Duplication of data is known as (a) data security (b) data incomplete -Technology

1 Answer

Answer :

(c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.

Related questions

Description : Backup is duplication of data for restoring purpose at a later time. -Technology

Last Answer : True Backup is a process to copy the data and restore it, whenever required.

Description : ………………. refers to the unauthorised duplication of computer software. -Technology

Last Answer : software piracy refers to the unauthorised duplication of computer software.

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : Back up of the data files will help to prevent - 1) loss of confidentiality 2) duplication of data 3) virus infection 4) loss of data

Last Answer : 4) loss of data

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : Synthesis of DNA is also known as (A) Duplication (B) Replication (C) Transcription (D) Translation

Last Answer : Answer : B

Description : ………….. feature is available in Windows 7 ultimate for data security. -Technology

Last Answer : BitLocker Data Protection feature is available in Windows 7 ultimate for data security.

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : How much time a bacterium take for the complete duplication? a. 30 min. b. 10 min. c. 20 min. d. 25 min.

Last Answer : Ans: C

Description : ________ is the unauthorized copying of an organization’s internally developed software or the illegal duplication of commercially available software. A. Software license B. Software Piracy C. Both (A) and (B) D. None of the above.

Last Answer : B. Software Piracy

Description : Truly effective communication: 1. Depends on using multiple channels  2. Depends on selecting the right method for each message and avoiding duplication, since  everyone is overloaded with information  3. ... misunderstood  4. Can only be achieved by communication professional  5. a, b and c

Last Answer : 5. a, b and c

Description : One method of programming a computer to exhibit human intelligence is called modeling or __________ a) simulation b) cognitization c) duplication d) psychic amelioration

Last Answer : a) simulation

Description : The movement of a gene from one linkage group to another is called (a) translocation (b) crossing over (c) inversion (d) duplication

Last Answer : (c) inversion

Description : The mechanism that causes a gene to move from one linkage group to another is called (a) inversion (b) duplication (c) translocation (d) crossing-over.

Last Answer : (c) translocation

Description : A significant weakness of the multi-domestic arrangement is: a) dual reporting system. b) duplication of activities. c) cumbersome structure. d) does not respond to local needs

Last Answer : duplication of activities

Description : Virus reproduces in living cells by A.replication B.duplication C.multiplication D.all of these

Last Answer : A.replication

Description : Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces

Last Answer : D) Reduces

Description : Which organization structure does not have duplication of work? a. Formal b. Informal c. Both (a) and (b) d. None of these

Last Answer : a. Formal

Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy

Last Answer : b. Pirated software

Description : Name two other means of online security measures. -Technology

Last Answer : Digital signature and Digital certificate

Description : Define information security. -Technology

Last Answer : Information security is all about protecting and preserving information. It’s all about protecting and preserving the confidentiality, integrity, authenticity, availability, and reliability of information.

Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology

Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.

Description : Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. -Technology

Last Answer : True Cracker breaks security with mal intentions.

Description : Write down the major issues of security and integrity of information. -Technology

Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability

Description : IT security today has become a major point of concern. What comes under IT security? -Technology

Last Answer : IT security is a term which is more concerned with the protection of hardware,software and a network of an organisation, from the perils of disaster and external attacks through virus, hacking etc.

Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology

Last Answer : (b) Integrity means information is accurate and complete.

Description : i. select city from training where topic = 'Cyber Security'; -Technology

Last Answer : i. New DelhiFaridabadGurugramii. 2iii. 11000iv. Ms. Neena

Description : Explain in brief any 2 security threats to computer networks. -Technology

Last Answer : Two security threats to computer networks are as follows :1. Computer worm It is a standalone malware computer program that replicates itself in order to spread to other computers.2. Spam It is flooding the Internet with many copies of the same message.

Description : The paid unregistered article to be transferred to the deposit department at the time of delivery will comprise a) Article to be redirected b) Articles to be deposited c) Articles the ... known/articles with undecipherable and incomplete addresses/articles with fictitious address d) All the above

Last Answer : d) All the above

Description : A cross of a red cow (RR) with a white bull (WW) produces all roan offspring (RRWW). This type of inheritance is known as a. incomplete dominance. b. polygenic inheritance. c. codominance. d. multiple alleles.

Last Answer : c. codominance.

Description : The decision making model which emphasises that organisations contain diverse interest groups who will bargain about goals and alternative actions, often with incomplete information is known as the ... model ; (c) Administrative or incremental model ; (d) Computational and rational model

Last Answer : (b) Political model ;

Description : Pen drive is also known as (a) Flash drive (b) Data stick (c) Thumb drive (d) All of the above -Technology

Last Answer : (d) A USB flash drive, data stick, thumb drive or pen drive is a portable drive that connects to a computer’s USB port.

Description : Computer based record keeping system is known as (a) Data Manipulation System -Technology

Last Answer : (d) DBMS is a collection of programs that enable the user to create and maintain the database. Also, it is a computer-based record keeping system.

Description : The data which is accurate, specific and organised for a purpose is known as (a) Data (b) Multimedia -Technology

Last Answer : (d) Data after processing becomes information and it is accurate, specific and organised for a purpose.

Description : Interactive combination of text, graphics, images, audio, video etc., is known as (a) Data (b) Information (c) Multimedia (d) Internet -Technology

Last Answer : (c) Multimedia is a interactive combination of text, animations, sounds, images etc.

Description : Do I have to withdraw incomplete college applications if I've just changed my mind?

Last Answer : It’s not absolutely necessary but it would be a considerate thing to do.

Description : What are 5 things that make you feel incomplete?

Last Answer : 1. Losing my mom 2. Being without a pet (I have one at this time) 3. Losing contact with a close friend 4. When I don’t have a book to read I can’t think of a 5th thing.

Description : Corrupt/Incomplete downloads of archived Tomcat versions?

Last Answer : Gah! No help, eh? How bout this - attempt to download this - it should be ~10MB in size is it? - the filename should end with .tar.gz ... does it? - you should be ... archived version. - Mother bleeping sonuva beeyootiful crappity smackin' holy cat butter funky butt lovin' fiddlesticks!!!!!!!

Description : Explain Incomplete dominance with example. -Biology

Last Answer : answer:

Description : F2 generation of incomplete dominance. -Biology

Last Answer : answer:

Description : How is incomplete dominance expressed in a phenotype? -Biology

Last Answer : answer:

Description : Difference between incomplete dominance and codominance -Biology

Last Answer : answer:

Description : Examples of incomplete dominance -Biology

Last Answer : answer:

Description : Is blood type incomplete dominance? -Biology

Last Answer : answer:

Description : Difference between complete and incomplete dominance -Biology

Last Answer : answer:

Description : Is incomplete dominance the same as codominance? -Biology

Last Answer : answer:

Description : Difference between incomplete dominance and codominance -Biology

Last Answer : answer:

Description : Examples of incomplete dominance -Biology

Last Answer : answer:

Description : Is blood type incomplete dominance? -Biology

Last Answer : answer: