0% found this document useful (0 votes)
55 views21 pages

DBA

The document consists of a series of questions and answers related to computer science and information technology concepts, covering topics such as video transmission interfaces, software types, database management, object-oriented programming, and web development. Each question presents multiple-choice options, testing knowledge on various technical subjects. It serves as a quiz or assessment tool for individuals studying IT and computer science principles.

Uploaded by

darojesus4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views21 pages

DBA

The document consists of a series of questions and answers related to computer science and information technology concepts, covering topics such as video transmission interfaces, software types, database management, object-oriented programming, and web development. Each question presents multiple-choice options, testing knowledge on various technical subjects. It serves as a quiz or assessment tool for individuals studying IT and computer science principles.

Uploaded by

darojesus4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

1.

It is a video transmission interface that offers better resolution than the others and supports
up to 8K (7680 x 4320) resolution at 60 Hz with an increased bandwidth of 77.37 Gbps.
A. HDMI Port
B. Display Port
C. DVI Port
D.VGA Port
2. Which of the following is a display unit that acts as an interface between the user and the
computer system?
A. Printer
B. Monitor
C. Mouse
D. Scanners
3. Microsoft Windows, IOS, and Linux are all types of software that belong to ___________
category.
A. Hardware systems
B. Application software
C. Operating system
D. Database system
4. A program that is designed to detect quarantine and/or delete malicious code, to prevent our
computer from damage.
A. Operating system
B. Internet browser
C. Antivirus
D. Games application
5. The collection of documents that are designed to help people who need to manage, operate or
maintain computer hardware or software.
A. Technical documentation
B. Inventory documents
C. Inventory record
D. Hardware inventory
6. Which one of the following is a valid file format for Microsoft Word?
A. .exe
B. .doc
C. .png
D. .pdf
7. Which Microsoft office package enables users to perform mathematical computation and
visualization of data?
A. Microsoft Word
B. Microsoft Excel
C. Microsoft Publisher
D. Microsoft PowerPoint
8. DHTML, HTML, and XML are an example of
A. Data structure
B. Markup language
C. Web Browsers
D. Word processor
9. Which of the following enables us to view data from a table based on a specific criterion?
A. Form
B. Report
C. Query
D. Table
10. From the 5s procedures, which one is used to remove unnecessary items from each area?
A. Standardize
B. Sustain
C. Sort
D. Shine
11. It is a field (or collection of fields) in one table, that refers to the PRIMARY KEY in another
table Which ensures a relationship is created.
A. Primary Key
B. Foreign Key
C. Referential Integrity
D. Metadata
12. A network device used to connect two or more dissimilar networks.
A. Gateway
B. Router
C. Hub
D. Switch
13. From computer maintenance procedures which one is the process of reorganizing the data
stored on the hard drive so that related pieces of data are put back together, all lined up in a
continuous fashion.
A. Antivirus
B. Defragmenter
C. Disk formatter
D. Memory Partitioning
14. Which one is a step that records client support requirements based on organizational rules,
regulations, and policies?
A. Client
B. Escalate
C. Priority
D. Log
15. Unnecessary conveyance of products, from one location to another, or handoff from one
employee to another is.
A. Over-production waste
B. Processing waste
C. Waiting-time waste
D. Transport waste
16. What is a Functional Requirement?
A. specifies the tasks the system must complete
B. specifies the tasks the program should not complete
C. specifies the system's operation capabilities and constraints and attempt to improve its
functionality
D. defines system attributes such as security, reliability, performance, maintainability,
scalability, and usability.
17. Among the following which refers to describing the data description, representing data
semantics, and describing the consistency constraints that apply to the data.
A. Modeling data
B. Modifying data
C. Adding data
D. Refining data
18. By normalizing relations or sets of relations, in a database we can minimize___________.
A. Data
B. Fields
C. Redundancy
D. Database
19. In the three-tier architecture, the intermediate layer between database and client server is
classified as
A. Application server
B. Functional server
C. Transaction server
D. Disk server
20. The type of diagram which specifies operations on objects is considered as______________.
A. Entity diagram
B. Class diagram
C. Functional diagram
D. Attribute diagram
21. Data schemas represent the skeleton structure of a database and it represent the _______view
of the database as a whole.
A. Analytical View
B. Logical View
C. Semantic View
D. Practical View
22. What is the correct HTML for creating a hyperlink?
A. <a>https://w.w.w.gkseries.com</a>
B. <a name=”https://w.w.w.gkseries.com”> Gkseries.com</a>
C. <a url=”https://w.w.w.gkseries.com> Gkseries.com</a>
D. <a href=”https://www.gkseries.com”> Gkseries.com</a>
23. Which of the following is the correct syntax to make the background-color of all paragraph
elements to yellow?
A. p {background-color: yellow;}
B. p {background-color: #yellow;}
C. all {background-color: yellow;}
D. all p {background-color: #yellow;}
24. Which of the following is generally used for performing tasks like creating the structure of
the relations, deleting relation?
A. DML(Data Manipulation Language)
B. Query
C. Relational Schema
D. DDL(Data Definition Language)
25. Which one of the following given statements possibly contains the error?
A. select * from emp where empid = 10003;
B. select empid from emp where empid = 10006;
C. select empid from emp;
D. select empid where empid = 1009 and Last name = 'GELLER';
26. Which one of the following SQL command helps to add a record in to a row using SQL in a
database?
A. INSERT
B. CREATE
C. ADD
D. MAKE
27. Among the following, which one is used for communication between the Web server and the
database server?
A. Middleware
B. Java database connectivity (JDBC)
C. Common Gateway Interface (CGI) script
D. Native support
28. Below the following, one is a process of analyzing the data objects and their relationship to
the other objects.
A. Data Modeling
B. System Modeling
C. Web Modeling
D. Storage Modeling
29. you are looking for a website hosting service to host your online shopping website. What is
the criteria that will put first when you compare a hosting company?
A. Customer Service
B. Email availability
C. Security Features
D. Uptime
30. Among the following, which one is the cheapest type of hosting?
A. Shared web hosting service
B. Free web hosting service
C. Dedicated web hosting service
D. VPS Web Hosting services
31. Which process involves developing an approximation of the costs of resources needed to
complete a project?
A. Determining the budget
B. Finalizing the cost baseline
C. Controlling costs
D. Estimating costs
32. Assume that you are asked to design the logical view of database for ABC PLC. As database
expert which one clearly shows the skeleton structure that defines how the data is organized
and how the relationships are associated?
A. Database Schema
B. Database Architecture
C. Database Manipulation
D. Database Retrieval
33. A database user who maintains a Database Management System and necessarily responsible
for looking after its overall usage and apply limitations to maintain isolation enforce security
is:
A. Database Designers
B. Database Administrators
C. End Users
D. Database Architects
34. Mr. Alemu is a Database Manager at XYZ Company. He is required to plan and organize the
overall works done in his respective responsibility. Then, which task is going to be executed
at last by Mr. Alemu?
A. Setting the organizational objectives
B. Escalation of problems
C. Implementation of the work plan outlined.
D. Reviewing and evaluating work plans and activities as per the set plan.
35. A database keyword that indicates the constraint of a database whose column values of a
Table are required to be assigned an initial values in the database is usually:
A. NOT NULL
B. DISTINCT
C. VALUES
D. WHERE clause
36. Which feature of OOPS described the reusability of code?
A. Inheritance
B. Abstraction
C. Encapsulation
D. Polymorphism
37. Which two features of object-oriented programming are the same?
A. Abstraction and Polymorphism features are the same
B. Inheritance and Encapsulation features are the same
C. Encapsulation and Abstraction
D. Encapsulation and Polymorphism features are the same
38. What is the name of the feature in which we enforce the definitions of the abstract function at
the compile time?
A. Dynamic Polymorphism
B. Static Polymorphism
C. Dynamic or Static Polymorphism according to need
D. Polymorphism
39. One of the following tasks is highly important while you are setting organization’s objectives
when you plan and organize works?
A. Developing Objectives which are inconsistent with organizational aims.
B. Setting objectives which are difficult to measure as per the standards.
C. Enhancing the motivation and commitment of the group members.
D. Identification of objectives which are not attainable
40. What is an abstraction in object-oriented programming?
A. Hiding the implementation and showing only the features
B. Hiding the important data
C. Hiding the implementation
D. Showing the important data
41. A UNION query is which of the following?
A. Combines the output from no more than two queries and must include the same
number of columns.
B. Combines the output from no more than two queries and does not include the same
number of columns.
C. Combines the output from multiple queries and must include the same number of
columns.
D. Combines the output from multiple queries and does not include the same number of
columns.
42. Which SQL operator is used as a conjunction that connects the two queries to return only the
required sets of data?
A. LIKE
B. AND
C. UPDATE
D. FROM Clause
43. You have table in your database having a foreign Key. What type of command does you to add new
column to the table.
A. ON UPDATE RESTRICT
B. ON UPDATE NO ACTION
C. ON UPDATE SET DEFAULT
D. ON UPDATE CASCADE
44. Suppose you are recruited as Database Administrator in Full Bright PLC Company where
records of Exchange commodities are expected to be managed centrally for the sake of
administration using SQL. Thus, which of the following syntax is the correct implementation
of SQL commands used to build a Table PRODUCTS and add fields such as ProdId, Prod
Name, Item Quantity, ProdUnitPrice and Description for the table?
A. INSERT TABLE PRODUCTS (ProdId, Prod Name, ItemQuantity, ProdUnitPrice,
Description ;)
B. SELECT * FROM ProdId, Prod Name, Item Quantity, ProdUnitPrice, Description;
C. CREATE TABLE PRODUCTS (ProdId, ProdName, Item Quantity, ProdUnitPrice,
Description ;)
D. UPDATE PRODUCTS SET ProdId, ProdName, ItemQuantity, ProdUnitPrice,
Description; WHERE ProdId=’ETH30’;
45. You are a Database developer for an insurance company. Every insurance policy is managed
by one and only one product manager. One product manager can manage many policies.
How can you represent that information in the Database?
A. Include the manager ID in the Policies entity
B. Create another entity which contains policy ID and the manager ID
C. Include the policy ID in the Managers entity
D. Include the manager ID in the Policies entity and the policy ID in the Managers
entity.
46. Suppose the database consists of multiple transactions that are used to manage organization’s
group of related data. So, which database attribute best describes the characteristics of a
transaction that it shouldn’t be divided or split rather it can exist as a single unit is:
A. Consistency
B. Durability
C. Isolation
D. Atomicity
47. It is clear that nowadays most organizations are developing database systems over their file
management system that they are using before. So, why do you think that organizations
prefer database management systems over file management methods?
A. Database Management has simple structure to implement than File Management.
B. File Management supports more files than Database Management systems.
C. File Management provides complex backup/recover than Database Systems
D. Database Management provides rigorous security than File Management.
48. Database Regression test can be done
A. Sometimes
B. Not required
C. Regular basis
D. Occasionally
49. A copy of database is called
A. Instance
B. Alias
C. Sandbox
D. Mailbox
50. When deadlock is detected, the recovery is normally accomplished by
A. Rollback of transaction
B. Locking of data
C. Consistency checking
D. Transaction lock
51. Media recovery refers to recovering database
A. After a system crash
B. After some individual transaction has failed
C. After database has been physically damaged
D. After deadlock
52. Which one of the following is an integrated part of database that can restore the database to
the consistent state of before failure?
A. Recovery scheme
B. Backup scheme
C. Restoring scheme
D. Transaction scheme
53. Which of the following techniques can be used for optimizing backed up data space?
A. Encryption and Deduplication
B. Authentication and Deduplication
C. Compression and Deduplication
D. Deduplication only
54. While SQL operate the power failure occurred, if you want to recover transaction which was
executing at failure time, what you have to
A. take a back up the transaction log, restore the Database from the last full Database backup, and
then restore all the transaction logs
B. Nothing. SQL Server will recover automatically, rolling back pending transactions and rolling
forward committed ones.
C. Nothing. All transactions since the last checkpoint are lost, the effects of the others are in the
Database.
D. Run ROLL FORWARD ALL TRANSACTIONS.
55. Which one describes and explains anything to do with your software product, ranging from
internal documentation for teams to external documentation written for end users.
A. Technical documentation
B. User documentation
C. Development methods
D. Security tester
56. Connecting website to backend servers, processing the data and controlling the behavior of
the higher layers are done by
A. CSS scripts
B. HTML language
C. Server-side PHP scripts
D. Java scripts
57. In which HTML element, we put the JavaScript code?
A. <javascript>...</javascript>
B. <js>...</js>
C. <script>...</script>
D. <css>...</css>
58. Which is the correct syntax to call an external JavaScript file in the current HTML
document?
A. <script src="jsfile.js"></script>
B. <script href=" jsfile.js"></script>
C. <import src=" jsfile.js"></import>
D. <script link=" jsfile.js"></script>
59. A security mechanism used in data communication environment to filter the packets
forwarded to and from the network is referred to be:
A. Cryptography
B. Firewall
C. Biological Biometrics
D. Encryption
60. A small piece of data sent from a website and stored in users web browser while a user is
browsing a website
A. Web cookie
B. Web cache
C. Web client
D. Web firewall
61. The systems development life cycle is:
A. a method for testing new IT applications.
B. a structured approach for developing information systems.
C. the analysis and assessment tasks that need to be completed when designing and
developing information systems.
D. a set of guidelines that an end user follows when developing their own business
applications.
62. What document defines the what, when, and who questions of systems development
including all activities to be performed, the individuals, or resources, who will perform the
activities, and the time required to complete each activity?
A. Requirements
B. Project plan
C. Project milestones
D. Critical success factors
63. A process intended to ensure that products or services will satisfy expected needs.
A. Quality assurance
B. Accreditation
C. Standardization
D. Quality improvement
64. The first step in developing a plan is ____________________________.
A. Prioritization of problems
B. Situational analysis
C. Putting the plan into action
D. Setting the organizational objectives

65. Set the color of the element with id="para1", to red.


<body>
<h1>This is a heading</h1>
<p id="para1">This is a paragraph</p>
</body>

A. .para1 { color: red;}


B. #para1 { color: red;}
C. para1 { color: red;}
D. #Para { color: red;}
66. Set the style when you mouse over a link (hover) to blue.

<body>
<h1>This is a heading</h1>
<p>This is a paragraph</p>
<a href="http://w3schools.com">This is a link</a>
</body>
A. a {color: blue;}
B. hover {color: blue;}
C. a:hover {blue: blue;}
67. If we want to wrap a block of text around an image, which css property will we use ?
A. wrap
B. push
C. float
D. align
68. By default, Hyperlinks are displayed with an underline. How do you remove the underline
from all hyperlinks by using CSS code?
A. a {text: no-underline;}
B. a {text-decoration: none;}
C. a {text-style: no-underline;}
D. a {text-decoration: no-underline;}
69. What does the term Emerging Technology mean?
A. Brand new ideas and systems using technology that are in the design phase which has not
yet started to come out in the market place
B. New technologies that are developed before which will ensure that their minimal impact
on our environment and to make society a better place to live
C. New technologies that are currently developing or will be developed over the next five to
ten years, and which will substantially alter the business and social environment.
D. New design concepts which utilize the many new materials and technologies that have
only recently been developed.
70. Updating or modifying documented client support policy according to the change request by
the client may include the following except:
A. Amend policies to include new client support procedures
B. Issue new policies to clients and users in line with organizational guidelines
C. Maintain policy updates in line with organizational guidelines
D. Issue new policies to clients that penalize them as they seek policy change
71. __________is used to anticipate, react to and recover from events that threaten the
security of information and information assets in the organization.
A. Contingency Plan
B. Action plan
C. Quality assurance plan
D. Manning plan
72. Over a period of time, a system failure may result in a program crash and/or loss of data. As
an IT expert, you are called to restore system files and to restart the system. Which of the
following best describes this activity?
A. Technical Support
B. System Recovery
C. Program Maintenance
D. System enhancement
73. One of the following critical resources needs to be consider in system infrastructure design
plan for system deployment
A. Procedure
B. Network and hardware resources
C. Performance of user
D. Time requirement
74. The most common risk management strategy in web-based system.
A. Acceptance
B. Transference
C. Mitigation
D. Avoidance
75. The process finding the defect and suggesting improvements about the system quality
A. Total Quality Management
B. Quality Planning
C. Prevent and recovery
D. Process Management
76. To bring solution to prevent Database system crash in your company. What action you are
going to take
A. Test the solution in a similar organization
B. Gather more information about the issue
C. Document the issue and the solution that has implemented
D. Escalate the issue
77. Commercial Bank of Ethiopia would like to distribute to all branches about business
applications across multiple locations and computer systems, reserving the data center for
Web server, database, and telecommunications functions. This is example of: -
A. Applications Architecture Planning
B. Enterprise Resource Planning (ERP)
C. Technology Architecture Planning
D. Strategic Planning
78. The first official activity of the project team as it initiates the project planning phase is to
A. Define the business problem
B. Staff the project team
C. Develop a cost/benefit analysis
D. Write a project proposal
79. Mr’s Alemu was ICT technician for ABC PLC company. He is responsible for
interpreting system requests and specifications, site preparation and user training, and
contact point for customers. This skill is
A. Leadership
B. Customer relations
C. Conflict Management
D. Team management
80. All of the following are key elements are which used to implementing a comprehensive
Disaster Recovery Program EXCEPT
A. Non Critical Application Assessment
B. Back-Up Procedures
C. Recovery Procedures
D. Implementation Procedure
81. Which of the following CSS selectors are used to specify a group of elements?
A.tag
B.id
C.class
D. collector
82. Which of the following CSS property is used to make the text bold?
A. text-decoration: bold
B. font-weight: bold
C. font-style: bold
D. text-align: bold
83. Which of the following is the correct syntax to link an external style sheet in the HTML file?
A.<linkrel=”stylesheet”href=”style.css”/>
B.<linkrel=”stylesheet”src=”style.css”/>
C.<stylerel=”stylesheet”src=”style.css”/>
D. <style rel=”style sheet” link=”style.css” />
84. What will be the output of the following CSS code snippet?
span {
border: 1px solid red;
outline: green dotted thick;
}

A. All span elements will have a green thick border and a red outline
B. All span elements will have a red border and a green dotted outline
C. All span elements will have a outer green dotted border and an inner red border
D. All span elements will have an outer red border and inner green dotted border
85. Which of the following is the correct syntax to make the background-color of all paragraph
elements to yellow?
A. p {background-color : yellow;}
B. p {background-color : #yellow;}
C. all {background-color : yellow;}
D. all p {background-color : #yellow;}
86. Which of the following is true about Javascript
A. It is a server side scripting language
B. It is client side scripting language
C. It is a Software
D. It is a database
87. One of the following is included in web and database need strategy
A. Evaluate current financial requirement
B. Business benefit
C. Evaluate impact of changes
D. People involvement
88. Maintain and keep standard course of actions set by the various system development
methodology in order to insure the expected outcome is names as
A. Activity control quality
B. Process quality.
C. Product quality.
D. Total Quality Management.
89. Which of the following is true?
A. Data can be recovered slower in online backup
B. Tape library is not an example of near line storage
C. Data recovery can take hours for offline backup
D. Data recovery from optical devise is faster than tape
90. the most important role of a systems analyst in business is
A. Technical understanding of information systems
B. Problem solving
C. Knowing what data needs to be stored and used
D. Special programming skills
91. Which one of the following refers to the division of a system into processes or subsystems
A. System design
B. Data management
C. Programming
D. Functional decomposition
92. Changes in software development, technology, and business practices have created many
new career opportunities for analysts, which one of the follow will be an opportunity:-
A. Sales and support of software
B. Auditing, compliance, and security
C. Web development
D. Architectural design
93. The horizontal bar chart that depicts project task against the calendar
A. Budget break down
B. Schedule
C. Manning
D. Functional break down
94. Comprehensive approach to facilitate quality improvements and management
A. Time management
B. Quality control
C. Recovery plan
D. Assure procedures
95. A technique that seeks to alter the nature of the work done in a business function, with the
objective of radically improving performance, is called
A. Business Process Reengineering
B. Strategic Planning
C. Information Systems Strategic Planning
D. Enterprise Resource Planning
96. The last step of the analyst's approach to problem solving is
A. Decide which solution is best, and make a recommendation
B. Monitor to make sure that you obtain the desired results
C. Verify that the benefits of solving the problem outweigh the costs
D. Implement the solution
97. Which type of data can NOT be stored in the database?
A. Image oriented data
B. Text, files containing data
C. Data in the form of audio or video
D. JSON
98. Which of the following is a feature of the database?
A. No-backup for the data stored
B. User interface provided
C. Lack of Authentication
D. Store data in multiple locations
99. Suppose the database consists of multiple transactions that are used to manage
organization’s group of related data. So, which database attribute best describes the
characteristics of a transaction that it shouldn’t be divided or split rather it can exist as a
single unit is __________________?
A. Consistency
B. Durability
C. Isolation
D. Atomicity
100. It is clear that nowadays most organizations are developing database systems over their
file management system that they are using before. So, why do you think that
organizations prefer database management systems over file management methods?
A. Database Management has simple structure to implement than File Management.
B. File Management supports more files than Database Management systems.
C. File Management provides complex backup/recover than Database Systems
D. Database Management provides rigorous security than File Management.

You might also like