0% found this document useful (0 votes)
12 views

CBE Test For Informatics

cbe informatics

Uploaded by

Brook Sintayehu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
12 views

CBE Test For Informatics

cbe informatics

Uploaded by

Brook Sintayehu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 9
wing is resp sed for communi ation wil Pel YH We he 2 JavaScript CSS + HTML Java None of the above wang A - The following is the do in order to improv Procedure that you should A. Search €ngine optimization B. Search engine ranking C. Search engine handiing D. Search engine hack E. None of the above multiple e ie able on . The design of your company’s website so that it could Be platforms in similar appearance is ™OO@D> A. Responsive design B. Device design C. Query design D. Compatibie design E. None of the above request from o user's . The time that a web application takes to respond toc specific A. Request time B. Response time C.latency D. Processing fime ofthe ae ough which computer-based intor d best defines: th 11.The complex organizational Be systems are developed and main A. Information systems analysis and design 8. Joint application design C. Prototyping D. None of the above . 4 be classified as: 12. Software designed to support the payroll function would bes! A. Application software 8. Sys! em software C. Design sottware D. Analysis software iit guic 13. Comprehensive, multiple-step approaches to systems development ans your work and influence the quality of your final product defines: A. Techniques B. Tools Cc. Me! odolagies D. Data flows 14.The person in an organization who has the primary responsibility for systems analysis and design is the: A. Systems analyst B. End user C. Internal auditor D. Business manager 15.M ision support systems: A. Aulomale the handling of data about B. Are designed to help organizational ¢ Cc. Attempt to codify and manipulate & a D. Take relatively raw data tha! have b. ee into a meaningtul aggregated for 2 responsibilities 17, The traditional methodology used to develop, mairicin, ond reghace iefaccnction systems best defines: a SDLC RAD OOAD . prototyping ONep 18. The second phase of the SDLC in which system requirements ore studies anc structured best defines: A. Planning B. Analysis Cc. Design D. Implementation i ich requkements cre comvertec 19. An iterative process of systerns development in whic pn soqpiee ers re = to a working system that is continually revised through close collicboraiion Sates an analyst and users best defines: eee aA shored cohechon A ogc ay has WO A, Dotabows 7 6. bark Snes cs 1 c co one contra 22. voltware syshern thot encthes users to celine, *2Re AC OAR access to the database. A 8. C. Filing s¥2 D. . Record A. Atoble vith ¢ B. Order of c C. Each tuple/row D. All 24.___is on attribute thot uniquely ideniify rows im co déctchcse totie A. Foreign Key B. Primary Key C. Domain Key D. index Key 25.In a base relation the primary key should not have c mull wolwe anc be uri a _is a technique to given the d Peres opeties, lata requirements ofan enilnn eset ‘with deskable A. Anomalies a ‘ * B. Design C. Normalization D. Pipelining 28. isthe granting of right o} Prt access to a system resources. Privilege that enable subject to have legitimate A. Authentication B. Permission C. Allowance D. Avihorization 29. ___is SQL used to create, alter, and drop database objects and structure. A. DMI B. DDL C. DCL D. DQL 30. Which one of the following is false? i a d to loss of competitiveness. A. Failure to control confidentiality may leat ‘ B. Adisaster recovery plan does not need fo include the shipment of datebase backups to other sites. ott iness secutily is offen internal rather than exter C. The greatest ihreat to busines: ty Bisbee ote D. Authorization tables contain highly sensitive data an: EB omit cP provide toa network? the network and get an IP address without manual of occur ona network that issues dynamic add ments. tions by a name rather than an IP addr ss and are therefore always reachc base after a over a data’ 32. Which of the following Is the preferred ae “transaction in progress terminates abnorm A. Rollback B. Roll forward C. Switch to duplicate database D. Reprocess Iransactions idi ta frame? 33. Which address does q NIC use when deciding whether to accep! A. Source MAC address B. Destination MAC address C. Source Ethernet address D. Destination IP address E. Source ip address 34.4 host is trying to send a packet to adevice ona remote LAN segment, but the ore Currently no Mappings in its ARP cache, How will the device obtain a destination MAC address? A. It willsendo fequest to the DNS server for the destination MAC address, B. It will send an ARP request! for the MAC address of the destination device. hes using a straight-thro N Configured. Which statement © connection? nm would q sw Ch recory r ? garess table Pe tes tog i WGI suite "DO he the te A. When the SWIICh je 0 5 Cor € B. When nother SWilch eo ren iene. ; Ge. WhEN a route, Is ¢ xcleg elo _* D. When ry Ultiple App bre . E. None of the Above 37. Which type of transmj. ; $S1On does a switch, hen the destination sac ad not containeg in the MAC Scien fase when the destination A. Anycast Unicast Ga Broadcast D. Multicast E. None of the above i 0 47 38.What information is added to the switch table from incoming frame: A. Source MAC address and incorning port number bs B. Destination MAC address and inc oming po eee C. Destination IP address and eerting p o nun D. Source IP address and incoming po be None of the above true about using full-duplex Fast Ethernet? tional data flow bi if efficiency in both dire: al data flow. Gelect function is ct re0S0NS generaipy se 10 host Make Diy sont GE Networks? owin is tue esky # the relat , lationship between LAM: and WANS 48. Which one of the following Is (are) faise? A Doles’ a procesed intormator B. Information is row tacts and figures fe cn Ch aa racensaainc a Bos fos ot tym Ins oF Is done manually and is time

You might also like