0% found this document useful (0 votes)
70 views

Study Notes For All Competitive Exam

fjkdfjkan njakdfnkja kjdfakf jdfkjdsfanjsfa jdkfkasfjksafkkja ksdjfjjaanakjs kjdffffffffffffffk jksdfkandslfnkldskff ljdfnljnfnd flkanklfdal

Uploaded by

venkatesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

Study Notes For All Competitive Exam

fjkdfjkan njakdfnkja kjdfakf jdfkjdsfanjsfa jdkfkasfjksafkkja ksdjfjjaanakjs kjdffffffffffffffk jksdfkandslfnkldskff ljdfnljnfnd flkanklfdal

Uploaded by

venkatesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

STUDY NOTES FOR ALL COMPETITIVE EXAM

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

MISCELLANEOUS
Q.1. Which class of IP address provides a Q.5. Which of the following devices is used to
maximum of only 254 host addresses per connect same network segments and
network ID? manage the traffic between them?
(1) Class E (1) Switch
(2) Class B (2) Hub
(3) Class C (3) Modem
(4) Class D (4) Repeater
(5) Class A (5) Bridge
Q.2. Which of the following devices translates Q.6. Which of the following network
hostnames into IP addresses? devices/systems translates data from one
(1) DNS Server format to another?
(2) Hub (1) DHCP Server
(3) DHCP Server (2) Hub
(4) Firewall (3) Gateway
(5) MAC (4) NIC
Q.3. Which of the following devices takes data (5) Switch
sent from one network device and forwards Q.7. Switch is a device of _________ Layer of
it to all devices on the network regardless of OSI Model.
the intended recipient?
(1) Network Layer
(1) Switch
(2) Data Link Layer
(2) DNS Server
(3) Application Layer
(3) Hub
(4) Session Layer
(4) Gateway
(5) None of these
(5) All
Q.8. HUB is a _________ Device and Switch is
Q.4. Which of the following devices takes data a ________ Device.
sent from one network device and forwards
(1) Unicast, Multicast
it to the destination node based on MAC
(2) Multicast, Unicast
address?
(3) Broadcast, Unicast
(1) Hub
(4) Unicast, Unicast
(2) Switch
(5) Multicast, Multicast
(3) Gateway
Q.9. Star Topology is based on a Central Device
(4) Modem
that can be __________.
(5) All
(1) HUB

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

(2) Switch or more computers and their resources is a


(3) Router __________.
(4) Both 1 and 2 (1) network
(5) Gateway (2) hub

Q.10. Which of the following devices modulates (3) bridge


digital signals into analog signals that can be (4) router
sent over traditional telephone lines? (5) firewall
(1) Router Q.15. The protocol that makes Internet
(2) Gateway universality possible is _________.

(3) Switch (1) FEP


(2) WAN
(4) Modem
(3) POTS
(5) NIC
(4) TCP/IP
Q.11. Computer systems that transmit data over
communications lines, such as telephone (5) MAN
lines or cables are called______. Q.16. A network of personal computers that share
hardware, software, and data is called a
(1) home-based systems
________.
(2) centralized data systems
(1) local area network (LAN)
(3) data networks
(2) metropolitan area network (MAN)
(4) data communications systems
(3) wide area network (WAN)
(5) Wi-Fi system
(4) plain old telephone service (POTS)
Q.12. ________ method places all processing,
(5) None of these
hardware, and software in one central
Q.17. A network of geographically distant
location.
computers and terminals is called a:
(1) Wide area data processing
(1) Integrated Services Digital Network
(2) Network data processing
(ISDN)
(3) Centralized data processing
(2) local area network (LAN)
(4) Distributed data processing
(3) metropolitan area network (MAN)
(5) None of these
(4) wide area network (WAN)
Q.13. _________ processing method allows both (5) All of the above
remote access and remote processing.
Q.18. In this network arrangement, all computers
(1) Analog transmission have equal status.
(2) Centralized data processing (1) Client/server
(3) Distributed data processing (2) Client-to-client
(4) Digital transmission (3) Peer-to-peer
(5) Hierarchy processing (4) Token ring
Q.14. A computer system that uses (5) Server/ Terminal
communications equipment to connect two

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

Q.19. The most common communications devices Q.24. A subset of characters within a data field is
all use ___ transmission, a continuous known as
electrical signal in the form of a wave. (1) Record
(1) analog (2) File
(2) digital (3) Data string
(3) automatic (4) Byte
(4) all (5) None of these
(5) None of these Q.25. Data items grouped together for storage
Q.20. A (n) __________ adapter can move data at purposes are called-
128,000 bps, more than double a standard (1) Record
modem (2) Title
(1) Fax (3) List
(2) Dial-Up
(4) string
(3) Telephone modem
(5) None of these
(4) ISDN
Q.26. Which of the following terms does not
(5) None of these
describe a database structure used by a
Q.21. Which of the following is a type of DBMS
DBMS to link data from several files?
Software?
(1) Relational
(1) Data
(2) Structural
(2) My SQL
(3) Network
(3) MS-office
(4) All of the above
(4) utility
(5) None of these
(5) None of these
Q.27. The feature that database allows to access
Q.22. Which of the following is NOT a type of
only certain records in database is:
Microsoft Access database object?
(1) Forms
(1) Queries
(2) Reports
(2) Workbooks
(3) Queries
(3) Forms
(4) Tables
(4) Tables
(5) None of these
(5) None of these
Q.28. Set of permitted values of each attribute is
Q.23. The complete picture of data stored in
called ______.
database is known as
(1) Domain
(1) System flowchart
(2) Relation
(2) Schema
(3) Tuple
(3) record
(4) Schema
(4) DBMS
(5) None of these
(5) None of these

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

Q.29. The primary key must be ____. Q.35. Which operation is not permitted by query?
(1) Unique (1) delete
(2) Not null (2) entry
(3) Both 1 and 2 (3) Modify
(4) Either 1 or 2 (4) create table
(5) None of these (5) None of these
Q.30. Logical design of the database is called Q.36. Which is not related to database ?
______. (1) Table
(1) Database Snapshot
(2) Query
(2) Database Instance
(3) Form
(3) Database Schema
(4) Macro
(4) All of the above
(5) None of these
(5) None of these
Q.37. The language used by application
Q.31. Database utility exist in ——————
programs to request data from the DBMS
menu ?
is referred to the-
(1) Format
(1) DML
(2) tools
(2) DDL
(3) File
(3) query language
(4) Edit
(4) All of the above
(5) None of these
(5) None of these
Q.32. In which object sql is used ?
Q.38. COMMIT and ROLLBACK in DBMS are
(1) Query
the example of -
(2) Form
(1) DDL
(3) Report
(2) DML
(4) Macro
(3) TQL
(5) None of these
Q.33. What is the function of relationship ? (4) DQL
(1) Relate multiple table (5) None of these
(2) Relate multiple form Q.39. In Data base , properties of any entity are
(3) Relate table and form represented by its -
(4) Relate queries and forms (1) Setting
(5) None of these (2) Tuples
Q.34. What is there in record ? (3) Attributes
(1) Collection of field (4) Degree
(2) collection of Number (5) None of these
(3) Collection of rows Q.40. Type of a file is identified by -
(4) All of above (1) File
(5) None of these (2) Attribute

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

(3) Extension Q.46. Entities having primary key are called?


(4) Properties (1) Primary Entities
(5) None of these (2) Strong Entities
Q.41. Snapshot of the data in the database at a (3) Weak Entities
given instant of time is called _____. (4) Primary Key
(1) Database Schema (5) None of these
(2) Database Instance Q.47. In the E-R diagrams, the term cardinality is
(3) Database Snapshot a synonym for the term?
(4) All of the above (1) Attribute
(5) None of these (2) Degree
Q.42. Which of the following is not Unary (3) Entities
operation? (4) Cartesian
(1) Select (5) None of these
(2) Project Q.48. TRUNCATE statement in SQL is a ____.
(3) Rename (1) DML statement
(4) Union (2) DDL statement
(5) None of these (3) DCL statement
Q.43. Which of the following is not binary (4) TCL statement
operation? (5) None of above
(1) Union Q.49. The default date format in SQL is?
(2) Project (1) DD-MON-YY
(3) Set Difference (2) DD-MM-YY
(4) Cartesian Product (3) DD-MM-YYY
(5) None of these (4) DD-MM-YYYY
Q.44. The raw facts and figures are: (5) None of these
(1) Program Q.50. For adding number of hours to a date,
(2) Information which of the following statement is used ?
(3) Snapshot (1) Date + Number
(4) Reports (2) Date + Number/24
(5) None of these (3) Date+Number of Hours
Q.45. A command to remove a relation from an (4) Date +Hour/30
SQL database is ____. (5) None of above
(1) Delete table <table name> Q.51. A data dictionary is a special file that
(2) Drop table <table name> contains?
(3) Erase table <table name> (1) the data types of all fields in all files
(4) Alter table <table name> (2) the names of all fields in all files
(5) None of these (3) the widths of all fields in all files

