Information-Technology Related Question Answers

1426. Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way):?





1427. Symmetric key cryptography was the only kind of encryption publicly known until:?





1428. Which among the following is correct about goals in cryptography:?






1429. License is still required to use cryptography in which among the following countries:?





1430. NSA stands for:?





1431. In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys:?





1432. Which among the following is correct about the 'Artificial Intelligence':?






1433. The term 'Artificial Intelligence' was first coined in ______:?





1434. The term Artificial Intelligence was coined in 1955 by_____:?





1435. Which among the following includes the areas of Artificial Intelligence specialization:?






1436. In May 1997 an IBM super computer called ______defeated world chess champion Gary Kasparov in a chess match:?





1437. Which among the following is necessary for General Intelligence (in computer language):?





1438. Which among the following definitions are correct:?





1439. A _____is defined as "some sort of hardware architecture or software framework (including application frameworks), that allows software to run:?





1440. ______argues that "artificial intelligence is the next stage in evolution":?





1441. Which among the following is correct about ''Intelligent Agent":?






1442. The intelligent agent paradigm became widely acceptable during the period of _____:?





1443. Artificial Intelligence consists of:?





1444. The number of atomic facts that are average person knows is astronomical. Research projects that attempt to build a complete knowledge base of ______:?





1445. Long term goals for Artificial Intelligence is:?






1446. Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____:?





1447. Which among the following is used to access the network:?





1448. Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc:?





1449. Which layer has access to particular network services, billing functions etc:?





1450. In OSI Model, OSI stands for:?





Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use | Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions
Question ANSWER With Solution