Module-1 Question Paper to Pondy

Embed Size (px)

Citation preview

  • 7/29/2019 Module-1 Question Paper to Pondy

    1/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    1 A ________ is not a part of substance of a transaction, but

    rather of its representation or form.

    Signature Authentication Approval Cryptography A

    2 __________ is used in both creating and verifying a digitalsignature.

    Signer Authentication Hash Function DocumentAuthentication

    SignerAuthorisation

    B

    3 _____________ is the process of checking the digital

    signature by reference to the original message.

    DS Creation DC Creation DS Verification DC Verification C

    4 ____________ is to prove your identity or your right to

    access information or services online electronically.

    Digital Signature Digital Document Server Certificate Digital Certificate D

    5 A _________ identifies and authenticates your server and

    encrypts any information passed between the server and aweb browser.

    Document Certificate Personal Digital

    Certificate

    Server Certificate Secure Mode

    Certificate

    C

    6 A Digital Certificate is issued by a Certification Authority. TRUE FALSE A

    7 ___________ technology can be applied as a robust

    computer based alternative to traditional signature.

    Digital signature Digital certificate Software Computer A

    8 ___________ is a tool used to exclude impersonators and

    forgers.

    Document

    Authentication

    Signer authentication Document Certificate Digital Certificate B

    9 ___________ key is used to create the Digital signature and

    only known to the signer.

    Public Foreign Private Secret C

    10 _____________ is used for a veriety of electronic

    transactions.

    Digital signature Server Certificate Digital certificate Digital Document E

    11 ______________ are used by individuals when they

    exchange messages with other users.

    Document Certificate Personal Digital

    Certificate

    Server Certificate Secure Mode

    Certificate

    B

    12 Rule to design and use the database is called people Data Information Procedure D

    13 _________ manages the interaction between the database

    and end user

    RDBMS DBMS Database Data Abstraction B

    Module - 1

  • 7/29/2019 Module-1 Question Paper to Pondy

    2/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    14 DBMS stores the definitions of data and their relationships in

    a _________

    Data storage Database server Data dictionary Database client C

    15 _______ describes the structure and constraints for the

    whole database

    Internal Schema External Schema Conceptual Schema View Level C

    16 Data modelling under conceptual model is achieved in

    ________ levels

    one two three six B

    17 ___________ are data elements that describes an entity Attributes category

    Relationship

    Entity A

    18 ________ is the process of refining the data model built by

    an entity-relationship diagram

    Normal Form Relationship Normalization Abstraction C

    19 The degree of relationship is also called as _________ Cardinality Logical Level physical Level View Level A

    20 _________ structure is possible in a network structure N:1 M:N None of the above Both A and B D

    21 In which structure we have parent-child/children relationship

    amongst the different modules.

    Hierarchy Network Relational Object-oriented A

    22 _______ describes a single location in a record in which a

    particular te of data is stored.

    Record Table Tuple Fields D

    23 SQL stands for Standard Query

    Language

    Standard Query List Structured Query

    Language

    Structured Query

    List

    C

    24 Maximum Character for Memo Datatype is 255 char 64000 char 4 bytes 2 bytes B

    25 In an ________, records in the joined tables must have the

    same values for fields that are joined.

    Outer joins Inner joins Self-Joins Cross Joins B

    26 ___________ is a representation of facts, concepts or

    instructions in a formalized manner suitable for

    communication, interpretation or processing by users.

    people Information Data Procedure C

    27 Processed data is called __________ people Procedure Data Information D

  • 7/29/2019 Module-1 Question Paper to Pondy

    3/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    28 A __________ can consist of one or more tables of

    information that are related in some way.

    Table Record Database Tuples C

    29 ___________ manages the database within the database

    system.

    RDBMS software DBMS Software VB software Object-oriented

    software

    B

    30 __________ are most commonly used to access and

    manipulate the data found within the database.

    Application program Object-oriented program Development program Utility Program A

    31 ___________ is the software tool which is used to manage

    the database system's components.

    Development software Utility Software Application software Object-oriented

    software

    B

    32 A DBMS that supports a database distributed across several

    different sites is called _______________.

    Centralized DBMS Networking Distributed DBMS LAN C

    33 Logical level is also called as Internal Schema. TRUE FALSE B

    34 _____________ level describes data storage structure and

    access paths.

    Logical View Conceptual Physical D

    35 A technique for analysis and logical modeling of a system's

    data requirement is known as ___________.

    Normalization Implementation E-R modeling Hierarchy C

    36 _____________ focuses on the logical nature of the data

    representation

    Implementation model Conceptual model Network model Relational model B

    37 ___________ is the default datatype for primary key field. Autonumber Text Number Memo A

    38 We can set primary key for more than one field in a single

    table.

    TRUE FALSE B

    39 Forms included in other forms are called _____________ Subdirectory Subdatasheet Subforms Subwindows C

    40 Using datasheet view, we can see only one record at a time. TRUE FALSE B

    41 _____________ functions calculates statistics on a group of

    records in the current table.

    Aggregate Statistical Logical Database A

  • 7/29/2019 Module-1 Question Paper to Pondy

    4/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    42 _________________ is the process of arranging

    information in a specific meaningful order.

    Sorting Filtering Indent Alignment B

    43 ___________ performs certain action that has been

    assigned to it when clicked.

    Checkbox Button Command Lablebox C

    44 Records in a table can be deleted even if they have

    relationship with other tables.

    TRUE FALSE B

    45 OLE is a method used to sharing data between applications. TRUE FALSE A

    46 ___________ performs basic tasks, such as recognizing

    input from the keyboard and keeping track of files and

    directories on the disk.

    Operating system Control Unit ALU CPU A

    47 In __________ data are processed instantaneously. Batch processing On-line processing Line processing Data processing B

    48 _________ allows more than one program to run

    concurrently

    Multi processing Multithreading Multitasking Real time C

    49 The hard disk is instead broken into large pieces called

    ________

    Sector Track Clusters Disk C

    50 Unix/Linux file system was specially created for Windows

    New Technology File System

    TRUE FALSE B

    51 NTFS stands for New Training File

    System

    New Technology File

    System

    New Technology

    Forcasting System

    New Transmitting

    File System

    B

    52 NTFS is built for networking and with the goal of security,

    _______ and efficiency

    Reliability Sequencing Flow control Expandability A

    53 Every file on the hard disk is stored in a ________ Path Directory Folder RAM B

    54 __________ is a process of optimizing the disks by

    rearranging the files.

    Format Backup defragmentation compression C

    55 The base of the directory tree is called Base Directory Root Directory Subdirectory External Directory B

  • 7/29/2019 Module-1 Question Paper to Pondy

    5/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    56 _______ is the act of dividing the harddisk into pieces Fragmentation Formatting Restore Partitioning D

    57 _______ provides real time data recovery when a hard drive

    fails and also protect against loss of data.

    Tape Cd Drive RAID UPS C

    58 Damage caused by a virus is called the ________ Uninfected file Payload Scanners Formload B

    59 Virus have been found on shrinkwrapped software straight

    from the manufacturer

    TRUE FALSE A

    60 ___________ are files that contains other files. Folders Archive File Container Archie B

    61 The ________ is located across the bottom of desktop andoffers an easy way to access programs

    Formatted Toolbar Menubar Taskbar Standard Toolbar C

    62 USB stands for Uniform Serial Bus Universal Serial Bus Unix Serial Bus Unilex Serial Bus B

    63 ___________ is used to remove unneeded files. Delete Cookies Format Defragmenter Disk cleanup D

    64 Which file system was created for windows NT File Allocation Table UNIX/LINUX File

    System

    New Technology File

    System

    Virtual File Syatem C

    65 RAID stands for Redundant Array of

    Inexpensive Data

    Reduntant Array of

    Inexpensive Disks

    Redundancy Array of

    Inexpensive Data

    Redundancy Array

    of Inexpensive

    Disk

    B

    66 An operating system manages and coordinate the functions

    performed by the _____________

    Computer hardware Software End user People A

    67 ______________ is used to controlling peripheral devices

    such as disk drives and printers.

    Hardware Operating system Control Unit ALU B

    68 Which one is the operating system for minicomputer from

    the following options.

    DOS Windows UNIX MAC C

    69 ______________ determine weather the appropriate main

    memory and secondary storage capability what the user

    require is available.

    Data management Virtual storage Memory management Job management D

  • 7/29/2019 Module-1 Question Paper to Pondy

    6/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    70 ______________ manages the storage and retrieval of

    data.

    Job management Data management Virtual storage Memory

    management

    B

    71 _______________ manages the allocation of main memory

    to specific jobs.

    Operating system Control Unit ALU CPU A

    72 _______________ operating system enable several

    processes to run concurrently.

