QUES: The biggest change in this year's census was in racial classification. Enumerators were instructed to no longer use the "Mulatto" classification. Instead, they were given special instructions for reporting the race of interracial persons. A person with both white and black ancestry (termed "blood") was to be recorded as "Negro," no matter the fraction of that lineage (the "one-drop rule"). A person of mixed black and American Indian ancestry was also to be recorded as "Neg" (for "Negro") unless he was considered to be "predominantly" American Indian and accepted as such within the community. A person with both White and American Indian ancestry was to be recorded as an Indian, unless his American Indian ancestry was small, and he was accepted as white within the community. In all situations in which a person had White and some other racial ancestry, he was to be reported as that other race. Persons who had minority interracial ancestry were to be reported as the race of their father.

What were people that had black and white ancestor classified as in this census? 
What is the answer?
ANS: Negro
QUES: Egyptian cinema became a regional force with the coming of sound. In 1936, Studio Misr, financed by industrialist Talaat Harb, emerged as the leading Egyptian studio, a role the company retained for three decades. For over 100 years, more than 4000 films have been produced in Egypt, three quarters of the total Arab production.[citation needed] Egypt is considered the leading country in the field of cinema in the Middle East. Actors from all over the Arab World seek to appear in the Egyptian cinema for the sake of fame. The Cairo International Film Festival has been rated as one of 11 festivals with a top class rating worldwide by the International Federation of Film Producers' Associations.

In more that 100 years how many films have been produced in Egypt?
What is the answer?
ANS: 4000 films
QUES: Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of a machine or network and block all users at once. While a network attack from a single IP address can be blocked by adding a new firewall rule, many forms of Distributed denial of service (DDoS) attacks are possible, where the attack comes from a large number of points – and defending is much more difficult. Such attacks can originate from the zombie computers of a botnet, but a range of other techniques are possible including reflection and amplification attacks, where innocent systems are fooled into sending traffic to the victim.

What are zombie computers on a botnet?
What is the answer?
ANS:
unanswerable