Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
S.No
1
NAME
A ________ is not a part of substance of a transaction, but rather of its representation or form. __________ is used in both creating and verifying a digital signature. _____________ is the process of checking the digital signature by reference to the original message. ____________ is to prove your identity or your right to access information or services online electronically. A _________ identifies and authenticates your server and encrypts any information passed between the server and a web browser. A Digital Certificate is issued by a Certification Authority.
Option 1
Option 2
Option 3
Approval
Option 4
Cryptography
Answer
A
Signer Authentication
Hash Function
DS Creation
DC Creation
Digital Signature
Digital Document
Server Certificate
Digital Certificate
Document Certificate
Server Certificate
TRUE
___________ technology can be applied as a robust computer based alternative to traditional signature. ___________ is a tool used to exclude impersonators and forgers.
Digital signature
Digital certificate
Software
Computer
Document Authentication
Signer authentication
Document Certificate
Digital Certificate
___________ key is used to create the Digital signature and Public only known to the signer. _____________ is used for a veriety of electronic transactions. ______________ are used by individuals when they exchange messages with other users. Digital signature
Foreign
Private
Secret
10
Server Certificate
Digital certificate
Digital Document
11
Document Certificate
Server Certificate
DATABASE 12 Rule to design and use the database is called people Data Information Procedure D
S.No
13
NAME
_________ manages the interaction between the database and end user
Option 1
RDBMS DBMS
Option 2
Option 3
Database
Option 4
Data Abstraction
Answer
B
14
DBMS stores the definitions of data and their relationships in Data storage a _________
Database server
Data dictionary
Database client
15
_______ describes the structure and constraints for the whole database
Internal Schema
External Schema
Conceptual Schema
View Level
16
one
two
three
six
17
Attributes
category
Relationship
Entity
18
________ is the process of refining the data model built by an entity-relationship diagram
Normal Form
Relationship
Normalization
Abstraction
19
Cardinality
Logical Level
physical Level
View Level
20
N:1
M:N
Both A and B
21
In which structure we have parent-child/children relationship Hierarchy amongst the different modules.
Network
Relational
Object-oriented
22
Record
Table
Tuple
Fields
23
S.No
24
NAME
Maximum Character for Memo Datatype is
Option 1
255 char
Option 2
64000 char 4 bytes
Option 3
Option 4
2 bytes
Answer
B
25
In an ________, records in the joined tables must have the same values for fields that are joined.
Outer joins
Inner joins
Self-Joins
Cross Joins
26
___________ is a representation of facts, concepts or instructions in a formalized manner suitable for communication, interpretation or processing by users. Processed data is called __________
people
Information
Data
Procedure
27
people
Procedure
Data
Information
28
A __________ can consist of one or more tables of information that are related in some way.
Table
Record
Database
Tuples
29
RDBMS software
DBMS Software
VB software
Object-oriented software
30
__________ are most commonly used to access and manipulate the data found within the database.
Application program
Utility Program
31
___________ is the software tool which is used to manage the database system's components.
Development software
Utility Software
Application software
Object-oriented software
32
A DBMS that supports a database distributed across several Centralized DBMS different sites is called _______________.
Networking
Distributed DBMS
LAN
33
TRUE
FALSE
34
Logical
View
Conceptual
Physical
S.No
35
NAME
A technique for analysis and logical modeling of a system's data requirement is known as ___________.
Option 1
Normalization
Option 2
Implementation
Option 3
E-R modeling
Option 4
Hierarchy
Answer
C
36
Implementation model
Conceptual model
Network model
Relational model
37
Autonumber
Text
Number
Memo
38 We can set primary key for more than one field in a single table.
TRUE
FALSE
Subdirectory
Subdatasheet
Subforms
Subwindows
40
TRUE
FALSE
41
_____________ functions calculates statistics on a group of Aggregate records in the current table.
Statistical
Logical
Database
42
Sorting
Filtering
Indent
Alignment
43
___________ performs certain action that has been assigned to it when clicked.
Checkbox
Button
Command
Lablebox
44
Records in a table can be deleted even if they have relationship with other tables. OLE is a method used to sharing data between applications.
TRUE
FALSE
45
TRUE
FALSE
OPERATING SYSTEM
S.No
46
NAME
___________ performs basic tasks, such as recognizing input from the keyboard and keeping track of files and directories on the disk. In __________ data are processed instantaneously.
Option 1
Operating system
Option 2
Control Unit ALU
Option 3
CPU
Option 4
Answer
A
47
Batch processing
On-line processing
Line processing
Data processing
48
_________ allows more than one program to run concurrently The hard disk is instead broken into large pieces called ________ Unix/Linux file system was specially created for Windows New Technology File System NTFS stands for
Multi processing
Multithreading
Multitasking
Real time
49
Sector
Track
Clusters
Disk
50
TRUE
FALSE
51
52
NTFS is built for networking and with the goal of security, _______ and efficiency Every file on the hard disk is stored in a ________
53
Path
Directory
Folder
RAM
54
__________ is a process of optimizing the disks by rearranging the files. The base of the directory tree is called
Format
Backup
defragmentation
compression
55
Base Directory
Root Directory
Subdirectory
External Directory B
56
Fragmentation
Formatting
Restore
Partitioning
57
_______ provides real time data recovery when a hard drive Tape fails and also protect against loss of data. Damage caused by a virus is called the ________ Uninfected file
Cd Drive
RAID
UPS
58
Payload
Scanners
Formload
S.No
59
NAME
Virus have been found on shrinkwrapped software straight from the manufacturer ___________ are files that contains other files. TRUE
Option 1
FALSE
Option 2
Option 3
Option 4
Answer
A
60
Folders
Archive
File Container
Archie
61
The ________ is located across the bottom of desktop and offers an easy way to access programs USB stands for
Formatted Toolbar
Menubar
Taskbar
Standard Toolbar
62
63
Delete Cookies
Format
Defragmenter
Disk cleanup
64
New Technology File System Redundancy Array of Inexpensive Data End user
65
66
An operating system manages and coordinate the functions Computer hardware performed by the _____________ ______________ is used to controlling peripheral devices such as disk drives and printers. Which one is the operating system for minicomputer from the following options. ______________ determine weather the appropriate main memory and secondary storage capability what the user require is available. ______________ manages the storage and retrieval of data. Hardware
67
Operating system
Control Unit
ALU
68
DOS
Windows
UNIX
MAC
69
Data management
Virtual storage
Memory management
Job management
70
Job management
Data management
Virtual storage
71
_______________ manages the allocation of main memory Operating system to specific jobs.
Control Unit
ALU
S.No
72
NAME
_______________ operating system enable several processes to run concurrently. _______________ is the ability of an operating system to execute different parts of a program simultaneously. _______________ operating system are the systems that respond to input immediately. _______________ allows user to enter command by pointing and clicking at objects that appear on the screen. ______________ is used to manage your hard disk data.
Option 1
Realtime
Option 2
Multiprocessing
Option 3
Multithreading
Option 4
Multitasking
Answer
B
73
Realtime
Multiprocessing
Multithreading
Multitasking
74
Multiprocessing
Multithreading
Multitasking
Realtime
75
CPU
System software
76
Memory management
File system
Operating system
Data management B
77
Sectors
Path
Memory
Operating system
78
TRUE
FALSE
79
10,000,000
15,000,000
20,000,000
25,000,000 C
80
NTFS
FTP
Database
FAT
81
TRUE
FALSE
82
Files are stored virtually in every operating system is known Directory as ______________ . The size of the file in __________. Mhertz
Directory tree
Path
Virtual storage
83
Characters
Bytes
Integers
84
4D
S.No
85
NAME
Within the root directory we can create more subdirectories.
Option 1
TRUE
Option 2
FALSE
Option 3
Option 4
Answer
A
86
TRUE
FALSE
87
To refresh your hard disk ___________ command we can use. When you are formatting your hard disk we must do Partitioning. The basic RAID levels includes ________ RAID levels.
Cleanup
Compression
Format
Defragmentation
88
TRUE
FALSE
89
6D
90
____________ is a computer program that is able to copy all into other programs. __________ are viruses which infect any executable programs. Any files or systems that is executed and infected can be a source of viruses To decompress your files or folders, which command we have to use from the following ____________ can convert a large file into a new one containing brief descriptions of a original file's patterns. ___________ format is the most common archive format.
Computer hardware
Computer viruses
Archie
Antivirus
91
File infectors
cluster viruses
92
TRUE
FALSE
93
decompress
Compress
Extract
Add
94
Format
Compression
Converter
Decompression
95
zip
rar
Archie
96
__________ consolidates fragmented files and folders on your system's hard disk. Acrobat reader software is used to open a ________ file format. __________ file system is designed for security and flexibility.
Compression
Disk Defragmenter
Formatting
Restore
97
htm
pde
acr
98
FAT
NTFS
UNIX/LINUX
__________ is used in both creating and verifying a digital signature. _____________ is the process of checking the digital signature by reference to the original message. ____________ is to prove your identity or your right to access information or services online electronically. A _________ identifies and authenticates your server and encrypts any information passed between the server and a web browser. A Digital Certificate is issued by a Certification Authority.
Signer Authentication
DS Creation
Digital Signature
Document Certificate
TRUE
___________ technology can be applied as a robust computer based alternative to traditional signature. ___________ is a tool used to exclude impersonators and forgers.
Digital signature
Document Authentication
___________ key is used to create the Digital signature and Public only known to the signer. _____________ is used for a veriety of electronic transactions. ______________ are used by individuals when thay exchange messages with other users. Maximum number of characters can be included for File extension. Within the root directory we can create more subdirectories. TRUE Digital signature
10
Document Certificate
11
12
13
TRUE
14
To refresh your hard disk ___________ command we can use. When you are formatting your hard disk we must do Partitioning. The basic RAID levels includes ________ RAID levels.
Cleanup
15
TRUE
16
17
____________ is a computer program that is able to copy all into other programs.
Computer hardware
18
__________ are viruses which infect any executable programs. Any files or systems that is executed and infected can be a source of viruses To decompress your files or folders, which command we have to use from the following ____________ can convert a large file into a new one containing brief descriptions of a original file's patterns. ___________ format is the most common archive format.
19
TRUE
20
decompress
21
Format
22
zip
23
__________ consolidates fragmented files and folders on your system's hard disk. _________ is the file attribute byte for system hidden directory. __________ file system is designed for security and flexibility.
Compression
24
00010010
25
FAT
Hash Function
Signer Authorisation
DC Creation
DC Verification
Digital Document
Server Certificate
Digital Certificate
Server Certificate
Digital certificate
Software
Computer
Signer authentication
Document Certificate
Digital Certificate
Foreign
Private
Secret
Server Certificate
Digital certificate
Digital Document
Server Certificate
4D
FALSE
FALSE
Compression
Format
Defragmentation
FALSE
6D
Computer viruses
Archie
Antivirus
File infectors
cluster viruses
FALSE
Compress
Extract
Add
Compression
Converter
Decompression
rar
Archie
Disk Defragmenter
Formatting
Restore
00010100
00010110
00000011
NTFS
UNIX/LINUX
____________ is to prove your identity or Digital Signature your right to access information or services online electronically. A _________ identifies and authenticates Document your server and encrypts any information Certificate passed between the server and a web browser. Certificate is issued by a A Digital TRUE Certification Authority. ___________ technology can be applied Digital signature as a robust computer based alternative to traditional signature. ___________ is a tool used to exclude impersonators and forgers. ___________ key is used to create the Digital signature and only known to the signer. _________ manages the interaction between the database and end user Document Authentication Public
Digital certificate
Software
RDBMS
DBMS
Database
Data storage
Database server
Data dictionary
_______ describes the structure and constraints for the whole database
Internal Schema
External Schema
Conceptual Schema
10
one
two
three
11
Attributes
category
12
________ is the process of refining the data model built by an entity-relationship diagram The degree of relationship is also called as _________
Normal Form
Relationship
Relationship Normalization
13
Cardinality
Logical Level
physical Level
14
N:1
M:N
15
Uninfected file
Payload
Scanners
16
Virus have been found on shrinkwrapped TRUE software straight from the manufacturer ___________ are files that contains other Folders files. The ________ is located across the Formatted bottom of desktop and offers an easy way Toolbar to access programs USB stands for Uniform Serial Bus Delete Cookies
FALSE
17
Archive
File Container
18
Menubar
Taskbar
19
20
___________ is used to remove unneeded files. A hub is a device that can connect An IP address is a Protocol is
21 22 23
Only Computers
Physical address Logical address software that a list of rules facilitates for transferring connection to the data over a internet network
Computer
Data Abstraction
Database client
View Level
six
Entity
Abstraction
View Level
Both A and B
Formload
Archie
None of the above None of the above a gateway calling program for internet bridging
D B B