Search
Questions in physics
📝 Answered - An object is placed 10 cm from a concave mirror with a focal length of 9 cm. Find the distance of the image from the mirror and the magnification of the object.
📝 Answered - What would be the best data center site for the Project Falcon team? Question 11 Select one: a. A location that has good sightlines to satellites for high-speed internet connections b. A remote location in a geologically stable area where the probability of a significant disruption is less c. A location in a jurisdiction that is willing to offer tax subsidies to compensate for lack of labor and other infrastructure d. A location in a politically stable jurisdiction with good access to skilled labor, transportation systems and a strong internet backbone If we need to design an SQL structure to eliminate a table that has been created and is not needed anymore, which of the following clauses should we include in the command syntax? Question 12 Select one: a. DROP TABLE tablename b. ERASE TABLE tablename c. DELETE TABLE tablename d. REMOVE TABLE tablename To address security concerns, the Project Falcon team has decided to use Secure Socket Layer (SSL). Why is it the most appropriate tool to address these concerns? Question 13 Select one: a. SSL uses both public key encryption and private key encryption b. SSL uses private key encryption alone because public key encryption is too slow c. SSL incorporates its own encryption scheme which is outside of public key and private key d. SSL uses public key encryption only because there is not a practical way to get a private key involved When implementing subject-object security to mitigate against security threats, which of the following is correct? Question 14 Select one: a. The subject and object are interchangeable, and their roles can switch depending on the situation b. The subject is the data/resource being accessed, and the object is the person/system accessing it c. Subject-object security does not apply to digital systems and is only relevant in physical security scenarios d. The subject is the person/system accessing the object, and the object is the data/resource being accessed Which type of user authorization on a relation allows a user to modify any tuple in the relation? Question 15 Select one: a. Grant authorization b. Select authorization c. Define authorization d. Update authorization In developing both internet and non-internet databases, which of the following represent major differences that the Project Falcon team will need to be aware of? Question 16 Select one: a. Control issues, reduced data types, and connectivity issues b. Connectivity issues, control issues, and extraction into XML c. Extraction into SQL, expanded data types, and control issues d. Expanded data types, extraction into HTML, and connectivity issues Which of the following security criteria is most effectively addressed by an authentication system? Question 17 Select one: a. Ensuring that data are available b. Verifying that a given modification is valid c. Ensuring that data integrity is not compromised d. Verifying the identity of the user requesting access The DBA on the project described in the case will be asked to make a recommendation on selecting a DBMS vendor that is cost effective. Which of the following factors would you include when calculating the cost of owning a DBMS? Question 18 Select one: a. The cost of the managers supporting the decision support system b. The license cost of any required network support software and systems c. The cost of the network administrators to manage the communications system d. The cost of the database professionals to program, support, and administer the DBMS Which of the following SQL symbols should be used in a query statement when we want to represent all of the columns in a single table? Question 19 Select one: a. # (pound) b. * (asterisk) c. % (percent) d. ? (question mark) Sometimes staff change roles and gain new permissions without eliminating outdated and unneeded privileges. Which of the following methods addresses this? Question 20 Select one: a. Pass the hash b. Permissions creep c. Role-based access d. Principle of least privilege
📝 Answered - The force of gravity on an object varies directly with its mass. The constant of variation due to gravity is 32.2 feet per second squared. Which equation represents [tex]$F$[/tex], the force on an object due to gravity according to [tex]$m$[/tex], the object's mass? [tex]$F=16.1 m$[/tex] [tex]$F=\frac{16.1}{m^2}$[/tex] [tex]$F=32.2 m$[/tex] [tex]$F=\frac{32.2}{m^2}$[/tex]
📝 Answered - An electric device delivers a current of [tex]$15.0 A$[/tex] for 30 seconds. How many electrons flow through it?
📝 Answered - Give reasons for the following: 1. After you have bathed with hot water in winter, you find droplets of water on the bathroom mirror. 2. Clothes dry faster in summer than in winter. 3. Sheena wanted to drink chilled juice, so she kept the juice in the freezer. After a few hours, she found it was impossible to drink. 4. The pond near Payal's house dries up during the summer.
📝 Answered - A soldier throws a grenade with speed 20 m/s at 37° above horizontal. How far does it land? (g = 10 m/s²) A. 35.3 m B. 25.6 m C. 40 m D. 20 m
📝 Answered - Where could convection currents form? A. in a sand dune B. on a pavement C. in the atmosphere D. in outer space
📝 Answered - Given the cross-sectional areas of the small and large pistons in a hydraulic lift (0.25 m² and 5 m², respectively) and the mass of a car (1200 kg), calculate the force required to lift the car using Pascal's law.
📝 Answered - A particle moves 4√2 m in South-West direction, 12 m in upward direction and then 1 m in East direction. Find the net displacement. A) 13 m B) 17 m C) 14 m D) 18 m
📝 Answered - If a body of mass 4 kg is lifted to a height of 10 m and then released, what will be the velocity of the body when it strikes the ground? Options: 1. 10 m/s 2. 20 m/s 3. 14 m/s 4. 28 m/s
« Prev
1
...
26
27
28
29
30
...
204
Next »