A key-board has at least: (A) 91 keys (B) 101 keys (C) 111 keys (D) 121 keys

1 Answer

Answer :

(B) 101 keys

Related questions

Description : A box contains 15bolts of which 5 are defective. If 5 bolts are selected at random from the box, what is the probability that at least one of them is defective? a) 91/143 b) 101/143 c) 111/143 d) 121/143 e) 131/143

Last Answer : Probability that at least one is defective = 1 – probability that none is defective Probability that none is defective = 10C5 / 15C5 = 12/143 Required Probability = 1-12/143 = 131/143 Answer: e)

Description : A 3-input neuron is trained to output a zero when the input is 110 and a one when the input is 111. After generalization, the output will be zero when and only when the input is? a) 000 or 110 or 011 or 101 b) 010 or 100 or 110 or 101 c) 000 or 010 or 110 or 100

Last Answer : c) 000 or 010 or 110 or 100

Description : An octal number 237 is equal to the binary number 1) 010 011 111 2) 010 111 011 3) 011 101 101 4) 011 000 001

Last Answer : 3) 011 101 101

Description : An alphabet consist of the letters A, B, C and D. The probability of occurrence is P(A) = 0.4, P(B) = 0.1, P(C) = 0.2 and P(D) = 0.3. The Huffman code is a. A = 01 B = 111 C = 110 D = 10 b. A = 0, B = 100, C = 101, D = 11

Last Answer : b. A = 0, B = 100, C = 101, D = 11

Description : A 3-input neuron is trained to output a zero when the input is 110 and a one when the input is 111. After generalization, the output will be zero when and only when the input is: a) 000 or 110 or 011 or 101 b) 010 or 100 or 110 or 101 c) 000 or 010 or 110 or 100 d) 100 or 111 or 101 or 001

Last Answer : c) 000 or 010 or 110 or 100

Description : A present sum of Rs. 100 at the end of one year, with half yearly rate of interest at 10%, will be Rs. (A) 121 (B) 110 (C) 97 (D) 91

Last Answer : (A) 121

Description : 55 60 67 78 91 108 ? a) 125 b) 121 c) 127 d) 89 e) None of these

Last Answer : 55 + 5 = 60 60 + 7 = 67 67 + 11 = 78 78 + 13 = 91 91 + 17 = 108+108 + 19 = 127 Answer: c)

Description : An air-water vapour mixture has a dry bulb temperature of 60°C and a dew point temperature of 40°C. The total pressure is 101.3 kPa and the vapour pressure of water at 40°C and 60°C are 7.30 kPa and 19.91 kPa respectively ... air is: (A) 0.048 (B) 0.079 (C) 0.122 (D) 0.152

Last Answer : (D) 0.152

Description : Which is the least important factor in teaching? (A) punishing the students (B) maintaining discipline in the class (C) lecturing in impressive way (D) drawing sketches and diagrams on the black-board

Last Answer : (A) punishing the students

Description : How many control keys are there on the key board ?

Last Answer : Usually there are 2 o'clock. In some cases it is 1 o'clock.

Description : key - on board How many function keys ?

Last Answer : Key - on board Function Key 12

Description : Which of the following keys of personal computer is not available in the key board of traditional typewriters? (1) Tab (2) Spacebar (3) Enter (4) Backspace

Last Answer : (3) Enter

Description : Which of the four data sets have more dispersion? (A) 88 91 90 92 89 91 (B) 0 1 1 0 –1 –2 (C) 3 5 2 4 1 5 (D) 0 5 8 10 –2 –8

Last Answer : Answer: D

Description : Which of the following statement is true? (1) A Primary key is also a candidate key (2) Each relation has at least one foreign key (3) Foreign keys can’t have null values (4) A Primary key is also an alternate key

Last Answer : Foreign keys can’t have null values

Description : An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the ... C) American Standard Code for Information Integrity (D) American Standard Code for Isolated Information

Last Answer : (A) American Standard Code for Information Interchange

Description : Using the RSA public key crypto system, if p=13, q=31 and d=7, then the value of e is (A) 101 (B) 105 (C) 103 (D) 107

Last Answer : (C) 103 Explanation: Basic RSA Algorithm: 1. Choose two primes, p & q. 2. Compute n=p*q and z=(p-1)*(q-1). 3. Choose a number relatively prime to z and call it d. 4. Find e such that e*d= ... each of these in turn by 7 to see which is divisible by 7, we find that 721/7 = 103, hence e = 103. 

