Frederick Sanger is a twice recipient of the Nobel Prize for
A. Chemistry in 1958 and 1980
B. Physics in 1956 and 1972
C. Chemistry in 1954 and Peace...
During World War II, when did Germany attack France?
During World War II, when did Germany attack France?
A. 1940
B. 1941
C. 1942
D. 1943
Answer:...
Germany signed the Armistice Treaty on ____ and World War I ended
Germany signed the Armistice Treaty on ____ and World War I ended
A. January 19, 1918
B. May 30, 1918
C. November 11, 1918
D. February 15, 1918
Answer:...
Hermann Scheer (Germany) received right Livelihood Award in 1999 for
Hermann Scheer (Germany) received right Livelihood Award in 1999 for
A. his indefatigable work for thepromotion of solar energy worldwide
B. his...
Guru Gobind Singh was
Guru Gobind Singh was
A. the 10th Guru of the Sikhs
B. founder of Khalsa, the inner council of the Sikhs in 1699
C. author of Dasam Granth
D. All...
Georgia, Uzbekistan and Turkmenistan became the members of UNO in
Georgia, Uzbekistan and Turkmenistan became the members of UNO in
A. 1991
B. 1992
C. 1993
D. 1994
Answer:...
Film and TV institute of India is located at
Film and TV institute of India is located at
A. Pune (Maharashtra)
B. Rajkot (Gujarat)
C. Pimpri (Maharashtra)
D. Perambur (Tamilnadu)
Answer:...
Fire temple is the place of worship of which of the following religion?
Fire temple is the place of worship of which of the following religion?
A. Taoism
B. Judaism
C. Zoroastrianism (Parsi Religion)
D. Shintoism
Answer:...
From the following, choose the set in which names of Secretary-Generals of the UNO are arranged in correct chronological order?
From the following, choose the set in which names of Secretary-Generals of the UNO are arranged in correct chronological order?
A. U Thant, Kurt...
During eleventh Antarctic Expedition in Nov. 1991/March 1992 ____ was installed.
During eleventh Antarctic Expedition in Nov. 1991/March 1992 ____ was installed.
A. SODAR (SOnic Detection And Ranging)
B. Second Permanent Station...
Friction can be reduced by changing from
Friction can be reduced by changing from
A. sliding to rolling
B. rolling to sliding
C. potential energy to kinetic energy
D. dynamic to static
Answer:...
Guwahati High Court is the judicature of
Guwahati High Court is the judicature of
A. Nagaland
B. Arunachal Pradesh
C. Assam
D. All of the above
Answer:...
Gravity setting chambers are used in industries to remove
Gravity setting chambers are used in industries to remove
A. SOx
B. NOx
C. suspended particulate matter
D. CO
Answer:...
Famous sculptures depicting art of love built some time in 950 AD – 1050 AD are
Famous sculptures depicting art of love built some time in 950 AD – 1050 AD are
A. Khajuraho temples
B. Jama Masjid
C. Sun temple
D. Mahabalipuram...
Each year World Red Cross and Red Crescent Day is celebrated on
Each year World Red Cross and Red Crescent Day is celebrated on
A. May 8
B. May 18
C. June 8
D. June 18
Answer:...
Federation Cup, World Cup, Allywyn International Trophy and Challenge Cup are awarded to winners of
Federation Cup, World Cup, Allywyn International Trophy and Challenge Cup are awarded to winners of
A. Tennis
B. Volleyball
C. Basketball
D. Cricket
Answer:...
For the Olympics and World Tournaments, the dimensions of basketball court are
For the Olympics and World Tournaments, the dimensions of basketball court are
A. 26 m x 14 m
B. 28 m x 15 m
C. 27 m x 16 m
D. 28 m x 16 m
Answer:...
Dumping is
Dumping is
A. selling of goods abroad at a price well below the production cost at the home market price
B. the process by which the supply of a...
First China War was fought between
First China War was fought between
A. China and Britain
B. China and France
C. China and Egypt
D. China and Greek
Answer:...
Gulf cooperation council was originally formed by
Gulf cooperation council was originally formed by
A. Bahrain, Kuwait, Oman, Qatar, Saudi Arabia and United Arab Emirates
B. Second World Nations
C....
First Afghan War took place in
First Afghan War took place in
A. 1839
B. 1843
C. 1833
D. 1848
Answer: ...
Guarantee to an exporter that the importer of his goods will pay immediately for the goods ordered by him, is known as
Guarantee to an exporter that the importer of his goods will pay immediately for the goods ordered by him, is known as
A. Letter of Credit (L/C)
B....
Golf player Vijay Singh belongs to which country?
Golf player Vijay Singh belongs to which country?
A. USA
B. Fiji
C. India
D. UK
Answer:...
Exposure to sunlight helps a person improve his health because
Exposure to sunlight helps a person improve his health because
A. the infrared light kills bacteria in the body
B. resistance power increases
C....
Habeas Corpus Act 1679
Habeas Corpus Act 1679
A. states that no one was to be imprisoned without a writ or warrant stating the charge against him
B. provided facilities...
Galileo was an Italian astronomer who
Galileo was an Italian astronomer who
A. developed the telescope
B. discovered four satellites of Jupiter
C. discovered that the movement of pendulum...
First human heart transplant operation conducted by Dr. Christiaan Barnard on Louis Washkansky, was conducted in
First human heart transplant operation conducted by Dr. Christiaan Barnard on Louis Washkansky, was conducted in
A. 1967
B. 1968
C. 1958
D. 1922
Answer:...
