Dashboard Control panel | Manage Question

Manage Question

Sr Subject
Semester
Question
Image
Option 1 Option 2 Option 3 Option 4 Answer Status Edit|Delete
1 Course on Computer Concepts (CCC)
Semester 1

35. The components of accessibility wizard are


Magnifier Narrator Utility manager All 4 Active
2 Course on Computer Concepts (CCC)
Semester 1

34. To open find replace and goto option of edit menu in word


F9 is used F5 is used F10 is used All of the above 2 Active
3 Course on Computer Concepts (CCC)
Semester 1

33.  How to create a batch file


Copy con A.bat copy con A Copy con A.txt None 1 Active
4 Course on Computer Concepts (CCC)
Semester 1

32. Which command used to changing back of the root directory


cd cd/ md md/ 1 Active
5 Course on Computer Concepts (CCC)
Semester 1

31.  PROMPT is used for


Set the command line prompt Set the window prompt Set the lebel None 1 Active
6 Course on Computer Concepts (CCC)
Semester 1

30.  The display option in control panel are used for setting


Background Screensaver Change the appearance All 1 Active
7 Course on Computer Concepts (CCC)
Semester 1

29. Which of the following can be used as input device of a computer system


OCR Printer VDU Plotters 1 Active
8 Course on Computer Concepts (CCC)
Semester 1

28. The task of performing arithmetic and logical operations is called


CU MU ULA ALU 4 Active
9 Course on Computer Concepts (CCC)
Semester 1

27. What is the executable name of phone Dialer


Phone.exe Dialer.exe Phone Dialer.exe None Of the above 2 Active
10 Course on Computer Concepts (CCC)
Semester 1

26 . EGA Stands For


Enhanced graphics adaptor Enlarge graphics adaptor Both a and B None of the above 1 Active
11 Course on Computer Concepts (CCC)
Semester 1

25.  Accessibility option in control panel, helps, you set up how you want to use your


Keyboard Display Mouse Functions All 4 Active
12 Course on Computer Concepts (CCC)
Semester 1

 24. DOS stands for


Drive Operating System Disk Oerating System Date Operating System Data Operating System 2 Active
13 Course on Computer Concepts (CCC)
Semester 1

23.   You can create the batch file (*.bat) using the


Copy Con Xcopy Con Create All Of the above 4 Active
14 Course on Computer Concepts (CCC)
Semester 1

22.  Function of a computer system is


Accepting Data Processing the data Storing the data All of the above 4 Active
15 Course on Computer Concepts (CCC)
Semester 1

21. Fdisk command contain how many sub option


2 3 4 None 3 Active
16 Course on Computer Concepts (CCC)
Semester 1

20. CD Stands for


Complete Disk Compact Disk Both A and B None Of the above 2 Active
17 Course on Computer Concepts (CCC)
Semester 1

19.  The Resolution of VGA is


640*420 720*350 640*340 None Of The above 4 Active
18 Course on Computer Concepts (CCC)
Semester 1

18. CGA Stands for


Color Graphics Adaptor Character Code Active Both A and B None of the above 1 Active
19 Course on Computer Concepts (CCC)
Semester 1

17. An example of GUI operating system


Windows DOS OS2 None of these 1 Active
20 Course on Computer Concepts (CCC)
Semester 1

16. What is the programming language used in first generation computers


Low Level Assembly Language High Level None of these 1 Active
21 Course on Computer Concepts (CCC)
Semester 1

15.  Minimum RAM requirement for win2000 is


32MB 64MB 256MB 512MB 2 Active
22 Course on Computer Concepts (CCC)
Semester 1

14 . To Create a New File which Command is used


Type Copy Con Both A and B None Of the above 3 Active
23 Course on Computer Concepts (CCC)
Semester 1

13. INTEL-80486 is an example of


Micro Computer Mini Computer Super Computer Mainframe Computer 1 Active
24 Course on Computer Concepts (CCC)
Semester 1

 12. PPP stands for


point to point Protocol peer to peer protocol Peer to point protocol All Of the Above 1 Active
25 Course on Computer Concepts (CCC)
Semester 1

11. How many characters can a VDU display on one line

 

 

 

','1120','question','manage_question','manageQuestion.php')">

11. How many characters can a VDU display on one line

 

 

 


24 40 64 80 4 Active 26 Course on Computer Concepts (CCC)
Semester 1

10. The Resolution of CGA is


640* 200 720 *350 640*340 None of the Above 4 Active 27 Course on Computer Concepts (CCC)
Semester 1

9.  For all the computing needs, windows 2000 provides


Industrial Stength Reliability Highest Level Of Security Powerful Performance All 4 Active 28 Course on Computer Concepts (CCC)
Semester 1

8.  Program to convert high level programe to low level is


Assembler Compliler Interpretor All 2 Active 29 Course on Computer Concepts (CCC)
Semester 1

7.  WWW Stands for


World Wide Web Wide Word Website Wide World Website All of the above 1 Active 30 Course on Computer Concepts (CCC)
Semester 1

6. The internal command execute immediately


True False Both None 1 Active 31 Course on Computer Concepts (CCC)
Semester 1

5. SVGA Stands for


System Vertical Graphics Adaptor Super Video Graphics Array Super Vertical Graphics Array None of the Above 2 Active 32 Course on Computer Concepts (CCC)
Semester 1

4. Multimedia can be used for


Webpages Games Main Stream Business All 4 Active 33 Course on Computer Concepts (CCC)
Semester 1

3. 1 KB is equal to


1024 Bytes 1024 Bites 1024 GB 1024 MB 1 Active 34 Course on Computer Concepts (CCC)
Semester 1

2. A Micro Processor is 


A solid State Device Tiny as a pen Capable of performing arithmetic calculation Capable of performing logical calculation 3 Active 35 Course on Computer Concepts (CCC)
Semester 1

