Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
S.No
1
NAME
A ________ is not a part of substance of a transaction, but rather of its representation or form. __________ is used in both creating and verifying a digital signature. _____________ is the process of checking the digital signature by reference to the original message. ____________ is to prove your identity or your right to access information or services online electronically. A _________ identifies and authenticates your server and encrypts any information passed between the server and a web browser. A Digital Certificate is issued by a Certification Authority.
Option 1
Signature
Option 2
Authentication
Option 3
Approval
Option 4
Cryptography
Answer
A
Signer Authentication
Hash Function
DS Creation
DC Creation
Digital Signature
Digital Document
Server Certificate
Digital Certificate
Document Certificate
Server Certificate
TRUE
___________ technology can be applied as a robust computer based alternative to traditional signature. ___________ is a tool used to exclude impersonators and forgers.
Digital signature
Digital certificate
Software
Computer
Document Authentication
Signer authentication
Document Certificate
Digital Certificate
___________ key is used to create the Digital signature and Public only known to the signer. _____________ is used for a veriety of electronic transactions. ______________ are used by individuals when they exchange messages with other users. Rule to design and use the database is called Digital signature
Foreign
Private
Secret
10
Server Certificate
Digital certificate
Digital Document
11
Document Certificate
Server Certificate
12
people
Information
13
_________ manages the interaction between the database and end user
RDBMS
DBMS
Database
Data Abstraction
S.No
14
NAME
Option 1
Option 2
Database server
Option 3
Data dictionary
Option 4
Database client
Answer
C
DBMS stores the definitions of data and their relationships in Data storage a _________ _______ describes the structure and constraints for the whole database Data modelling under conceptual model is achieved in ________ levels ___________ are data elements that describes an entity Internal Schema
15
External Schema
Conceptual Schema
View Level
16
one
two
three
six
17
Attributes
Entity
18
________ is the process of refining the data model built by an entity-relationship diagram The degree of relationship is also called as _________
Normal Form
Relationship
Abstraction
19
Cardinality
Logical Level
physical Level
View Level
20
N:1
M:N
Both A and B
21
In which structure we have parent-child/children relationship Hierarchy amongst the different modules. _______ describes a single location in a record in which a particular te of data is stored. SQL stands for Record
Network
Relational
Object-oriented
22
Table
Tuple
Fields
23
24
64000 char
25
In an ________, records in the joined tables must have the same values for fields that are joined. ___________ is a representation of facts, concepts or instructions in a formalized manner suitable for communication, interpretation or processing by users. Processed data is called __________
Outer joins
Inner joins
Self-Joins
Cross Joins
26
people
Information
Data
Procedure
27
people
Procedure
Data
Information
S.No
28
NAME
A __________ can consist of one or more tables of information that are related in some way. ___________ manages the database within the database system. __________ are most commonly used to access and manipulate the data found within the database. ___________ is the software tool which is used to manage the database system's components. Table
Option 1
Record
Option 2
Option 3
Database
Option 4
Tuples
Answer
C
29
RDBMS software
DBMS Software
VB software
30
Application program
31
Development software
Utility Software
Application software
32
A DBMS that supports a database distributed across several Centralized DBMS different sites is called _______________. Logical level is also called as Internal Schema. TRUE
Networking
Distributed DBMS
33
FALSE
34
_____________ level describes data storage structure and access paths. A technique for analysis and logical modeling of a system's data requirement is known as ___________. _____________ focuses on the logical nature of the data representation ___________ is the default datatype for primary key field.
Logical
View
Conceptual
Physical
35
Normalization
Implementation
E-R modeling
Hierarchy
36
Implementation model
Conceptual model
Network model
Relational model
37
Autonumber
Text
Number
Memo
38
We can set primary key for more than one field in a single table. Forms included in other forms are called _____________
TRUE
FALSE
39
Subdirectory
Subdatasheet
Subforms
Subwindows
40
TRUE
FALSE
41
_____________ functions calculates statistics on a group of Aggregate records in the current table.
Statistical
Logical
Database
S.No
42
NAME
_________________ is the process of arranging information in a specific meaningful order. ___________ performs certain action that has been assigned to it when clicked. Records in a table can be deleted even if they have relationship with other tables. OLE is a method used to sharing data between applications. Sorting
Option 1
Option 2
Filtering Indent
Option 3
Option 4
Alignment
Answer
B
43
Checkbox
Button
Command
Lablebox
44
TRUE
FALSE
45
TRUE
FALSE
46
47
___________ performs basic tasks, such as recognizing input from the keyboard and keeping track of files and directories on the disk. In __________ data are processed instantaneously.
Operating system
Control Unit
ALU
CPU
Batch processing
On-line processing
Line processing
Data processing
48
_________ allows more than one program to run concurrently The hard disk is instead broken into large pieces called ________ Unix/Linux file system was specially created for Windows New Technology File System NTFS stands for
Multi processing
Multithreading
Multitasking
Real time
49
Sector
Track
Clusters
Disk
50
TRUE
FALSE
51
52
NTFS is built for networking and with the goal of security, _______ and efficiency Every file on the hard disk is stored in a ________
53
Path
Directory
Folder
RAM
54
__________ is a process of optimizing the disks by rearranging the files. The base of the directory tree is called
Format
Backup
defragmentation
compression
55
Base Directory
Root Directory
Subdirectory
External Directory
S.No
56
NAME
_______ is the act of dividing the harddisk into pieces
Option 1
Fragmentation
Option 2
Formatting
Option 3
Restore
Option 4
Partitioning
Answer
D
57
_______ provides real time data recovery when a hard drive Tape fails and also protect against loss of data. Damage caused by a virus is called the ________ Uninfected file
Cd Drive
RAID
UPS
58
Payload
Scanners
Formload
59
Virus have been found on shrinkwrapped software straight from the manufacturer ___________ are files that contains other files.
TRUE
FALSE
60
Folders
Archive
File Container
Archie
61
The ________ is located across the bottom of desktop and offers an easy way to access programs USB stands for
Formatted Toolbar
Menubar
Taskbar
Standard Toolbar
62
63
Delete Cookies
Format
Defragmenter
Disk cleanup
64
New Technology File System Redundancy Array of Inexpensive Data End user
65
66
An operating system manages and coordinate the functions Computer hardware performed by the _____________ ______________ is used to controlling peripheral devices such as disk drives and printers. Which one is the operating system for minicomputer from the following options. ______________ determine weather the appropriate main memory and secondary storage capability what the user require is available. Hardware
67
Operating system
Control Unit
ALU
68
DOS
Windows
UNIX
MAC
69
Data management
Virtual storage
Memory management
Job management
S.No
70
NAME
______________ manages the storage and retrieval of data.
Option 1
Job management
Option 2
Data management
Option 3
Virtual storage
Option 4
Memory management CPU
Answer
B
71
_______________ manages the allocation of main memory Operating system to specific jobs. _______________ operating system enable several processes to run concurrently. _______________ is the ability of an operating system to execute different parts of a program simultaneously. _______________ operating system are the systems that respond to input immediately. _______________ allows user to enter command by pointing and clicking at objects that appear on the screen. ______________ is used to manage your hard disk data. Realtime
Control Unit
ALU
72
Multiprocessing
Multithreading
Multitasking
73
Realtime
Multiprocessing
Multithreading
Multitasking
74
Multiprocessing
Multithreading
Multitasking
Realtime
75
CPU
System software
76
Memory management
File system
Operating system
Data management
77
Sectors
Path
Memory
Operating system
78
TRUE
FALSE
79
10,000,000
15,000,000
20,000,000
25,000,000
80
NTFS
FTP
Database
FAT
81
TRUE
FALSE
82
Files are stored virtually in every operating system is known Directory as ______________ . The size of the file in __________. Mhertz
Directory tree
Path
Virtual storage
83
Characters
Bytes
Integers
S.No
84
NAME
Maximum number of characters can be included for File extension. Within the root directory we can create more subdirectories.
Option 1
2
Option 2
3
Option 3
5
Option 4
4
Answer
D
85
TRUE
FALSE
86
TRUE
FALSE
87
To refresh your hard disk ___________ command we can use. When you are formatting your hard disk we must do Partitioning. The basic RAID levels includes ________ RAID levels.
Cleanup
Compression
Format
Defragmentation
88
TRUE
FALSE
89
90
____________ is a computer program that is able to copy all into other programs. __________ are viruses which infect any executable programs. Any files or systems that is executed and infected can be a source of viruses To decompress your files or folders, which command we have to use from the following ____________ can convert a large file into a new one containing brief descriptions of a original file's patterns. ___________ format is the most common archive format.
