Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : a) Confidentiality
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : b) Integrity
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : A) Confidentiality
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : B) Integrity
Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity
Last Answer : ii) Integrity
Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology
Last Answer : (b) Integrity means information is accurate and complete.
Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above
Last Answer : C) Security
Description : What is Food security means: (a) availability of food (b) accessibility of food (c) affordability of food (d) all the above
Last Answer : (d) all the above
Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)
Last Answer : (D) (a), (b), (c) and (d)
Description : Integrity constraints ensure that changes made to the database by authorized users do not result into loss of data consistency. Which of the following statement(s) is (are) true w.r.t. the examples of integrity constraints? (A) An ... ) and (B) are true; (C) false. (4) (A), (B) and (C) are false.
Last Answer : Answer: 3
Description : Prevention of disclosure of information to unauthorized persons is __________ A. Confidentiality B. Integrity C. Availability D. None of the above
Last Answer : A. Confidentiality
Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware
Last Answer : d) Hardware
Description : In the process of transcription in bacterial cells (A) Initiation requires rho protein (B) RNA polymerase incorporates methylated bases in correct sequence (C) Both the sigma unit and core ... RNA polymerase are required for accurate promotor site binding (D) Primase is necessary for initiation
Last Answer : Answer : C
Description : Which security provision is used to ensure data integrity and authentication? -Technology
Last Answer : A digital signature helps the user to ensure data integrity and authentication.
Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control
Last Answer : C) Data Control
Description : 5. What is the Primary Objectives of Digital Forensic for Business and Industry A. Availability of service B. Continuity of operation C. Prosecution D. Security
Last Answer : A. Availability of service
Description : . What is the Primary Objectives of Digital Forensic for Business and Industry? a. Availability of service b. Prosecution c. Continuity of operation d. Security
Last Answer : a. Availability of service
Description : Which factor ensures your IT systems are functioning correctly and providing accurate information? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : c. Reliability
Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove
Last Answer : All of theabove
Description : ……………… defines rules regarding the values allowed in columns and is the standard mechanism for enforcing database integrity. A) Column B) Constraint C) Index D) Trigger
Last Answer : (B) Constraints
Description : Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces
Last Answer : D) Reduces
Description : In International Banking terms,”Appreciation” of Rupee means ________ A. Excess of exports over imports B. Purchasing power of rupee has come down C. Availability of less foreign currency vis-a-vis rupee D. Excess of imports over exports E. Availability of more foreign currency vis-a-vis rupee
Last Answer : C. Availability of less foreign currency vis-a-vis rupee Explanation: Currency Appreciation refers to increase in the value of domestic currency in terms of foreign currency. The domestic currency becomes more valuable and less of it is required to buy the foreign currency.
Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL
Last Answer : A) SSL
Description : Which of the following concepts means adding new concepts to a program as it runs? (A) Data hiding (B) Dynamic loading (C) Dynamic typing (D) Dynamic binding
Last Answer : (B) Dynamic loading
Description : Write down the major issues of security and integrity of information. -Technology
Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability
Description : Which one is not a security issue of mobile computing? a) Integrity b) Legitimate c) Accountability d) Insufficient bandwidth
Last Answer : Insufficient bandwidth
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Last Answer : d. All the above
Description : Identify the statement that is consistent with utilitarian ethical theory: A. Adhering to a set of principles may well forbid an act that would otherwise provide overall net good consequences. B. No ... amount of net good consequences could ever justify them. D. The end never justifies the means.
Last Answer : B. No act is ever morally right or wrong in all cases, in every situation. It will all depend on the act's consequences.
Description : __________ packaging means that the product is packaged in line with the packaging practices associated with a particular product category. A)Category -consistent B)Category -specific C)Innovative D)Multiple -category E)Selective
Last Answer : A)Category
Description : The work of each assistant needs to be reviewed by personnel of at least equal competence. Which of the following is not one of the objectives of this requirement? a. The conclusions ... The audit objectives have been achieved. d. All available evidences have been obtained, evaluated and documented
Last Answer : All available evidences have been obtained, evaluated and documented
Description : The work of each assistant needs to be reviewed by personnel of at least equal competence. Which of the following is not one of the objectives of this requirement? a. The conclusions ... audit procedures have been achieved. d. All available evidences have been obtained, evaluated and documented.
Last Answer : All available evidences have been obtained, evaluated and documented.
Description : It is more accurate to define a _____ as a variety of different recordtypes that aretreated as asingle unit A. Database B. Table C. Record D. Flat File E. None of the above
Last Answer : Database
Description : a. Availability of food b. Accessibility of food c. Availability and accessibility of food to all at all times. d. Availability, accessibility and affordability of food to all at all the times.What does food security mean?
Last Answer : d. Availability, accessibility and affordability of food to all at all the times.
Description : What do you mean by binding of data and functions?
Last Answer : Encapsulation.
Description : A computer has very low failure rate because it uses electronic components. It produces very consistent results. This is highlighted by which of the feature of computer? A) Accuracy B) Reliability C) Versatility D) Automatic
Last Answer : Answer : B
Description : In the first month of the new year, the Midwest region secured sales orders from 362 current stores and 66 new stores. Is this data consistent with the sales director’s model?
Last Answer : Answers is the place to go to get the answers you need and to ask the questions you want
Description : Under Hadoop High Availability, Fencing means a)Preventing a previously active namenode from start running again. b)Preventing the start of a failover in the event of network failure with the ... previously active namenode. d)Preventing a previously active namenode from writing to the edit log.
Last Answer : Preventing a previously active namenode from writing to the edit log.
Description : Which factor determines when your IT system will be available for knowledge worker to access? a) Availability b) Accessibility c) Reliabilityd) None of the above
Last Answer : a) Availability
Description : Which factor determines when your IT system will be available for knowledge workers to access? a. Availability b. Accessibility c. Reliability d. None of the above
Last Answer : a. Availability
Description : Which among the following is correct about goals in cryptography: a) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps ... not be able to deny sending the message e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL
Last Answer : B) ESP
Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates
Last Answer : a. hashing algorithms
Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates
Last Answer : (a) Hashing algorithms
Description : 1. Having a member of the search team trained to handle digital evidence: a. Can reduce the number of people who handle the evidence b. Can serve to streamline the presentation of the case ... the opportunity for opposing counsel to impugn the integrity of the Evidence d. All of the above
Last Answer : d. All of the above
Description : The concept of totalitarian education in the West was in favour of Options: A) Treating education as a binding factor of international understanding B) The education of the individual for ... the state responsible to evolve education as a means of satisfying individual's needs and interests.
Last Answer : C) Making the education of the individual as an instrument for realizing the ends of the state
Description : In a relational database, this is a data structure that organizes the information about a single topic into rows and columns. 1) Block 2) Record 3) Tuple 4) Table 5) Command line interface
Last Answer : Answer :4
Description : To locate a data item for storage is A) Field B) Feed C) Database D) Fetch
Last Answer : Answer : D
Description : Which of the following is the largest unit? A) data B) field C) record D) database file
Description : A database is an organized collection of____: a) Data Structures b) Data c) Information d) None of These
Last Answer : b) Data
Description : Group of attributes/field in a database is known as a: a) Data Entry b) Record c) File d) None of These
Last Answer : b) Record