1.It is a toolkit for hiding the fact that a computerâ€™s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.
8.The space factor when determining the efficiency of algorithm is measured by
Options: (A)Counting the maximum memory needed by the algorithm (B) Counting the minimum memory needed by the algorithm (C) Counting the average memory needed by the algorithm (D) Counting the maximum disk space needed by the algorithm 3
When two computers communicate with each other, they send information back and forth. If they are separated by a reasonable distance, they can send and receive the information through a direct cable connection which is called a null-modem connection. Presently what is the maximum distance in metres permitted in this null-modem connection?
Suppose that you have a customer who has a central HQ and six branch offices. They anticipate adding six more branches in the near future. They wish to implement a WAN technology that will allow the branches to economically connect to HQ and you have no free ports on the HQ router. Which of the following would you recommend?
Which of the following is not likely to occur in the near future?
Options: the presidential election will be done by pushing buttons at home., the political issue of establishing an information-assistance program will be raised., most workers will choose working at hoe, so the traditional workplace will disappear, automation will reduce job opportunities, thus resulting in a lower standard of living.
Which of the following is true concerning personal computers?
Options: They decrease the demand for mainframe computers, They have been most successful in the home, The electronic spreadsheet has been a primary reason for their popularity, Their future is not so bright owning to the improved cost-performance ratio of minis and mainframes
Options: transmission of signals without modulation, a signal all of whose energy is contained within a finite frequency range, the simultaneous transmission of data to a number of stations, All of the above
Options: (A)Here data-flow diagram show, how data is processed at different stages in the system. (B) It registers all/ selected activities of a computer system. (C) Technique used to transform raw data into a more useful form. (D) Data is shifted to modern data base management system. 16