- A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:
 - Repeater
 - Firewall
 - Encryption
 - Hub
 - None of these
 - What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
 - Handshaking
 - Modem options
 - Protocol
 - All of these
 - None of these
 - In SQL, which command is used to changes data in a data table?
 - UPDATE
 - INSERT
 - BROWSE
 - APPEND
 - None of these
 - In SQL, which of the following is not a data definition language command?
 - Which command(s) is (are) used to redefine a column of the table in SQL ?
 - ALTER TABLE
 - DEFINE TABLE
 - MODIFY TABLE
 - ALL of the these
 - None of these
 - In a relational schema, each tuple is divided into fields called
 - Relations
 - Domains
 - Queries
 - All of the these
 - None of these
 - An indexing operation
 - Sorts a file using a single key
 - Sorts file using two keys
 - Establishes an index for a file
 - Both (1) and (3)
 - None of these
 - Data security threats include
 - Hardware failure
 - Privacy invasion
 - Fraudulent manipulation of data
 - All of these
 - None of these
 - The language used in application programs to request data from the DBMS is referred to as the
 - DML
 - DDL
 - Query language
 - DCL
 - None of these
 - A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
 - File structures
 - Records
 - Fields
 - Database
 - None of these
 - A ___ means that one record in a particular record type is related to only one record of another record type.
 - One to one relationship
 - One to many relationship
 - Many toone relationship
 - Many to many relationship
 - None of these
 - Through linked list one can implement
 - Stack
 - Graph
 - Queue
 - All of these
 - None of these
 - A heap allows a very efficient implementation of a
 - Doubled ended queue
 - Priority queue
 - Stack
 - Trees
 - None of these
 - In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called
 - Unique key
 - Prime attribute
 - Index key
 - Primary Key
 - Null key
 - ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.
 - TCP(transfer control protocol)
 - DNS(Domain Name System)
 - SHA (Secure Hash Algorithm)
 - Simple Network Management Protocol (SNMP)
 - None of these
 
Specialist Officer IT Previous Year Questions - 1
Saturday, 25 January 2014
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment