0 of 60 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 60 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
Facebook, LinkedIn, My space and twitter are the examples of _______ .
Which controls of data processing tool helps in verifying checks to identify errors during processing of data?
Who are known as the logical access violators
____ refers to the amount of data which can be sent across a network in given
time
What is the term used for the user accounts that exist but they are unused
Which error occurs when a digit or character is removed from the end of as code
Which error occurs if an extra digit or character is added to code
The collection of bits is known as _____?
Which of the following is not an example of logical access control
Which is not the component of the information system
which of the following is not the example of Network access control
which of the following gives an set of instruction to hardware reagrding what to do?
Abbrevate BCP.
_____ is the process of deciding on how to communicate the data from source to destination in a network
Which is to used to verify fields appearing in different files to see that the result tally
_____ is to verify fields appearing in different files to see the result of tally
What are the audit routines that flag suspicious transactions
_____ involves embedding audit software within a host application system to provide
continuous monitoring of the system’s transactions
which of the following is a human-friendly name for a device on the internet
_____ is a set of computer programs that manages computer hardware resources & acts as an interface with computer applications programs
_____ is a set of rules that allow two or more devices to exchange information back and forth across the network
What is the acronym for ‘Simultaneous peripherals Operations Online
Which control is needed to prevent nodes in network and can differ in terms of the rate at which they can send, received and process data
_____ is the objective of audit trails
which checks ensure that physical records follow a required order matching with logical
records
_____ maintains the chronology of events that occur when a user attempts to gain access to and employ systems resources
which memory is used to bridge speed difference between register & primary memory
_____ node is connected by a dedicated point to point link to every node
What control performs validation checks to identify errors during processing of data
_____ type of primary memory is volatile in nature
Which errors occur when two adjacent digits are reversed
Which of the following generates the signal over the same network before the signal becomes too weak
______ is a piece of bad code deliberately planted by an insider or supplier of a program
______ is an example of Input
______ is caused due to a very short pulse of energy in a power line
Collection of Records is known as
Which of the following is not the benefit of the application software
Which of the following is not the function of operation management controls
______ is not the Report Control
Which activity is considered under audit environmental control
Which is an imaginary memory supported by some operating system in conjunction with the hardware
______ is the important characteristic of information system
Which control is a barrier between unauthorized parties and sensitive information
______ is used to mitigate exposure associated with dial-up access to a computer system
______ refers to the ability of a network to recover from any kind of error like
connection error, loss of data etc
Which of the following output is used for individual who are blind as raised lines drawing
In which type of transmission mode data flows in both the directions simultaneously
______ allows insertion of specific logic, such as program interrupts that permits a
review of data
______ approach starts by creating small data warehouse, called data marts, to solve specific business problems
Which approach suggests that we should start by creating an enterprise-wide data
warehouse
User accounts used by more than one person is known as ________
______ data processing control are generated to identify errors in the processed data
Which data processing control has two or more fields which can be compared and cross verified to ensure their correctness
Which of the following allows the definition of the data & their structures, storage and
retrieval operations & integrity constrains that can be organized in a table structure
Which control ensures that single individuals do not process excess privileges
______ function of the processing device performs operations as addition, subtraction,
multiplication & logical comparison of numbers
Which of the following has four digit number and the door will unlock for a predetermined period, usually ten to thirty seconds
______ is a network device that connects multiple devices together & filters packets based on their destination within the connected device
______ is a raw fact & can take the form of number or statement such as a date or a
measurement
______ is collection of computers & other hardware interconnected by communication
channels that allows sharing of resources & information