0 of 60 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 60 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
______ is not the benefit of the application software
Which of the following is the benefit of a computer network
Which control activity is involved in maintaining the integrity of the database
______ is the logical access violators
______ maintains the chronology of events from time a sender dispatches a massage to the time a receiver obtains the message
how many types of primary memory are present?
______ method nodes in a network must compete with each other to gain access to a
channel
______ perform validation checks to identify errors during processing of data
Which transmission mode data flows in one direction or the other, but not both at the same time
_______ checks against entry into processing of incorrect/invalid character
Which control has a pair of doors that are typically found in entries to facilities such as computer rooms and document stations.
Which is the fundamental unit of data transmitted over the internet
Which system enforces access control between two networks
Collection of Characters is known as ___
collection of Fields is known as ________
_______ is not the characteristics of corrective controls
Which is not an example of biometric Devices
Which of the following is not the purposes of boundary control
_______ is not the update control
What are the advantage of DBMS
_______ is the electronic filling cabinet i.e. a collection of computerized data files
_______ is the full form of R.O.M.
_______ is the high speed memory units CPU for storing small amount of data
Which of these encodes the manufacturer’s registered identification number
Which network topology involves a central unit with number of terminals tied into it
Which Primary memory information can be only read and not modified
_______ are the trails that can be designed to record activity at the system, application, & user level
_______ audit trail maintains the chronology of events that occur either to the database definition or the database itself
Which of the following bugs copy itself in several places of a computer network
_______ database model allows the definition of the data & their structures, storage and retrieval operations & integrity constrains that can be organized in a table structure
_______ deals with programs for transforming data into cipher text that are meaningless to anyone
Which error occurs if one digit in a code is replaced with another
_______ Involves forging one’s source address in which user think that s/he is interacting with the operating system
_______ is a multiport repeater which connects multiple wires coming from different branches
In which process of analyzing data we find previously unknown trends, patterns &
associations to make decisions
_______ is a tangible portion of computer that we can touch and see
Which of the following is not an characteristics of corrective controls
_______ is not the functional unit of processing device
Which of the following is not the role of IS auditor in auditing physical access control
_______ is the full form of RAM
_______ is a special metal key used to gain entry & avoid illegal entry. the keys
should not be duplicated
Whcih operating system helps in allocating resources to make optimum utilization of
the same.
_______ refers to the situation that arises when there is a conflict for some common
resource in a network
Which technology takes an internet signal and convert it into radio waves
In which type of transmission mode data flows in only one direction
______techniques establish an order in which a node can gain access to a channel
Anti-virus software & Firewalls are the example of _______ .
Auditors examine variables that often indicate when motivation problems exist or suggest poor leadership known as ____ .
This technical exposure in change of data before or after they entered the system is known as ______ .
DBMS can perform the operation of _______ .
The correct sequence of Business Process Flow is:
i) Interpretation/Evaluation, ii) Data Transformation, iii) Selection, iv) Data Mining
Fencing at boundary of the facility may also enhance the security mechanism, this is known as______.
Fire damage, Power Spikes, Water damage are the example of _______ .
Google & yahoo are the example of ______ that should consult to see which information regarding the organization is available
Motivating, guiding & communicating with personal is known as _______
MS Office 2010 has MS World, MS Excel, MS Access etc. this is example of _______ .
Taking Data as input, Processing it & creating information as an output is known as ___.
Trancing a transaction in a computerized system can be performed with __________.
User Identification by an authentication mechanism with personal characteristic like name, birth date etc. is known as ______
Which is an example of trojan because of which users can not save their half-finished work.