0% found this document useful (0 votes)
66 views

Another Relation or It Must Be Null

This document contains 25 multiple choice questions related to various topics in computer science including databases, networking, programming languages, and computer security. The questions test knowledge of concepts like referential integrity rules, applets, types of computer viruses, error detection methods, layers of the OSI model, characteristics of data warehouses, logical database design, and common gateway interface.

Uploaded by

mnohar
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Another Relation or It Must Be Null

This document contains 25 multiple choice questions related to various topics in computer science including databases, networking, programming languages, and computer security. The questions test knowledge of concepts like referential integrity rules, applets, types of computer viruses, error detection methods, layers of the OSI model, characteristics of data warehouses, logical database design, and common gateway interface.

Uploaded by

mnohar
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

1. Computer Basics 2. MS Office 3. Internet and Mail 4. Internet Security 5. DBMS 6. Networking 7. Business Systems 8. C Language 9.

C++ Language 10. Data Structures 11. Visual Basic 12. Java Programming 13. UNIX and Shell Programming 14. Computer Engineering 15. Micro Processors etc. 16. 1. The ________ states that a foreign key must either match a primary key value in another relation or it must be null. 17. (a) entity integrity rule 18. (b) referential integrity constraint 19. (c) action assertion 20. (d) composite attribute 21. (e) None of these 22. 2. An applet ________ 23. (a) is an interpreted program that runs on the client 24. (b) tracks the number of visitors to a Website 25. (c) is a compiled program that usually runs on the client 26. (d) collects data from visitors to a Website 27. (e) None of these 28. 3. A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk. 29. (a) system virus 30. (b) Trojan horse virus 31. (c) file virus 32. (d) macro virus 33. (e) None of these 34. 4. Which error detection method uses one's complement arithmetic? 35. (a) Simply parity check 36. (b) Checksum 37. (c) Two-dimensional parity check 38. (d) CRC 39. (e) None of these 40. 5. A result of a computer virus can NOT lead to ________ . 41. (a) Disk Crash 42. (b) Mother Board Crash 43. (c) Corruption of program

44. (d) Deletion of files 45. (e) None of these 46. 6. The network interface card of LAN is related to following layer of OSI Model 47. (a) Transport 48. (b) Network 49. (c) Data Link 50. (d) Physical 51. (e) All of these 52. 7. Which of the following does NOT describe a data warehouse? 53. (a) Subject-oriented 54. (b) Integrated 55. (c) Time-variant 56. (d) Updateable 57. (e) None of these 58. 8. Which of the following is TRUE ? 59. (a) Logical design is software-dependent 60. (b) In a distributed database, database is stored in one physical location 61. (c) Conceptual design translates the logical design into internal model 62. (d) Logical design is software independent 63. (e) None of these 64. 9. A range check ________ 65. (a) ensures that only the correct data type is entered into a field 66. (b) verifies that all required data is present 67. (c) determines whether a number is within a specified limit 68. (d) tests if the data in two or more associated fields is logical 69. (e) None of these 70. 10. The total set of interlinked hypertext documents worldwide is71. (a) HTTP 72. (b) Browser 73. (c) WWW 74. (d) B2B 75. (e) None of these 76. 11. With the object-oriented (OO) approach, an object encapsulates, or ________ .a programmer. 77. (a) carries out, the details of an object for 78. (b) hides, the details of an object from 79. (c) reveals, the details of an object to 80. (d) extends, the details of an object beyond 81. (e) None of these 82. 12. Every computer connected to an intranet or extranet must have a distinct ________ 83. (a) firewall 84. (b) proxy server 85. (c) IP address 86. (d) domain name 87. (e) None of these

88. 13. A table of bits in which each row represents the distinct values of a key? 89. (a) Join index 90. (b) Bitmap index 91. (c) B + Tree 92. (d) Hierarchical index 93. (e) None of these 94. 14. The degree of detail that should be incorporated into a database depends on what? 95. (a) Data integrity 96. (b) The type of database 97. (c) The user's perspective 98. (d) The business practices and policies 99. (e) None of these 100. 15. The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines. 101. (a) Modem 102. (b) Router 103. (c) Gateway 104. (d) Bridge 105. (e) All of these 106. 16. Before a package can be used in a java program it must be ________ . 107. (a) executed 108. (b) referenced 109. (c) imported 110. (d) declared 111. (e) None of these 112. 17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ . 113. (a) begin the line with a # sign 114. (b) begin the line with double slashes (/ /) 115. (c) begin and end the line with double hyphens (- _ -) 116. (d) indent the line 117. (e) None of these 118. 18. Programming language built into user programs such as Word and Excel are known as ________ 119. (a) 4GLs 120. (b) macro languages 121. (c) object-oriented languages 122. (d) visual programming languages 123. (e) None of these 124. 19. Firewalls are used to protect against ________ . 125. (a) Unauthorized Attacks 126. (b) Virus Attacks 127. (c) Data Driven Attacks 128. (d) Fire Attacks 129. (e) All of these

130. 20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user131. (a) Interrupt request 132. (b) Forward DNS lookup 133. (c) Data-Link layer 134. (d) File Transfer Protocol 135. (e) Common gateway interface 136. 21. Three SQL, DDL, CREATE commands are ________ . 137. (a) Schema, Base and Table 138. (b) Base, Table and Schema 139. (c) Key, Base and Table 140. (d) Schema, Table and View 141. (e) None of these 142. 22. Data are ________ in client/server computing. 143. (a) never sent to the client machine 144. (b) sent in very large sections to save processing time 145. (c) sent only upon the client's request 146. (d) sent in complete copies for the client to filter and sort 147. (e) sent from the client to the server for processing 148. 23. Which of the following will NOT eliminates the ambiguities of a null value? 149. (a) Define the attribute as required 150. (b) Define subtypes 151. (c) Define each attribute as having an initial value that is recognized as blank 152. (d) Define supertypes 153. (e) None of these 154. 24. The ________ directory is mandatory for every disk. 155. (a) Root 156. (b) Base 157. (c) Sub 158. (d) Case 159. (e) None of these 160. 25. This is a group of servers that share work and may be able to back each other up if one server fails. 161. (a) Channel bank 162. (b) Cluster 163. (c) Tiger team 164. (d) Serverless backup 165. (e) Logical unit
1. (a), 2. (c), 3. (e), 4. (b), 5. (b) 6. (e), 7. (d), 8. (a), 9. (c), 10. (a) 11. (b), 12. (c), 13. (b), 14. (b), 15. (a) 16. (c), 17. (b), 18. (d), 19. (a), 20. (e) 21. (d), 22. (c), 23. (d), 24. (c), 25. (b)

You might also like