Question Text: The Current Version of HTML Is - Select One: A. B. C. D. e
Question Text: The Current Version of HTML Is - Select One: A. B. C. D. e
Question Text: The Current Version of HTML Is - Select One: A. B. C. D. e
1
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The current version of HTML is _______________.
Select one:
a.
Version 2010
b.
Version 6
c.
Version 7
d.
Version 5
e.
Version 4
Question 2
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Each column in the relation corresponds to _____________
Select one:
a.
An attribute of the entity
b.
Records
c.
Data of the entity
d.
Entity set
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Functions and procedures are
Select one:
a.
have side effects which require special care if they are used as subsystems
b.
not useful in designing computer systems
c.
useful in designing computer systems
d.
old fashioned and they are not useful
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A 3 NF relation is converted to BCNF by
Select one:
a.
removing multivalued dependencies
b.
dependent attributes of overlapping composite keys are put in a separaterelation
c.
dependent non-key attributes are put in a separate table
d.
removing composite keys
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A __________ Key Encryption eliminates the key distribution problem
Select one:
a.
Public
b.
Universal
c.
Global
d.
Private
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Why is there a need to control in information system?
Select one:
a.
Information system stores large volume of data.
b.
To comply with the technology requirement of the company.
c.
To prevent virus attack
d.
Information system took time to design. Redesigning the system will took a time to
redevelop.
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Information System is being tested as a whole system. What kind of testing is being
conducted?
Select one:
a.
Pilot Testing
b.
System Testing
c.
Parallel Test
d.
Full Testing
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Each computer connected to the internet must
Select one:
a.
be internet compatible
b.
have a modem connection
c.
have a unique IP address
d.
be an brand hi end personal computer or laptop
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Computer systems are designed by
Select one:
a.
breaking up the systems into independent parts
b.
simplifying requirements of system
c.
modular design
d.
breaking of the system into smaller self-contained co-operating subsystems
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following is the best hierarchy of design of a report?
Select one:
a.
Report heading, Page heading, Control heading, Detail lines
b.
Detail lines, Report heading, Page heading, Control heading,
c.
Page heading, Report heading, Control heading, Detail lines
d.
Control heading, Report heading, Page heading, , Detail lines
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The last step in object oriented modelling is
Select one:
a.
develop an object interaction/collaboration graph
b.
document each class
c.
determine responsibilities of each object
d.
Assign object to its collaborations
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Each statement in DTD declares the element of HTML language.
Select one:
True
False
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Ronnie want to protect his data when sending from the main office to the branch office.
Which of the following information security he will apply?
Select one:
a.
Firewall
b.
Decryption
c.
Encryption
d.
File compression either zip or rar
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Relationships are identified from the word statement of a problem by
Select one:
a.
picking words which are verbs
b.
picking words which are pronouns
c.
picking words which are nouns
d.
picking words which are adjectives
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The versions of IP address that coexist in the internet are _______________ and ____________.
Select one:
a.
Version 1 & 5
b.
Version 3 & 5
c.
Version 4 & 6
d.
Version 6 & 10
e.
Old and New
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In Entity Relationship, the Employee number, Gender, Salary are examples of
Select one:
a.
Entity
b.
Cardinality
c.
Attributes
d.
Tuples
e.
Relationship
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Web@AT Corporation is newly established software company. Mr. Ang want to have a fast
and reliable DSL internet connection to his office. He asked his IT Officer to apply for a fast
connection.
Which of the following the IT Office need to do first?
Select one:
a.
Connect Mr. Ang computer to the server.
b.
Upgrade the company server.
c.
Check the telephone line if capable of DSL connection
d.
Request subscription fee to the Account Office.
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Who uses the report for tactical management?
Select one:
a.
Operational Management
b.
Middle Management
c.
Top Management
d.
All of the choices
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
This is a set of procedures that manage a database and provide application program access
the database in a form requested by the application programs.
Select one:
a.
Information System
b.
Flowcharting
c.
DMBS
d.
ER Process Diagram
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In the ER Diagram, relationships are
Select one:
a.
Adjective
b.
Verbs
c.
Nouns
d.
None of the choices
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
DFD stands for _____________
Select one:
a.
Disk Flow Direction
b.
Data Flow Diagram
c.
Data File Diagram
d.
Direct File Direction
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Jonathan is the Web Programmer of TRA Corporation. He was assigned to develop an
informative website. He wants to use user defined tags. What markup language he will use?
Select one:
a.
XML
b.
HTML
c.
UDML
d.
SGML
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
This is concerned with protecting data regarding individuals from being accessed and used
without the permission/knowledge of concerned individuals.
Select one:
a.
Data Security
b.
Data Integrity
c.
Data Privacy
d.
Data Piracy
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A relationship is in 2NF if,
Select one:
a.
