Which of the following is not a type of volatile evidence a) Routing Tables
b) Main Memory
c) Log files
d) Cached Data

1 Answer

Answer :

c) Log files

Related questions

Description : Which of the following is not type of volatile evidence: A)Routing Tables B) Main Memory C)Log Files D) Cached Data

Last Answer : D) Cached Data

Description : Which of the following is not type of volatile evidence: A)Routing Tables B) Main Memory C)Log Files D) Cached Data

Last Answer : D) Cached Data

Description : Which of the following is not a type of volatile evidence? a. Routing Table b. Main memory c. Log files d. Cached Data

Last Answer : c. Log files

Description : Which of the following is not a type of Evidences a) Electronic evidence b) Documented evidence c) Substantial Evidence d) Main memory

Last Answer : d) Main memory

Description : The major forensic categories of devices where evidence can be found: a) Internet-based b) Stand-alone computers c) Mobile devices d) All of the above

Last Answer : d) All of the above

Description : Rule of evidence is also called as a) Law of evidence b) Documented evidence c) Electronic evidence d) Illustrative evidence

Last Answer : a) Law of evidence

Description : The IP address was traced to a cable Internet services provider in city are of a) Hyderabad b) Nagpur c) Aurangabad d) Ahmednagar

Last Answer : a) Hyderabad

Description : Which is the main function of transport layer? A) Node to node delivery B) End to end delivery C) Synchronization d) Updating and maintaining routing tables

Last Answer : B) End to end delivery

Description : Which is the main function of transport layer? A) Node to node delivery B) End to end delivery C) Synchronization d) Updating and maintaining routing tables

Last Answer : B) End to end delivery

Description : n(log n) is referred to A. A measure of the desired maximal complexity of data mining algorithms B. A database containing volatile data used for the daily operation of an organization C. Relational database management system D. None of these

Last Answer : A. A measure of the desired maximal complexity of data mining algorithms

Description : The use ofhierarchy in routing tables can ________ the size of the routing tables. A) reduce B) increase C) both a and b D) none of the above

Last Answer : reduce

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : The use of hierarchy in routing tables can ________ the size of the routing tables A. reduce B. increase C. multiply D. retain

Last Answer : A. reduce

Description : Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... (1) automatically (2) by server (3) by exchanging information with neighbour nodes. (4) with back up database

Last Answer : Answer: 3

Description : What type of circuit is used by control memory to interconnect registers. a. Data routing circuit b. Address routing circuit c. Control routing circuit d. None of the these

Last Answer : a. Data routing circuit

Description : _________ is a type of non-volatile memory that erases data in units called blocks. A. Flash memory B. Virtual memory C. Buffer D. None of the Above

Last Answer : A. Flash memory

Description : Which one of the following locates data on network devices : a. ARP Cache b. Kernel Statistics c. Routing Table d. Memory

Last Answer : c. Routing Table

Description : What does it mean when a website is ''cached''?

Last Answer : On older version of the site is stored on google’s servers, which you can access.

Description : Is there a way to remove a cached page from google?

Last Answer : answer:http://www.google.com/support/webmasters/bin/answer.py?answer=35306 The answer seems to be yes, if you put a meta tag in the header of your page.

Description : Which of the following terms is the most closely related to main memory? A) Non volatile B) Permanent C) Control unit D) Temporary

Last Answer : Answer : D

Description : Which of the following terms is the most closely related to main memory? A. Non Volatile B. Permanent C. Temporary D. None of the Above

Last Answer : C. Temporary

Description : Cache and main memory will not be able to hold their contents when the power is off. They are ________ A. Static B. Dynamic C. Non Volatile D. Volatile

Last Answer : D. Volatile

Description : Cache and main memory will lose their contents when the power is off. They are-- 1) Dynamic 2) Faulty 3) Volatile 4) Static

Last Answer : 3) Volatile

Description : Cache and main memory will lose their contents when the power is off. They are-- 1 Dynamic 2 Faulty 3 Volatile 4 Static

Last Answer : 3 Volatile

Description : Which of the following terms is the most closely related to main memory? a. Non volatile b. Permanent c. Control unit d. Temporary

Last Answer : d. Temporary

Description : Which of the following terms is the most closely related to main memory? a. Non volatile b. Permanent c. Control unit d. Temporary

Last Answer : d. Temporary

Description : Which computer memory is used for storing programs and data currently being processed by the CPU? A) Mass memory B) Internal memory C) Non-volatile memory D) PROM

Last Answer : Answer : B

Description : The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as A) Magnetic core memory B) Magnetic tape memory C) Magnetic disk memory D) Magnetic bubble memory