1. RUN command is used for rename the file


True False Both None 2 Active 36

Disable 37 PC ARCHITECTURE
The Width of a processor?s data path is measured in bits. Which of the following are common data paths?
. 32 bits . 8 bits 12 bits 16 bits 2 Active 38 ADVANCE NETWORKS AND NETWORKIN
WAN stands for ..................... .
Wap Area Network Wide Array Net . Wide Area Network Wireless Area Network 3 Active 39 PC HARDWARE & COMPONENTS
Q. What is the first step in diagnosing a completely dead computer at the client site that was working the day before.
check the AC outlet Test the power supply replace the CMOS battery reseat the hard drive controller cable 1 Active 40 PC HARDWARE & COMPONENTS
Q. Which of the items listed below is an output device?
Scanner Printer Mouse Keyboard 2 Active 41 PC HARDWARE & COMPONENTS
What?s a USB hub?
Networking equipment which allows several computers to share one Internet connection The ports on the back of your computer where you plug in USB devices A device that turns one USB connection into two or more connections A place to store all of your USB devices 3 Active 42 PC HARDWARE & COMPONENTS
Q. Missing slot covers on a computer can cause?
incomplete path for ESD EMI. power surges over heat 4 Active 43 OPERATING SYSTEM, SOFTWARE &TO
Q. To start the Services Configuration Tool from the desktop
b. Main Menu Button (on the Panel) >System Settings>Services Settings> Services a. Main Menu Button (on the Panel) >System Settings>Server Settings>Services and Type the command re c. Type the command redhatconfigure servers at a shell prompt . None of these 2 Active 44 PC ARCHITECTURE
Q. The brain of the computer. This part does the calculation, moving and processing of information
Motherboard RAM Processor Hard Drive 3 Active 45 ADVANCE NETWORKS AND NETWORKIN
Q. Which of the following is correct in VLSM?
Subnets must be in same size No required of subnet Can have subnets of different sizes None of these 3 Active 46 PERSONALITY DEVELOPMENT
All levels of management between the supervisory level& the top of the organization are termed ------------.
First line managers Forman Middle managers Supervisors 3 Active 47 PC ARCHITECTURE
CDROMstands for ..............
Compactable Read Only Memory Compact Disk Read Only Memory Compactable Disk Read Only Memory Compact Data Read Only Memory 2 Active 48 PC HARDWARE & COMPONENTS
Q. From the following, what could cause a display that is wiggly,pulsing,blurred, too large or small and causes the screen to flicker or shrink?
video adapter interference from nearby pc cards unstable power supply in the monitor monitor interference from nearby equipment All of these 4 Active 49 OPERATING SYSTEM, SOFTWARE &TO
The proper definition of a modern digital computer is
Any machine that can perform mathematical operations . A more sophistic and modified electronic pocket calculator A machine that works on binary code An electronic automated machine that can solve problems involving words and numbers 3 Active 50 PC HARDWARE & COMPONENTS
Q. In Inkjet technology the droplets of ink are deflected by?
electro static absorbtion multi directional nozzles electronically charged plates high pressure plates 2 Active 51 OPERATING SYSTEM, SOFTWARE &TO
Which of the following is an Operating System
Firefox None of these Microsoft Word Windows 4 Active 52 PC ARCHITECTURE
Q. The first electronic general purpose digital computer built by Motley and Accrete called ENIAC did not work on the stored program concept. How many number s could it storein its internal memory?
100 40 80 20 4 Active 53 PC ARCHITECTURE
Q. Resistance is measured in ?
Watts Ohms Amps Volts 2 Active 54 PC ARCHITECTURE
What program can you use to keep your system patched and uptodate?
Windows Dispatcher Windows Update 5 Windows Upgrade Windows Patcher 2 Active 55 OPERATING SYSTEM, SOFTWARE &TO
A high Quality CAD system uses the following for printing drawing and graphs
All of these Line printer . Digital plotter Dot matrix printer 3 Active 56 PC ARCHITECTURE
Q. The first electronic computer in the world was
ENIAC UNIVAC EDVAC All of these 1 Active 57 OPERATING SYSTEM, SOFTWARE &TO
. What is modified when changing the system startupboot sequence?
. BIOS/CMOS COMMAND.COM . CONFIG.SYS autoexec.bat 1 Active 58 PC HARDWARE & COMPONENTS
A user complains that they can not hear any sound on their computer. What are some simple things you should consider concerning this problem?
volume not up on the monitor none of these power cable to speaker not connected and bad cable connection defective graphics card 3 Active 59 PERSONALITY DEVELOPMENT
Analytical CRM tools can sliceanddicecustomer information to create madetoorderviews
Customer value All of these Customer spending Customer product affinities 2 Active 60 PERSONALITY DEVELOPMENT
The personnel who deals with the computer and its management put together are called
Software Firmware Human ware Hardware 3 Active 61 ADVANCE NETWORKS AND NETWORKIN
Q. You are on a tablet and can't connect to the network. What is the first thing you should do
None of these . Press and hold the power button Restart the computer Check that the wireless switch is in the on position 4 Active 62 OPERATING SYSTEM, SOFTWARE &TO
Q. ISDN uses _____ technology.
neither digital nor analog only digital only analog digital and analog 2 Active 63 PERSONALITY DEVELOPMENT
Q. Relationships that result in strategic partnerships go through four stages including:
Suggestion, response, communication, concurrence Awareness, exploration, expansion, and commitment . Exploration, change, dynamics, restoration cd. Beginning, adjustment, middle, end 2 Active 64 PERSONALITY DEVELOPMENT
In successful organizations, ----------------
Low efficiency & high effectiveness go hand in hand High efficiency & low effectiveness go hand in hand High efficiency & high equity go hand in hand High efficiency &high effectiveness go hand in hand 4 Active 65 PERSONALITY DEVELOPMENT
Q. The marketing messages committed to customers wishes is a part of ................... .
Permission marketing Activity marketing Supplier marketing None of these 1 Active 66 OPERATING SYSTEM, SOFTWARE &TO
Q. What command should you run to check and fix corrupt system files, DLLs, and other critical files?
CHKDSK /R SFC /SCANNOW CMDCONS /FIXBOOT DEFRAGA 2 Active 67 PERSONALITY DEVELOPMENT
Which is not a task of a Configuration Management?
Version control Reporting Change management Quality control 4 Active 68 PERSONALITY DEVELOPMENT
Q. What supports backofficeoperations and strategic analysis and includes all systems that do not deal directly with the customers?
Operational CRM Analytical CRM Personalization All of these 2 Active 69 PC ARCHITECTURE
Q. How many address lines are needed to address each memory location in a 2048 x 4 memory chip?
11 8 10 12 1 Active 70 PERSONALITY DEVELOPMENT
_________ is the person who offers informal advice or information about a specific product or product category.
A marketing leader An opinion leader A customer None of these 2 Active 71 PC HARDWARE & COMPONENTS
When plugging the P8 and P9 power connectors into the system board, which of the following is true?
it doesn't matter which way you plug them in, the voltages are the same P8 and P9 don't plug into the system board the black wires of both connectors should be next to each other the black wires of both connectors should NOT be next to each other 3 Active 72 PC HARDWARE & COMPONENTS
. A capacitor is measured in which of the following units?
Volts . Ohms Resistance . Farads 4 Active 73 PC HARDWARE & COMPONENTS
. A capacitor is measured in which of the following units?
Volts . Ohms Resistance . Farads 4 Active 74 ADVANCE NETWORKS AND NETWORKIN
What would the value of protocol field in an IP header in which the data is a HTTP?
. 80 8080 . 6 413 3 Active 75 PC HARDWARE & COMPONENTS
Q. You must service the laser printer in your office. Which part of the printer shoud you avoid touching because it is hot?
primary corona fuser printer head highvoltage power supply 2 Active 76 C Language
Which operator has the highest priority ?
+ + % + !! 1 Active 77 C Language
Which operator has the lowest priority ?
+ + % + !! 4 Active 78 C Language
The equality operator is represented by
:= .EQ. = = = 4 Active 79 C Language
The operator && is an example for ___ operator
Assignment Logical Increment Rational 2 Active 80 C Language
Which of the following is an example of compounded assignment statement ?
a = 5 a + = 5 a = b = c a = b 2 Active 81 C Language
The maximum length of a variable in C is ___
8 16 32 64 1 Active 82 C Language
Which of the following is invalid ?
?? ? ? ?a? ?abc? 4 Active 83 C Language
Which escape character can be used to beep from speaker in C ?
\a \b \c \d 1 Active 84 C Language
Which of the following is a Scalar Data type
FLOAT UNION ARRAY POINTER 1 Active 85 C Language
Which of the following language is predecessor to C Programming Language ?
A B BCPL C++ 3 Active 86 C Language
What will be the maximum size of a float variable
4 8 2 6 2 Active 87 C Language
String constants should be enclosed between ___
Single quotes Double quotes Both a and b None of These 2 Active 88 C Language
Character constants should be enclosed between ___
Single quotes Double quotes Both a and b None of These 1 Active 89 C Language
Which escape character can be used to begin a new line in C ?
\a \b \n \d 3 Active 90 C Language
Which symbol is used as a statement terminator in C ?
; ~ # @ 1 Active 91 C Language
What is the valid range of numbers for int type of data ?
0 to 256 -32768 to +32767 -65536 to +65536 No specific range 2 Active 92 C Language
Which of the following are tokens in C?
KEYWORDS VARIABLES CONSONANTS ALL OF ABOVE 4 Active 93 C Language
Which of the following symbol is used to denote a pre-processor statement?
! @ $ # 4 Active 94 C Language
C language is available for which of the following Operating Systems?
DOS WINDOWS UNIX ALL OF THESE 2 Active 95 C Language
C is a ___ language
High Level Low Level Machine Level All of these 2 Active 96 C Language
C was developed in the year
1970 1972 1980 2000 2 Active 97 C Language
C programming language was developed by
Dennis Ritchie Ken Thompson Bill Gates Peter Norton 1 Active 98 C Language
What are demerits of array in c?
Wastage of memory space. We cannot change size of array at the run time. It can store only similar type of data Only (i) and (ii) is correct All of These 4 Active 99 C Language
What are merits and of array in c?
We can easily access each element of array Not necessity to declare too many variables Array elements are stored in continuous memory location. All of These 4 Active 100 C Language
What is wild pointer in c?
A pointer in c which has not been initialized is known as wild pointer. A pointer in c which has been initialized is known as wild pointer. Both All of These 1 Active 101 C Language
Consider on following declaration in c: (i)short const register i=10; (ii)static volatile const int i=10; (iii)unsigned auto long register i=10; (iv)signed extern float i=10.0;
Only (iv)is correct Only (ii) and (iv) is correct Only (i) and (ii) is correct Only (iii) correct 3 Active 102 C Language
Which of the following is not derived data type in c?
Function Pointer Enumeration Array 3 Active 103 C Language
Consider on order of modifiers in following declaration: (i)char volatile register unsigned c; (ii)volatile register unsigned char c;
All are correct and same All are correct but they are different All are incorrect Only (ii) is correct declaration 1 Active 104 C Language
What is the range of signed int data type in that compiler in which size of int is two byte?
-255 to 255 -32767 to 32767 -32768 to 32767 -32767 to 32768 3 Active 105 C Language
Which of the following is integral data type?
void char float double 2 Active 106 C Language
Which of the following is not modifier of data type in c?
extern interrupt huge All of these are modifiers of data type 4 Active 107 C Language
The library function used to find the last occurrence of a character in a string is
strnstr() laststr() strrchr() strstr() 3 Active 108 Introduction Of Java
What will be the result of the expression a % b when a and b are of type int and their values are a = 10 and b = 6?
1.66 4 1 2 2 Active 109 Introduction Of Java
(JAVA) What will be the result of the expression a % b when a and b are of type int and their values are a = -17 and b = -6?
5 23 -5 -23 1 Active 110 Introduction Of Java
Which of the following is not a hexadecimal number? (A) 999 (B) (hex)23 (C) 0x556 (D) 0x1F2
c a a & b a,b & c 3 Active 111 Introduction Of Java
The type long can be used to store values in the following range:(JAVA)
-231 to 231 - 1 -263 to 263 - 1 -232 to 232 - 1 -264 to 264 2 Active 112 Introduction Of Java
What is garbage collection in the context of Java?
vThe operating system periodically deletes all of the java files available on the Any package imported in a program and not used is automatically deleted. When all references to an object are gone, the memory used by the object is The JVM checks the output of any Java program and deletes anything that 3 Active 113 Introduction Of Java
What is byte code in the context of Java?
The type of code generated by a Java compiler The type of code generated by a Java Virtual Machine It is another name for a Java source file It is the code written within the instance methods of a class. 1 Active 114 Introduction Of Java
What is different between a Java applet and a Java application?
An application can in general be trusted whereas an applet can't. An applet must be executed in a browser environment. An applet is not able to access the files of the computer it runs on all of the above 4 Active 115 Introduction Of Java
A constructor(JAVA)
must have the same name as the class it is declared within is used to create objects. may be declared private ALL OF THE ABOVE 4 Active 116 Introduction Of Java
Which of the following is TRUE?(JAVA)
In java, an instance field declared public generates a compilation error int is the name of a class available in the package java.lang Instance variable names may only contain letters and digits. A class has always a constructor (possibly automatically supplied by the java 4 Active 117 Introduction Of Java
What is the value stored in result after executing the following line in a program? result = 6/2*3;
1.2 9 1 0 2 Active 118 Introduction Of Java
The method setLabel can be used with what type of Object?(JAVA)
DoubleField int TextField String 1 Active 119 Introduction Of Java
Trying determine the shape of a cylindrical can made from 1000 cm2 of tin that has the largest possible volume is an example of:(JAVA)
Array calculation Text manipulation Optimization problem Object oriented programming 3 Active 120 Introduction Of Java
A function is:(JAVA)
An entity that receives inputs and outputs A way of storing values A sequence of characters enclosed by quotes A kind of computer 1 Active 121 Introduction Of Java
The data type for numbers such as 3.14159 is:(JAVA)
double int real string 1 Active 122 Introduction Of Java
If result = 2 + 3 * 5, what is the value of result?(JAVA)
25 14 10 17 4 Active 123 Introduction Of Java
The following a legal Java statement
m1 = new TextField("sixty"); 1a = 6; add(m1); m1.setText("Hello world); 3 Active 124 Introduction Of Java
The following is an example of a bool-expression?(JAVA)
x = 6 m1.setText("Hello.") cause == bYes 70 3 Active 125 Introduction Of Java
The following is NOT an example of a data type(JAVA)
int public Button void 2 Active 126 Introduction Of Java
table is a variable that refers to an array(JAVA)
A collection of one or more statements enclosed in braces A statement involving if and else A way of declaring variables a way of setting the value of a variable 1 Active 127 Introduction Of Java
What does the following line of code mean? (JAVA) double table[];
table is a variable to refers to a real number table is a variable that refers to two numbers It is not legal Java code table is a variable that refers to an array 4 Active 128 Introduction Of Java
The sequence \n does what?(JAVA)
Makes a link Prints a backslash followed by a n Adds 5 spaces Starts a new line 4 Active 129 Introduction Of Java
If s = "text", what is the value returned by s.length()?(JAVA)
A TextArea can handle multiple lines of text A textarea can be used for output TextArea is not a class TextAreas are used for displaying graphics 1 Active 130 Introduction Of Java
What is an infinite loop?(JAVA)
A loop that functions infinitely well A loop that runs forever A loop that never starts A loop that will never function 2 Active 131 Introduction Of Java
What are the two parts of a value of type double?(JAVA)
length significant digits & exponent mode numerator 2 Active 132 Introduction Of Java
Which is a valid declaration within an interface?(JAVA)
public static short stop = 23; protected short stop = 23; transient short stop = 23; final void madness(short stop); 1 Active 133 Introduction Of Java
Which of the following class level (nonlocal) variable declarations will not compile?(JAVA)
protected int a; transient int b = 3; private synchronized int e; volatile int d; 3 Active 134 Introduction Of Java
Which of the following are legal declarations for nonnested classes and interfaces?(JAVA)
final abstract class Test {} public static interface Test {} final public class Test {} protected abstract class Test {} 3 Active 135 Introduction Of Java
You want a class to have access to members of another class in the same package. Which is the most restrictive access that accomplishes this objective?(jAVA)
public private protected default access 4 Active 136 Introduction Of Java
Which cause a compiler error?(JAVA)
int[ ] scores = {3, 5, 7}; int [ ][ ] scores = {2,7,6}, {9,3,45}; String cats[ ] = {"Fluffy", "Spot", "Zeus"}; boolean results[ ] = new boolean [] {true, false, true}; 2 Active 137 Introduction Of Java
public class Test { }, What is the prototype of the default constructor?(JAVA)
Test( ) Test(void) public Test( ) public Test(void) 3 Active 138 Introduction Of Java
What is the numerical range of a char?(JAVA)
-128 to 127 -(215) to (215) - 1 0 to 32767 0 to 65535 4 Active 139 Introduction Of Java
Which is a valid declarations of a String?(JAVA)
String s1 = null; String s2 = 'null'; String s3 = (String) 'abc'; String s4 = (String) '\ufeed'; 1 Active 140 Introduction Of Java
Which three are valid declarations of a float?(JAVA)
float f1 = -343; float f2 = 3.14; float f4 = 42e7; float f5 = 2001.0D; 1 Active 141 Introduction Of Java
Which one is a valid declaration of a boolean?(JAVA)
boolean b1 = 0; boolean b2 = 'false'; boolean b3 = false; boolean b4 = Boolean.false(); 3 Active 142 Introduction Of Java
Which is the valid declarations within an interface definition?(JAVA)
public double methoda(); public final double methoda(); static void methoda(double d1); protected void methoda(double d1); 1 Active 143 Introduction Of Java
Which one of the following will declare an array and initialize it with five numbers?(JAVA)
Array a = new Array(5); int [] a = {23,22,21,20,19}; int a [] = new int[5]; int [5] array; 2 Active 144 Introduction Of Java
Which is a valid keyword in java?
interface string Float unsigned 1 Active 145 Introduction Of Java
Which is a reserved word in the Java programming language?
method native subclasses array 2 Active 146 Introduction Of Java
Which will legally declare, construct, and initialize an array?(JAVA)
