','1120','question','manage_question','manageQuestion.php')">
11. How many characters can a VDU display on one line
|
|
|
|
24 |
40 |
64 |
80 |
4 |
Active |
|
26 |
Course on Computer Concepts (CCC) Semester 1 |
10. The Resolution of CGA is
|
640* 200 |
720 *350 |
640*340 |
None of the Above |
4 |
Active |
|
27 |
Course on Computer Concepts (CCC) Semester 1 |
9. For all the computing needs, windows 2000 provides
|
Industrial Stength Reliability |
Highest Level Of Security |
Powerful Performance |
All |
4 |
Active |
|
28 |
Course on Computer Concepts (CCC) Semester 1 |
8. Program to convert high level programe to low level is
|
Assembler |
Compliler |
Interpretor |
All |
2 |
Active |
|
29 |
Course on Computer Concepts (CCC) Semester 1 |
7. WWW Stands for
|
World Wide Web |
Wide Word Website |
Wide World Website |
All of the above |
1 |
Active |
|
30 |
Course on Computer Concepts (CCC) Semester 1 |
6. The internal command execute immediately
|
True |
False |
Both |
None |
1 |
Active |
|
31 |
Course on Computer Concepts (CCC) Semester 1 |
5. SVGA Stands for
|
System Vertical Graphics Adaptor |
Super Video Graphics Array |
Super Vertical Graphics Array |
None of the Above |
2 |
Active |
|
32 |
Course on Computer Concepts (CCC) Semester 1 |
4. Multimedia can be used for
|
Webpages |
Games |
Main Stream Business |
All |
4 |
Active |
|
33 |
Course on Computer Concepts (CCC) Semester 1 |
3. 1 KB is equal to
|
1024 Bytes |
1024 Bites |
1024 GB |
1024 MB |
1 |
Active |
|
34 |
Course on Computer Concepts (CCC) Semester 1 |
2. A Micro Processor is
|
A solid State Device |
Tiny as a pen |
Capable of performing arithmetic calculation |
Capable of performing logical calculation |
3 |
Active |
|
35 |
Course on Computer Concepts (CCC) Semester 1 |
1. RUN command is used for rename the file
|
True |
False |
Both |
None |
2 |
Active |
|
36 |
|
|
|
|
|
|
|
Disable |
|
37 |
PC ARCHITECTURE
|
The Width of a processor?s data path is measured in bits. Which of the following are common data paths?
|
. 32 bits |
. 8 bits |
12 bits |
16 bits |
2 |
Active |
|
38 |
ADVANCE NETWORKS AND NETWORKIN
|
WAN stands for ..................... .
|
Wap Area Network |
Wide Array Net |
. Wide Area Network |
Wireless Area Network |
3 |
Active |
|
39 |
PC HARDWARE & COMPONENTS
|
Q. What is the first step in diagnosing a completely dead computer at the client site that was working the day before.
|
check the AC outlet |
Test the power supply |
replace the CMOS battery |
reseat the hard drive controller cable |
1 |
Active |
|
40 |
PC HARDWARE & COMPONENTS
|
Q. Which of the items listed below is an output device?
|
Scanner |
Printer |
Mouse |
Keyboard |
2 |
Active |
|
41 |
PC HARDWARE & COMPONENTS
|
What?s a USB hub?
|
Networking equipment which allows several computers to share one Internet connection |
The ports on the back of your computer where you plug in USB devices |
A device that turns one USB connection into two or more connections |
A place to store all of your USB devices |
3 |
Active |
|
42 |
PC HARDWARE & COMPONENTS
|
Q. Missing slot covers on a computer can cause?
|
incomplete path for ESD |
EMI. |
power surges |
over heat |
4 |
Active |
|
43 |
OPERATING SYSTEM, SOFTWARE &TO
|
Q. To start the Services Configuration Tool from the desktop
|
b. Main Menu Button (on the Panel) >System Settings>Services Settings> Services |
a. Main Menu Button (on the Panel) >System Settings>Server Settings>Services and Type the command re |
c. Type the command redhatconfigure servers at a shell prompt |
. None of these |
2 |
Active |
|
44 |
PC ARCHITECTURE
|
Q. The brain of the computer. This part does the calculation, moving and processing of information
|
Motherboard |
RAM |
Processor |
Hard Drive |
3 |
Active |
|
45 |
ADVANCE NETWORKS AND NETWORKIN
|
Q. Which of the following is correct in VLSM?
|
Subnets must be in same size |
No required of subnet |
Can have subnets of different sizes |
None of these |
3 |
Active |
|
46 |
PERSONALITY DEVELOPMENT
|
All levels of management between the supervisory level& the top of the organization are termed ------------.
|
First line managers |
Forman |
Middle managers |
Supervisors |
3 |
Active |
|
47 |
PC ARCHITECTURE
|
CDROMstands for ..............
|
Compactable Read Only Memory |
Compact Disk Read Only Memory |
Compactable Disk Read Only Memory |
Compact Data Read Only Memory |
2 |
Active |
|
48 |
PC HARDWARE & COMPONENTS
|
Q. From the following, what could cause a display that is wiggly,pulsing,blurred, too large or small and causes the screen to flicker or shrink?
|
video adapter interference from nearby pc cards |
unstable power supply in the monitor |
monitor interference from nearby equipment |
All of these |
4 |
Active |
|
49 |
OPERATING SYSTEM, SOFTWARE &TO
|
The proper definition of a modern digital computer is
|
Any machine that can perform mathematical operations |
. A more sophistic and modified electronic pocket calculator |
A machine that works on binary code |
An electronic automated machine that can solve problems involving words and numbers |
3 |
Active |
|
50 |
PC HARDWARE & COMPONENTS
|
Q. In Inkjet technology the droplets of ink are deflected by?
|
electro static absorbtion |
multi directional nozzles |
electronically charged plates |
high pressure plates |
2 |
Active |
|
51 |
OPERATING SYSTEM, SOFTWARE &TO
|
Which of the following is an Operating System
|
Firefox |
None of these |
Microsoft Word |
Windows |
4 |
Active |
|
52 |
PC ARCHITECTURE
|
Q. The first electronic general purpose digital computer built by Motley and Accrete called ENIAC did not work on the stored program concept. How many number s could it storein its internal memory?
|
100 |
40 |
80 |
20 |
4 |
Active |
|
53 |
PC ARCHITECTURE
|
Q. Resistance is measured in ?
|
Watts |
Ohms |
Amps |
Volts |
2 |
Active |
|
54 |
PC ARCHITECTURE
|
What program can you use to keep your system patched and uptodate?
|
Windows Dispatcher |
Windows Update 5 |
Windows Upgrade |
Windows Patcher |
2 |
Active |
|
55 |
OPERATING SYSTEM, SOFTWARE &TO
|
A high Quality CAD system uses the following for printing drawing and graphs
|
All of these |
Line printer |
. Digital plotter |
Dot matrix printer |
3 |
Active |
|
56 |
PC ARCHITECTURE
|
Q. The first electronic computer in the world was
|
ENIAC |
UNIVAC |
EDVAC |
All of these |
1 |
Active |
|
57 |
OPERATING SYSTEM, SOFTWARE &TO
|
. What is modified when changing the system startupboot sequence?
|
. BIOS/CMOS |
COMMAND.COM |
. CONFIG.SYS |
autoexec.bat |
1 |
Active |
|
58 |
PC HARDWARE & COMPONENTS
|
A user complains that they can not hear any sound on their computer. What are some simple things you should consider concerning this problem?
|
volume not up on the monitor |
none of these |
power cable to speaker not connected and bad cable connection |
defective graphics card |
3 |
Active |
|
59 |
PERSONALITY DEVELOPMENT
|
Analytical CRM tools can sliceanddicecustomer information to create madetoorderviews
|
Customer value |
All of these |
Customer spending |
Customer product affinities |
2 |
Active |
|
60 |
PERSONALITY DEVELOPMENT
|
The personnel who deals with the computer and its management put together are called
|
Software |
Firmware |
Human ware |
Hardware |
3 |
Active |
|
61 |
ADVANCE NETWORKS AND NETWORKIN
|
Q. You are on a tablet and can't connect to the network. What is the first thing you should do
|
None of these |
. Press and hold the power button |
Restart the computer |
Check that the wireless switch is in the on position |
4 |
Active |
|
62 |
OPERATING SYSTEM, SOFTWARE &TO
|
Q. ISDN uses _____ technology.
|
neither digital nor analog |
only digital |
only analog |
digital and analog |
2 |
Active |
|
63 |
PERSONALITY DEVELOPMENT
|
Q. Relationships that result in strategic partnerships go through four stages including:
|
Suggestion, response, communication, concurrence |
Awareness, exploration, expansion, and commitment |
. Exploration, change, dynamics, restoration |
cd. Beginning, adjustment, middle, end |
2 |
Active |
|
64 |
PERSONALITY DEVELOPMENT
|
In successful organizations, ----------------
|
Low efficiency & high effectiveness go hand in hand |
High efficiency & low effectiveness go hand in hand |
High efficiency & high equity go hand in hand |
High efficiency &high effectiveness go hand in hand |
4 |
Active |
|
65 |
PERSONALITY DEVELOPMENT
|
Q. The marketing messages committed to customers wishes is a part of ................... .
|
Permission marketing |
Activity marketing |
Supplier marketing |
None of these |
1 |
Active |
|
66 |
OPERATING SYSTEM, SOFTWARE &TO
|
Q. What command should you run to check and fix corrupt system files, DLLs, and other critical files?
|
CHKDSK /R |
SFC /SCANNOW |
CMDCONS /FIXBOOT |
DEFRAGA |
2 |
Active |
|
67 |
PERSONALITY DEVELOPMENT
|
Which is not a task of a Configuration Management?
|
Version control |
Reporting |
Change management |
Quality control |
4 |
Active |
|
68 |
PERSONALITY DEVELOPMENT
|
Q. What supports backofficeoperations and strategic analysis and includes all systems that do not deal directly with the customers?
|
Operational CRM |
Analytical CRM |
Personalization |
All of these |
2 |
Active |
|
69 |
PC ARCHITECTURE
|
Q. How many address lines are needed to address each memory location in a 2048 x 4 memory chip?
|
11 |
8 |
10 |
12 |
1 |
Active |
|
70 |
PERSONALITY DEVELOPMENT
|
_________ is the person who offers informal advice or information about a specific product or product category.
|
A marketing leader |
An opinion leader |
A customer |
None of these |
2 |
Active |
|
71 |
PC HARDWARE & COMPONENTS
|
When plugging the P8 and P9 power connectors into the system board, which of the following is true?
|
it doesn't matter which way you plug them in, the voltages are the same |
P8 and P9 don't plug into the system board |
the black wires of both connectors should be next to each other |
the black wires of both connectors should NOT be next to each other |
3 |
Active |
|
72 |
PC HARDWARE & COMPONENTS
|
. A capacitor is measured in which of the following units?
|
Volts |
. Ohms |
Resistance |
. Farads |
4 |
Active |
|
73 |
PC HARDWARE & COMPONENTS
|
. A capacitor is measured in which of the following units?
|
Volts |
. Ohms |
Resistance |
. Farads |
4 |
Active |
|
74 |
ADVANCE NETWORKS AND NETWORKIN
|
What would the value of protocol field in an IP header in which the data is a HTTP?
|
. 80 |
8080 |
. 6 |
413 |
3 |
Active |
|
75 |
PC HARDWARE & COMPONENTS
|
Q. You must service the laser printer in your office. Which part of the printer shoud you avoid touching because it is hot?
|
primary corona |
fuser |
printer head |
highvoltage power supply |
2 |
Active |
|
76 |
C Language
|
Which operator has the highest priority ?
|
+ + |
% |
+ |
!! |
1 |
Active |
|
77 |
C Language
|
Which operator has the lowest priority ?
|
+ + |
% |
+ |
!! |
4 |
Active |
|
78 |
C Language
|
The equality operator is represented by
|
:= |
.EQ. |
= |
= = |
4 |
Active |
|
79 |
C Language
|
The operator && is an example for ___ operator
|
Assignment |
Logical |
Increment |
Rational |
2 |
Active |
|
80 |
C Language
|
Which of the following is an example of compounded assignment statement ?
|
a = 5 |
a + = 5 |
a = b = c |
a = b |
2 |
Active |
|
81 |
C Language
|
The maximum length of a variable in C is ___
|
8 |
16 |
32 |
64 |
1 |
Active |
|
82 |
C Language
|
Which of the following is invalid ?
|
?? |
? ? |
?a? |
?abc? |
4 |
Active |
|
83 |
C Language
|
Which escape character can be used to beep from speaker in C ?
|
\a |
\b |
\c |
\d |
1 |
Active |
|
84 |
C Language
|
Which of the following is a Scalar Data type
|
FLOAT |
UNION |
ARRAY |
POINTER |
1 |
Active |
|
85 |
C Language
|
Which of the following language is predecessor to C Programming Language ?
|
A |
B |
BCPL |
C++ |
3 |
Active |
|
86 |
C Language
|
What will be the maximum size of a float variable
|
4 |
8 |
2 |
6 |
2 |
Active |
|
87 |
C Language
|
String constants should be enclosed between ___
|
Single quotes |
Double quotes |
Both a and b |
None of These |
2 |
Active |
|
88 |
C Language
|
Character constants should be enclosed between ___
|
Single quotes |
Double quotes |
Both a and b |
None of These |
1 |
Active |
|
89 |
C Language
|
Which escape character can be used to begin a new line in C ?
