(A)The access time of magnetic disk is
much less than that of magnetic tape
(B)Disk storage is longer lasting than
magnetic tape
(C)Disk storage is less expensive than
tape storage
(D)All of the above
(E) None of these
ANSWER: (D)
2. A prefix for billion which is equal
to _____is called as billi.
(A) 100
(B) 10000
(C) 1000
(D) 10
(E) None of these
ANSWER: (A)
3. One kilobyte -byte
(A) 1250
(B) 2088
(C) 1024
(D) 1000
(E) None of these
ANSWER: (C)
4. To move the cursor to the end of the
document
press
(A) Ctrl + Esc
(B) Ctrl + End
(C) Ctrl + B
(D) Ctrl + C
(E) None of these
ANSWER: (B)
5. The shortcut key to print documents
is
(A) Ctrl + A
(B) Ctrl + B
(C) Ctrl + P
(D) Ctrl + C
(E) None of these
ANSWER: (C)
6. In MICR, C stands for
(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these
ANSWER: (D)
7. The simultaneous processing of two
or more Programs by multiple processors is
(A) Multiprogramming
(B) Multitasking
(C) Time-sharing
(D) Multiprocessing
(E) None of these
ANSWER: (D)
8. First layer in the OSI reference
model is
(A) Data link
(B) Network
(C) Physical
(D) Application
(E) None of these
ANSWER: (C)
9. Viruses, Trojan horses and worms are
(A) Able to harm computer system
(B) Unable to detect if affected on
computer
(C) User-friendly applications
(D) Harmless applications resident on
computer
(E) None of these
ANSWER: (A)
10. Failure of passwords security due
to exposure can result from
(A) Electronic monitoring
(B) Visual
(C) Both ‘A’ and ‘B’
(D) Light
(E) None of these
ANSWER: (C)
11. Data security
threats include
(A) Hardware failure
(B) Privacy invasion
(C) Fraudulent manipulation of data
(D) All of the above
(E) None of these
ANSWER (B)
12. Graphical pictures that represent
an object like file, folder etc. are
(A) Task bar
(B) Windows
(C) Desktop
(D) Icons
(E) None of these
ANSWER (D)
13. Accessing records from a file
directly without searching from the beginning of the file is
(A) Time sharing
(B) Random
(C) Direct access
(D) Access time
(E) None of these
ANSWER (C)
14. Database redesign is not terribly
difficult if the
(A) Database is structured
(B) Database is well-designed
(C) Database has no data
(D) Database is relatively small
(E) None of these
ANSWER (C)
15. Which of the following SQL
statements are helpful in database redesign?
(A) Correlated sub queries only
(B) EXISTS/ NOT EXISTS expressions only
(C) Both of the above are helpful
(D) Creating the
database are helpful
(E) None of these
ANSWER (C)
16. The EXISTS keyword will be true if
(A)Any row in the sub query meets the
condition only
(B)All rows in the sub query fail the
condition only
(C)Both of these two conditions are met
(D)Neither of these two conditions is
met
(E) None of these
ANSWER (A)
17. How can you find rows that do not
match some specified condition ?
(A) EXISTS
(B) Double use of NOT EXISTS
(C) NOT EXISTS
(D) ROWS EXIT
(E) None of these
ANSWER (C)
18. The process of reading a database
schema and producing a data model from that schema is
known as
(A) Data modelling
(B) Database design
(C) Reverse engineering
(D) Inverse engineering
(E) None of these
ANSWER (C)
19. Which SQL-92 standard SQL command
can be used to change a table name ?
(A) RENAME TABLE
(B) CHANGE TABLE
(C) ALTER TABLE
(D) All of the above
(E) None of these
ANSWER (A)
20. What SQL command can be used to
delete columns from a table?
(A) MODIFY TABLE Name DROP COLUMN Name
(B) MODIFY TABLE Name DROP Column Name
(C) ALTER TABLE Name DROP Column Name
(D) All of the above
(E) None of these
ANSWER (C)
21. Which of the following
modifications may not succeed?
(A) Changing a column data type from
char to date
(B) Changing a column data type from
numeric to char
(C) Both of the above actions should
succeed
(D) Neither of the above actions will
succeed
(E) None of these
ANSWER ((A)
22. Changing cardinalities in a
database is
(A) A common database design task
(B) A rare database design task, but
does occur
(C) A database design task that never
occurs
(D) Is impossible to do, so a new
database must be constructed and the data moved into it
(E) None of these
ANSWER (A)
23. A regular sub query can be
processed
(A)From the top down
(B)From the bottom up
(C)By nesting
(D)From the right up
(E) None of these
ANSWER ((B)
24. How many copies of the database
schema are typically used in the redesign process?
(A)One
(B)Two
(C)Three
(D)Four
(E) None of these
ANSWER (C)
25. Through which device the main
components of the computer communicate with each other?
(A). Keyboard
(B). System Bus
(C). Monitor
(D). Memory
(E) None of these
ANSWER (B)