LATEST

Friday, May 1, 2020

May 01, 2020

COMPUTER AWARENESS - INPUT AND OUTPUT DEVICES MCQS SET 79

COMPUTER AWARENESS - INPUT AND OUTPUT DEVICES MCQS SET 79


1. I/O hardware contains
a) bus        
b) controller        
c) I/O port and its registers        
d) all of the mentioned

2. The data-in register of I/O port is
a) read by host to get input            b) read by controller to get input
c) written by host to send output        d) written by host to start a command

3. The host sets _____ bit when a command is available for the controller to execute.
a) write        b) status        c) command-ready        d) control

4. When hardware is accessed by reading and writing to the specific memory locations, then it is called
a) port-mapped I/O        
b) controller-mapped I/O        
c) bus-mapped I/O   
d) none of the mentioned

5. Device drivers are implemented to interface
a) character devices        
b) block devices        
c) network devices    
d) all of the mentioned

6. Which hardware triggers some operation after certain programmed count?
a) programmable interval timer            
b) interrupt timer        
c) programmable timer
d) none of the mentioned

7. The device-status table contains
a) each I/O device type            
b) each I/O device address        
c) each I/O device state
d) all of the mentioned

8. Which buffer holds the output for a device?
a) spool            b) output        c) status        d) magic

9. Which one of the following connects high-speed high-bandwidth device to memory subsystem and CPU.
a) expansion bus    
b) PCI bus    
c) SCSI bus    
d) none of the mentioned

10. A process is moved to wait queue when I/O request is made with
a) non-blocking I/O    
b) blocking I/O        
c) asynchronous I/O        
d) synchronous I/O
 
ANSWER:
1.D
2.A
3.C
4.D
5.D
6.A
7.D
8.A
9.A
10.B
May 01, 2020

COMPUTER AWARENESS - FIRE WALL MCQS SET 78

COMPUTER AWARENESS - FIRE WALL MCQS SET 78

1. Which among following is considered as fastest memory ?
A.External Hard Disk        
B.Cache           
C.RAM            
D.ROM
 
2. Interpreter translate program line by line.
A.True        
B.False
 
3. In database table, what column represents ?
A.Attributes        
B.Index        
C.Entity            
D.Relation
 
4. By which key you can capture screen of current desktop ?
A.Scrlk        
B.PrtScr        
C.Break        
D.SysRq
 
5. Which is not a network topology ?
A.Bus        
B.Ring        
C.Car        
D.Star
 
6.Firewall is ?
A.a hardware                        
B.a software
C.can be a hardware as well as software            
D.can neither be a hardware nor a software
 
ANSWER:
1.B
2.A
3.A
4.B
5.C
6.C
May 01, 2020

COMPUTER AWARENESS - DATE BASE MCQS SET 77

COMPUTER AWARENESS - DATE BASE MCQS SET 77

1. The SQL ALTER statement can be used to:
A.change the table structure.        
B.change the table data.        
C.add rows to the table.
D.delete rows from the table.

2.What SQL structure is used to limit column values of a table?
A.The LIMIT constraint            
B.The CHECK constraint            
C.The VALUE constraint
D.None of the above is correct.

3. Which is NOT one of the most common types of SQL CHECK constraints?
A.System date            B.Range checks            C.Lists of values
D.Comparing one column value to another within the same table

4.What is an advantage of placing computations in SQL views?
A.To save users from having to write an expression.
B.To ensure that the results are consistent.
C.To accomplish both of the above.
D.None of the above is correct - computations cannot be placed in a view.

5.Views constructed from SQL SELECT statements that conform to the SQL-92 standard may not contain:
A. GROUP BY.        B. WHERE.        C. ORDER BY.        D.FROM.
 
ANSWER:
1.A
2.B
3.A
4.C
5.C
May 01, 2020

COMPUTER AWARENESS - DATE BASE MCQS SET 76

COMPUTER AWARENESS - DATE BASE MCQS SET 76

1. The SQL statement to create a view is:
A.CREATE VIEW.    B.MAKE VIEW.        C.SELECT VIEW.        D.INSERT VIEW.

2. To update an SQL view, the DBMS must be able to associate the column(s) to be updated with:
A.a particular column in a particular underlying table.
B.a particular column in a particular row.
C.a particular row in a particular underlying table.
D.None of the above is correct.