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

(4) All of above (3) Ternary


(5) None of above (4) Quaternary
Q.52. A command that lets you change one or (5) 1 and 2
more fields of a record is? Q.57. Which of the following operation is used if
(1) Insert we are interested in only certain columns
(2) Modify of a table?
(3) Look-up (1) PROJECTION
(4) All of above (2) SELECTION
(5) None of above (3) UNION
Q.53. In a large DBMS? (4) JOIN
(1) Each user can see only a small part of (5) Intersect
the entire database Q.58. Which of the following is a valid SQL
(2) Each user can access every sub schema type?
(3) Each sub schema contains every field (1) CHARACTER
in the logical schema (2) NUMERIC
(4) All of above (3) FLOAT
(5) None of above (4) DATE
Q.54. It is better to use files than a DBMS when (5) All of the above
there are _______ . Q.59. The RDBMS terminology for a row is
(1) Stringent real-time requirements _______?
(2) Multiple users who wish to access the (1) Tuple
data (2) Relation
(3) Complex relationships among data (3) Attribute
(4) All of the above (4) Degree
(5) None of these (5) Field
Q.55. The conceptual model is _______ . Q.60. Which of the following operations need the
(1) dependent on hardware participating relations to be union
(2) dependent on software compatible?
(3) dependent on both hardware and (1) UNION
software (2) INTERSECTION0
(4) independent of both hardware and (3) DIFFERENC
software (4) All of the above
(5) None of these (5) None of these
Q.56. What is a relationship called when it is Q.61. The full form of DDL is _______?
maintained between two entities? (1) Dynamic Data Language
(1) Unary (2) Detailed Data Language
(2) Binary
(3) Data Definition Language

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

(4) Data Derivation Language (1) =


(5) Data Dimensional Language (2) LIKE
Q.62. Which of the following is an advantage of (3) BETWEEN
a View? (4) All of the above
(1) Data security (5) None of these
(2) Derived columns Q.67. ________ is a process when relation
(3) Hiding of complex queries between two entity is treated as a single
(4) All of the above entity.
(5) None of these (1) Normalization
Q.63. Which database level is closest to the (2) Aggregation
users? (3) Generalization
(1) External (4) Specialization
(2) Internal (5) Simplification
(3) Physical Q.68. In an ER Diagram, ellipse with underlying
(4) Conceptual lines is used to represent _________?
(5) None of these (1) attribute
Q.64. Which are the two ways in which entities (2) Key attribute
can participate in a relationship? (3) Composite attribute
(1) Passive and active (4) Multivalued attribute
(2) Total and partial (5) Entity
(3) Simple and Complex Q.69. _________ constraint is used to restrict
(4) All of the above actions that would destroy links between
(5) None of these tables?
Q.65. The result of the UNION operation (1) Primary key
between R1 and R2 is a relation that (2) Foreign Key
includes _______. (3) Check
(1) All the tuples of R1 (4) Not Null
(2) All the tuples of R2 (5) Unique
(3) All the tuples of R1 and R2 Q.70. In a table of data base, degree refers
(4) All the tuples of R1 and R2 which have (1) total numer of row
common columns (2) row in a table
(5) None of these (3) column in a table
Q.66. Which of the following option appropriate (4) total number of column in a table
is a comparison operator in SQL? (5) none of these

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

Q.71. In OSI network architecture, the routing is (1) Attenuation


performed by ............. ? (2) Interruption
(1) Network layer (3) Scattering
(2) Data link layer (4) Propogation
(3) Transport layer (5) None of these
(4) Session layer Q.77. Device that connect to the network without
(5) None of these using cables is called———.
Q.72. Which of the following performs (1) Distributed
modulation and demodulation ? (2) Wireless
(1) Fiber optics (3) Centralized
(2) Satellite (4) Open source
(3) Coaxial Cable (5) None of these
(4) Encoder/Decoder Q.78. The most important and powerful computer
are typically____.
(5) None of these
(1) Desktop
Q.73. Which is the first layer of OSI model-
(2) Network client
(1) Physical layer
(3) Network server
(2) Link layer
(4) Networkstation
(3) Transport layer
(5) Super computer
(4) Network layer
Q.79. Example of connectivity is_______
(5) None of these
(1) Internet
Q.74. Which of the following is not a transmission
(2) Floppy disk
medium ?
(3) Powercord
(1) Telephones lines
(4) Data
(2) Coaxial cables
(5) None of these
(3) Modem
Q.80. Which of the following has highest complex
(4) Micro wave system interconnection?
(5) None of these (1) Bus
Q.75. What is the minimum number of wires (2) Ring
needed to send data over a serial (3) Star
communication link layer ? (4) Mesh
(1) 1 (5) None of these
(2) 2 Q.81. Netware is a product of which company ?
(3) 4 (1) Microsoft
(4) 6 (2) Redhat
(5) None of these (3) Novell
Q.76. The loss in signal power as light travels (4) Window
down the fiber is called (5) None of these

