Description : Which of the following is/are an example of medical devices that diagnose or scense the body? a. CT Scanner b. MRI Scanner c. Ultrasound d. All of these
Last Answer : d. All of these
Description : In which issue, It is challenging to migrate an application, which is resource-intensive to cloud and to execute it via Virtual Machine? A. Architectural Issues B. Security and Privacy C. Mobile Communication Congestion D. Live VM Migration
Last Answer : Live VM Migration
Description : Palagiarism is unauthorized use of another person's copyright material without acknowledgment: A. Correct B. Incorrect
Last Answer : B. Incorrect
Description : Which of the following applies to the implementation of an idea? a) Copyright b) Intellectual property c) Patent d) Denial of service attack
Last Answer : c) Patent
Description : The rights of an author or artist with respect to his/her creation are governed by the law of a)Patent b)Copyright c)Trademarks d)Intellectual designs
Last Answer : b)Copyright
Description : Symbol of Maharaja of Air India is a)Copyright b)Patent c)Trademark d)All of the above
Last Answer : d)All of the above
Description : In which year first copyright act was passed in India? a. 1956 b. 1934 c. 1914 d. 1924
Last Answer : c. 1914
Description : A distinctive sign that identifies certain goods or services produced or provided by an individuals or a company is calleda. Copyright b.Patents c. Trademark d. All of these
Last Answer : c. Trademark
Description : A distinctive sign that identifies certain goods or services produced or provided by an individuals or a company is called a. Copyright b.Patents c. Trademark d. All of these
Description : Unwanted and unsolicited commercial e-mails that clog up e-mailboxes of users is classified as______________________ a. Invasion of privacy b. Spam c. Virus d. Deception
Last Answer : b. Spam
Description : Which Act in India focuses on data privacy and information technology? a. IT(ammendment)Act 2008 b. Indian Penal code c. IT Act 2000 d. None of these
Last Answer : c. IT Act 2000
Description : Right to Privacy is included in which article of Indian constitutions? a. Article 21 b. Article 12 c. Article 15 d. Article 25
Last Answer : a. Article 21
Description : New high-tech airport imagers -- common sense to keep us safe or unacceptable invasion of privacy?
Last Answer : Now that sources are saying they could have prevented the guy from getting on board, I'm all for them even more. I see no problem with them at all. How could they invade someones privacy? ... will see your panties, these same people buy stuff on the internet and risk getting their identity stolen.
Description : The domestic standards evolved to deal with the issue of IDPs are a. The Disaster Management Act. 2005 b. Land Acquisition Amendment Bill c. National Rehabilitation and Resettlement Policy, 2007 ( NRRP ) d. All of above
Last Answer : d. All of above
Description : Chipko Movement was against - (a) Scarcity of Water (b) Pollution Issue (c) Cutting of Trees (d) None of these
Last Answer : (c) Cutting of Trees
Description : During which plan was the development of women first considered as a separate issue? a. Fourth five year plan b. sixth five year plan c. eleventh five year plan d. first five year plan
Last Answer : b. sixth five year plan
Description : Which Article of the Indian Constitution empowers a High Court to issue writs? a.Art342 b.Art366 c.Art226 d.Art358
Last Answer : c.Art226
Description : Publishing false information in internet is an issue ofa. Computer ethics b. Morality c. Computer equity d. Digital Divide
Last Answer : a. Computer ethics
Description : SBI branches in rural areas does not have Cash Deposit Machine, it is an issue of a. Digital divide b. Computer unequity c. Social issue d. None of the these
Last Answer : a. Digital divide
Description : Discrimination of computer studies based on caste/tribe is an issue of - a. Digital divide b. Computer equity c. Euality d. None of the these
Description : Publishing false information in internet is an issue of a. Computer ethics b. Morality c. Computer equity d. Digital Divide
Description : SBI, korbook branch does not have Cash Deposit Machine, it is an issue of- a. Digital divide b. Computer unequity c. Social issue d. None of the these
Description : Privacy Issue: Windows and public library of photos...what is this?
Last Answer : answer:I think if you hover your cursor over the title of the “Public library” folder, it’ll either tell you how many files it contains or that it’s empty. That way you can see whether there are any files in that folder without opening it.
Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption
Last Answer : d. encryption
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption
Last Answer : a. digital wallet
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above
Last Answer : d. all the above
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above
Description : The main thrust of ‘Copenhegen Summit’ was: a) Food Security b) Air Pollution c) Rehabilitation d) Climate Change
Last Answer : d) Climate Change
Description : The right to life, liberty and security of person under the ICCPR is contained in a. Article 1 b. Article 2 c. Article 3 d. Article 4
Last Answer : c. On 20 th November 1989
Description : What is the myth of protection? [A] It characterizes men as protective and women as protected [B] It is used to justify and shape material security policies [C] It has been challenged by changing gender role in contemporary warfare [D] All of the above
Last Answer : [D] All of the above
Description : n processes, access control implements a a)Security Policy b)Access Policy c)Control Policy d)Check Policy
Last Answer : a)Security Policy
Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access
Last Answer : c)Hacker or Cracker
Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v
Last Answer : c) i, ii, iii and v only
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : a) Confidentiality
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : b) Integrity
Description : Apple doesn't want to unlock the terrorist's iPhone for the FBI. Is the privacy of iphone users more important than national security?
Last Answer : What is most bothersome to me is that the FBI cannot do this on their own. I mean supposedly we possess some the most advanced technology and hackers in the world. So why don't they just do this ... way Apple has a court order to help and it will be interesting to see how long Apple stands firm.
Description : Is there any good website to learn about online safety, security and privacy?
Last Answer : Here is a website that educates users of connected technology about safety measures, security and privacy. On this website, you can find news and commentary. You can also hit upon ... decision makers to formulate reasonable policies that promote both originality and responsible use of technology.
Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned
Last Answer : Data Privacy
Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.
Last Answer : You can decide on how many physical servers required for hosting your application.
Description : A company is considering a cloud environment to improve the operating efficiency for their dataand applications. The company is part of an industry where strict security and data privacy issues are of the highest ... a good choice? A. hybrid cloud B. public cloud C. private cloud D. governed cloud
Last Answer : private cloud
Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above
Last Answer : C) Security
Description : What is Wired Equivalent Privacy (WEP)? a) security algorithm for ethernet b) security algorithm for wireless networks c) security algorithm for usb communication d) security algorithm for emails
Last Answer : b) security algorithm for wireless networks
Description : A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures. a) privacy and security b) rules and regulations c) hacking techniques d) ethics to talk to seniors
Last Answer : a) privacy and security
Description : Advantages of B2C commerce to customers are (i)wide variety of goods can be accessed and comparative prices can be found (ii) shopping can be done at any time (iii)privacy of transactions can be guaranteed (iv) ... be guaranteed a. i and ii b. ii and iii c. iii and iv d. i and iv
Last Answer : a. i and ii
Description : Do you have to go through airport security again if you leave the airport if you have a layover?
Last Answer : Yes.
Description : Question on getting through airport security with vital documents and cash?
Last Answer : answer:Why would these pose a problem for you? Plenty of people travel carrying important documents, and large sums of money. I certainly have, domestically and internationally. TSA is looking for ... to your parents' place, just in case something happens to your original documents during transit.
Description : If we abolish airport security, will the airlines become safe at last?
Last Answer : I don't think so. Although I'm not thrilled with the new scanning technology out there, I think there should always be airport security. It's not so much if there was a device on a plane which ... got off my plane to retrieve it. At my city's airport there have been lots of thefts with luggage.