Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
SX5 1. 2. 3. 4. 5. 6. 7. Internal auditors should review data system design before they are ___________ (a) Implement (b) Developed (c) Modified (d) All of the above In a multi-user database, if two users wish to update the same record at the same time, they are prevented from doing so by____________ (a) Jamming (b) Password (c) Documentation (d) Record lock Which command closes text file which has been created using “SET ALTERANATIVE” < Filename> “command” ? (a) SET ALTERANATE OFF (b) CLOSE DATABASE (c) CLOSE ALTERNATE (d) CLEAR ALL Which of the following statements is false? (a) FIND and SEEK need an index file (b) CONT cannot be used after using FIND and SEEK (c) FOND Mohan and SEEK “Mohan” produce the same result when used with an index file whose key name is having length as 30 characters ______________ (d) None of the above The maximum length of a field name can be ______________ (a) 10 characters (b) 12 characters (c) 15 characters (d) 18 characters Which of the following command will only release all the memory variable? (a) CLEAR (b) CLEAR MEMVAIL (c) CLOSE ALL (d) CLEAR MEMORY Which function is used to remove trailing blanks from a character string? (a) UPPER () (b) TRIM() (c) VAL() (d) SUBSTR() XIX 8. 9. 10. 11. 12. 13. 14. What value RECOUNT() returns if no database is in use? (a) Null (b) 0 (c) Space (d) No value The command MODIFY COMMAND is used to ______________ (a) Modify the structure of a database file (b) Modify a Report format file (c) Add a new field to every record of a database file (d) All of the above Which of the following is not true of the traditional approach to information processing______________ (a) There is common sharing of data among the various application (b) It is file-oriented (c) Programs are dependent on the files (d) It is inflexible The data – base environment has all of the following components except __________ (a) Users (b) Separate files (c) Data base (d) Data-base administrator Which of the following hardware component is the most important to the operation of a database management system? (a) High-resolution video display (b) Printer (c) High-speed, large capacity disk (d) Plotter Which of the following is not the responsibility of the utilities component of DBMS software? (a) Creating the physical and logical design (b) Removing flagged records for deletion (c) Creating and maintaining the data dictionary (d) Monitoring performance Which of the following is a type of DBMS software? (a) Query language (b) Utilities (c) Report writer (d) All of the above (1) SX5 15. A data dictionary doesn’t provide information about______________ (a) Where data is located (b) The size of the disk storage device (c) Who own or is responsible for the data (d) How the data is used 16. Which of the following contains a complete record of all activities that affected the contents of a database during a certain period of time? (a) Report writer (b) Query language (c) Program manipulation language (d) Transaction log 17. Embedded pointer provide __________ (a) A secondary access path (b) A physical record key (c) An inverted index (d) All of the above 18. A scheme describes ______________ (a) Data elements (b) Record and files (c) Record relationships (d) All of the above 19. Batch processing is appropriate if __________ (a) Only a small computer system is available (b) Only a few transactions are involved (c) A large computer system is available (d) None of the above 20. With respect to data input , the most accurate description of batch control is ______________ (a) Dividing documents to be entered into batches (b) Controlling the input of each input clerk (c) Comparing to a pre calculated figure the total of a data item summed a cross a batch records put into the system (d) None of the above 21. Data security threats include ________ (a) Hardware failure (b) Privacy invasion (c) Fraudulent manipulation of data (d) All of the above XIX 22. Data encryption techniques are particularly useful for______________ (a) Reducing storage space requirements (b) Improving data integrity (c) Protecting data in data communication system (d) All of the above 23. Internal auditors should review data system design before they are _______ (a) Developed (b) Implemented (c) Modified (d) All of the above 24. The database administration function includes ______________ (a) Application programming (b) Computer operations management (c) Database access planning (d) All of the above 25. A database management system might consist of application programs and a software package called ________ (a) Fortran (b) Auto flow (c) BPL (d) Total 26. The function of a database is ________ (a) To check all input data (b) To check all spelling (c) To collect and organize input data (d) To output data 27. Large collection of files are called ________ (a) Fields (b) Records (c) Database (d) Sectors 28. The files stored on a secondary storage device are composed of a hierarchy of data. What does a record in a file contain ______________ (a) Bits (b) Characters (c) Data fields (d) Schema 29. The distinguishable parts of a record are called ______________ (a) Files (b) Data (c) Fields (d) Programs (2) SX5 30. A computer file contains several records. What does each record contain? (a) Bytes (b) Words (c) Fields (d) Programs 31. What name is given to the collection of facts, items of information or data which are related in some way? (a) Data base (b) Directory information (c) Information tree (d) Information provider 32. There are certain packages that allow people to define data items, place items in particular records, combine the records into designated files and then manipulate and retrieve the stored data. What are they called? (a) Data storage system (b) Database management system (c) Batch processing system (d) Data communication package 33. In any hierarchy of data organization, the smallest entity to be processed as a single unit is called (a) Data field (b) Data record (c) Data file (d) Database 34. What software packages are commonly used for business that have to track extensive lists of client and inventory? (a) Special purpose packages (b) Custom made programs (c) Single function application packages (d) Data management packages 35. A relational database management (RDBM) package manages data in more than one file at once. How does it organize these files? (a) Tables (b) Relations (c) Tuple (d) Both (a) and (b) 36. The main idea behind computer files is that is convenient to ______________ (a) Arrange them (b) Store information together (c) Create them (d) Access them XIX 37. A large computer information system maintains many difference computer files. Which amongst them is called a perpetual file? (a) Specialized file (b) Log file (c) Master file (d) History file 38. Amongst the computer files there is one which is mostly used for maintaining such status information as balances in bank account records, stock on hand balances in inventory records and year to date earning amounts in payroll records. Can you tell the name of the file? (a) Transaction file (b) Index file (c) Backup file (d) Master file 39. Which of the following is not a relational database? (a) dBASE IV (b) 4th Dimension (c) FoxPro (d) Reflex 40. Which of the following fields in a student file can be used as primary key? (a) Class (b) Social Security number (c) GPA (d) Major 41. The relational data-base environment has all of the following components except ______________ (a) Users (b) Separate files (c) Data base (d) Data-base administrator 42. The two basic types of record access methods are ______________ (a) Sequential and random (b) Direct and immediate (c) Sequential and indexed (d) On-line and real time 43. Transaction processing was made possible by the development of ______ (a) Direct access storage (b) Magnetic tape (c) Cash register input (d) Minicomputer (3) SX5 44. Report generator are used to ________ (a) Store data input by a user (b) Retrieve information from files (c) Answers queries (d) Both (a) and (c) 45. An indexing operation______________ (a) Sorts a file using a single key (b) Sorts a file using two keys (c) Establishes an index for a file (d) Both (a) and (b) 46. The special access features ______ enables directives related to directory indexing (a) Indexes (b) Limit (c) File info (d) Option 47. ________ directive maps a CGI script to a particular HTTP request method (a) Action (b) Script (c) CGI (d) MINE 48. The variant pages, which after variable output based on language are stored in _______ directory (a) /etc/var (b) /etc/var/ww (c) /var/www/error (d) None of these 49. _______ directive can specify an absolute path name or a path name relative to the server Root (a) Configure log (b) Error log (c) Document Root (d) None of the these 50. Modems can be configured to automatically answer any incoming call. Many user computers have modems installed from the manufacturer. What is the greatest security risk when dealing with modems in this situation? (a) Remote access without network administrator knowledge (b) Local access without network administrator knowledge (c) Client access without network administrator knowledge (d) Server access without network administrator