NCO- Cyber Olympiad (SOF) Class 12: Questions 378 - 382 of 520

Access detailed explanations (illustrated with images and videos) to 520 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 350.00 or

How to register?

Question number: 378

» Computer » Viruses and Antiviruses

Edit
MCQ▾

Question

Which type of a computer virus that stores itself within memory allowing it to infect other files even when the originally infected program has been terminated?

Choices

Choice (4) Response

a.

Non-Resident

b.

Multipartite

c.

Real Time

d.

Resident

Question number: 379

» Computer » SQL

Edit

Appeared in Year: 2014

MCQ▾

Question

Data manipulation language enables a user to access or manipulate data. Which of the following functions is NOT performed by it? (SET-B)

Choices

Choice (4) Response

a.

Deleting information from the database.

b.

Altering the structure of the database.

c.

Inserting new information in the database.

d.

Retrieving the information stored in the database.

Question number: 380

» Computer » MS-Excel

Edit

Appeared in Year: 2014

MCQ▾

Question

Which of the following keyboard shortcuts sets the date format with the day, month and year respectively in MS-Excel 2010? (SET-A)

Choices

Choice (4) Response

a.

Alt #/3

b.

Shift */8

c.

Ctrl Shift ! /1

d.

Ctrl Shift #/3

Question number: 381

» Computer » Networking & Topologies

Edit
MCQ▾

Question

EDGE is a radio based high-based mobile data standard for transmission.

EDGE stands for ________.

Choices

Choice (4) Response

a.

Enhanced Data rates for Global Evolution

b.

Extra Data for Global Extranets

c.

External Data for Global Enterprise

d.

Enhanced Dynamic Data for Global Enterprise

Question number: 382

» Computer » Cyber Ethics

Edit

Appeared in Year: 2014

MCQ▾

Question

Which of the following is/are advantage (s) of Cyber Laws under IT Act of India 2000? (SET-B)

1. Digital signatures have been legal validity and sanction in the Act.

2. It now allows Government to issue notification on the web thus heralding e-governance.

3. It also addresses the important issues of security, which are so critical to the success of electronic transactions

4. It shall now be possible for corporate to have a statutory remedy in case if anyone breaks into their computer systems or network and causes damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore.

Choices

Choice (4) Response

a.

1,3 and 4

b.

2 and 4

c.

1,2, 3 and 4

d.

1 and 2