Thursday 12 January 2012

IT officer previous paper Only Computer Section

IT OFFICER PAPER 

ONLY COMPUTER SECTION




1. An applet __________

[A] is an interpreted program that runs on the client

[B] Tracks the number of visitors to a Website

[C] is a compiled program that usually runs on the client

[D] Collects data from visitors to a Website

[E] None of these

2 – The _____ states that a foreign key must either match a primary key value in another relation or it must be null.

[A] entity integrity rule

[B] referential integrity constraint

[C] action assertion

[D] composite attribute

[E] None of these

3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

[A] system virus

[B] Trojan horse virus

[C] file virus

[D] macro virus

[E] None of these

4. Which error detection method uses one's complement arithmetic?

[A] Simply parity check

[B] Checksum

[C] Two-dimensional parity check

[D] CRC

[E] None of these

5. A result of a computer virus can not lead to ___.

[A] Disk Crash

[B] Mother Board Crash

[C] Corruption of program

[D] Deletion of files

[E] None of these

6. The network interface card of LAN is related to following layer of OSI Model-

[A] Transport

[B] Network

[C] Data Link

[D] Physical

[E] All of these

7. Which of the following does not describe a data warehouse?

[A] Subject-oriented

[B] Integrated

[C] Time-variant

[D] Updateable

[E] None of these

8. Which of the following is true ?

[A] Logical design is software-dependent

[B] In a distributed database, database is stored in one physical location

[C] Conceptual design translates the logical design into internal model

[D] Logical design is software independent

[E] None of these

9. A range check _____

[A] ensures that only the correct data type is entered into a field

[B] verifies that all required data is present

[C] determines whether a number is within a specified limit

[D] tests if the data in two or more associated fields is logical

[E] None of these

10. The total set of interlinked hypertext documents worldwide is-

[A] HTTP

[B] Browser

[C] WWW

[D] B2B

[E] None of these

11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.

[A] carries out, the details of an object for

[B] hides, the details of an object from

[C] reveals, the details of an object to

[D] extends, the details of an object beyond

[E] None of these

12. Every computer connected to an intranet or extranet must have a distinct_____

[A] firewall

[B] proxy server

[C] IP address

[D] domain name

[E] None of these

13. A table of bits in which each row represents the distinct values of a key?

[A] Join index

[B] Bitmap index

[C] B + Tree

[D] Hierarchical index

[E] None of these

14. The degree of detail that should be incorporated into a database depends on what?

[A] Data integrity

[B] The type of database

[C] The user's perspective

[D] The business practices and policies

[E] None of these

15. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

[A] Modem

[B] Router

[C] Gateway

[D] Bridge

[E] All of these

16. Before a package can be used in a java program it must be___.

[A] executed

[B] referenced

[C] imported

[D] declared

[E] None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.

[A] begin the line with a # sign

[B] begin the line with double slashes (/ /)

[C] begin and end the line with double hyphens (-_-)

[D] indent the line

[E] None of these

18. Programming language built into user programs such as Word and Excel are known as____

[A] 4GLs

[B] macro languages

[C] object-oriented languages

[D] visual programming languages

[E] None of these

19. Firewalls are used to protect against___.

[A] Unauthorized Attacks

[B] Virus Attacks

[C] Data Driven Attacks

[D] Fire Attacks

[E] All of these

20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

[A] Interrupt request

[B] Forward DNS lookup

[C] Data-Link layer

[D] File Transfer Protocol

[E] Common gateway interface

21. Three SQL, DDL, CREATE commands are__.

[A] Schema, Base and Table

[B] Base, Table and Schema

[C] Key, Base and Table

[D] Schema, Table and View

[E] None of these

22. Data are ________ in client/server computing.

[A] never sent to the client machine

[B] sent in very large sections to save processing time

[C] sent only upon the client's request

[D] sent in complete copies for the client to filter and sort

[E] sent from the client to the server for processing

23. Which of the following will not eliminates the ambiguities of a null value?

[A] Define the attribute as required

[B] Define subtypes

[C] Define each attribute as having an initial value that is recognized as blank

[D] Define supertypes

[E] None of these

24. The____directory is mandatory for every disk.

[A] Root

[B] Base

[C] Sub

[D] Case

[E] None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.

[A] Channel bank

[B] Cluster

[C] Tiger team

[D] Serverless backup

[E] Logical unit

ANSWERS KEY

1. [A] 2.[C] 3.[E] 4. [B] 5.[B]

6. [E] 7. [D] 8. [A] 9. [C] 10.[A]

11. [B] 12 [C] 13 [B] 14 [B] 15[A]

16. [C] 17 [B] 18 [D] 19 [A] 20 [E]

21. [D] 22 [C] 23 [D] 24 [C] 25 [B]


No comments:

Post a Comment