@ GKADDDA. Powered by Blogger.

Specialist Officer IT Previous Year Questions - 1

Saturday 25 January 2014


  1. A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:
    1. Repeater
    2. Firewall
    3. Encryption
    4. Hub
    5. None of these
  2. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
    1. Handshaking
    2. Modem options
    3. Protocol
    4. All of these
    5. None of these
  3. In SQL, which command is used to changes data in a data table?
    1. UPDATE
    2. INSERT
    3. BROWSE
    4. APPEND
    5. None of these
  4. In SQL, which of the following is not a data definition language command?
    1. RENAME
    2. REVOKE
    3. GRANT
    4. UPDATE
    5. None of these
  5. Which command(s) is (are) used to redefine a column of the table in SQL ?
    1. ALTER TABLE
    2. DEFINE TABLE
    3. MODIFY TABLE
    4. ALL of the these
    5. None of these
  6. In a relational schema, each tuple is divided into fields called
    1. Relations
    2. Domains
    3. Queries
    4. All of the these
    5. None of these
  7. An indexing operation
    1. Sorts a file using a single key
    2. Sorts file using two keys
    3. Establishes an index for a file
    4. Both (1) and (3)
    5. None of these
  8. Data security threats include
    1. Hardware failure
    2. Privacy invasion
    3. Fraudulent manipulation of data
    4. All of these
    5. None of these
  9. The language used in application programs to request data from the DBMS is referred to as the
    1. DML
    2. DDL
    3. Query language
    4. DCL
    5. None of these
  10. A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
    1. File structures
    2. Records
    3. Fields
    4. Database
    5. None of these
  11. A ___ means that one record in a particular record type is related to only one record of another record type.
    1. One to one relationship
    2. One to many relationship
    3. Many toone relationship
    4. Many to many relationship
    5. None of these
  12. Through linked list one can implement
    1. Stack
    2. Graph
    3. Queue
    4. All of these
    5. None of these
  13. A heap allows a very efficient implementation of a
    1. Doubled ended queue
    2. Priority queue
    3. Stack
    4. Trees
    5. None of these
  14. In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called
    1. Unique key
    2. Prime attribute
    3. Index key
    4. Primary Key
    5. Null key
  15. ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.
    1. TCP(transfer control protocol)
    2. DNS(Domain Name System)
    3. SHA (Secure Hash Algorithm)
    4. Simple Network Management Protocol (SNMP)
    5. None of these

Next Part

No comments:

Post a Comment

 


Popular Posts

Facebook

blogger