1.
The ________ states that a foreign key must either match a primary key value in another relation or it must be null.
Correct Answer
B. Referential integrity constraint
Explanation
The referential integrity constraint states that a foreign key must either match a primary key value in another relation or it must be null. This means that when a foreign key is used to establish a relationship between two tables, it must always refer to a valid primary key value in the referenced table, or it can be left as null if there is no corresponding value. This constraint ensures the consistency and accuracy of data by preventing orphaned records and maintaining the integrity of the relationships between tables.
2.
An applet ________
Correct Answer
A. is an interpreted program that runs on the client
Explanation
An applet is an interpreted program that runs on the client. This means that it is a program written in a high-level language, such as Java, that is executed by the client's web browser. It is different from a compiled program, which is converted into machine code before execution. Applets are commonly used to add interactive features to websites and can perform various tasks, such as tracking the number of visitors or collecting data from visitors. Therefore, the correct answer is that an applet is an interpreted program that runs on the client.
3.
A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
Correct Answer
A. System virus
Explanation
A system virus, sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
4.
This is a group of servers that share work and may be able to back each other up if one server fails.
Correct Answer
B. Cluster
Explanation
A cluster is a group of servers that work together and share the workload. In a cluster, if one server fails, the others can take over its tasks, ensuring continuous operation and minimizing downtime. This setup provides redundancy and backup capabilities, making it an effective solution for high availability and fault tolerance.
5.
The ________ directory is mandatory for every disk.
Correct Answer
C. Sub
Explanation
The sub directory is not mandatory for every disk. The root directory, on the other hand, is mandatory for every disk.
6.
Which of the following will NOT eliminates the ambiguities of a null value?
Correct Answer
D. Define supertypes
Explanation
Defining supertypes does not eliminate the ambiguities of a null value. Supertypes are used in inheritance to create a hierarchy of classes, where subclasses inherit attributes and behaviors from their parent class. However, supertypes do not directly address the issue of null values or eliminate any ambiguities related to them.
7.
Data are ________ in client/server computing.
Correct Answer
C. Sent only upon the client's request
Explanation
In client/server computing, data are sent only upon the client's request. This means that the server does not automatically send data to the client machine without the client explicitly asking for it. This approach helps to optimize the use of network resources and processing time by only sending the necessary data when it is needed by the client.
8.
Three SQL, DDL, CREATE commands are ________ .
Correct Answer
D. Schema, Table and View
Explanation
The correct answer is "Schema, Table and View". In SQL, DDL (Data Definition Language) commands are used to define the database schema, create tables, and create views. A schema is a logical container for database objects, such as tables and views. Tables are used to store data in a structured manner, while views are virtual tables that can be used to simplify complex queries or provide a different perspective on the data. Therefore, the correct answer includes the three DDL commands commonly used in SQL.
9.
This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-
Correct Answer
E. Common gateway interface
Explanation
The Common Gateway Interface (CGI) is a standard way for a Web server to pass a Web user's request to an application program and receive data back to forward to the user. It allows the server to communicate with external programs or scripts, such as Perl or Python, to generate dynamic content for the user. CGI acts as a bridge between the web server and the application program, enabling the processing of user requests and the generation of appropriate responses.
10.
Firewalls are used to protect against ________ .
Correct Answer
A. Unauthorized attacks
Explanation
Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules. They act as a barrier between internal and external networks, protecting against unauthorized access and attacks from external sources. Unauthorized attacks refer to any attempt to gain unauthorized access to a network, system, or data. Firewalls are designed to detect and block such unauthorized access attempts, making them an essential tool in protecting against unauthorized attacks.
11.
Programming language built into user programs such as Word and Excel are known as ________
Correct Answer
B. Macro languages
Explanation
Macro languages are programming languages that are built into user programs such as Word and Excel. These languages allow users to automate repetitive tasks and create custom commands or functions within the program. They are specifically designed to interact with the features and functions of the user program, making it easier for users to customize and enhance their experience. Therefore, macro languages are the correct answer for this question.
12.
Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ .
Correct Answer
B. Begin the line with double slashes (/ /)
Explanation
In C++, the correct way to indicate a comment line is by beginning the line with double slashes (//). This syntax tells the compiler to ignore everything on that line, treating it as a comment rather than an executable instruction. The other options listed (beginning the line with a # sign, beginning and ending the line with double hyphens, and indenting the line) are not valid ways to create comment lines in C++. Therefore, the correct answer is to begin the line with double slashes (/ /).
13.
Before a package can be used in a java program it must be ________ .
Correct Answer
C. Declared
Explanation
In order for a package to be used in a Java program, it must be declared. This means that the package needs to be explicitly stated or specified in the program. By declaring the package, the program is able to access the classes and resources within that package. Without declaring the package, the program would not be able to recognize or utilize any of its contents.
14.
The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
Correct Answer
B. Modem
Explanation
A modem is a device that converts digital signals to analog signals for the purpose of transmitting data over telephone lines. It is used to establish a connection between a computer or other digital device and an internet service provider (ISP) through the telephone network. The modem modulates the digital data into analog signals that can be transmitted over the phone lines and then demodulates them back into digital signals at the receiving end. This allows for the transmission of data over long distances using existing telephone infrastructure.
15.
The degree of detail that should be incorporated into a database depends on what?
Correct Answer
B. The type of database
Explanation
The degree of detail that should be incorporated into a database depends on the type of database. Different types of databases have different requirements and purposes, so the level of detail needed will vary. For example, a financial database may require a high level of detail to accurately track transactions and balances, while a customer database may only need basic information such as names and contact details. Therefore, the type of database is a crucial factor in determining the appropriate level of detail to be included.
16.
A table of bits in which each row represents the distinct values of a key?
Correct Answer
B. Bitmap index
Explanation
A bitmap index is a table of bits in which each row represents the distinct values of a key. It is used to efficiently store and retrieve data in a database by creating a bitmap for each distinct value of a key. Each bit in the bitmap corresponds to a specific row in the table, indicating whether that row contains the corresponding value. This allows for fast searching and filtering of data based on specific key values.
17.
Every computer connected to an intranet or extranet must have a distinct ________
Correct Answer
C. IP address
Explanation
Every computer connected to an intranet or extranet must have a distinct IP address. An IP address is a unique numerical identifier assigned to each device on a network. It allows computers to communicate with each other and ensures that data is sent to the correct destination. Without a distinct IP address, there would be conflicts and confusion in the network, making it impossible for devices to connect and communicate effectively.
18.
With the object-oriented (OO) approach, an object encapsulates, or ________ a programmer.
Correct Answer
B. Hides, the details of an object from
Explanation
The correct answer is "hides, the details of an object from". In object-oriented programming, encapsulation is a fundamental principle where the internal details of an object are hidden from the outside world. This allows the object to maintain its integrity and ensures that only the necessary information is accessible to other parts of the program. By hiding the details, the object provides a clean interface for other programmers to interact with, promoting modularity and code reusability.
19.
The total set of interlinked hypertext documents worldwide is-
Correct Answer
C. WWW
Explanation
The correct answer is WWW, which stands for World Wide Web. The World Wide Web refers to the total set of interlinked hypertext documents that are accessible through the internet. It is a system of interconnected documents and other resources, linked by hyperlinks and URLs, allowing users to navigate and access information from various websites using web browsers. HTTP (Hypertext Transfer Protocol) is the protocol used for transferring data over the World Wide Web, while a browser is the software application used to access and view webpages. B2B (Business-to-Business) is unrelated to the concept of the interconnected hypertext documents worldwide.
20.
A range check ________
Correct Answer
C. Determines whether a number is within a specified limit
Explanation
A range check is a type of validation that determines whether a number is within a specified limit. It is used to ensure that the entered data falls within an acceptable range or boundary. This helps to prevent errors or inconsistencies in the data. For example, if a field is supposed to accept values between 1 and 100, a range check would verify if the entered number is within this range. If it is not, an error message or prompt can be displayed to the user, indicating that the input is invalid.
21.
Which of the following is TRUE ?
Correct Answer
A. Logical design is software-dependent
Explanation
Logical design refers to the representation of the database's structure and organization, including tables, relationships, and constraints. It focuses on the logical relationships between data elements and does not depend on any specific software or technology. However, the given answer states that logical design is software-dependent, which contradicts the definition of logical design. Therefore, the given answer is incorrect.
22.
Which of the following does NOT describe a data warehouse?
Correct Answer
D. Updateable
Explanation
A data warehouse is a large, centralized repository of data that is used for reporting and data analysis. It is designed to support complex queries and provide a historical perspective of the data. The data in a data warehouse is typically not updated in real-time, as it is meant to store and analyze historical data rather than transactional data. Therefore, the statement "Updateable" does not describe a data warehouse, as it implies that the data can be continuously modified or updated in real-time.
23.
The network interface card of LAN is related to following layer of OSI Model
Correct Answer
D. pHysical
Explanation
The network interface card (NIC) of a LAN is related to the Physical layer of the OSI Model. The Physical layer is responsible for the actual transmission and reception of data bits on the network. The NIC is a hardware component that enables a computer to connect to a network and physically transmit and receive data signals. It handles the electrical, mechanical, and functional aspects of the network connection, such as converting data into signals that can be sent over a network cable. Therefore, the NIC's functionality aligns with the Physical layer of the OSI Model.
24.
A result of a computer virus can NOT lead to ________ .
Correct Answer
B. Mother Board Crash
Explanation
A computer virus is a malicious software program that can infect a computer and cause various types of damage. However, it is important to note that a computer virus is primarily designed to manipulate or disrupt software, such as corrupting programs or deleting files. While a virus can potentially cause system instability and crashes, it is unlikely to directly cause a motherboard crash. Motherboard crashes are typically the result of hardware failures or issues, rather than being caused by a software virus. Therefore, the correct answer is "Mother Board Crash".
25.
Which error detection method uses one's complement arithmetic?
Correct Answer
B. Checksum
Explanation
Checksum is an error detection method that uses one's complement arithmetic. In checksum, the data is divided into equal-sized blocks and a sum is calculated for each block. This sum is then added to the data and sent along with it. At the receiving end, the sum is recalculated and compared with the received sum. If they match, it is assumed that the data is error-free. One's complement arithmetic is used in checksum to ensure that any errors in the data are detected.