Description : . Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False
Last Answer : a) True
Description : Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False
Description : Mark the incorrect option a) To joining educational institution by Govt servants outside normal office hours should be take prior permission before joining educational institutions or courses of studies ... activity does not interfere with the performance of this official duties d) None of these
Last Answer : d) None of these
Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware
Last Answer : a) To think like hackers and know how to defend such attacks
Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware
Description : Money Bill can be introduced in the State Legislative Assembly with the prior permission of the – (1) Governor of the State (2) Chief Minister of the State (3) Speaker of Legislative Assembly (4) Finance Minister of the State
Last Answer : (1) Governor of the State Explanation: No money bill can be' introduced in the State Legislative Assembly without the prior permission of the Governor. Besides, the annual and supplementary budgets are introduced in the Assembly in the name of the Governor.
Description : Money Bills can be introduced in the Lok Sabha with prior permission of the- (1) President (2) Prime Minister (3) Speaker (4) Cabinet
Last Answer : (1) President Explanation: No money bill can be introduced in the Lok Sabha without the prior approval of the president. The money bill originates only in the Lok Sabha. Note: The Aadhaar Act 2016 was the last bill passed as Money Bill.
Description : When the continuing auditor intends to use information about the entity and its environment obtained in prior periods, the auditor should a. Assess control risk as "high" for the assertions ... whether to equitably reduce the audit fee due to lower audit effort expended during the engagement
Last Answer : Determine whether changes have occurred that may affect the relevance of such information in the current audit.
Description : What will an auditor who has been proposed for an audit engagement usually do prior to accepting a new client? a. Draft the financial statements of the client as a measure of goodwill b ... review work papers. d. Perform a peer review on the potential client in accordance with professional standards
Last Answer : With the permission from the prospective client, contact the predecessor auditor to determine if there are any disagreements between the client and the audit firms
Description : Mark the correct option a) Prior permission is required to join Bharat sevak samaj b) Participation of Govt servants in the Indo-Foreign cultural organizations to be avoided c) Mere intimation ... to join foreign language classes conducted by Indo- foreign cultural organizations. e) All the above
Last Answer : e) All the above
Description : Parliament can legislate on matters listed in the State list: (A) With the prior permission of the President. (B) Only after the constitution is amended suitably. (C) In case of inconsistency among State legislatures. (D) At the request of two or more States.
Last Answer : Answer: D If the legislatures of two or more States pass a resolution to the effect that it is desirable to have a parliamentary law in any matter in the State List, then the Parliament can make law for those States (Article 252).
Description : Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime ... below- 1) 1 only 2) 2 only 3) Both 1 and 2 4) Neither 1 nor 2
Last Answer : 1) 1 only
Description : Sometimes a comprehensive review of the literature prior to data collection is not recommended by grounded theorists. a. True b. False
Last Answer : a. True
Description : What enactment process activity provides permission for a Federal program or activity to begin or continue from year to year but does not provide Budget Authority to fund the program or activity?
Last Answer : authorization bill
Description : A mail office may redirect any article or intercept or deliver any article to the addressee a) With permission of the Divisional Head b) With the permission of the incharge c) On the authority of the DG or Head of the Circle d) None of these
Last Answer : c) With the specific orders of the Head of the cirlcle
Description : Special Contingencies can be incurred without the previous sanction of Superior authority The above said statement is -a. True b false
Last Answer : b false
Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These ✐ 386. Net crim
Description : ) One of the initial project documents, issued by senior management, which outlines the authority of the project manager, is called Project charter. As a seller, what other document can be used in this place: 1. Work breakdown structure 2. Project scope 3. Contract 4. Internal memo
Last Answer : 3. Contract
Description : Why is it unethical to share copyrighted files with your friends: a) It is not unethical because it is legal b) It is unethical because the files are being given for free c) Sharing copyrighted files ... because the files are being given for free e) It is not unethical - anyone can access a computer
Last Answer : c) Sharing copyrighted files without permission breaks copyright laws
Description : There is sufficient plastic deformation prior to fatigue failure, which gives a warning well in advance. a) True b) False
Last Answer : b) False
Description : A knowledge-based agent can combine general knowledge with current percepts to infer hidden aspects of the current state prior to selecting actions. a) True b) False
Description : After you have uploaded your decisions to the website, you can change your official decisions as many times as you want prior to the processing date and time of the round. a. True b. False
Description : When welding medium carbon steel plates over 100mm in thickness would the basic electrodes require any pre treatment before use? a) None if they were in a vacuum pack opened 8 hours prior to use b) None if ... ) Heat to 500 °C for 2 hours if used outside d) Baked at 150°C for 4hours prior to use
Last Answer : b) None if they were in a sealed vacuum pack prior to use
Description : can you empty a fish tank and fill it back up without the sealant leaking
Last Answer : Is the sealant leaking now? Why would removing water and adding new water cause the sealant to leak?
Description : Is there any way to repair a valve that is passing leaking internally without taking our process offline?
Last Answer : A 600 psig, 3″ steam line is experiencing passing or internal leakage. If you order to replace the valve, the process would have to be taken offline. A temporary solution to the problem is ... leaking seat on the bypass valve. If done properly, this technique can be both effective and safe.
Description : If enquiry officer is not submit or handed over the case records and inquiry report to disciplinary authority then payment of honorarium can be made . The above statement is a. True b. False
Last Answer : b. False
Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False
Last Answer : C) True, True
Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False
Last Answer : A) True, True
Description : The Internet of Things will connect inanimate objects to the network with intelligent sensors. a.true b.false
Last Answer : a.true
Description : Which one of the following belongs to the category of good 'research ethics'? (A) Publishing the same paper in two research journals without telling the editors. (B) Conducting a review of the literature ... for a favour even though the colleague did not make a serious contribution to the pa per.
Last Answer : (B) Conducting a review of the literature that acknowledges the contributions of other people in the relevant field or relevant prior work.
Description : Which of the following is correct concerning requirements about auditor's communications about fraud? a. Fraud that involves senior management should be reported directly to the audit committee ... . The auditor has no responsibility to disclose fraud outside the entity under any circumstances
Last Answer : Fraud that involves senior management should be reported directly to the audit committee regardless of the amounts involved
Description : PDA stands for (1) Personal Digital Assistant (2) Personal Development Agency (3) Personal Data Authority (4) Personal Data Array
Last Answer : Personal Digital Assistant
Description : State weather the following statement is true or false for Point-to-Point Protocol 1). It is still in widespread use for dial-up TCP/IP connections 2) Point-to-point circuits in the form of asynchronous lines have long been ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true
Last Answer : D. 1. true, 2. false, 3. true
Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. false, 3. true
Description : A company wants to build a test environment to test software updates and new solutions. The environment should mirror the production environment and be secure and inaccessible from outside the company ... requirements? A. Public Cloud B. Private Cloud C. External Cloud D. Virtual Private Cloud
Last Answer : Virtual Private Cloud
Description : A public company can start its business operations after getting– (A) Certificate of Incorporation (B) Minimum Subscription (C) Certificate of Commencement of Business (D) Permission of the Controller of Capital Issue
Last Answer : Answer: Certificate of Commencement of Business
Description : The East India company sent captain William Hawkins to the court of Emperor _________ in 1608 to seek permission to open a factory at Sura
Last Answer : Jahangir
Description : . If a transponder is unserviceable before an IFR departure, then the pilot: a. Has to cancel the flight b. May proceed with the flight with ATC permission c. Has to fly low level only d. Should fly for another company
Last Answer : b. May proceed with the flight with ATC permission
Description : If a transponder is unserviceable before an IFR departure, then the pilot: a. Has to cancel the flight b. May proceed with the flight with ATC permission c. Has to fly low level only d. Should fly for another company
Description : A first appeal against the decision of a PIO can be preferred by a) An applicant b) A person from within public authority c) A person outside the public authority to whom information pertains d) All the above
Last Answer : d) All the above
Description : Pick out the true statement pertaining to water treatment. (A) Slow sand filters can remove colour completely (B) Activated carbon can be used for taste & odour control without subsequent filtration ... of water (D) Normally, the turbidity is removed by adding a coagulant prior to sedimentation
Last Answer : (D) Normally, the turbidity is removed by adding a coagulant prior to sedimentation
Description : __________ is the software which comes with the permission for people to redistribute copies for a limited period. A. Freeware B. Shareware C. Open Source Software D. Public Domain Software
Last Answer : B. Shareware
Description : As per RBI said in its statement, banks have to seek whose permission before selling stake in stressed companies? A) GOI B) CVC C) RBI D) CBI E) Both B and D
Last Answer : E) Both B and D Explanation: Following the central bank s directive to banks to ensure that stake sales in stressed companies under the strategic debt restructuring (SDR) does not get ... the Central Vigilance Commission (CVC) before closing such deals, people familiar with the development said.
Description : Before testing insulation with a megohmmeter, the windings of large machines should be grounded for about 15 minutes just prior to the test, because the ___________. A. static charge of the machine ... number of leakage paths C. insulation may be damaged D. insulation may be covered with moisture
Last Answer : Answer: A