The process of writing on an optical disc is called (1) Ripping (2) Fetching (3) Scanning (4) Burning

1 Answer

Answer :

Burning

Related questions

Description : The process of copying files to a CD-ROM is known as (A) Burning (B) Zipping (C) Digitizing (D) Ripping

Last Answer : (A) Burning

Description : _______is the process of carrying commands: a) Storing b) Executing c) Fetching d) None of These

Last Answer : b) Executing

Description : ________ is the process of carrying commands. a) Fetching b) Storing c) Executing d) Decoding e) None of these

Last Answer : c) Executing

Description : A compact disc (CD) is a data storage system of the type : (1) Magnetic (2) Optical (3) Electrical (4) Electromechanical

Last Answer : Optical

Description : This first step inthe transaction processing cycle captures businessdata throughvarious modes suchas optical scanning orat an electronic commerce website– (A) Document and report generation (B) Database maintenance (C) Transaction processing startup (D) Data Entry

Last Answer : Data Entry

Description : Why do dogs like to fetch? And why sticks? There have been questions about generalities, e.g. lately. My dog loves fetching sticks; a total dog stereotype. Why?

Last Answer : perhaps it is the feel in the mouth and the ease of grabbing it. Balls are a bit harder, especially for small mouth boogers. Maybe they like that a stick doesnt bounce. They are more in charge.

Description : We can't teach our dachshund to retrieve at all. Is it possible that some dogs don't like it?

Last Answer : Yes, it is possible. Some dogs may not have much fun. But it can be taught to everyone.

Description : Micro-orders generate the_ __ address of operand and execute instruction and prepare for fetching next instruction from the main memory: a. Physical b. Effective c. Logical d. all of above

Last Answer : b. Effective

Description : The act of acquiring an instruction is referred as the____ the instruction: a. Fetching b. Fetch cycle c. Both a and b d. None of these

Last Answer : a. Fetching

Description : A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are assembled from a device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing instructions at an average ... of the DMA transfer? (A) 0.06% (B) 0.12% (C) 1.2% (D) 2.5%

Last Answer : Answer: B

Description : ……….. is the latest optical disc secondary storage device. -Technology

Last Answer : Blu-ray Disc (BD)is the latest optical disc secondary storage device.

Description : DVD technology uses an optical media to store the digital data DVD is an acronym for (A) Digital Vector Disc (B) Digital Volume Disc (C) Digital Versatile Disc (D) Digital Visualization Disc

Last Answer : (C) Digital Versatile Disc

Description : What would you do if you discovered a half naked woman crawling around on your spare bedroom floor, ripping at the carpet, and obviously high on something?

Last Answer : I would say, “Mom!?!?”

Description : What is the best DVD ripper for Windows Movie Maker intended Ripping?

Last Answer : I hear Dvdshrink is the cat’s meow, at least for making backup copies of your DVDs. I think it has options for saving in a few formats. Handbrake, when I tried it, made one huge mp4 out of the whole DVD.

Description : How do we stop this ripping off of our tax dollars?

Last Answer : How do you (we) know they didn’t have Carpel Tunnel Syndrome?

Description : Why can 15 year-old DVD players show the latest released movies perfectly, but DVD ripping software sometimes can't?

Last Answer : You have a DVD player from 1996 that still works? I can only get mine to work for 2–3 years….

Description : Why isn't anyone ripping apart the married guy involved with another woman?

Last Answer : Is this about Newt?

Description : How many US companies are ripping off the government while in the Middle East?

Last Answer : All of them.

Description : Can I transfer videos to different computers via CD-R or DVD+RW without using a ripping program on the second computer?

Last Answer : Yes, of course you can. Don’t format the DVD as a video disc. Just keep it a data disc, and transfer the movie file to it. Just like you would transfer pictures or Excel spreadsheets.

Description : Has ripping on Americans become the new American pastime?

Last Answer : I am very proud to be an American! I try to only surround myself with like minded people.

Description : What conversion/ripping tools should I avoid to ensure that I don't inadvertently violate YouTube copyrights/anti-piracy measures?

Last Answer : Try http://www.flv2mp3.com/ – it was working for me as of a few days ago.

Description : Free, good quality DVD ripping software?

Last Answer : are you on a mac or pc? For mac there is Mac The Ripper Ever since my kids have been able to “put the disks in all by themselves” I have given them their own copy to do that with.

Description : I need suggestions about what to do about my work severely ripping people off?