knowledge XIX 51. Which of the following applies to PBX? (Select all that apply.) (a) PBX stands for Private Branch Exchange (b) PBX allows for analog, digital, and data to transfer over a high-speed phone system (c) Both (a) & (b) (d) PBX is used to carry analog messages and modem communication originating at the phone company 52. VPN tunnels have end points. Which of the following methods is used to offer Strong Authentication at each end point? (a) DES (b) Block cipher (c) Stream cipher (d) Diffie-Hellman 53. You want to prevent users from downloading software on company workstations. What is this called? (a) Desktop lookup (b) Desktop lockup (c) Desktop lockdown (d) Desktop lookdown 54. Which of the following characteristics of an intranet are true? (Select all that apply.) (a) An intranet can be a part of a Local Area Network (LAN) (b) An intranet can work with Wide Area Networks (WAN) (c) Both (a) and (b) (d) An intranet may be restricted to a community of users 55. Which one of the following is software used to logically connect workgroups, thereby improving network performance for group members in different physical locations? (a) Virtual Private Network (b) Virtual Local Area Network (c) Remote Authentication Dial-in User Service (d) Network Address Translation (4) SX5 56. Which of the following is relatively more secure than proxy, because it assigns private IP addresses to the clients on your LAN, acting as a firewall? (a) RADIUS (b) Internet Control Message Protocol (c) Network Address Translation (d) ICMP Router Discovery Protocol 57. Which of the following are true statements about Network Address Translation? (Select all that apply.) (a) Provides for private addressing ranges for internal network (b) Hides the true IP addresses of internal computer systems (c) Both (a) and (b) (d) Translates private IP addresses into registered Internet IP addresses 58. There are several tunneling protocols. Which of the following are types of VPN remote computing tunneling protocols? (Select all that apply.) (a) L2F (b) L2TP (c) PPTP (d) Both (a) and (c) 59. Which of the following terms relates to sending an ICMP request to each IP address on a subnet and waiting for replies? (a) Port scanning (b) Echo scanning (c) Ping scanning (d) Node scanning 60. Your company has a large internal network that you would like to subnet into smaller parts. Which of the following devices can you use to separate your LAN and still protect critical resources? (Select all that apply.) (a) An internal firewall (b) A router between subnets (c) A switch between departments (d) All of the above XIX 61. Remember, routers work at the Network Layer of the International Standards Organization/Open Systems Interconnection (ISO/OSI) established sequence of OSI Layers. What is the correct and complete OSI sequence in order from user interface (Layer 7) to the delivery of binary bits (Layer 1)? (a) Physical Layer, Network Layer, Data Link Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer (b) Application Layer, Physical Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Presentation Layer (c) Physical Layer, Data Link Layer, Network Layer, Session Layer, Transport Layer, Presentation Layer, Application Layer (d) None of the above 62. Most networks employ devices for routing services. Routers work at which of the following OSI layers? (a) Transport (b) Network (c) Presentation (d) Session 63. Which of the following are true statements about modems? (Select all that apply.) (a) Modems use the telephone lines (b) Modem stands for modulator and demodulator (c) Modems are no longer used in secure networks (d) A modem's fastest transfer rate is 56 Kbps 64. For the sites that have a centralized mail server ________ clients are also considered MDAs (a) POP (b) MUA (c) MTA (d) All of the above 65. The mail server that caves along with the Red Hat Linux is (a) Exim (b) Send mail (c) Postfix (d) None of the above (5) SX5 66. The _______ file lets you forward email for a particular domain to a selected server (a) vivtoser table (b) Mailer table (c) Access (d) None of the above 67. The timeout event ________ gives the acknowledgement of the Mail command (a) Smail (b) Mail (c) Connect (d) Received XIX 68. The user can manage the messages while the message stay on the server, using ______ server (a) POP (b) IMAP (c) RPM (d) All of the above 69. _________ send mail program displays message quantity & byte count statistic (a) Mailq (b) Mailstart (c) Mail (d) None of the above 70. _________ send mail program print act all aliases defined in /etc/aliases (a) Paliases (b) Pralisases (c) Print (d) Aliases (6)