Practice Question and Answer
8 5 Q:
61b8bada3dcf35035ce1b76d 5 Q:
61b8ba5cb700dd1b9f6d0353 5 Q:
61b8b9c5a9d1da035de500fc 5 Q:
61b8b93f27b9dc0335ba42aa 5 Q:
61b8b8283dcf35035ce1af04 5 Q:
61b8b7a23dcf35035ce1aef5 5 Q:
61b8b6eb27b9dc0335ba39bc 5 Q:
61b8b67bb700dd1b9f6cfbd4
Q: ______ denotes what is in the data base fields?
990 061b8bada3dcf35035ce1b76d
61b8bada3dcf35035ce1b76d- 1Structuresfalse
- 2Field markerstrue
- 3Field definitionsfalse
- 4Field namefalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Field markers"
Q: What is the primary difference between virus and worm?
1008 061b8ba5cb700dd1b9f6d0353
61b8ba5cb700dd1b9f6d0353- 1A worm has the ability to self-propagate from the infected computer of the user to other computers.false
- 2The worm is usually written by a cracker - script bunnies do not have the skill of worm program developmenttrue
- 3Viruses are very harmful for the computers it infects; Worm is not such a serious problem.false
- 4Antivirus is effective for fighting software, not for fighting wormsfalse
- 5None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "The worm is usually written by a cracker - script bunnies do not have the skill of worm program development"
Q: ___________ are the words which the programming language has introduced in its
866 061b8b9c5a9d1da035de500fc
61b8b9c5a9d1da035de500fc- 1Control Busfalse
- 2Reserved Bustrue
- 3Control Structuresfalse
- 4Rigid Keysfalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Reserved Bus"
Q: What happens when the data is changed in multiple lists and all the lists are not updated?
1023 061b8b93f27b9dc0335ba42aa
61b8b93f27b9dc0335ba42aa- 1Data redundancyfalse
- 2Information overloadfalse
- 3Duplicate datafalse
- 4Data inconsistencytrue
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Data inconsistency"
Q: Proxy server is used for which of the following?
5878 061b8b8283dcf35035ce1af04
61b8b8283dcf35035ce1af04- 1To provide protection against unauthorized users.false
- 2Processing client requests for web pages.false
- 3Processing client requests for database access.false
- 4Providing TCP / IP.true
- 5None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Providing TCP / IP."
Q: Which of the following is not a purpose of transaction processing system?
1382 061b8b7a23dcf35035ce1aef5
61b8b7a23dcf35035ce1aef5- 1Capture, process and store transactionsfalse
- 2Reducing manual effort associated with routine business activitiesfalse
- 3Minimizing the manual effort associated with processing business transactionsfalse
- 4To produce standard reports used for making management decisionstrue
- 5None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "To produce standard reports used for making management decisions"
Q: Virus usually comes from the floppy disk left in the floppy disk drive.
1733 061b8b6eb27b9dc0335ba39bc
61b8b6eb27b9dc0335ba39bc- 1Trojan Horsefalse
- 2Boot Sectorstrue
- 3Scriptfalse
- 4Logic Bombfalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Boot Sectors"
Q: This part of the operating system restricts essential peripherals such as the keyboard, screen, disk, and parallel and serial ports
1139 061b8b67bb700dd1b9f6cfbd4
61b8b67bb700dd1b9f6cfbd4- 1Basic Input / Output Systemtrue
- 2Secondary Input / Output Systemfalse
- 3Peripheral Input / Output Systemfalse
- 4Marginal Input / Output Systemfalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Basic Input / Output System"
en481311449

