SlideShare une entreprise Scribd logo
1  sur  10
Database
 1. Which of the following is NOT a characteristic of a distributed database?
    A: Data may be spread across several smaller databases connected via telecommunications devices.
    B: It enables local offices to create, manage, and use their own databases.
    C: It gives local sites more direct access to frequently-used data.
    D: It eases issues associated with who can access and change data.
 2. The ____is a nontechnical, but important role that ensures that data is managed as an important
    organizational resource.
    A: data manager
    B: data administrator
    C: database administrator
    D: database manager
 3. _____ is a popular database management system developed by Microsoft and frequently used on
    personal computers.
    A: Access
    B: Excel
    C: DB2
    D: Informix
 4. In the relational data model, each row of the table represents a ____.
    A: data attribute
    B: data entity
    C: primary key
    D: relationship
 5. The ____ design of a database involves identifying the relationships among the different data items
    and grouping them in an orderly fashion.
    A: detailed
    B: enterprise
    C: physical
    D: logical
 6. The repetition of data in separate files is known as ____.
    A: data integrity
    B: program-data dependence
    C: data redundancy
    D: data independence
 7. An information analysis tool that involves the automated discovery of patterns and relationships in a
    data warehouse is called ____.
    A: a data mart
    B: a data base query
    C: data management
    D: data mining
 8. The ____ allows managers and other database users to access, modify, and make queries about data
    contained in the database to generate reports.
    A: database query language
    B: database report writer
    C: data definition language
    D: data manipulation language
 9. The definition of the logical and physical structure of the data and relationships among the data in the
    database is called the ____.
    A: logical data model
    B: physical data model
    C: schema
    D: data definition language
10. In the relational data model, the columns of the table represent ____.
    A: domains
    B: entities
    C: attributes
    D: access paths
11. A situation where programs and data developed and organized for one application are incompatible
    with programs and data organized differently for another application is called ____.
    A: data redundancy
    B: program-data dependence
    C: the traditional approach to data management
    D: data integrity
12. A highly skilled and trained systems professional who directs or performs all activities related to
    maintaining a successful database environment is called a(n) ____.
    A: database administrator


                                                 Page 1 of 10
B: data administrator
   C: data resource manager
   D: information resource manager
13. A _____ works with users to decide the content of the database, to create a logical database model to
    meet the needs of the users, to document the numbers and frequency of the different kinds of data
    requests to be made, and to define the data-edit changes and controls needed for the database.
    A: system administrator
    B: data administrator
    C: database administrator
    D: systems analyst
14. Software packages, often written in the Java programming language for use on computers that are
    running the Windows NT operating system, that connect end users to databases holding the
    information they need to access are called ____.
    A: DBMSs
    B: application servers
    C: data warehouses
    D: data mining
15. A(n) ____ is a database that holds business information from many sources in the enterprise, covering
    all aspects of the company's processes, products, and customers.
    A: OLTP database
    B: data storage bin
    C: data warehouse
    D: transactional database
16. ____ is the process of capturing a company's collective expertise wherever it resides and distributing it
    wherever it can help produce the biggest payoff.
    A: competitive intelligence
    B: counterintelligence
    C: knowledge management
    D: business intelligence
17. A character of information is represented by a(n)____.
    A: bit
    B: byte
    C: field
    D: attribute
18. A field or set of fields in a record that uniquely identifies the record is called a(n) ____.
    A: attribute
    B: hierarchy of data
    C: entity
    D: primary key
19. A(n) _____ data model depicts an owner-member relationship in which a member can have many
    owners.
    A: relational
    B: hierarchical
    C: network
    D: E-R
20. Once data has been placed into a relational database, users can make inquires and analyze data. ____
    involves eliminating rows in the data table according to certain criteria.
    A: data normalizing
    B: joining
    C: projecting
    D: selecting
21. The most widely used database model is the ____ model.
    A: enterprise
    B: hierarchical
    C: network
    D: relational
22. The _____ data model describes data using a standard tabular format.
    A: network
    B: E-R diagram
    C: network
    D: relational
33. The term ____ is sometimes used to describe how well a database performs as the size of the database
    or the number of concurrent users is increased.
    A: data integrity
    B: database size
    C: integration


                                                  Page 2 of 10
D: scalability
34. Which of the following is NOT an expectation of the database administrator?
    A: have a clear understanding of the fundamental business of the organization
    B: be proficient in the use of selected database management systems
    C: stay abreast of emerging technologies and new design approaches
    D: set data standards and data definitions that apply across the many databases that an organization
    may have
35. Which of the following statements about SQL is NOT true?
    A: SQL stands for "standard query language."
    B: It was developed in the 1970s at the IBM Research Laboratory in San Jose, California.
    C: The American National Standards Institute adopted SQL as the standard query language for relational
    databases in 1986.
    D: uses standardized and simplified procedures for retrieving, storing, and manipulating data in a database
    system.
36. To use the database approach to data management, additional software called a(n) ____is required.
    A: data resource manager
    B: database management system
    C: application manager
    D: database manager


Network and Internet
47. ___ enables information to be transmitted to your computer directly, as digital data, over existing
    phone wires at a speed exceeding 500 Kbps.
    A: ISDN
    B: WATS
    C: DSL
    D: T1
48. The ____ signal is a continuous, curving signal.
    A: analog
    B: digital
    C: binary
    D: modulated
49. A coaxial cable consists of an inner conductor wire surrounded by insulation, called the ____.
    A: jacket
    B: dielectric
    C: conductive shield
    D: insulator
50. A ____ consists of communications media, devices, and software needed to connect two or more
    computer systems and/or devices.
    A: telecommunications model
    B: computer network
    C: local area network
    D: wide area network
51. Which of the following statements about the use of telecommuting is NOT true?
    A: Public policy often encourages companies to consider the use of telecommuting.
    B: Almost all jobs and all employees can use telecommuting to improve their effectiveness.
    C: Telecommuting can enable people who are not able to participate in the normal workforce to become
    productive workers.
    D: Telecommuting is often convenient for workers and can also lead to reduced corporate costs.
52. ____ is systems software that controls the computer systems and devices on a network and allows them
    to communicate with each other.
    A: Communications software
    B: A network operating system
    C: Network management software
    D: Network software
53. In a ____ network, each computer is set up as an independent computer. However, other computers
    can still access specific files on each computer's hard drive or share its printer. These types of networks
    have no server.
    A: bus
    B: local area
    C: peer-to-peer
    D: client/server
54. ____ digital networks are typically faster (from 64 Kbps to 2 Mbps) than standard phone lines and carry
    more signals than analog networks.
    A: ISDN


