1. cable modem
2. conventional modem
[bankibpssoit.blogspot.in].
subscriber line
4. digital telephone /
telecommunications network
5. cable connetion
The feature that database
allows to access only certain records in database is:
1. Forms
2. Reports
[bankibpssoit.blogspot.in].
Queries
4. Tables
5. None of these
Scope resolution operator
usually:
1. specifies a particular
task
2. one base class and more
than one derived class
[bankibpssoit.blogspot.in].
resolve ambiguities
4. All
5. None of these
A relation is in 1 NF if
1. there is no duplication of
data
2. there are no composite
attributes in the relation
[bankibpssoit.blogspot.in].
there are only a few composite attributes
4. all attributes are of
uniform type
5. None of these
Which filter method lets you
filter records based on criterion you specify?
1. Filter by form
2. Filter by selection
[bankibpssoit.blogspot.in].
Auto filter
4. Advanced filter
5. Advanced auto filter
The Hardware mechanism that
enables a device to notify the CPU is called __________.
1. Polling
2. Interrupt
[bankibpssoit.blogspot.in].
System Call
4. Event
5. None of the above
______ Component is required
to process data into information and consists of integrated circuits.
1. Hard disk
2. RAM
[bankibpssoit.blogspot.in].
CPU
4. ROM
5. None of these
What is the process of
copying software from secondary storage media to the hard disk called?
1. Configuration
2. Download
[bankibpssoit.blogspot.in].
Storage
4. Upload
5. Installation
Small application programs
that run on a web page and may ensure a form is completed properly or provide animation
are known as__________
1. Flash
2. Spiders
[bankibpssoit.blogspot.in].
Cookies
4. Applets
5. Applets
Classes, instances, and
methods are characteristics of _______.
1. Testing plan construction.
2. Artificial intelligence
techniques.
[bankibpssoit.blogspot.in].
Object-oriented design.
4. Flowcharts and pseudo
code.
5. None of these
ASP script contains code that
executes _________.
1. Within a Web browser
2. On a client computer
[bankibpssoit.blogspot.in].
Via a virtual machine
4. On a Web server
computer
5. On a proxy server
The relationship between a
base class and a derived class implements the feature called:
1. Inheritance
2. Portability
[bankibpssoit.blogspot.in].
Top-down design
4. Integrated development
5. None of these
When we run a program in HTML
coding,_____ is used as backend and ____ works as frontend.
1.
Notepad-Internet-Explorer
2. Notepad-Msn-messenger
[bankibpssoit.blogspot.in].
MS-word-Internet explorer
4. Both 1 and 2
5. None of these
A device operating at the
physical layer is called a ________.
1. Bridge
2. Router
[bankibpssoit.blogspot.in].
Repeater
4. All the above
5. None of these
Relational calculus is a
________.
1. Procedural language
2. Non- Procedural
language
[bankibpssoit.blogspot.in].
Data definition language
4. High level language
5. Machine level language
‘AS’ clause is used in SQL for _______.
1. Selection operation
2. Rename operation
[bankibpssoit.blogspot.in].
Join operation
4. Projection operation
5. Both 1 and 2
Architecture of the database
can be viewed as _________.
1. two levels
2. four levels
[bankibpssoit.blogspot.in].
three levels
4. one level
5. five level
Which of the following is a
type of testing ?
1. Recovery Testing
2. Security Testing
[bankibpssoit.blogspot.in].
Stress Testing
4. All of above
5. None of these
A(n) __________ converts all
the source code into machine code, creating an executable file.
1. linker
2. compiler
[bankibpssoit.blogspot.in].
assembler
4. interpreter
5. None of these
__________ are text files
containing OS commands.
1. Initialization files
2. Batch files
[bankibpssoit.blogspot.in].
Executable files
4. Help files
5. None of these
When the computer has to play
a sound, it generates a(n) __________.
1. request
2. command
[bankibpssoit.blogspot.in].
interrupt
4. sequence
5. All
An entity set that does not
have sufficient attributes to form
a primary key is a ______.
1. strong entity set
2. weak entity set
[bankibpssoit.blogspot.in].
simple entity set
4. primary entity set
5. Foreign entity set
In a Hierarchical model
records are organized as ________.
1. Graph
2. List
[bankibpssoit.blogspot.in].
Links
4. Tree
5. Index
The examples of Interior
Gateway Protocols (IGP) are _________.
(i) Open Short Path First
(OSPF)
(ii) Routing Information
Protocol (RIP)
(iii) Border Gateway Protocol
(BGP)
1. i only
2. i, and ii only
[bankibpssoit.blogspot.in]. i
and iii only
4. All i, ii and iii
5. None of these
FTP server listens to
connections on port …………………….
1. 19 and 20
2. 20 and 21
[bankibpssoit.blogspot.in].
21 and 22
4. 20 and 22
5. 19 and 21
Internal auditors should
review data system design before they are ______.
1. Developed
2. Implemented
[bankibpssoit.blogspot.in].
Modified
4. All the above
5. None of these
Demodulation is the process
of ____.