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

Q.82. Network which is connected over a (1) 10. 226. 0. 15


Geographic area is called - (2) 192. 168. 0.12
(1) LAN (3) 10. 265. 0 .115
(2) MAN (4) 192. 168. 0. 1
(3) WAN (5) None of these
(4) CAN Q.88. CBS is the example of -
(5) None of these (1) LAN
Q.83. Which device is used to connect a computer (2) WAN
over the Telephone Network. (3) Internet
(1) Router (4) Intranet
(2) Hub (5) None of these
(3) VSAT Q.89. Which layer of OSI Model is closest to the
(4) Gateway user-
(5) None of these (1) Physcial layer
Q.84. What is the function of network (2) Transport layer
neighbourhood? (3) Application layer
(1) To navigate shared computer and (4) Network layer
folder in Network
(5) None of these
(2) To identify who is living near to you
Q.90. Which of the following is considered as a
(3) Send messages to neighbouring broad band communications channel?
computer
(1) co-axial cable
(4) Both 1 & 2
(2) fiber optic cable
(5) None of these
(3) microwave circuits
Q.85. Which device can not be shared in Network?
(4) satellite systems
(1) Computer
(5) All of the above
(2) Keyboard
Q.91. Which one of the following is used as
(3) Floppy connect to the internet?
(4) Printer (1) Web browser
(5) None of these (2) Net fitter
Q.86. Work group means ? (3) Windows 95
(1) Computer in Network (4) Cable
(2) Individual user (5) None of these
(3) Individual deposit Q.92. Which of the following communication
(4) All of above mode support two way traffic but only in one
(5) None of these direction at a time?
Q.87. Which of the following is an invalid IP (1) Simplex
Address - (2) half-duplex

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

(3) three-quaters duplex (1) Hackers


(4) All of the Above (2) Spam
(5) None of these (3) Virus
Q.93. Who decide about the division of work with (4) Identity theft
respect to IT security? (5) None of these
(1) Data owner Q.99. A ____________ uses long-distance
(2) Senior Manager transmission media to link computers
(3) Data Custodian separated by distance.
(4) Data user (1) circuit-switching network
(5) None of these (2) Wi-Fi
Q.94. The user account can only be created by the (3) WAN
(1) User (4) LAN
(2) Network administrator (5) None of these
(3) Security administrator Q.100. Which of the following is NOT considered
(4) Project incharge as a network communications device?
(5) None of these (1) Network interface card (NIC)
Q.95. Digital signal used in ISDN have - (2) Modem
(1) Discrete value (3) Data bus
(2) Any value (4) Router
(3) whole no value (5) None of these
(4) fractional value Q.101. Which one is a valid IP address?
(5) None of these (1) 300.215.317.3
Q.96. Bandwidth means - (2) 302.215.417.5
(1) Channel capacity (3) 202.50.20.148
(2) Data transmission (4) 202-5-20-148
(3) Cable lengt (5) None of these
(4) All Q.102. Which type of transmission media is known
as regular telephone wire?
(5) None of these
(1) Wi-Fi
Q.97. Which of the following is NOT a type of
broadband Internet connection? (2) Twisted-pair wire
(1) Cable (3) Fiber optic cable
(2) DSL (4) Coaxial cable
(3) Dial-up (5) All
(4) Satellite Q.103. What is the purpose of a firewall on a
(5) None of these computer?

