Which of the following is not related to information security on the Internet? (A) Data Encryption (B) Water marking (C) Data Hiding (D) Information Retrieval

1 Answer

Answer :

(D) Information Retrieval

Related questions

Description : Encryption is required to (i) protect business information from eavesdropping when it is transmitted on internet (ii)efficiently use the bandwidth available in PSTN (iii) to protect information stored in companies' databases from ... a. i and ii b. ii and iii c. iii and iv d. i and iv

Last Answer : d. i and iv 

Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption

Last Answer : (D) Encryption

Description : What are the uses of the Internet: a) Communication b) Information Retrieval c) Presentation of Information d) All of the Above

Last Answer : d) All of the Above

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : The process of removing detail from a given state representation is called ______ a) Extraction b) Abstraction c) Information Retrieval d) Mining of data

Last Answer : b) Abstraction

Description : Information needed to develop, use or maintain computer hardware and software and to permit access and retrieval of data is known as: a) Software b) Documentation c) Operation of Hardware d) None of These

Last Answer : b) Documentation

Description : The retrieval of information from the computer is defined as 1) collection of data 2) data retrieval operations 3) output 4) data output collection

Last Answer : 3) output

Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption

Last Answer : d. encryption

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption

Last Answer : a. digital wallet

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Write short notes on the following terms: 1. Information retrieval 2. E_banking -Technology

Last Answer : 1. Information retrieval It refers to the process of accessing the information that is stored on the Internet.2. E-banking It refers to the automated delivery of new and traditional banking products ... sharing common views and ideas that come together to meet and discuss topics of their interest.

Description : IR (information Retrieval) and IE (Information Extraction) are the two same thing. a) True b) False

Last Answer : b) False

Description : Choose form the following areas where NLP can be useful. a) Automatic Text Summarization b) Automatic Question-Answering Systems c) Information Retrieval d) All of the mentioned

Last Answer : d) All of the mentioned

Description : An expert system differs from a database program in that only an expert system _____________ a) contains declarative knowledge b) contains procedural knowledge c) features the retrieval of stored information d) expects users to draw their own conclusions

Last Answer : b) contains procedural knowledge

Description : Define Information Retrieval (IR).

Last Answer :  IR is the task of finding documents that are relevant to user’s need for information. 

Description : Use computers for storage and retrieval of the data for the process plans are? a.Lower-level strategies b.Intermediate strategies c.Higher-level strategies d.Morden-level strategies

Last Answer : a.Lower-level strategies

Description : Which of the following is the first step in starting the research process? (A) Searching sources of information to locate problem. (B) Survey of related literature (C) Identification of problem (D) Searching for solutions to the problem

Last Answer : (C) Identification of problem

Description : What are the drawbacks for Layers? a) It is often necessary to pass data through many layers, which can slow performance significantly b) Layers support information hiding c) Multi-layered programs ... tend to be implemented through a series of calls across layers d) None of the mentioned

Last Answer : Multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers

Description : Which of the following is not the critical feature of qualitative research ? (A) Actual settings are the direct source of data. (B) Data take the forms of words or pictures. (C) Seeking to ... social facts. (D) Researcher becomes immersed in the situation, present or past related to the phenomena. 

Last Answer : Write S if the statement pertains to the strength of a quantitative research, W if it's a weakness. 1. It can be costly, difficult and time-consuming. 2. It is objective and provides ... It filters out external factors. 5. The numerical data can be analyzed in a quick and easy way.

Description : In a Ph.D. thesis which one is the correct sequence for showing scheme of Chapterisation ? (A) Survey of related studies, Introduction, Design of the study, DataAnalysis and ... of study, Data analysis and interpretation, Conclusions and generalizations, Suggestions for further research, Appendix 

Last Answer : (C) Introduction, Survey of related studies, Design of study, Datapresentation; analysis & Interpretation, Formulation of generalization & Conclusions, Suggestions for further research, References & Appendix

Description : The question to be answered by factorial analysis of the quantitative data does not explain one of the following (A) Is X' related to Y' ? (B) How is X' related to Y'? (C) How does X' affect the ... levels of another independent variable K' or M' ? (D) How is X' by K' related to M'?

