruses: a) These viruses are resides in the boot sector of a floppy or hard disk. b) Such viruses are activated every time a computer ... uninfected floppy disk is inserted into the floppy drive d) All of the Above e) None of These
Last Answer : d) All of the Above
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : Is there any way I can load backup copies of wii games on my wii without a hack or mod?
Last Answer : Not with firmware 3.4. You could look into downgrading, but that’s kinda risky. This article is worth a look.
Description : Does the new iPod nano have Internet capabilatyies without having to hack it?
Last Answer : answer:No, it doesn’t have a network card, so you can’t. Maybe there will come cards which connect via the iPod dockconnector, but don’t count on it. By the way: your battery will drain sooner because of power consumption.
Description : What is the method to hack Wifi with Android phone ? without root .
Last Answer : WiFi cannot be hacked. Although rooted can be set. Unroot cannot be set.
Description : How to hack wifi password on android phone without root?
Last Answer : Well, hacking is not very nice, as it is a crime in fact. Instead of having all the hassle to do that you can look for apps that allow you to connect to public and private wi-fi networks. In fact it kind ... To name a few you can try Wi-fi Map, Vazoo, Mandic Magic. There are many more, I am sure.
Description : A steel bar 5 m × 50 mm is loaded with 250,000 N. If the modulus of elasticity of the material is 0.2 MN/mm2 and Poisson's ratio is 0.25, the change in the volume of the bar is: (A) 1.125 cm3 (B) 2.125 cm3 (C) 3.125 cm3 (D) 4.125 cm
Last Answer : (C) 3.125 cm
Description : computer system without the owner’s informed consent. (a) Blog -Technology
Last Answer : (d) Malware designed to interrupt ongoing computer operations, collect private information and gain unauthorized access to your system resources.
Description : _____are attempt by individuals to obtain confidential information from you by falsifying their identity: a) Phishing Trips b) Computer Viruses c) Spyware Scams d) Viruses e) Phishing Scams
Last Answer : a) Phishing Trips
Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1) Phishing trips 2) Computer viruses 3) Spyware scams 4) Phishing Scams
Last Answer : 4) Phishing Scams
Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1 Phishing trips 2 Computer viruses 3 Spyware scams 4 Phishing Scams
Last Answer : 4 Phishing Scams
Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.
Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.
Description : More subtle because you are not aware that you are running these macros (A) The purpose of copyright (B) Danger of macro viruses (C) Derivative works (D) computer-specific crime
Last Answer : (B) Danger of macro viruses