nddc it
nddc it
B. FORTRAN
C. BASIC
D. PASCAL
2. A computer assisted method for the recording and analyzing of existing or hypothetical systems
is
A. Data transmission
B. Data flow
C. Data capture
D. Data processing
B. Memory
C. CPU
D. Control unit
4. What difference does the 5th generation computer have from other generation computers?
A. Technological advancement
B. Scientific code
B. PROLOG
C. C
D. COBOL
6. The tracks on a disk which can be accessed without repositioning the R/W heads is
A. Surface
B. Cylinder
C. Cluster
B. 110
C. 11
D. 10
B. SVC
C. IP
D. MDR
B. Storage unit
C. Logic unit
D. Control unit
B. 10
C. 8
D. 16
B. Interpreter
C. Assembler
D. Comparator
12. The time required for the fetching and execution of one simple machine instruction is
A. Delay time
B. CPU cycle
C. Real time
D. Seek time
B. Effective time
C. Access time
D. Real time
15. Which access method is used for obtaining a record from a cassette tape?
A. Direct
B. Sequential
C. Random
16. Any type of storage that is used for holding information between steps in its processing is
A. CPU
B. Primary storage
C. Intermediate storage
D. Internal storage
17. A name applied by Intel corp. to high speed MOS technology is called
A. HDLC
B. LAP
C. HMOS
D. SDLC
18. A program component that allows structuring of a program in an unusual way is known as
A. Correlation
B. Coroutine
C. Diagonalization
D. Quene
20. The section of the CPU that selects, interprets and sees to the execution of program
instructions
A. Memory
B. Register unit
C. Control unit
D. ALU
21. Which type of system puts the user into direct conversation with the computer through a
keyboard?
A. Real time processing
B. Interactive computer
C. Batch processing
D. Time sharing
22. The term referring to evacuating the content of some part of the machine is known as
A. Dump
B. Enhancement
C. Down
D. Compiler
B. Frame
C. Block
D. Group
E. None of the above
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss in Forum Workspace Report
B. Interrogation
C. Heuristic
B. Interface
C. Surface
26. The examination and changing of single bits or small groups of his within a word is called
A. Bit
B. Byte
C. Bit manipulation
D. Bit slice
B. Super computer
C. Micro computer
D. Mainframe
B. Dialup
C. Diagnostic
D. Logic circuit
29. How many bit code is used by Murray code for TELEPRINTER machines.
A. 4
B. 5
C. 9
D. 25
B. Mnemonics
C. Assembler
B. 1
C. 10
D. 12
B. PL/CT
C. PL/M
D. PLA
33. A datum that indicates some important state in the content of input or output is
A. Sequence
B. Sentinel
C. SIO
D. Sibling
E. None of the above
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss in Forum Workspace Report
B. APL
C. Army
D. PL/1
B. ENIAC
C. Abacus
D. UNIVAC
B. Seek time
C. Rotational delay
D. Access time
37. A number that is used to control the form of another number is known as
A. Map
B. Mask
C. Mamtossa
D. Marker
38. A general purpose single-user microcomputer designed to be operated by one person at a time
is
A. Special-purpose computer
B. KIPS
C. M
D. PC
40. Which device of computer operation dispenses with the use of the keyboard?
A. Joystick
B. Light pen
C. Mouse
D. Touch
41. The microcomputer, Intel MCS-80 is based on the widely used Intel
A. 8080 microprocessor
B. 8085 microprocessor
C. 8086 microprocessor
D. 8082 microprocessor
42. Which is a machine-oriented high-level language for the GEC 4080 series machines.
A. LOGO
B. SNOBOL
C. Babbage
D. ALGOL
43. A program that is employed in the development, repair or enhancement of other programs is
known as
A. System software
B. Software tool
C. Applications program
D. Utility program
E. None of the above
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss in Forum Workspace Report
44. Any storage device added to a computer beyond the immediately usable main storage is known
as
A. Floppy disk
B. Hard disk
C. Backing store
D. Punched card
45. Which output device is used for translating information from a computer into pictorial form on
paper.
