Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Topic :: Computer





Computer Interview Questions
Questions Answers Views Company eMail

To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.

1 4591

A hacker could obtain passwords without the use of computer tools or programs through the technique of: A. social engineering. B. sniffers. C. backdoors. D. trojan horses.

1 11197

When auditing the proposed acquisition of a new computer system, the IS auditor should FIRST establish that: A. a clear business case has been approved by management. B. corporate security standards will be met. C. users will be involved in the implementation plan. D. the new system will meet all required user functionality.

2 9531

In a small organization, an employee performs computer operations and, when the situation demands, program modifications. Which of the following should the IS auditor recommend? A. Automated logging of changes to development libraries B. Additional staff to provide separation of duties C. Procedures that verify that only approved program changes are implemented D. Access controls to prevent the operator from making program modifications

1 9054

To prevent an organization's computer systems from becoming part of a distributed denial-of-service attack, IP packets containing addresses that are listed as unroutable can be isolated by: A. establishing outbound traffic filtering. B. enabling broadcast blocking. C. limiting allowable services. D. network performance monitoring.

2 5037

What is the difference between micro computer mini computer&super computer?

Oracle, Satyam,

3 31496

How did you first get interested in Computer Science?

Microsoft,

4 14374

What do you like to do best related to computers now (programming, administration, testing, manage projects, etc)? What is it about that area that you specifically enjoy?

Microsoft,

1 3348

For a single computer processor computer system, what is the purpose of a processor cache and describe its operation?

Intel,

2352

Explain the operation considering a two processor computer system with a cache for each processor.

Intel,

4698

For a single computer processor computer system, what is the purpose of a processor cache and describe its operation?

Intel,

3 11532

Explain the operation considering a two processor computer system with a cache for each processor.

Intel,

2813

In a computer tape library there are two racks with 40 tapes per rack.In a given day 30 tapes are in use . What fraction remains in the rack?

TISL,

6 25606

A man owns 2/3 of a computer service buroue business and sells 3/4 of his share for $75000.What is the value of the business?

TISL,

4 14738

A computer printer produces 176400 lines in a given day. If the printer is in operation for 7 hrs during the day how many lines did it print per minute?

Cap Gemini,

9 17921




Related Topics


Un-Answered Questions { Computer }

what is your experience with computer-aided design software.

1975


How would you compare the computational power of a cortical pyramidal cell with that of a desktop computer?

1899


For a single computer processor computer system, what is the purpose of a processor cache and describe its operation?

2352


Explain the operation considering a two processor computer system with a cache for each processor.

2813


Classify and describe the main functions of computer peripherals?

2751


What was the last computer book you purchased? Why?

2316


What is your favorite all time computer book? Why?

2455


How to detect the CPU type of the computer the application is running on?

1717


How to get a list of CDROM drives on a computer?

1586


How to detect the computer name?

1830


What do you like about computers?

2200


i want computer associates placement papers from u? pls post to me.

2642


How do u check and assign a ipaddress to the computer?

2890


I was attened for H1b in chennai embassy,on nov14th 2005, but its in Admin Query, after few months exactly 364 days i got a personnel interview, in that they said we r sending ur file to INS because u dont have background computers, but in MBA i have computers subject i said, and i too worked in Canada for 1.5 years. Till Now i did't get the status, no response what to do....

2351


why Paradox slow on some computers and not on others ?

1500