Вы находитесь на странице: 1из 10

Question on web technology

*********************************
1. Who contributed th term Hypertext?
a. Tim Bernes Lee
b. Scott E. Fahlam
c. Ted Nelson
d. William Gibson
Ans :- c 2.
2.Syntax of PHP is similar to:a. Perl or C
b. Perl and C
c. Only C
d. Only Perl
Ans :- b
3. Google bomb is:a. Spam Mail
b. Shared Network
c. Successful Bloggers
d. Inflate Websites Search Ranking
Ans :- d
4. What is not an area of study within Human
Factors research?
a. Human Anatomy
b. Human performance
c. Technology design
d. Human and technology interaction
Ans :- a
5. Google was founded by:a. Larry Page & Sergey Brin
b. David Filo & Jerry Yang
c. Jeff Bezos
d. Shawn Fanning
Ans :- a
6. Archy is:a. keyboard driven UI
b. Mouse driven UI
c. Joystick driven UI
d. both a & b
Ans :- a
7. Which is the earliest social networking site?
a. classmates.com
b. orkut.com
c. facebook.com
d. None
Ans :- a
8. Modem stands for:a. Modulator & Demodulator
b. Memory Demagnetization
c. Monetary Devaluation Exchange Mechanism
d. Monetary Demarkation
Ans :- a

9. Which of the following interface design


principles does not allow the user to remain in
control of the interaction with a computer?
a. allow interaction to interruptible
b. allow interaction to be undoable
c. hide technical internals from casual users
d. only provide one defined method for
accomplishing a task
Ans :- d
10. Which of the following is not a method of
accessing the web?
a. ISDN
b. DSL
c. Modem
d. CPU
Ans :- d

OLAP
****************
Stands for "Online Analytical Processing." OLAP
allows users to analyze database information from
multiple database systems at one time. While
relational databases are considered to be two- dimensional, OLAP data is
multidimensional,
meaning the information can be compared in many
different ways. For example, a company might
compare their computer sales in June with sales in
July, then compare those results with the sales
from another location, which might be stored in a different database. In order to
process database information using
OLAP, an OLAP server is required to organize and
compare the information. Clients can analyze
different sets of data using functions built into the
OLAP server. Some popular OLAP server software
programs include Oracle Express Server and Hyperion Solutions Essbase.
Because of its
powerful data analysis capabilities, OLAP
processing is often used for data mining, which
aims to discover new relationships between
different sets of data.
1st
1st
1st
1st
1st
1st

electronic computer-ENIAC1946
mainfram computer-UINIVAC1951
mini computer-PDP1960
super computer-cray1979
micro computer-IBM PC1981
laptop-adom osborn IBM LAPTOP

some questions on Budget 2013-2014


****************
1. In sports, Railway Teams won ______ National
Championships in 2012.
ANSWER: 9 2. _____ new Express trains to be introduced by
Railway in the year 2013-14.
ANSWER: 67 3.As per Budget Estimates 2013-14, Operating
Ratio is ___________.
ANSWER: 87.8% 4. Railway Minister Pawan Kumar Bansal on
____________ proposed the Indian Railway budget
2013.
ANSWER: 27 Feb 2013 5. Rail tourism has taken into consideration
launching multi-modal travel package in
cooperation with __________.
ANSWER: Jammu & Kashmir state government 6. Finance ministry approved
_______________tax-free
bonds in FY14. The government expects to raise
25000 crore rupees via tax-free bonds in FY13.
ANSWER: 50000 crore Rs 7. RBI expected GDP growth of _________ for
Financial Year 2013-14
ANSWER: 5.5%
Difference between Vote on Account and Interim
Budget?
A: Vote-on-account deals only with the
expenditure side of the government's budget, an
interim Budget is a complete set of accounts,
including both expenditure and receipts.
Important file extension list
***************************
.doc : Microsoft Word Document (ver.<=2003)
.docx :Microsoft Word Document (ver.>=2007)
.123 :Lotus 1-2-3 Spreadsheet
.csv :Comma Separated Values File .dat :Data File
.db :Database File
.dll :Dynamic Link Library
.mdb :Microsoft Access Database
.pps :PowerPoint Slide Show
.ppt :PowerPoint Presentation .sql :Structured Query Language Data
.wks :Microsoft Works Spreadsheet
.xls :Microsoft Excel Spreadsheet
.xml :XML File
.mng :Multiple Network Graphic
.pct :Picture File .bmp :Bitmap Image File
.gif :Graphical Interchange Format File
.jpeg :JPEG Image File

.jpg :JPEG Image File


.png :Portable Network Graphic
.psd :Photoshop Document .psp :Paint Shop Pro Image File
.tif :Tagged Image File
.ai :Adobe Illustrator File
.drw :Drawing File
.dxf :Drawing Exchange Format File
.eps :Encapsulated PostScript File .ps :PostScript File
.svg :Scalable Vector Graphics File
.3dm :Rhino 3D Model
.3dmf :QuickDraw 3D Metafile
.indd :Adobe InDesign File
.pdf :Portable Document Format File .qxd :QuarkXpress Document
.qxp :QuarkXpress Project File
.aac : Advanced Audio Coding File
.aif :Audio Interchange File Format
.iff :Interchange File Format
.m3u :Media Playlist File .mid :MIDI File
.midi :MIDI File
.mp3 :MP3 Audio File
.mpa :MPEG Audio File
.ra :Real Audio File
.ram :Real Audio Media .wav :WAVE Audio File
.wma :Windows Media Audio File
.3gp :3GPP Multimedia File
.asf :Advanced Systems Format File
.asx :Microsoft ASF Redirector File
.avi :Audio Video Interleave File .mov :Apple QuickTime Movie
.mp4 :MPEG-4 Video File
.mpg :MPEG Video File
.qt :Apple QuickTime Movie
.rm :Real Media File
.swf :Macromedia Flash Movie .wmv :Windows Media Video File
.asp :Active Server Page
.css :Cascading Style Sheet
.htm :Hypertext Markup Language File
.html :Hypertext Markup Language File
.js :JavaScript File .jsp :Java Server Page
.php :Hypertext Preprocessor File
.xhtml :Extensible Hypertext Markup Language File
.fnt :Font File
.fon :Generic Font File
.otf :OpenType Font .ttf :TrueType Font
.xll :Excel Add-In File
.cab :Windows Cabinet File
.cpl :Windows Control Panel
.cur :Windows Cursor

.dmp :Windows Memory Dump .drv :Device Driver


.key :Security Key
.lnk :File Shortcut
.sys :Windows System File
.cfg :Configuration File
.ini :Windows Initialization File .reg :Registration Information
.app :Mac OS X Application
.bat :DOS Batch File
.cgi :Common Gateway Interface Script
.com :DOS Command File
.exe :Windows Executable File .pif :Program Information File
.vb :VBScript File
.ws :Windows Script
.deb :Debian Software Package
.gz :Gnu Zipped File
.pkg :Mac OS X Installer Package .rar :WinRAR Compressed Archive
.sea :Self-Extracting Archive
.sit :Stuffit Archive
.sitx :Stuffit X Archive
.zip :Zipped File
.bin :Macbinary II Encoded File .c :C/C++ Source Code File
.cpp :C++ Source Code File
.java :Java Source Code File
.pl :Perl Script
.bak :Backup File
.gho :Norton Ghost Backup File .old :Backup File
.ori :Original File
.tmp :Temporary File
.dmg :Mac OS X Disk Image
.iso :Disc Image File
.toast :Toast Disc Image .vcd :Virtual CD
.msi :Windows Installer Package
.torrent :BitTorrent File
.yps :Yahoo! Messenger Data File
Q.1. What is NEFT?
Ans: National Electronic Funds Transfer (NEFT) is a
nation-wide payment system facilitating one-toone funds transfer. Under this Scheme, individuals,
firms and corporates can electronically transfer
funds from any bank branch to any individual, firm
or corporate having an account with any other bank branch in the country
participating in the
Scheme.
Q.2. Are all bank branches in the country part of
the NEFT funds transfer network?

Ans: For being part of the NEFT funds transfer


network, a bank branch has to be NEFT- enabled
Q.3. Who can transfer funds using NEFT?
Ans: Individuals, firms or corporates maintaining
accounts with a bank branch can transfer funds
using NEFT. Even such individuals who do not have
a bank account (walk-in customers) can also
deposit cash at the NEFT-enabled branches with
instructions to transfer funds using NEFT. However, such cash remittances will be
restricted to a
maximum of Rs.50,000/- per transaction. Such
customers have to furnish full details including
complete address, telephone number, etc.NEFT,
thus, facilitates originators or remitters to initiate
funds transfer transactions even without having a bank account.
Q.4. Who can receive funds through the NEFT
system?
Ans: Individuals, firms or corporates maintaining
accounts with a bank branch can receive funds
through the NEFT system. It is, therefore, necessary
for the beneficiary to have an account with the
NEFT enabled destination bank branch in the
country. The NEFT system also facilitates one-waycrossborder transfer of funds from India to Nepal. This is
known as the Indo-Nepal Remittance Facility
Scheme. A remitter can transfer funds from any of
the NEFT-enabled branches in to Nepal, irrespective
of whether the beneficiary in Nepal maintains an account with a bank branch in
Nepal or not. The
beneficiary would receive funds in Nepalese
Rupees
Q.5. Is there any limit on the amount that could be
transferred using NEFT?
Ans: No. There is no limit either minimum or
maximum on the amount of funds that could be
transferred using NEFT. However, maximum
amount per transaction is limited to Rs.50,000/- for
cash-based remittances and remittances to Nepal.
Q.6. Whether the system is centre specific or has
any geographical restriction?

Ans: No. There is no restriction of centres or of any


geographical area within the country. The NEFT
system takes advantage of the core banking
system in banks. Accordingly, the settlement of
funds between originating and receiving banks
takes places centrally at Mumbai, whereas the branches participating in NEFT
can be located
anywhere across the length and breadth of the
country.
Q.7 What are the operating hours of NEFT? Ans : Presently, NEFT operates in
hourly batches there are twelve settlements from 8 am to 7 pm on
week days (Monday through Friday) and six
settlements from 8 am to 1 pm on Saturdays.

Some On Database:
Types of Keys in Database
Super Key:
A combination of one or more columns in a table
which can be used to identify a record in a table
uniquely, a table can have any number of super
keys. ***********************
Candidate Key:
A Column (or) Combination of columns which can
help uniquely identify a record in a table without
the need of any external data is called a Candidate
Key. Depending on the need and situation a Table may have one or more
candidate keys and one of
them can be used as a Primary Key of the table.
A candidate key is a sub set of a Super Keys.
For Example, In an Employee Table, we may have
columns like Employee ID, Employee Name, and
Employee SSN. We can consider either Employee ID or Employee SSN as
Candidate Keys
*****************
Compound Key:
A Combination of more than one column
identifying records of a table uniquely, all the
columns that take part in the combination process are Simple Keys.
We can represent this buy taking a table which has
the combined information of Department to
Employees, Employee ID + Department ID here
both of them define a record in this table, but both

can make sense separately as well. ****************


Primary Key:
A Column in a table (which is a Simple Key) which
is a Candidate Key (Uniquely identify a records in a
table) and has the Constraint NOT NULL attached to
it is known as a Primary Key. Generally, but not always and need not be, Primary
Key goes with a Clustered Index.
Composite Primary Key (Composite Key)
When we have a Primary Key of a table defined
using more than one columns then it is known as a
Composite Key, each columns data can be duplicated, but combined values
cannot be. The
columns which are participating in a composite
primary key are not simple keys.
For Example, we can have a situation where there
is a need to define the key using first Name + last
Name. *************
Alternate Key :
We cannot define the Alternate Key Seperately
from a Candidate Key, for a table, if there are two
Candidate Keys and one is chosen as a Primary Key
the other Candidate Key is known as the Alternate Key of that table.
In Example, we can consider the Employee SSN as
Alternate Key as we have taken Employee ID as our
Primary Key
**********
Unique Key: A column (or) combination of columns which can
be used to uniquely identify a record in a table, it
can have one NULL Value.
Primary Key can be considered a special case of
unique key with a Not Null Constraint.
Generally, but not always and need not be, Unique Key goes with a Non
Clustered Index.
*************
Foreign Key:
A column of one table points to the Primary Key
column of another table to implement referential
data integrity. For Example, we can have a department id column
in the employee table which is pointing to
department id column in a department table where
it a primary key.
Next part of Web Tech. Ques.
**********
11. The Macintosh menu bar is faster than the
Windows menu bar primarily because of:
a. the power law of practice

b. task analysis
c. Fitts Law d. perceptual fusion
Ans :- c
12. Two different principles widely used in GUI
design are Application oriented interfaces and:a. Object User Interfaces
b. Object Oriented User Interfaces
c. Touch interfaces
d. Attentive User Interfaces Ans :- b
13. Which model depicts the image of a system that
an end user creates in his or her head?
a. design model
b. user model
c. system model
d. system perception Ans :- d
14. You can load a VCR tape the right way because
of:
a. physical constraints
b. logical constraints
c. semantic constraints
d. cultural constraints Ans :- a
15. WUI stands for:a. Web based User Interface
b. Web User Intelligent
c. Web Urgent Interface
d. None
Ans :- a
16. What is GOMS?
a. Goals, Operations, Module, Selection
b. Goals, Operators, Methods, Selection
c. Goals, Operating system, Methods, Selection
d. None
Ans :- b
17. JavaScript was originally called as:a. Java web scripting
b. LiveScript
c. HTML Jscript
d. None
Ans :- b
18. CLI stands for:
a. Class Line Interface
b. Computer Line Interface

c. Command Line Interface


d. None
Ans :- c
19. BCI stands for:a. Brain Chip Interface
b. Brain Computer Interconnection
c. Brain Computer Interface
d. None
Ans :- c
20. Which of the following interface design
principles reduces the user's memory load?
a. define intuitive shortcuts
b. disclose information in a progressive fashion
c. establish meaningful defaults
d. provide an on-line tutorial e. answers a, b and c
Ans :- e
21. Who is NOT involved in Human Factors
research?
a. Animals
b. Scientists
c. NASA
d. Technology designers Ans :- a
22. What is human-centered design?
a. Design of human beings
b. A term used in drawing
c. A teaching method
d. A methodology in technology design
Ans :- d
23. Which model depicts the profile of the end
users of a computer system?
a. design model
b. implementation model
c. user model
d. user's model Ans :- c
24. User Interfaces are commonly programmed
using:a. application driven architecture
b. network driven architecture
c. event driven architecture
d. None Ans :- c

Вам также может понравиться