- A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:
- Repeater
- Firewall
- Encryption
- Hub
- None of these
- What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
- Handshaking
- Modem options
- Protocol
- All of these
- None of these
- In SQL, which command is used to changes data in a data table?
- UPDATE
- INSERT
- BROWSE
- APPEND
- None of these
- In SQL, which of the following is not a data definition language command?
- Which command(s) is (are) used to redefine a column of the table in SQL ?
- ALTER TABLE
- DEFINE TABLE
- MODIFY TABLE
- ALL of the these
- None of these
- In a relational schema, each tuple is divided into fields called
- Relations
- Domains
- Queries
- All of the these
- None of these
- An indexing operation
- Sorts a file using a single key
- Sorts file using two keys
- Establishes an index for a file
- Both (1) and (3)
- None of these
- Data security threats include
- Hardware failure
- Privacy invasion
- Fraudulent manipulation of data
- All of these
- None of these
- The language used in application programs to request data from the DBMS is referred to as the
- DML
- DDL
- Query language
- DCL
- None of these
- A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
- File structures
- Records
- Fields
- Database
- None of these
- A ___ means that one record in a particular record type is related to only one record of another record type.
- One to one relationship
- One to many relationship
- Many toone relationship
- Many to many relationship
- None of these
- Through linked list one can implement
- Stack
- Graph
- Queue
- All of these
- None of these
- A heap allows a very efficient implementation of a
- Doubled ended queue
- Priority queue
- Stack
- Trees
- None of these
- In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called
- Unique key
- Prime attribute
- Index key
- Primary Key
- Null key
- ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.
- TCP(transfer control protocol)
- DNS(Domain Name System)
- SHA (Secure Hash Algorithm)
- Simple Network Management Protocol (SNMP)
- None of these
Specialist Officer IT Previous Year Questions - 1
Saturday, 25 January 2014
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment