sponsored links
- ________is hardware and/or software that is used to protect a computer or private network resources from intruders or hackers.
- A hacker that changes or forges information – altering raw data just before a computer processes it and then changing it back after the processing is completed, is engaging in – Data didling
- Attack done by checking all possible combinations of letters, numbers and symbols – Brute force attack
- An OLAP tool provides for
- Multidimensional analysis
- Roll-up and drill-down
- Slicing and dicing
- Rotation
- Setting up only relations
- Best technologies for in indoors are – IEEE 802.11 a/ IEEE 802.11 b/IEEE 802.11 n/???
- Bridge operated in – data link layer
- Check digit can detect – transcription error/substitution error..
- Connecoin oriented protocol – TCP
- Cryptanalysis refers – to the study of ciphers, ciphertext, or cryptosystems (that is, to secret code systems) with a view to finding weaknesses in them that will permit retrieval of the plaintext from the ciphertext
- Cryptogrphy is not concerned about – Availability [other options Integrity,privacy,confidentiality]
- DBMS not doing – programming data
- Disaster recovery risk assessment and business impact analysis (BIA) are crucial steps in the development of a disaster recovery plan.
- Encapsulating data inside data link layer with header and trailer
- Encrypt using receiver’s public key decrypt using receiver private key – public key and asymmetric key encryption
- ER diagram presenting minimum and maximum relation – cardinality
- Firewall decision making – Always deny or deny by delay & Accept by exception???
- Forcing client package without users knowledge/permission – PUSH
- How public keys are shared – via email or digital signature???
- Identification – who is this, authentication – what action he has been authorized to perform
- In java Objects can communicate with each other – using methods and can call methods in other classes
- In the relationship between course and faculty, the course entity would be – Child 22) When overriding a method – method inheritance/method signature/method name ???
- Most important thing in disaster recovery?personnel safety???
- Not a part of disaster recovery – Proximity of alternate site near primary site???
- Notify all stations before transmitting data – CSMA/CD or CSMA/CA
- OLTP real time reporting tool – Dashboard
- One question about compliance validation and compliance monitoring
- Oracle procedure does not contain – RETURN [other options BEGIN END INTO]
- Permissible operation when there is a shared lock on DB? Read
- Polymorphic virus – associated with code modified differently each time….
- Project estimation techniques uses the standards of prior proj experience-??? (options function point,cocomo…)
- Providing application access via third party – Software as a service(saas)
- Realtime ids system – N/w based IDS??
- Removing redundancy in DB – Normalization
- RSA – Asymmetric protocol
- Security threat associated with java applet – when downloaded and run at client….
- Shutdown method in oracle for a consistent backup – Normal [ABORT,Inconsistent..]
- Some Oracle 9i buffer question
- Strong password/authentication mechanism – Hybrid/static/dynamic/brutal???
- The entity relationship diagram – Depicts relationship between data objects
- UML Public symbol = +
- VLAN referred to as – TRUNKS/ SUBNET???
- VPN also called as Tunnel [other options Pipeline,packet switched]
- what happens when a error is encounterd during online transaction processing? – review and report??
- Which background process performs a checkpoint in the database by writing modified blocks from the database buffer cache in the SGA to the data files? DBWn
- Which is not a information analysis system – DBMS?
- Which of the below is not an Information system… Database Management System.
- Which of the following provide network redundancy in a local network environment?Dual backbone
- Which of the following statements is not true about two-tier client-server database architecture? SQL stmnts may be processed on some of the clients
- Which one is NOT a phase of the systems development life cycle? – Post Implementation review

sponsored links
0 Responses:
Post a Comment