Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Which of the following doesn’t form part of the elements which compose a table:

A. Table
B. Table Column
C. Table Row
D. Table Data

problem 2) A _______ permits data to be held together with its relationship to other information:

A. System
B. Database
C. Computer
D. Software

problem 3) EDI stands for:

A. Electronic data information
B. Electric data interchange
C. Electronic data interchange
D. Electric data Information

problem 4) ______ is a program which simulates human reasoning:

A. Expert System
B. Information System
C. Special System
D. Professional System

problem 5) Which of the following is desktop publishing software used to create publication documents:

A. Microsoft Word
B. Microsoft Access
C. Microsoft PowerPoint
D. Microsoft Publisher

problem 6) Which of the following kind of scanner is the most common one:

A. Handheld Scanner
B. Drum Scanner
C. Flatbed Scanner
D. Photo Scanner

problem 7) A frustrated employee who cracks his manager’s password so as to access confidential information, can be categorised as which type of threat:

A. Inside Threat
B. Internal Threat
C. Outside Threat
D. External Threat

problem 8) The _____ can be used to protect computer power supply:

A. Uninterrupted Power Supply
B. Uninterrupted Power Service
C. Unattended Power Supply
D. Unattended Power Service

problem 9) _______ are threats which are caused non-intentionally by users of computer system:

A. Malicious Threats
B. Deliberate Threats
C. Non-Malicious Threats
D. Accidental Threats

problem 10) A computer virus which hides within code of another program and wreak havoc to any form of data is called as:

A. Boot Sector Virus
B. File Infector
C. Macro Virus
D. Register Virus

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96072

Have any Question? 


Related Questions in Computer Engineering

Suppose an n x n image u is mapped into a row-ordered n2 x

Suppose an N x N image U is mapped into a row-ordered N 2 x 1 vector IP. Show that the N 2 x N 2 one-dimensional Hadamard transform of IP gives the N x N twodimensional Hadamard transform of U. Is this true for the other ...

Design an algorithm for computing vn for any positive

Design an algorithm for computing vn for any positive integer n. Besides assignment and comparison, your algorithm may only use the four basic arithmetical operations.

1 implement the function treesizeroot which computes the

1. Implement the function treeSize(root), which computes the number of nodes in a binary tree. 2. Implement the function treeHeight(root), which computes the height of a binary tree. 3. Implement the computeOp(lvalue, op ...

To avoid shutting down a website when changing the server

To avoid shutting down a website when changing the server of the website, redirecting traffic to an intermittent subdomain is required? List the steps of the redirection process?

1 what is a vulnerability what do you understand by a

1. What is a vulnerability? What do you understand by a system vulnerability? 2. Discuss four sources of system vulnerabilities. 3. What are the best ways to identify system vulnerabilities? 4. What is innovative misuse? ...

Suppose you have a hdd that with an average seek time of 12

Suppose you have a HDD that with an average seek time of 12 msec and a rotational speed of 3000 RPM. How long would it take to transfer 102400 bytes. Assume 500 sectors on a track, and each sector contains 512 bytes.

1 list and describe the four basic conversion strategies as

1. List and describe the four basic conversion strategies (as described in the chapter) that are used when converting to a new system. Under which circumstances is each of these the best approach? 2. What is technology g ...

Write an application that retrieves a student name and

Write an application that retrieves a student name and three scores per line from a text file. Process the values by calculating the average of the scores per student. Write the name and average to a different text file. ...

Question 11 corporate culture has been said to be the

Question 1: 1. Corporate culture has been said to be the toughest component of a business to change. Do you agree or disagree with this statement and why? 2. Define the five types of power according to French and Raven's ...

1 design and implement a function that evaluates a prefix

1. Design and implement a function that evaluates a prefix expression stored as a text string. 2. Implement the findPath(), reset(), and draw() methods for the Maze class. 3. Implement a complete maze solving application ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro