Sei sulla pagina 1di 16

Module - 1

S.No
1

NAME
A ________ is not a part of substance of a transaction, but rather of its representation or form. __________ is used in both creating and verifying a digital signature. _____________ is the process of checking the digital signature by reference to the original message. ____________ is to prove your identity or your right to access information or services online electronically. A _________ identifies and authenticates your server and encrypts any information passed between the server and a web browser. A Digital Certificate is issued by a Certification Authority.

Option 1

Option 2

Option 3
Approval

Option 4
Cryptography

Answer
A

DIGITAL SIGNATURE Signature Authentication

Signer Authentication

Hash Function

Document Authentication DS Verification

Signer Authorisation DC Verification

DS Creation

DC Creation

Digital Signature

Digital Document

Server Certificate

Digital Certificate

Document Certificate

Personal Digital Certificate FALSE

Server Certificate

Secure Mode Certificate

TRUE

___________ technology can be applied as a robust computer based alternative to traditional signature. ___________ is a tool used to exclude impersonators and forgers.

Digital signature

Digital certificate

Software

Computer

Document Authentication

Signer authentication

Document Certificate

Digital Certificate

___________ key is used to create the Digital signature and Public only known to the signer. _____________ is used for a veriety of electronic transactions. ______________ are used by individuals when they exchange messages with other users. Digital signature

Foreign

Private

Secret

10

Server Certificate

Digital certificate

Digital Document

11

Document Certificate

Personal Digital Certificate

Server Certificate

Secure Mode Certificate

DATABASE 12 Rule to design and use the database is called people Data Information Procedure D

S.No
13

NAME
_________ manages the interaction between the database and end user

Option 1
RDBMS DBMS

Option 2

Option 3
Database

Option 4
Data Abstraction

Answer
B

14

DBMS stores the definitions of data and their relationships in Data storage a _________

Database server

Data dictionary

Database client

15

_______ describes the structure and constraints for the whole database

Internal Schema

External Schema

Conceptual Schema

View Level

16

Data modelling under conceptual model is achieved in ________ levels

one

two

three

six

17

___________ are data elements that describes an entity

Attributes

category

Relationship

Entity

18

________ is the process of refining the data model built by an entity-relationship diagram

Normal Form

Relationship

Normalization

Abstraction

19

The degree of relationship is also called as _________

Cardinality

Logical Level

physical Level

View Level

20

_________ structure is possible in a network structure

N:1

M:N

None of the above

Both A and B

21

In which structure we have parent-child/children relationship Hierarchy amongst the different modules.

Network

Relational

Object-oriented

22

_______ describes a single location in a record in which a particular te of data is stored.

Record

Table

Tuple

Fields

23

SQL stands for

Standard Query Language

Standard Query List

Structured Query Language

Structured Query List

S.No
24

NAME
Maximum Character for Memo Datatype is

Option 1
255 char

Option 2
64000 char 4 bytes

Option 3

Option 4
2 bytes

Answer
B

25

In an ________, records in the joined tables must have the same values for fields that are joined.

Outer joins

Inner joins

Self-Joins

Cross Joins

26

___________ is a representation of facts, concepts or instructions in a formalized manner suitable for communication, interpretation or processing by users. Processed data is called __________

people

Information

Data

Procedure

27

people

Procedure

Data

Information

28

A __________ can consist of one or more tables of information that are related in some way.

Table

Record

Database

Tuples

29

___________ manages the database within the database system.

RDBMS software

DBMS Software

VB software

Object-oriented software

30

__________ are most commonly used to access and manipulate the data found within the database.

Application program

Object-oriented program Development program

Utility Program

31

___________ is the software tool which is used to manage the database system's components.

Development software

Utility Software

Application software

Object-oriented software

32

A DBMS that supports a database distributed across several Centralized DBMS different sites is called _______________.

Networking

Distributed DBMS

LAN

33

Logical level is also called as Internal Schema.

TRUE

FALSE

34

_____________ level describes data storage structure and access paths.

Logical

View

Conceptual

Physical

S.No
35

NAME
A technique for analysis and logical modeling of a system's data requirement is known as ___________.

Option 1
Normalization

Option 2
Implementation

Option 3
E-R modeling

Option 4
Hierarchy

Answer
C

36

_____________ focuses on the logical nature of the data representation

Implementation model

Conceptual model

Network model

Relational model

37

___________ is the default datatype for primary key field.

Autonumber

Text

Number

Memo

38 We can set primary key for more than one field in a single table.

TRUE

FALSE

39 Forms included in other forms are called _____________

Subdirectory

Subdatasheet

Subforms

Subwindows

40

Using datasheet view, we can see only one record at a time.

TRUE

FALSE

41

_____________ functions calculates statistics on a group of Aggregate records in the current table.

Statistical

Logical

Database

42

_________________ is the process of arranging information in a specific meaningful order.

Sorting

Filtering

Indent

Alignment

43

___________ performs certain action that has been assigned to it when clicked.

Checkbox

Button

Command

Lablebox

44

Records in a table can be deleted even if they have relationship with other tables. OLE is a method used to sharing data between applications.

TRUE

FALSE

45

TRUE

FALSE

OPERATING SYSTEM

S.No
46

NAME
___________ performs basic tasks, such as recognizing input from the keyboard and keeping track of files and directories on the disk. In __________ data are processed instantaneously.

Option 1
Operating system

Option 2
Control Unit ALU

Option 3
CPU

Option 4

Answer
A

47

Batch processing

On-line processing

Line processing

Data processing

48

_________ allows more than one program to run concurrently The hard disk is instead broken into large pieces called ________ Unix/Linux file system was specially created for Windows New Technology File System NTFS stands for

Multi processing

Multithreading

Multitasking

Real time

49

Sector

Track

Clusters

Disk

50

TRUE

FALSE

51

New Training File System Reliability

New Technology File System Sequencing

New Technology Forcasting System Flow control

New Transmitting File System Expandability

52

NTFS is built for networking and with the goal of security, _______ and efficiency Every file on the hard disk is stored in a ________

53

Path

Directory

Folder

RAM

54

__________ is a process of optimizing the disks by rearranging the files. The base of the directory tree is called

Format

Backup

defragmentation

compression

55

Base Directory

Root Directory

Subdirectory

External Directory B

56

_______ is the act of dividing the harddisk into pieces

Fragmentation

Formatting

Restore

Partitioning

57

_______ provides real time data recovery when a hard drive Tape fails and also protect against loss of data. Damage caused by a virus is called the ________ Uninfected file

Cd Drive

RAID

UPS

58

Payload

Scanners

Formload

S.No
59

NAME
Virus have been found on shrinkwrapped software straight from the manufacturer ___________ are files that contains other files. TRUE

Option 1
FALSE

Option 2

Option 3

Option 4

Answer
A

60

Folders

Archive

File Container

Archie

61

The ________ is located across the bottom of desktop and offers an easy way to access programs USB stands for

Formatted Toolbar

Menubar

Taskbar

Standard Toolbar

62

Uniform Serial Bus

Universal Serial Bus

Unix Serial Bus

Unilex Serial Bus

63

___________ is used to remove unneeded files.

Delete Cookies

Format

Defragmenter

Disk cleanup

64

Which file system was created for windows NT

File Allocation Table

UNIX/LINUX File System Reduntant Array of Inexpensive Disks Software

New Technology File System Redundancy Array of Inexpensive Data End user

Virtual File Syatem C

65

RAID stands for

Redundant Array of Inexpensive Data

Redundancy Array B of Inexpensive Disk People A

66

An operating system manages and coordinate the functions Computer hardware performed by the _____________ ______________ is used to controlling peripheral devices such as disk drives and printers. Which one is the operating system for minicomputer from the following options. ______________ determine weather the appropriate main memory and secondary storage capability what the user require is available. ______________ manages the storage and retrieval of data. Hardware

67

Operating system

Control Unit

ALU

68

DOS

Windows

UNIX

MAC

69

Data management

Virtual storage

Memory management

Job management

70

Job management

Data management

Virtual storage

Memory management CPU

71

_______________ manages the allocation of main memory Operating system to specific jobs.

Control Unit

ALU

S.No
72

NAME
_______________ operating system enable several processes to run concurrently. _______________ is the ability of an operating system to execute different parts of a program simultaneously. _______________ operating system are the systems that respond to input immediately. _______________ allows user to enter command by pointing and clicking at objects that appear on the screen. ______________ is used to manage your hard disk data.

Option 1
Realtime

Option 2
Multiprocessing

Option 3
Multithreading

Option 4
Multitasking

Answer
B

73

Realtime

Multiprocessing

Multithreading

Multitasking

74

Multiprocessing

Multithreading

Multitasking

Realtime

75

CPU

System software

Graphical user interface System interface

76

Memory management

File system

Operating system

Data management B

77

Data is stored in ___________ on the hard disk.

Sectors

Path

Memory

Operating system

78

We can allocate an individual sector to files.

TRUE

FALSE

79

10GB disk partition has ___________ sectors

10,000,000

15,000,000

20,000,000

25,000,000 C

80

The information about clusters is stored in ________ .

NTFS

FTP

Database

FAT

81

In NTFS we are having file-by-file compression.

TRUE

FALSE

82

Files are stored virtually in every operating system is known Directory as ______________ . The size of the file in __________. Mhertz

Directory tree

Path

Virtual storage

83

Characters

Bytes

Integers

84

Maximum number of characters can be included for File extension.

4D

S.No
85

NAME
Within the root directory we can create more subdirectories.

Option 1
TRUE

Option 2
FALSE

Option 3

Option 4

Answer
A

86

We cannot able to display partition information.

TRUE

FALSE

87

To refresh your hard disk ___________ command we can use. When you are formatting your hard disk we must do Partitioning. The basic RAID levels includes ________ RAID levels.

Cleanup

Compression

Format

Defragmentation

88

TRUE

FALSE

89

6D

90

____________ is a computer program that is able to copy all into other programs. __________ are viruses which infect any executable programs. Any files or systems that is executed and infected can be a source of viruses To decompress your files or folders, which command we have to use from the following ____________ can convert a large file into a new one containing brief descriptions of a original file's patterns. ___________ format is the most common archive format.

Computer hardware

Computer viruses

Archie

Antivirus

91

Boot sector infectors

File system viruses

File infectors

cluster viruses

92

TRUE

FALSE

93

decompress

Compress

Extract

Add

94

Format

Compression

Converter

Decompression

95

zip

rar

Archie

pdf

96

__________ consolidates fragmented files and folders on your system's hard disk. Acrobat reader software is used to open a ________ file format. __________ file system is designed for security and flexibility.

Compression

Disk Defragmenter

Formatting

Restore

97

htm

pde

pdf

acr

98

FAT

NTFS

Virtual File system

UNIX/LINUX

__________ is used in both creating and verifying a digital signature. _____________ is the process of checking the digital signature by reference to the original message. ____________ is to prove your identity or your right to access information or services online electronically. A _________ identifies and authenticates your server and encrypts any information passed between the server and a web browser. A Digital Certificate is issued by a Certification Authority.

Signer Authentication

DS Creation

Digital Signature

Document Certificate

TRUE

___________ technology can be applied as a robust computer based alternative to traditional signature. ___________ is a tool used to exclude impersonators and forgers.

Digital signature

Document Authentication

___________ key is used to create the Digital signature and Public only known to the signer. _____________ is used for a veriety of electronic transactions. ______________ are used by individuals when thay exchange messages with other users. Maximum number of characters can be included for File extension. Within the root directory we can create more subdirectories. TRUE Digital signature

10

Document Certificate

11

12

13

We cannot able to display partition information.

TRUE

14

To refresh your hard disk ___________ command we can use. When you are formatting your hard disk we must do Partitioning. The basic RAID levels includes ________ RAID levels.

Cleanup

15

TRUE

16

17

____________ is a computer program that is able to copy all into other programs.

Computer hardware

18

__________ are viruses which infect any executable programs. Any files or systems that is executed and infected can be a source of viruses To decompress your files or folders, which command we have to use from the following ____________ can convert a large file into a new one containing brief descriptions of a original file's patterns. ___________ format is the most common archive format.

Boot sector infectors

19

TRUE

20

decompress

21

Format

22

zip

23

__________ consolidates fragmented files and folders on your system's hard disk. _________ is the file attribute byte for system hidden directory. __________ file system is designed for security and flexibility.

Compression

24

00010010

25

FAT

Hash Function

Document Authentication DS Verification

Signer Authorisation

DC Creation

DC Verification

Digital Document

Server Certificate

Digital Certificate

Personal Digital Certificate FALSE

Server Certificate

Secure Mode Certificate C

Digital certificate

Software

Computer

Signer authentication

Document Certificate

Digital Certificate

Foreign

Private

Secret

Server Certificate

Digital certificate

Digital Document

Personal Digital Certificate 3

Server Certificate

Secure Mode Certificate B

4D

FALSE

FALSE

Compression

Format

Defragmentation

FALSE

6D

Computer viruses

Archie

Antivirus

File system viruses

File infectors

cluster viruses

FALSE

Compress

Extract

Add

Compression

Converter

Decompression

rar

Archie

pdf

Disk Defragmenter

Formatting

Restore

00010100

00010110

00000011

NTFS

Virtual File system

UNIX/LINUX

____________ is to prove your identity or Digital Signature your right to access information or services online electronically. A _________ identifies and authenticates Document your server and encrypts any information Certificate passed between the server and a web browser. Certificate is issued by a A Digital TRUE Certification Authority. ___________ technology can be applied Digital signature as a robust computer based alternative to traditional signature. ___________ is a tool used to exclude impersonators and forgers. ___________ key is used to create the Digital signature and only known to the signer. _________ manages the interaction between the database and end user Document Authentication Public

Digital Document Personal Digital Certificate FALSE

Server Certificate Server Certificate

Digital certificate

Software

Signer Document authentication Certificate Foreign Private

RDBMS

DBMS

Database

DBMS stores the definitions of data and their relationships in a _________

Data storage

Database server

Data dictionary

_______ describes the structure and constraints for the whole database

Internal Schema

External Schema

Conceptual Schema

10

Data modelling under conceptual model is achieved in ________ levels

one

two

three

11

___________ are data elements that describes an entity

Attributes

category

12

________ is the process of refining the data model built by an entity-relationship diagram The degree of relationship is also called as _________

Normal Form

Relationship

Relationship Normalization

13

Cardinality

Logical Level

physical Level

14

_________ structure is possible in a network structure

N:1

M:N

None of the above

15

Damage caused by a virus is called the ________

Uninfected file

Payload

Scanners

16

Virus have been found on shrinkwrapped TRUE software straight from the manufacturer ___________ are files that contains other Folders files. The ________ is located across the Formatted bottom of desktop and offers an easy way Toolbar to access programs USB stands for Uniform Serial Bus Delete Cookies

FALSE

17

Archive

File Container

18

Menubar

Taskbar

19

Universal Serial Bus Format

Unix Serial Bus Defragmenter

20

___________ is used to remove unneeded files. A hub is a device that can connect An IP address is a Protocol is

21 22 23

Only Computers

Can not computers

Only printers A memory address software that allows file copying

Physical address Logical address software that a list of rules facilitates for transferring connection to the data over a internet network

Digital Certificate Secure Mode Certificate

Computer

Digital Certificate Secret

Data Abstraction

Database client

View Level

six

Entity

Abstraction

View Level

Both A and B

Formload

Archie

Standard Toolbar Unilex Serial Bus Disk cleanup

None of the above None of the above a gateway calling program for internet bridging

D B B

Potrebbero piacerti anche