    Realtime Multiprocessing Multithreading Multitasking B

    73 _______________ is the ability of an operating system to

    execute different parts of a program simultaneously.

    Realtime Multiprocessing Multithreading Multitasking C

    74 _______________ operating system are the systems that

    respond to input immediately.

    Multiprocessing Multithreading Multitasking Realtime D

    75 _______________ allows user to enter command bypointing and clicking at objects that appear on the screen.

    CPU System software Graphical user interface System interface C

    76 ______________ is used to manage your hard disk data. Memory management File system Operating system Data management B

    77 Data is stored in ___________ on the hard disk. Sectors Path Memory Operating system A

    78 We can allocate an individual sector to files. TRUE FALSE B

    79 10GB disk partition has ___________ sectors 10,000,000 15,000,000 20,000,000 25,000,000 C

    80 The information about clusters is stored in ________ . NTFS FTP Database FAT D

    81 In NTFS we are having file-by-file compression. TRUE FALSE A

    82 Files are stored virtually in every operating system is known

    as ______________ .

    Directory Directory tree Path Virtual storage B

    83 The size of the file in __________. Mhertz Characters Bytes Integers C

  • 7/29/2019 Module-1 Question Paper to Pondy

    7/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    84 Maximum number of characters can be included for File

    extension.

    2 3 5 4 D

    85 Within the root directory we can create more subdirectories. TRUE FALSE A

    86 We cannot able to display partition information. TRUE FALSE B

    87 To refresh your hard disk ___________ command we can

    use.

    Cleanup Compression Format Defragmentation C

    88 When you are formatting your hard disk we must do

    Partitioning.

    TRUE FALSE A

    89 The basic RAID levels includes ________ RAID levels. 5 4 7 6 D

    90 ____________ is a computer program that is able to copy

    all into other programs.

    Computer hardware Computer viruses Archie Antivirus B

    91 __________ are viruses which infect any executable

    programs.

    Boot sector infectors File system viruses File infectors cluster viruses C

    92 Any files or systems that is executed and infected can be a

    source of viruses

    TRUE FALSE A

    93 To decompress your files or folders, which command we

    have to use from the following

    decompress Compress Extract Add C

    94 ____________ can convert a large file into a new one

    containing brief descriptions of a original file's patterns.

    Format Compression Converter Decompression B

    95 ___________ format is the most common archive format. zip rar Archie pdf A

    96 __________ consolidates fragmented files and folders on

    your system's hard disk.

    Compression Disk Defragmenter Formatting Restore B

  • 7/29/2019 Module-1 Question Paper to Pondy

    8/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    97 Acrobat reader software is used to open a ________ file

    format.

    htm pde pdf acr C

    98 __________ file system is designed for security and

    flexibility.

    FAT NTFS Virtual File system UNIX/LINUX D

    99 Which of the following files could not be opened in excel

    ____

    text files Lotus 1-2-3 quattropro or xbase files class files D

    100 In excel, the dates that are stored as sequential numbers

    known as ___

    serial values domain values range values reference values D

    101 The command to display the current date in a cell is

    _________________

    =today() =date() =currentdate() none of the above A

    102 In excel, absolute references are represented by a ________

    before the column and row addresses

    dollar sign ' = ' sign # sign none of the above A

    103 The function that is used to calculate the payment for

    specific loan terms ____________

    sumif pmt countif none of the above B

    104 The __________ option present in the file menu options is

    used to specify major facts of the page to be printed

    page setup print area print none of the above A

    105 The process of finding or selecting information is known as

    _________

    filtering searching sorting none of the above A

    106 In a chart X-axis is known as_______________ series or rank category legend data marker B

    107 _________ are not allowed in a macro name spaces wild card characters symbols none of the above A

    108 A ___________ is an excel file where the user stores his

    data

    Workbook Worksheet Spreadsheet none of the above A

    109 Excel allows upto ______ levels of sorting two three N B

  • 7/29/2019 Module-1 Question Paper to Pondy

    9/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    110 If a cell shows #######, it means that _____. your formula has a

    syntax error

    the row is too short to

    show the number at the

    current font size

    the column is too

    narrow to show all the

    di its of the number

    either b or c C

    111

    A _________________ is one billionth of a second nanosecond picosecond gigasecond none of the above A112

    ______________ provides global connections for today's

    computers LAN WAN MAN GAM B

    113

    ROM is also known as _____________ Samware Romware Firmware Germware C

    114

    The OS has to swap information back and forth between

    RAM and the harddisk is called thrashing jumping shifting moving A

    115

    A pen is also called as ____________ in digitizing tablet. Light pen Mode Puck Stylus D