                                                   Page 3 of 10
B: DSL
   C: T1
   D: DSL
55. Extracting data from a composite analog signal to a digital signal is called ____.
    A: modulating
    B: demodulating
    C: digitizing
    D: converting
56. ___ is a form of transmission media that transmits signals using light beams generated by lasers.
    A: Coaxial cable
    B: Microwave
    C: Twisted pairs of wires
    D: Fiber-optic cable
57. Which of the following is NOT a form of communications channel?
    A: simplex
    B: complex
    C: half-simplex
    D: full-duplex
58. ___ is an intercompany, application-to-application communication of data in a standard format that
    permits the recipient to perform a standard business transaction.
    A: EDI
    B: Electronic document distribution
    C: Data switching
    D: MMDS
59. Most ____ provide(s) error checking and message formatting.
    A: communications software
    B: network operating systems
    C: network management software
    D: SNMP software
60. The world's largest public international network is ____.
    A: the UPSNet
    B: the WWW
    C: the WAN
    D: the Internet
61. The ____ was developed by AT&T to increase the number of voice calls that could be handled through
    existing cables. It has a speed of 1.544 Mbps developed from two dozen 64-Kbps channels, together
    with one 8-Kbps channel for carrying control information.
    A: ISDN
    B: DSL
    C: T1 carrier
    D: POTS
62. A telecommunications device that allows several signals to be transmitted over a single
    telecommunications medium at the same time is a ____.
    A: modem
    B: multiplexer
    C: front-end processor
    D: switched line processor
63. Which transmission media is most difficult to "tap into" to intercept communications?
    A: twisted pairs
    B: coaxial cable
    C: microwave
    D: fiber-optic cable
64. A form of communications channel that can transmit data in either direction, but not simultaneously, is
    called ____.
    A: simplex
    B: half-duplex
    C: complex
    D: full-duplex
65. ____ give(s) personal computer users access to vast databases, the Internet, and other services.
    A: Distance learning
    B: Electronic document distribution
    C: Video conferencing
    D: Public network services
66. Rules that ensure communications among computers of different types and from different
    manufacturers are called ____.
    A: OSI models

                                                Page 4 of 10
B: TCP/IP
    C: SNAs
    D: protocol
67. The term "____" refers to telecommunications in which a wide band of frequencies is available to
    transmit information, and this allows for more information to be transmitted in a given amount of time.
    A: baseband
    B: narrowband
    C: bandwidth
    D: broadband
68. ____ states that the information-carrying capacity of a channel is directly proportional to its bandwidth.
    A: Moore's law
    B: Shannon's fundamental law of information theory
    C: Law of entropy
    D: Electromagnetic theory
69. A ____ is placed in a computer's expansion slot to allow it to communicate with the local area network.
    A: network interface card
    B: modem
    C: network operating system
    D: connector
70. The ____ is a logical model that describes how networks are structured or configured.
    A: transmission protocol
    B: client/server architecture
    C: network topology
    D: OSI model
71. _____ is a specialized subset of telecommunications that refers to the electronic collection, processing,
    and distribution of data, typically between computer system hardware devices.
    A: Computer networking
    B: Business telecommunications
    C: Asynchronous communications
    D: Data communications
72. A basic processing strategy where all processing occurs in a single location or facility is called ____.
    A: centralized processing
    B: multiprocessing
    C: decentralized processing
    D: distributed processing
73 A ____ carries a signal between sender and receiver.
   A: modem
   B: transmitter
   C: computer network
   D: communications medium
74. ____ is a billing method for heavy users of voice services.
    A: WATS
    B: POTS
    C: DSL
    D: PBX
75. The wired connection between your home or small business and the central office is called the ____.
    A: switched line
    B: local area network
    C: local loop
    D: PBX
76. A telecommunications device that can break a network into subnets and can also determine preferred
    transmission paths to a final destination is called a ____.
    A: gateway
    B: switch
    C: bridge
    D: router
77. ____ is the most-widely installed LAN technology, and it is specified in the IEEE 802.3 standard.
    A: ATM
    B: SNA
    C: Ethernet
    D: Bluetooth
78. ____ transmission requires line-of-sight transmission and short distances (under a few hundred yards)
    to connect various devices and computers.
    A: Microwave
    B: Cellular
    C: Infrared

                                                 Page 5 of 10
D: Fiber-optics
79. Terrestrial microwave stations are usually placed in series from ____ to ____ miles apart before the
    curvature of the earth makes it impossible for the towers to "see one another."
    A: 1 to 10
    B: 10 to 30
    C: 30 to 70
    D: 70 to 100
80. Which of the following is NOT considered an advantage of the client/server approach?
    A: reduced costs
    B: improved performance
    C: increased security
    D: simplified vendor environment
81. The speed at which signals can be transmitted depends on the ____.
    A: channel capacity
    B: channel media
    C: channel bandwidth
    D: channel format
82. Both voice and phone conversations are examples of ____, where the receiver gets the message
    instantaneously, when it is sent.
    A: synchronous communications
    B: data communications
    C: asynchronous communications
    D: broadband communications
83. A telecommunications line that allows one transmission device to connect to other transmission
    devices is called a ____.
    A: dedicated line
    B: multiplexed line
    C: duplexed line
    D: switched line
84. ____ is a business application of networks that involves installing software on a file server for users to
    share.
    A: EDI
    B: Electronic software distribution
    C: Electronic document distribution
    D: File server
85. The two most common forms of communications satellites are ____ and ____.
    A: business and military
    B: geostationary and line-of-sight
    C: terrestrial and extra-terrestrial
    D: geostationary and low-earth-orbit
86. The term "____" refers to telecommunications in which a wide band of frequencies is available to
    transmit information, and this allows for more information to be transmitted in a given amount of time.
    A: baseband
    B: narrowband
    C: bandwidth
    D: broadband
87. ____ twisted-pair wire cable has a special conducting layer within the normal insulation, which makes
    the cable less prone to electrical interference, or "noise."
    A: Unshielded
    B: UTP
    C: Shielded
    D: Category 1
88. Countries that have few laws concerning telecommunications and databases are called ____.
    A: transborder data flow countries
    B: data pirates
    C: data havens
    D: data entry ports
89. ____ is a way to connect computers where the applications and database reside on one host computer,
    and the user interacts with the application and data using a "dumb" terminal.
    A: File server
    B: Terminal-to-host
    C: Client/server
    D: Distributed computing
90. A ____ network has a central hub with devices located at the end of the communications line that
    originate from the central hub.
    A: bus

                                                 Page 6 of 10
B: hybrid
    C: star
    D: ring
91. In the ____ architecture, the entire file is downloaded from the host computer to the user's computer in
    response to a request for data.
    A: centralized computing
    B: file server
    C: client/server
    D: distributed computing
92. ____ is a communications standard that simplifies communications among cell phones, handheld
    computers, and other wireless devices.
    A: ATM
    B: Bluetooth
    C: MMDS
    D: SNA
93. Each type of telecommunications media uses different types of ____ to link them to devices.
    A: modems
    B: connectors
    C: links
    D: channels
94. A ____ is a communications system that can manage both voice and data transfer within a building
    and to outside lines.
    A: multiplexer
    B: PBX
    C: local loop
    D: switched line
95. A strategy for processing where computers are placed at remote locations but connected to each other
    via telecommunications devices is called ____.
    A: multiprocessing
    B: distributed processing
    C: centralized processing
    D: decentralized processing

96. Which of the following statements is NOT true about push technology?
    A: The use of push technology is also frequently referred to as "Webcasting."
    B: Most push systems rely on HTTP or Java technology to collect content from Web sites and deliver it
    to a central server for users to access.
    C: Before they can automatically receive "pushed" information, users must download and install software that
    acts like a TV antenna, capturing transmitted content.
    D: The use of push technology can lead to information overload and clog up communications links with traffic.
97. A ____ is software that creates a unique, hypermedia-based menu on your computer screen, which
    provides a graphical interface to the Web.
    A: CSS
    B: Java program
    C: Web browser
    D: search engine
98. ___ is one of the leaders in instant messaging. Approximately 40 million people use its Instant
    Messenger and approximately 50 million people use its client program, ICQ.
    A: Yahoo!
    B: Microsoft
    C: Prodigy
    D: America Online
99. ____ is a protocol that describes how groups of messages can be stored on and sent between
    computers. It is used to form a virtual forum for the electronic community, and this forum is divided
    into newsgroups.
    A: PPP
    B: Usenet
    C: Instant messaging
    D: E-mail
100. The ____ is used as a standard way to designate where Internet elements such as servers, documents,
     newsgroups, etc. can be found.
     A: seven-layer OSI model
     B: TCP/IP
     C: URL
     D: e-mail address
101. ____ is a technique used to verify the identity of a message sender for processing on-line financial


                                                 Page 7 of 10
transactions. The technique uses public key encryption and a "hashing" algorithm that prevents the
     reconstruction of the original message.
     A: Cryptography
     B: Tunneling
     C: Digital signature
     D: XML
102. ____ is a secure connection between two points across the Internet.
     A: A tunnel
     B: A VPN
     C: VOIP
     D: An extranet
103. ____ was established in 1991 to enable businesses to connect to the Internet
     A: SAP
     B: Commercial Internet Exchange
     C: EDI
     D: E-commerce Interchange
104. A(n) ____ submits keywords to several individual search engines and returns the results from all search
     engines queried.
     A: Web browser
     B: search engine
     C: meta-search engine
     D: applet
105. A(n) ____ device prepares voice transmission using voice-over-IP by squeezing the recorded sound
     data and slicing it for packets for transfer over the Internet.
     A: modem
     B: PBX
     C: codec
     D: router
106. Using ____ technology, network managers can route phone calls and fax transmissions over the same
     network that they use for data.
     A: voice-over-IP
     B: content streaming
     C: hypermedia
     D: XML
107. In analyzing a web address such as http://www.course.com, which of the following statements is
     NOT true?
     A: The "http" specifies the access method and tells your software to access this particular file using the
     HyperText Transport Protocol.
     B: The "www" part of the address signifies that the address is associated with the World Wide Web service.
     C: The "course.com" part of the address is the domain name that identifies the Internet host site.
     D: For all countries, except the United States, Canada, and Mexico, the right most part of the domain
     name is the country code.
108. A ____ is a device that sits between your internal network and the Internet and limits access into and
     out of your network based on your organization's access policy.
     A: firewall
     B: virtual private network
     C: router
     D: tunnel
109. A(n)____ is a network that links selected resources of a company's intranet with its customers,
     suppliers, or other business partners. It is built on Web technologies.
     A: internet
     B: extranet
     C: WAN
     D: VPN
110. Which of the following statements about HTML is NOT true?
     A: It represents an evolving standard page description language for Web pages.
     B: Various vendors have added new tags to the standard that only work for that vendor's Web browser.
     C: Regardless of minor inconsistencies, all browsers work the same way when used to view the same
     Web page.
     D: Many word processor programs can actually generate the HTML needed to create a Web page.
111. Which of the following statements about obtaining "free" information from the Internet is NOT true?
     A: The Web browser software is used to locate those Web pages that match the keywords you specify.
     B: Free information and advice may not always be, unbiased, truthful, or helpful.
     C: Free services can change or even stop their offerings with little or no warning.
     D: Useful software can be found and downloaded at no cost.
112. ____ is a method of transferring multimedia files over the Internet so that the data stream of voice and


                                                 Page 8 of 10
pictures plays more or less continuously.
     A: FTP
     B: VOIP
     C: Content streaming
     D: Instant messaging
113. People who have registered domain names in the hope of selling the names to corporations or people
     at a later date are called ____.
     A: Web blackmailers
     B: cyber-squatters
     C: URL grabbers
     D: domain stealers
114. Which of the following tasks is NOT performed by a firewall?
     A: It permits e-mail from selected users outside your company to pass through to your employees.
     B: It prevents your employees from accessing selected Web sites.
     C: It prevents users on remote systems from logging onto your network computers using the telnet utility.
     D: It routes messages in the most efficient manner.
115. A(n) ____ is an internal corporate network built using Internet and World Wide Web standards.
     A: virtual private network
     B: LAN
     C: extranet
     D: intranet
116. ____ and ____ are two communications protocols that transmit data packets over telephone lines,
     allowing dial-up access to the Internet.
     A: TCP and IP
     B: SLIP and PPP
     C: Telnet and FTP
     D: Usenet and Instant messaging
117. The set of conventions used to pass packets of data from one host computer to another on the Internet
     is called the ____.
     A: telnet
     B: Internet protocol (IP)
     C: the seven-layer OSI model
     D: uniform resource locator (URL)
118. Which of the following identifies a set of emerging standards for describing Web documents?
     A: XML, XHTML, CSS, and DHMTL
     B: ICQ, Java, and hypermedia
     C: Netscape Navigator and Internet Explorer
     D: CIX, HTTP, and URL
119. Which of the following statements about usage of the Internet is NOT true?
     A: It is possible to listen to radio telecasts and view interactive talk shows.
     B: Some corporations have started to use Internet video to broadcast corporate messages or to advertise on the
     Web.
     C: Doctors are reluctant to use Internet video to monitor and control surgical operations.
     D: Employees can connect to the workplace via a virtual office on the Web.
120. Which of the following statements is NOT true about the building and use of an intranet?
     A: Most employees will require considerable training to make effective use of their corporate intranet.
     B: Most companies already have the foundation for an intranet: a network that uses the Internet's TCP/IP
     protocol and computers with Web browser software.
     C: Use of an intranet can lead to a substantial reduction in the need for paper.
     D: An intranet can pull all corporate computers, software, and databases into a single system that enables
     employees to find information wherever it resides.
121. Any company that provides individuals and organizations with access to the Internet is called a(n)
     ____.
     A: registrar
     B: backbone
     C: ISP
     D: PPP
122. Which of the following statements about the use of Java applets is NOT true?
     A: Java software runs not only on Sun Microsystems computers but on other computers as well.
     B: Java is used by programmers to make Web pages "come alive," adding graphics, animation, and real-time
     updates.
     C: Java enables software writers to create compact "just-in-time" programs that can be dispatched across a
     network such as the Internet.
     D: A Web page with an embedded Java applet contains an additional HTML tag called JAV, which
     refers to the Java applet.
123. A ____ is software that creates a unique, hypermedia-based menu on your computer screen, which


                                                   Page 9 of 10
provides a graphical interface to the Web.
     A: CSS
     B: Java program
     C: Web browser
     D: search engine
124. What Internet service enables two or more people to engage in on-line, interactive "conversation?"
     A: Usenet
     B: Newsgroups
     C: Content streaming
     D: Chat rooms
125. A(n) ____ is a Web site that contains files, phone numbers, e-mail addresses, and appointment
     calendar. It essentially allows your desktop computer, phone books, appointment scheduler, and other
     important information to be with you wherever you are.
     A: telecommuting Web site
     B: Internet office
     C: virtual office
     D: home page
126. ____ is the process of converting a message into a secret code and changing the encoded message
     back to regular text.
     A: Encryption
     B: Fraud
     C: Encoding
     D: Cryptography
127. Which of the following statements about the World Wide Web is NOT true?
     A: The Web was developed by Tim Berners-Lee at CERN in Geneva, and he conceived of it as a way to
     manage documents.
     B: The Web has grown to a collection of tens of thousands of independently-owned computers that work
     together as one Internet service.
     C: The Web is a menu-based system that uses the file-server model.
     D: An ordinary phone line connection to the Internet is unlikely to provide sufficient speed for a satisfactory
     Web experience.




                                                    Page 10 of 10

Contenu connexe

Tendances

Computer Network Unit I RGPV
Computer Network Unit I RGPV Computer Network Unit I RGPV
Computer Network Unit I RGPV NANDINI SHARMA
 
Examination paper system maagement & operating systems
Examination paper system maagement & operating systemsExamination paper system maagement & operating systems
Examination paper system maagement & operating systemsNMIMS ASSIGNMENTS HELP
 
Examination paper system maagement operating systems
Examination paper system maagement  operating systemsExamination paper system maagement  operating systems
Examination paper system maagement operating systemsNMIMS ASSIGNMENTS HELP
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communicationsHarishKumar2054
 
Mis 589 entire course (networking concepts and application)
Mis 589 entire course (networking concepts and application)Mis 589 entire course (networking concepts and application)
Mis 589 entire course (networking concepts and application)Homework Help Online
 
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERINGMULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERINGvtunotesbysree
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer networkProf Ansari
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...vtunotesbysree
 

Tendances (20)

Mcq in int
Mcq in intMcq in int
Mcq in int
 
Networking Basic MCQ's TEST
Networking Basic  MCQ's TESTNetworking Basic  MCQ's TEST
Networking Basic MCQ's TEST
 
Lecture 04 Chapter 1 - Introduction to Parallel Computing
Lecture 04  Chapter 1 - Introduction to Parallel ComputingLecture 04  Chapter 1 - Introduction to Parallel Computing
Lecture 04 Chapter 1 - Introduction to Parallel Computing
 
Computer Network Unit I RGPV
Computer Network Unit I RGPV Computer Network Unit I RGPV
Computer Network Unit I RGPV
 
Examination paper system maagement & operating systems
Examination paper system maagement & operating systemsExamination paper system maagement & operating systems
Examination paper system maagement & operating systems
 
Examination paper system maagement operating systems
Examination paper system maagement  operating systemsExamination paper system maagement  operating systems
Examination paper system maagement operating systems
 
Lecture 01 - Chapter 1 (Part 01): Some basic concept of Operating System (OS)...
Lecture 01 - Chapter 1 (Part 01): Some basic concept of Operating System (OS)...Lecture 01 - Chapter 1 (Part 01): Some basic concept of Operating System (OS)...
Lecture 01 - Chapter 1 (Part 01): Some basic concept of Operating System (OS)...
 
Lecture 03 - Synchronous and Asynchronous Communication - Concurrency - Fault...
Lecture 03 - Synchronous and Asynchronous Communication - Concurrency - Fault...Lecture 03 - Synchronous and Asynchronous Communication - Concurrency - Fault...
Lecture 03 - Synchronous and Asynchronous Communication - Concurrency - Fault...
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
 
Human Interface & Multimedia
Human Interface & MultimediaHuman Interface & Multimedia
Human Interface & Multimedia
 
Mis 589 entire course (networking concepts and application)
Mis 589 entire course (networking concepts and application)Mis 589 entire course (networking concepts and application)
Mis 589 entire course (networking concepts and application)
 
Distributed system
Distributed systemDistributed system
Distributed system
 
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERINGMULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
MULTIPLE CHOICE QUESTIONS ON COMMUNICATION PROTOCOL ENGINEERING
 
Computer netwrks
Computer netwrksComputer netwrks
Computer netwrks
 
All nsbm exam papers
All nsbm exam papersAll nsbm exam papers
All nsbm exam papers
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Lecture 02 - Chapter 1 (Part 02): Grid/Cloud Computing Systems, Cluster Comp...
Lecture 02 - Chapter 1 (Part 02):  Grid/Cloud Computing Systems, Cluster Comp...Lecture 02 - Chapter 1 (Part 02):  Grid/Cloud Computing Systems, Cluster Comp...
Lecture 02 - Chapter 1 (Part 02): Grid/Cloud Computing Systems, Cluster Comp...
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
 
Network (IP)
Network (IP)Network (IP)
Network (IP)
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
 

En vedette

Educational media and technology solved multiple choice questions
Educational media and technology solved multiple choice questionsEducational media and technology solved multiple choice questions
Educational media and technology solved multiple choice questionsedsonmnyambo
 
Educational Technology Exam
Educational Technology ExamEducational Technology Exam
Educational Technology Examjwheetley
 
Educational Technology Exam Review
Educational Technology Exam ReviewEducational Technology Exam Review
Educational Technology Exam Reviewjwheetley
 
Computer graphics mcq question bank
Computer graphics mcq question bankComputer graphics mcq question bank
Computer graphics mcq question banksuthi
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMSvtunotesbysree
 
LET Practice test in Professional Education-principles and strategies in teac...
LET Practice test in Professional Education-principles and strategies in teac...LET Practice test in Professional Education-principles and strategies in teac...
LET Practice test in Professional Education-principles and strategies in teac...University of Santo Tomas
 
MCQ on Computer and ICT
MCQ on Computer and ICTMCQ on Computer and ICT
MCQ on Computer and ICTMd. Gias Uddin
 
Computer Graphics MCQ's
Computer Graphics MCQ'sComputer Graphics MCQ's
Computer Graphics MCQ'sRana Sarfraz
 
Multiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computersMultiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computersKate Bailey
 
LET sample questions - professional education set 1
LET sample questions - professional education set 1LET sample questions - professional education set 1
LET sample questions - professional education set 1John John Bartolome
 
Information systems by checkmate...
Information systems by checkmate...Information systems by checkmate...
Information systems by checkmate...PaYal Umraliya
 
Mcq in computer science by timothy j williams
Mcq in computer science by timothy j williamsMcq in computer science by timothy j williams
Mcq in computer science by timothy j williamsAbhishek Bajaj
 
Professional Education Reviewer
Professional Education ReviewerProfessional Education Reviewer
Professional Education ReviewerZin Bacus
 
Operating Systems MCQ Bank from mcqSets.com
Operating Systems MCQ Bank from mcqSets.comOperating Systems MCQ Bank from mcqSets.com
Operating Systems MCQ Bank from mcqSets.comSuresh Khanal
 
DBMS Multiple Choice Questions
DBMS Multiple Choice QuestionsDBMS Multiple Choice Questions
DBMS Multiple Choice QuestionsShusil Baral
 

En vedette (20)

Educational media and technology solved multiple choice questions
Educational media and technology solved multiple choice questionsEducational media and technology solved multiple choice questions
Educational media and technology solved multiple choice questions
 
Educational technology
Educational technologyEducational technology
Educational technology
 
Educational Technology Exam
Educational Technology ExamEducational Technology Exam
Educational Technology Exam
 
Educational Technology Exam Review
Educational Technology Exam ReviewEducational Technology Exam Review
Educational Technology Exam Review
 
Computer graphics mcq question bank
Computer graphics mcq question bankComputer graphics mcq question bank
Computer graphics mcq question bank
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
 
LET Practice test in Professional Education-principles and strategies in teac...
LET Practice test in Professional Education-principles and strategies in teac...LET Practice test in Professional Education-principles and strategies in teac...
LET Practice test in Professional Education-principles and strategies in teac...
 
MCQ on Computer and ICT
MCQ on Computer and ICTMCQ on Computer and ICT
MCQ on Computer and ICT
 
Computer Graphics MCQ's
Computer Graphics MCQ'sComputer Graphics MCQ's
Computer Graphics MCQ's
 
Multiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computersMultiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computers
 
LET sample questions - professional education set 1
LET sample questions - professional education set 1LET sample questions - professional education set 1
LET sample questions - professional education set 1
 
Let reviewer prof ed
Let reviewer prof edLet reviewer prof ed
Let reviewer prof ed
 
Information systems by checkmate...
Information systems by checkmate...Information systems by checkmate...
Information systems by checkmate...
 
Educational technology 1
Educational technology 1Educational technology 1
Educational technology 1
 
Mcq in computer science by timothy j williams
Mcq in computer science by timothy j williamsMcq in computer science by timothy j williams
Mcq in computer science by timothy j williams
 
Professional Education Reviewer
Professional Education ReviewerProfessional Education Reviewer
Professional Education Reviewer
 
Operating Systems MCQ Bank from mcqSets.com
Operating Systems MCQ Bank from mcqSets.comOperating Systems MCQ Bank from mcqSets.com
Operating Systems MCQ Bank from mcqSets.com
 
DBMS Multiple Choice Questions
DBMS Multiple Choice QuestionsDBMS Multiple Choice Questions
DBMS Multiple Choice Questions
 
Introduction to visual DSP++ Kernel
Introduction to visual DSP++ KernelIntroduction to visual DSP++ Kernel
Introduction to visual DSP++ Kernel
 
Lec4
Lec4Lec4
Lec4
 

Similaire à Mcq for final

A ____________ is a disconnected, memory-resident representation o.docx
A ____________ is a disconnected, memory-resident representation o.docxA ____________ is a disconnected, memory-resident representation o.docx
A ____________ is a disconnected, memory-resident representation o.docxransayo
 
34 Multiple choice questions, 3 points each t1. The practice of be.pdf
34 Multiple choice questions, 3 points each t1. The practice of be.pdf34 Multiple choice questions, 3 points each t1. The practice of be.pdf
34 Multiple choice questions, 3 points each t1. The practice of be.pdfarjuncorner565
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
Bis 220 final exams
Bis 220 final examsBis 220 final exams
Bis 220 final examsexamzking
 
Bis 220 final exams
Bis 220 final examsBis 220 final exams
Bis 220 final examsMARKSHEET
 
Bank clerk computer_exam_tailieuso.com.vn
Bank clerk computer_exam_tailieuso.com.vnBank clerk computer_exam_tailieuso.com.vn
Bank clerk computer_exam_tailieuso.com.vnHạnh Ngọc
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxJeanmarieColbert3
 
Software Engineering Question Bank.docx
Software Engineering Question Bank.docxSoftware Engineering Question Bank.docx
Software Engineering Question Bank.docxkarthikaparthasarath
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questionsCarmenLamdegil
 
Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%eriks23
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examgiquickly
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exambubyslyke
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examginistays
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%largest433
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%flyperhan
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%sharing3444
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%singup22
 
Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3enersivard
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exammnvjhguyt876
 
Basic computer mcqs
Basic computer mcqsBasic computer mcqs
Basic computer mcqsAsadMehboob4
 

Similaire à Mcq for final (20)

A ____________ is a disconnected, memory-resident representation o.docx
A ____________ is a disconnected, memory-resident representation o.docxA ____________ is a disconnected, memory-resident representation o.docx
A ____________ is a disconnected, memory-resident representation o.docx
 
34 Multiple choice questions, 3 points each t1. The practice of be.pdf
34 Multiple choice questions, 3 points each t1. The practice of be.pdf34 Multiple choice questions, 3 points each t1. The practice of be.pdf
34 Multiple choice questions, 3 points each t1. The practice of be.pdf
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
Bis 220 final exams
Bis 220 final examsBis 220 final exams
Bis 220 final exams
 
Bis 220 final exams
Bis 220 final examsBis 220 final exams
Bis 220 final exams
 
Bank clerk computer_exam_tailieuso.com.vn
Bank clerk computer_exam_tailieuso.com.vnBank clerk computer_exam_tailieuso.com.vn
Bank clerk computer_exam_tailieuso.com.vn
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
 
Software Engineering Question Bank.docx
Software Engineering Question Bank.docxSoftware Engineering Question Bank.docx
Software Engineering Question Bank.docx
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
 
Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Basic computer mcqs
Basic computer mcqsBasic computer mcqs
Basic computer mcqs
 

Dernier

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Dernier (20)

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Mcq for final

  • 1. Database 1. Which of the following is NOT a characteristic of a distributed database? A: Data may be spread across several smaller databases connected via telecommunications devices. B: It enables local offices to create, manage, and use their own databases. C: It gives local sites more direct access to frequently-used data. D: It eases issues associated with who can access and change data. 2. The ____is a nontechnical, but important role that ensures that data is managed as an important organizational resource. A: data manager B: data administrator C: database administrator D: database manager 3. _____ is a popular database management system developed by Microsoft and frequently used on personal computers. A: Access B: Excel C: DB2 D: Informix 4. In the relational data model, each row of the table represents a ____. A: data attribute B: data entity C: primary key D: relationship 5. The ____ design of a database involves identifying the relationships among the different data items and grouping them in an orderly fashion. A: detailed B: enterprise C: physical D: logical 6. The repetition of data in separate files is known as ____. A: data integrity B: program-data dependence C: data redundancy D: data independence 7. An information analysis tool that involves the automated discovery of patterns and relationships in a data warehouse is called ____. A: a data mart B: a data base query C: data management D: data mining 8. The ____ allows managers and other database users to access, modify, and make queries about data contained in the database to generate reports. A: database query language B: database report writer C: data definition language D: data manipulation language 9. The definition of the logical and physical structure of the data and relationships among the data in the database is called the ____. A: logical data model B: physical data model C: schema D: data definition language 10. In the relational data model, the columns of the table represent ____. A: domains B: entities C: attributes D: access paths 11. A situation where programs and data developed and organized for one application are incompatible with programs and data organized differently for another application is called ____. A: data redundancy B: program-data dependence C: the traditional approach to data management D: data integrity 12. A highly skilled and trained systems professional who directs or performs all activities related to maintaining a successful database environment is called a(n) ____. A: database administrator Page 1 of 10
  • 2. B: data administrator C: data resource manager D: information resource manager 13. A _____ works with users to decide the content of the database, to create a logical database model to meet the needs of the users, to document the numbers and frequency of the different kinds of data requests to be made, and to define the data-edit changes and controls needed for the database. A: system administrator B: data administrator C: database administrator D: systems analyst 14. Software packages, often written in the Java programming language for use on computers that are running the Windows NT operating system, that connect end users to databases holding the information they need to access are called ____. A: DBMSs B: application servers C: data warehouses D: data mining 15. A(n) ____ is a database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers. A: OLTP database B: data storage bin C: data warehouse D: transactional database 16. ____ is the process of capturing a company's collective expertise wherever it resides and distributing it wherever it can help produce the biggest payoff. A: competitive intelligence B: counterintelligence C: knowledge management D: business intelligence 17. A character of information is represented by a(n)____. A: bit B: byte C: field D: attribute 18. A field or set of fields in a record that uniquely identifies the record is called a(n) ____. A: attribute B: hierarchy of data C: entity D: primary key 19. A(n) _____ data model depicts an owner-member relationship in which a member can have many owners. A: relational B: hierarchical C: network D: E-R 20. Once data has been placed into a relational database, users can make inquires and analyze data. ____ involves eliminating rows in the data table according to certain criteria. A: data normalizing B: joining C: projecting D: selecting 21. The most widely used database model is the ____ model. A: enterprise B: hierarchical C: network D: relational 22. The _____ data model describes data using a standard tabular format. A: network B: E-R diagram C: network D: relational 33. The term ____ is sometimes used to describe how well a database performs as the size of the database or the number of concurrent users is increased. A: data integrity B: database size C: integration Page 2 of 10
  • 3. D: scalability 34. Which of the following is NOT an expectation of the database administrator? A: have a clear understanding of the fundamental business of the organization B: be proficient in the use of selected database management systems C: stay abreast of emerging technologies and new design approaches D: set data standards and data definitions that apply across the many databases that an organization may have 35. Which of the following statements about SQL is NOT true? A: SQL stands for "standard query language." B: It was developed in the 1970s at the IBM Research Laboratory in San Jose, California. C: The American National Standards Institute adopted SQL as the standard query language for relational databases in 1986. D: uses standardized and simplified procedures for retrieving, storing, and manipulating data in a database system. 36. To use the database approach to data management, additional software called a(n) ____is required. A: data resource manager B: database management system C: application manager D: database manager Network and Internet 47. ___ enables information to be transmitted to your computer directly, as digital data, over existing phone wires at a speed exceeding 500 Kbps. A: ISDN B: WATS C: DSL D: T1 48. The ____ signal is a continuous, curving signal. A: analog B: digital C: binary D: modulated 49. A coaxial cable consists of an inner conductor wire surrounded by insulation, called the ____. A: jacket B: dielectric C: conductive shield D: insulator 50. A ____ consists of communications media, devices, and software needed to connect two or more computer systems and/or devices. A: telecommunications model B: computer network C: local area network D: wide area network 51. Which of the following statements about the use of telecommuting is NOT true? A: Public policy often encourages companies to consider the use of telecommuting. B: Almost all jobs and all employees can use telecommuting to improve their effectiveness. C: Telecommuting can enable people who are not able to participate in the normal workforce to become productive workers. D: Telecommuting is often convenient for workers and can also lead to reduced corporate costs. 52. ____ is systems software that controls the computer systems and devices on a network and allows them to communicate with each other. A: Communications software B: A network operating system C: Network management software D: Network software 53. In a ____ network, each computer is set up as an independent computer. However, other computers can still access specific files on each computer's hard drive or share its printer. These types of networks have no server. A: bus B: local area C: peer-to-peer D: client/server 54. ____ digital networks are typically faster (from 64 Kbps to 2 Mbps) than standard phone lines and carry more signals than analog networks. A: ISDN Page 3 of 10
  • 4. B: DSL C: T1 D: DSL 55. Extracting data from a composite analog signal to a digital signal is called ____. A: modulating B: demodulating C: digitizing D: converting 56. ___ is a form of transmission media that transmits signals using light beams generated by lasers. A: Coaxial cable B: Microwave C: Twisted pairs of wires D: Fiber-optic cable 57. Which of the following is NOT a form of communications channel? A: simplex B: complex C: half-simplex D: full-duplex 58. ___ is an intercompany, application-to-application communication of data in a standard format that permits the recipient to perform a standard business transaction. A: EDI B: Electronic document distribution C: Data switching D: MMDS 59. Most ____ provide(s) error checking and message formatting. A: communications software B: network operating systems C: network management software D: SNMP software 60. The world's largest public international network is ____. A: the UPSNet B: the WWW C: the WAN D: the Internet 61. The ____ was developed by AT&T to increase the number of voice calls that could be handled through existing cables. It has a speed of 1.544 Mbps developed from two dozen 64-Kbps channels, together with one 8-Kbps channel for carrying control information. A: ISDN B: DSL C: T1 carrier D: POTS 62. A telecommunications device that allows several signals to be transmitted over a single telecommunications medium at the same time is a ____. A: modem B: multiplexer C: front-end processor D: switched line processor 63. Which transmission media is most difficult to "tap into" to intercept communications? A: twisted pairs B: coaxial cable C: microwave D: fiber-optic cable 64. A form of communications channel that can transmit data in either direction, but not simultaneously, is called ____. A: simplex B: half-duplex C: complex D: full-duplex 65. ____ give(s) personal computer users access to vast databases, the Internet, and other services. A: Distance learning B: Electronic document distribution C: Video conferencing D: Public network services 66. Rules that ensure communications among computers of different types and from different manufacturers are called ____. A: OSI models Page 4 of 10
  • 5. B: TCP/IP C: SNAs D: protocol 67. The term "____" refers to telecommunications in which a wide band of frequencies is available to transmit information, and this allows for more information to be transmitted in a given amount of time. A: baseband B: narrowband C: bandwidth D: broadband 68. ____ states that the information-carrying capacity of a channel is directly proportional to its bandwidth. A: Moore's law B: Shannon's fundamental law of information theory C: Law of entropy D: Electromagnetic theory 69. A ____ is placed in a computer's expansion slot to allow it to communicate with the local area network. A: network interface card B: modem C: network operating system D: connector 70. The ____ is a logical model that describes how networks are structured or configured. A: transmission protocol B: client/server architecture C: network topology D: OSI model 71. _____ is a specialized subset of telecommunications that refers to the electronic collection, processing, and distribution of data, typically between computer system hardware devices. A: Computer networking B: Business telecommunications C: Asynchronous communications D: Data communications 72. A basic processing strategy where all processing occurs in a single location or facility is called ____. A: centralized processing B: multiprocessing C: decentralized processing D: distributed processing 73 A ____ carries a signal between sender and receiver. A: modem B: transmitter C: computer network D: communications medium 74. ____ is a billing method for heavy users of voice services. A: WATS B: POTS C: DSL D: PBX 75. The wired connection between your home or small business and the central office is called the ____. A: switched line B: local area network C: local loop D: PBX 76. A telecommunications device that can break a network into subnets and can also determine preferred transmission paths to a final destination is called a ____. A: gateway B: switch C: bridge D: router 77. ____ is the most-widely installed LAN technology, and it is specified in the IEEE 802.3 standard. A: ATM B: SNA C: Ethernet D: Bluetooth 78. ____ transmission requires line-of-sight transmission and short distances (under a few hundred yards) to connect various devices and computers. A: Microwave B: Cellular C: Infrared Page 5 of 10
  • 6. D: Fiber-optics 79. Terrestrial microwave stations are usually placed in series from ____ to ____ miles apart before the curvature of the earth makes it impossible for the towers to "see one another." A: 1 to 10 B: 10 to 30 C: 30 to 70 D: 70 to 100 80. Which of the following is NOT considered an advantage of the client/server approach? A: reduced costs B: improved performance C: increased security D: simplified vendor environment 81. The speed at which signals can be transmitted depends on the ____. A: channel capacity B: channel media C: channel bandwidth D: channel format 82. Both voice and phone conversations are examples of ____, where the receiver gets the message instantaneously, when it is sent. A: synchronous communications B: data communications C: asynchronous communications D: broadband communications 83. A telecommunications line that allows one transmission device to connect to other transmission devices is called a ____. A: dedicated line B: multiplexed line C: duplexed line D: switched line 84. ____ is a business application of networks that involves installing software on a file server for users to share. A: EDI B: Electronic software distribution C: Electronic document distribution D: File server 85. The two most common forms of communications satellites are ____ and ____. A: business and military B: geostationary and line-of-sight C: terrestrial and extra-terrestrial D: geostationary and low-earth-orbit 86. The term "____" refers to telecommunications in which a wide band of frequencies is available to transmit information, and this allows for more information to be transmitted in a given amount of time. A: baseband B: narrowband C: bandwidth D: broadband 87. ____ twisted-pair wire cable has a special conducting layer within the normal insulation, which makes the cable less prone to electrical interference, or "noise." A: Unshielded B: UTP C: Shielded D: Category 1 88. Countries that have few laws concerning telecommunications and databases are called ____. A: transborder data flow countries B: data pirates C: data havens D: data entry ports 89. ____ is a way to connect computers where the applications and database reside on one host computer, and the user interacts with the application and data using a "dumb" terminal. A: File server B: Terminal-to-host C: Client/server D: Distributed computing 90. A ____ network has a central hub with devices located at the end of the communications line that originate from the central hub. A: bus Page 6 of 10
  • 7. B: hybrid C: star D: ring 91. In the ____ architecture, the entire file is downloaded from the host computer to the user's computer in response to a request for data. A: centralized computing B: file server C: client/server D: distributed computing 92. ____ is a communications standard that simplifies communications among cell phones, handheld computers, and other wireless devices. A: ATM B: Bluetooth C: MMDS D: SNA 93. Each type of telecommunications media uses different types of ____ to link them to devices. A: modems B: connectors C: links D: channels 94. A ____ is a communications system that can manage both voice and data transfer within a building and to outside lines. A: multiplexer B: PBX C: local loop D: switched line 95. A strategy for processing where computers are placed at remote locations but connected to each other via telecommunications devices is called ____. A: multiprocessing B: distributed processing C: centralized processing D: decentralized processing 96. Which of the following statements is NOT true about push technology? A: The use of push technology is also frequently referred to as "Webcasting." B: Most push systems rely on HTTP or Java technology to collect content from Web sites and deliver it to a central server for users to access. C: Before they can automatically receive "pushed" information, users must download and install software that acts like a TV antenna, capturing transmitted content. D: The use of push technology can lead to information overload and clog up communications links with traffic. 97. A ____ is software that creates a unique, hypermedia-based menu on your computer screen, which provides a graphical interface to the Web. A: CSS B: Java program C: Web browser D: search engine 98. ___ is one of the leaders in instant messaging. Approximately 40 million people use its Instant Messenger and approximately 50 million people use its client program, ICQ. A: Yahoo! B: Microsoft C: Prodigy D: America Online 99. ____ is a protocol that describes how groups of messages can be stored on and sent between computers. It is used to form a virtual forum for the electronic community, and this forum is divided into newsgroups. A: PPP B: Usenet C: Instant messaging D: E-mail 100. The ____ is used as a standard way to designate where Internet elements such as servers, documents, newsgroups, etc. can be found. A: seven-layer OSI model B: TCP/IP C: URL D: e-mail address 101. ____ is a technique used to verify the identity of a message sender for processing on-line financial Page 7 of 10
  • 8. transactions. The technique uses public key encryption and a "hashing" algorithm that prevents the reconstruction of the original message. A: Cryptography B: Tunneling C: Digital signature D: XML 102. ____ is a secure connection between two points across the Internet. A: A tunnel B: A VPN C: VOIP D: An extranet 103. ____ was established in 1991 to enable businesses to connect to the Internet A: SAP B: Commercial Internet Exchange C: EDI D: E-commerce Interchange 104. A(n) ____ submits keywords to several individual search engines and returns the results from all search engines queried. A: Web browser B: search engine C: meta-search engine D: applet 105. A(n) ____ device prepares voice transmission using voice-over-IP by squeezing the recorded sound data and slicing it for packets for transfer over the Internet. A: modem B: PBX C: codec D: router 106. Using ____ technology, network managers can route phone calls and fax transmissions over the same network that they use for data. A: voice-over-IP B: content streaming C: hypermedia D: XML 107. In analyzing a web address such as http://www.course.com, which of the following statements is NOT true? A: The "http" specifies the access method and tells your software to access this particular file using the HyperText Transport Protocol. B: The "www" part of the address signifies that the address is associated with the World Wide Web service. C: The "course.com" part of the address is the domain name that identifies the Internet host site. D: For all countries, except the United States, Canada, and Mexico, the right most part of the domain name is the country code. 108. A ____ is a device that sits between your internal network and the Internet and limits access into and out of your network based on your organization's access policy. A: firewall B: virtual private network C: router D: tunnel 109. A(n)____ is a network that links selected resources of a company's intranet with its customers, suppliers, or other business partners. It is built on Web technologies. A: internet B: extranet C: WAN D: VPN 110. Which of the following statements about HTML is NOT true? A: It represents an evolving standard page description language for Web pages. B: Various vendors have added new tags to the standard that only work for that vendor's Web browser. C: Regardless of minor inconsistencies, all browsers work the same way when used to view the same Web page. D: Many word processor programs can actually generate the HTML needed to create a Web page. 111. Which of the following statements about obtaining "free" information from the Internet is NOT true? A: The Web browser software is used to locate those Web pages that match the keywords you specify. B: Free information and advice may not always be, unbiased, truthful, or helpful. C: Free services can change or even stop their offerings with little or no warning. D: Useful software can be found and downloaded at no cost. 112. ____ is a method of transferring multimedia files over the Internet so that the data stream of voice and Page 8 of 10
  • 9. pictures plays more or less continuously. A: FTP B: VOIP C: Content streaming D: Instant messaging 113. People who have registered domain names in the hope of selling the names to corporations or people at a later date are called ____. A: Web blackmailers B: cyber-squatters C: URL grabbers D: domain stealers 114. Which of the following tasks is NOT performed by a firewall? A: It permits e-mail from selected users outside your company to pass through to your employees. B: It prevents your employees from accessing selected Web sites. C: It prevents users on remote systems from logging onto your network computers using the telnet utility. D: It routes messages in the most efficient manner. 115. A(n) ____ is an internal corporate network built using Internet and World Wide Web standards. A: virtual private network B: LAN C: extranet D: intranet 116. ____ and ____ are two communications protocols that transmit data packets over telephone lines, allowing dial-up access to the Internet. A: TCP and IP B: SLIP and PPP C: Telnet and FTP D: Usenet and Instant messaging 117. The set of conventions used to pass packets of data from one host computer to another on the Internet is called the ____. A: telnet B: Internet protocol (IP) C: the seven-layer OSI model D: uniform resource locator (URL) 118. Which of the following identifies a set of emerging standards for describing Web documents? A: XML, XHTML, CSS, and DHMTL B: ICQ, Java, and hypermedia C: Netscape Navigator and Internet Explorer D: CIX, HTTP, and URL 119. Which of the following statements about usage of the Internet is NOT true? A: It is possible to listen to radio telecasts and view interactive talk shows. B: Some corporations have started to use Internet video to broadcast corporate messages or to advertise on the Web. C: Doctors are reluctant to use Internet video to monitor and control surgical operations. D: Employees can connect to the workplace via a virtual office on the Web. 120. Which of the following statements is NOT true about the building and use of an intranet? A: Most employees will require considerable training to make effective use of their corporate intranet. B: Most companies already have the foundation for an intranet: a network that uses the Internet's TCP/IP protocol and computers with Web browser software. C: Use of an intranet can lead to a substantial reduction in the need for paper. D: An intranet can pull all corporate computers, software, and databases into a single system that enables employees to find information wherever it resides. 121. Any company that provides individuals and organizations with access to the Internet is called a(n) ____. A: registrar B: backbone C: ISP D: PPP 122. Which of the following statements about the use of Java applets is NOT true? A: Java software runs not only on Sun Microsystems computers but on other computers as well. B: Java is used by programmers to make Web pages "come alive," adding graphics, animation, and real-time updates. C: Java enables software writers to create compact "just-in-time" programs that can be dispatched across a network such as the Internet. D: A Web page with an embedded Java applet contains an additional HTML tag called JAV, which refers to the Java applet. 123. A ____ is software that creates a unique, hypermedia-based menu on your computer screen, which Page 9 of 10
  • 10. provides a graphical interface to the Web. A: CSS B: Java program C: Web browser D: search engine 124. What Internet service enables two or more people to engage in on-line, interactive "conversation?" A: Usenet B: Newsgroups C: Content streaming D: Chat rooms 125. A(n) ____ is a Web site that contains files, phone numbers, e-mail addresses, and appointment calendar. It essentially allows your desktop computer, phone books, appointment scheduler, and other important information to be with you wherever you are. A: telecommuting Web site B: Internet office C: virtual office D: home page 126. ____ is the process of converting a message into a secret code and changing the encoded message back to regular text. A: Encryption B: Fraud C: Encoding D: Cryptography 127. Which of the following statements about the World Wide Web is NOT true? A: The Web was developed by Tim Berners-Lee at CERN in Geneva, and he conceived of it as a way to manage documents. B: The Web has grown to a collection of tens of thousands of independently-owned computers that work together as one Internet service. C: The Web is a menu-based system that uses the file-server model. D: An ordinary phone line connection to the Internet is unlikely to provide sufficient speed for a satisfactory Web experience. Page 10 of 10