Description : Write down the major issues of security and integrity of information. -Technology
Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability
Description : In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity
Last Answer : Data Integrity
Description : Which security provision is used to ensure data integrity and authentication? -Technology
Last Answer : A digital signature helps the user to ensure data integrity and authentication.
Description : Which among the following is best suitable for term "Software Piracy": a) Counterfeiting original products b) Illegal copying of genuine program c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : When performing a compilation engagement, the accountant is required to a. Make inquiries of management to assess the reliability and completeness of the information provided. b. Assess internal controls. ... explanations. d. Obtain a general knowledge of the business and operations of the entity.
Last Answer : Obtain a general knowledge of the business and operations of the entity.
Description : Which of the following is / are the Characteristics of information? A) Accuracy and Relevance B) Form of information and Timeliness C) Completeness and Purpose D) All A, B & C
Last Answer : B) Form of information and Timeliness
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : a) Confidentiality
Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : A) Confidentiality
Description : Can someone sum up the secretive Anti-Counterfeiting Trade Agreement (ACTA) for me?
Last Answer : Article about ACTA
Description : Counterfeiting a document -Do You Know?
Last Answer : A counterfeit document can be defined as one wherein a genuine specimen is used as a template for the creation of a document that infringes on the prop- erty rights of the issuer and misleads the acceptor as to its true identity, validity, and/or authenticity
Description : Penicillins interfere with bacterial cell wall synthesis by (a) Inhibiting synthesis of N-acetyl muramic acid pentapeptide (b) Inhibiting conjugation between N-acetyl muramic acid and N-acetyl ... link the peptidoglycan residues (d) Counterfeiting for D-alanine in the bacterial cell wall
Last Answer : Ans: C
Description : Penicillins interfere with bacterial cell wall synthesis by: A. Inhibiting synthesis of N-acetyl muramic acid pentapeptide B. Inhibiting conjugation between N-acetyl muramic acid and N-acetyl ... cross link the peptidoglycan residues D. Counterfeiting for D-alanine in the bacterial cell wall
Last Answer : C. Inhibiting transpeptidases and carboxypeptidases which cross link the peptidoglycan residues
Description : How important are precision and completeness in learning definitions when expanding your vocabulary?
Last Answer : Sine Qua Non.
Description : What is the major component/components for measuring the performance of problem solving? a) Completeness b) Optimality c) Time and Space complexity d) All of the mentioned
Last Answer : d) All of the mentioned
Description : Which of the following is not a characteristic of suitable criteria? a. Completeness b. Neutrality c. Relevance d. Comparability
Last Answer : Comparability
Description : Match the following. a) Completeness i) How long does it take to find a solution b) Time Complexity ii) How much memory need to perform the search. c) Space Complexity iii) Is the strategy guaranteed to find the solution when there in ... , b-ii, c-iii C) a-iii, b-i, c-ii D) a-i, b-iii, c-ii
Last Answer : C) a-iii, b-i, c-ii
Description : In protolytic reactions in which the reactants are much stronger as an acid and a base than the products, the proton transfer reaction: w) does not occur x) approaches completeness y) produces a much stronger acid and a much weaker base z) produces a much weaker acid and a much stronger base
Last Answer : ANSWER: X -- APPROACHES COMPLETENESS
Description : The criteria of a good case-study is Options: A) Continuity B) Completeness of the data C) Validity of the data D) All the above
Last Answer : D) All the above
Description : Define information security. -Technology
Last Answer : Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability, and reliability of information.
Description : For taking decisions, data must be (a) very accurate (b) massive (c) processed correctly -Technology
Last Answer : (c) For taking decisions, data must be processed and manipulated correctly.
Description : The data which is accurate, specific and organised for a purpose is known as (a) Data (b) Multimedia -Technology
Last Answer : (d) Data after processing becomes information and it is accurate, specific and organised for a purpose.
Description : Complete maintenance of electrical motors should include periodic checks for machine _____________. A. vibration B. watertight integrity C. speed droop D. reactive power
Last Answer : Answer: A
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity
Last Answer : b) Integrity
Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity
Last Answer : ii) Integrity
Description : Which one is not a security issue of mobile computing? a) Integrity b) Legitimate c) Accountability d) Insufficient bandwidth
Last Answer : Insufficient bandwidth
Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity
Last Answer : B) Integrity
Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control
Last Answer : C) Data Control
Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above
Last Answer : C) Security
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Last Answer : d. All the above
Description : In this age of super specialisation, industrial engineers are in demand because they are the only ones who can see the big picture. (1) realistic view of something (2) complete view of something (3) narrow view of something (4) accurate view of something
Last Answer : (2) complete view of something
Description : Which of the following is not a property of computer evidence? A. Authentic and Accurate. B. Complete and Convincing. C. Duplicated and Preserved. D. Conform and Human Readable.
Last Answer : D. Conform and Human Readable.
Description : What do you understand by the term information? -Technology
Last Answer : When data is processed, organised or presented in a given context, so as to make it useful then it is called information.
Description : The processed form of data is called information. Describe the further refinement of term information. -Technology
Last Answer : Information after being transformed into some conceptual framework, so that it can be manipulated and used cognitively, is called knowledge.
Description : Privacy deals with personal information. Explain the meaning of term personal information. -Technology
Last Answer : Personal information is the information that identifies you or could identify you.e.g. your name and address.
Description : Write the complete … tags to create a table with the following contents. -Technology
Last Answer :
Description : Complete the blank spaces using words from the list. You should use each word only once. -Technology
Last Answer : 1. PowerPoint2. presentation3. projector4. handouts5. slide6. Websites7. templates
Description : Which term is not used in the Preamble of the Indian Constitution? (1) Republic (2) Integrity (3) Federal (4) Socialist
Last Answer : (3) Federal Explanation: The term Federal is not used in the Preamble of the Indian Constitution.
Description : Duplication of data is known as (a) data security (b) data incomplete -Technology
Last Answer : (c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.
Description : ………….. feature is available in Windows 7 ultimate for data security. -Technology
Last Answer : BitLocker Data Protection feature is available in Windows 7 ultimate for data security.
Description : Name two other means of online security measures. -Technology
Last Answer : Digital signature and Digital certificate
Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology
Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.
Description : Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. -Technology
Last Answer : True Cracker breaks security with mal intentions.
Description : IT security today has become a major point of concern. What comes under IT security? -Technology
Last Answer : IT security is a term which is more concerned with the protection of hardware,software and a network of an organisation, from the perils of disaster and external attacks through virus, hacking etc.
Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology
Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.
Description : i. select city from training where topic = 'Cyber Security'; -Technology
Last Answer : i. New DelhiFaridabadGurugramii. 2iii. 11000iv. Ms. Neena
Description : Explain in brief any 2 security threats to computer networks. -Technology
Last Answer : Two security threats to computer networks are as follows :1. Computer worm It is a standalone malware computer program that replicates itself in order to spread to other computers.2. Spam It is flooding the Internet with many copies of the same message.
Description : Are Apple's delivery estimates usually accurate?
Last Answer : Yes, from my experiences it will arrive on the 22nd. I order a ton of crap from Apple. My Apple TV showed up in 2 days.
Description : In welder qualification testing of 45mm plates, why are side bends used instead of root and face bends? a) They are easier to produce b) The testing equipment cannot handle thick root/face bends c) Root defects are not important for welder qualification d) They give more accurate indications
Last Answer : d) They give more accurate indications
Description : The following information's are exemption from disclosure a) Information disclosure of which would prejudicially affect the sovereignty and integrity of India b) Information which has been expressly forbidden ... of which would harm the competitive position of third party. e) All the above
Last Answer : e) All the above