i. select city from training where topic = 'Cyber Security'; -Technology

1 Answer

Answer :

i. New DelhiFaridabadGurugramii. 2iii. 11000iv. Ms. Neena

Related questions

Description : Name the primary law in India dealing with cyber crime and electronic commerce. -Technology

Last Answer : The primary law is Information Technology Act 2000.

Description : Can you work in cyber-security with a felony for marijuana?

Last Answer : Don’t think they’ll hie you, with any kind of felony conviction.

Description : Masters in Cyber security and digital forensics vs security certifications like CISSP,OHCP?

Last Answer : answer:

Description : What are the smart security solutions given by Webroot against cyber threat?

Last Answer : Oh, I think that the best smart security solution was and remains use use of decentralised apps. For example Utopia p2p. These apps being a closed web system, do not requie the use of ... . In addition, they have their own separate browser, mail and even crypto, which further enhances security

Description : Cyber Security Awareness - Part 1?

Last Answer : The computer was originally created as a harmless aid to do complex processes. Over the years, however, the harmless machine, which is charged with almost limitless potential, has become the ground work for ... , unexpected denial of your credit card.Be certain to read part 2 of this article....

Description : what are the scope of cyber security?

Last Answer : Alliance Pro IT (network security solutions & Firewall software providers in India), Firewall is very crucial and effective in the computing world. It is available in both forms i.e. as ... those threats are blocked which can hamper the system’s security and can steal important information from yo

Description : Who offers cyber security simulation for businesses?

Last Answer : You should probably take a look at Cyberbit Range, a breach and attack simulation program given by cyberbit. With Cyberbit Range, you can prepare your SOC team and red team with a ... training scenarios, from entry level individual training to advanced, multi-stage attacks and team training.

Description : Which is the best institute for Cyber security course?

Last Answer : Hey! You are looking for best institute for Cyber Security Course. Cyber Security is the protection of computer systems and networks from information disclosure. Cyber Security consists ... students. CETPA provides fresher training, student training, professional training, summer training, winter

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : . _________ are those individuals who maintain and handles IT security in any firm or organization. a) IT Security Engineer b) Cyber Security Interns c) Software Security Specialist d) Security Auditor

Last Answer : a) IT Security Engineer

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : is a branch of Science which deals with the helping machine find solutions to complex problems in a more human like fashion a. Artificial Intelligence b. Internet Od Things c. Embedded system d. cyber Security

Last Answer : a. Artificial Intelligence

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : _________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : is a branch of science which deals with helping machine find solution to complex to problem in a more human like a fashion. (a) Artificial intelligence (b) Internet of think (c) Embided system (d) Cyber security

Last Answer : (a) Artificial intelligence

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : _________ are those individuals who maintain and handles IT security in any firm or organization. a) IT Security Engineer b) Cyber Security Interns c) Software Security Specialist d) Security Auditor Answer: a

Last Answer : a) IT Security Engineer

Description : ______ is a branch of computer science which deals with helping machines finds solutions to complex problems in a more human like fashions A. Artificial Intelligence B. Internet of Things C. Embedded System D. Cyber Security

Last Answer : A. Artificial Intelligence 

Description : Laws relating to protecting the internet and other online communication technology isa. Cyber Law b. Computer Law c. IT Law d. None of these

Last Answer : b. Computer Law

Description : Duplication of data is known as (a) data security (b) data incomplete -Technology

Last Answer : (c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.

Description : ………….. feature is available in Windows 7 ultimate for data security. -Technology

Last Answer : BitLocker Data Protection feature is available in Windows 7 ultimate for data security.

Description : Name two other means of online security measures. -Technology

Last Answer : Digital signature and Digital certificate

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : Define information security. -Technology

Last Answer : Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability, and reliability of information.

Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology

Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.

Description : Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. -Technology

Last Answer : True Cracker breaks security with mal intentions.

Description : Write down the major issues of security and integrity of information. -Technology

Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability

Description : IT security today has become a major point of concern. What comes under IT security? -Technology

Last Answer : IT security is a term which is more concerned with the protection of hardware,software and a network of an organisation, from the perils of disaster and external attacks through virus, hacking etc.

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology

Last Answer : (b) Integrity means information is accurate and complete.

