Description : Encryption is required to (i) protect business information from eavesdropping when it is transmitted on internet (ii)efficiently use the bandwidth available in PSTN (iii) to protect information stored in companies' databases from ... a. i and ii b. ii and iii c. iii and iv d. i and iv
Last Answer : d. i and iv
Description : Which of the following is the appropriate definition of Information Technology? (A) Information Technology refers to the use of hardware and software for pr ocessing information (B) Information ... of principles of Physical sciences and Social sciences for processing of information of many kinds.
Last Answer : Answer: C
Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption
Last Answer : (D) Encryption
Description : What are the uses of the Internet: a) Communication b) Information Retrieval c) Presentation of Information d) All of the Above
Last Answer : d) All of the Above
Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above
Last Answer : c. e‐cash
Description : The process of removing detail from a given state representation is called ______ a) Extraction b) Abstraction c) Information Retrieval d) Mining of data
Last Answer : b) Abstraction
Description : Information needed to develop, use or maintain computer hardware and software and to permit access and retrieval of data is known as: a) Software b) Documentation c) Operation of Hardware d) None of These
Last Answer : b) Documentation
Description : The retrieval of information from the computer is defined as 1) collection of data 2) data retrieval operations 3) output 4) data output collection
Last Answer : 3) output
Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption
Last Answer : d. encryption
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption
Last Answer : a. digital wallet
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption
Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned
Last Answer : Data Privacy
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : Write short notes on the following terms: 1. Information retrieval 2. E_banking -Technology
Last Answer : 1. Information retrieval It refers to the process of accessing the information that is stored on the Internet.2. E-banking It refers to the automated delivery of new and traditional banking products ... sharing common views and ideas that come together to meet and discuss topics of their interest.
Description : IR (information Retrieval) and IE (Information Extraction) are the two same thing. a) True b) False
Last Answer : b) False
Description : Choose form the following areas where NLP can be useful. a) Automatic Text Summarization b) Automatic Question-Answering Systems c) Information Retrieval d) All of the mentioned
Last Answer : d) All of the mentioned
Description : An expert system differs from a database program in that only an expert system _____________ a) contains declarative knowledge b) contains procedural knowledge c) features the retrieval of stored information d) expects users to draw their own conclusions
Last Answer : b) contains procedural knowledge
Description : Define Information Retrieval (IR).
Last Answer : IR is the task of finding documents that are relevant to user’s need for information.
Description : Use computers for storage and retrieval of the data for the process plans are? a.Lower-level strategies b.Intermediate strategies c.Higher-level strategies d.Morden-level strategies
Last Answer : a.Lower-level strategies
Description : Which of the following set of statements reflects the basic characteristics of teaching ? Select the correct alternative from the codes : (i) Teaching is the same as training. (ii) There is no difference between instruction and conditioning ... (vi) (C) (ii), (iii) and (v) (D) (i), (iv) and (vi)
Last Answer : Answer: B
Description : Which of the following is the first step in starting the research process? (A) Searching sources of information to locate problem. (B) Survey of related literature (C) Identification of problem (D) Searching for solutions to the problem
Last Answer : (C) Identification of problem
Description : What are the drawbacks for Layers? a) It is often necessary to pass data through many layers, which can slow performance significantly b) Layers support information hiding c) Multi-layered programs ... tend to be implemented through a series of calls across layers d) None of the mentioned
Last Answer : Multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers
Description : Which of the following is not the critical feature of qualitative research ? (A) Actual settings are the direct source of data. (B) Data take the forms of words or pictures. (C) Seeking to ... social facts. (D) Researcher becomes immersed in the situation, present or past related to the phenomena.
Last Answer : Write S if the statement pertains to the strength of a quantitative research, W if it's a weakness. 1. It can be costly, difficult and time-consuming. 2. It is objective and provides ... It filters out external factors. 5. The numerical data can be analyzed in a quick and easy way.