Epsom (England) is the place associated with
Epsom (England) is the place associated with
A. Horse racing
B. Polo
C. Shooting
D. Snooker
Answer:...
Fastest shorthand writer was
Fastest shorthand writer was
A. Dr. G. D. Bist
B. J.R.D. Tata
C. J.M. Tagore
D. Khudada Khan
Answer:...
FFC stands for
FFC stands for
A. Foreign Finance Corporation
B. Film Finance Corporation
C. Federation of Football Council
D. None of the above
Answer:...
Hitler party which came into power in 1933 is known as
Hitler party which came into power in 1933 is known as
A. Labour Party
B. Nazi Party
C. Ku-Klux-Klan
D. Democratic Party
Answer:...
For which of the following disciplines is Nobel Prize awarded?
For which of the following disciplines is Nobel Prize awarded?
A. Physics and Chemistry
B. Physiology or Medicine
C. Literature, Peace and Economics
D....
Garampani sanctuary is located at
Garampani sanctuary is located at
A. Junagarh, Gujarat
B. Diphu, Assam
C. Kohima, Nagaland
D. Gangtok, Sikkim
Answer:...
Eritrea, which became the 182nd member of the UN in 1993, is in the continent of
Eritrea, which became the 182nd member of the UN in 1993, is in the continent of
A. Asia
B. Africa
C. Europe
D. Australia
Answer:...
Entomology is the science that studies
Entomology is the science that studies
A. Behavior of human beings
B. Insects
C. The origin and history of technical and scientific terms
D. The...
Grand Central Terminal, Park Avenue, New York is the world's
Grand Central Terminal, Park Avenue, New York is the world's
A. largest railway station
B. highest railway station
C. longest railway station
D. None...
Laboratory results reveal decreased levels of prolactin in a client diagnosed with schizophrenia. When assessing the client, which symptoms should a nurse expect to observe?(Select all that apply.)
Laboratory results reveal decreased levels of prolactin in a client diagnosed with schizophrenia. When assessing the client, which symptoms should a...
A nurse is administering risperidone (Risperdal) to a client diagnosed with schizophrenia. The therapeutic effect of this medication would most effectively address which of the following symptoms? (Select all that apply.)
A nurse is administering risperidone (Risperdal) to a client diagnosed with schizophrenia. The therapeutic effect of this medication would most effectively...
Which of the following components should a nurse recognize as an integral part of a rehabilitative program when planning care for clients diagnosed with schizophrenia? (Select all that apply.)
Which of the following components should a nurse recognize as an integral part of a rehabilitative program when planning care for clients diagnosed...
A newly admitted client has taken thioridazine (Mellaril) for 2 years with good symptom control. Symptoms exhibited on admission included paranoid delusions and hallucinations. The nurse should recognize which potential cause for the return of these symptoms?
A newly admitted client has taken thioridazine (Mellaril) for 2 years with good symptom control. Symptoms exhibited on admission included paranoid delusions...
A client states, "I hear voices that tell me that I am evil." Which outcome related to these symptoms should the nurse expect this client to accomplish by discharge?
A client states, "I hear voices that tell me that I am evil." Which outcome related to these symptoms should the nurse expect this client to accomplish...
A client has been recently admitted to an inpatient psychiatric unit. Which intervention should the nurse plan to use to reduce the client's focus on delusional thinking?
A client has been recently admitted to an inpatient psychiatric unit. Which intervention should the nurse plan to use to reduce the client's focus on...
A college student has quit attending classes, isolates self due to hearing voices, and yells accusations at fellow students. Based on this information, which nursing diagnosis should the nurse prioritize?
A college student has quit attending classes, isolates self due to hearing voices, and yells accusations at fellow students. Based on this information,...
During an admission assessment, a nurse notes that a client diagnosed with schizophrenia has allergies to penicillin, prochlorperazine (Compazine), and bee stings. Based on this assessment data, which antipsychotic medication would be contraindicated?
During an admission assessment, a nurse notes that a client diagnosed with schizophrenia has allergies to penicillin, prochlorperazine (Compazine),...
If clozapine (Clozaril) therapy is being considered, the nurse should evaluate which laboratory test to establish a baseline for comparison in order to recognize a potentially life-threatening side effect?
If clozapine (Clozaril) therapy is being considered, the nurse should evaluate which laboratory test to establish a baseline for comparison in order...
A client diagnosed with schizophrenia is prescribed clozapine (Clozaril). Which client symptoms related to the side effects of this medication should prompt a nurse to intervene immediately?
A client diagnosed with schizophrenia is prescribed clozapine (Clozaril). Which client symptoms related to the side effects of this medication should...
An aging client diagnosed with chronic schizophrenia takes an antipsychotic and a beta-adrenergic blocking agent (propranolol) for hypertension. Understanding the combined side effects of these drugs, which statement by a nurse is most appropriate?
An aging client diagnosed with chronic schizophrenia takes an antipsychotic and a beta-adrenergic blocking agent (propranolol) for hypertension. Understanding...
A client diagnosed with schizophrenia takes an antipsychotic agent daily. Which assessment finding should a nurse immediately report to the client's attending psychiatrist?
A client diagnosed with schizophrenia takes an antipsychotic agent daily. Which assessment finding should a nurse immediately report to the client's...
After taking chlorpromazine (Thorazine) for 1 month, a client presents to an emergency department (ED) with severe muscle rigidity, tachycardia, and a temperature of 105oF (40.5C). The nurse expects the physician to recognize which condition and implement which treatment?
After taking chlorpromazine (Thorazine) for 1 month, a client presents to an emergency department (ED) with severe muscle rigidity, tachycardia, and...
A client diagnosed with chronic schizophrenia presents in an emergency department (ED) with uncontrollable tongue movements, stiff neck, and difficulty swallowing. The nurse would expect the physician to recognize which condition and implement which treatment?
A client diagnosed with chronic schizophrenia presents in an emergency department (ED) with uncontrollable tongue movements, stiff neck, and difficulty...
A nurse is caring for a client who is experiencing a flat affect, paranoid delusions, anhedonia, anergia, neologisms, and echolalia. Which statement correctly differentiates the client's positive and negative symptoms of schizophrenia?
A nurse is caring for a client who is experiencing a flat affect, paranoid delusions, anhedonia, anergia, neologisms, and echolalia. Which statement...
A client is diagnosed with schizophrenia. A physician orders haloperidol (Haldol) 50 mg bid, benztropine (Cogentin) 1 mg prn, and zolpidem (Ambien) 10 mg HS. Which client behavior would warrant the nurse to administer benztropine?
A client is diagnosed with schizophrenia. A physician orders haloperidol (Haldol) 50 mg bid, benztropine (Cogentin) 1 mg prn, and zolpidem (Ambien)...
A client diagnosed with schizophrenia is slow to respond and appears to be listening to unseen others. Which medication should a nurse expect a physician to order to address this type of symptom?
A client diagnosed with schizophrenia is slow to respond and appears to be listening to unseen others. Which medication should a nurse expect a physician...
Which statement should indicate to a nurse that an individual is experiencing a delusion?
Which statement should indicate to a nurse that an individual is experiencing a delusion?
A. "There's an alien growing in my liver."
B. "I see my...
A client diagnosed with paranoid schizophrenia states, "My psychiatrist is out to get me. I'm sad that the voice is telling me to stop him." What symptom is the client exhibiting, and what is the nurse's legal responsibility related to this symptom?
A client diagnosed with paranoid schizophrenia states, "My psychiatrist is out to get me. I'm sad that the voice is telling me to stop him." What symptom...
Which nursing behavior will enhance the establishment of a trusting relationship with a client diagnosed with schizophrenia?
Which nursing behavior will enhance the establishment of a trusting relationship with a client diagnosed with schizophrenia?
A. Establishing personal...
Which nursing intervention would be most appropriate when caring for an acutely agitated client diagnosed with paranoid schizophrenia?
Which nursing intervention would be most appropriate when caring for an acutely agitated client diagnosed with paranoid schizophrenia?
A. Provide...
A client diagnosed with psychosis NOS (not otherwise specified) tells a nurse about voices telling him to kill the president. Which nursing diagnosis should the nurse prioritize for this client?
A client diagnosed with psychosis NOS (not otherwise specified) tells a nurse about voices telling him to kill the president. Which nursing diagnosis...
A client diagnosed with schizophrenia states, "Can't you hear him? It's the devil. He's telling me I'm going to hell." Which is the most appropriate nursing reply?
A client diagnosed with schizophrenia states, "Can't you hear him? It's the devil. He's telling me I'm going to hell." Which is the most appropriate...
During an admission assessment, a nurse asks a client diagnosed with schizophrenia, "Have you ever felt that certain objects or persons have control over your behavior?" The nurse is assessing for which type of thought disruption?
During an admission assessment, a nurse asks a client diagnosed with schizophrenia, "Have you ever felt that certain objects or persons have control...
A client diagnosed with schizophrenia tells a nurse, "The 'Shopatouliens' took my shoes out of my room last night." Which is an appropriate charting entry to describe this client's statement?
A client diagnosed with schizophrenia tells a nurse, "The 'Shopatouliens' took my shoes out of my room last night." Which is an appropriate charting...
A nurse is assessing a client diagnosed with paranoid schizophrenia. The nurse asks the client, "Do you receive special messages from certain sources, such as the television or radio?" Which potential symptom of this disorder is the nurse assessing?
A nurse is assessing a client diagnosed with paranoid schizophrenia. The nurse asks the client, "Do you receive special messages from certain sources,...
Parents ask a nurse how they should reply when their child, diagnosed with paranoid schizophrenia, tells them that voices command him to harm others. Which is the appropriate nursing reply?
Parents ask a nurse how they should reply when their child, diagnosed with paranoid schizophrenia, tells them that voices command him to harm others....
A 16-year-old-client diagnosed with paranoid schizophrenia experiences command hallucinations to harm others. The client's parents ask a nurse, "Where do the voices come from?" Which is the appropriate nursing reply?
A 16-year-old-client diagnosed with paranoid schizophrenia experiences command hallucinations to harm others. The client's parents ask a nurse, "Where...
A client diagnosed with schizoaffective disorder is admitted for social skills training. Which information should be taught by the nurse?
A client diagnosed with schizoaffective disorder is admitted for social skills training. Which information should be taught by the nurse?
A. The...
A paranoid client presents with bizarre behaviors, neologisms, and thought insertion. Which nursing action should be prioritized to maintain this client's safety?
A paranoid client presents with bizarre behaviors, neologisms, and thought insertion. Which nursing action should be prioritized to maintain this client's...
Which of the following does the text suggest is one of the consequences of intense competition in media today?
Which of the following does the text suggest is one of the consequences of intense competition in media today?
a. Reporters are more easily manipulated...
The adversarial nature of the modern press has probably made __________ more socially acceptable.
The adversarial nature of the modern press has probably made __________ more socially acceptable.
a. negative campaign advertising
b. political corruption
c....
