Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Which of the following doesn’t form part of the elements which compose a table:

A. Table
B. Table Column
C. Table Row
D. Table Data

problem 2) A _______ permits data to be held together with its relationship to other information:

A. System
B. Database
C. Computer
D. Software

problem 3) EDI stands for:

A. Electronic data information
B. Electric data interchange
C. Electronic data interchange
D. Electric data Information

problem 4) ______ is a program which simulates human reasoning:

A. Expert System
B. Information System
C. Special System
D. Professional System

problem 5) Which of the following is desktop publishing software used to create publication documents:

A. Microsoft Word
B. Microsoft Access
C. Microsoft PowerPoint
D. Microsoft Publisher

problem 6) Which of the following kind of scanner is the most common one:

A. Handheld Scanner
B. Drum Scanner
C. Flatbed Scanner
D. Photo Scanner

problem 7) A frustrated employee who cracks his manager’s password so as to access confidential information, can be categorised as which type of threat:

A. Inside Threat
B. Internal Threat
C. Outside Threat
D. External Threat

problem 8) The _____ can be used to protect computer power supply:

A. Uninterrupted Power Supply
B. Uninterrupted Power Service
C. Unattended Power Supply
D. Unattended Power Service

problem 9) _______ are threats which are caused non-intentionally by users of computer system:

A. Malicious Threats
B. Deliberate Threats
C. Non-Malicious Threats
D. Accidental Threats

problem 10) A computer virus which hides within code of another program and wreak havoc to any form of data is called as:

A. Boot Sector Virus
B. File Infector
C. Macro Virus
D. Register Virus

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96072

Have any Question? 


Related Questions in Computer Engineering

1 what is a vulnerability scanner how is it used to improve

1. What is a vulnerability scanner? How is it used to improve security? 2. What is the difference between active and passive vulnerability scanners? 3. What kind of data and information can be found using a packet sniffe ...

Suppose that 95 of the execution time in a certain program

Suppose that 95% of the execution time in a certain program is due to code that can be split into N independent parts each of which can be executed by a separate processor. The remaining 5% is sequential and must execute ...

1 which existing blocks if any can be used for this

1. Which existing blocks (if any) can be used for this instruction? 2. Which new functional blocks (if any) do we need for this instruction? 3. What new signals do we need (if any) from the control unit to support this i ...

Modify your implementation of the big integer adt from the

Modify your implementation of the Big Integer ADT from the previous question by adding the assignment combo operators that can be performed on the self and rhsInt big integers. Allow for any of the following operations t ...

Suppose one wishes to confirm that none of the files in the

Suppose one wishes to confirm that none of the files in the directory /usr/spool/lpd are worldreadable. a. What would the fourth field of the tripwire database contain? b. What would the second field of the RIACS databas ...

Use the probability density function of problem 414aa

Use the probability density function of Problem 4.14a. a. Design the four-level optimum-uniform quantizer. Calculate the mean square error and the entropy of the output. b. Design the four-level Lloyd-Max quantizer (or t ...

Given alpha 0 b 1 and c 1 are the first three numbers of

Given α = 0, b = 1, and c =1 are the first three numbers of some sequence. All other numbers in the sequence are generated from the sum of their three most recent predecessors. Design an algorithm to generate this sequen ...

Assignment1 synchronization is a major concern when

Assignment 1 Synchronization is a major concern when designing __________communication paths. 2. Research Question: How many STORE instructions are used in the lc3 Instruction set architecture.. 3. Superscalar architectu ...

Why are guards considered the most effective form of

Why are guards considered the most effective form of control for situations that require decisive action in the face of unfamiliar stimuli? Why are they usually the most expensive controls to deploy? When should dogs be ...

1 a file contains 2 million bytes how long does it take to

1. A file contains 2 million bytes. How long does it take to download this file using a 56-Kbps channel? 1-Mbps channel? 2. A computer monitor has a resolution of 1200 by 1000 pixels. If each pixel uses 1024 colors, how ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro