Informal term for a programmer is:
a) Coder
b) Hacker
c) Both of Above
d) None of These

1 Answer

Answer :

c) Both of Above

Related questions

Description : A person who used his/her expertise to gain access to other people's computers to get information illegally or do damage is a ________: a) Hacker b) Analyst c) Instant Messenger d) Programmer e) Spammer

Last Answer : a) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1) Hacker 2) Spammer 3) Analyst 4) Programmer

Last Answer : 1) Hacker

Description : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a - 1 Hacker 2 Spammer 3 Analyst 4 Programmer

Last Answer : 1 Hacker

Description : A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a– (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer

Last Answer : hacker

Description : From where the term ‘hacker’ first came to existence? a) MIT b) Stanford University c) California d) Bell’s Lab

Last Answer : a) MIT

Description : The term cracker refers to_____ A. Black hat hacker. B. White hat hacker. C. Grey hat hacker. D. None of the above.

Last Answer : A. Black hat hacker.

Description : Anyone here who is a good JavaScript coder or can recommend someone who is?

Last Answer : PMing you, @ETpro.

Description : Can I train to become a medical billing professional and coder online?

Last Answer : There are internet classes to learn medical billing and coding. The amount medical billing professionals and coders earn differs upon where you are, as is the availability of jobs.

Description : Do you know the medical coder salary?

Last Answer : The medical coder salary may vary from 25000$ to 40000$. The person who is willing to choose this medical coder job should have some required qualification.

Description : How can I become certified as a medical coder?

Last Answer : Medical Coding - Medical Billing - Medical Auditing - AAPC www.aapc.com/ - trang y The nation's largest medical coding training and certification association for medical coders and medical ... Certified Instructor Offer AAPC Curriculum at Your School Log In / Join MEDICAL CODING CPC (Physician

Description : If I become a certified Medical Coder, can I work from home?

Last Answer : you can work from home and can get forty thousand dollars.This job can be a rewarding job as long as you work really hard. You can learn more from this link: medical-coding-careers.com/faq.shtml

Description : Noise occurring in the presence of signal resulting from a mismatch between the exact value of an analog signal and the closet available quantizing step in a digital coder. A. Quantizing noise B. Thermal noise C. Impulse noise D. Crosstalk

Last Answer : A. Quantizing noise

Description : Which of the following summation operations is performed onthe bits to checkanerror-detecting code? A. Codec B. Coder-decoder C. Checksum D. Attenuation

Last Answer : Checksum

Description : The vehicle through which the coded message is transmitted from the source to the receiver is called a(n) A)coder. B)decoder. C)encoder. D)relay channel. E)medium of transmission.

Last Answer : E)medium of transmission.

Description : Which statement is valid about computer program? A) It is understood by a computer B) It is understood by programmer C) It is understood user D) Both a & b

Last Answer : Answer : D

Description : A computer programmer A) Does all the thinking for a computer B) Can enter input data quickly C) Can operate all types of computer equipments D) Can draw only flowchart

Last Answer : Answer : A

Description : Personnel who design, program, operates and maintains computer equipment refers to A) Console-operator B) Programmer C) Peopleware D) System Analyst

Last Answer : Answer : C

Description : Which of the following statement is valid? A) Lady Augusta is the first programmer B) Ada is the daughter of Lord Byron, a famous English poet C) ADA is a programming language developed by US Defense D) All of above

Last Answer : Answer : D

Description : A person who designs the programs in a software package is called : a) User b) Software Manager c) System Developer d) System Programmer

Last Answer : Answer: d Explanation: The programs included in a system software package are called system programs. The programmers who design them and prepare them are called system programmers

Description : Public domain software is usually: a) System supported b) Source supported c) Community supported d) Programmer supported

Last Answer : Answer: c Explanation: The public domain software is generally community supported. It is community supported as author does not support users directly

Description : A person who creates software is called a: a) Programmer b) Software Engineer c) Software Developer d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which among the following is incorrect: a) Computer - Machine that will carry out the process described by program b) Person - Programmer who serves as the source of the communication c) Process - The ... - Actual System or environment where the problem arises e) None of These f) All of the above

Last Answer : e) None of These

Description : The person who writes and tests computer programs is called a: a) Programmer b) Software Engineer c) Project Developer d) None of These

Last Answer : b) Software Engineer

Description : The person who writes and tests computer programs is called a a) programmer b) computer scientist c) software engineer d) project developer e) None of these

Last Answer : c) software engineer

Description : Who was the programmer of Ms-Dos operating system 1) R Jhon 2) Bill Gates 3) Dennis Ritchi 4) none

Last Answer : 2) Bill Gates

Description : Who was the programmer of Ms-Dos operating system 1 R Jhon 2 Bill Gates 3 Dennis Ritchi 4 none

Last Answer : 2 Bill Gates

Description : Number crunchier is the informal name for A) Mini computer B) Super computer C) Microcomputer D) Mainframe computer

Last Answer : Answer : b

Description : ISP stands for: a) Interface Segregation Principle b) Internet Segregation Principle c) Informal Segregation Principle d) None of These

Last Answer : a) Interface Segregation Principle

Description : The Shass Pollaks are a community fabled for their feats of memory. With a particular book, they could recall a word from the exact spot where the experimenter stuck a pin into the page before them, ... name Shass from the informal term for the book that they learn so well. What book is this?

Last Answer : Talmud. (Also accept Mishna.)

Description : What is the job of a black hat hacker ?

Last Answer : The job of a black hat hacker is to gain malicious intent by illegally entering a user's computer system or network.

Description : Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ a) Black Hat hackers b) White Hat Hackers c) Grey Hat Hackers d) Red Hat Hacker

Last Answer : b) White Hat Hackers

Description : What is the primary goal of an Ethical Hacker? a. Avoiding Detection b. Determining return on investment (ROI) for security measure c. Resolving security vulnerabilities d. Testing Security Controls

Last Answer : a. Avoiding Detection

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : A. Disgruntled employees

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : What is it called when a hacker pretends to be a valid user on the system? A. Impersonation B. Third-person authorization C. Help desk D. Valid user

Last Answer : A. Impersonation

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : A. Remote attack

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker

Last Answer : A)Phreaker

Description : What is an grey hat hacker A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None

Last Answer : C)Combination of White and black hat hackers

Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies

Last Answer : B)Ethical

Description : . What is the required education to be an ethical hacker ? a. Diploma holder b. 10+2 passed c. Bachelor’s degree in the related field d. Nothing needed

Last Answer : c. Bachelor’s degree in the related field

Description : Malicious users are also called as : a. External attackers b. Trusted users c. hacker d. Internal attackers

Last Answer : d. Internal attackers

Description : What is the required education to be an ethical hacker ? a. Diploma holder b. 10+2 passed c. Bachelor’s degree in the related field d. Nothing needed

Last Answer : c. Bachelor’s degree in the related field

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack

Last Answer : D. Internal attack

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : D. Script kiddies

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacke

Last Answer : A. Security professional

Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack?  Local access  Remote attack  Internal attack  Physical access

Last Answer :  Remote attack