The text suggests American government is the "leakiest" in the world, in large part, because of
The text suggests American government is the "leakiest" in the world, in large part, because of
a. the centralized nature of power in the federal...
In an age in which the media are very important, who of the following is best positioned to run for president?
In an age in which the media are very important, who of the following is best positioned to run for president?
a. A House member
b. An innovative...
The president of the United States is unlike the chief executive of other nations with regard to the
The president of the United States is unlike the chief executive of other nations with regard to the
a. hostility with which he is normally treated...
Which of the following presidents first made his press secretary a major instrument for dealing with the press?
Which of the following presidents first made his press secretary a major instrument for dealing with the press?
a. Herbert Hoover
b. Franklin Roosevelt
c....
The first president to engage in the systematic cultivation of news reporters was
The first president to engage in the systematic cultivation of news reporters was
a. Theodore Roosevelt.
b. Franklin Roosevelt.
c. Woodrow Wilson.
d....
The potential impact of the media coverage is certainly well illustrated by the case of Estes Kefauver who, in the 1950s, became a "household name" by
The potential impact of the media coverage is certainly well illustrated by the case of Estes Kefauver who, in the 1950s, became a "household name"...
A study of the top ten newspapers and the Associated Press found news items concerning _______ were more likely to be interpreted in a negative fashion when there was a Republican president.
A study of the top ten newspapers and the Associated Press found news items concerning _______ were more likely to be interpreted in a negative fashion...
Early in American history, newspapers had virtually no _________ stories.
Early in American history, newspapers had virtually no _________ stories.
a. routine
b. feature
c. insider
d. opinion-based
e. editorial-driven
Answer:...
Conservative dominance in talk radio can be best explained by the fact that
Conservative dominance in talk radio can be best explained by the fact that
a. liberal hosts have never had big corporate sponsors.
b. conservatives...
Research suggests members of the national news media are generally more _______ than the average member of the public.
Research suggests members of the national news media are generally more _______ than the average member of the public.
a. conservative
b. alienated
c....
Since the 1980s, studies of media bias have reached the same conclusion, that members of the national press are
Since the 1980s, studies of media bias have reached the same conclusion, that members of the national press are
a. more liberal than the average member...
The text suggests that, if the Fairness Doctrine had stayed in place,
The text suggests that, if the Fairness Doctrine had stayed in place,
a. there would be more competition among radio and television stations.
b....
In general, the Supreme Court has upheld the right of government to compel reporters to divulge information as part of a properly conducted criminal investigation if
In general, the Supreme Court has upheld the right of government to compel reporters to divulge information as part of a properly conducted criminal...
For a public official in the United States to win a libel suit against the press, he or she must prove that
For a public official in the United States to win a libel suit against the press, he or she must prove that
a. what was printed was untrue.
b. the...
Once something is published, a newspaper may be sued or prosecuted if the material
Once something is published, a newspaper may be sued or prosecuted if the material
a. is libelous.
b. is obscene.
c. incites someone to commit an...
An irony concerning government regulation of the news media is that
An irony concerning government regulation of the news media is that
a. American media are less regulated than foreign media despite the greater...
In the late 1980s the "watchdog" function of the media was notable in the case of the frontrunning Democratic presidential nominee, Gary Hart, who was accused of
In the late 1980s the "watchdog" function of the media was notable in the case of the frontrunning Democratic presidential nominee, Gary Hart, who was...
The emphasis the media places on its role as "scorekeeper" might come at the cost of attention to
The emphasis the media places on its role as "scorekeeper" might come at the cost of attention to
a. which candidates are not viable.
b. which candidates...
One of Jimmy Carter's signal achievements in dealing with the press in the 1976 primary campaign was
One of Jimmy Carter's signal achievements in dealing with the press in the 1976 primary campaign was
a. keeping a low profile.
b. taking newsworthy...
Which of the following statements concerning national newspapers is incorrect?
Which of the following statements concerning national newspapers is incorrect?
a. They distribute millions of copies on a daily basis.
b. They are...
Research suggests _____ especially have turned their interests away from political news.
Research suggests _____ especially have turned their interests away from political news.
a. those living in rural America
b. religious persons
c....
Joint Operating Agreements are important to consider when assessing the competition and diversity of viewpoint among newspapers because they
Joint Operating Agreements are important to consider when assessing the competition and diversity of viewpoint among newspapers because they
a. encourage...
Politicians wishing to make news are well advised to criticize
Politicians wishing to make news are well advised to criticize
a. the president.
b. Congress
c. the Supreme Court.
d. the federal bureaucracy.
e....
In 2000, the average sound bite of a presidential contender was _________ the average sound bite of such contenders in 1968.
In 2000, the average sound bite of a presidential contender was _________ the average sound bite of such contenders in 1968.
a. considerably longer...
The invention of radio was a politically important media development because it
The invention of radio was a politically important media development because it
a. allowed public officials to reach the public in a less-filtered...
Which of the following was not among the achievements of the mass-based press, exemplified by Hearst and Pulitzer?
Which of the following was not among the achievements of the mass-based press, exemplified by Hearst and Pulitzer?
a. Instituting responsible and...
Which of the following was a milestone in the development of a reasonably nonpartisan and unbiased press?
Which of the following was a milestone in the development of a reasonably nonpartisan and unbiased press?
a. The establishment of the Gazette of the...
Politicians have become more heavily dependent on the media as
Politicians have become more heavily dependent on the media as
a. the public has become better educated.
b. the federal bureaucracy has enlarged itself.
c....
