A passive threat to computer security is—
The Secure Electronic Transaction (SET) specification—
……………allows wireless mobile devices to access the Internet and its services such as the Web and e-mail—
'DOS' floppy disk does not have—
'MICR' technology used for clearance of cheques by banks refers to—
All the information collected during database development is stored in a—
The……………….component is used by the data analyst to create the queries that access the database.
A(n)…………….allows network users to share a single copy of software, which resides on the network server.
A polymorphic virus—
Microwave transmission is used in environments where installing physical transmission media is—
Which is NOT a good Web security strategy?
The altering of data so that it is not usable unless the changes are undone is—
The word FIP stands for—
Voice mail—
A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is—
Which of the following is a general-purpose programming language, designed by Sun Microsystems, and well suited for use on the Web?
This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
RSA is—
A DVD-RAM is similar to a………………except it has storage capacities up to 5.2GB.
When you are selecting a mouse for a particular computer system, what is the most important consideration?
How is power supplied to a low-power USB device?
All of the following are basic principles of net works, except—
The………….data mining technique derives rules from real-world case examples.
…………….are used to identify a user who returns to a Website.
Which one of the following objects is passed to a JavaBean when one of its properties is set via a JSP action?
Programs that automatically submit your search request to several search engines simultaneously are called—
Graphical diagrams used to represent different multiple perspectives of a system include—
Database redesign is not terribly difficult if the—
Which of the following are normally used to initialize a computer system's hardware?
If you wanted to locate the hardware address of a local device, which protocol would you use?
What is Internet 2?
The term, "hypertext", means—
While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?
Which kind of lock includes a keypad that can be used to control access into areas?
A……………..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.