int [] myList = {"1", "2", "3"}; int [] myList = (5, 8, 2); int myList [] [] = {4,9,7,0}; int myList [] = {4, 3, 7}; 4 Active 147 Introduction Of Java
Which one of these lists contains only Java programming language keywords?(JAVA)
class, if, void, long, Int, continue goto, instanceof, native, finally, default, throws try, virtual, throw, final, volatile, transient strictfp, constant, super, implements, do 2 Active 148 Concept Of RDBMS
Information can be transferred between the DBMS and a
spreadsheet program word processor program graphics program all of the above 4 Active 149 Concept Of RDBMS
In a large DBMS
each user can "see" only a small part of the entire database each subschema contains every field in the logical schema each user can access every subschema none of the above 1 Active 150 Concept Of RDBMS
Primitive operations common to all record management system include
print sort look-up all of above 3 Active 151 Concept Of RDBMS
The model for a record management system might be
handwritten list a Rolodex card file a business form all of above 4 Active 152 Concept Of RDBMS
What is the language used by most of the DBMSs for helping their users to access data?
High level language SQL Query Language 4GL 3 Active 153 Concept Of RDBMS
The function of a database is ...
to check all input data to check all spelling to collect and organize input data to output data 3 Active 154 Concept Of RDBMS
One data dictionery software package is called
DB/DC dictionary TOTAL ACCESS Datapac 1 Active 155 Concept Of RDBMS
Which of the following is a problem of file management system?
difficult to update lack of data independence data redundancy all of above 4 Active 156 Concept Of RDBMS
Which of the following is true of a network structure?
It is a physical representation of the data It allows a many-to-many relationship It is conceptually simple It will be dominant data base of the future 2 Active 157 Concept Of RDBMS
The ascending order of a data hirerchy is
bit-byte-record-field-file-database byte-bit-field-record-file-database bit-byte-field-record-file-database bit-byte-file-record-field-database 3 Active 158 Concept Of RDBMS
A file produced by a spreadsheet
is generally stored on disk in an ASCII text fromat can be used as is by the DBMS both a and b none of the above 1 Active 159 Concept Of RDBMS
A transparent DBMS
can not hide sensitive information from users keeps its logical structure hidden from users keeps its physical structure hidden from users both b and c 3 Active 160 Concept Of RDBMS
A command that lets you change one or more fields in a record is
insert modify lookup none of above 2 Active 161 Concept Of RDBMS
A record management system
can handle many files of information at a time can be used to extract information stored in a computer file always uses a list as its model both a and b 2 Active 162 Concept Of RDBMS
Which is the make given to the database management system which is able to handle full text data, image data, audio and video?
full media graphics media multimedia hypertext 3 Active 163 Concept Of RDBMS
A set of programs that handle a firm's database responsibilities is called
database management system (DBMS) database processing system (DBPS) data management system (DMS) all of above 4 Active 164 Concept Of RDBMS
In the DBMS approach, application programs perform the
storage function processing functions access control all of the above 2 Active 165 Concept Of RDBMS
Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?
report writer query language data manipulation language transaction log 4 Active 166 Concept Of RDBMS
Which of the following is not an advantage of the database approach
Elimination of data redundancy Ability of associate deleted data increased security all of the above 4 Active 167 Concept Of RDBMS
Which of the following fields in a student file can be used as a primary key?
class Social Security Number GPA Major 2 Active 168 Concept Of RDBMS
An audit trail
is used to make backup copies is the recorded history of operations performed on a file can be used to restore lost information none of the aobve 2 Active 169 Concept Of RDBMS
If a piece of data is stored in two places in the database, then
changing the data in one spot will cause data inconsistency storage space is wasted in can be more easily accessed both a and b 4 Active 170 Concept Of RDBMS
Sort/Report generators
are faster than index/report generators require more disk space than indexed/report generators do not need to sort before generating report both a and b 2 Active 171 Concept Of RDBMS
In order to use a record management system
you need to understand the low level details of how information is stored you need to understand the model the record management system uses bother a and b none of the above 2 Active 172 Concept Of RDBMS
Which of the following is not a relational database?
dBase IV 4th Dimension FoxPro Reflex 4 Active 173 Concept Of RDBMS
Large collection of files are called