When CBS News ran a story claiming President Bush performed poorly during his time in the National Guard, _________ produced evidenced that the documents underlying the report were forgeries.
When CBS News ran a story claiming President Bush performed poorly during his time in the National Guard, _________ produced evidenced that the documents...
The key to shutting down an xterm window is to know which of your programs is the
The key to shutting down an xterm window is to know which of your programs is the
a. controlling program.
b. exiting program.
c. executing program.
d....
Which UNIX command from the menu bar moves a window to the bottom of the stack of windows?
Which UNIX command from the menu bar moves a window to the bottom of the stack of windows?
a. Resize.
b. Move.
c. Lower.
d. Restore.
Answer:...
What action puts unneeded windows out of the way without quitting the program inside them?
What action puts unneeded windows out of the way without quitting the program inside them?
a. Iconifying.
b. Previewing.
c. Paging.
d. Desktop management.
Answer:...
The act of choosing the window you type is called setting the
The act of choosing the window you type is called setting the
a. active window.
b. input focus.
c. x window.
d. window manager.
Answer:...
Which UNIX default command starts the X windows system?
Which UNIX default command starts the X windows system?
a. xwnds.
b. xstart.
c. xinit.
d. x.
Answer: ...
What is the most common UNIX windows system?
What is the most common UNIX windows system?
a. U windows.
b. X windows.
c. UX windows.
d. UZ windows.
Answer: ...
In UNIX, which package of programs lets a terminal handle many sessions at once?
In UNIX, which package of programs lets a terminal handle many sessions at once?
a. UNIX™ windows system.
b. Multi-user manager.
c. Multi-session...
While using UNIX vi to edit a file, what would you enter to save the buffer contents and stay in same file?
While using UNIX vi to edit a file, what would you enter to save the buffer contents and stay in same file?
a. w.
b. w!.
c. wq.
d. !.
Answer:...
Which UNIX vi character represents the end of the file?
Which UNIX vi character represents the end of the file?
a. *.
b. &.
c. ?.
d. $.
Answer: ...
Which UNIX vi mode allows users to execute set commands?
Which UNIX vi mode allows users to execute set commands?
a. Edit.
b. Text input.
c. Command.
d. Append.
Answer: ...
How many primary groups can a user be a member of?
How many primary groups can a user be a member of?
a. One.
b. Two.
c. Three.
d. Four.
Answer: ...
Which UNIX command sets access and modification times for each file to the current time?
Which UNIX command sets access and modification times for each file to the current time?
a. chgrp.
b. chown.
c. touch.
d. finger.
Answer:...
Which UNIX command changes the ownership of one or more files to a new owner?
Which UNIX command changes the ownership of one or more files to a new owner?
a. chgrp.
b. chown.
c. whodo.
d. finger.
Answer:...
Which UNIX command changes the group ownership of one or more files?
Which UNIX command changes the group ownership of one or more files?
a. chgrp.
b. chown.
c. whodo.
d. finger.
Answer: ...
Which UNIX command looks at an individual file and finds a specified pattern (string)?
Which UNIX command looks at an individual file and finds a specified pattern (string)?
a. grep.
b. find.
c. crypt.
d. group.
Answer: ...
Which UNIX command deletes files from within a directory?
Which UNIX command deletes files from within a directory?
a. lm.
b. rm.
c. pr.
d. ps.
Answer: ...
Which UNIX command takes any characters from standard input and then echoes them to standard output?
Which UNIX command takes any characters from standard input and then echoes them to standard output?
a. cat.
b. mkdir.
c. pwd.
d. pwf.
Answer:...
Which UNIX command allows you to move to different directories within a file system using absolute or relative pathnames?
Which UNIX command allows you to move to different directories within a file system using absolute or relative pathnames?
a. ls.
b. cd.
c. pwf.
d....
Which UNIX command displays the current working directory?
Which UNIX command displays the current working directory?
a. ls.
b. ls-s.
c. pwf.
d. pwd.
Answer: ...
Which UNIX mechanism provides for communication with system device drivers through the file system one character at a time?
Which UNIX mechanism provides for communication with system device drivers through the file system one character at a time?
a. Named pipes.
b. Character...
Which UNIX mechanism enables programs to communicate with one another through the file system?
Which UNIX mechanism enables programs to communicate with one another through the file system?
a. Named pipes.
b. Character devices.
c. Block devices.
d....
Hard links are created using which UNIX command?
Hard links are created using which UNIX command?
a. cd.
b. hd.
c. lm.
d. ln.
Answer: ...
What is the basic unit for storing and manipulating a collection of logically related information known as data?
What is the basic unit for storing and manipulating a collection of logically related information known as data?
a. Directories.
b. Partitions.
c....
What does the 7 in the device name c0t6d0s7 represent?
What does the 7 in the device name c0t6d0s7 represent?
a. Bus target number.
b. Drive number.
c. Controller.
d. Partition.
Answer: ...
What does the 0 following the c in the device name c0t6d0s7 represent?
What does the 0 following the c in the device name c0t6d0s7 represent?
a. Controller.
b. Partition.
c. Drive number.
d. Bus target number.
Answer:...
UNIX™ disks are divided into logical sections called
UNIX™ disks are divided into logical sections called
a. sectors.
b. sections.
c. reams.
d. partitions.
Answer: ...
The /dev/dsk and /dev/rdsk directories are subdirectories of which directory?
The /dev/dsk and /dev/rdsk directories are subdirectories of which directory?
a. Root.
b. System.
c. Device.
d. Home.
Answer: ...
How many characters do most UNIX system administrators and users tend to use for filenames?