Description : In a Ph.D. thesis which one is the correct sequence for showing scheme of Chapterisation ? (A) Survey of related studies, Introduction, Design of the study, DataAnalysis and ... of study, Data analysis and interpretation, Conclusions and generalizations, Suggestions for further research, Appendix
Last Answer : (C) Introduction, Survey of related studies, Design of study, Datapresentation; analysis & Interpretation, Formulation of generalization & Conclusions, Suggestions for further research, References & Appendix
Description : The question to be answered by factorial analysis of the quantitative data does not explain one of the following (A) Is X' related to Y' ? (B) How is X' related to Y'? (C) How does X' affect the ... levels of another independent variable K' or M' ? (D) How is X' by K' related to M'?
Last Answer : (D) How is ‘X’ by ‘K’ related to ‘M’?
Description : How is it that Joaquín “El Chapo” Guzmán, formerly listed as one of the richest men in the world, was found unwashed and hiding 'in plain sight' with a minumal security force?
Last Answer : answer:He was unwashed because he escaped through the sewer when the Marines raided his house. He came really close to escaping. Security forces revealed how they finally captured Joaquin El Chapo Guzman ... sewers and drains of Los Mochis, a coastal city in the north-western state of Sinaloa.
Description : Which of the following statements is correct? (A) Virus improves the speed of processing information through computer (B) Internet does not allow the virus to spread (C) Virus is a part of software (D) Virus is an operating system
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above
Last Answer : d. all the above
Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Last Answer : D) All i, ii, iii and iv
Description : Which one is not used as a security mechanism? a. Encryption b. Cryptography c. Wallets d. Digital signature
Last Answer : c. Wallets
Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above
Last Answer : c. Security‐auditing software
Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : c. Intrusion‐detection software
Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : b. Public key encryption
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above
Description : Triple DES a. is a symmetric key encryption method b. guarantees excellent security c. is implementable as a hardware VLSI chip d. is public key encryption method with three keys.
Last Answer : b. guarantees excellent security
Description : DES (i) is a symmetric key encryption method (ii)guarantees absolute security (iii) is implementable as hardware VLSI chip (iv) is a public key encryption method a. i and ii b. ii and iii c. i and iii d. iii and iv
Last Answer : c. i and iii
Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it
Last Answer : c. scrambling it to preserve its security
Description : With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is calle d( A) Electronic mail (B) Data sourcing (C) Mail merge (D) Spam mail
Last Answer : (C) Mail merge
Description : The statement the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware refers to (A) Information ... ICT) (C) Information and Data Technology (IDT) (D) Artificial Intelligence (AI)
Last Answer : (A) Information Technology (IT)
Description : Which of the following is the appropriate definition of a computer ? (A) Computer is a machine that can process information. (B) Computer is an electronic device that can store, ... ) Computer is a machine that can store, retrieve and process quickly and accurately only qualitative information
Last Answer : (B) Computer is an electronic device that can store, retrieve and process both qualitative and quantitative data quickly and accurately.
Description : Which of the following is not the characteristic of a computer? (A) computer is an electrical machine (B) computer cannot think at its own (C) computer processes information error free (D) computer can hold data for any length of tim
Last Answer : (A) computer is an electrical machine
Description : In which of the following cases, the principle of natural justice (Hear the other party) must be followed ? (a) Dismissal of an employee (b) Supersession of a municipality (c) Threat to national security (d) Disciplinary action against a ... (d) (C) (a), (b) and (d) (D) (a), (b), (c) and (d)
Description : What marking (banner and footer) acronym (at a minimum) is required on a DoD document containing controlled unclassified information?
Last Answer : CUI
Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These
Last Answer : a) Encryption
Description : ____ is an independent and self-operated vehicle which moves on defined guide ways a.Automated Guarded Vehicles b.Automated Storage and Retrieval System c.Automated Guided Vehicles d.Automated Driving Vehicles
Last Answer : c.Automated Guided Vehicles
Description : What is the full form of AS/RS in FMS? a.Automated storage and recovery system b.Automatic storage and rotary system c.Automated storage and retrieval system d.Automated storage and regenerative system
Last Answer : c.Automated storage and retrieval system
Description : A combination of equipment and controls which handles, stores and retrieves materials withprecision,accuracy and speed under a defined degree of automation is known as ____ a.Automated storage and retrieval system (AS/RS) b.Flexible manufacturing system c.Automated guided vehicle d.None of the above
Last Answer : a.Automated storage and retrieval system (AS/RS)