Information and other resources can be modified only by those users, -Technology

1 Answer

Answer :

Security and Integrity of information ensures that information and other resources are modified only by those users, who have the authority of making changes in the data.

Related questions

Description : …………. is a type of malware that is installed on a user’s computer and collects information about user without their consent and knowledge. -Technology

Last Answer : Spyware is a type of malware that is installed on a user’s computer and collects information about user without their consent and knowledge.

Description : What are different users’ approach to information? -Technology

Last Answer : The different users’ approach to information are:i. Everyday Approach;ii. Comprehensive or Exhaustive Approach; andiii. Current Approach.

Description : It allows a visited website to store its own information about a user on the user’s computer. -Technology

Last Answer : (iii) Cookies

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Programs that ask servers for services are called (a) users (b) hosts -Technology

Last Answer : (c) In the client-server model, the client is a piece of hardware/software that ask servers for services.

Description : ……….. is a real_time communication between two or more users via computer. -Technology

Last Answer : Chatis a real-time communication between two or more users via computer.

Description : Design View allows users to enter data in the table. -Technology

Last Answer : False Because Design View is used to edit the table design only.

Description : When the content offers interactivity and users can control the progress of the content it is called as (a) Linear multimedia -Technology

Last Answer : (b) Non-linear multimedia uses interactivity to control progress, e.g. video games.

Description : How can text be displayed in place of image for users whose browser do not support images? -Technology

Last Answer : The alt attribute of the tag is used to display the text in place of the image for the users whose browser do not support images.

Description : GUI has become a standard way of how to users interact with a computer? Its one feature is WYSIWYG. -Technology

Last Answer : 1. GUI Graphical User Interface WYSIWYG What You See Is What You Get.2. GUI contains icons that represent files, folders and other applications.

Description : XML uses a DTD to describe its data to users. -Technology

Last Answer : True The DTD are used in XML to specify its information and data to users.

Description : How is the WebOPAC more beneficial to users than the OPAC? -Technology

Last Answer : OPAC (online Public Access Catalogue) is a computerized catalogue of the library resources, available to public for searching online with limitation of boundary and time.However, Web OPAC is an online Public Access ... on the web. It offers the user with 24 * 7 access to the library catalogue.

Description : Why is bibliographical instruction programme meant for advanced users? -Technology

Last Answer : Bibliographic instruction programmes are meant for advance users for serious study. It is a programme of educating users in the systematic use of information resources.It helps the users in taking ... available in particular subject, discipline, and the techniques of making use of those resources.

Description : Write the Django command to start a new app named ‘users’ in an existing project? -Technology

Last Answer : python manage.py startapp users

Description : __________ app calculate traffic and instruct in order to find the quickest route to user's destination. :- a) Google Music b) Google Maps c) Both a and b D) None of these -Technology

Last Answer : b) Google Maps

Description : ……….. is a computer which provides sharing the resources of other computers connected in a network. -Technology

Last Answer : Serveris a computer which provides sharing the resources of other computers connected in a network.

Description : What are the various ethical concerns that originate with the use of electronic text, multimedia sharing, and other on line resources? -Technology

Last Answer : a. Digital material are prone to be misused easilyb. Ethical practices necessitate that the use of any digital materials, multimedia or online material be done as per the law of the landc. ... digital, multimedia or online resources of public domain is punishable offence, hence should be avoided.

Description : The following statements relate to the three parties involved in an assurance engagement. Which is correct? a. The responsible party and the intended users should always be from different entities. b. A ... , the responsible party is the engaging party, i.e., the party that engages the practitioner

Last Answer : A responsible party is the person who is responsible for the subject matter or the subject matter information

Description : To create a Google-friendly site, which of the following is a step towards giving visitors the information they're looking for? A. Create a helpful, information-rich site. B. Think about the words ... will attract many visitors and entice webmasters to link to your site. D. All of the above

Last Answer : D. All of the above

Description : Which of the following is/are the functions of operating system? i) Sharing hardware among users. ii) Allowing users to share data among themselves. iii) Recovering from errors. iv) Preventing users from interfering with one another. ... only C) i, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : CPU time, memory space are the examples of system resources. -Technology

Last Answer : TrueSystem resources include many resources such as CPU time, memory space, I/O address, DMA channel to alert the need of hardware and software.

Description : The time_sharing operating system allows multiple programs share the computer resources simultaneously. -Technology

Last Answer : TrueIn time-sharing OS, a small amount of time is allocated for the processing simultaneously.

Description : ………. attack eats up all the resources of a system and halts it. -Technology

Last Answer : Denial of serviceattack eats up all the resources of a system and halts it.

Description : Enlist different biological agents which damage paper based library resources. -Technology

Last Answer : The three biological agents that damage paper based library resources are Microorganisms, Insects and Rodents.

Description : Will existing iphone 3G users get turn by turn directions/compass features with 3.0 softare, or are those features only for iphone 3g S?

Last Answer : The old 3G Doesn’t have the magnetometer that the new 3GS does. You definitely won’t get the compass feature, but I’m not sure about the turn-by-turn directions. It seems unlikely to me, since having your exact bearings is pretty vital to knowing which way to turn.

Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these

Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : Point out the wrong statement. a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access b) Virtualization assigns a logical name for a physical resource and then provides a ... their resources into pools that can be assigned on demand to users d) All of the mentioned

Last Answer : All cloud computing applications combine their resources into pools that can be assigned on demand to users

Description : The following three golden rules: (i) Place the user in control (ii) Reduce the user’s memory load (iii) Make the interface consistent are for (A) User satisfaction (B) Good interface design (C) Saving system’s resources (D) None of these

Last Answer : (B) Good interface design 

Description : Is there value in resisting a new technology (genetically modified foods, for instance), which, while potentially harmful in the short term, could save millions of lives in the future?

Last Answer : There’s really no point of resisting anything. If it happens it will happen.

Description : 7. In a recombinant DNA technology a plasmid vector must be cleaved by a) the same enzyme that leaves the donor gene b) modified DNA ligase c) a heated alkaline solution d) four separate enzymes

Last Answer : a) the same enzyme that leaves the donor gene

Description : What is part of a database that holds only one type of information? -Technology

Last Answer : Field. Record. is the answer

Description : Intellectual property right means that the person who produces the information is the only one who can use that information. Now, -Technology

Last Answer : The intellectual property rights must be protected because protecting them:1. encourages individuals and business to create new software and new software applications, as well as improving existing ... new ideas and technologies are widely distributed.3. promotes investment in the national economy.

Description : Find the error(s) in the following code and underline those errors. -Technology

Last Answer : should be placed before The correct code is Example

Description : To display the details of all those students who have IP as their optional subject. -Technology

Last Answer : (i) select * from student where optional=‟IP‟;(ii) select name, stream, optional from student where name like 'A%';(iii) update student set average=average+3 where stream=‟Humanities‟ and optional='Maths';(iv) select name from student where average>75;

Description : (i) To display names of stores along with Sales Amount of those stores that have ‘fashion’ anywhere -Technology

Last Answer : mysql> Select Name,SalesAmt from Store order by noOfEmp;mysql> Select city, sum(SalesAmt) from store group by City;mysql> Select count(*),City from store group by City having count(*)>2; ... ;Min(DateOpen)2015-02-06mysql> Select Count(StoreId), NoOfEmp from Store group byNoOfemp having max(SalesAmt)

Description : In the table “Student”, Priya wanted to increase the Marks (Column Name: Marks) of those students -Technology

Last Answer : Correct SQL statement :UPDATE Student SET Marks = Marks +5 WHERE Marks

Description : 1. To display Names of Patients, TESTID and Test names for those Patients who were admitted -Technology

Last Answer : SQL commands for the given statements :(i) SELECT NAME, TESTID, TESTNAME FROM PATIENT, TESTWHERE PATIENT. TESTID = TEST. TESTID AND DTADMIT BETWEEN 01-DEC-2017' AND '15-DEC-2017' ;(ii) SELECT NAME, TESTNAME, COST ... NAME LIKE '% Sharma %' ;(iii) UPDATE TEST SET COST = COST +50 WHERE COST < 200 ;

Description : Apple Fans: Why is it that i-Phone users are so in love with Apple products and need to get the latest i-Phones as soon as they hit the market?

Last Answer : I don’t understand the fanboy syndrome either. I ventured over into the apple ecosystem briefly. Good reliable systems with stable software and quality hardware. Expensive and behind the curve now though. I still use my macbook but I could not tell you the last time I booted into OSX.

Description : What free web service options do I have to allow users to provide feedback, suggestion, and feature voting on my site?

Last Answer : http://feedback.uservoice.com/knowledgebase

Description : Linux users: Do you run without a GUI (such as X)?

Last Answer : While I may be nostalgic for the CLI, I’m too lazy to relearn all the syntax properly, and I get tired of MAN every 10 minutes, so I use a GUI. Of course, some things you have to do from the terminal, so I just run an instance of the terminal when it’s necessary.

Description : How can I make Windows Vista connect to a broadband connection instead of the users old dial-up connection?

Last Answer : First of all do they have an ethernet network card? If not one needs to be installed. If one is than Open control panel > Hardware and Sound > Device manager > Network adapters > The network card on ... lol. *edited in hardware and sound. XP doesn't have the silly Vista view of the control panel.

Description : Where do I get current general statistics on how many users get past homepages?

Last Answer : Did you look here?

Description : Ratio of FF users from mac to pc?

Last Answer : PC with firefox here but I use a Mac with firefox at home.

Description : The individual’s right to privacy deals mainly with information. What are the other things covered under this right? -Technology

Last Answer : The right to privacy involves the decisions pertaining to questions like what information about one’s self or one’s associations must a person reveal to others , under what conditions and with what safeguards. What things can people keep to them and not be forced to reveal to others?

Description : The National Mission for Sustainable Agriculture (NMSA) aims at which of the following? a. Enhancing agricultural productivity, protection of resources such as land, water, biodiversity and ... mechanism. d. Providing Irrigation benefits to the farmers to ensure early completion of projects.

Last Answer : a. Enhancing agricultural productivity, protection of resources such as land, water, biodiversity and genetic resources by developing strategies to make agriculture more resilient to climate change.