How many characters do most UNIX system administrators and users tend to use for filenames?
a. 10.
b. 12.
c. 14.
d. 16.
Answer: ...
What do you type to quit a UNIX shell?
What do you type to quit a UNIX shell?
a. Exit.
b. Quit.
c. X.
d. Xit.
Answer: ...
The simplest place to put your function definitions is in your
The simplest place to put your function definitions is in your
a. function.
b. dev.
c. definition.
d. profile.
Answer: ...
To change permissions on a shell script, you use the UNIX command
To change permissions on a shell script, you use the UNIX command
a. chown.
b. chgrp.
c. chmod.
d. chper.
Answer: ...
Normally, when you create a file with a text editor, the file is set up with
Normally, when you create a file with a text editor, the file is set up with
a. read and write permission for you and read-only permission for others.
b....
Which UNIX shell is the most compact and is often used for writing shell scripts?
Which UNIX shell is the most compact and is often used for writing shell scripts?
a. C shell.
b. Bourne shell.
c. Korn shell.
d. D shell.
Answer:...
Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data?
Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data?
a. File system.
b. VI editor.
c. Kernel.
d....
Which UNIX operating system component interacts directly with the system hardware?
Which UNIX operating system component interacts directly with the system hardware?
a. File system.
b. VI editor.
c. Kernel.
d. Shell.
Answer:...
Which UNIX ability can run on different types of hardware with few relatively minor changes?
Which UNIX ability can run on different types of hardware with few relatively minor changes?
a. Portability.
b. Flexibility.
c. Simplicity.
d. Base...
Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity?
Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity?
a. Buffers.
b. Concurrency.
c. Locking.
d....
Which is the most commonly used sequential query language (SQL) data statement?
Which is the most commonly used sequential query language (SQL) data statement?
a. Commit.
b. Select.
c. Where.
d. Update.
Answer: ...
Which UNIX capability can execute numerous programs at the same time?
Which UNIX capability can execute numerous programs at the same time?
a. Multi-user.
b. Multiprocessing.
c. Time sharing.
d. Multitasking.
Answer:...
What is the most common type of operation in sequential query language (SQL)?
What is the most common type of operation in sequential query language (SQL)?
a. Clauses.
b. Expressions.
c. Queries.
d. Statements.
Answer:...
What type of sequential query language (SQL) statement would you use to make the changes you were working on permanent?
What type of sequential query language (SQL) statement would you use to make the changes you were working on permanent?
a. Data.
b. Query.
c. Schema.
d....
A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a
A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called...
Which type of lists uses pointers to connect each element together?
Which type of lists uses pointers to connect each element together?
a. Derived.
b. Linked.
c. Ordered.
d. Sequential.
Answer: ...
Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down?
Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down?
a. Mailbox service.
b....
In Exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information?
In Exchange System Manager, which container holds configuration objects such as Queues, Mailbox stores and Public Folder stores and protocols information?
a....
When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned?
When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned?
a. Global group...
A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called
A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called
a....
What defines the rules by which operations can be performed on a particular resource?
What defines the rules by which operations can be performed on a particular resource?
a. Rights.
b. Permissions.
c. Access control lists.
d. Hardware...
What permission always overrides all other permissions assigned to a user or group to which the user belongs?
What permission always overrides all other permissions assigned to a user or group to which the user belongs?
a. Full control.
b. No access.
c. Change.
d....
Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer?
Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer?
a....
Which type of group manages user's rights assignments and access permissions?
Which type of group manages user's rights assignments and access permissions?
a. Universal.
b. Distribution.
c. Security.
d. Access.
Answer:...
What component of windows unifies and simplifies day to day system management tasks?
What component of windows unifies and simplifies day to day system management tasks?
a. Domain name service (DNS).
b. Internet information services...
Which is not a component of Internet information services (IIS)?
Which is not a component of Internet information services (IIS)?
a. FTP server.
b. Internet services manager.
c. Simple mail transport protocol (SMTP).
d....
What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location?
What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location?
a....
According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them?
According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to...
What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have?
What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have?
a. One.
b. Two.
c. Three.
d. Five.
Answer:...
The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a
The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a
a. pool.
b. range.
c. scope.
d. zone.
Answer:...
Which software program manages an IP address allocation for a network?
Which software program manages an IP address allocation for a network?
a. Dynamic host configuration protocol (DHCP).
b. Domain name service (DNS).
c....
Which query is made by one name server to another name server?
Which query is made by one name server to another name server?
a. Dynamic host configuration protocol (DHCP) query.
b. Domain name service (DNS)...
Which components of domain name service (DNS) contain a database of associated names and IP addresses?
Which components of domain name service (DNS) contain a database of associated names and IP addresses?
a. Name servers.
b. Resolvers.
c. Resource...
Which type of patch would utilize a remote installation services (RIS)?
Which type of patch would utilize a remote installation services (RIS)?
a. Automatic.
b. Local.
c. Manual.
d. Unattended.
Answer: ...
Sitting at a computer and loading a software patch onto it is an example of what type of software patch?
Sitting at a computer and loading a software patch onto it is an example of what type of software patch?
a. Automatic.
b. Attended.
c. Unattended.
Answer:...
Which of the following is not one of the elements that most graphical user interfaces are composed of?
Which of the following is not one of the elements that most graphical user interfaces are composed of?
a. Windows.
b. Icons.
c. Menus.
d. Programs.
Answer:...
Which type of interface is friendlier for the average user to use?
Which type of interface is friendlier for the average user to use?
a. Command line interface.
b. Graphical user interface.
c. Menu driven interface.
d....