3. Which of the following is NOT a type of SQL constraint?
A.PRIMARY KEY        B.FOREIGN KEY        C.ALTERNATE KEY        D.UNIQUE

4. A ________ is a program that performs some common action on database data and that is stored in the database.
A.trigger    B.stored procedure        C.pseudofile        D.None of the above is correct.

5. For what purposes are views used?
A.To hide columns only        B.To hide rows only    C.To hide complicated SQL statements only
D.All of the above are uses for SQL views.

6.What is an SQL virtual table that is constructed from other tables?
A.Just another table        B.A view        C.A relation        D.Query results

7. When using the SQL INSERT statement:
A.rows can be modified according to criteria only.
B.rows cannot be copied in mass from one table to another only.
C.rows can be inserted into a table only one at a time only.
D.rows can either be inserted into a table one at a time or in groups.

8. What is not an advantage of stored procedures?
A.Greater security        B.SQL can be optimized        C.Code sharing       
D.Increased network traffic

9.A reason for using an SQL view to hide columns is:
A.to simplify a result only.            B.to prevent the display of sensitive data only.
C.to accomplish both of the above.        D.None of the above are reasons for using an SQL view.

10. Which of the following is an SQL trigger supported by Oracle?
A.BEFORE        B.INSTEAD OF        C.AFTER        D.All of the above.
ANSWER:
1.A
2.C
3.C
4.B
5.D
6.B
7.D
8.D
9.C
10.D
May 01, 2020

COMPUTER AWARENESS - DATE BASE MCQS SET 75

COMPUTER AWARENESS - DATE BASE MCQS SET 75

1. Which of the following products implemented the CODASYL DBTG model?
A.IDMS            B.DB2            C.dBase-II        D.R:base

2.An Enterprise Resource Planning application is an example of a(n) ________ .
A. single-user database application        B. multiuser database application
C .e-commerce database application        D. data mining database application

3. A DBMS that combines a DBMS and an application generator is ________ .
A. Microsoft's SQL Server        B. Microsoft's Access        C.IBM's DB2   
D.Oracle Corporation's Oracle

4. You have run an SQL statement that asked the DBMS to display data in a table named USER_TABLES. The results include columns of data labeled "TableName," "NumberOfColumns" and "PrimaryKey." You are looking at ________ .
A.user data.        B.metadata        C.A report        D.indexes

5. Which of the following is not considered to be a basic element of an enterprise-class database system?
A.Users            B.Database applications        C.DBMS            D.COBOL programs

6. The DBMS that is most difficult to use is ________ .
A.Microsoft's SQL Server    B.Microsoft's Access    C.IBM's DB2    D.Oracle Corporation's Oracle

7. The SQL command to create a table is:
A.MAKE TABLE.        B.ALTER TABLE.        C.DEFINE TABLE.    D.CREATE TABLE.

8. A ________ is a stored program that is attached to a table or a view.
A.pseudofile            B.embedded SELECT statement            C.trigger   
D.None of the above is correct.

9. The DROP TABLE statement:
A.deletes the table structure only.       
B.deletes the table structure along with the table data.
C.works whether or not referential integrity constraints would be violated.
D.is not an SQL statement.

10. SQL views can be used to hide:
A.columns and rows only.                    B.complicated SQL syntax only.
C.both of the above can be hidden by an SQL view.        D.None of the above is correct.
 
ANSWER:
1.A
2.B
3.B
4.B
5.D
6.D
7.D
8.C
9.B
10.C
May 01, 2020

COMPUTER AWARENESS - DATE BASE MCQS SET 74

COMPUTER AWARENESS - DATE BASE MCQS SET 74

1. The DBMS acts as an interface between what two components of an enterprise-class database system?
A.Database application and the database        B.Data and the database
C.The user and the database application            D.Database application and SQL

2. Which of the following products was an early implementation of the relational model developed by E.F. Codd of IBM?
A.IDMS            B.DB2            C.dBase-II            D.R:base

3. The following are components of a database except ________ .
A.user data        B.metadata        C.reports            D.indexes

4. An application where only one user accesses the database at a given time is an example of a(n) ________ .
A. single-user database application        B. multiuser database application
C. e-commerce database application        D.data mining database application

5. An on-line commercial site such as Amazon.com is an example of a(n) ________ .
A.single-user database application        B.multiuser database application
C.e-commerce database application        D.data mining database application

6. Which of the following products was the first to implement true relational algebra in a PC DBMS?
A.IDMS            B.Oracle        C.dBase-II        D.R:base

7. SQL stands for ________ .
A.Structured Query Language            B.Sequential Query Language
C.Structured Question Language        D.Sequential Question Language

8. Because it contains a description of its own structure, a database is considered to be ________ .
A.described    B.metadata compatible        C.self-describing    D.an application program

9. The following are functions of a DBMS except ________ .
A.creating and processing forms        B.creating databases        C.processing data
D.administrating databases

10. Helping people keep track of things is the purpose of a(n) ________ .
A.database        B.table            C.instance        D.relationship
 
ANSWER:
1.A
2.B
3.C
4.A
5.C
6.D
7.A
8.C
9.A
10.A
May 01, 2020

COMPUTER AWARENESS - CRYPTOGRAPHY MCQS SET 73

COMPUTER AWARENESS - CRYPTOGRAPHY MCQS SET 73

1. Cryptanalysis is used:
A. to find some insecurity in a cryptographic scheme        
B. to increase the speed
C. to encrypt the data                        D. none of the mentioned

2. Which one of the following is a cryptographic protocol used to secure HTTP connection?
A. stream control transmission protocol (SCTP)        
B. transport layer security (TSL)
C. explicit congestion notification (ECN)            
D. resource reservation protocol

3. Voice privacy in GSM cellular telephone protocol is provided by:
A. A5/2 cipher        B. b5/4 cipher        C. b5/6 cipher        D. b5/8 cipher

4. ElGamal encryption system is:
A. symmetric key encryption algorithm            
B. asymmetric key encryption algorithm
C. not an encryption algorithm                
D. none of the mentioned

5. Cryptographic hash function takes an arbitrary block of data and returns:
A. fixed &variable size bit string        
B.crypto  size bit string    
C. variable size bit string
D. none of the mentioned

6. In cryptography, what is cipher?
A. algorithm for performing encryption and decryption        
B. encrypted message
C.encryption, decryption and encrypted message            
D. none of the mentioned

7.In asymmetric key cryptography, the private key is kept by:
A. sender            B. receiver            C. sender and receiver
D. all the connected devices to the network

8. Which one of the following algorithm is not used in asymmetric-key cryptography?
A. RSA algorithm    
B. diffie-hellman algorithm        
C. electronic code book algorithm
D. none of the mentioned

9. In cryptography, the order of the letters in a message is rearranged by:
A. transpositional ciphers        B. substitution ciphers        
C.cryptographic cliphers   
D. none of the mentioned

10. What is data encryption standard (DES)?
A. block cipher        B. stream cipher    C. bit cipher        
D. none of the mentioned
 
ANSWER:
1.A
2.B
3.A
4.B
5.A
6.A
7.B
8.C
9.A
10.A

May 01, 2020

COMPUTER AWARENESS - CRYPTOGRAPHY MCQS SET 72

COMPUTER AWARENESS - CRYPTOGRAPHY MCQS SET 72


1. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption        b) encrypted message
c) both (a) and (b)                        d) none of the mentioned

2. In asymmetric key cryptography, the private key is kept by
a) sender        b) receiver        c) sender and receiver   
d) all the connected devices to the network

3. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) RSA algorithm    
b) diffie-hellman algorithm        
c) electronic code book algorithm
d) none of the mentioned

4. In cryptography, the order of the letters in a message is rearranged by
a) transpositional ciphers    b) substitution ciphers        c) both (a) and (b)   
d) none of the mentioned

5. What is data encryption standard (DES)?
a) block cipher        b) stream cipher    c) bit cipher        
d) none of the mentioned

6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme        
b) to increase the speed
c) to encrypt the data                        
d) none of the mentioned

7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)            
b) transport layer security (TSL)
c) explicit congestion notification (ECN)                
d) resource reservation protocol

8. Voice privacy in GSM cellular telephone protocol is provided by
a) A5/2 cipher        b) b5/4 cipher        c) b5/6 cipher        d) b5/8 cipher

9. ElGamal encryption system is
a) symmetric key encryption algorithm            
b) asymmetric key encryption algorithm
c) not an encryption algorithm               
d) none of the mentioned

10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string        b) variable size bit string        c) both (a) and (b)
d) none of the mentioned
ANSWER:  
1.A
2.B
3.C
4.A
5.A
6.A
7.B
8.A
9.B
10.A