The document contains 20 multiple choice questions about computer fundamentals and information technology topics such as data storage, networking, security and databases. The questions cover topics like MICR devices, auxiliary storage, database administration, firewall usage, binary conversions, and data vs. information. The correct answers are provided for each question.
The document contains 20 multiple choice questions about computer fundamentals and information technology topics such as data storage, networking, security and databases. The questions cover topics like MICR devices, auxiliary storage, database administration, firewall usage, binary conversions, and data vs. information. The correct answers are provided for each question.
[A] Letters [B] Numbers [C] Both of these [D] All of these [E] None of these (Ans):-B
2. Auxiliary storage consists of [A] Magnetic tapes [B] CDs [C] Both of these [D] All of these [E] None of these (Ans):-A
3. Who can provides access rights to users? [A] Data custodian [B] Data owner [C] The data base administrator [D] Management [E] None of these (Ans):-C
4. Security policy of an organization need not have [A] The overall security philosophy of the organization [B] The authorization procedure for accessing data [C] Security awareness program [D] Highlights and identity of the sensitive security features [E] None of these (Ans):-D
5. In case of a virus getting into computer, which of the following will help? [A] Encryption [B] NORTON [C] Police complaint [D] All of these [E] None of these (Ans):-B
6. Which of the following do you think is NOT necessary for computerization system in a bank? [A] Effective customer service [B] Effective back office integration [C] Focus on manual records [D] All of these [E] None of these (Ans):-C
7. BCNF is needed because: [A] Otherwise tuples may be duplicated [B] When a data is deleted tuples may be lost [C] Updating is otherwise is difficult [D] When there is dependent attributes in two possible composite keys one of the attribute is unnecessarily duplicated in the tuples [E] None of these (Ans):-D
8. Which of the following is reliable service? [A] TCP [B] UDP [C] Both [A] & (2) [D] Either [A] nor (2) [E] None of these (Ans):-A
9. Firewall is used in PC for [A] Security [B] Authentication [C] Data transmission [D] All of these [E] None of these (Ans):-A
10. A transmission in which receiver receives the data simultaneously as it is relayed is called [A] Video-conferencing [B] Online transmission [C] Real-time transmission [D] Offline transmission [E] None of these (Ans):-C
11. A protocol is: [A] Service that helps in communicating [B] Rules that help computer talk [C] Way of transmission data over the net [D] All of these [E] None of these (Ans):-B
12. Which of the following are relational integrity constraints? [A] Null value [B] Prim any key [C] Referential integrity [D] All the above [E] None of these (Ans):-D
13. Which of the following do think is NOT to develop an application for computer? [A] Feasibility study [B] Designing [C] Testing [D] All the above [E] None of these (Ans):-D
14. Binary equivalent to 87 is: [A] 1010111 [B] 1101111 [C] 1011111 [D] 10111111 [E] None of these (Ans):-A
15. In binary system the highest value of an 8-bit number is [A] 255 [B] 256 [C] 253 [D] 259 [E] None of these (Ans):-A
16. Which of them is true? [A] Data can be facts / figures / letters / words symbols etc. that represent an idea or object [B] Data is raw material from which information is derived. [C] Data is numbers, alphabets [D] All the above [E] None of these (Ans):-A
17. Maximum storage space is available on [A] CDs [B] Floppies [C] ROM [D] Hard disc [E] None of these (Ans):-D
18. ____________ deals with the restructuring of existing source code in reverse engineering. [A] Abstraction [B] Completeness [C] Users screen [D] Directionality [E] None of these (Ans):-D
19. Which of the following person should be made responsible for reporting maintenance problems in a LAN? [A] Network administrator [B] Users [C] Security officer [D] All the above [E] None of these (Ans):-B
20. Software change management decides: [A] How to manage alternations, irrespective of the stage of the life cycle of a product [B] Development stages working [C] Maintenance stages working [D] All the above [E] None of these (Ans):-A