Last Answer : (D) How is ‘X’ by ‘K’ related to ‘M’?

Description : How is it that Joaquín “El Chapo” Guzmán, formerly listed as one of the richest men in the world, was found unwashed and hiding 'in plain sight' with a minumal security force?

Last Answer : answer:He was unwashed because he escaped through the sewer when the Marines raided his house. He came really close to escaping. Security forces revealed how they finally captured Joaquin El Chapo Guzman ... sewers and drains of Los Mochis, a coastal city in the north-western state of Sinaloa.

Description : Which of the following statements is correct? (A) Virus improves the speed of processing information through computer (B) Internet does not allow the virus to spread (C) Virus is a part of software (D) Virus is an operating system

Last Answer : Answer: C

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : Which one is not used as a security mechanism? a. Encryption b. Cryptography c. Wallets d. Digital signature

Last Answer : c. Wallets

Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above

Last Answer : c. Security‐auditing software

Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : c. Intrusion‐detection software

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Triple DES a. is a symmetric key encryption method b. guarantees excellent security c. is implementable as a hardware VLSI chip d. is public key encryption method with three keys. 

Last Answer : b. guarantees excellent security  

Description : DES (i) is a symmetric key encryption method (ii)guarantees absolute security (iii) is implementable as hardware VLSI chip (iv) is a public key encryption method a. i and ii b. ii and iii c. i and iii d. iii and iv

Last Answer : c. i and iii 

Description : By encryption of a text we mean a. compressing it b. expanding it c. scrambling it to preserve its security d. hashing it

Last Answer : c. scrambling it to preserve its security 

Description : With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is calle d( A) Electronic mail (B) Data sourcing (C) Mail merge (D) Spam mail

Last Answer : (C) Mail merge 

Description : The statement the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware refers to (A) Information ... ICT) (C) Information and Data Technology (IDT) (D) Artificial Intelligence (AI)

Last Answer : (A) Information Technology (IT)

Description : Which of the following is the appropriate definition of a computer ? (A) Computer is a machine that can process information. (B) Computer is an electronic device that can store, ... ) Computer is a machine that can store, retrieve and process quickly and accurately only qualitative information

Last Answer : (B) Computer is an electronic device that can store, retrieve and process both qualitative and quantitative data quickly and accurately.

Description : Which of the following is not the characteristic of a computer? (A) computer is an electrical machine (B) computer cannot think at its own (C) computer processes information error free (D) computer can hold data for any length of tim

Last Answer : (A) computer is an electrical machine

Description : In which of the following cases, the principle of natural justice (Hear the other party) must be followed ? (a) Dismissal of an employee (b) Supersession of a municipality (c) Threat to national security (d) Disciplinary action against a ... (d) (C) (a), (b) and (d) (D) (a), (b), (c) and (d)

Last Answer : Answer: C 

Description : What marking (banner and footer) acronym (at a minimum) is required on a DoD document containing controlled unclassified information?

Last Answer : CUI

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : ____ is an independent and self-operated vehicle which moves on defined guide ways a.Automated Guarded Vehicles b.Automated Storage and Retrieval System c.Automated Guided Vehicles d.Automated Driving Vehicles

Last Answer : c.Automated Guided Vehicles

Description : What is the full form of AS/RS in FMS? a.Automated storage and recovery system b.Automatic storage and rotary system c.Automated storage and retrieval system d.Automated storage and regenerative system

Last Answer : c.Automated storage and retrieval system

Description : A combination of equipment and controls which handles, stores and retrieves materials withprecision,accuracy and speed under a defined degree of automation is known as ____ a.Automated storage and retrieval system (AS/RS) b.Flexible manufacturing system c.Automated guided vehicle d.None of the above

Last Answer : a.Automated storage and retrieval system (AS/RS)