A. Mouse
B. Plotter
C. Touch panel
D. Card punch
B. Algorithm
C. Flowchart
D. Utility programs
C. boot.ini
D. CONFIG.SYS
B. bad ram
C. slow processor
B. power surges
C. EMI.
4. When installing PCI NICS you can check the IRQ availability by looking at
A. dip switches
B. CONFIG.SYS
C. jumper settings
D. motherboard BIOS
B. a fiber speed
B. AT
C. BABY AT
7. A hard disk is divided into tracks which are further subdivided into:
A. clusters
B. sectors
C. vectors
D. heads
B. Capacitor
C. Voltmeter
D. Resistor
B. RS-232a
C. CAT 5
D. IEEE 1284
10. In laser printer technology, what happens during the conditioning stage?
A. The corona wire places a uniform positive charge on the paper
B. Silicone spray
C. Denatured alcohol
D. All-purpose cleaner
B. Expansion board
C. Monitor
D. Keyboard
13. To view any currently running Terminate Stay Resident (TSR's) programs you could type:
A. Memory
B. MEM
C. SYS /M
D. Memmaker
14. Which type of system board is the MOST likely candidate for processor upgrading if you want
maximum performance and future compatibility?
A. ML
B. PCI
C. ISA
D. EISA
15. Suppose that you have a the maintenance package identifies several possible field replaceable
units (FRUs) that will resolve the problem. What should you do after turning the power off?
Replace the indicated parts, one at a time in the recommended sequence, until the
A.
problem is resolved; return unused FRUs to stock
Replace all of the indicated FRUs at once and return the machine to the customer if the
B.
problem is resolved
Follow the same procedure as in ays replace the system board first if it is on the list of
C. possible FRUs If multiple FRUs are indicated, then software is the most likely source of
the problem
16. Most PCs give a single beep on bootup to indicate they are ok hardware wise. You boot your PC
and don't get a beep. What should you check first?
A. system board
B. RAM
C. microprocessor
D. power supply
E. speaker
Answer: Option E
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss in Forum Workspace Report
17. Which peripheral port provides the FASTEST throughput to laser printers?
A. RS-232
B. SCSI
C. Parallel
D. Serial
E. None of the above
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss in Forum Workspace Report
18. The mouse pointer moves erratically, what is the possible cause? The mouse
A. ball is dirty
B. is not connected
B. in series
20. Your customer tells you the print quality of their dot matrix printer is light then dark. Which of the
following could cause the problem.
A. Paper slippage
C. Paper thickness
D. Head position
B. SCSI drive
C. IDE drive
D. Zip drive
22. The terms "red book", "yellow book", and "orange book" refer to:
A. SCSI
B. ide
D. CD-ROM standards
23. On the 16-bit ISA bus, IRQ2 is elevated to which higher level Interrupt?
A. 9
B. 11
C. 13
D. 15
B. no beep
25. To view any currently running Terminate Stay Resident (TSR's) programs you could type:
A. Memory
B. MEM
C. SYS /M
D. Memmaker
26. Which part of the laser printer should NOT be exposed to sunlight?
A. Transfer corona assembly
B. PC drum
D. Toner cartridge
27. After doing a low-level format, what would be the next step in configuring the hard drive in a
system?
A. Format DOS partition
B. Install operating system
B. Amps
C. Watts
D. Ohms
29. What command is used to reset a MODEM when using the "AT Command Set"?
A. ATR
B. ATZ
C. DTR
D. DCE
30. When installing a SCSI CD-ROM drive, you must set the CD-ROM SCSI adapter to:
A. B0007
D. SCSI ID=1
33. When your hard drive crashes from any of the correct selections in the question above, or from
dropping it, it is known as head-to-disk interference, or HDL
A. True
B. False
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss in Forum Workspace Report
34. What tool is used to test serial and parallel ports?
A. high volt probe
B. cable scanner
D. sniffer
B. Expansion board
C. Monitor
D. Keyboard
36. What is the highest binary number that can be referred to on a three position jumper block?
A. 4
B. 6
C. F
D. 1
B. + 5 volts
C. + 8 volts
D. +3.3 volts
B. ROM BIOS
C. DMA controller
E. power supply
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss in Forum Workspace Report
40. A 25-pin female connector on the back of your computer will typically be:
A. Serial port 1
B. A parallel port
C. Docking
D. COM2 port
42. You were installing an application in Windows 95, and the computer crashes, what do you do?
A. press alt + Ctrl + delete, twice
B. parallel ports
C. game ports
D. networks
E. digital frequencies
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss in Forum Workspace Report
44. You just installed a new IDE hard drive, but your system BIOS will not recognize the new drive,
what should you check first.
A. cable sequence
C. Is an operational error
B. Ground to bend
C. To another device
D. Chassis ground
47. Topically, how many type III PC cards can you insert in a laptop
A. 1
B. 2
C. 3
D. 4
48. What is the first thing you could do to check for damage to a printer after receiving it?
A. Run MSD diagnostics
49. You have a system that periodically locks up. You have ruled out software, and now suspect that
it is hardware. What should you do first that could help you narrow it down to the component at
fault?
A. rotate the RAM
currently, there is a very high demand for them, particularly from firms that use personal
D.
computers
B. the computer
C. terminals
B. warehouse capacity
C. materials
D. materials in hand
B. static model
C. deterministic model
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
B. AI
C. KBS
D. Base rule 0
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
B. CDP
C. CISA
D. ACM
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
9. The computer can potentially be used to monitor most of our actions, thus robbing us of _____
A. tapping
B. privacy
C. back log
D. security
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option D
Explanation:
11. A financial modeling package for a PC is similar to a spreadsheet package, but it can handle
larger data files than a spreadsheet, and it has a built-in _____ seeking function.
A. aim
B. target
C. goal
D. plan
E. None of the above
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
12. _____ means that the manager spends his or her time dealing with exceptions or those
situations which are out of control
A. relevant
B. management by exception
C. predictive reports
D. control
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
13. _____ decisions are those decisions for which policy standards or guidelines are already
established.
A. programmable
B. control
C. predictive reports
D. relevant
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
14. _____ is the use of a model in an attempt to identify and/or reflect the behaviour of a real
person, process, or system.
A. master
B. decision
C. plan
D. simulation
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
15. One of the three most common types of payment systems is the
A. pinion fund transaction system
Answer: Option D
16. Which of the following is not an important principle for evaluating the raw data for decision-
making:
A. selection
B. pattern
C. everage
D. overview
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
17. The analysis and design of application systems are the responsibility of a _____
A. Computer Operator
B. Programmer
C. System Analyst
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
18. The model curriculum for information-system education suggested by the _____ has a more
theoretical and conceptual basis, whereas the model by the _____ is more practical and applied
in nature.
A. AI, ES
B. KBS, AI
C. ACM, DPMA
D. SISD, MMD
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
19. _____ decisions concern the execution of specific tasks to assure that they are. carried out
efficiently and effectively.
A. tactical
B. strategic
C. operational
D. management
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
B. a computer device
C. a communication technique
Answer: Option D
Explanation:
B. demand reports
C. exception reports
D. predictive reports
E. management reports
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
22. A constraint that does not, affect the feasible solution region is known as
A. redundant constraint
B. unbounded solution
C. slack variable
D. surplus variable
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
C. operations file
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
B. statistics
C. mathematics
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option C
B. alternative selection
C. problem identification
D. alternative evaluation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
27. Slack is the calculated time span within which the event must occur:
A. true
B. false
C. cannot be said
D. All of the above
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
28. The online, softcopy display of a customer's charge account to respond to an inquiry is an
example of a(n):
A. regularly scheduled report
B. on-demand report
C. exception report
D. forecasting report
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
29. A _____ is a brief message to an operator that describes what data are to be entered.
A. prompt
B. passwords
C. MIS
D. Tactical
E. None of the above
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
30. A _____ decision is routine one that's made following the completion of a preplanned series of
steps.
A. strategic
B. structured
C. simulation
D. tactical
Answer: Option B
Explanation:
31. Educational programs for the labour union officials are conducted by
A. the firm's industrial relations department
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss in Forum Workspace Report
B. processed
C. changed
D. engineered
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
33. Which of the following is not true of the EDP Auditors Foundation?
A. It publishes a journal, The EDP Auditor
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
B. machines
C. material
D. money
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
B. decision
C. plan
D. control
Answer: Option C
Explanation:
1. How many digits of the DNIC (Data Network Identification Code) identify the country?
A. first three
B. first four
C. first five
D. first six
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
2. A station in a network forwards incoming packets by placing them on its shortest output queue.
What routing algorithm is being used?
A. hot potato routing
B. flooding
C. static routing
D. delta routing
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
3. The probability that a single bit will be in error on a typical public telephone line using 4800 bps
modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for
a communication line using 9-bit frames is approximately equal to
A. 0.003
B. 0.009
C. 0.991
D. 0.999
E. None of the above
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
4. Frames from one LAN can be transmitted to another LAN via the device
A. Router
B. Bridge
C. Repeater
D. Modem
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
5. Which of the following condition is used to transmit two packets over a medium at the same
time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
Answer: Option B
Explanation:
6. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?
A. 255.240.0.0
B. 255.248.0.0
C. 255.252.0.0
D. 255.254.0.0
E. 255.255.255.255
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
7. What are the most commonly used transmission speeds in BPS used in data communication?
A. 300
B. 1200
C. 2400
D. 9600
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
C. 255.255.0.0
D. 255.255.255.0
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
B. protocols
C. gateway
D. multiplexer
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option D
provides communication between the Internet Protocol Software on one machine and the
B.
Internet Protocol Software on another
reports error conditions to the original source, the source must relate errors to individual
C.
application programs and take action to correct the problem
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
12. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing
plant in the suburbs. To enable everyone to share data and resources between the two LANs,
what type of device(s) are needed to connect them? Choose the most correct answer.
A. Modem
B. Cable
C. Hub
D. Router
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
14. How many hosts are attached to each of the local area networks at your site?
A. 128
B. 254
C. 256
D. 64
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
a technique used by protocols in which a lower level protocol accepts a message from a
B.
higher level protocol and places it in the data portion of the low level frame
one of the pieces that results when an IP gateway divides an IP datagram into smaller
C.
pieces for transmission across a network that cannot handle the original datagram size
Answer: Option C
16. Contention is
One or more conductors that serve as a common connection for a related group of
A.
devices
the condition when two or more stations attempt to use the same channel at the same
C.
time
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
17. Avalanche photodiode receivers can detect hits of transmitted data by receiving
A. 100 photons
B. 200 photons
C. 300 photons
D. 400 photons
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
a form of TDMA in which circuit switching is used to dynamically change the channel
C.
assignments
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
19. When you ping the loopback address, a packet is sent where?
A. On the network
B. Down through the layers of the IP architecture and then up the layers again
C. Across the wire
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
20. Which of the following TCP/IP protocol is used for transferring electronic mail messages from
one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
Answer: Option C
Explanation:
21. Which of the following device is used to connect two systems, especially if the systems use
different protocols?
A. hub
B. bridge
C. gateway
D. repeater
22. The synchronous modems are more costly than the asynchronous modems because
A. they produce large volume of data
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
23. A distributed network configuration in which all data/information pass through a central computer
is
A. bus network
B. star network
C. ring network
D. Point-to-point network
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
View Answer Discuss in Forum Workspace Report
24. Which of the following TCP/IP protocol allows an application program on one machine to send a
datagram to an application program on another machine?
A. UDP
B. VMTP
C. X.25
D. SMTP
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
25. A remote batch-processing operation in which data is solely input to a central computer would
require a:
A. telegraph line
B. simplex lines
C. mixedband channel
Answer: Option B
Explanation:
B. a TCP/IP high level protocol for transferring files from one machine to another
27. If you get both local and remote echoes, every character you type will appear on the screen
A. once
B. twice
C. three times
D. never
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
28. What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?
A. 192
B. 192.168.10
C. 0.0.0.5
D. 51
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
B. coaxial cable
C. fiber-optic cable
D. microwaves
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
30. A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data
rate?
A. 3 Kbps
B. 6 Kbps
C. 12 Kbps
D. 24 Kbps.
Answer: Option B
Explanation:
31. Carrier is
One or more conductors that serve as a common connection for a related group of
A.
devices
the condition when two or more sections attempt to use the same channel at the same
C.
time
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
B. WINS Proxy
C. DHCP Server
D. PDC
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
B. zero
C. nonzero
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
34. Which of the following statements is correct for the use of packet switching?
the subdivision of information into individually addressed packets in conjunction with
A. alternative routing arrangement enabled the transmission path to be altered in the event
of congestion or individual link failure
the employment of additional intelligence within the network enabled more sophisticated
B.
error control and link control procedures to be applied
by employing wide bandwidth circuits for the trunk networks substantial economies
C.
through extensive sharing of capacity could be achieved.
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option C
Explanation:
B. 80
C. 79
D. 70
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
37. Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk
Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are
needed to resolve the contention?
A. 7 slots
B. 5 slots
C. 10 slots
D. 14 slots
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
38. Usually, it takes 10-bits to represent one character. How many characters can be transmitted at
a speed of 1200 BPS?
A. 10
B. 12
C. 120
D. 1200
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
39. To connect a computer with a device in the same room, you might be likely to use
A. a coaxial cable
B. a dedicated line
C. a ground station
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
B. Switching alternating
D. Extranets
Answer: Option A
41. How many bits internet address is assigned to each host on a TCP/IP internet which is used in
all communications with the host?
A. 16 - bits
B. 32 - bits
C. 48 - bits
D. 64 - bits
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
42. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to
maximize the number of available hosts?
A. 192
B. 224
C. 240
D. 248
E. 252
Answer: Option E
Explanation:
No answer description available for this question. Let us discuss.
43. Which of the following types of channels moves data relatively slowly?
A. wideband channel
B. voiceband channel
C. narrowband channel
D. broadband channel
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
B. protocol
C. communications hardware
45. Which of the following does not allow multiple users or devices to share one communications
line?
A. doubleplexer
B. multipplexer
C. concentrator
D. controller
Answer: Option A
Explanation:
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
47. Telecommunication networks frequently interconnect an organization with its customers and
suppliers. Select the best fit for answer:
A. Bandwidth alternatives
B. Switching alternating
D. Extranets
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
B. in the early 1960s for military communication systems, mainly to handle speech
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
B. nine-pin connector
C. MAU
D. NIC
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
50. What device separates a single network into two segments but lets the two segments appear as
one to higher protocols?
A. Switch
B. Bridge
C. Gateway
D. Router
Answer: Option B
Explanation:
C. data entry
B. relational
C. network
D. chain
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
C. performance monitoring
D. user coordination
Answer: Option E
Explanation:
No answer description available for this question. Let us discuss.
C. Look-up
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
5. Each of data files has a _____ that describe the way the data is stored in the file.
A. File structure
B. Records
C. Fields
D. Database
Answer: Option A
Explanation:
6. After you _____ a record, many data management the environments require you to issue a
command to save the changes you made.
A. Delete
B. Update
C. Sort key
D. Index
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
7. What is the language used by most of the DBMSs for helping their users to access data?
A. High level language
B. Query language
C. SQL
D. 4GL
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
B. language
C. spelling
D. width
9. In SQL, which command is used to make permanent changes made by statements issue since
the beginning of a transaction?
A. ZIP
B. PACK
C. COMMIT
D. SAVE
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
10. Periodically adding, changing and deleting file records is called file
A. Updating
B. upgrading
C. restructuring
D. renewing
Answer: Option A
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
B. CHANGE USER
C. ALTER TRIGGER
D. All of the above
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
14. If the record management system allows you to edit values before they are recorded on disk,
you can
A. correct spelling changes before they are recorded
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
15. The relational model uses some unfamiliar terminology. A tuple is equivalent to a:
A. record
B. field
C. file
D. data base
E. data item
Answer: Option A
Explanation:
16. The files stored on a secondary stage device are composed of a hierarchy of data. What does a
record in a file contain?
A. Bits
B. Characters
C. Data field
D. Schema
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
17. Which command is used to remove an index from the database in SQL?
A. DELETE INDEX
B. DROP INDEX
C. REMOVE INDEX
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
C. more than one member but only one occurrence per member
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
19. What is the name given to the database management system which is able to handle full text
data, image data, audio and video?
A. Full media
B. Graphics media
C. Multimedia
D. Hypertext
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
C. Relational schema
Answer: Option A