<<= Back Next =>>
You Are On Multi Choice Question Bank SET 3182

159101. Due to the growth of the internet and the predicted depletion of available addresses, a new version of IP version 6 using _____for the address was developed in 1995:?





159102. Two versions of the internet protocol (IP) are in use such as IP version 4 and IP version 6 each version defines an IP address ____:?





159103. In the early stages of development of the internet protocol, network administrators interpreted an IP address in ____parts:?





159104. High levels of demand have decreased the supply of un-allocated internet protocol version 4 addresses available for assignment to internet service providers and end user organization since the _____:?





159105. Which among the following definitions is correct:?






159106. NAT stands for:?





159107. Cryptography is derived from the ____word:?





159108. Cryptography is the study of information______:?





159109. Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication:?






159110. Cryptography and Cryptanalysis are sometimes grouped together under the ____term cryptology, encompassing the entire subject. In practice, "cryptography" is also often used to refer to the field as a whole, especially as an applied science:?





159111. Cryptography is an interdisciplinary subject, drawing from several fields. Before the time of computers, it was closely related to linguistic. Nowadays the emphasis has shifted, and cryptography makes extensive use of technical ares of mathematics, especially those areas collectively known as _______mathematics:?





159112. An example of the sub - fields of cryptography is:?





159113. When information is transformed from a useful form of understanding to an opaque form of understanding, this is called:?





159114. When the information is reverted back into a useful form it is called:?





159115. Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way):?





159116. Symmetric key cryptography was the only kind of encryption publicly known until:?





159117. Which among the following is correct about goals in cryptography:?






159118. License is still required to use cryptography in which among the following countries:?





159119. NSA stands for:?





159120. In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys:?





159121. Which among the following is correct about the 'Artificial Intelligence':?






159122. The term 'Artificial Intelligence' was first coined in ______:?





159123. The term Artificial Intelligence was coined in 1955 by_____:?





159124. Which among the following includes the areas of Artificial Intelligence specialization:?






159125. In May 1997 an IBM super computer called ______defeated world chess champion Gary Kasparov in a chess match:?





159126. Which among the following is necessary for General Intelligence (in computer language):?





159127. Which among the following definitions are correct:?





159128. A _____is defined as "some sort of hardware architecture or software framework (including application frameworks), that allows software to run:?





159129. ______argues that "artificial intelligence is the next stage in evolution":?





159130. Which among the following is correct about ''Intelligent Agent":?






159131. The intelligent agent paradigm became widely acceptable during the period of _____:?





159132. Artificial Intelligence consists of:?





159133. The number of atomic facts that are average person knows is astronomical. Research projects that attempt to build a complete knowledge base of ______:?





159134. Long term goals for Artificial Intelligence is:?






159135. Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____:?





159136. Which among the following is used to access the network:?





159137. Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc:?





159138. Which layer has access to particular network services, billing functions etc:?





159139. In OSI Model, OSI stands for:?





159140. OSI model is a product of the Open Systems Interconnection effort at the ____:?





159141. Which among the following is correct features about LAN (Local Area Network):?






159142. The size of a ______can cover a city whose scope is less than 100 kilometer such as cable TV networks etc:?





159143. The fundamental approaches to build a point - to - point network is:?





159144. The _____layer defines the electrical and physical specifications for devices:?





159145. HBA stands for:?





159146. HBA is used in ______:?





159147. FDM stands for:?





159148. TDM stands for:?





159149. In cable modem internet access, cable modem terminations system (CMTS) is at:?





159150. What type of internet technology sends information to you without you requesting that information:?





<<= Back Next =>>
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use | Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions