<<= Back Next =>>
You Are On Multi Choice Question Bank SET 3189

159451. Which among the following is correct about "Child Pornography":?

159452. Which among the following characteristics are correct about 'Cyberstalking':?

159453. Denial - of - service attack includes:?

159454. Which among the following is wrong characteristic of "Phishing":?

159455. Credit Card Fraud includes:?

159456. Punishment for Hacking in Inida is:?

159457. Which among the following is best suitable for term "Software Piracy":?

159458. Which among the following are Malicious Softwares:?

159459. IRC stands for:?

159460. MOD refers to:?

159461. INTER POL stands for:?

159462. A firewall is a ______security system:?

159463. A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules:?

159464. Firewalls are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet especially ____:?

159465. Firewalls are used to protect:?

159466. If you have more than one computer connected in the home, it is important to protect every computer. You should have a ____firewall (such as a router) to protect your network:?

159467. ____intercepts all messages entering and leaving the network. The _____effectively hides the true network addresses:?

159468. Firewalls are often categorized as:?

159469. The first type of firewall was the packet filter which looks at:?

159470. The first paper published on firewall technology was in ____, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls:?

159471. From 1989 - 1990 three colleagues from AT & T Bell Laboratories, Dave Presotto, Janardan Sharma and Kshitij Nigam developed the second generation of firewalls, calling them:?

159472. Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application:?

159473. Which among the following is correct characteristics about proxy server:?

159474. C' in CPU denotes …?

159475. To display the contents of a folder in Windows Explorer you should ______?

159476. The CPU comprises of Control, Memory and _____ units?

159477. _____ is the most important/powerful computer in a typical network?

159478. A(n) ______ appearing on a web page opens another document when clicked?

159479. Which of the following refers to the rectangular area for displaying information and running programs?

159480. ________ is a windows utility program that locates and eliminates unncessary fragments and rearranges filed and unused disk space to optimize operations?

159481. The software that is used to create text-based documents are referred to as ______?

159482. _________ devices convert human understandable data and programs into a form that the computer can process.?

159483. Allows users to upload files to an online site so they can be viewed and edited from another location?

159484. What feature adjusts the top and bottom margins so that the text is centered vertically on the printed page?

159485. Which of these is not a means of personal communication on the internet?

159486. What is the overall term for creating editing, formatting, storing, retrieving and printing a text document?

159487. Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both _____ data, including full-motion video, high-speed internet access, and video conferencing.?

159488. _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses.?

159489. Which of these is a point and draw device?

159490. A set of rules for telling the computer what operations to perform is called a?

159491. A detailed written description of the programming cycle and the program, along with the test results and a printout of the program is called?

159492. Forms that are used to organize business data into rows and coloumns are called?

159493. In power point, the header and footre button can be found on the insert tab in what group?

159494. A(n) ______ is a set of programs designed to manage the resources of a computer, including starting the computer, managing programs, managing memory and coordinating tasks between input and output devices.?

159495. The PC productivity tool that manipulates data organized in rows and coloumn is called a?

159496. In the absence of parentheses, the order of operation is?

159497. To find the Paste Special option, you use the clipboard group on the _______ tab of power point?

159498. A(n) _____ program is one that is ready to run and does not need to be altered in any way.?

159499. Usually downloaded into folders that hold temporary internet files, _____ are written to your computer's hard disk by some of the websites you visit.?

159500. What is the easiest way to change the phrase, revenues, profits, gross margin, to read revenues, profits, and gross margin?

<<= Back Next =>>
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use | Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions
Question ANSWER With Solution