Computer hardware
Computer viruses
Archie
Antivirus
91
File infectors
cluster viruses
92
TRUE
FALSE
93
decompress
Compress
Extract
Add
94
Format
Compression
Converter
Decompression
95
zip
rar
Archie
96
__________ consolidates fragmented files and folders on your system's hard disk.
Compression
Disk Defragmenter
Formatting
Restore
S.No
97
NAME
Acrobat reader software is used to open a ________ file format. __________ file system is designed for security and flexibility. htm
Option 1
pde
Option 2
pdf
Option 3
acr
Option 4
Answer
C
98
FAT
NTFS
UNIX/LINUX
99
Which of the following files could not be opened in excel ____ In excel, the dates that are stored as sequential numbers known as ___ The command to display the current date in a cell is _________________
text files
Lotus 1-2-3
100
serial values
domain values
range values
reference values
101
=today()
=date()
=currentdate()
102
In excel, absolute references are represented by a ________ dollar sign before the column and row addresses The function that is used to calculate the payment for specific loan terms ____________ The __________ option present in the file menu options is used to specify major facts of the page to be printed The process of finding or selecting information is known as _________ In a chart X-axis is known as_______________ sumif
# sign
103
pmt
countif
104
page setup
print area
105
filtering
searching
sorting
106
series or rank
category
legend
data marker
107
spaces
symbols
108
A ___________ is an excel file where the user stores his data Excel allows upto ______ levels of sorting
Workbook
Worksheet
Spreadsheet
109
two
three
S.No
110
NAME
If a cell shows ####### , it means that _____.
Option 1
your formula has a syntax error
Option 2
Option 3
Option 4
either b or c
Answer
C
the row is too short to the column is too show the number at the narrow to show all the current font size digits of the number
111 A _________________ is one billionth of a second 112 ______________ provides global connections for today's computers 113 ROM is also known as _____________ 114 The OS has to swap information back and forth between RAM and the harddisk is called 115 A pen is also called as ____________ in digitizing tablet. 116 Another term for dot pitch is ______________ 117 Keyboard is also called as ___________ 118 _________ can be input into a computer using a digital camera 119 The _________ bar displays the name of the document. 120 A quick way to get to the page setup dialog box is to __________ any gray portion of the ruler bar. 121 In early word processor, we have to run ___________ program to print the document. 122 A __________ is a single instruction that performs several different commands in a sequence determined by the user. Mail Merge Template Macro None of the above C Runner Formatter Editor Printer B Drag Triple click Click Double click D Name Status Title Tray icon C Codes Images A or B A&B B QWERTY ASDFGH ZXCVBN all the above A Phospher Pitch Bronze Pitch Metal Pitch None of the above A Light pen Mode Puck Stylus D thrashing jumping shifting moving A Samware Romware Firmware Germware C LAN WAN MAN GAM B nanosecond picosecond gigasecond none of the above A
S.No
123
NAME
Microsoft visual basic project file has _______ file extension. In visual basic, _______ method is used to load picture during runtime in an image control In visual basic, using a data control, to navigate to the previous record ________ method of a recordset object is used.
In visual basic, the explorer view of a project is displayed in ___________
Option 1
.vbg .vbp
Option 2
.frm
Option 3
.frx
Option 4
Answer
B
124
load
loadpicture
addpicture
125
movenext
movelast
moveprevious
movefirst
126
properties window
toolbox
project explorer
127
TRUE
FALSE
128
The "format columns" option allows to create columnar text up 12 columns only. true
129
false
The user can split the screen only into two parts
130
true
false
The feature that enables user to type anywhere in a document without pressing or tab
131 BBS stands for______
click-n-type
bulletin board system
double click
business broadcasting system windows sockets
A
A
132
windows socks
133
The space used by Netscape to store the retrieved page is called______ Internet can be defined as _______
buffer
cache
built-in
134
internal network
network of network
intermediate network
135
URL
DNS
FTP
S.No
136
NAME
URL stands for ____________
Option 1
Option 2
Option 3
Option 4
Answer
A
uniform research locator uniform resource locator unlimited restore locator none of the above
137
small
large
very small
138
net
web
browser
editor
139
list
directories
image list
140
141
ftp
telnet
142
143
documents
144
LAN
MAN
WAN
145
Hyper text transmission Hyper text transfer port protocol You can change both the appearance of a whole diagram and the individual shapes of a Organization charts You cannot change the style of the connecting lines in an Organization chart. Text
Hyper text transfer port You cannot change the color of the boxes in an Organization chart. Clips, organization charts, and text
146
147
You can change the appearance of a whole diagram, but not Which of the following objects can contain custom animation individual shapes of a Clips effects? PowerPoint's drawing toolbar contains _______ drawing tools 10
148
12
102
22
S.No
149
NAME
Option 1
Option 2
Option 3
Option 4
Answer
D
An example of the components of a multimedia presentation text, graphics and email text, hypertext and could include address. Power Point. ______ determines the order in which order in which the slides will be displayed during the show slide show custom show
CD-ROM, digital camera text, hypertext, and sound. Power Point, video and sound. both a and b none of the above
150