Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

This part consists of 10 questions carrying a WElGHT OF 2 marks for each. Answer the questions by choosing the most correct choice. You should

image text in transcribed
This part consists of 10 questions carrying a WElGHT OF 2 marks for each. Answer the questions by choosing the most correct choice. You should dedicate approximately 15 minutes for this part. 1- What is the output of the following Python statement? print (6+15/5%3) a. 13.5 c. 6 . b. 7 d. 21.0. 2. To open and read text file that is named StudentRec.txt that exists in folder D:ipython.Which of the following statements is the easiest way to read this file. given that the Python program is located under the same folder: a. file = open('StudentRec.txt', 'r') b. file = c. file = open('Studentinfo.txt') open('D:llpythonllStudentRec.txt', ' r ') d. file = open('D:lpythonlStudentRec.txt', 'r') 3. The term CIA from the course context stands for: a. Central Intelligence Agency. c. Confidentiality, Integration, Availability. b. Certified internal Availability. 4- The best definition of Geocoding is : a. The ways in which location can be determined b. The encoding of location information, such as an address, into a geolocation. c. The process of identifying a location in human terms from a geolocation d. Identifying a location as geographically based according to a known coordinate system 5- Which of the following statements is correct? a. It is not possible for someone to alter the timestamp of a file. b. Gyroscopes are used to measure how quickly an object rotates. c. NFC offers protection against eavesdropping. d. Authorization is the process of proving your identification. 6. Which of the following is not a Cloud computing characteristic? a. Scalability c. Broad network access b. On-demand self-service d. Vulnerability 7. Which of the below statements is a feature of the Random-Access Memory? a. It is volatile c. Accessing any location in RAM takes the b. It is non-volatile same amount of time. d. Both a and c. 8- Hashing cannot: a. confirm that data has never been c. authenticate the creator or sender of data. changed. d. all the given. b. guarantee the confidentiality of data. 9. Which of the following statements is incorrect? a. In Python, Lists are written as comma-separated items within squared brackets. b. Compilers translate all the source code in one go. c. The operating system is not responsible for the management of memory. d. Key stretching increases the required time amount for even the fastest CPUs to create a hash. 10-Which of the following is an example of Infrastructure as a Service, laaS? a. Providing customers with a web-based e-mail service b. Providing an environment in which the customers' applications can be run c. Providing customers with access to virtual machines. d. None of the given choices

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Build It For The Real World A Database Workbook

Authors: Wilson, Susan, Hoferek, Mary J.

1st Edition

0073197599, 9780073197593

More Books

Students explore these related Databases questions