fields records database sectors 3 Active 174 Concept Of RDBMS
Batch processing is appropriate if
large computer system is available only a small computer system is avilbale only a few transactions are involved none of the above 4 Active 175 Concept Of RDBMS
Generalized database management system do not retrieve data to meet routine request
TRUE FALSE none of these both a & b 2 Active 176 Concept Of RDBMS
Which of the following hardware component is the most important to the operation of database management system?
high resolution video display printer high speed, large capacity disk plotter 3 Active 177 Concept Of RDBMS
Which of the following is not true of the traditional approach to information processing
there is common sharing of data among the various applications it is file oriented programs are dependent on the file it is inflexible 1 Active 178 Concept Of RDBMS
The management information system (MIS) structure with one main computer system is called a
hierarchical MIS structure distributed MIS structure centralized MIS structure decentralized MIS structure 3 Active 179 Concept Of RDBMS
A top-to-bottom relationship among the items in a database is established by a
hierarchical schema network schema relational schema all of the above 1 Active 180 Concept Of RDBMS
A form defined
where data is placed on the screen the width of each field both a and b none of the above 1 Active 181 Concept Of RDBMS
Report generators are used to
store data input by a user retrieve information from files answer queries both b and c 4 Active 182 Concept Of RDBMS
Choose the RDBMS which supports full fledged client server application development
dBase V Oracle 7.1 FoxPro 2.1 Ingress 2 Active 183 Concept Of RDBMS
The highest level in the hierarchy of data organization is called
data bank data base data file data record 2 Active 184 Concept Of RDBMS
The language used application programs to request data from the DBMS is referred to as the
DML DDL query language none of the above 1 Active 185 Concept Of RDBMS
One approach to standardization storing of data?
MIS structured programming CODASYL specification none of the above 3 Active 186 Concept Of RDBMS
Database management systems are intended to
eliminate data redundancy establish relationship among records in different files maintain data integrity all of the above 4 Active 187 Concept Of RDBMS
The relational database environment has all of the following components except
users separate files database query languages 2 Active 188 Concept Of Lan And Working Wit
It is a program that can search the web on a specific topic for you?
Search engine Web Browser WWW None of these 1 Active 189 Concept Of Lan And Working Wit
In sent mail box there is only voice messages?
TRUE False may be always false 2 Active 190 Concept Of Lan And Working Wit
The Domain name of commercial organization?
.Mil .Com .Edu All of these 2 Active 191 Concept Of Lan And Working Wit
It is piece of programming code that causes some undesired event search as the deletion of file.
Virus Hacking Anti-Virus Windows Security 1 Active 192 Concept Of Lan And Working Wit
Format of URL?
Protocol:// host name/ other Information Protocol://IP Address//WebsiteSiteName/ www://rssaindia.org.in/user.aspx None of the above 1 Active 193 Concept Of Lan And Working Wit
A company which provides access to the internet?
MTNL Online BSNL Broadband Internet Access Providers All of the above 4 Active 194 Concept Of Lan And Working Wit
Machines under internet can be categories as two types
Server and client Router and protocol ISP and Network Bridge and repeater 1 Active 195 Concept Of Lan And Working Wit
The connection allow user to exchange data pool and share resources including
Printer Data Computing Power All of The Above 4 Active 196 Concept Of Lan And Working Wit
It is define to be an interconnected collection of autonomous computer.
A computer network Local Area Network NIC Intranet 1 Active 197 Concept Of Lan And Working Wit
What is the full form of DNS_______________?
Defense Name System Directory Name System Defense Number System Domain Name System 4 Active 198 Concept Of Lan And Working Wit
Function of router?
It ensures that information doesn?t go where it?s no needed. It determines where to send information from one computer to another. It makes sure that information does make it to the intended destination. All of the above 4 Active 199 Concept Of Lan And Working Wit
A protocol is:
A set of tools for communicating across the internet. A piece of software that acts as an interface between the user and the inner workings of the interne The screen saver that appears on the monitor while the PC is on. An electronic mail that establishes person-to-person connectivity. 1 Active 200 Concept Of Lan And Working Wit
It is the most common form of security violation?
Hacking Virus Anti-Virus Windows Security 1 Active