When Federal Bureau Investigation program was created?  
A.1979  
B.1984  
C.1995
D.1989

1 Answer

Answer :

B.1984

Related questions

Description : When Federal Bureau Investigation program was created? (A) 1979 (B) 1984 (C) 1995 (D) 1989

Last Answer : (B) 1984

Description : When Federal Bureau Investigation program was created? A.1979 B.1984 C.1995 D.1989

Last Answer : B.1984 

Description : When the Federal Bureau of investigation was create ?. A)1900 B)1980 C)19450 D)1984

Last Answer : D)1984

Description : When the Federal Bureau of investigation was create ?. A)1900 B)1980 C)19450 D)1984

Last Answer : D)1984

Description : When did IBM introduce the 20286 based PC/AT? A) 1982 B) 1984 C) 1985 D) 1989

Last Answer : Answer : B

Description : When was the X window system born? A) 1984 B) 1989 C) 1988 D) 1990

Last Answer : Answer : A

Description : When was pc forensics began? a. 1980 b. 1984 c. 1995 d. 1997

Last Answer : a. 1980

Description : When was International Organization on Computer Evidence (IOCE) formed? a. 1980 b. 1997 c. 1995 d. 1984

Last Answer : c. 1995

Description : The national agency mandated to control, analyse and disseminate Suspicious Transaction Reports(STR), Cash Transaction Reports and counterfeit currency reports to various investigative agencies of the country after ... (IB) D. Central Bureau of Investigation(CBI) E. Central Intelligence Unit(CIU)

Last Answer : B. Financial Intelligence Unit(FIU) Explanation: The FIU is the national agency mandated to collect, analyse and disseminate Suspicious Transaction Reports (STRs), Cash Transaction Reports ... country after receiving it from banks and other financial intermediaries under a stipulated mechanism.

Description : Period of fifth generation? a. 1974-1978 b. 1979-1980 c. 1981-1985 d. 1995-till date

Last Answer : d. 1995-till date

Description : What is the period of fourth generation: a. 1979-1980 b. 1981-1995 c. 1995-2000 d. 1974-1980

Last Answer : b. 1981-1995

Description : When was the X window system born? a. 1984 b. 1989 c. 1988 d. 1990

Last Answer : 1984

Description : When did IBM introduce the 20286 based PC/AT? a. 1982 b. 1984 c. 1985 d. 1989

Last Answer : 1984

Description : When did IBM introduced the 80286 based PC/AT? a. 1982 b. 1984 c. 1985 d. 1989

Last Answer : b. 1984

Description : When was the X window system born? a. 1984 b. 1989 c. 1988 d. 1990

Last Answer : a. 1984

Description : When did IBM introduce the 20286 based PC/AT? a. 1982 b. 1984 c. 1985 d. 1989

Last Answer : b. 1984

Description : When did IBM introduced the 80286 based PC/AT? a. 1982 b. 1984 c. 1985 d. 1989

Last Answer : b. 1984

Description : Project Tiger was introduced in: (1) 2001 (2) 1973 (3) 1984 (4) 1995

Last Answer : (2) 1973 Explanation: Project Tiger is a tiger conservation programme launched in 1973 by the Government of India during Prime Minister Indira Gandhi's tenure. The project aims at ensuring a ... as close as possible the diversity of ecosystems across the tiger's distribution in the country.

Description : The first non-transgenic HRC such as triaz ine resistant canola was developed in a). 1995 b). 2000 c). 1997 d). 1984

Last Answer : d). 1984

Description : A professional accountant has a professional duty or right disclose confidential information in each of the following, except: a. To comply with technical standards and ethics requirements. b. To disclose to ... body d. To respond to an inquiry or investigation by a member body or regulatory body

Last Answer : To disclose to the Bureau of Internal Revenue any fraudulent scheme committed by the client on payment of income tax

Description : Central Bureau of Investigation was formed in the year?

Last Answer : 1963

Description : What is the full form of EEDIP a. End to End Digital Investigation Program b. End to End Digital Investigation Process c. End to End Digital Forensic Investigation d. End to End Digital Forensic Investment

Last Answer : b. End to End Digital Investigation Process

Description : The Bureau initiated the standard and labeling program from ___ A. 2006 C. 2009 B. 2008. D. 2010

Last Answer : 2006

Description : . _________ has been formulated by Bureau of energy efficient A) star labeling program. B) computer program C) ranking program. D) None of the above.

Last Answer : star labeling program

Description : The agency which is tasked with collecting analysing and disseminating information related to dubious financial transactions is ________ A. Financial Intelligence Unit(FIU) B. Financial Action Task Force( ... Bureau(CEIB) D. Central Intelligence Bureau(CIB) E. Financial Stability Board(FSB)

Last Answer : A. Financial Intelligence Unit(FIU) Explanation: The Financial Intelligence Unit (FIU), an agency tasked with collecting, analysing and disseminating information related to ... appropriate, disseminate valuable financial information to intelligence/enforcement agencies and regulatory authorities.

Description : What is the full form of FCCB? A. Foreign Currency convertible Bond B. Foreign Currency credit Bond C. Financial Consortium and Credit Bureau D. Future Credit and Currency Bureau E. None of the Above

Last Answer : A. Foreign Currency convertible Bond Explanation: Foreign currency convertible bonds (FCCBs) are a special category of bonds. FCCBs are issued in currencies different from the issuing company‘s domestic currency. A convertible bond is a mix between a debt and equity instrument.