What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user?
What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user?
a. Access control lists.
b....
What kind of server contains the master listing of all active directory objects in the forest?
What kind of server contains the master listing of all active directory objects in the forest?
a. Dynamic host configuration protocol (DHCP).
b. Domain...
Where does a copy of the active directory database reside?
Where does a copy of the active directory database reside?
a. Dynamic host configuration protocol (DHCP) servers.
b. Domain name service (DNS) servers.
c....
What is a group of users, servers, and other resources that share a centralized database of account and security information?
What is a group of users, servers, and other resources that share a centralized database of account and security information?
a. Domain.
b. Forest.
c....
What is based around a central directory database containing information about all the domain controllers in the network?
What is based around a central directory database containing information about all the domain controllers in the network?
a. Active directory.
b....
Which type of backup will backup all files that have been altered in the last 24 hours?
Which type of backup will backup all files that have been altered in the last 24 hours?
a. Daily.
b. Normal.
c. Incremental.
d. Differential.
Answer:...
Which type of backup would you use at the end of the week to save all data that you select on your systems?
Which type of backup would you use at the end of the week to save all data that you select on your systems?
a. Incremental.
b. Differential.
c. Daily.
d....
What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?
What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?
a....
Which numbering system characteristic is the leftmost non-zero digit of a numeric value?
Which numbering system characteristic is the leftmost non-zero digit of a numeric value?
a. Least significant digit (LSD).
b. Most significant digit...
Which error-checking tool allows you to monitor the file system for errors?
Which error-checking tool allows you to monitor the file system for errors?
a. Check disk.
b. Disk quotas.
c. Task scheduler.
d. Disk defragmenter.
Answer:...
Which program can be used to automatically launch programs on a preset schedule?
Which program can be used to automatically launch programs on a preset schedule?
a. Check disk.
b. Disk quotas.
c. Disk defragmenter.
d. Task scheduler.
Answer:...
Which protocol is commonly used for managing the security of a message transmission on the Internet?
Which protocol is commonly used for managing the security of a message transmission on the Internet?
a. Secure socket layer (SSL).
b. Public key...
A standard Web application used to pass a Web user's request to a server's application program and to exchange data back to the user is called a
A standard Web application used to pass a Web user's request to a server's application program and to exchange data back to the user is called a
a....
Which Web application is most likely to succeed Hypertext Markup Language (HTML)?
Which Web application is most likely to succeed Hypertext Markup Language (HTML)?
a. Dynamic HTML (DHTML).
b. Extensible Markup Language (XML).
c....
Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
a. Standard Generalized Markup...
What best describes programming machine code?
What best describes programming machine code?
a. Another term for firmware.
b. Statements that correspond to complex actions.
c. Instructions in a...
Which is not a characteristic of high-order languages?
Which is not a characteristic of high-order languages?
a. They are nearly self-documenting.
b. They use English-like statements.
c. Source codes that...
Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?
Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?
a. Small computer system interface...
The hard drives in a redundant array of independent disks (RAID) array are presented to the server as
The hard drives in a redundant array of independent disks (RAID) array are presented to the server as
a. one single hard drive.
b. a collection of...
Which storage device has the means of providing data storage reliability using multiple hard drives?
Which storage device has the means of providing data storage reliability using multiple hard drives?
a. Storage area network (SAN).
b. Network attached...
Which storage device can be easily connected to a network and appears as a network drive?
Which storage device can be easily connected to a network and appears as a network drive?
a. Storage area network (SAN).
b. Redundant array of independent...
What is the connection type of choice for storage area networks (SAN)?
What is the connection type of choice for storage area networks (SAN)?
a. Fibre channel.
b. ATA over Ethernet (AoE).
c. Small computer system interface...
What is an advantage of using a storage area network (SAN) architecture?
What is an advantage of using a storage area network (SAN) architecture?
a. Ease of replacing the hard drive.
b. Ease of replacing network connectivity.
c....
What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?
What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?
a. Network attached storage...
Which is a very simple example of an error detecting code?
Which is a very simple example of an error detecting code?
a. Interrupt.
b. Parity bit.
c. Asynchronous.
d. Data integrity.
Answer: ...
What is considered as a technique or method of checking data integrity?
What is considered as a technique or method of checking data integrity?
a. Fault.
b. Parity.
c. Interrupt.
d. Asynchronous
Answer: ...
Which is a term used to describe that data is whole or complete?
Which is a term used to describe that data is whole or complete?
a. Driver.
b. Parity bit.
c. Data integrity.
d. Error correction.
Answer:...
Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
a. 2.
b. 4.
c. 6.
d. 8.
Answer: ...
Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?
Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?
a. Disk...
What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?
What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or...
What is a form of firmware that contains the computer's startup instructions?
What is a form of firmware that contains the computer's startup instructions?
a. Cache.
b. Basic input/output system (BIOS).
c. Complementary metal-oxide...
What is considered as nonvolatile permanent memory?
What is considered as nonvolatile permanent memory?
a. Read only memory (ROM).
b. Basic input/output system (BIOS).
c. Complementary metal-oxide semiconductor...
What is considered to be a computer's main storage?
What is considered to be a computer's main storage?
a. Random access memory (RAM).
b. Read only memory (ROM).
c. Basic input/output system (BIOS).
d....
Which original components were very susceptible to damage from electrostatic discharge?
Which original components were very susceptible to damage from electrostatic discharge?
a. Read only memory (ROM).
b. Basic input/output system (BIOS).
c....
What program is known as a state of the art ground-to-ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base?