Description : Explain in brief any 2 security threats to computer networks. -Technology

Last Answer : Two security threats to computer networks are as follows :1. Computer worm It is a standalone malware computer program that replicates itself in order to spread to other computers.2. Spam It is flooding the Internet with many copies of the same message.

Description : Which attribute lets you control the display of select border sides of a table? -Technology

Last Answer : frame attribute displays the selected border sides of the table.

Description : In the Print dialog box, you can select the pages for printing. (a) Even pages (b) Odd pages (c) All pages in range (d) All of these -Technology

Last Answer : (d) You can select the even, odd and all pages in range for printing.

Description : While performing Mail Merge, in how many ways can you select recipients? Explain any one of them. -Technology

Last Answer : When you open or create a data source by using the Mail Merge wizard, you are telling Word to use a specific set of variable information for your merge. Use one of the following methods to attach ... this point, you are also saving the data source and attaching the data source to the main document.

Description : What are the steps to insert a readymade shape in a document? (a) I. Select the Insert tab. -Technology

Last Answer : (a) I. Select the Insert tab.II. In the Illustrations group, click on Shapes and select desired shape.III. Click and hold the mouse, where you want to draw the shape and drag the mouse pointer keeping the mouse pressed.IV. Release the mouse button.

Description : To select slides at discrete order in the Slides Pane you need hold the ………………. on the keyboard while selecting the slides. -Technology

Last Answer : To select slides at discrete order in the Slides Pane you need hold the Ctrl keyon the keyboard while selecting the slides.

Description : Why do librarians select open source library automation software? -Technology

Last Answer : Librarians select open source library automation software because of following advantages:i. It is normally available free of cost;ii. One can download it with the help of its source code for any type of library usageiii. One is allowed to modify its source code for satisfying his/ her requirements.

Description : Select Acc_No, sum(Amount) from Customer c, Transaction t where c.Acc_No=t.Acc_No group by c.Acc_No having Transaction_Type='Credit'; -Technology

Last Answer : 2301003 650002201002 20000

Description : To select tuples with some salary, Siddharth has written the following erroneous SQL statement : -Technology

Last Answer : The correct code is :SELECT ID, Salary FROM empsalaryWHERE Salary = 56000 ;

Description : Write the output of the following SQL command. select round (49.88); (a)49.88 (b)49.8 (c)49.0 (d)50 -Technology

Last Answer : The correct answer is : (a) 50

Description : (1) Prachi has given the following command to obtain the highest marks Select max(marks) from student where group by class; -Technology

Last Answer : (1)d. Select class, max(marks) from student group by class;(2)b. Both (ii) and (iv)(3)b. select name,max(DOB) from student;

Description : What is the difference between the order by and group by clause when used along with the select statement. -Technology

Last Answer : The order by clause is used to show the contents of a table/relation in a sorted manner with respect to the column mentioned after the order by clause. The contents of the column can be arranged in ... a given column and then apply an aggregate function eg max(), min() etc on the entire group.

Description : Computer Based Training (CBT) is a type of ……….. . -Technology

Last Answer : Computer Based Training (CBT) is a type ofE-learning

Description : Help him in writing SQL query for the following purpose: (i) To count how many female candidates will be attending the training. -Technology

Last Answer : (i)Select count(name) from training where name like ‘Ms.%’;(ii) Select * from training where fee is NULL;(iii) Select city, fee from training where topic = ‘Cyber Security’;(iv) Alter table training add feedback varchar(20);

Description : Observe the table named “Training” given above carefully and predict the output of the following queries: -Technology

Last Answer : (i) New DelhiFaridabadGurugram(ii) 2(iii) 11000(iv) Ms. Neena

Description : What is the degree and cardinality of the above given table named ‘Training’. -Technology

Last Answer : Degree: 6Cardinality: 5

Description : Mr. Manav, a database administrator in “Global Educational and Training Institute” has created following table named “Training” -Technology

Last Answer : i. Select count(name) from training where name like ‘Ms.%’;ii. Select * from training where fee is NULL;iii. Select city, fee from training where topic = ‘Cyber Security’;iv. Alter table training add feedback varchar(20);

Description : What is the degree and cardinality of the above given table named ‘Training’. -Technology

Last Answer : Degree: 6Cardinality: 5