………………. refers to the unauthorised duplication of computer software. -Technology

1 Answer

Answer :

software piracy refers to the unauthorised duplication of computer software.

Related questions

Description : Duplication of data is known as (a) data security (b) data incomplete -Technology

Last Answer : (c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.

Description : Backup is duplication of data for restoring purpose at a later time. -Technology

Last Answer : True Backup is a process to copy the data and restore it, whenever required.

Description : Which one is not the duties of bailee (a) The bailee must take care of goods as of his goods. (b) The bailee cannot use bailor’s goods in an unauthorised manner. (c) The bailee should return the goods without demand on the expiry of the time period. (d) He can set up adverse title to the goods.

Last Answer : (d) He can set up adverse title to the goods.

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : Operating system refers to the core software components of a computer system that manages internal operations and hardware. -Technology

Last Answer : TrueOperating system is a set of programs that control internal computer operations and make best use of hardware.

Description : ________ is the unauthorized copying of an organization’s internally developed software or the illegal duplication of commercially available software. A. Software license B. Software Piracy C. Both (A) and (B) D. None of the above.

Last Answer : B. Software Piracy

Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy

Last Answer : b. Pirated software

Description : Which one of these refers to all objects that have sensors,network connectivity,software,and so on to connect to the network ? :- a) Internet of Things b) Artificial Intelligence c) Machine Learning d) Deep Learning -Technology

Last Answer : internet of things is the correct answer option a

Description : One method of programming a computer to exhibit human intelligence is called modeling or __________ a) simulation b) cognitization c) duplication d) psychic amelioration

Last Answer : a) simulation

Description : Synthesis of DNA is also known as (A) Duplication (B) Replication (C) Transcription (D) Translation

Last Answer : Answer : B

Description : How much time a bacterium take for the complete duplication? a. 30 min. b. 10 min. c. 20 min. d. 25 min.

Last Answer : Ans: C

Description : Truly effective communication: 1. Depends on using multiple channels  2. Depends on selecting the right method for each message and avoiding duplication, since  everyone is overloaded with information  3. ... misunderstood  4. Can only be achieved by communication professional  5. a, b and c

Last Answer : 5. a, b and c

Description : The movement of a gene from one linkage group to another is called (a) translocation (b) crossing over (c) inversion (d) duplication

Last Answer : (c) inversion

Description : The mechanism that causes a gene to move from one linkage group to another is called (a) inversion (b) duplication (c) translocation (d) crossing-over.

Last Answer : (c) translocation

Description : A significant weakness of the multi-domestic arrangement is: a) dual reporting system. b) duplication of activities. c) cumbersome structure. d) does not respond to local needs

Last Answer : duplication of activities

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : Virus reproduces in living cells by A.replication B.duplication C.multiplication D.all of these

Last Answer : A.replication

Description : Back up of the data files will help to prevent - 1) loss of confidentiality 2) duplication of data 3) virus infection 4) loss of data

Last Answer : 4) loss of data

Description : Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces

Last Answer : D) Reduces

Description : Which organization structure does not have duplication of work? a. Formal b. Informal c. Both (a) and (b) d. None of these

Last Answer : a. Formal

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : The statement the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware refers to (A) Information ... ICT) (C) Information and Data Technology (IDT) (D) Artificial Intelligence (AI)

Last Answer : (A) Information Technology (IT)

Description : .MOV' extension refers usually to what kind of file? -Technology

Last Answer : Animation/movie file

Description : ………… refers to the amount of data that a signal or a circuit can carry. -Technology

Last Answer : Bandwidthrefers to the amount of data that a signal or a circuit can carry.

Description : RDBMS provides relational operators to manipulate the data. Here, RDBMS refers to (a) Record Database Management System -Technology

Last Answer : (b) RDBMS stands for Relational Database Management System, which provides the operator to manipulate the data stored in the database table.

Description : ………. refers to the preface to an XML document. -Technology

Last Answer : Prologrefers to the preface to an XML document.

Description : The refers to the database that stores the information related to the name and address of the recipients. (a) Main document -Technology

Last Answer : (c) Data source is used to store the recipient’s information related to name and address while using mail merge.

Description : …… refers to the disparity of classification of person according to their knowledge of ICT and without it. -Technology

Last Answer : Digital divide refers to the disparity of classification of a person according to their knowledge of ICT and without it.

Description : ………………. refers to attempts to gain information from otherwise undisclosed areas. -Technology

Last Answer : Hackingrefers to attempts to gain information from otherwise undisclosed areas.

Description : Intellectual property refers to creation of ……………….. -Technology

Last Answer : Intellectual property refers to creation of mind

Description : What is a computer software? -Technology

Last Answer : Computer software is a collection of programs, procedure and related data that provide the instructions for telling a computer what to do and how to do it.

Description : Which software do you use to keep your system intact from computer viruses? -Technology

Last Answer : Antivirus software is used to keep your system intact from computer viruses.

Description : .Software is a collection of computer (i) ……. and related data that provide the -Technology

Last Answer : (i) programs(ii) instructions(iii) entity(iv) computer(v) procedures(vi) documentation(vii) processing

Description : Software is not only the basic requirement of a computer system, it makes a computer more powerful and useful. -Technology

Last Answer : 1. Software is a set of programs that tells the computer to perform a task.2. Computer system divides software into two major categories:(a) System software(b) Application software

Description : This part of utility software is used to prevent phosphor burning on computer monitors by blanking the screen with moving images. -Technology

Last Answer : (d) Screensavers fill the computer screen with moving images or patterns, when the computer is not in use.

Description : Which software takes control of computer system on startup? (a) Compiler (b) Operating system (c) Application software (d) All of these -Technology

Last Answer : (b) Operating system takes control of computer system on startup.

Description : The software that helps the computer in maintaining its performance is called ………….. -Technology

Last Answer : The software that helps the computer in maintaining its performance is calledUtility software.

Description : We cannot work on computer without software. -Technology

Last Answer : TrueSoftware is a set of programs, which instructs the computer to do a task. We always need a software to work on the computer system.

Description : An operating system of a computer serves as a software interface between the user and the (a) hardware (b) peripheral -Technology

Last Answer : (a) An operating system of a computer serves as a software interface between the user and the hardware.

Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology

Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.

Description : The at first glance will appear to be useful software but will actually do damage once installed or run on your computer. -Technology

Last Answer : (c) The Trojans are unauthorized programs placed inside a legitimate application.

Description : A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. -Technology

Last Answer : (c) A worm is a self-replicating software program. It does not require another program to host it.

Description : A category of software that spies of your computer activities is -Technology

Last Answer : (b) Spyware is a category of software that spies computer activities.

Description : ……….. is a software program that is designed to copy itself from one computer to another. -Technology

Last Answer : Worm is a software program that is designed to copy itself from one computer to another.

Description : ……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology

Last Answer : Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.

Description : Adware is a ‘Software that posts unwanted advertisements on your computer. -Technology

Last Answer : True Adware is a software that is given to the user with unwanted advertisements embedded in the application.

Description : ______________ refers to hardware, software (computer programs), and computer networks.

Last Answer : Fill in the Blank: _____________ refers to hardware, software (computer programs), and computer networks.

Description : Software refers to ____ A. firmware B. physical components that a computer is made of C. programs D. None of the above

Last Answer : C. programs

Description : The term Software refers to the set of ________or data a computer processor reads in order to perform a task or operation: a) Electronic Program Instructions b) Planned program instructions

Last Answer : a) Electronic Program Instructions