Last Answer : Answer : D

Description : The magnetic storage chips used to provide non-volatile direct access storage of data and that have no moving parts are known as________ A. Magnetic core memory B. Magnetic tape memory C. Magnetic disk memory D. Magnetic bubble memory

Last Answer : D. Magnetic bubble memory

Description : _________is computer storage that only maintains its data while the device is powered. A. Volatile memory B. Non Volatile memory C. Both (A) and (B) D. None of the Above

Last Answer : A. Volatile memory

Description : Which among the following is correct about ROM: a) ROM is non volatile memory because any data stored in ROM remains there, even if the power is turned off b) ROM is an ideal place to put the PC's startup instructions - that is, the software that boosts the system. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which computer memory is used for storing programs and data currently being processed by the CPU? a) Mass memory b) Internal memory c) Non-volatile memory d) PROM e) None of these

Last Answer : b) Internal memory

Description : If a memory chip is volatile, it will- 1) Explode if exposed to high temperatures 2) Lose its Contents if current is turned off 3) Be used for data storage only 4) None Of These

Last Answer : 2) Lose its Contents if current is turned off

Description : Which computer memory is used for storing programs and data currently being processed by the CPU? a. Mass memory b. Internal memory c. Non-volatile memory d. PROM

Last Answer : b. Internal memory

Description : The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as a. Magnetic core memory b. Magnetic tape memory c. Magnetic disk memory d. Magnetic bubble memory

Last Answer : a. Magnetic core memory

Description : Which computer memory is used for storing programs and data currently being processed by the CPU? a. Mass memory b. Internal memory c. Non-volatile memory d. PROM

Last Answer : b. Internal memory

Description : The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as a. Magnetic core memory b. Magnetic tape memory c. Magnetic disk memory d. Magnetic bubble memory

Last Answer : d. Magnetic bubble memory

Description : When collecting evidence, you should always try to proceed from a. Least volatile to most volatile evidence b. Most volatile to least volatile evidence c. All evidence at same priority d. Least then medium then most volatile evidence

Last Answer : b. Most volatile to least volatile evidence

Description : Is there a website where i can get graphs,tables and maps to give evidence of the standard of living in different regions in america?

Last Answer : do you want the data to make your own graphs, or just stuff already made? Try GapminderUSA for ready made stuff.

Description : A database is typically composed of one or more: a) Columns b) Files c) Rows d) Tables e) None of These

Last Answer : d) Tables

Description : ____________ is a type of non-volatile memory composed of a thin layer of material that can be easily magnetized in only one direction. A. Bubble memory B. RAM C. SRAM D. None of the Above

Last Answer : A. Bubble memory

Description : What is value of using access control database transaction and firewall log files?

Last Answer : Need answer

Description : Where can I find Windows NT server log files?

Last Answer : The Windows NT operating system is full of issues. The fact they do not have specific server file is one of them. Any file can be converted to a server file.

Description : How does one backup archived log files? (for DBA

Last Answer : One can backup archived log files using RMAN or any operating system backup utility. Remember to delete files after backing them up to prevent the archive log directory from filling up. If the ... oracle/arch_backup/log_t%t_s%s_p%p' 5> (archivelog all delete input); 6> release channel dev1; 7> }

Description : What are database files, control files and log files. How many of these files should a database have at least? Why?

Last Answer : ∙ Database Files The database files hold the actual data and are typically the largest in size. Depending on their sizes, the tables (and other objects) for all the user accounts can go in one ... or redo log file to the database, the information is recorded in the control files. ∙ Redo Logs

Description : What is the purpose of Redo Log files?

Last Answer : Before Oracle changes data in a datafile it writes these changes to the redo log. If something happens to one of the datafiles, a backed up datafile can be restored and the redo, that was written since, replied, which brings the datafile to the state it had before it became unavailable.

Description : On operating system level in the log subdirectory of the transport directory, you find the file DEVI990123 QAS What is this file? A. This is the log for the export of transport request DEVK990123 ... D. This is the data file of transport request DEVI990123 which is to be imported into QAS system

Last Answer : C. This is the log file for the main import of transport request DEVI990123into system SAP

Description : How can I move files from main memory to my memory card?

Last Answer : Can you not just go into the folder that holds the files , click on options> move to external memory ? Tho it may not be laid out as options but you should know what i mean . And from now on tell it to save everything possible to the external memory !

Description : Out of these which one is a volatile memory? (a) ROM (b) RAM (c) Floppy (d) DVD -Technology

Last Answer : (b) RAM is a volatile memory that means data remains stored in RAM only when power supply is there and computer is switched ON but as soon as the computer is turned OFF, the contents of RAM get erased.

Description : The secondary or magnetic memory is a volatile memory. -Technology

Last Answer : FalseThe secondary or magnetic memory is a non-volatile memory.