Description : Credit Information Bureau India Limited (CIBIL) is India‟s first Credit Information Company (CIC) headquartered at ________ A. Mumbai B. New Delhi C. Noida D. Gurugram E. Hyderabad

Last Answer : A. Mumbai Explanation: Credit Information Bureau (India) Limited (CIBIL) is India‘s first Credit Information Company (CIC) founded in August 2000. CIBIL collects and maintains records of an individual‘s payments pertaining to loans and credit cards.

Description : A Credit Bureau is governed by _________ A. Securities and Exchange Board of India Act, 1992 B. Reserve Bank of India Act, 1934 C. Banking Regulation Act, 1949 D. Securities and Exchange ... of India (Credit Rating Agencies) Regulations, 1999 E. Credit Information Companies (Regulation) Act of 2005

Last Answer : E. Credit Information Companies (Regulation) Act of 2005 Explanation: A Credit Bureau is governed by the Credit Information Companies (Regulation) Act of 2005.

Description : Which of the following provides license to a credit bureau? A. SEBI B. SIDBI C. NABARD D. RBI E. GOI

Last Answer : D. RBI Explanation: A Credit Bureau is licensed by the RBI.

Description : DBMS stands for: a) Dynamic Bureau of Management System b) Document Base Management System c) Data Base Management System d) None of These

Last Answer : c) Data Base Management System

Description : Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime ... below- 1) 1 only 2) 2 only 3) Both 1 and 2 4) Neither 1 nor 2

Last Answer : 1) 1 only

Description : Indian Banking Regulation Act was passed in the year ___________ A. 1989 B. 1968 C. 1949 D. 1948

Last Answer : C. 1949 Explanation: The Banking Regulation Act, 1949 is a legislation in India that regulates all banking firms in India. Initially, the law was applicable only to banking companies. But, 1965 it was amended to make it applicable to cooperative banks.

Description : C language was formalized in _____by the American National Standard Institute: a) 1988 b) 1989 c) 1990 d) None of These

Last Answer : a) 1988

Description : From 1989 - 1990 three colleagues from AT & T Bell Laboratories, Dave Presotto, Janardan Sharma and Kshitij Nigam developed the second generation offirewalls, calling them: a) Circuit Level Gateway b) Application Layer c) Proxies d) None of These

Last Answer : a) Circuit Level Gateway

Description : When did arch rivals IBM and Apple Computers Inc. decide to join hands? A) 1978 B) 1984 C) 1990 D) 1991

Last Answer : Answer : D

Description : Microsoft Word was first released in: a) 1984 b) 1983 c) 1985 d) None of These

Last Answer : b) 1983

Description : Microsoft Word was released in: a) 1983 b)1984 c) 1985 d) None of These

Last Answer : a) 1983

Description : Microsoft Word was first released in: a) 1984 b) 1983 c) 1985 d) None of These

Last Answer : b) 1983

Description : Due to the growth of the internet and the predicted depletion of available addresses, a new version of IP version 6 using _____for the address was developed in 1995: a) 128 Bits b) 129 Bits c) 130 Bits d) None of These

Last Answer : a) 128 Bits

Description : Ms Excel version 5 was launched in: a) 1992 b) 1993 c) 1995 d) None of These

Last Answer : b) 1993

Description : W3C stands for World Wide Web Consortium which is an international consortium ofcompanies involved with the internet and the web. The W3C was founded in _______by Tim Berners - Lee , the original architect of the World Wide Web: a) 1994 b) 1995 c) 1997 d) None of These

Last Answer : a) 1994

Description : Find out the wrong one from the following: a) HTML 3 was developed in 1995 b) HTML 3.2 was next official version support for Tables, Images, Heading and other elements that is Align attributes etc. ... is current official standard version. d) None of These e) All of the Above f) None of These

Last Answer : f) None of These

Description : Java Language was released in _____as core component of Sun Micro-systems Java platform: a) 1994 b)1993 c) 1995 d) None of These

Last Answer : c) 1995

Description : Due to the growth of the internet and the predicted depletion of available addresses, a new version of IP version 6 using _____for the address was developed in 1995: a) 128 Bits b) 129 Bits c) 130 Bits d) None of These

Last Answer : a) 128 Bits

Description : When IOCE is Formed A)1992 B)1980 C)19490 D)1995

Last Answer : D)1995

Description : When IOCE is Formed A)1992 B)1980 C)19490 D)1995

Last Answer : D)1995

Description : Vendor-created program modifications are called-- 1) Patches 2) Fixes 3) Holes 4) Overlaps

Last Answer : 2) Fixes

Description : Vendor-created program modifications are called-- 1 Patches 2 Fixes 3 Holes 4 Overlaps

Last Answer : 2 Fixes

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : Which of the following is FALSE A. The digital forensic investigator must maintain absolute objectivity B. It is the investigator's job to determine someone's guilt or innocence. C. It is the ... maintain strict confidentiality, discussing the results of an investigation on only a need to know ba

Last Answer : B. It is the investigator’s job to determine someone’s guilt or innocence.