IT OFFICER PAPER
ONLY COMPUTER SECTION
ONLY COMPUTER SECTION
1. An applet __________
[A] is an interpreted program that runs on the client
[B] Tracks the number of visitors to a Website
[C] is a compiled program that usually runs on the client
[D] Collects data from visitors to a Website
[E] None of these
2 – The _____ states that a foreign key must either match a primary key value in another relation or it must be null.
[A] entity integrity rule
[B] referential integrity constraint
[C] action assertion
[D] composite attribute
[E] None of these
3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
[A] system virus
[B] Trojan horse virus
[C] file virus
[D] macro virus
[E] None of these
4. Which error detection method uses one's complement arithmetic?
[A] Simply parity check
[B] Checksum
[C] Two-dimensional parity check
[D] CRC
[E] None of these
5. A result of a computer virus can not lead to ___.
[A] Disk Crash
[B] Mother Board Crash
[C] Corruption of program
[D] Deletion of files
[E] None of these
6. The network interface card of LAN is related to following layer of OSI Model-
[A] Transport
[B] Network
[C] Data Link
[D] Physical
[E] All of these
7. Which of the following does not describe a data warehouse?
[A] Subject-oriented
[B] Integrated
[C] Time-variant
[D] Updateable
[E] None of these
8. Which of the following is true ?
[A] Logical design is software-dependent
[B] In a distributed database, database is stored in one physical location
[C] Conceptual design translates the logical design into internal model
[D] Logical design is software independent
[E] None of these
9. A range check _____
[A] ensures that only the correct data type is entered into a field
[B] verifies that all required data is present
[C] determines whether a number is within a specified limit
[D] tests if the data in two or more associated fields is logical
[E] None of these
10. The total set of interlinked hypertext documents worldwide is-
[A] HTTP
[B] Browser
[C] WWW
[D] B2B
[E] None of these
11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
[A] carries out, the details of an object for
[B] hides, the details of an object from
[C] reveals, the details of an object to
[D] extends, the details of an object beyond
[E] None of these
12. Every computer connected to an intranet or extranet must have a distinct_____
[A] firewall
[B] proxy server
[C] IP address
[D] domain name
[E] None of these
13. A table of bits in which each row represents the distinct values of a key?
[A] Join index
[B] Bitmap index
[C] B + Tree
[D] Hierarchical index
[E] None of these
14. The degree of detail that should be incorporated into a database depends on what?
[A] Data integrity
[B] The type of database
[C] The user's perspective
[D] The business practices and policies
[E] None of these
15. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
[A] Modem
[B] Router
[C] Gateway
[D] Bridge
[E] All of these
16. Before a package can be used in a java program it must be___.
[A] executed
[B] referenced
[C] imported
[D] declared
[E] None of these
17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.
[A] begin the line with a # sign
[B] begin the line with double slashes (/ /)
[C] begin and end the line with double hyphens (-_-)
[D] indent the line
[E] None of these
18. Programming language built into user programs such as Word and Excel are known as____
[A] 4GLs
[B] macro languages
[C] object-oriented languages
[D] visual programming languages
[E] None of these
19. Firewalls are used to protect against___.
[A] Unauthorized Attacks
[B] Virus Attacks
[C] Data Driven Attacks
[D] Fire Attacks
[E] All of these
20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-
[A] Interrupt request
[B] Forward DNS lookup
[C] Data-Link layer
[D] File Transfer Protocol
[E] Common gateway interface
21. Three SQL, DDL, CREATE commands are__.
[A] Schema, Base and Table
[B] Base, Table and Schema
[C] Key, Base and Table
[D] Schema, Table and View
[E] None of these
22. Data are ________ in client/server computing.
[A] never sent to the client machine
[B] sent in very large sections to save processing time
[C] sent only upon the client's request
[D] sent in complete copies for the client to filter and sort
[E] sent from the client to the server for processing
23. Which of the following will not eliminates the ambiguities of a null value?
[A] Define the attribute as required
[B] Define subtypes
[C] Define each attribute as having an initial value that is recognized as blank
[D] Define supertypes
[E] None of these
24. The____directory is mandatory for every disk.
[A] Root
[B] Base
[C] Sub
[D] Case
[E] None of these
25. This is a group of servers that share work and may be able to back each other up if one server fails.
[A] Channel bank
[B] Cluster
[C] Tiger team
[D] Serverless backup
[E] Logical unit
ANSWERS KEY
1. [A] 2.[C] 3.[E] 4. [B] 5.[B]
6. [E] 7. [D] 8. [A] 9. [C] 10.[A]
11. [B] 12 [C] 13 [B] 14 [B] 15[A]
16. [C] 17 [B] 18 [D] 19 [A] 20 [E]
21. [D] 22 [C] 23 [D] 24 [C] 25 [B]
No comments:
Post a Comment