Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Topic :: Computer





Computer Interview Questions
Questions Answers Views Company eMail

To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.

1 4598

A hacker could obtain passwords without the use of computer tools or programs through the technique of: A. social engineering. B. sniffers. C. backdoors. D. trojan horses.

1 11198

When auditing the proposed acquisition of a new computer system, the IS auditor should FIRST establish that: A. a clear business case has been approved by management. B. corporate security standards will be met. C. users will be involved in the implementation plan. D. the new system will meet all required user functionality.

2 9536

In a small organization, an employee performs computer operations and, when the situation demands, program modifications. Which of the following should the IS auditor recommend? A. Automated logging of changes to development libraries B. Additional staff to provide separation of duties C. Procedures that verify that only approved program changes are implemented D. Access controls to prevent the operator from making program modifications

1 9060

To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.

2 5041

What is the difference between micro computer mini computer&super computer?

Oracle, Satyam,

3 31500

How did you first get interested in Computer Science?

Microsoft,

4 14379

What do you like to do best related to computers now (programming, administration, testing, manage projects, etc)? What is it about that area that you specifically enjoy?

Microsoft,

1 3351

For a single computer processor computer system, what is the purpose of a processor cache and describe its operation?

Intel,

2352

Explain the operation considering a two processor computer system with a cache for each processor.

Intel,

4698

For a single computer processor computer system, what is the purpose of a processor cache and describe its operation?

Intel,

3 11537

Explain the operation considering a two processor computer system with a cache for each processor.

Intel,

2814

In a computer tape library there are two racks with 40 tapes per rack.In a given day 30 tapes are in use . What fraction remains in the rack?

TISL,

6 25620

A man owns 2/3 of a computer service buroue business and sells 3/4 of his share for $75000.What is the value of the business?

TISL,

4 14747

A computer printer produces 176400 lines in a given day. If the printer is in operation for 7 hrs during the day how many lines did it print per minute?

Cap Gemini,

9 17932




Related Topics


Un-Answered Questions { Computer }

what is your experience with computer-aided design software.

1976


How would you compare the computational power of a cortical pyramidal cell with that of a desktop computer?

1901


For a single computer processor computer system, what is the purpose of a processor cache and describe its operation?

2352


Explain the operation considering a two processor computer system with a cache for each processor.

2814


Classify and describe the main functions of computer peripherals?

2751


What was the last computer book you purchased? Why?

2320


What is your favorite all time computer book? Why?

2455


How to detect the CPU type of the computer the application is running on?

1718


How to get a list of CDROM drives on a computer?

1588


How to detect the computer name?

1830


What do you like about computers?

2202


i want computer associates placement papers from u? pls post to me.

2642


How do u check and assign a ipaddress to the computer?

2894


I was attened for H1b in chennai embassy,on nov14th 2005, but its in Admin Query, after few months exactly 364 days i got a personnel interview, in that they said we r sending ur file to INS because u dont have background computers, but in MBA i have computers subject i said, and i too worked in Canada for 1.5 years. Till Now i did't get the status, no response what to do....

2356


why Paradox slow on some computers and not on others ?

1500