If there are only 2 attributes
b.
If key attributes is independent on composite attribute
c.
If duplicate tuples exists
d.
It is in 1NF
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
One entity may be
Select one:
a.
related to only two other entities
b.
related to itself
c.
related to only one other entity
d.
related to many other entities
Question 26
Correct
Mark 1.00 out of 1.00
Flag question
Question text
HTTP is a language used to create web pages.
Select one:
True
False
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A member of a class is __________________.
Select one:
a.
an object instance
b.
a method
c.
an entity
d.
an attribute
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Hiding implementation details of methods from outside world.
Select one:
a.
Inheritance
b.
Abstraction
c.
Encapsulation
d.
Polymorphism
Question 29
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Inheritance in object-oriented modelling can be used to
Select one:
a.
specialize classes
b.
generalize and specialize classes
c.
create new classes
d.
generalize classes
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following is used to secure an E Commerce
Select one:
a.
Secure Socket Layer
b.
None of the choices
c.
All of the choices
d.
Digital certificate
e.
Encryption
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
E-R Model has the ability to describe
Select one:
a.
All of the choices
b.
Many to Many
c.
1 to Many
d.
1 to 1
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
An instance of an object is created by a
Select one:
a.
constructor operation
b.
open operation
c.
query operation
d.
update operation
Question 33
Correct
Mark 1.00 out of 1.00
Flag question
Question text
This is acomputer-to-computer exchange of business documents in a standard electronic
format between business partners.
Select one:
a.
EDI
b.
HTML
c.
Email
d.
XML
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
This is the address of a web page on the internet.
Select one:
a.
DTD
b.
URL
c.
HTML
d.
XML
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The ___________ tag is used to link a web page to another page.
Select one:
a.
Link tag
b.
Connect tag
c.
Open tag
d.
Anchor tag
Question 36
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following is a control technique during input preparation?
Select one:
a.
Regularly saving the record
b.
Responsive screen layout
c.
Data entry validation
d.
Account Login
Question 37
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Pie charts are normally used when
Select one:
a.
relative distribution of data in specified categories is to be shown
b.
percent use of resources under various heads is to be shown
c.
trends as a function of time is to be illustrated
d.
it is required to illustrate geographical distribution of data
Question 38
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Aldrin want to conduct a testing of the developed information system together with the
manual system using data used from manual system to test system when it is first
implemented. What kind of testing Aldrin will conduct?
Select one:
a.
Pilot Testing
b.
Full Testing
c.
System Testing
d.
Parallel Test
Question 39
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Entities are identified from the word statement of a problem by
Select one:
a.
picking words which are nouns
b.
picking words which are verbs
c.
picking words which are adjectives
d.
picking words which are pronouns
Question 40
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Which of the following is a valid ER Diagram?
Select one:
a.
b.
c.
d.
Question 41
Correct
Mark 1.00 out of 1.00
Flag question
Question text
New classes are created from current classes by using the idea of _____________.
Select one:
a.
Polymorphism
b.
Encapsulation
c.
Inheritance
d.
Abstraction
Question 42
Correct
Mark 1.00 out of 1.00
Flag question
Question text
This acts on behalf of all users of an organization wanting to use the internet.
Select one:
a.
Web application
b.
Internet Application Protocol
c.
Proxy application gateway
d.
Server application
Question 43
Correct
Mark 1.00 out of 1.00
Flag question
Question text
This is an industry standard notation to represent a class.
Select one:
a.
ERD
b.
SDLC
c.
DBMS
d.
UML
Question 44
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In object modelling, special properties of objects are
Select one:
a.
methods, attributes, classes
b.
none of the choices
c.
encapsulation, inheritance and polymorphism
d.
entity, relationship, attributes
Question 45
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
A type of testing wherein incorrect inputs, incorrect processing and incorrect outputs will be
detected during operation.
Select one:
a.
Parallel Test
b.
Pilot Testing
c.
Full Testing
d.
System Testing
Question 46
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In ER Model, student, teacher, professor and school are
Select one:
a.
Entity
b.
Properties
c.
Nouns
d.
Actors
e.
Relations
Question 47
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Designing screens uses principles
Select one:
a.
similar to those used for printed reports
b.
which are well specified
c.
different from those used for printed reports
d.
which are unique
Question 48
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Errors are found in an operational information system will result to
Select one:
a.
redesigning the system
b.
report to the programmers
c.
system shutdown
d.
lost of trust in the IS
Question 49
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A firewall is used in a system connected to a wide area network to
Select one:
a.
to extinguish fire spreading via network cables
b.
prevent unauthorized access by hackers
c.
prevent spread
d.
to scan for viruses in files
Question 50
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is also known as information hiding.
Select one:
a.
Inheritance
b.
Polymorphism
c.
Encapsulation
d.
Abstraction