solve the questions.
QUESTION 1 Which of the following is a type of malware intentionally inserted into a software system that will set off a malicious function when specified conditions are met? Spyware Worm Trojan O Logic bomb QUESTION 2 In loT systems, application layer interacts directly with the wired link front user sensors end user QUESTION 3 What is IIoT? O None of the answers Information Internet of Things Innovative Internet of Things O Industrial Internet of Things
QUESTION 4 Which of the following would NOT be considered a major Internet hardware server company? Dell HP/Compaq Sybase IBM QUESTION 5 Online storage can alleviate the need for physical backups passwords Internet access virus protection QUESTION 6 Which of the following terms is different from others? Mask R-CNN YOLO R-CNN TensorFlow
QUESTION 7 What is the key difference between Supervised and unsupervised Machine Learning? The Unsupervised could represent most of the real-world applications data training whereas the Supervised method could not All the answers The labeled data is used in training the Supervised learning algorithms but not in the Unsupervised learning algorithms The Supervised is trained by human whereas the Unsupervised could do the training by itself QUESTION 8 An application service provider: manages combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. uses centrally managed facilities to host and manage access to package applications delivered over networks on a subscription basis. provides only usage-based pricing during a specified time period. supplies online access over networks to storage devices and storage area network technology QUESTION 9 Which of these storage devices can hold the most data? Hard drive RAM DVD Flash drive
QUESTION 10 Which type of memory has the least storage capability? Secondary storage Cache Primary storage O RAM QUESTION 11 Cloud storage is available to which of the following users? All of the answers are correct O Home users Large businesses O Small businesses QUESTION 12 A linear memory model has: Resource protection and paging schemes Fast execution Special features for multitasking None of the answers QUESTION 13 Data in network layer is transferred in the form of Bits O Packets O Layers O Bytes
QUESTION 14 Which is a suite of communications protocols and a common addressing scheme that enables millions of computers to connect together in one giant global network? O COBOL OTCP/IP O UNIX Turbolinux QUESTION 15 A network that contains one or more host computers that provide some type of service to the other computers in a network is a: O local area network peer-to-peer network. O client/server network. O wide area network. QUESTION 16 Which of the following domains is used for-profit businesses? .net .edu o .com O ore QUESTION 17 Transport layer can identify the symptoms of overload nodes using Traffic control Data integrity Byte orientation O Flow control
Solved
LINUX
1 Answer
Tarek Shohdy
Login to view answer.