Documente Academic
Documente Profesional
Documente Cultură
Gagan@9855689837
DEEP INSTITUTE OF MANGEMENT ®
32.
32 The design of the network is called
the network:
(A) architecture
(B) server
(C) transmission no somoking…….
somoking .
(D) type
(E) None of these
ANS (A)
33. The most frequently used instructions
of a computer program are likely to be
fetched from:
(A) the hard disk 35. Personal logs or journal entries posted on the
(B) cache memory Web are known as:
(C) RAM (A) listservs
(D) registers (B) Webcasts
(C) blogs
(E) None of these
(D) subject directories
ANS (B) (E) None of these
34. The ____________ contains data ANS (C)
descriptions and defines the name, data 36. A(n) _______ uses pictures (called icons) and
type, and length of each field in the menus displayed on the screen to send commands
database. to the computer system.
(A) data dictionary (A) command – based user interface
(B) GUI
(B) data table
©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.
Gagan@9855689837 2008
(C) system utility triggered by the passage of time or on a certain
(D) API date.
(E) None of these (A) Boot-sector viruses
ANS (B) (B) Macro viruses
37. The _____ manual tells you how to use a (C) Time bombs
software program. (D) Worms
(A) documentation (E) None of these
(B) programming Ans (C)
(C) technical 43.
43 Linux is a (n) ____________ operating
(D) user system.
(E) None of these (A) open-source
ANS () (B) Microsoft
38. Which of the following is NOT a type of (C) Windows
broadband Internet connection? (D) Mac
(A) Cable (E) None of these
(B) DSL ANS (A)
(C) Dial-up 44. What is a backup?
(D) Satellite (A) Restoring the information backup
(E) None of these (B) An exact copy of a system’s information
ANS (C) (C) The ability to get a system up and running in
39. Software, such as viruses, worms and Trojan the event of a system crash or failure
horses, that has a malicious intent, is known as: (D) All of these
(A) spyware (E) None of these
(B) adware ANS (D)
(C) spam 45.
45 Which of the following places the common
(D) malware data elements in order from smallest to largest
(E) None of these (A) character, file, record, field, database
ANS (D) (B) character, record, field, database, file
40. Making a field ______ means that it cannot (C) character, field, record, file, database
be left blank. (D) Bit, byte, character, record, field, file,
(A) numeric database,
(B) required (E) None of these
(C) calculated ANS (C)
(D) validated 46.
46 The internet is ……
(E) None of these (A) a large network of networks
ANS (B) (B) an internal communication system for a
41 _________ is the process of finding errors in business
41.
software code. (C) a communication system for the Indian
(A) Debugging government
(B) Compiling (D) All of these
(C) Testing (E) None of these
(D) Running ANS (D)
(E) None pf these 47.
47 ____________ are lists of commands that
ANS (C) appear on the screen.
42. ____________ are viruses that are (A) GUIs
(e) None of these 7. Which of the following does not describe a data
warehouse?
4. Which error detection method uses one’s (a) Subject-oriented
complement arithmetic?
(b) Integrated
(a) Simply parity check
(c) Time-variant
(b) Checksum
(d) Updateable
(c) Two-dimensional parity check
(e) None of these
(d) CRC
8. Which of the following is true ?
(e) None of these (a) Logical design is software-dependent
5. A result of a computer virus can not lead to (b) In a distributed database, database is stored
___. in one physical location
(a) Disk Crash
(c) Conceptual design translates the logical design
(b) Mother Board Crash into internal model
6. The network interface card of LAN is related to (a) ensures that only the correct data type is
following layer of OSI Model- entered into a field
(a) carries out, the details of an object for (b) The type of database
(b) hides, the details of an object from (c) The user’s perspective
(c) reveals, the details of an object to (d) The business practices and policies
(b) begin the line with double slashes (/ /) (b) Forward DNS lookup
(c) begin and end the line with double hyphens (-_-(c) Data-Link layer
)
(d) File Transfer Protocol
(d) indent the line
(e) Common gateway interface
(e) None of these
21. Three SQL, DDL, CREATE commands are__.
18. Programming language built into user
programs such as Word and Excel are known (a) Schema, Base and Table
as____
(b) Base, Table and Schema
(a) 4GLs
(c) Key, Base and Table
(b) macro languages
(d) Schema, Table and View
(c) object-oriented languages
(e) None of these
(d) visual programming languages
(c) sent only upon the client’s request (c) Tiger team
(d) sent in complete copies for the client to filter (d) Serverless backup
and sort
(e) Logical unit
(e) sent from the client to the server for
processing
7) RAM is . . .
3) Which system might have hundreds of a) Filename extension
terminals that send input to a cabinet-sized b) Monitor resolution
computer for processing? c) Temporary storage zone
a) Personal digital assistant Data on magnetic tape
b) Mainframe
c) Notebook computer
d) Desktop microcomputers
gdeep95@gmail.com
28) Which type of computer links to other
computers so that data, programs, and
peripheral devices can be shared?
a) Supercomputer