Give the three terms related to the following: 1. Attacks -Technology

1 Answer

Answer :

1. Attacks Trojan horse, Worm, Denial of Service.2. Backup Online backup, Full backup, Differential backup.3. Security software Digital signature, Firewall, Antivirus.

Related questions

Description : Name some forms of virus attacks. -Technology

Last Answer : Worms, Trojan horse, Computer Virus etc.

Description : Expand the following terms related to Computer Networks: a. SMTP b. POP c. FTP d. VoIP -Technology

Last Answer : a. SMTP: Simple Mail Transfer Protocolb. POP: Point to Point Protocolc. FTP: File Transfer Protocold. VoIP: Voice over Internet Protocol

Description : Increased asthmatic attacks in certain seasons are related to

Last Answer : Increased asthmatic attacks in certain seasons are related to A. Inhalation of seasonal pollen B. ... . low temperature D. wet and dry environment

Description : Increased asthmatic attacks in certain seasons are related to (a) eating fruits preserved in tin containers (b) inhalation of seasonal pollen (c) low temperature (d) hot and humid environment

Last Answer : (b) inhalation of seasonal pollen

Description : Mark the correct option related to submission of robbery report to DG Posts a) Case of highway robbery of mail involving loss of cash/valuables above Rs 50000 b) The attacks on offices by dacoits ... ) Cases of fraud and loss or misappropriation of public money exceeds Rs 50000 e) All the above

Last Answer : e) All the above

Description : When using a search engine to search, then would you use quotation marks around search terms? -Technology

Last Answer : Quotation marks should be used around a phrase or search terms. Surrounding terms with quotation marks limit the search results to only those Web pages that contain the exact phrase, we have specified. ... to have nothing to do with your topic. For best results, you should write death penalty .

Description : Write short notes on the following terms: 1. Information retrieval 2. E_banking -Technology

Last Answer : 1. Information retrieval It refers to the process of accessing the information that is stored on the Internet.2. E-banking It refers to the automated delivery of new and traditional banking products ... sharing common views and ideas that come together to meet and discuss topics of their interest.

Description : Differentiate between the terms Internet and Intranet. -Technology

Last Answer : InternetAccess by any individual with dial-up access. Information on Internet could be general, public and advertisement.IntranetAccess by only authorised employees. Information on Intranet could be specific, corporate and proprietary.

Description : Elucidate the following terms: 1. PAN 2. WiMAX -Technology

Last Answer : 1. PAN It stands for Personal Area Network. It is a computer network used for communication among computer and different technological devices close to it. Technologies such as bluetooth and infrared ... Microwave Access. It is a wireless transmission of data using a variety of transmission modes.

Description : Explain the given terms with respect to computer networks: 1. File and Data Sharing 2. Distributing Computing Power -Technology

Last Answer : 1. File and Data SharingAt a time, file-sharing consisted mostly of saving documents to floppy disks that could be physically transferred to other computers by hand. With networking, files can be shared ... to a network. Any user on the network can access the resources stored on the server.

Description : If you want to make a list of items in the form of terms and their descriptions, then you can create a …………. list. -Technology

Last Answer : (c) A definition list is a list of items, with a description of each item.

Description : The height and width attributes of < table > tag are specified in terms of………….. or percentage. -Technology

Last Answer : The height and width attributes of < table > tag are specified in terms of pixelor percentage.

Description : Write the components of an XML file in terms of logical structure. -Technology

Last Answer : An XML file contains:1. an optional prolog2. a data instance

Description : Which of the following mail merge terms lists the specific information to be inserted in a mail merge document? -Technology

Last Answer : (b) Data source lists the specific information to be inserted in a mail merge document.

Description : What do you understand by the terms: Yellow Journalism, Chequebook Journalism, Sting Journalism and Page 3 Journalism? -Technology

Last Answer : Tabloid Journalism' is frequently termed 'yellow journalism' primarily because of its tendency to sensationalize and trivialise events, issues and people. Tabloid journalists are believed to indulge in ... Journalism which focuses on the social lives of celebrities and film stars and sports heroes.

Description : Deepti is confused between the terms ASCII and Unicode. Help her by differentiating between ASCII and Unicode. -Technology

Last Answer : ASCII: It is a 7 bit code that can represent 27 characters. It is platform dependent.UNICODE: It is 8 bit, 16 bit and 32 bit code to represent 28, 216, 232 characters respectively. It is platform independent.

Description : Deepti is confused between the terms ASCII and Unicode. Help her by differentiating between ASCII and Unicode. -Technology

Last Answer : ASCII: It is a 7 bit code that can represent 27 characters. It is platform dependent. UNICODE: It is 8 bit, 16 bit and 32 bit code to represent 28 , 216, 232 characters respectively. It is platform independent.

Description : Expand the following terms : 1. GSM 2. IP -Technology

Last Answer : Expanded form :(i) GSM – Global System for Mobile Communication(ii) IP- Internet Protoco

Description : Creative Costume? (Technology related)

Last Answer : Costume related! I don’t think you’ll have any trouble with that! :p But, seriously, you should dress up as an undead floppy disk.

Description : Sharvan Joshi is a student of Political Science and is a keen researcher of political issues related to various countries and states. -Technology

Last Answer : 1. Sharvan should develop a blog.2. Twitter and Facebook.

Description : .Software is a collection of computer (i) ……. and related data that provide the -Technology

Last Answer : (i) programs(ii) instructions(iii) entity(iv) computer(v) procedures(vi) documentation(vii) processing

Description : How are fields, record and a table related to each other? Explain with the help of an example. -Technology

Last Answer : Fields are one type of information. A record contains logically related fields. A table Emp name contains logically related records.Emp NoNameSalary1.Shridhar200002.Raghav40000Here EmpNo, Name, and Salary are three different fields. 1, Shridhar, 20000 represents one complete record.

