Вы находитесь на странице: 1из 7

1.

MICR devices can read:


[A] Letters
[B] Numbers
[C] Both of these
[D] All of these
[E] None of these
(Ans):-B

2. Auxiliary storage consists of
[A] Magnetic tapes
[B] CDs
[C] Both of these
[D] All of these
[E] None of these
(Ans):-A

3. Who can provides access rights to users?
[A] Data custodian
[B] Data owner
[C] The data base administrator
[D] Management
[E] None of these
(Ans):-C

4. Security policy of an organization need not have
[A] The overall security philosophy of the organization
[B] The authorization procedure for accessing data
[C] Security awareness program
[D] Highlights and identity of the sensitive security features
[E] None of these
(Ans):-D

5. In case of a virus getting into computer, which of the following will help?
[A] Encryption
[B] NORTON
[C] Police complaint
[D] All of these
[E] None of these
(Ans):-B

6. Which of the following do you think is NOT necessary for computerization system in a
bank?
[A] Effective customer service
[B] Effective back office integration
[C] Focus on manual records
[D] All of these
[E] None of these
(Ans):-C

7. BCNF is needed because:
[A] Otherwise tuples may be duplicated
[B] When a data is deleted tuples may be lost
[C] Updating is otherwise is difficult
[D] When there is dependent attributes in two possible composite keys one of the attribute is
unnecessarily duplicated in the tuples
[E] None of these
(Ans):-D

8. Which of the following is reliable service?
[A] TCP
[B] UDP
[C] Both [A] & (2)
[D] Either [A] nor (2)
[E] None of these
(Ans):-A

9. Firewall is used in PC for
[A] Security
[B] Authentication
[C] Data transmission
[D] All of these
[E] None of these
(Ans):-A

10. A transmission in which receiver receives the data simultaneously as it is relayed is called
[A] Video-conferencing
[B] Online transmission
[C] Real-time transmission
[D] Offline transmission
[E] None of these
(Ans):-C

11. A protocol is:
[A] Service that helps in communicating
[B] Rules that help computer talk
[C] Way of transmission data over the net
[D] All of these
[E] None of these
(Ans):-B

12. Which of the following are relational integrity constraints?
[A] Null value
[B] Prim any key
[C] Referential integrity
[D] All the above
[E] None of these
(Ans):-D

13. Which of the following do think is NOT to develop an application for computer?
[A] Feasibility study
[B] Designing
[C] Testing
[D] All the above
[E] None of these
(Ans):-D

14. Binary equivalent to 87 is:
[A] 1010111
[B] 1101111
[C] 1011111
[D] 10111111
[E] None of these
(Ans):-A

15. In binary system the highest value of an 8-bit number is
[A] 255
[B] 256
[C] 253
[D] 259
[E] None of these
(Ans):-A

16. Which of them is true?
[A] Data can be facts / figures / letters / words symbols etc. that represent an idea or object
[B] Data is raw material from which information is derived.
[C] Data is numbers, alphabets
[D] All the above
[E] None of these
(Ans):-A

17. Maximum storage space is available on
[A] CDs
[B] Floppies
[C] ROM
[D] Hard disc
[E] None of these
(Ans):-D

18. ____________ deals with the restructuring of existing source code in reverse engineering.
[A] Abstraction
[B] Completeness
[C] Users screen
[D] Directionality
[E] None of these
(Ans):-D

19. Which of the following person should be made responsible for reporting maintenance
problems in a LAN?
[A] Network administrator
[B] Users
[C] Security officer
[D] All the above
[E] None of these
(Ans):-B

20. Software change management decides:
[A] How to manage alternations, irrespective of the stage of the life cycle of a product
[B] Development stages working
[C] Maintenance stages working
[D] All the above
[E] None of these
(Ans):-A

Вам также может понравиться