Sample Question Paper
(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these
2. An applet __________
(a) is an interpreted program that runs on the client
(b) tracks the number of visitors to a Website
(c) is a compiled program that usually runs on the client
(d) collects data from visitors to a Website
(e) None of these
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of these
(a) Simply parity check
(b) Checksum
(c) Two-dimensional parity check
(d) CRC
(e) None of these
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption of program
(d) Deletion of files
(e) None of these
(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of these
(a) Subject-oriented
(b) Integrated
(c) Time-variant
(d) Updateable
(e) None of these
(a) Logical design is software-dependent
(b) In a distributed database, database is stored in one physical location
(c) Conceptual design translates the logical design into internal model
(d) Logical design is software independent
(e) None of these
(a) ensures that only the correct data type is entered into a field
(b) verifies that all required data is present
(c) determines whether a number is within a specified limit
(d) tests if the data in two or more associated fields is logical
(e) None of these
(a) HTTP
(b) Browser
(c) WWW
(d) B2B
(e) None of these
11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(b) hides, the details of an object from
(c) reveals, the details of an object to
(d) extends, the details of an object beyond
(e) None of these
(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of these
(a) Join index
(b) Bitmap index
(c) B + Tree
(d) Hierarchical index
(e) None of these
14. The degree of detail that should be incorporated into a database depends on what?
(b) The type of database
(c) The user’s perspective
(d) The business practices and policies
(e) None of these
(a) Modem
(b) Router
(c) Gateway
(d) Bridge
(e) All of these
(a) executed
(b) referenced
(c) imported
(d) declared
(e) None of these
(a) begin the line with a # sign
(b) begin the line with double slashes (/ /)
(c) begin and end the line with double hyphens (-_-)
(d) indent the line
(e) None of these
18. Programming language built into user programs such as Word and Excel are known as____
(b) macro languages
(c) object-oriented languages
(d) visual programming languages
(e) None of these
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of these
(a) Interrupt request
(b) Forward DNS lookup
(c) Data-Link layer
(d) File Transfer Protocol
(e) Common gateway interface
(a) Schema, Base and Table
(b) Base, Table and Schema
(c) Key, Base and Table
(d) Schema, Table and View
(e) None of these
(a) never sent to the client machine
(b) sent in very large sections to save processing time
(c) sent only upon the client’s request
(d) sent in complete copies for the client to filter and sort
(e) sent from the client to the server for processing
23. Which of the following will not eliminates the ambiguities of a null value?
(b) Define subtypes
(c) Define each attribute as having an initial value that is recognized as blank
(d) Define supertypes
(e) None of these
(a) Root
(b) Base
(c) Sub
(d) Case
(e) None of these
(a) Channel bank
(b) Cluster
(c) Tiger team
(d) Serverless backup
(e) Logical unit
If you have any problem or want to ask anything regarding on it, you can ask me in the comment section. Visit next page to read more.
aru officer ko question xena
ReplyDeleteOk ma upload garxu.. website ma kehi din ma
ReplyDeleteplease upload maximum possible question of computer officer
ReplyDelete