1. converting digital signals
to analog signals
2. converting analog signals
to digital signals
[bankibpssoit.blogspot.in].
dividing the high-speed signals into frequency bands
4. combining many low speed
signals into one high
speed channel
5. None of above
An information utility can
offer a user _______.
1. instant bonds and stock
quotations
2. news stories from wire
services
[bankibpssoit.blogspot.in].
Complete airline schedules for all domestic flights
4. All of above
5. None of above
Which database level is
closest to the users?
1. External
2. Internal
[bankibpssoit.blogspot.in].
Physical
4. Conceptual
5. None of these
Default storage class for local
variables is ________?
1. auto
2. register
[bankibpssoit.blogspot.in].
static
4. external
5. All
Which of the following
function is not performed by TCP?
1. Flow control
2. Sequencing
[bankibpssoit.blogspot.in].
Error checking
4. Subnetting
5. None of these
Programs that automatically
submit your search request to several search engines simultaneously are called
_______.
1. Metasearch engines
2. Webcrawlers
[bankibpssoit.blogspot.in].
Spiders
4. Hits
5. Webhistory
All of the following are
basic principles of networks, except:..
1. each computer must have a
network card
2. there must be
communications media connecting
the network hardware devices
[bankibpssoit.blogspot.in].
there must be at least one connecting device
4. each computer must have
software that supports the
movement of information
5. None of these
A protocol is ______.
1. Service that helps in
communicating
2. Rules that help
computer talk
[bankibpssoit.blogspot.in].
Way of transmission data over the net
4. All of these
5. None of these
Allocation map _____
1. Used to store program data
2. specifies which blocks
are used by which file
[bankibpssoit.blogspot.in].
is updated by application programs
4. allow programs to erase
files
5. All of above
Which is a logical database
structure
1. Chain
2. Tree
[bankibpssoit.blogspot.in].
Relational
4. Network
5. 2, [bankibpssoit.blogspot.in]
and 4
Which of the following is NOT
considered a network communications device?
1. Modem
2. Network interface card
(NIC)
[bankibpssoit.blogspot.in].
Data bus
4. Router
5. None of these
Which one is a valid IP
address?
1. [bankibpssoit.blogspot.in]00.215.[bankibpssoit.blogspot.in]17.[bankibpssoit.blogspot.in]
2. [bankibpssoit.blogspot.in]02.215
@417.5
[bankibpssoit.blogspot.in].
202.50.20.148
4. 202-5-20-148
5. 202.50.20%148
Transformation of input into
output is performed by _______.
1. Peripherals
2. Memory
[bankibpssoit.blogspot.in].
Storage
4. The input –output unit
5. CPU
Devices drivers are _______.
1. Tiny power cords for
external storage devices
2. Experts who know to
maximize the performance of
devices
[bankibpssoit.blogspot.in].
Small, special-purpose programs
4. The innermost part of the
operating system
5. Substitutes for operating
systems
A set of instructions telling
the computer what to do is called
1. Mentor
2. Instructor
[bankibpssoit.blogspot.in].
Compiler
4. Program
5. Debugger
If you receive an e-mail form
someone you don’t know, what should you do?
1. Forward it to the police
immediately
2. Delete it without
opening it
[bankibpssoit.blogspot.in].
Open it and respond to them saying you don’t know
them
4. Reply and ask them for
their personal information
5. Reply and tell them in
touch with them
Which of the following can
handle most system functions that aren’t handled directly by the operating
system?
1. Vertical market
applications
2. Utilities
[bankibpssoit.blogspot.in].
Algorithms
4. Integrated software
5. Compilers
Computer connected to a LAN
(Local Area Network) can _______.
1. Run faster
2. Go on line
[bankibpssoit.blogspot.in].
Share information and/or share peripheral equipment
4. E-MAIL
5. None of these
The subsystem of the kernel
and hardware that virtual to physical addresses comprises.
1. Process management
sub-system
2. Memory management
sub-system
[bankibpssoit.blogspot.in].
Input/output management sub-system
4. All the above
5. None of these
Dirty bit for a page in a
page table ______________
1. Helps avoid unnecessary
writers on a paging device
2. Helps maintain LRU
information
[bankibpssoit.blogspot.in].
Allows only read on as page
4. All the above
5. None of these
Which of the following can
handle most system functions that aren’t handled directly by the operating
system?
1. Vertical market
applications
2. Utilities
[bankibpssoit.blogspot.in].
Algorithms
4. Integrated software
5. None of these
Banker’s algorithm for
resource allocation deals with ___________
1. Dead lock preventation
2. Dead lock avoidance
[bankibpssoit.blogspot.in].
Dead lock recovery
4. Mutual exclusion
5. All of above
The number of records
contained within a block of data on magnetic tape is defined by the
1. Block definition
2. Record contain clause
[bankibpssoit.blogspot.in].
Blocking factor
4. Record per block factor
5. None of these
Serial access memories are
useful in applications where _________.
1. Data consists of numbers
2. Short access time is
required
[bankibpssoit.blogspot.in].
Each stored word is processed differently
4. Data naturally needs to
flow in and out in a serial
form
5. None of these||
No comments:
Post a Comment
You will get Reply with in 24 hours