Model Exam Questions 51 - 75
51.
Which one of the
following statements about normal forms is FALSE?
a) Lossless, preserving decomposition into 3NF is always possible
b) Lossless, preserving decomposition into BCNF is always possible
c) Any relation with two attributes is in BCNF
d) BCNF is stronger than 3NF
a) Lossless, preserving decomposition into 3NF is always possible
b) Lossless, preserving decomposition into BCNF is always possible
c) Any relation with two attributes is in BCNF
d) BCNF is stronger than 3NF
52.
Views are useful
for _____ unwanted information, and for collecting together
information from more than one relation into a single view.
a) Hiding
b) Deleting
c) Highlighting
d) All of the above
a) Hiding
b) Deleting
c) Highlighting
d) All of the above
53.
Value that appears
in one relation for a given set of attributes also appears for a
certain set of attributes in another relation.
a) Logical Integrity
b) Referential Integrity
c) Domain Integrity
d) Data Integrity
a) Logical Integrity
b) Referential Integrity
c) Domain Integrity
d) Data Integrity
54.
Data Abstraction
level deals with Application programs
a)
Physical
b)
Conceptual
c)
View
d)
None of these
55.
Which SQL clause is used to search for a specified pattern in a
column?
a) GET
b) FROM
c) LIKE
d) None of these
a) GET
b) FROM
c) LIKE
d) None of these
56.
The Rollback command falls under the SQL category
a)
DDL
b)
DML
c)
DCL
d)
TCL
57.
Which clause was added to SQL because the WHERE keyword could not be
used with aggregate functions
a)
HAVING
b)
GROUP BY
c)
ORDER BY
d)
NONE OF THESE
58.
The set of permitted values for each attribute is called its
a) Attribute set
b) attribute range
c) domain
d) Group
a) Attribute set
b) attribute range
c) domain
d) Group
59.
Transaction X holds a shared lock R. if transaction Y requests for a
shared lock on R :
a) result in deadlock situation
b) Immediately Granted
c) Immediately rejected
d) Granted as is released by X
60.Database applications were built directly on top of file system to overcome the following drawbacks of using filesystems
(1) Data redundancy and inconsistency
(2) Difficulty in accessing Data
(3) Data isolation
(4) Integrity problems
a) (1)
b) (1) and (4)
c) (1), (2) and (3)
d) (1), (2), (3) and (4)
a) result in deadlock situation
b) Immediately Granted
c) Immediately rejected
d) Granted as is released by X
60.Database applications were built directly on top of file system to overcome the following drawbacks of using filesystems
(1) Data redundancy and inconsistency
(2) Difficulty in accessing Data
(3) Data isolation
(4) Integrity problems
a) (1)
b) (1) and (4)
c) (1), (2) and (3)
d) (1), (2), (3) and (4)
61.
In Computer Networks the term 'OWC' related with
a)
WiFi
b)
RFID
c)
LiFi
d)
Blue ray Disc
62.
FTP server listens for connection on port number
a) 20
b) 21
c) 22
d) 23
a) 20
b) 21
c) 22
d) 23
63.
Encryption method
that applies a deterministic algorithm along with a symmetric key to
encrypt text
a)
Stream Cipher
b)
Block Cipher
c)
Text Cipher
d)
None of these
64.
Function of
presentation layer in OSI model
a)
character-code translation
b)
data conversion
c)
data encryption
d)
All of these
65.
191.255.0.0 is a
a)
Class A
b)
Class B
c)
Class C
d)
None of these
66.
Gateway function in the ...................... layer.
a) Physical
b) Data link
c) Network
d) All the above layers
a) Physical
b) Data link
c) Network
d) All the above layers
67.
Which allows the transmission of signals in both directions but not
simultaneously.
a)
Simplex
b) half-duplex
c) full-duplex
d) automatic
b) half-duplex
c) full-duplex
d) automatic
68.
Hamming
code
is a
a)
Error detection code
b)
Error correction code
c)
Error Predicting code
d)
None of these
69.
http error code for forbidden
a)
404
b)
403
c)
401
d)
400
70.IEEE
802.15.1 standard indicates
a)
Wireless LAN
b)
Bluetooth
c)
WiMAX
d)
LiFi
71. Who coined the term ‘Computer Virus’?
a)Frederick Cohen
b)William Gibson
c)John Von Neumann
d)Charles Babbage
71. Who coined the term ‘Computer Virus’?
a)Frederick Cohen
b)William Gibson
c)John Von Neumann
d)Charles Babbage
72.
Attempt
to acquire sensitive information such as passwords and credit card
details by masquerading as a trustworthy entity.
a)Phishing
b)Spoofing
c)Hacking
d)None of these
73. Process of ‘knowledge discovery in databases' is
a) Data tuning
a)Phishing
b)Spoofing
c)Hacking
d)None of these
73. Process of ‘knowledge discovery in databases' is
a) Data tuning
b) Data
Diddling
c) Data
Fragmentation
d) Data
Mining
74. The term ‘Quarantine’ related with
a)Operating system
b)MS Office
c)DTP
d)Anti Virus
75. Which technology is used in the processor of a computer to simulates a single processor into tow virtual processors to the operating system?
a)Hyper Threading Technology
b)Multi Core Technology
c)Simulation Technology
d)Multi Threading Technology
Model Exam Questions 76 - 100
74. The term ‘Quarantine’ related with
a)Operating system
b)MS Office
c)DTP
d)Anti Virus
75. Which technology is used in the processor of a computer to simulates a single processor into tow virtual processors to the operating system?
a)Hyper Threading Technology
b)Multi Core Technology
c)Simulation Technology
d)Multi Threading Technology
Model Exam Questions 76 - 100
discnatVpor-po_1994 Marisol Powell https://marketplace.visualstudio.com/items?itemName=caeexpil-me.Tartapolis-gratuita
ReplyDeletecepeconfsa
clysinFraha-1979 Brian Wilson https://www.studyflee.com/profile/Explaindio-2-0-Crack-EXCLUSIVEed-Pepper/profile
ReplyDeletehortidasu
Mneucomtasu Nick Alvarado Pinnacle Studio
ReplyDeleteWaves Complete 14 (17.08.22)
Gridinsoft Anti-Malware 4.1.94.5314
Autodesk AutoCAD 3D 2023.1 x64
odachebin
Wscurimvebi Maria Cardoso Link
ReplyDeleteAwesome
Software
cuichanbire