Description : The process of copying files to a CD-ROM is known as (A) Burning (B) Zipping (C) Digitizing (D) Ripping
Last Answer : (A) Burning
Description : _______is the process of carrying commands: a) Storing b) Executing c) Fetching d) None of These
Last Answer : b) Executing
Description : ________ is the process of carrying commands. a) Fetching b) Storing c) Executing d) Decoding e) None of these
Last Answer : c) Executing
Description : A compact disc (CD) is a data storage system of the type : (1) Magnetic (2) Optical (3) Electrical (4) Electromechanical
Last Answer : Optical
Description : This first step inthe transaction processing cycle captures businessdata throughvarious modes suchas optical scanning orat an electronic commerce website– (A) Document and report generation (B) Database maintenance (C) Transaction processing startup (D) Data Entry
Last Answer : Data Entry
Description : Why do dogs like to fetch? And why sticks? There have been questions about generalities, e.g. lately. My dog loves fetching sticks; a total dog stereotype. Why?
Last Answer : perhaps it is the feel in the mouth and the ease of grabbing it. Balls are a bit harder, especially for small mouth boogers. Maybe they like that a stick doesnt bounce. They are more in charge.
Description : We can't teach our dachshund to retrieve at all. Is it possible that some dogs don't like it?
Last Answer : Yes, it is possible. Some dogs may not have much fun. But it can be taught to everyone.
Description : Micro-orders generate the_ __ address of operand and execute instruction and prepare for fetching next instruction from the main memory: a. Physical b. Effective c. Logical d. all of above
Last Answer : b. Effective
Description : The act of acquiring an instruction is referred as the____ the instruction: a. Fetching b. Fetch cycle c. Both a and b d. None of these
Last Answer : a. Fetching
Description : A DMA controller transfers 32-bit words to memory using cycle Stealing. The words are assembled from a device that transmits characters at a rate of 4800 characters per second. The CPU is fetching and executing instructions at an average ... of the DMA transfer? (A) 0.06% (B) 0.12% (C) 1.2% (D) 2.5%
Last Answer : Answer: B
Description : ……….. is the latest optical disc secondary storage device. -Technology
Last Answer : Blu-ray Disc (BD)is the latest optical disc secondary storage device.
Description : DVD technology uses an optical media to store the digital data DVD is an acronym for (A) Digital Vector Disc (B) Digital Volume Disc (C) Digital Versatile Disc (D) Digital Visualization Disc
Last Answer : (C) Digital Versatile Disc
Description : What would you do if you discovered a half naked woman crawling around on your spare bedroom floor, ripping at the carpet, and obviously high on something?
Last Answer : I would say, “Mom!?!?”
Description : What is the best DVD ripper for Windows Movie Maker intended Ripping?
Last Answer : I hear Dvdshrink is the cat’s meow, at least for making backup copies of your DVDs. I think it has options for saving in a few formats. Handbrake, when I tried it, made one huge mp4 out of the whole DVD.
Description : How do we stop this ripping off of our tax dollars?
Last Answer : How do you (we) know they didn’t have Carpel Tunnel Syndrome?
Description : Why can 15 year-old DVD players show the latest released movies perfectly, but DVD ripping software sometimes can't?
Last Answer : You have a DVD player from 1996 that still works? I can only get mine to work for 2–3 years….
Description : Why isn't anyone ripping apart the married guy involved with another woman?
Last Answer : Is this about Newt?
Description : How many US companies are ripping off the government while in the Middle East?
Last Answer : All of them.
Description : Can I transfer videos to different computers via CD-R or DVD+RW without using a ripping program on the second computer?
Last Answer : Yes, of course you can. Don’t format the DVD as a video disc. Just keep it a data disc, and transfer the movie file to it. Just like you would transfer pictures or Excel spreadsheets.
Description : Has ripping on Americans become the new American pastime?
Last Answer : I am very proud to be an American! I try to only surround myself with like minded people.
Description : What conversion/ripping tools should I avoid to ensure that I don't inadvertently violate YouTube copyrights/anti-piracy measures?
Last Answer : Try http://www.flv2mp3.com/ – it was working for me as of a few days ago.
Description : Free, good quality DVD ripping software?
Last Answer : are you on a mac or pc? For mac there is Mac The Ripper Ever since my kids have been able to “put the disks in all by themselves” I have given them their own copy to do that with.
Description : I need suggestions about what to do about my work severely ripping people off?
Last Answer : If there is a legal matter involved, contact a lawyer. There are some workplaces where it is appropriate to be a “whistle blower” and you can use a hot-line for that purpose. If you know a better way to do the same business, start your own company and steal their customers.
Description : What is a good DVD ripping software for free on PC?
Last Answer : Try Handbrake: http://handbrake.fr/
Description : Can Somebody help me with my DVD Ripping and Playing?
Last Answer : answer:here’s a program that is easy and works perfectly. it’s called “hand brake”.. and you can check it out here: http://handbrake.fr/ it’s a free download too. i’ve never had any problems with it, but i have with other programs. hand brake is super easy. hope that it helps!
Description : What's the best DVD ripping software for windows pc that also converts for playback on iPhone and iPod?
Last Answer : Have you tried Handbrake? I prefer Mac, so I haven’t checked out the Windows version, but I can’t imagine it’s very different.
Description : Looking for audio and/or video ripping or recording software that splits and tags music or video files?
Last Answer : Not sure if I completely understand what you want, but I know the latest version of Quicktime is able to cut up a video anyway that you want & save it with many tag names. Also, you can separate the audio from the video & edit just the audio any way you want, then save it with any name of tags.
Description : I'd like a durable doll my girl keeps ripping their heads off?
Last Answer : get the doll called just my size doll-the life size doll about 3ft tall
Description : The rate at which scanning is repeated in a CRT is called ________ A. Resolution B. Refresh rate C. Bandwidth D. None of the Above
Last Answer : B. Refresh rate
Description : The rate at which scanning is repeated in a CRT is called : (1) refresh rate (2) resolution (3) pitch (4) bandwidth
Last Answer : refresh rate
Description : A technique for producing animation in which one image changes into another is called (1) Embedding (2) Linking (3) Morphing (4) Scanning
Last Answer : Morphing
Description : What is a scanning device ?
Last Answer : Scanning devices are devices that can be used to translate texts , images , photos, etc. into digital form and store and process them on a computer.
Description : Which involves photo scanning of the text character by character, analysis of the scanned in image , and then translation of the character image into character code? A. OCR B. OMR C. Bar code Reader D. None of the Above
Last Answer : A. OCR
Description : What are Macros: a) Small add - on programs that are installed afterwards if you need them b) Small programs created in MS - Word to automate repetitive tasks by using VBA c) Automatic Virus Scanning Programs d) None of The Above
Last Answer : b) Small programs created in MS - Word to automate repetitive tasks by using VBA
Description : ______is used for scanning the pictures and putting them in digitized form in the computer: a) CD-ROM b) Plotter c) Scanner d) None of The Above
Last Answer : c) Scanner
Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1) Input automation 2) Item data automation 3) Scanning automation 4) Source data automation
Last Answer : 3) Scanning automation
Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1 Input automation 2 Item data automation 3 Scanning automation 4 Source data automation
Last Answer : 3 Scanning automation
Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware
Last Answer : d) Hardware
Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning
Last Answer : D. Reconnaissance
Description : Which of the following used for the Network Testing and port scanning A)NetCat B)SuperScan C)NetScan D)All of Above
Last Answer : D)All of Above
Description : Network Testing and port scanning tools are : a. Sam Spade b. SuperScan c. NetScan d. All of the above
Last Answer : d. All of the above
Description : Vulnerability scanning in Ethical hacking finds………. a. Strengths b. Weakness c. A&B d. None of these
Last Answer : b. Weakness
Description : What is the first phase of hacking? Maintaining access Gaining access Reconnaissance Scanning
Last Answer : Scanning
Description : Which of the following is not a network testing and port scanning tool? a. Nmap b. SuperScan c. John the ripper d. NetCat
Last Answer : c. John the ripper
Description : What is the first phase of hacking? a. Attack b. Maintaining access c. Gaining access d. Reconnaissance e. Scanning
Last Answer : e. Scanning
Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan
Last Answer : A. Netcat
Description : Which tool is used for ping sweeps and port scanning? A. Netcat B. SamSpade C. SuperScan D. All the above
Last Answer : C. SuperScan
Description : Sequential step hackers use are: _ _ _ _. A. Maintaining Access. B. Reconnaissance C. Scanning. D. Gaining Access.
Last Answer : A. Maintaining Access.
Description : Vulnerability scanning in Ethical hacking finds_____. A. Strengths. B. Weakness. C. A &B D. None of these.
Last Answer : B. Weakness.