Q.98. Which of the following is not an example of (1) To protect a computer from
security and privacy risk ? unauthorized access

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

(2) To protect a computer in case of fire (4) Ring


(3) To protect a computer from spam (5) Tree
(4) All of the above Q.109. Which of the following refers to a small,
(5) None of these single-site network?
Q.104. Which of the following layer is not in OSI (1) LAN
model? (2) DSL
(1) Physical layer (3) RAM
(2) Internet layer (4) USB
(3) Network layer (5) CPU
(4) Transport layer Q.110. Computers connected to a LAN (Local Area
(5) Application layer Network) can—
Q.105. Copper wire is an example of? (1) Run faster
(1) Guided Transmission Media (2) Go on line
(2) Shield Media (3) Share information and/or share
(3) Group Media peripheral equipment

(4) Unguided Transmission Media (4) E-mail

(5) None of these (5) None of these

Q.106. An unauthorized user is a network _______ Q.111. A communication processor that connects
issue. dissimilar networks by providing the
translation from one set of protocol to
(1) Performance
another is—
(2) Reliability
(1) Modem
(3) Security
(2) Gateway
(4) Firewall
(3) Router
(5) None of these
(4) Bridge
Q.107. Which topology requires a central controller
(5) All of these
or hub?
Q.112. A group of computers and other devices
(1) Mesh
connected together is called________.
(2) Star
(1) Network
(3) Bus
(2) Intranet
(4) Ring
(3) Internetworking
(5) Tree
(4) Both 2 and 3
Q.108. Which topology requires a multipoint (5) Extranet
connection?
Q.113. Transmission Lines are also called
(1) Mesh as________.
(2) Star (1) Circuits
(3) Bus
Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org
STUDY NOTES FOR ALL COMPETITIVE EXAM

(2) Channels (4) BootP


(3) Trunks (5) UDP
(4) Circuits channels, or trunks Q.118. What is a stub network?
(5) Wire (1) A network that has only one entry and
Q.114. The Switching Elements are also called as exit point.
_____. (2) A network with only one entry and no
(1) Host exit point.
(2) Terminal (3) A network with more than one exit
(3) Interface Message Processors (IMPs) point.
(4) Both 1 and 2 (4) A network with more than one exit and
(5) Subnet entry point.

Q.115. The distance a simple signal can travel in (5) A network with more than one entry
one period is called ________. point.
(1) Wavelength Q.119. Which of the following services use TCP?
(2) Frequency (1) DHCP
(3) Propagation speed (2) SMTP
(4) Both 1 and 2 (3) FTP
(5) None of these (4) HTTP
Q.116. How many collision domains are created (5) 2, 3 and 4
when you segment a network with a 12-port Q.120. Which of the following terms is used to
switch? describe a hardware- or software-based
(1) 1 device that protects networks from outside
threats?
(2) 12
(3) 5 (1) NIC

(4) 2 (2) Gateway

(5) 10 12 (3) Firewall

Q.117. Which protocol does Ping use? (4) Hub


(1) TCP (5) Server
(2) ARP
(3) ICMP

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

ANSWERS Q.19.(1) analog Analog Transmission

Class C Q.20.(4) ISDN


Q.1.(3)
Q.21.(2) My SQL
Q.2.(1) DNS Server
Q.22.(2) Workbooks
Q.3.(3) Hub
Q.23.(2) Schema
Q.4.(2) Switch Q.24.(3) Data string
Q.5.(5) Bridge is used to connect same Q.25.(1) Record
network segments and manage the Q.26.(2) Structural
traffic between them. Q.27.(3) Queries
Q.6.(3) Gateway network devices/systems Q.28.(1) Domain
translate data from one format to Q.29.(3) Primary key must satisfy unique and
another. not null condition for sure.
Q.7.(2) Switches operate on the second layer Q.30.(3) Logical design of database is called
of OSI Model, that is Data Link Layer. Database Schema.
Q.8.(3) Hub is a Broadcasting Device and Q.31.(2) Tools
Switch is a Unicasting Device. Q.32.(1) Query
Q.33.(1) Relate Multiple Table
Q.9.(4) Hub and Switch are used in Star
Q.34.(1) Collection of field
topology.
Q.35.(2) Entry
Q.10.(4) Modem
Q.36.(3) Form
Q.11.(4) data communications systems DML
Q.37.(1)
Q.12.(3) Centralized data processing Q.38.(3) TQL (Transaction Query Language)
Q.13.(3) Distributed data processing Q.39.(3) Attributes
Q.14.(1) network A computer Network system Q.40.(3) Extension
that uses communications equipment Q.41.(2) Snapshot of the data in the database at
to connect two or more computers and a given instant of time is called
their resources. Database Instance.
Q.115.(4) The TCP/IP protocol that makes Q.42.(4) Union is not Unary operation.
Internet universality possible. Q.43.(5) Project is not binary operation.
Q.116.(1) local area network (LAN) A network Q.44.(5) None of these
of personal computers that share Q.45.(2) Drop table <table name>
hardware, software, and data is called Q.46.(2) Strong Entities
a local area network (LAN). Q.47.(4) Cartesian
Q.48.(2) TRUNCATE statement in SQL
Q.117.(4) wide area network (WAN) A network
removes all records from table,
of geographically distant computers
including all spaces allocated for the
and terminals is called a wide area
records are removed.
network (WAN).
Q.49.(4) The default date format in SQL is DD-
Q.118.(1) Client/server In Peer-to-peer network
MM-YYYY.
arrangement, all computers have equal
Q.50.(2) Date + Number/24
status.

