Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access
Last Answer : c)Hacker or Cracker
Description : The domestic standards evolved to deal with the issue of IDPs are a. The Disaster Management Act. 2005 b. Land Acquisition Amendment Bill c. National Rehabilitation and Resettlement Policy, 2007 ( NRRP ) d. All of above
Last Answer : d. All of above
Description : Feminist theorists would see which of the following as developments as progress? [A] The establishment of UN Gender Development Index [B] The Election of Indian Speaker [C] The incorporation of gender mainstreaming into policy discourses [D] All of the above
Last Answer : [D] All of the above
Description : The constitution of India provides basic Human Rightsto its people through the – (a) Preamble (b) Fundamental Rights (c) Directive principles of State Policy (d) All of the above
Last Answer : (d) All of the above
Description : The Indian constitution borrowed the idea of Directive principles of state policy from the a) Irish Constitution b) British Constitution c) US Constitution d) None of the above
Last Answer : a) Irish Constitution
Description : Separation of the Judiciary from the Executive has been provided in which of the following parts of the Indian Constitution? (A) The Preamble (B) The Fundamental Rights (C) The Directive Principles of State Policy (D) The Seventh Schedule
Last Answer : (C) The Directive Principles of State Policy
Description : Which part of the Indian constitution deals with the Directive Principles of State Policy? a. Part-III b. Part-IV c. Part-V d. None of them
Last Answer : b. Part-IV
Description : Which of the following Articles contain Directive Principles of State Policy? (a) 30 to 49 (b) 36 to 51 (c) 42 to 56 (d) 28 to 48
Last Answer : (b) 36 to 51
Description : Planning in India derives its objectives from – (i) Preamble (ii) Fundamental duties (iii) Fundamental rights (iv) Directives principles of state policy
Last Answer : (iv) Directives principles of state policy
Description : Which factor determines when your IT system will be available for knowledge worker to access? a) Availability b) Accessibility c) Reliabilityd) None of the above
Last Answer : a) Availability
Description : ...............................is a type of online advertising where you only pay when somebody clicks on company ads. a) Pay per click b) Use per visit c) Give per login d) Payment per access
Last Answer : a) Pay per click
Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens
Last Answer : d)It is used to ensure data corruption does not happens
Description : A company wide network,closed to public access,which uses internet type technology is called a)Intranet b) Internet c) Extranet d)none of these
Last Answer : a)Intranet
Description : Which of the following is an example of presentation software? a. Ms-Access b. Spreadsheet c. Power-point d. Word processing
Last Answer : c. Power-point
Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption
Last Answer : d. encryption
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption
Last Answer : a. digital wallet
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above
Last Answer : d. all the above
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above
Description : The main thrust of ‘Copenhegen Summit’ was: a) Food Security b) Air Pollution c) Rehabilitation d) Climate Change
Last Answer : d) Climate Change
Description : The right to life, liberty and security of person under the ICCPR is contained in a. Article 1 b. Article 2 c. Article 3 d. Article 4
Last Answer : c. On 20 th November 1989
Description : What is the myth of protection? [A] It characterizes men as protective and women as protected [B] It is used to justify and shape material security policies [C] It has been challenged by changing gender role in contemporary warfare [D] All of the above
Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v
Last Answer : c) i, ii, iii and v only
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : a) Confidentiality
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : b) Integrity
Description : Use of Full Body Scanner at Airport is an issue between a. Security and Copyright b. Copyright and Privacy c. Security and Privacy d. None of the above
Last Answer : c. Security and Privacy
Description : The reading of the script to check the errors is called: a) Composing b) Proof-reading c) Editing d) None of these
Last Answer : b) Proof-reading
Description : The reading of the script to check the errors is called: A. Composing B. Proof-reading C. Editing D. None of these
Last Answer : B. Proof-reading
Description : The reading of the script to check the errors is called: A. Composing B. Editing C. Proof-reading D. None of these
Last Answer : C. Proof-reading
Description : n which stage or phase of Product Life Cycle, Sales Volume is at Peak Point a) Growth b) Saturation c) Maturity d) Decline
Last Answer : b) Saturation
Description : When preparing a website, designers should ensure that the site makes effective use of the text, pictures and video. This design feature is known as _________. a. communication b.connection c . c o n t e n t d . c o n t e x t
Last Answer : c . c o n t e n t
Description : Who is the Chairman of the State Planning Board? (a) Manik Sarkar (b) Biplab Deb (c) Manik Dey (d) N.C. Debbarma
Last Answer : (a) Manik Sarkar
Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology
Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.
Description : Access - control based on a person's fingerprints is an example of _____: a) Biometric Identification b) Characteristic Identification c) Characteristic Security d) Fingerprint Security e) Logitstics
Last Answer : a) Biometric Identification
Description : What are some of the benefits of using a firewall for your LAN? 1) Increased access to Instant Messaging 2) Stricter access control to critical resources 3) Greater security to your LAN 4) Both 2 and 3
Last Answer : 4) Both 2 and 3
Description : What is true about FIDM? A. FIDM describes the technologies and protocols B. It uses Security Markup Language (SAML) to package a user's security credentials C. SAML has access control D. All of the above
Last Answer : All of the above
Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3
Last Answer : 4 Both 2 and 3
Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control
Last Answer : C) Data Control
Description : Why are wands the magical implements of choice?
Last Answer : checking wikipedia now….
Description : What's a cool name for a computer program that simulates a toy train that implements a computer?
Last Answer : What about BitTrain? No, too dorky.
Description : There is a barrel with no lid and some wine in it. 'This barrel of wine is more than half full,' said the Madam. 'No it's not,' says the man. 'It's less than half full.' ... any measuring implements and without removing any wine from the barrel, how can they easily determine who is correct? -Riddles
Last Answer : Tilt the barrel until the wine barely touches the lip of the barrel. If the bottom of the barrel is visible then it is less than half full. If the barrel bottom is still completely coverd by the wine, then it is more than half full.
Description : There is a barrel with no lid and some wine in it. 'This barrel of wine is more than half full,' said Curly. 'No it's not,' says Mo. 'It's less than half full.' Without any measuring implements and without removing any wine from the barrel, how can they easily determine who is correct? -Riddles
Last Answer : Tilt the barrel until the wine barely touches the lip of the barrel. If the bottom of the barrel is visible then it is less than half full. If the barrel bottom is still completely covered by the wine, then it is more than half full.
Description : What DoD instruction implements the DoD CUI program?
Last Answer : DoDI 5200.48, Controlled Unclassified Information
Description : The secondary tillage implements are
Last Answer : Ans.Cultivator, Harrows, Hoe, Planker, Roller etc.
Description : The primary tillage implements are
Last Answer : Ans.Deshi plough, MB plough, Ridge plough, Disk plough etc.
Description : Indus Valley Civilisation There was a sharp class division at Harappa and Mohenjo-Daro. This is clear from the _____. A. Indus seals excavated B. Religious beliefs of the Harappans C. Tools and implements used by the Harappans D. Different types of dwellings excavated
Last Answer : ANSWER: D
Description : With which period do we associate the ‘microlith’ implements?
Last Answer : Mesolithic
Description : Which search implements stack operation for searching the states? a) Depth-limited search b) Depth-first search c) Breadth-first search d) None of the mentioned
Last Answer : b) Depth-first search
Description : An _____ is a contract between a class and the outside world. When a class implements an interface, it promises to provide the behavior published by that ______: a) Object b) Interface c) Package d) None of These
Last Answer : b) Interface
Description : With which period do we associate the 'microlith' implements?
Last Answer : Uranium