    116

    Another term for dot pitch is ______________ Phospher Pitch Bronze Pitch Metal Pitch None of the above A

    117

    Keyboard is also called as ___________ QWERTY ASDFGH ZXCVBN all the above A

    118

    _________ can be input into a computer using a digitalcamera Codes Images A or B A & B B

    119

    The _________ bar displays the name of the document. Name Status Title Tray icon C

    120

    A quick way to get to the page setup dialog box is to

    __________ any gray portion of the ruler bar. Drag Triple click Click Double click D

    121

    In early word processor, we have to run ___________

    program to print the document. Runner Formatter Editor Printer B122

    A __________ is a single instruction that performs several

    different commands in a sequence determined by the user. Mail Merge Template Macro None of the above C

  • 7/29/2019 Module-1 Question Paper to Pondy

    10/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    123 Microsoft visual basic project file has _______ file

    extension.

    .vbg .vbp .frm .frx B

    124 In visual basic, _______ method is used to load picture

    during runtime in an image control

    load loadpicture addpicture none of the above B

    125 In visual basic, using a data control, to navigate to the

    previous record ________ method of a recordset object is

    used.

    movenext movelast moveprevious movefirst C

    126 In visual basic, the explorer view of a project is displayed in

    ___________

    properties window form layout window toolbox project explorer D

    127 In visual basic, a timer event is only available in timer

    control.

    TRUE FALSE A

    128

    The "format columns" option allows to create columnar text

    up 12 columns only. true false A

    129

    The user can split the screen only into two parts true false A

    130

    The feature that enables user to type anywhere in a

    document without pressing or tab click-n-type double click drag & drop none of the above A

    131 BBS stands for______ bulletin board system business broadcasting

    system

    bulletin broadcasting

    system

    none of the above A

    132 WINSOCKS is expanded as______ windows socks windows sockets windows stocks none of the above B

    133 The space used by Netscape to store the retrieved page is

    called______

    buffer cache built-in none of the above B

    134 Internet can be defined as _______ internal network network of network intermediate network none of the above B

    135 _______ maps IP addresses with the domain names of thesites

    URL DNS FTP none of the above B

  • 7/29/2019 Module-1 Question Paper to Pondy

    11/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    136 URL stands for ____________ uniform research locator uniform resource locator unlimited restore locator none of the above A

    137 USENET is a BBS on ____ scale small large very small none of the above B

    138 The World Wide Web is referred to shortly as the _______ net web browser editor B

    139 The web maps are called _______ list directories image list none of the above C

    140 ________ is used to link pages in the world wide web universal resource

    locator

    uniform resource locator uniform resource label name of the above B

    141 _____ is a program that helps us to log on to other networks yahoo ftp telnet none of the above C

    142 WSIRC stands for______ wide search for

    information and

    research

    windows sockets

    internets relay chat

    world search for

    information and

    research council

    none of the above B

    143 Web is a collection of ___________ web sites images applets documents A

    144 _____ can be owed by multiple organisation LAN MAN WAN none of the above C

    145 HTTP is the acronym for __________ Higher text transfer

    protocol

    Hyper text transmission

    port

    Hyper text transfer

    protocol

    Hyper text transfer

    port

    C

    146 Which of the following statements is TRUE regarding

    PowerPoint diagrams?

    You can change the

    appearance of a whole

    diagram, but not

    You can change both

    the appearance of a

    whole diagram and the

    You cannot change the

    style of the connecting

    lines in an Organization

    You cannot

    change the color

    of the boxes in an

    B

    147 Which of the following objects can contain custom animation

    effects?

    Clips Organization charts Text Clips, organization

    charts, and text

    D

    148 PowerPoint's drawing toolbar contains _______ drawing

    tools

    10 12 102 22 B

  • 7/29/2019 Module-1 Question Paper to Pondy

    12/12

    S.No NAME Option 1 Option 2 Option 3 Option 4 Answe

    149 An example of the components of a multimedia presentation

    could include

    text, graphics and email

    address.

    text, hypertext and

    Power Point.

    CD-ROM, digital camera

    and sound.

    text, hypertext,

    Power Point, video

    and sound.

    D

    150 ______ determines the order in which order in which the

    slides will be displayed during the show

    slide show custom show both a and b none of the above B