Description : Which of the following is not related to a utility software? (a) Text editor (b) Antivirus program (c) Disk compression software -Technology

Last Answer : (d) Railway reservation system is an example of application software whereas, rest all are software utilities.

Description : Which of the following is not related to an application software? (a) Word processor (b) DBMS -Technology

Last Answer : (c) Application software is a software which carries out a specific task like Word processor, spreadsheet, DBMS etc. Among the given options, operating system is related to system software.

Description : A ……… is a group of related fields. -Technology

Last Answer : A databaseis a group of related fields.

Description : ………….. is a collection of related information. -Technology

Last Answer : Databaseis a collection of related information.

Description : A set of related data item is called as ……………. -Technology

Last Answer : A set of related data item is called as record.

Description : The refers to the database that stores the information related to the name and address of the recipients. (a) Main document -Technology

Last Answer : (c) Data source is used to store the recipient’s information related to name and address while using mail merge.

Description : What are the main functions related to information? -Technology

Last Answer : Following are the three main functions related to information:1. Collecting information2. Storing information3. Distributing information

Description : Sharvan Joshi is a student of Political Science and is a keen researcher of Political issues related to various countries -Technology

Last Answer : (a) Shravan should develop a blog.(b) Blogger.Com Wordpress.Com

Description : List health hazards related to excessive use of Technology. -Technology

Last Answer : The continuous use of devices like smartphones, computer desktop, laptops, head phones etc cause a lot of health hazards if not addressed. These are:i. Impact on bones and joints: wrong posture ... melatonin which helps us sleep. Thus we can experience sleep disorders leading to short sleep cycles.

Description : When a firm enters into some business which is related with its present business in terms of technology, marketing or both it is called as _____________. A. conglomerate diversification. B. horizontal integration. C. vertical integration. D. concentric integration.

Last Answer : D. concentric integration.

Description : Does coffee affect your nerves, give tummy trouble or trigger panic attacks?

Last Answer : It can bother my stomach, not all the time, but sometimes. I never have this problem with tea!

Description : What do you mean by E_shopping? Give three advantages of it. -Technology

Last Answer : E-shopping or Online Shopping is the process of buying goods and services from merchants who sell their products on the Internet.Advantages of E-Shopping1. Finding a product online is much easier than ... of the stores provide money back guarantee.4. You have infinite options to choose a product.

Description : What is the significance of icons? Give the example of any three types of icons. -Technology

Last Answer : Icons refer to graphic symbols that represent window elements. The three types of icons are as follows- the application icon, the shortcut icon and the document icon.

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Description : Is there a connection between the increase in UFO sightings and the mysterious radio frequency attacks affecting people in DC?

Last Answer : I’ve only heard about this tonight but I’m intrigued.

Description : Been Super Anxious, Having Migraines and Been Paranoid/Having Panic Attacks After Quitting Medical Pot?

Last Answer : THC does not store in your fat. LSD has been known to store and come back, but THC does not. Nor is it hallucinogenic. Paranoia happens sometimes while using it, but the effects are gone by the time ... doctor, it will be such a huge relief. Hang on, love. The answers are out there, somewhere.

Description : In arcade NeoGeo Samurai Showdown what happens when playing Galford vs. Galford when you simultaneously have the dog attacks with each other?

Last Answer : Need Answer

Description : Panic attacks or something else?

Last Answer : My cousin’s wife gets panic attacks and those are the symptoms almost exactly. Hang on till Monday.

Description : In the Alfred Hitchcock 1963's film "The Birds", quite simply, why do the bird attacks are concentrated on Bodega Bay?

Last Answer : Perhaps the wild birds attacked the humans there as a punishment for keeping the Love Birds captive in a cage.

Description : What is a good medication, or treatment, for anxiety attacks?

Last Answer : Caffeine will only make it worse. What about Vodka.

Description : Why don't I have anxiety attacks today?

Last Answer : It sounds to me you are learning ways to overcome some of your symptoms. I hope you continue to see improvements.

Description : How many such deadly attacks do we have to witness?

Last Answer : Fear. That is what they seek. Disruption and chaos through fear.

Description : How protected are electric cars against EMP attacks?

Last Answer : They aren't any more protected than cars that rely on an internal combustion engine (which would also be affected). But while the threat is not completely insignificant, it's apparently not as big a ... more vehicles than are damaged by the EMP, the consequent loss of life, and multiple injuries.

Description : Are my anxiety attacks caused because I feel stupid?

Last Answer : I think your anxiety attacks are probably caused because you feel and seem trapped in your life. But you and your counselors would probably know best.

Description : Why can't I improve my grade 12 diploma exam grades without running out early due to anxiety attacks?

Last Answer : Sorry for being scattered. I can’t focus on one problem at a time. I would like to have fun back in learning. I feel tremendous amount of pressure to succeed.

Description : What are your thoughts on military retaliation, for cyber attacks?

Last Answer : Better to fight fire with fire: knock out Pyongyang’s limited network. Hack Putin’s infrastructure. Steal infiltrator’s bitcoins.

Description : Do combo attacks work in real life?

Last Answer : Well, video games and RPG combat systems tend to over-systematize such things and often organize such attacks into brand-name abilities in neat packages. That's understandable up to a point, but ... being in immediate physical danger is a very different thing from having a game character in danger.

Description : Why am I depressed and having panic attacks twice a day?

Last Answer : You need to ask a doctor this question. None of us could know. Your diet, activities, and endless other things could be involved. You are asking for a diagnosis. That must be obtained from a doctor. I ... and feel better very soon. If anxiety keeps you from seeing a doctor, get a friend to help you.