This post is continuation of my First Postplease have look here Computer Awareness for government jobs-part1
1.The _____ states that a foreign key must either match a primary key value in another relation or it must be null.
A.referential integrity constraint
B.action assertion
C.composite attribute
D.entity integrity rule
Click for answer
D.entity integrity rule
2.A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
A.system virus
B. macro virus
C.none of these
D.both
Click for answer
C.none of these
3.Which error detection method uses one's complement arithmetic?
A.Simply parity check
B. Checksum
C.Two-dimensional parity check
D.CRC
Click for answer
B.Checksum
4.A result of a computer virus can not lead to ___.
A.Disk Crash.
B. Corruption of program.
C.Mother Board Crash
D.Deletion of files.
Click for answer
C.Mother Board Crash
5.The network interface card of LAN is related to following layer of OSI Model-
A.Transport
B.Physical
C.Data Link
D.All of these
Click for answer
D.All of these
6.Which of the following does not describe a data warehouse?
A.Subject-oriented.
B. Updateable.
C.Time-variant.
D.Integrated
Click for answer
B. Updateable.
7.Which of the following is true ?
A.Logical design is software-dependent.
B.In a distributed database, database is stored in one physical location
C.Conceptual design translates the logical design into internal model
D.Logical design is software independent.
Click for answer
A.Logical design is software-dependent.
8.A range check _____
A.determines whether a number is within a specified limit.
B.tests if the data in two or more associated fields is logical.
C.verifies that all required data is present.
D.ensures that only the correct data type is entered into a field.
Click for answer
A.determines whether a number is within a specified limit.
A.referential integrity constraint
B.action assertion
C.composite attribute
D.entity integrity rule
Click for answer
D.entity integrity rule
A.system virus
B. macro virus
C.none of these
D.both
Click for answer
C.none of these
A.Simply parity check
B. Checksum
C.Two-dimensional parity check
D.CRC
Click for answer
B.Checksum
A.Disk Crash.
B. Corruption of program.
C.Mother Board Crash
D.Deletion of files.
Click for answer
C.Mother Board Crash
A.Transport
B.Physical
C.Data Link
D.All of these
Click for answer
D.All of these
A.Subject-oriented.
B. Updateable.
C.Time-variant.
D.Integrated
Click for answer
B. Updateable.
A.Logical design is software-dependent.
B.In a distributed database, database is stored in one physical location
C.Conceptual design translates the logical design into internal model
D.Logical design is software independent.
Click for answer
A.Logical design is software-dependent.
A.determines whether a number is within a specified limit.
B.tests if the data in two or more associated fields is logical.
C.verifies that all required data is present.
D.ensures that only the correct data type is entered into a field.
Click for answer
A.determines whether a number is within a specified limit.
No comments:
Post a Comment