Which term refers for modifying a computer in a way which was not originally intended
to view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy

1 Answer

Answer :

C. Hacking

Related questions

Description : Which term refers for modifying a computer in a way which was not originally intended to view Information? A. Metadata B. Live analysis C. Hacking D. Bit Copy

Last Answer : C. Hacking 

Description : A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the ... of the information for analysis. D. The frequency of a particular item occurring in a data set.

Last Answer : D. The frequency of a particular item occurring in a data set.

Description : Which one of the following tools is used to view the metadata information contained in a .NET assembly? Select Answer:  1. al.exe  2. ilasm.exe  3. vbx.exe  4. csc.exe  5. ildasm.exe

Last Answer :  5. ildasm.exe

Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors

Last Answer : b)Virus

Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors

Last Answer : B) Virus

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : a. Identifying weakness in computer system or networks

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : d. Protocols of corrupting data

Description : Kleenex tissues were originally intended as what in 1915?

Last Answer : WW1 Gas mask filters

Description : Kleenex tissues were originally intended as what in 1915

Last Answer : WW1 Gas mask filters 

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : _________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________. a. Cracking b. Analysis c. Hacktivism d. Exploitation

Last Answer : d. Exploitation

Description : Which of the following is used to portray data more specifically and is helpful in determining the background of digital evidence? a. Data b. Metadata c. Cookies d. History

Last Answer : b. Metadata

Description : A ‘Bit’ refers to (1) Binary informatics (2) Bilingual information (3) Binary terminator (4) Binary digit

Last Answer : Binary digit

Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above

Last Answer : 4) All of the above

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : The figure shows the front view of a convex lens, which originally had only one edge. Five holes of different shapes, namely triangle, square, pentagon, hexagon and circle, were drilled through it at points P ... . What is the total number of edges in the lens after the holes were drilled? 

Last Answer : 57

Description : Changing an existing document is called _____ the document. 5 1) Creating 2) Editing 3) Modifying 4) Adjusting 5) None of these

Last Answer : Answer :2

Description : Presentations password protected for opening or modifying can be opened by: a) Power Point Analyzer b) Power Point Viewer c) Power Point Conductor d) None of These

Last Answer : b) Power Point Viewer

Description : Presentations password protected for opening or modifying can be opened by: a) Power Point Analyzer b) Power Point Viewer c) Power Point Conductor d) None of These

Last Answer : b) Power Point Viewer

Description : . In which year the term hacking was coined? a) 1965-67 b) 1955-60 c) 1970-80 d) 1980-82

Last Answer : c) 1970-80

Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms

Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity

Description : Is there a way to tag text in word processing docs with metadata?

Last Answer : Can’t think of this off the top of my head, but you might see if there’s an OpenOffice extension to do this for you.

Description : Which refers to any program that is not copy righted? A. Freeware B. Shareware C. Open Source Software D. Public Domain Software

Last Answer : D. Public Domain Software

Description : Hard Copy refers to: a) Hardware b) Print Out of Document c) Duplicate Memory Data d) None of These

Last Answer : b) Print Out of Document

Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing

Description : Which of the following statements is true? a. Assurance engagements do not require independence. b. The term auditor is broader in scope compared to the term practitioner. c. Assurance ... be provided by the practitioner is inversely related to the scope of procedures performed and their results

Last Answer : Assurance engagements performed by professional accountants are intended to enhance the credibility of information.

Description : Help me fix my metadata confusion?

Last Answer : first, let's not deal with A, B, and C. They are too abstract. Let's deal with MM DD YYYY (month day year). Let's also assign the following values: 1) the PDF was created ... follow Windows date management protocols, so if the document was posted and downloaded from the cloud, anything can happen.

Description : Attention fluther SEO experts... Does current Google read photo metadata and does my plan of action help natural SEO?

Last Answer : answer:Hi, I think this is several questions in one. Firstly. EXIT metadata in images I believe Google can and does read but does not currently contribute towards page ranking in any way. Alt ... data that help identify the content of your page rather than just adding in keywords. Hope this helps

Description : How would you examine Exif metadata on a photo posted on the internet?

Last Answer : answer:If you saw johnpowell's excellent response to this question yesterday, then you'd know. Here it is. As to how to disable the GPS indicators, etc., you want to find in your phone or ... course, you could take and examine a photo of your own to see whether you had accomplished your objective.

Description : What's the metadata for a brain?

Last Answer : I don’t organize my own thinking. I don’t think it’d be possible for me. Come to think of it, I don’t know if that’s really possible for anyone. Then again, I could just be saying that because it’s really that impossible for me.

Description : Data that describes other data. For example, a digital image may include metadata that describe the size of the image, number of colors, or resolution. A. Metadata B. Emdata C. Tridata D. Perameter

Last Answer : D. Perameter

Description : The pure object oriented programming language with extensive metadata available and modifiable at run time is (A) Small talk (B) C++ (C) Java (D) Eiffel

Last Answer : (A) Small talk

Description : Data which improves the performance and accessibility of the database are called: (A) Indexes (B) User Data (C) Application Metadata (D) Data Dictionary

Last Answer : (A) Indexes

Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above

Last Answer : f) All of the Above

Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above

Last Answer : f) All of the Above

Description : An error in computer program is called: a) Hacking b) Virus c) Bug d) None of These

Last Answer : c) Bug

Description : Which is not an Ethical Hacking related career a. Back-End Developer b. Software Tester c. Software Developer d. Computer Networking Specialist

Last Answer : b. Software Tester

Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening

Last Answer : c. Hacking