Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Topic :: Computer





Computer Interview Questions
Questions Answers Views Company eMail

To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.

1 4692

A hacker could obtain passwords without the use of computer tools or programs through the technique of: A. social engineering. B. sniffers. C. backdoors. D. trojan horses.

1 11316

When auditing the proposed acquisition of a new computer system, the IS auditor should FIRST establish that: A. a clear business case has been approved by management. B. corporate security standards will be met. C. users will be involved in the implementation plan. D. the new system will meet all required user functionality.

2 9671

In a small organization, an employee performs computer operations and, when the situation demands, program modifications. Which of the following should the IS auditor recommend? A. Automated logging of changes to development libraries B. Additional staff to provide separation of duties C. Procedures that verify that only approved program changes are implemented D. Access controls to prevent the operator from making program modifications

1 9202

To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.

2 5180

What is the difference between micro computer mini computer&super computer?

Oracle, Satyam,

3 31645

How did you first get interested in Computer Science?

Microsoft,

4 14568

What do you like to do best related to computers now (programming, administration, testing, manage projects, etc)? What is it about that area that you specifically enjoy?

Microsoft,

1 3439

For a single computer processor computer system, what is the purpose of a processor cache and describe its operation?

Intel,

2401

Explain the operation considering a two processor computer system with a cache for each processor.

Intel,

4734

For a single computer processor computer system, what is the purpose of a processor cache and describe its operation?

Intel,

3 11712

Explain the operation considering a two processor computer system with a cache for each processor.

Intel,

2851

In a computer tape library there are two racks with 40 tapes per rack.In a given day 30 tapes are in use . What fraction remains in the rack?

TISL,

6 25897

A man owns 2/3 of a computer service buroue business and sells 3/4 of his share for $75000.What is the value of the business?

TISL,

4 14917

A computer printer produces 176400 lines in a given day. If the printer is in operation for 7 hrs during the day how many lines did it print per minute?

Cap Gemini,

9 18268




Related Topics


Un-Answered Questions { Computer }

what is your experience with computer-aided design software.

2073


How would you compare the computational power of a cortical pyramidal cell with that of a desktop computer?

1942


For a single computer processor computer system, what is the purpose of a processor cache and describe its operation?

2401


Explain the operation considering a two processor computer system with a cache for each processor.

2851


Classify and describe the main functions of computer peripherals?

2793


What was the last computer book you purchased? Why?

2374


What is your favorite all time computer book? Why?

2508


How to detect the CPU type of the computer the application is running on?

1775


How to get a list of CDROM drives on a computer?

1643


How to detect the computer name?

1874


What do you like about computers?

2252


i want computer associates placement papers from u? pls post to me.

2710


How do u check and assign a ipaddress to the computer?

2959


I was attened for H1b in chennai embassy,on nov14th 2005, but its in Admin Query, after few months exactly 364 days i got a personnel interview, in that they said we r sending ur file to INS because u dont have background computers, but in MBA i have computers subject i said, and i too worked in Canada for 1.5 years. Till Now i did't get the status, no response what to do....

2395


why Paradox slow on some computers and not on others ?

1569