What program is known as a state of the art ground-to-ground communications infrastructure designed to provide base level full spectrum communications...
Who provides uninterrupted flow of mission critical information to field and in-garrison units for the duration of a contingency?
Who provides uninterrupted flow of mission critical information to field and in-garrison units for the duration of a contingency?
a. Open system...
Sustained communications support becomes a part of the deployment if it exceeds
Sustained communications support becomes a part of the deployment if it exceeds
a. 15 days.
b. 30 days.
c. 45 days.
d. 90 days.
Answer: ...
Which team provides a communication link between forces securing the area and setting up support facilities?
Which team provides a communication link between forces securing the area and setting up support facilities?
a. Open system standards teams.
b. Combat...
What is the primary unclassified public key infrastructure (PKI) token for individual PKI keys and certificates in the Air Force?
What is the primary unclassified public key infrastructure (PKI) token for individual PKI keys and certificates in the Air Force?
a. Hardware token.
b....
Which public key algorithm is exclusively a key establishment protocol?
Which public key algorithm is exclusively a key establishment protocol?
a. Rivest-Shamir-Adleman (RSA).
b. Diffie and Hellman.
c. Elliptic curve...
The two ways key establishment can occur are key
The two ways key establishment can occur are key
a. transfer and agreement.
b. transfer and interchange.
c. generation and agreement.
d. generation...
Which component of the public key infrastructure (PKI) is responsible for establishing, authenticating, maintaining, and revoking certificates?
Which component of the public key infrastructure (PKI) is responsible for establishing, authenticating, maintaining, and revoking certificates?
a....
What is an electronic document that officially links together a user's identity with his public key?
What is an electronic document that officially links together a user's identity with his public key?
a. Token.
b. Public key.
c. Private key.
d. Public...
What is a file that is kept with you and will allow you to decrypt files encrypted specifically for you using your openly available encryption code?
What is a file that is kept with you and will allow you to decrypt files encrypted specifically for you using your openly available encryption code?
a....
What can be used to encrypt a message so that it can only be decrypted by the recipient?
What can be used to encrypt a message so that it can only be decrypted by the recipient?
a. Token.
b. Public key.
c. Private key.
d. Public key...
What is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information between relative strangers?
What is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information...
What type of malicious logic can become active on an information system without the need to infect a file?
What type of malicious logic can become active on an information system without the need to infect a file?
a. Virus.
b. Trojan horse.
c. Worm.
d....
What type of malicious logic can form large networks that can be used to launch a variety of attacks without an information system owner's knowledge?
What type of malicious logic can form large networks that can be used to launch a variety of attacks without an information system owner's knowledge?
a....
A program that replicates by attaching itself to a program is a
A program that replicates by attaching itself to a program is a
a. virus.
b. Trojan horse.
c. worm.
d. Bot.
Answer: ...
An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a
An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a
a. threat.
b....
What do you call a current and perceived capability, intention, or attack, directed to cause denial of service?
What do you call a current and perceived capability, intention, or attack, directed to cause denial of service?
a. Vulnerability.
b. Threat.
c. Compromise.
d....
What action represents one of the greatest vulnerabilities to internal networks?
What action represents one of the greatest vulnerabilities to internal networks?
a. Personnel that continue to misuse the network by surfing the web.
b....
What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations?
What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations?
a. Network management software.
b....
What type of firewall generates audit trails of all network-related activity for monitoring and intrusion detection purposes?
What type of firewall generates audit trails of all network-related activity for monitoring and intrusion detection purposes?
a. Intrusion detection.
b....
What type of firewall is used to separate secure sites, networks, or network segments from less secure areas?
What type of firewall is used to separate secure sites, networks, or network segments from less secure areas?
a. Proxy.
b. Bastion host.
c. Packet...
What type of firewall consists of a screening router and a set of rules that accept or reject a message based on information in the message's header (a packet): the source address, the destination address, and the port?
What type of firewall consists of a screening router and a set of rules that accept or reject a message based on information in the message's header...
What is the simplest and least expensive way to stop inappropriate network addresses?
What is the simplest and least expensive way to stop inappropriate network addresses?
a. Proxy.
b. Bastion host.
c. Packet filtering.
d. Intrusion...
A base web-server that interfaces with the public must be placed in what area of a base network?
A base web-server that interfaces with the public must be placed in what area of a base network?
a. At the core.
b. None are allowed.
c. Outside the...
What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall?
What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the...
What are examples of network attacks that bypass the firewall?
What are examples of network attacks that bypass the firewall?
a. Identification spoofing and tunneling.
b. Tunneling and application-based attacks.
c....
What device is placed outside the boundary protection mechanism to monitor all attempted attacks?
What device is placed outside the boundary protection mechanism to monitor all attempted attacks?
a. Intrusion detection system (IDS).
b. De-militarized...
Which agency must approve all information protection tools prior to their use?
Which agency must approve all information protection tools prior to their use?
a. Defense Information System Agency (DISA).
b. Air Force Communication...
How many non-secure internet protocol router network (NIPRNet) gateways does the Air Force possess?
How many non-secure internet protocol router network (NIPRNet) gateways does the Air Force possess?
a. 15.
b. 16.
c. 32.
d. 36.
Answer: ...
What is a collection of computing environments connected by one or more internal networks under the control of a single approval authority and security policy?
What is a collection of computing environments connected by one or more internal networks under the control of a single approval authority and security...
What is the database of record for registering all systems and applications?
What is the database of record for registering all systems and applications?
a. Security, interoperability, supportability, sustainability, and usability...
Subscribe to:
Posts (Atom)