Last Answer : If there is a legal matter involved, contact a lawyer. There are some workplaces where it is appropriate to be a “whistle blower” and you can use a hot-line for that purpose. If you know a better way to do the same business, start your own company and steal their customers.

Description : What is a good DVD ripping software for free on PC?

Last Answer : Try Handbrake: http://handbrake.fr/

Description : Can Somebody help me with my DVD Ripping and Playing?

Last Answer : answer:here’s a program that is easy and works perfectly. it’s called “hand brake”.. and you can check it out here: http://handbrake.fr/ it’s a free download too. i’ve never had any problems with it, but i have with other programs. hand brake is super easy. hope that it helps!

Description : What's the best DVD ripping software for windows pc that also converts for playback on iPhone and iPod?

Last Answer : Have you tried Handbrake? I prefer Mac, so I haven’t checked out the Windows version, but I can’t imagine it’s very different.

Description : Looking for audio and/or video ripping or recording software that splits and tags music or video files?

Last Answer : Not sure if I completely understand what you want, but I know the latest version of Quicktime is able to cut up a video anyway that you want & save it with many tag names. Also, you can separate the audio from the video & edit just the audio any way you want, then save it with any name of tags.

Description : I'd like a durable doll my girl keeps ripping their heads off?

Last Answer : get the doll called just my size doll-the life size doll about 3ft tall

Description : The rate at which scanning is repeated in a CRT is called ________ A. Resolution B. Refresh rate C. Bandwidth D. None of the Above

Last Answer : B. Refresh rate

Description : The rate at which scanning is repeated in a CRT is called : (1) refresh rate (2) resolution (3) pitch (4) bandwidth

Last Answer : refresh rate

Description : A technique for producing animation in which one image changes into another is called (1) Embedding (2) Linking (3) Morphing (4) Scanning

Last Answer : Morphing

Description : What is a scanning device ?

Last Answer : Scanning devices are devices that can be used to translate texts , images , photos, etc. into digital form and store and process them on a computer.

Description : Which involves photo scanning of the text character by character, analysis of the scanned in image , and then translation of the character image into character code? A. OCR B. OMR C. Bar code Reader D. None of the Above

Last Answer : A. OCR

Description : What are Macros: a) Small add - on programs that are installed afterwards if you need them b) Small programs created in MS - Word to automate repetitive tasks by using VBA c) Automatic Virus Scanning Programs d) None of The Above

Last Answer : b) Small programs created in MS - Word to automate repetitive tasks by using VBA

Description : ______is used for scanning the pictures and putting them in digitized form in the computer: a) CD-ROM b) Plotter c) Scanner d) None of The Above

Last Answer : c) Scanner

Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1) Input automation 2) Item data automation 3) Scanning automation 4) Source data automation

Last Answer : 3) Scanning automation

Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1 Input automation 2 Item data automation 3 Scanning automation 4 Source data automation

Last Answer : 3 Scanning automation

Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware

Last Answer : d) Hardware

Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning

Last Answer : D. Reconnaissance

Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning

Last Answer : D. Reconnaissance

Description : Which of the following used for the Network Testing and port scanning A)NetCat B)SuperScan C)NetScan D)All of Above

Last Answer : D)All of Above

Description : Network Testing and port scanning tools are : a. Sam Spade b. SuperScan c. NetScan d. All of the above

Last Answer : d. All of the above

Description : Vulnerability scanning in Ethical hacking finds………. a. Strengths b. Weakness c. A&B d. None of these

Last Answer : b. Weakness

Description : What is the first phase of hacking?  Maintaining access  Gaining access  Reconnaissance  Scanning

Last Answer :  Scanning

Description : Which of the following is not a network testing and port scanning tool? a. Nmap b. SuperScan c. John the ripper d. NetCat

Last Answer : c. John the ripper

Description : What is the first phase of hacking? a. Attack b. Maintaining access c. Gaining access d. Reconnaissance e. Scanning

Last Answer : e. Scanning

Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan

Last Answer : A. Netcat

Description : Which tool is used for ping sweeps and port scanning? A. Netcat B. SamSpade C. SuperScan D. All the above

Last Answer : C. SuperScan

Description : Sequential step hackers use are: _ _ _ _. A. Maintaining Access. B. Reconnaissance C. Scanning. D. Gaining Access.

Last Answer : A. Maintaining Access.

Description : Vulnerability scanning in Ethical hacking finds_____. A. Strengths. B. Weakness. C. A &B D. None of these.

Last Answer : B. Weakness.