NCO- Cyber Olympiad (SOF) Class 12: Questions 375 - 379 of 520

Access detailed explanations (illustrated with images and videos) to 520 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Unlimited Access for Unlimited Time!

View Sample Explanation or View Features.

Rs. 350.00 or

How to register?

Question number: 375

» Computer » Networking & Topologies

Edit

Appeared in Year: 2014

MCQ▾

Question

Which of the following statement is INCORRECT about radio wave transmission? (SET-B)

Choices

Choice (4)Response

a.

It offers a secure communication.

b.

It offers mobility.

c.

It uses radio frequencies.

d.

It is susceptible to weather conditions like rains, thunder, storms, etc.

Question number: 376

» Computer » SQL

Edit
MCQ▾

Question

Which of the following operations does NOT come in the DDL part of SQL?

Choices

Choice (4)Response

a.

Creation of table

b.

Creation of views

c.

Deletion of data

d.

Renaming an object

Question number: 377

» Computer » Viruses and Antiviruses

Edit

Appeared in Year: 2014

MCQ▾

Question

Identify the type of virus. (SET-B)

- It is the Trojan horse virus.

- It was discovered in September 2013.

- It encrypts the file on a user’s hard drive and then prompts them to pay a ransom in order to receive the decryption key.

Choices

Choice (4)Response

a.

DecryptLocker

b.

Heartbleed

c.

Shamoon

d.

CryptoLocker

Question number: 378

» Computer » Viruses and Antiviruses

Edit
MCQ▾

Question

Which type of a computer virus that stores itself within memory allowing it to infect other files even when the originally infected program has been terminated?

Choices

Choice (4)Response

a.

Non-Resident

b.

Multipartite

c.

Real Time

d.

Resident

Question number: 379

» Computer » SQL

Edit

Appeared in Year: 2014

MCQ▾

Question

Data manipulation language enables a user to access or manipulate data. Which of the following functions is NOT performed by it? (SET-B)

Choices

Choice (4)Response

a.

Deleting information from the database.

b.

Altering the structure of the database.

c.

Inserting new information in the database.

d.

Retrieving the information stored in the database.

Developed by: