Model Exam Questions 51 - 75


51. Which one of the following statements about normal forms is FALSE?
a) Lossless, preserving decomposition into 3NF is always possible
b) Lossless, preserving decomposition into BCNF is always possible
c) Any relation with two attributes is in BCNF
d) BCNF is stronger than 3NF
52. Views are useful for _____ unwanted information, and for collecting together information from more than one relation into a single view.
a) Hiding
b) Deleting
c) Highlighting
d) All of the above
53. Value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation.
a) Logical Integrity
b) Referential Integrity
c) Domain Integrity
d) Data Integrity
54. Data Abstraction level deals with Application programs
a) Physical
b) Conceptual
c) View
d) None of these
55. Which SQL clause is used to search for a specified pattern in a column?
a) GET
b) FROM
c) LIKE
d) None of these
56. The Rollback command falls under the SQL category
a) DDL
b) DML
c) DCL
d) TCL
57. Which clause was added to SQL because the WHERE keyword could not be used with aggregate functions
a) HAVING
b) GROUP BY
c) ORDER BY
d) NONE OF THESE
58. The set of permitted values for each attribute is called its
a) Attribute set
b) attribute range
c) domain
d) Group
59. Transaction X holds a shared lock R. if transaction Y requests for a shared lock on R :
a) result in deadlock situation
b) Immediately Granted
c) Immediately rejected
d) Granted as is released by X
60.Database applications were built directly on top of file system to overcome the following drawbacks of using filesystems
(1) Data redundancy and inconsistency
(2) Difficulty in accessing Data
(3) Data isolation
(4) Integrity problems

a) (1)
b) (1) and (4)
c) (1), (2) and (3)
d) (1), (2), (3) and (4)
61. In Computer Networks the term 'OWC' related with
a) WiFi
b) RFID
c) LiFi
d) Blue ray Disc
62. FTP server listens for connection on port number
a) 20
b) 21
c) 22
d) 23
63. Encryption method that applies a deterministic algorithm along with a symmetric key to encrypt text
a) Stream Cipher
b) Block Cipher
c) Text Cipher
d) None of these
64. Function of presentation layer in OSI model
a) character-code translation
b) data conversion
c) data encryption
d) All of these
65. 191.255.0.0 is a
a) Class A
b) Class B
c) Class C
d) None of these
66. Gateway function in the ...................... layer.
a) Physical
b) Data link
c) Network
d) All the above layers
67. Which allows the transmission of signals in both directions but not simultaneously.
a) Simplex
b) half-duplex
c) full-duplex
d) automatic
68. Hamming code is a
a) Error detection code
b) Error correction code
c) Error Predicting code
d) None of these
69. http error code for forbidden
a) 404
b) 403
c) 401
d) 400
70.IEEE 802.15.1 standard indicates
a) Wireless LAN
b) Bluetooth
c) WiMAX
d) LiFi
71. Who coined the term ‘Computer Virus’?
a)Frederick Cohen
b)William Gibson
c)John Von Neumann
d)Charles Babbage


72. Attempt to acquire sensitive information such as passwords and credit card details by masquerading as a trustworthy entity.
a)Phishing
b)Spoofing
c)Hacking
d)None of these
73. Process of ‘knowledge discovery in databases' is
a) Data tuning 
b) Data Diddling 
c) Data Fragmentation 
d) Data Mining
74. The term ‘Quarantine’ related with
a)Operating system
b)MS Office
c)DTP
d)Anti Virus
75. Which technology is used in the processor of a computer to simulates a single processor into tow virtual processors to the operating system?
a)Hyper Threading Technology
b)Multi Core Technology
c)Simulation Technology
d)Multi Threading Technology 


  Model Exam Questions 76 - 100

 

Comments

Post a Comment