Description : Which of the following is not type of volatile evidence: A)Routing Tables B) Main Memory C)Log Files D) Cached Data
Last Answer : D) Cached Data
Description : Which of the following is not a type of volatile evidence a) Routing Tables b) Main Memory c) Log files d) Cached Data
Last Answer : c) Log files
Description : Which of the following is not a type of volatile evidence? a. Routing Table b. Main memory c. Log files d. Cached Data
Last Answer : c. Log files
Description : Which is the main function of transport layer? A) Node to node delivery B) End to end delivery C) Synchronization d) Updating and maintaining routing tables
Last Answer : B) End to end delivery
Description : _________ is a type of non-volatile memory that erases data in units called blocks. A. Flash memory B. Virtual memory C. Buffer D. None of the Above
Last Answer : A. Flash memory
Description : n(log n) is referred to A. A measure of the desired maximal complexity of data mining algorithms B. A database containing volatile data used for the daily operation of an organization C. Relational database management system D. None of these
Last Answer : A. A measure of the desired maximal complexity of data mining algorithms
Description : Which one of the following locates data on network devices : a. ARP Cache b. Kernel Statistics c. Routing Table d. Memory
Last Answer : c. Routing Table
Description : Which of the following terms is the most closely related to main memory? A) Non volatile B) Permanent C) Control unit D) Temporary
Last Answer : Answer : D
Description : Which of the following terms is the most closely related to main memory? A. Non Volatile B. Permanent C. Temporary D. None of the Above
Last Answer : C. Temporary
Description : Cache and main memory will not be able to hold their contents when the power is off. They are ________ A. Static B. Dynamic C. Non Volatile D. Volatile
Last Answer : D. Volatile
Description : Cache and main memory will lose their contents when the power is off. They are-- 1) Dynamic 2) Faulty 3) Volatile 4) Static
Last Answer : 3) Volatile
Description : Cache and main memory will lose their contents when the power is off. They are-- 1 Dynamic 2 Faulty 3 Volatile 4 Static
Last Answer : 3 Volatile
Description : Which computer memory is used for storing programs and data currently being processed by the CPU? A) Mass memory B) Internal memory C) Non-volatile memory D) PROM
Last Answer : Answer : B
Description : The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as A) Magnetic core memory B) Magnetic tape memory C) Magnetic disk memory D) Magnetic bubble memory
Description : The magnetic storage chips used to provide non-volatile direct access storage of data and that have no moving parts are known as________ A. Magnetic core memory B. Magnetic tape memory C. Magnetic disk memory D. Magnetic bubble memory
Last Answer : D. Magnetic bubble memory
Description : _________is computer storage that only maintains its data while the device is powered. A. Volatile memory B. Non Volatile memory C. Both (A) and (B) D. None of the Above
Last Answer : A. Volatile memory
Description : Which among the following is correct about ROM: a) ROM is non volatile memory because any data stored in ROM remains there, even if the power is turned off b) ROM is an ideal place to put the PC's startup instructions - that is, the software that boosts the system. c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Which computer memory is used for storing programs and data currently being processed by the CPU? a) Mass memory b) Internal memory c) Non-volatile memory d) PROM e) None of these
Last Answer : b) Internal memory
Description : If a memory chip is volatile, it will- 1) Explode if exposed to high temperatures 2) Lose its Contents if current is turned off 3) Be used for data storage only 4) None Of These
Last Answer : 2) Lose its Contents if current is turned off
Description : The use ofhierarchy in routing tables can ________ the size of the routing tables. A) reduce B) increase C) both a and b D) none of the above
Last Answer : reduce
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : The use of hierarchy in routing tables can ________ the size of the routing tables A. reduce B. increase C. multiply D. retain
Last Answer : A. reduce
Description : Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... (1) automatically (2) by server (3) by exchanging information with neighbour nodes. (4) with back up database
Last Answer : Answer: 3
Description : When collecting evidence, you should always try to proceed from a. Least volatile to most volatile evidence b. Most volatile to least volatile evidence c. All evidence at same priority d. Least then medium then most volatile evidence
Last Answer : b. Most volatile to least volatile evidence
Description : A database is typically composed of one or more: a) Columns b) Files c) Rows d) Tables e) None of These
Last Answer : d) Tables
Description : What type of circuit is used by control memory to interconnect registers. a. Data routing circuit b. Address routing circuit c. Control routing circuit d. None of the these
Last Answer : a. Data routing circuit
Description : ____________ is a type of non-volatile memory composed of a thin layer of material that can be easily magnetized in only one direction. A. Bubble memory B. RAM C. SRAM D. None of the Above
Last Answer : A. Bubble memory
Description : What does it mean when a website is ''cached''?
Last Answer : On older version of the site is stored on google’s servers, which you can access.
Description : Is there a way to remove a cached page from google?
Last Answer : answer:http://www.google.com/support/webmasters/bin/answer.py?answer=35306 The answer seems to be yes, if you put a meta tag in the header of your page.
Description : Which of the following terms is the most closely related to main memory? a. Non volatile b. Permanent c. Control unit d. Temporary
Last Answer : d. Temporary
Description : Which is a general term for all forms of solid state memory that do not need to have their memory contents periodically refreshed. A. Volatile memory B. Non Volatile memory C. Both (A) and (B) D. None of the Above
Last Answer : B. Non Volatile memory
Description : 104. Which is a volatile memory: a) ROM b) BIOS c) PROM d) RAM e) None of The Above
Last Answer : d) RAM
Description : RAM is used as a short memory in a computer because it: (1) Is volatile (2) Is programmable (3) Has less capacity (4) Is very expensive
Last Answer : Is volatile
Description : Which computer memory is used for storing programs and data currently being processed by the CPU? a. Mass memory b. Internal memory c. Non-volatile memory d. PROM
Last Answer : b. Internal memory
Description : The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as a. Magnetic core memory b. Magnetic tape memory c. Magnetic disk memory d. Magnetic bubble memory
Last Answer : a. Magnetic core memory
Last Answer : d. Magnetic bubble memory
Description : Best Evidence Rule states that a. It states that multiple copies of electronic files may be a part of the original or equivalent to the original. b. It states that copy of evidence may be ... that multiple copies of electronic files may be a part of the original or same as original.
Last Answer : It states that multiple copies of electronic files may be a part of the “original” or equivalent to the “original.”
Description : Is there a website where i can get graphs,tables and maps to give evidence of the standard of living in different regions in america?
Last Answer : do you want the data to make your own graphs, or just stuff already made? Try GapminderUSA for ready made stuff.
Description : Storage that retains its data after the power is tuned off is referred to as 1) volatile storage 2) non-volatile storage 3) sequential storage 4) direct storage 5) None of these
Last Answer : Answer :2
Description : Which of the following describes a relational database? 1) It provides a relationship between integers 2) It consists of separate tables or related data 3) It retrieves data related to its queries 4) It provides a relationship between floats
Last Answer : 2) It consists of separate tables or related data
Description : What is the process of defining tables called ? (1) Data definition (2) Data Normalisation (3) Index definition (4) Data administration
Last Answer : Index definition
Description : Which of the following is not a type of Evidences a) Electronic evidence b) Documented evidence c) Substantial Evidence d) Main memory
Last Answer : d) Main memory
Description : What is value of using access control database transaction and firewall log files?
Last Answer : Need answer
Description : Where can I find Windows NT server log files?
Last Answer : The Windows NT operating system is full of issues. The fact they do not have specific server file is one of them. Any file can be converted to a server file.
Description : How does one backup archived log files? (for DBA
Last Answer : One can backup archived log files using RMAN or any operating system backup utility. Remember to delete files after backing them up to prevent the archive log directory from filling up. If the ... oracle/arch_backup/log_t%t_s%s_p%p' 5> (archivelog all delete input); 6> release channel dev1; 7> }
Description : What are database files, control files and log files. How many of these files should a database have at least? Why?
Last Answer : ∙ Database Files The database files hold the actual data and are typically the largest in size. Depending on their sizes, the tables (and other objects) for all the user accounts can go in one ... or redo log file to the database, the information is recorded in the control files. ∙ Redo Logs
Description : What is the purpose of Redo Log files?
Last Answer : Before Oracle changes data in a datafile it writes these changes to the redo log. If something happens to one of the datafiles, a backed up datafile can be restored and the redo, that was written since, replied, which brings the datafile to the state it had before it became unavailable.