1.
A special Type Of gateway that can keep external users from accessing resources on the LAN users access the external info is called_______
Correct Answer
B. Firewall
Explanation
A firewall is a special type of gateway that can keep external users from accessing resources on the LAN that users access the external info. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By examining the data packets and determining whether they meet the specified criteria, a firewall can prevent unauthorized access, protect against malicious attacks, and ensure the security and privacy of the network.
2.
What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and computer at one end of the line and another modem and computer at other end of the line?
Correct Answer
A. Hand shaking
Explanation
Handshaking is the name given to the exchange of control signals necessary for establishing a connection between a modem and computer at one end of the line and another modem and computer at the other end of the line. Handshaking involves a series of signals that are sent back and forth between the devices to ensure proper synchronization and communication. This process allows the devices to establish a connection and negotiate the parameters of the data transfer. Therefore, the correct answer is handshaking.
3.
In SQL which command is used to changes data in data table?
Correct Answer
A. UPDATE
Explanation
The correct answer is UPDATE. In SQL, the UPDATE command is used to modify or change data in a data table. It allows you to update specific columns or rows in a table based on certain conditions or criteria. This command is essential for making changes to existing data in a database.
4.
In SQL which of the following isn’t a data definition language command?
Correct Answer
A. Update
Explanation
The UPDATE command in SQL is not a data definition language (DDL) command. DDL commands are used to define or modify the structure of the database, such as creating or altering tables, while the UPDATE command is used to modify the data within the tables. Therefore, the correct answer is Update.
5.
Which Command/s is/are used to redefine a column of the table in SQL?
Correct Answer
C. Alter Table
Explanation
The correct answer is "Alter Table". The ALTER TABLE command is used to modify the structure of an existing table in SQL. It allows you to add, delete, or modify columns in the table. This command is commonly used to redefine a column by changing its data type, size, or constraints. Therefore, "Alter Table" is the correct command to use when redefining a column in SQL.
6.
In a relational schema, each tuple is divided into fields called.
Correct Answer
B. Domains
Explanation
In a relational schema, each tuple is divided into fields called "domains". Domains define the data type and constraints of the values that can be stored in each field of a tuple. This ensures that the data stored in the database is consistent and follows the specified rules for each field. Therefore, the correct answer is "Domains".
7.
An indexing operation
Correct Answer
C. Establishes an index for a file
Explanation
The correct answer is "Establishes an index for a file." An indexing operation refers to the process of creating an index for a file. An index is a data structure that allows for efficient searching and retrieval of data from a file. It typically contains key-value pairs, where the key is a specific attribute or field in the file, and the value is the corresponding record or location of that attribute in the file. By establishing an index for a file, it becomes easier and faster to locate and access specific data within the file.
8.
Data security threats include
Correct Answer
B. Privacy Invasion
Explanation
The correct answer is "Privacy Invasion". This refers to unauthorized access or intrusion into an individual's personal information, leading to a breach of privacy. It can involve activities such as hacking, identity theft, or unauthorized surveillance. In the context of data security threats, privacy invasion poses a significant risk as it can result in the exposure of sensitive information and potential misuse by malicious actors.
9.
The Language used in the application Programs to request a data from the DBMS is referred to as
Correct Answer
A. DML
Explanation
The correct answer is DML. DML stands for Data Manipulation Language and it is used to retrieve, insert, update, and delete data from a database. In the context of application programs, DML is the language used to send requests to the DBMS (Database Management System) to perform these data manipulation operations. DDL (Data Definition Language) is used to define the database structure, Query Language is a general term for any language used to query databases, and DCL (Data Control Language) is used to control access and permissions on the database. None of these options accurately describe the language used in application programs to request data from the DBMS.
10.
A _______ contains the smallest unit of meaning full data , so you might call it basic building blocks for the data file
Correct Answer
C. Fields
Explanation
Fields contain the smallest unit of meaningful data in a data file. They are the basic building blocks that make up the structure of the file. Each field represents a specific piece of information and is typically assigned a data type that defines the kind of data it can hold. Fields allow for the organization and storage of data in a structured and meaningful way, enabling efficient data retrieval and manipulation.
11.
A _______ means that one record in a particular record type is related to only one record of another record type
Correct Answer
A. One to one relationship
Explanation
A one-to-one relationship means that each record in one record type is related to only one record in another record type. This type of relationship ensures that there is a unique and direct connection between the two record types, allowing for a specific and exclusive association between them.
12.
Through Linked list one can implement
Correct Answer
D. All Of these
Explanation
A linked list is a data structure that consists of nodes, where each node contains a value and a reference to the next node. This data structure allows for dynamic memory allocation and efficient insertion and deletion operations. By utilizing the concept of a linked list, one can implement various data structures such as a stack, graph, and queue. Therefore, the correct answer is "All Of these".
13.
A heap allows a very efficient implementation of a _______
Correct Answer
B. Priority Queue
Explanation
A heap allows a very efficient implementation of a Priority Queue. A heap is a complete binary tree that satisfies the heap property, which means that the value of each node is greater than or equal to the values of its children. This property allows for efficient insertion and removal of the highest priority element, making it an ideal data structure for implementing a priority queue.
14.
In files, there is a key associated with each record which is used to differentiate among different record. For every file there is at least one set of a key that is unique. Such a key is called _______
Correct Answer
D. Primary Key
Explanation
A primary key is a key associated with each record in a file that is used to differentiate among different records. It is a unique key, meaning that there is at least one set of a key that is unique for every file. The primary key is used to uniquely identify each record in the file and is crucial for maintaining data integrity and ensuring the accuracy of data retrieval and manipulation operations.
15.
_______ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes
Correct Answer
B. DNS ( Domain Name System)
Explanation
The correct answer is DNS (Domain Name System). DNS is primarily used for mapping host names and email destinations to IP addresses. It allows users to easily access websites or send emails by using domain names instead of IP addresses. DNS also provides other functionalities such as load balancing, caching, and security. TCP is a protocol used for establishing a reliable connection between two devices, SHA is a cryptographic hash function, and SNMP is a protocol used for managing and monitoring network devices.
16.
Which layer of OSI determines the interface of the system with the users?
Correct Answer
B. Application
Explanation
The application layer of the OSI model determines the interface of the system with the users. This layer provides services directly to the user, such as email, file transfer, and web browsing. It is responsible for managing communication between the application and the network, and it ensures that the data is properly formatted and presented to the user.
17.
The Drawbacks of binary Tree sort are remedied by the
Correct Answer
C. Heap Sort
Explanation
Heap Sort is the correct answer because it addresses the drawbacks of binary tree sort. Binary tree sort has a worst-case time complexity of O(n^2), which can be inefficient for large datasets. Heap Sort, on the other hand, has a worst-case time complexity of O(n log n), making it more efficient. It uses a binary heap data structure to sort the elements, ensuring that the largest element is always at the root of the heap. This allows for efficient removal of the root element and maintaining the heap property, resulting in a sorted array.
18.
Row of a relation are called
Correct Answer
B. Tuples
Explanation
The rows of a relation are called tuples. In a relational database, a tuple represents a single record or row of data that contains a set of related attributes or fields. Each tuple in a relation is unique and can be identified by a primary key. Tuples are used to store and organize data in a structured manner, allowing for efficient retrieval and manipulation of information.
19.
An important application of cryptography , used in computerized commercial and financial transaction
Correct Answer
C. Digital Signature
Explanation
A digital signature is a cryptographic technique used in computerized commercial and financial transactions to ensure the authenticity, integrity, and non-repudiation of digital messages or documents. It provides a way to verify the identity of the sender and ensure that the message or document has not been tampered with during transmission. This is crucial in secure online transactions where the parties involved need to have trust and confidence in the authenticity and integrity of the exchanged data.
20.
Data mining evolve as a mechanism to cater the limitations of _______ system to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resources etc.
Correct Answer
A. OLTP
Explanation
Data mining evolved as a mechanism to cater to the limitations of the OLTP (Online Transaction Processing) system. OLTP systems are designed to handle real-time transactional data, but they are not well-suited for dealing with massive data sets with high dimensionality, new data types, and multiple heterogeneous data resources. Data mining, on the other hand, is a process of discovering patterns and relationships in large datasets, enabling organizations to extract valuable insights and make informed decisions.
21.
The _______ model remains operative until the software is required.
Correct Answer
B. Spiral Model
Explanation
The Spiral Model remains operative until the software is required. The Spiral Model is a risk-driven software development process model that combines elements of both waterfall and iterative development models. It emphasizes on continuous risk analysis and mitigation throughout the software development lifecycle. The model consists of multiple iterations, each involving planning, risk analysis, development, and evaluation. This iterative approach allows the software to be continuously updated and improved, making it suitable for projects where the requirements are not completely known or may change over time.
22.
This _______ data mining techniques derivess rules from real world case examples
Correct Answer
E. Case based reasoning
Explanation
Case-based reasoning is a data mining technique that derives rules from real-world case examples. It involves solving new problems by applying solutions that were used to solve similar past problems. In this approach, a database of previously solved cases is created, and when a new problem arises, the system retrieves the most similar cases from the database and adapts their solutions to fit the current problem. This allows for the reuse of knowledge and experience to solve new problems efficiently.
23.
Local variables _________
Correct Answer
B. Are known only to that block
Explanation
Local variables are known only to the block in which they are declared. They are not accessible or visible outside of that block. Once the block ends, the local variables are no longer in scope and cannot be accessed. This is a fundamental concept in programming languages like C++ where variables have limited visibility and can only be used within the block they are declared in.
24.
____________ is virus that inserts itself into a system's memory. Then it takes number of actions when an infected file is executed.
Correct Answer
E. Resident virus
Explanation
A resident virus is a type of virus that inserts itself into a system's memory, allowing it to remain active even after the infected file has been executed. Once in memory, the resident virus can perform a variety of actions, such as infecting other files or corrupting data. Unlike other types of viruses, a resident virus does not need to be executed again in order to carry out its actions. Therefore, it is considered to be a particularly dangerous and persistent type of virus.
25.
An Operating System is a _________
Correct Answer
A. System Softawre
Explanation
The correct answer is "System Software". An Operating System is a type of system software that manages computer hardware and software resources, provides common services for computer programs, and allows users to interact with the computer system. It acts as an intermediary between the users and the computer hardware, enabling the execution of application software and providing functions such as file management, memory management, and device management.