1. Which of the following is not an advantage of magnetic disk storage ?
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) None of the above
ANSWER: (d)
2. A prefix for billion which is equal to _____is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10
ANSWER: (a)
3. One kilobyte -byte
(a) 1250
(b) 2088
(c) 1024
(d) 1000
ANSWER: (c)
4. To move the cursor to the end of the document
press
(a) Ctrl + Esc
(b) Ctrl + End
(c) Ctrl + B
(d) Ctrl + c
ANSWER: (B)
5. The shortcut key to print documents is
(a) Ctrl + A
(b) Ctrl + B
(c) Ctrl + P
(d) Ctrl + C
ANSWER: (c)
6. In MICR, C stands for
(a) Code
(b) Colour
(c) Computer
(d) Character
(e) None of these
ANSWER: (d)
7. The simultaneous processing of two or more
Programs by multiple processors is
(a) Multiprogramming
(b) Multitasking
(c) Time-sharing
(d) Multiprocessing
(e) None of these
ANSWER: (d)
8. First layer in the OSI reference model is
(a) Data link
(b) Network
(c) Physical
(d) Application
ANSWER: (c)
9. Viruses, Trojan horses and worms are
(a) Able to harm computer system
(b) Unable to detect if affected on computer
(c) User-friendly applications
(d) Harmless applications resident on computer
ANSWER: (a)
10. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both ‘a’ and ‘b’
(d) Light
ANSWER: (c)
11. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above
ANSWER (b)
12. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons
ANSWER (d)
13. Accessing records from a file directly without
searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time
ANSWER (c)
14. Database redesign is not terribly difficult if the
(a) Database is structured
(b) Database is well-designed
(c) Database has no data
(d) Database is relatively small
ANSWER (c)
15. Which of the following SQL statements are helpful in database redesign ?
(a) Correlated sub queries only
(b) EXISTS/ NOT EXISTS expressions only
(c) Both of the above are helpful
(d) Creating the database are helpful
ANSWER (c)
16. The EXISTS keyword will be true if
(a) Any row in the sub query meets the condition only
(b) All rows in the sub query fail the condition only
(c) Both of these two conditions are met
(d) Neither of these two conditions is met
ANSWER (a)
17. How can you find rows that do not match some specified condition ?
(a) EXISTS
(b) Double use of NOT EXISTS
(C) NOT EXISTS
(d) ROWS EXIT
ANSWER (c)
18. The process of reading a database schema and producing a data model from that schema is known
as
(a) Data modeling
(b) Database design
(c) Reverse engineering
(d) Inverse engineering
ANSWER (c)
19. Which SQL-92 standard SQL command can be used to change a table name ?
(a) RENAME TABLE
(b) CHANGE TABLE
(c) ALTER TABLE
(d) None of the above is correct
ANSWER (a)
20. What SQL command can be used to delete
columns from a table ?
(a) MODIFY TABLE Table Name DROP COLUMN Column Name
(b) MODIFY TABLE Table Name DROP Column Name Column Name
(d) ALTER TABLE Table Name DROP Column Name
ANSWER (c)
21. Which of the following modifications may not succeed?
(a) Changing a column data type from char to date
(b) Changing a column data type from numeric to char
(c) Both of the above actions should succeed
(d) Neither of the above actions will succeed
ANSWER (a)
22. Changing cardinalities in a database is
(a) A common database design task
(b) A rare database design task, but does occur
(c) A database design task that never occurs
(d) Is impossible to do, so a new database must be constructed and the data moved into it
ANSWER (a)
23. A regular sub query can be processed
(a) From the top down
(b) From the bottom up
(c) By nesting
(d) From the right up
ANSWER (b)
24. How many copies of the database schema are typically used in the redesign process ?
(a) One
(b) Two
(c) Three
(d) Four
ANSWER (c)
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) None of the above
ANSWER: (d)
2. A prefix for billion which is equal to _____is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10
ANSWER: (a)
3. One kilobyte -byte
(a) 1250
(b) 2088
(c) 1024
(d) 1000
ANSWER: (c)
4. To move the cursor to the end of the document
press
(a) Ctrl + Esc
(b) Ctrl + End
(c) Ctrl + B
(d) Ctrl + c
ANSWER: (B)
5. The shortcut key to print documents is
(a) Ctrl + A
(b) Ctrl + B
(c) Ctrl + P
(d) Ctrl + C
ANSWER: (c)
6. In MICR, C stands for
(a) Code
(b) Colour
(c) Computer
(d) Character
(e) None of these
ANSWER: (d)
7. The simultaneous processing of two or more
Programs by multiple processors is
(a) Multiprogramming
(b) Multitasking
(c) Time-sharing
(d) Multiprocessing
(e) None of these
ANSWER: (d)
8. First layer in the OSI reference model is
(a) Data link
(b) Network
(c) Physical
(d) Application
ANSWER: (c)
9. Viruses, Trojan horses and worms are
(a) Able to harm computer system
(b) Unable to detect if affected on computer
(c) User-friendly applications
(d) Harmless applications resident on computer
ANSWER: (a)
10. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both ‘a’ and ‘b’
(d) Light
ANSWER: (c)
11. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above
ANSWER (b)
12. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons
ANSWER (d)
13. Accessing records from a file directly without
searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time
ANSWER (c)
14. Database redesign is not terribly difficult if the
(a) Database is structured
(b) Database is well-designed
(c) Database has no data
(d) Database is relatively small
ANSWER (c)
15. Which of the following SQL statements are helpful in database redesign ?
(a) Correlated sub queries only
(b) EXISTS/ NOT EXISTS expressions only
(c) Both of the above are helpful
(d) Creating the database are helpful
ANSWER (c)
16. The EXISTS keyword will be true if
(a) Any row in the sub query meets the condition only
(b) All rows in the sub query fail the condition only
(c) Both of these two conditions are met
(d) Neither of these two conditions is met
ANSWER (a)
17. How can you find rows that do not match some specified condition ?
(a) EXISTS
(b) Double use of NOT EXISTS
(C) NOT EXISTS
(d) ROWS EXIT
ANSWER (c)
18. The process of reading a database schema and producing a data model from that schema is known
as
(a) Data modeling
(b) Database design
(c) Reverse engineering
(d) Inverse engineering
ANSWER (c)
19. Which SQL-92 standard SQL command can be used to change a table name ?
(a) RENAME TABLE
(b) CHANGE TABLE
(c) ALTER TABLE
(d) None of the above is correct
ANSWER (a)
20. What SQL command can be used to delete
columns from a table ?
(a) MODIFY TABLE Table Name DROP COLUMN Column Name
(b) MODIFY TABLE Table Name DROP Column Name Column Name
(d) ALTER TABLE Table Name DROP Column Name
ANSWER (c)
21. Which of the following modifications may not succeed?
(a) Changing a column data type from char to date
(b) Changing a column data type from numeric to char
(c) Both of the above actions should succeed
(d) Neither of the above actions will succeed
ANSWER (a)
22. Changing cardinalities in a database is
(a) A common database design task
(b) A rare database design task, but does occur
(c) A database design task that never occurs
(d) Is impossible to do, so a new database must be constructed and the data moved into it
ANSWER (a)
23. A regular sub query can be processed
(a) From the top down
(b) From the bottom up
(c) By nesting
(d) From the right up
ANSWER (b)
24. How many copies of the database schema are typically used in the redesign process ?
(a) One
(b) Two
(c) Three
(d) Four
ANSWER (c)
No comments:
Post a Comment