Download SX5

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Microsoft Jet Database Engine wikipedia , lookup

Relational model wikipedia , lookup

Database wikipedia , lookup

Extensible Storage Engine wikipedia , lookup

Functional Database Model wikipedia , lookup

Clusterpoint wikipedia , lookup

Object-relational impedance mismatch wikipedia , lookup

Database model wikipedia , lookup

Transcript
SX5
1.
2.
3.
4.
5.
6.
7.
Internal auditors should review data
system design before they are
___________
(a) Implement
(b) Developed
(c) Modified
(d) All of the above
In a multi-user database, if two users
wish to update the same record at the
same time, they are prevented from
doing so by____________
(a) Jamming
(b) Password
(c) Documentation
(d) Record lock
Which command closes text file which has
been created using “SET ALTERANATIVE”
< Filename> “command” ?
(a) SET ALTERANATE OFF
(b) CLOSE DATABASE
(c) CLOSE ALTERNATE
(d) CLEAR ALL
Which of the following statements is
false?
(a) FIND and SEEK need an index file
(b) CONT cannot be used after using
FIND and SEEK
(c) FOND Mohan and SEEK “Mohan”
produce the same result when used
with an index file whose key name
is having length as 30 characters
______________
(d) None of the above
The maximum length of a field name
can be ______________
(a) 10 characters
(b) 12 characters
(c) 15 characters
(d) 18 characters
Which of the following command will
only release all the memory variable?
(a) CLEAR
(b) CLEAR MEMVAIL
(c) CLOSE ALL
(d) CLEAR MEMORY
Which function is used to remove
trailing blanks from a character string?
(a) UPPER ()
(b) TRIM()
(c) VAL()
(d) SUBSTR()
XIX
8.
9.
10.
11.
12.
13.
14.
What value RECOUNT() returns if no
database is in use?
(a) Null
(b) 0
(c) Space
(d) No value
The command MODIFY COMMAND is
used to ______________
(a) Modify the structure of a database file
(b) Modify a Report format file
(c) Add a new field to every record of a
database file
(d) All of the above
Which of the following is not true of the
traditional approach to information
processing______________
(a) There is common sharing of data
among the various application
(b) It is file-oriented
(c) Programs are dependent on the
files
(d) It is inflexible
The data – base environment has all of the
following components except __________
(a) Users
(b) Separate files
(c) Data base
(d) Data-base administrator
Which of the following hardware
component is the most important to the
operation of a database management
system?
(a) High-resolution video display
(b) Printer
(c) High-speed, large capacity disk
(d) Plotter
Which of the following is not the
responsibility of the utilities component
of DBMS software?
(a) Creating the physical and logical
design
(b) Removing flagged records for deletion
(c) Creating and maintaining the data
dictionary
(d) Monitoring performance
Which of the following is a type of
DBMS software?
(a) Query language
(b) Utilities
(c) Report writer
(d) All of the above
(1)
SX5
15. A data dictionary doesn’t provide
information about______________
(a) Where data is located
(b) The size of the disk storage device
(c) Who own or is responsible for the
data
(d) How the data is used
16. Which of the following contains a
complete record of all activities that
affected the contents of a database
during a certain period of time?
(a) Report writer
(b) Query language
(c) Program manipulation language
(d) Transaction log
17. Embedded pointer provide __________
(a) A secondary access path
(b) A physical record key
(c) An inverted index
(d) All of the above
18. A scheme describes ______________
(a) Data elements
(b) Record and files
(c) Record relationships
(d) All of the above
19. Batch processing is appropriate if
__________
(a) Only a small computer system is
available
(b) Only a few transactions are involved
(c) A large computer system is available
(d) None of the above
20. With respect to data input , the most
accurate description of batch control is
______________
(a) Dividing documents to be entered
into batches
(b) Controlling the input of each input
clerk
(c) Comparing to a pre calculated
figure the total of a data item
summed a cross a batch records
put into the system
(d) None of the above
21. Data security threats include ________
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above
XIX
22. Data
encryption
techniques
are
particularly useful for______________
(a) Reducing
storage
space
requirements
(b) Improving data integrity
(c) Protecting
data
in
data
communication system
(d) All of the above
23. Internal auditors should review data
system design before they are _______
(a) Developed
(b) Implemented
(c) Modified
(d) All of the above
24. The database administration function
includes ______________
(a) Application programming
(b) Computer operations management
(c) Database access planning
(d) All of the above
25. A database management system might
consist of application programs and a
software package called ________
(a) Fortran
(b) Auto flow
(c) BPL
(d) Total
26. The function of a database is ________
(a) To check all input data
(b) To check all spelling
(c) To collect and organize input data
(d) To output data
27. Large collection of files are called ________
(a) Fields
(b) Records
(c) Database
(d) Sectors
28. The files stored on a secondary storage
device are composed of a hierarchy of
data. What does a record in a file
contain ______________
(a) Bits
(b) Characters
(c) Data fields
(d) Schema
29. The distinguishable parts of a record
are called ______________
(a) Files
(b) Data
(c) Fields
(d) Programs
(2)
SX5
30. A computer file contains several records.
What does each record contain?
(a) Bytes
(b) Words
(c) Fields
(d) Programs
31. What name is given to the collection of
facts, items of information or data which
are related in some way?
(a) Data base
(b) Directory information
(c) Information tree
(d) Information provider
32. There are certain packages that allow
people to define data items, place items
in particular records, combine the
records into designated files and then
manipulate and retrieve the stored
data. What are they called?
(a) Data storage system
(b) Database management system
(c) Batch processing system
(d) Data communication package
33. In any hierarchy of data organization,
the smallest entity to be processed as a
single unit is called
(a) Data field
(b) Data record
(c) Data file
(d) Database
34. What software packages are commonly
used for business that have to track
extensive lists of client and inventory?
(a) Special purpose packages
(b) Custom made programs
(c) Single function application packages
(d) Data management packages
35. A relational database management
(RDBM) package manages data in
more than one file at once. How does it
organize these files?
(a) Tables
(b) Relations
(c) Tuple
(d) Both (a) and (b)
36. The main idea behind computer files is
that is convenient to ______________
(a) Arrange them
(b) Store information together
(c) Create them
(d) Access them
XIX
37. A large computer information system
maintains many difference computer
files. Which amongst them is called a
perpetual file?
(a) Specialized file
(b) Log file
(c) Master file
(d) History file
38. Amongst the computer files there is one
which is mostly used for maintaining such
status information as balances in bank
account records, stock on hand balances in
inventory records and year to date earning
amounts in payroll records. Can you tell the
name of the file?
(a) Transaction file
(b) Index file
(c) Backup file
(d) Master file
39. Which of the following is not a relational
database?
(a) dBASE IV
(b) 4th Dimension
(c) FoxPro
(d) Reflex
40. Which of the following fields in a student file
can be used as primary key?
(a) Class
(b) Social Security number
(c) GPA
(d) Major
41. The relational data-base environment
has all of the following components
except ______________
(a) Users
(b) Separate files
(c) Data base
(d) Data-base administrator
42. The two basic types of record access
methods are ______________
(a) Sequential and random
(b) Direct and immediate
(c) Sequential and indexed
(d) On-line and real time
43. Transaction processing was made
possible by the development of ______
(a) Direct access storage
(b) Magnetic tape
(c) Cash register input
(d) Minicomputer
(3)
SX5
44. Report generator are used to ________
(a) Store data input by a user
(b) Retrieve information from files
(c) Answers queries
(d) Both (a) and (c)
45. An indexing operation______________
(a) Sorts a file using a single key
(b) Sorts a file using two keys
(c) Establishes an index for a file
(d) Both (a) and (b)
46. The special access features ______
enables directives related to directory
indexing
(a) Indexes
(b) Limit
(c) File info
(d) Option
47. ________ directive maps a CGI script
to a particular HTTP request method
(a) Action
(b) Script
(c) CGI
(d) MINE
48. The variant pages, which after variable
output based on language are stored in
_______ directory
(a) /etc/var
(b) /etc/var/ww
(c) /var/www/error
(d) None of these
49. _______ directive can specify an
absolute path name or a path name
relative to the server Root
(a) Configure log
(b) Error log
(c) Document Root
(d) None of the these
50. Modems can be configured to
automatically answer any incoming call.
Many user computers have modems
installed from the manufacturer. What
is the greatest security risk when
dealing with modems in this situation?
(a) Remote access without network
administrator knowledge
(b) Local access without network
administrator knowledge
(c) Client access without network
administrator knowledge
(d) Server access without network
administrator knowledge
XIX
51. Which of the following applies to PBX?
(Select all that apply.)
(a) PBX stands for Private Branch
Exchange
(b) PBX allows for analog, digital, and
data to transfer over a high-speed
phone system
(c) Both (a) & (b)
(d) PBX is used to carry analog
messages
and
modem
communication originating at the
phone company
52. VPN tunnels have end points. Which of
the following methods is used to offer
Strong Authentication at each end
point?
(a) DES
(b) Block cipher
(c) Stream cipher
(d) Diffie-Hellman
53. You want to prevent users from
downloading software on company
workstations. What is this called?
(a) Desktop lookup
(b) Desktop lockup
(c) Desktop lockdown
(d) Desktop lookdown
54. Which of the following characteristics of
an intranet are true? (Select all that
apply.)
(a) An intranet can be a part of a Local
Area Network (LAN)
(b) An intranet can work with Wide
Area Networks (WAN)
(c) Both (a) and (b)
(d) An intranet may be restricted to a
community of users
55. Which one of the following is software
used to logically connect workgroups,
thereby improving network performance
for group members in different physical
locations?
(a) Virtual Private Network
(b) Virtual Local Area Network
(c) Remote Authentication Dial-in User
Service
(d) Network Address Translation
(4)
SX5
56. Which of the following is relatively more
secure than proxy, because it assigns
private IP addresses to the clients on
your LAN, acting as a firewall?
(a) RADIUS
(b) Internet Control Message Protocol
(c) Network Address Translation
(d) ICMP Router Discovery Protocol
57. Which of the following are true
statements about Network Address
Translation? (Select all that apply.)
(a) Provides for private addressing
ranges for internal network
(b) Hides the true IP addresses of
internal computer systems
(c) Both (a) and (b)
(d) Translates private IP addresses into
registered Internet IP addresses
58. There are several tunneling protocols.
Which of the following are types of VPN
remote computing tunneling protocols?
(Select all that apply.)
(a) L2F
(b) L2TP
(c) PPTP
(d) Both (a) and (c)
59. Which of the following terms relates to
sending an ICMP request to each IP
address on a subnet and waiting for
replies?
(a) Port scanning
(b) Echo scanning
(c) Ping scanning
(d) Node scanning
60. Your company has a large internal
network that you would like to subnet
into smaller parts. Which of the
following devices can you use to
separate your LAN and still protect
critical resources? (Select all that
apply.)
(a) An internal firewall
(b) A router between subnets
(c) A switch between departments
(d) All of the above
XIX
61. Remember, routers work at the
Network Layer of the International
Standards Organization/Open Systems
Interconnection (ISO/OSI) established
sequence of OSI Layers. What is the
correct and complete OSI sequence in
order from user interface (Layer 7) to
the delivery of binary bits (Layer 1)?
(a) Physical Layer, Network Layer,
Data Link Layer, Transport Layer,
Session Layer, Presentation Layer,
Application Layer
(b) Application Layer, Physical Layer,
Session Layer, Transport Layer,
Network Layer, Data Link Layer,
Presentation Layer
(c) Physical Layer, Data Link Layer,
Network Layer, Session Layer,
Transport
Layer,
Presentation
Layer, Application Layer
(d) None of the above
62. Most networks employ devices for
routing services. Routers work at which
of the following OSI layers?
(a) Transport
(b) Network
(c) Presentation
(d) Session
63. Which of the following are true
statements about modems? (Select all
that apply.)
(a) Modems use the telephone lines
(b) Modem stands for modulator and
demodulator
(c) Modems are no longer used in
secure networks
(d) A modem's fastest transfer rate is
56 Kbps
64. For the sites that have a centralized
mail server ________ clients are also
considered MDAs
(a) POP
(b) MUA
(c) MTA
(d) All of the above
65. The mail server that caves along with
the Red Hat Linux is
(a) Exim
(b) Send mail
(c) Postfix
(d) None of the above
(5)
SX5
66. The _______ file lets you forward email for a particular domain to a
selected server
(a) vivtoser table
(b) Mailer table
(c) Access
(d) None of the above
67. The timeout event ________ gives the
acknowledgement of the Mail command
(a) Smail
(b) Mail
(c) Connect
(d) Received
XIX
68. The user can manage the messages
while the message stay on the server,
using ______ server
(a) POP
(b) IMAP
(c) RPM
(d) All of the above
69. _________ send mail program displays
message quantity & byte count statistic
(a) Mailq
(b) Mailstart
(c) Mail
(d) None of the above
70. _________ send mail program print act
all aliases defined in /etc/aliases
(a) Paliases
(b) Pralisases
(c) Print
(d) Aliases
(6)