|
\a |
\b |
\n |
\d |
3 |
Active |
|
90 |
C Language
|
Which symbol is used as a statement terminator in C ?
|
; |
~ |
# |
@ |
1 |
Active |
|
91 |
C Language
|
What is the valid range of numbers for int type of data ?
|
0 to 256 |
-32768 to +32767 |
-65536 to +65536 |
No specific range |
2 |
Active |
|
92 |
C Language
|
Which of the following are tokens in C?
|
KEYWORDS |
VARIABLES |
CONSONANTS |
ALL OF ABOVE |
4 |
Active |
|
93 |
C Language
|
Which of the following symbol is used to denote a pre-processor statement?
|
! |
@ |
$ |
# |
4 |
Active |
|
94 |
C Language
|
C language is available for which of the following Operating Systems?
|
DOS |
WINDOWS |
UNIX |
ALL OF THESE |
2 |
Active |
|
95 |
C Language
|
C is a ___ language
|
High Level |
Low Level |
Machine Level |
All of these |
2 |
Active |
|
96 |
C Language
|
C was developed in the year
|
1970 |
1972 |
1980 |
2000 |
2 |
Active |
|
97 |
C Language
|
C programming language was developed by
|
Dennis Ritchie |
Ken Thompson |
Bill Gates |
Peter Norton |
1 |
Active |
|
98 |
C Language
|
What are demerits of array in c?
|
Wastage of memory space. We cannot change size of array at the run time. |
It can store only similar type of data |
Only (i) and (ii) is correct |
All of These |
4 |
Active |
|
99 |
C Language
|
What are merits and of array in c?
|
We can easily access each element of array |
Not necessity to declare too many variables |
Array elements are stored in continuous memory location. |
All of These |
4 |
Active |
|
100 |
C Language
|
What is wild pointer in c?
|
A pointer in c which has not been initialized is known as wild pointer. |
A pointer in c which has been initialized is known as wild pointer. |
Both |
All of These |
1 |
Active |
|
101 |
C Language
|
Consider on following declaration in c: (i)short const register i=10; (ii)static volatile const int i=10; (iii)unsigned auto long register i=10; (iv)signed extern float i=10.0;
|
Only (iv)is correct |
Only (ii) and (iv) is correct |
Only (i) and (ii) is correct |
Only (iii) correct |
3 |
Active |
|
102 |
C Language
|
Which of the following is not derived data type in c?
|
Function |
Pointer |
Enumeration |
Array |
3 |
Active |
|
103 |
C Language
|
Consider on order of modifiers in following declaration: (i)char volatile register unsigned c; (ii)volatile register unsigned char c;
|
All are correct and same |
All are correct but they are different |
All are incorrect |
Only (ii) is correct declaration |
1 |
Active |
|
104 |
C Language
|
What is the range of signed int data type in that compiler in which size of int is two byte?
|
-255 to 255 |
-32767 to 32767 |
-32768 to 32767 |
-32767 to 32768 |
3 |
Active |
|
105 |
C Language
|
Which of the following is integral data type?
|
void |
char |
float |
double |
2 |
Active |
|
106 |
C Language
|
Which of the following is not modifier of data type in c?
|
extern |
interrupt |
huge |
All of these are modifiers of data type |
4 |
Active |
|
107 |
C Language
|
The library function used to find the last occurrence of a character in a string is
|
strnstr() |
laststr() |
strrchr() |
strstr() |
3 |
Active |
|
108 |
Introduction Of Java
|
What will be the result of the expression a % b when a and b are of type int and their values are a = 10 and b = 6?
|
1.66 |
4 |
1 |
2 |
2 |
Active |
|
109 |
Introduction Of Java
|
(JAVA) What will be the result of the expression a % b when a and b are of type int and their values are a = -17 and b = -6?
|
5 |
23 |
-5 |
-23 |
1 |
Active |
|
110 |
Introduction Of Java
|
Which of the following is not a hexadecimal number? (A) 999 (B) (hex)23 (C) 0x556 (D) 0x1F2
|
c |
a |
a & b |
a,b & c |
3 |
Active |
|
111 |
Introduction Of Java
|
The type long can be used to store values in the following range:(JAVA)
|
-231 to 231 - 1 |
-263 to 263 - 1 |
-232 to 232 - 1 |
-264 to 264 |
2 |
Active |
|
112 |
Introduction Of Java
|
What is garbage collection in the context of Java?
|
vThe operating system periodically deletes all of the java files available on the |
Any package imported in a program and not used is automatically deleted. |
When all references to an object are gone, the memory used by the object is |
The JVM checks the output of any Java program and deletes anything that |
3 |
Active |
|
113 |
Introduction Of Java
|
What is byte code in the context of Java?
|
The type of code generated by a Java compiler |
The type of code generated by a Java Virtual Machine |
It is another name for a Java source file |
It is the code written within the instance methods of a class. |
1 |
Active |
|
114 |
Introduction Of Java
|
What is different between a Java applet and a Java application?
|
An application can in general be trusted whereas an applet can't. |
An applet must be executed in a browser environment. |
An applet is not able to access the files of the computer it runs on |
all of the above |
4 |
Active |
|
115 |
Introduction Of Java
|
A constructor(JAVA)
|
must have the same name as the class it is declared within |
is used to create objects. |
may be declared private |
ALL OF THE ABOVE |
4 |
Active |
|
116 |
Introduction Of Java
|
Which of the following is TRUE?(JAVA)
|
In java, an instance field declared public generates a compilation error |
int is the name of a class available in the package java.lang |
Instance variable names may only contain letters and digits. |
A class has always a constructor (possibly automatically supplied by the java |
4 |
Active |
|
117 |
Introduction Of Java
|
What is the value stored in result after executing the following line in a program? result = 6/2*3;
|
1.2 |
9 |
1 |
0 |
2 |
Active |
|
118 |
Introduction Of Java
|
The method setLabel can be used with what type of Object?(JAVA)
|
DoubleField |
int |
TextField |
String |
1 |
Active |
|
119 |
Introduction Of Java
|
Trying determine the shape of a cylindrical can made from 1000 cm2 of tin that has the largest possible volume is an example of:(JAVA)
|
Array calculation |
Text manipulation |
Optimization problem |
Object oriented programming |
3 |
Active |
|
120 |
Introduction Of Java
|
A function is:(JAVA)
|
An entity that receives inputs and outputs |
A way of storing values |
A sequence of characters enclosed by quotes |
A kind of computer |
1 |
Active |
|
121 |
Introduction Of Java
|
The data type for numbers such as 3.14159 is:(JAVA)
|
double |
int |
real |
string |
1 |
Active |
|
122 |
Introduction Of Java
|
If result = 2 + 3 * 5, what is the value of result?(JAVA)
|
25 |
14 |
10 |
17 |
4 |
Active |
|
123 |
Introduction Of Java
|
The following a legal Java statement
|
m1 = new TextField("sixty"); |
1a = 6; |
add(m1); |
m1.setText("Hello world); |
3 |
Active |
|
124 |
Introduction Of Java
|
The following is an example of a bool-expression?(JAVA)
|
x = 6 |
m1.setText("Hello.") |
cause == bYes |
70 |
3 |
Active |
|
125 |
Introduction Of Java
|
The following is NOT an example of a data type(JAVA)
|
int |
public |
Button |
void |
2 |
Active |
|
126 |
Introduction Of Java
|
table is a variable that refers to an array(JAVA)
|
A collection of one or more statements enclosed in braces |
A statement involving if and else |
A way of declaring variables |
a way of setting the value of a variable |
1 |
Active |
|
127 |
Introduction Of Java
|
What does the following line of code mean? (JAVA) double table[];
|
table is a variable to refers to a real number |
table is a variable that refers to two numbers |
It is not legal Java code |
table is a variable that refers to an array |
4 |
Active |
|
128 |
Introduction Of Java
|
The sequence \n does what?(JAVA)
|
Makes a link |
Prints a backslash followed by a n |
Adds 5 spaces |
Starts a new line |
4 |
Active |
|
129 |
Introduction Of Java
|
If s = "text", what is the value returned by s.length()?(JAVA)
|
A TextArea can handle multiple lines of text |
A textarea can be used for output |
TextArea is not a class |
TextAreas are used for displaying graphics |
1 |
Active |
|
130 |
Introduction Of Java
|
What is an infinite loop?(JAVA)
|
A loop that functions infinitely well |
A loop that runs forever |
A loop that never starts |
A loop that will never function |
2 |
Active |
|
131 |
Introduction Of Java
|
What are the two parts of a value of type double?(JAVA)
|
length |
significant digits & exponent |
mode |
numerator |
2 |
Active |
|
132 |
Introduction Of Java
|
Which is a valid declaration within an interface?(JAVA)
|
public static short stop = 23; |
protected short stop = 23; |
transient short stop = 23; |
final void madness(short stop); |
1 |
Active |
|
133 |
Introduction Of Java
|
Which of the following class level (nonlocal) variable declarations will not compile?(JAVA)
|
protected int a; |
transient int b = 3; |
private synchronized int e; |
volatile int d; |
3 |
Active |
|
134 |
Introduction Of Java
|
Which of the following are legal declarations for nonnested classes and interfaces?(JAVA)
|
final abstract class Test {} |
public static interface Test {} |
final public class Test {} |
protected abstract class Test {} |
3 |
Active |
|
135 |
Introduction Of Java
|
You want a class to have access to members of another class in the same package. Which is the most restrictive access that accomplishes this objective?(jAVA)
|
public |
private |
protected |
default access |
4 |
Active |
|
136 |
Introduction Of Java
|
Which cause a compiler error?(JAVA)
|
int[ ] scores = {3, 5, 7}; |
int [ ][ ] scores = {2,7,6}, {9,3,45}; |
String cats[ ] = {"Fluffy", "Spot", "Zeus"}; |
boolean results[ ] = new boolean [] {true, false, true}; |
2 |
Active |
|
137 |
Introduction Of Java
|
public class Test { }, What is the prototype of the default constructor?(JAVA)
|
Test( ) |
Test(void) |
public Test( ) |
public Test(void) |
3 |
Active |
|
138 |
Introduction Of Java
|
What is the numerical range of a char?(JAVA)
|
-128 to 127 |
-(215) to (215) - 1 |
0 to 32767 |
0 to 65535 |
4 |
Active |
|
139 |
Introduction Of Java
|
Which is a valid declarations of a String?(JAVA)
|
String s1 = null; |
String s2 = 'null'; |
String s3 = (String) 'abc'; |
String s4 = (String) '\ufeed'; |
1 |
Active |
|
140 |
Introduction Of Java
|
Which three are valid declarations of a float?(JAVA)
|
float f1 = -343; |
float f2 = 3.14; |
float f4 = 42e7; |
float f5 = 2001.0D; |
1 |
Active |
|
141 |
Introduction Of Java
|
Which one is a valid declaration of a boolean?(JAVA)
|
boolean b1 = 0; |
boolean b2 = 'false'; |
boolean b3 = false; |
boolean b4 = Boolean.false(); |
3 |
Active |
|
142 |
Introduction Of Java
|
Which is the valid declarations within an interface definition?(JAVA)
|
public double methoda(); |
public final double methoda(); |
static void methoda(double d1); |
protected void methoda(double d1); |
1 |
Active |
|
143 |
Introduction Of Java
|
Which one of the following will declare an array and initialize it with five numbers?(JAVA)
|
Array a = new Array(5); |
int [] a = {23,22,21,20,19}; |
int a [] = new int[5]; |
int [5] array; |
2 |
Active |
|
144 |
Introduction Of Java
|
Which is a valid keyword in java?
|
interface |
string |
Float |
unsigned |
1 |
Active |
|
145 |
Introduction Of Java
|
Which is a reserved word in the Java programming language?
|
method |
native |
subclasses |
array |
2 |
Active |
|
146 |
Introduction Of Java
|
Which will legally declare, construct, and initialize an array?(JAVA)
|
int [] myList = {"1", "2", "3"}; |
int [] myList = (5, 8, 2); |
int myList [] [] = {4,9,7,0}; |
int myList [] = {4, 3, 7}; |
4 |
Active |
|
147 |
Introduction Of Java
|
Which one of these lists contains only Java programming language keywords?(JAVA)
|
class, if, void, long, Int, continue |
goto, instanceof, native, finally, default, throws |
try, virtual, throw, final, volatile, transient |
strictfp, constant, super, implements, do |
2 |
Active |
|
148 |
Concept Of RDBMS
|
Information can be transferred between the DBMS and a
|
spreadsheet program |
word processor program |
graphics program |
all of the above |
4 |
Active |
|
149 |
Concept Of RDBMS
|
In a large DBMS
|
each user can "see" only a small part of the entire database |
each subschema contains every field in the logical schema |
each user can access every subschema |
none of the above |
1 |
Active |
|
150 |
Concept Of RDBMS
|
Primitive operations common to all record management system include
|
print |
sort |
look-up |
all of above |
3 |
Active |
|
151 |
Concept Of RDBMS
|
The model for a record management system might be
|
handwritten list |
a Rolodex card file |
a business form |
all of above |
4 |
Active |
|
152 |
Concept Of RDBMS
|
What is the language used by most of the DBMSs for helping their users to access data?
|
High level language |
SQL |
Query Language |
4GL |
3 |
Active |
|
153 |
Concept Of RDBMS
|
The function of a database is ...
|
to check all input data |
to check all spelling |
to collect and organize input data |
to output data |
3 |
Active |
|
154 |
Concept Of RDBMS
|
One data dictionery software package is called
|
DB/DC dictionary |
TOTAL |
ACCESS |
Datapac |
1 |
Active |
|
155 |
Concept Of RDBMS
|
Which of the following is a problem of file management system?
|
difficult to update |
lack of data independence |
data redundancy |
all of above |
4 |
Active |
|
156 |
Concept Of RDBMS
|
Which of the following is true of a network structure?
|
It is a physical representation of the data |
It allows a many-to-many relationship |
It is conceptually simple |
It will be dominant data base of the future |
2 |
Active |
|
157 |
Concept Of RDBMS
|
The ascending order of a data hirerchy is
|
bit-byte-record-field-file-database |
byte-bit-field-record-file-database |
bit-byte-field-record-file-database |
bit-byte-file-record-field-database |
3 |
Active |
|
158 |
Concept Of RDBMS
|
A file produced by a spreadsheet
|
is generally stored on disk in an ASCII text fromat |
can be used as is by the DBMS |
both a and b |
none of the above |
1 |
Active |
|
159 |
Concept Of RDBMS
|
A transparent DBMS
|
can not hide sensitive information from users |
keeps its logical structure hidden from users |
keeps its physical structure hidden from users |
both b and c |
3 |
Active |
|
160 |
Concept Of RDBMS
|
A command that lets you change one or more fields in a record is
|
insert |
modify |
lookup |
none of above |
2 |
Active |
|
161 |
Concept Of RDBMS
|
A record management system
|
can handle many files of information at a time |
can be used to extract information stored in a computer file |
always uses a list as its model |
both a and b |
2 |
Active |
|
162 |
Concept Of RDBMS
|
Which is the make given to the database management system which is able to handle full text data, image data, audio and video?
|
full media |
graphics media |
multimedia |
hypertext |
3 |
Active |
|
163 |
Concept Of RDBMS
|
A set of programs that handle a firm's database responsibilities is called
|
database management system (DBMS) |
database processing system (DBPS) |
data management system (DMS) |
all of above |
4 |
Active |
|
164 |
Concept Of RDBMS
|
In the DBMS approach, application programs perform the
|
storage function |
processing functions |
access control |
all of the above |
2 |
Active |
|
165 |
Concept Of RDBMS
|
Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?
|
report writer |
query language |
data manipulation language |
transaction log |
4 |
Active |
|
166 |
Concept Of RDBMS
|
Which of the following is not an advantage of the database approach
|
Elimination of data redundancy |
Ability of associate deleted data |
increased security |
all of the above |
4 |
Active |
|
167 |
Concept Of RDBMS
|
Which of the following fields in a student file can be used as a primary key?
|
class |
Social Security Number |
GPA |
Major |
2 |
Active |
|
168 |
Concept Of RDBMS
|
An audit trail
|
is used to make backup copies |
is the recorded history of operations performed on a file |
can be used to restore lost information |
none of the aobve |
2 |
Active |
|
169 |
Concept Of RDBMS
|
If a piece of data is stored in two places in the database, then
|
changing the data in one spot will cause data inconsistency |
storage space is wasted |
in can be more easily accessed |
both a and b |
4 |
Active |
|
170 |
Concept Of RDBMS
|
Sort/Report generators
|
are faster than index/report generators |
require more disk space than indexed/report generators |
do not need to sort before generating report |
both a and b |
2 |
Active |
|
171 |
Concept Of RDBMS
|
In order to use a record management system
|
you need to understand the low level details of how information is stored |
you need to understand the model the record management system uses |
bother a and b |
none of the above |
2 |
Active |
|
172 |
Concept Of RDBMS
|
Which of the following is not a relational database?
|
dBase IV |
4th Dimension |
FoxPro |
Reflex |
4 |
Active |
|
173 |
Concept Of RDBMS
|
Large collection of files are called
|
fields |
records |
database |
sectors |
3 |
Active |
|
174 |
Concept Of RDBMS
|
Batch processing is appropriate if
|
large computer system is available |
only a small computer system is avilbale |
only a few transactions are involved |
none of the above |
4 |
Active |
|
175 |
Concept Of RDBMS
|
Generalized database management system do not retrieve data to meet routine request
|
TRUE |
FALSE |
none of these |
both a & b |
2 |
Active |
|
176 |
Concept Of RDBMS
|
Which of the following hardware component is the most important to the operation of database management system?
|
high resolution video display |
printer |
high speed, large capacity disk |
plotter |
3 |
Active |
|
177 |
Concept Of RDBMS
|
Which of the following is not true of the traditional approach to information processing
|
there is common sharing of data among the various applications |
it is file oriented |
programs are dependent on the file |
it is inflexible |
1 |
Active |
|
178 |
Concept Of RDBMS
|
The management information system (MIS) structure with one main computer system is called a
|
hierarchical MIS structure |
distributed MIS structure |
centralized MIS structure |
decentralized MIS structure |
3 |
Active |
|
179 |
Concept Of RDBMS
|
A top-to-bottom relationship among the items in a database is established by a
|
hierarchical schema |
network schema |
relational schema |
all of the above |
1 |
Active |
|
180 |
Concept Of RDBMS
|
A form defined
|
where data is placed on the screen |
the width of each field |
both a and b |
none of the above |
1 |
Active |
|
181 |
Concept Of RDBMS
|
Report generators are used to
|
store data input by a user |
retrieve information from files |
answer queries |
both b and c |
4 |
Active |
|
182 |
Concept Of RDBMS
|
Choose the RDBMS which supports full fledged client server application development
|
dBase V |
Oracle 7.1 |
FoxPro 2.1 |
Ingress |
2 |
Active |
|
183 |
Concept Of RDBMS
|
The highest level in the hierarchy of data organization is called
|
data bank |
data base |
data file |
data record |
2 |
Active |
|
184 |
Concept Of RDBMS
|
The language used application programs to request data from the DBMS is referred to as the
|
DML |
DDL |
query language |
none of the above |
1 |
Active |
|
185 |
Concept Of RDBMS
|
One approach to standardization storing of data?
|
MIS |
structured programming |
CODASYL specification |
none of the above |
3 |
Active |
|
186 |
Concept Of RDBMS
|
Database management systems are intended to
|
eliminate data redundancy |
establish relationship among records in different files |
maintain data integrity |
all of the above |
4 |
Active |
|
187 |
Concept Of RDBMS
|
The relational database environment has all of the following components except
|
users |
separate files |
database |
query languages |
2 |
Active |
|
188 |
Concept Of Lan And Working Wit
|
It is a program that can search the web on a specific topic for you?
|
Search engine |
Web Browser |
WWW |
None of these |
1 |
Active |
|
189 |
Concept Of Lan And Working Wit
|
In sent mail box there is only voice messages?
|
TRUE |
False |
may be |
always false |
2 |
Active |
|
190 |
Concept Of Lan And Working Wit
|
The Domain name of commercial organization?
|
.Mil |
.Com |
.Edu |
All of these |
2 |
Active |
|
191 |
Concept Of Lan And Working Wit
|
It is piece of programming code that causes some undesired event search as the deletion of file.
|
Virus |
Hacking |
Anti-Virus |
Windows Security |
1 |
Active |
|
192 |
Concept Of Lan And Working Wit
|
Format of URL?
|
Protocol:// host name/ other Information |
Protocol://IP Address//WebsiteSiteName/ |
www://rssaindia.org.in/user.aspx |
None of the above |
1 |
Active |
|
193 |
Concept Of Lan And Working Wit
|
A company which provides access to the internet?
|
MTNL Online |
BSNL Broadband |
Internet Access Providers |
All of the above |
4 |
Active |
|
194 |
Concept Of Lan And Working Wit
|
Machines under internet can be categories as two types
|
Server and client |
Router and protocol |
ISP and Network |
Bridge and repeater |
1 |
Active |
|
195 |
Concept Of Lan And Working Wit
|
The connection allow user to exchange data pool and share resources including
|
Printer |
Data |
Computing Power |
All of The Above |
4 |
Active |
|
196 |
Concept Of Lan And Working Wit
|
It is define to be an interconnected collection of autonomous computer.
|
A computer network |
Local Area Network |
NIC |
Intranet |
1 |
Active |
|
197 |
Concept Of Lan And Working Wit
|
What is the full form of DNS_______________?
|
Defense Name System |
Directory Name System |
Defense Number System |
Domain Name System |
4 |
Active |
|
198 |
Concept Of Lan And Working Wit
|
Function of router?
|
It ensures that information doesn?t go where it?s no needed. |
It determines where to send information from one computer to another. |
It makes sure that information does make it to the intended destination. |
All of the above |
4 |
Active |
|
199 |
Concept Of Lan And Working Wit
|
A protocol is:
|
A set of tools for communicating across the internet. |
A piece of software that acts as an interface between the user and the inner workings of the interne |
The screen saver that appears on the monitor while the PC is on. |
An electronic mail that establishes person-to-person connectivity. |
1 |
Active |
|
200 |
Concept Of Lan And Working Wit
|
It is the most common form of security violation?
|
Hacking |
Virus |
Anti-Virus |
Windows Security |
1 |
Active |
|