Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1) EDI stands for:

A. Electronic data information
B. Electronic data intercommunication
C. Electronic data interchange
D. Electronic date interchange

problem 2) The production of high quality publications by publishers is best made using:

A. Word-Processor
B. A DTP software
C. An Expert System
D. A 4GL

problem 3) A _____ scanner is a scanner that is moved by hand in order to scan:

A. Sheet feed
B. Hand-held
C. Flatbed
D. None of the above

problem 4) The most significant step in implementing a security strategy is:

A. Computer
B. Security Awareness
C. Cost
D. People

problem 5) A frustrated employee who cracks her manager’s password in order to access confidential data is called as:

A. Internal Threat
B. External Threat
C. Outer Threat
D. None of the above

problem 6) ______ are caused intentionally by users of computer system:

A. Non-Malicious Threat
B. Malicious Threat
C. Both of the above
D. None of the above

problem 7) Malicious threats can also be called as:

A. Firmware
B. Software
C. Maliciousware
D. Malware

problem 8) What are the symptoms in detecting virus infection on your computer:

A. Programs quit working or freeze
B. Documents become inaccessible
C. System seems to run slower than normal
D. All of the above

problem 9) _____ hides within code of another program and wreak havoc to any form of data on the machine:

A. File Infectors
B. Boot Sector Virus
C. Macro Virus
D. Micro Virus

problem 10) Which kind of virus causes damage and compromises security of computer when you open it:

A. Worm
B. Trojan Horse
C. Macro Virus
D. None of the above.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95829

Have any Question? 

Related Questions in Computer Engineering

Assume router r2 in figure 1835 receives a packet with

Assume router R2 in Figure 18.35 receives a packet with destination address How is the packet routed to its final destination?

1 list and describe four vulnerability intelligence sources

1. List and describe four vulnerability intelligence sources. Of those that you listed, which seems the most effective? Why? 2. What does CERT stand for? Is there more than one CERT? What is the purpose of a CERT?

1 the simplest and most economical way of identifying an

1. The simplest and most economical way of identifying an individual is through a password. What are the conditions that are required to establish password protection and what are some reasons why passwords might not be ...

Assignmentyou are working for a retirement planners company

Assignment You are working for a Retirement Planners company that helps customers plan retirement parties. The company has to track all retirement parties for which it is providing planning services. However, since you a ...

No more book corp has an agreement with floyd bank where by

No more book Corp has an agreement with floyd bank where by handle $2.9 million in collections a day and require a $350,000 compensating balance. No more Books is contemplating canceling the agreement and dividing it eas ...

1 what are vulnerabilities how do you identify them2 what

1. What are vulnerabilities? How do you identify them? 2. What is competitive disadvantage? Why has it emerged as a factor? 3. What are the strategies for controlling risk as described in this chapter?

Write a job description for kelvin urich the project

Write a job description for Kelvin Urich, the project manager described in the opening vignette of this chapter. Be sure to identify key characteristics of the ideal candidate, as well as his or her work experience and e ...

1 some have sounded an apocalyptic voice as far as finding

1. Some have sounded an apocalyptic voice as far as finding solutions to system vulnerabilities. Should we take them seriously? Support your response. 2. What is innovative misuse? What role does it play in the search fo ...

1 write findmin and findmax methods for the avltree class2

1. Write FindMin and FindMax methods for the AVLTree class. 2. Using the Timing class, compare the times for the methods implemented in Exercise 1 to the same methods in the BinarySearchTree class. Your test program shou ...

1 write a program that can read an indefinite number of

1. Write a program that can read an indefinite number of lines of VB.NET code and store reserved words in one linked list and identifiers and literals in another linked list. When the program is finished reading input, d ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro