An intrusion detection system does not perform which of the following?
Options: Tries to identify attempts to hack into a computer system., May monitor packets passing over the network., May transmit message packets to the correct destination., Set up deception systems that attempt to trap hackers.
4.If normalized turnaround time of different process are given. Then Highest response ratio next policy in uniprocessor scheduling policy selects.
Options: (A)The ready process with lowest normalized turnaround time. (B) The ready process with highest normalized turnaround time. (C) The process with shortest expected processing time. (D) The process with highest expected processing time. 12
Advantages of Relational Database Management systems are
Options: Flexibility, of relating different logical files, Security controls can be more easily implemented., Data independence since it allows the database to grow by adding new attributes and relations., All of the above
Which of the following factors are responsible for the rapid growth of sugar production in south India as compared to north India?Higher per acre field of sugarcaneHigher sucrose content of sugarcaneLower labour costLonger crushing period
Options: I and II, I, II and III, I, III and IV, I, II and IV