Description : A child is a back -bencher and is unable to watch the black-board clearly, therefore he stands, see and sit repeatedly. It disturbs the nearby classmates, what inference will you draw with reference to the ... defective eyes C) The black-board may has shining effect of light D) None of the above

Last Answer : A) The child has poor eye-sight 

Description : The black-board can be utilized best by a teacher for (A) Putting the matter of teaching in black and white (B) Making the students attentive (C) Writing the important and notable points (D) Highlighting the teacher himself

Last Answer : (C) Writing the important and notable points

Description : A Personal Computer uses a number of chips mounted on a circuit board called (A) Microprocessor (B) System Board (C) Daughter Board (D) Mother Board 

Last Answer : (D) Mother Board

Description : Which of the following comprise teaching skill? (A) Black Board writing (B) Questioning (C) Explaining (D) All the above

Last Answer : Answer: D  All of the above are the teaching skills without them a teacher is like a without gun in a battalefield. Basic teaching skills Setting the scene - make sure that your students are ... and closing a session -don't give new information, and remind students about next week's topic

Description : An electronic bill board that has a short text or graphical advertising message is referred to as: (A) bulletin (B) strap (C) bridge line (D) banner

Last Answer : (D) banner

Description : If you get an opportunity to serve a central school, but in turn you miss the opportunity to enjoy your home town. How would you accommodate in these conditions? Options: A) You will ... and obligations D) You will have great pride in thinking yourself a powerful link in national integration

Last Answer : A) You will think yourself lucky enough that you got an opportunity to mix-up with the people of different states

Description : In a college having 300 students, every student reads 5 newspapers and every newspaper is read by 60 students. The number of newspapers required is (A) at least 30 (B) at most 20 (C) exactly 25 (D) exactly 5

Last Answer : (C) exactly 25

Description : Verbal guidance is least effective in the learning of: (A) Aptitudes (B) Skills (C) Attitudes (D) Relationship

Last Answer : Answer: B A skill is learning to carry out a task with pre-determined results often within a given amount of time, energy, or both. Skills can often be divided into domain general ... usually requires certain environmental stimuli and situations to assess the level of skill being shown and used. 

Description : Does a homeowner's association have master keys or a master key to all the houses or condos?

Last Answer : I have never heard of a HOA having that kind of access. I am sure they don’t have keys.

Description : I've just lost the keys to my 2006 Honda Accord (both the key I normally use and my spare key). Now what?

Last Answer : Call the dealer. Your key-code is associated with your VIN, and they will cut and program you a new one. It ain’t cheap.

Description : Is there a function key or series of keys that will insert the current date and time?

Last Answer : Geesh, I’m sorry I missed it!

Description : My f key sticks and doesn't press down like the rest of the keys . It does type but I'm not sure why it won't press down. It?

Last Answer : Samethinghappenswithmyspacebaroften.

Description : Suppose you want to send in the mail a valuable object to a friend. You have a box which is big enough to hold the object. The box has a locking ring which is large enough to have a lock attached ... you send the valuable object, locked, to your friend - so it may be opened by your friend? -Riddles

Last Answer : Send the box with a lock attached and locked. Your friend attaches his or her own lock and sends the box back to you. You remove your lock and send it back to your friend. Your friend may then remove the lock she or he put on and open the box.

Description : You want to send a valuable object to a friend. You have a box which is more than large enough to contain the object. You have several locks with keys. The box has a locking ring which is more than ... do it? Note that you cannot send a key in an unlocked box, since it might be copied. -Riddles

Last Answer : Attach a lock to the ring. Send it to her. She attaches her own lock and sends it back. You remove your lock and send it back to her. She removes her lock.

Description : Suppose you want to send in the mail a valuable object to a friend. You have a box which is big enough to hold the object. The box has a locking ring which is large enough to have a lock attached ... you send the valuable object, locked, to your friend - so it may be opened by your friend? -Riddles

Last Answer : Send the box with a lock attached and locked. Your friend attaches his or her own lock and sends the box back to you. You remove your lock and send it back to your friend. Your friend may then remove the lock she or he put on and open the box.

Description : What is the utility of primary key in database? Write distinct features of primary keys. -Technology

Last Answer : The primary key is used to uniquely identify the record in a database. It can be a column or a set of columns in the table.Main features of the primary key are as follows:1. It must contain a unique value for each record of the table.2. It does not contain null values.

Description : Describe how to retrieve the ASCII key code from a keystroke. How would you retrieve key combinations for non-ASCII keys?

Last Answer : Keystrokes can be intercepted by handling the KeyPress and KeyDown events. Both of these events relay information to their handling methods in the form of their EventArgs. The KeyPressEventArgs, ... you would handle the KeyDown event and use the properties exposed by the KeyEventArgs instance.

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : In MS-Excel, which of the following keys helps you to selects all cells below the current selection, up to the edge of the current data region: a) Ctrl + Shift + Down Arrow Key b) Ctrl + Shift + Right Arrow Key c) Ctrl + Shift + D d) None of These

Last Answer : a) Ctrl + Shift + Down Arrow Key

Description : ________located on the right corner of the keyboard, is a separate set of number keys for quick input of numbers: a) Numeric Keypad b) Arrow Pad c) Symbolic Key Pad d) None of These

Last Answer : a) Numeric Keypad

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : _________ and _________ saves the publish and subscribe keys that we have generated with the PubNub Admin portal. a) public_key and subscribe_key b) Public-key and subscribe-key c) publickey and subscribekey d) Key_public and key_subscribe

Last Answer : a) public_key and subscribe_key

Description : By clicking which key the PubNub will display public, subscribe, and secret keys. a) Pane b) Demo Keyset c) Portal d) Network

Last Answer : b) Demo Keyset

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : In cheque payment protocol, the purchase order form is signed by purchaser using a. his public key b. his private key c. his private key using his signature hardware d. various public keys

Last Answer : c. his private key using his signature hardware  

Description : The responsibility of a certification authority for digital signature is to authenticate the a. hash function used b. private keys of subscribers c. public keys of subscribers d. key used in DES 

Last Answer : c. public keys of subscribers  

Description : Public key system is useful because a. it uses two keys. b. there is no key distribution problem as public key can be kept in a commonly accessible database. c. private key can be kept secret. d. it is a symmetric key system. 

Last Answer : b. there is no key distribution problem as public key can be kept in a commonly accessible database.  

Description : Public key encryption method is a system a. which uses a set of public keys one for each participant in e-Commerce b. in which each person who wants to communicate has two keys; a private key known to him ... him. c. which uses the RSA coding system. d. which is a standard for use in e-Commerce.  

Last Answer : b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.

Description : Triple DES a. is a symmetric key encryption method b. guarantees excellent security c. is implementable as a hardware VLSI chip d. is public key encryption method with three keys. 

Last Answer : b. guarantees excellent security  

Description : DES works by using a. permutation and substitution on 64 bit blocks of plain text b. only permutations on blocks of 128 bits c. exclusive ORing key bits with 64 bit blocks d. 4 rounds of substitution on 64 bit blocks with 56 bit keys

Last Answer : a. permutation and substitution on 64 bit blocks of plain text 

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.