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

Q.51.(4) the data types of all fields in all files, Q.74.(3) Modem
the names of all fields in all files and Q.75.(2) 2
the widths of all fields in all files Q.76.(1) Attenuation
Q.52.(2) Modify
Q.77.(2) Wireless
Q.53.(1) Each user can see only a small part of
Q.78.(5) Super computer
the entire database.
Multiple users who wish to access the Q.79.(1) Internet is example of connectivity.
Q.54.(2)
data Q.80.(4) Mesh
Q.55.(4) Independent of both hardware and Q.81.(3) Netware is an operating system, which
sofware. is developed by Novell.
Q.56.(2) Binary Q.82.(3) WAN
Q.57.(1) PROJECTION operation is used if we Q.83.(5) None of these
are interested in only certain columns To connect a computer over telephone
of a table. line, modem is required.
Q.58.(5) All are valid SQL data type.
Q.84.(1) No navigate shared computer and
Q.59.(1) The RDBMS terminology for a row is
folder in Network
Tuple.
Q.85.(2) Keyboard
Q.60.(4) Union, Intersection and difference
Q.61.(3) DDL stands for Data Definition Q.86.(1) Computer in network is work group.
Language. Q.87.(3) For an Ip Address to be valid, there
Q.62.(4) All are advantages of view. should be four numbers seperated by
Q.63.(1) External database level is closest to the dots, and every number must lie
users. between 0 to 255
Q.64.(2) Total and partial. Q.88.(4) Intranet
Q.65.(4) All the tuples of R1 and R2 which have Q.89.(3) Application layers
common columns. Q.90.(5) All are broad band communication
Q.66.(4) =, Like and Between are comparison channel.
operators in SQL. Q.91.(4) Cable
Q.67.(2) Aggregation is a process when relation
Q.92.(2) half-duplex
between two entities is treated as a
Q.93.(2) Senior Manage or Chief information
single entity.
security officer (CISO) of IT assurance
Q.68.(2) In an ER Diagram, ellipse with
manager who is in charge of
underlying lines is used to represent
information security.
Key attribute.
Q.69.(2) Foreign Key constraint is used to restrict Q.94.(2) Netwdork administrator
actions that would destroy links between Q.95.(1) Discrete value
tables. Q.96.(4) Bandwidth is the amount of data that
Q.70.(4) Total mumber of column in a table. can be transmitted along a channel
Q.71.(1) Network layer during a specified period of time.
Q.72.(5) None of these Q.97.(3) Dial-up
Q.73.(1) Physical layer Q.98.(2) Spam

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

Q.99.(3) A WAN uses long - distance Q.108.(3) Bus topology requires a multipoint
transmission media to link computers connection.
separated by distance. Q.109.(1) Local Area Network refer to a small,
Q.100.(3) Data Bus is NOT considered a network single-site network.
communications device. Q.110.(3) Computers connected to a LAN (Local
Q.101.(3) 202.50.20.148 Area Network) can share information
Q.102.(2) Twisted-pair wire of transmission and/ or share peripheral equipment.
media is known as regular telephone Q.111.(2) Gateway
wire. Q.112.(1) A group of computers and other
Q.103.(1) To protect a computer from devices connected together is called
unauthorized access Network.
Q.104.(2) Internet layer Q.113.(4) Transmission Lines are also called as
Q.105.(1) Guided Transmission Media circuits channels, or trunks
Q.106.(3) Security Q.114.(3) The Switching Elements are also
Q.107.(2) Star called as IMPs.
Q.115.(1) The distance a simple signal can travel
in one period is called wavelength.
Q.116.(2) 12
Q.117.(3) ICMP
Q.118.(1) A network that has only one entry and
exit point.
Q.119.(5) SMTP, HTTP and FTP use TCP.
Q.120.(3) Firewall

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org


STUDY NOTES FOR ALL COMPETITIVE EXAM

Write us : [email protected] www.mahendras.org www.mahendraguru.com myshop.mahendras.org

You might also like