COMPETITIVE EXAM
COMPUTER COMPETITIVE QUESTIONS
(SSC, HSSC, BANKING, RAILWAY ETC....)
Q.1. Does Database utility exists in —————— menu?
(1) Format
(2) tools
(3) File
(4) Edit
(5) None of these
Q.2. In which object SQL is used?
(1) Query
(2) Form
(3) Report
(4) Macro
(5) None of these
Q.3. What is the function of Relationship?
(1) Relate multiple table
(2) Relate multiple form
(3) Relate table and form
(4) Relate queries and forms
(5) None of these
Q.4. What is there in record?
(1) Collection of fields
(2) collection of Number
(3) Collection of rows
(4) All of above
(5) None of these
Q.5. Which operation is not permitted by query?
(1) delete
(2) entry
(3) Modify
(4) create table
(5) None of these
Q.6. Which is not related to database?
(1) Table
(2) Query
(3) Form
(4) Macro
(5) None of these
Q.7. The language used by application programs to request data from the DBMS is referred to the-
(1) DML
(2) DDL
(3) query language
(4) All of the above
(5) None of these
Q.8. COMMIT and ROLLBACK in DBMS are the example of -
(1) DDL
(2) DML
(3) TQL
(4) DQL
(5) None of these
Q.9. In Data base, properties of any entity arerepresented by its -
(1) Setting
(2) Tuples
(3) Attributes
(4) Degree
(5) None of these
Q.10. Type of a file is identified by -
(1) File
(2) Attribute
(3) Extension
(4) Properties
(5) None of these
Q.11. Which of the following is a type of DBMS Software?
(1) Data
(2) My SQL
(3) MS-office
(4) utility
(5) None of these
Q.12. Which of the following is NOT a type of Microsoft Access database object?
(1) Queries
(2) Workbooks
(3) Forms
(4) Tables
(5) None of these
Q.13. The complete picture of data stored in database is known as
(1) System flowchart
(2) Schema
(3) record
(4) DBMS
(5) None of these
Q.14. A subset of characters within a data field is known as
(1) Record
(2) File
(3) Data string
(4) Byte
(5) None of these
Q.15. Data items grouped together for storage purposes are called-
(1) Record
(2) Title
(3) List
(4) string
(5) None of these
Q.16. Which of the following terms does not describe a database structure used by a DBMS to link data from several files?
(1) Relational
(2) Structural
(3) Network
(4) All of the above
(5) None of these
Q.17. The feature that database allows to access only certain records in database is:
(1) Forms
(2) Reports
(3) Queries
(4) Tables
(5) None of these
Q.18. Set of permitted values of each attribute is called __.
(1) Domain
(2) Relation
(3) Tuple
(4) Schema
(5) None of these
Q.19. The primary key must be __.
(1) Unique
(2) Not null
(3) Both 1 and 2
(4) Either 1 or 2
(5) None of these
Q.20. Logical design of the database is called__.
(1) Database Snapshot
(2) Database Instance
(3) Database Schema
(4) All of the above
(5) None of these
Q.21. Snapshot of the data in the database at a given instant of time is called ___.
(1) Database Schema
(2) Database Instance
(3) Database Snapshot
(4) All of the above
(5) None of these
Q.22. Which of the following is not Unary operation?
(1) Select
(2) Project
(3) Rename
(4) Union
(5) None of these
Q.23. Which of the following is not binary operation?
(1) Union
(2) Project
(3) Set Difference
(4) Cartesian Product
(5) None of these
Q.24. The raw facts and figures are:
(1) Program
(2) Information
(3) Snapshot
(4) Reports
(5) None of these
Q.25. A command to remove a relation from an SQL database is __.
(1) Delete table <table name>
(2) Drop table <table name>
(3) Erase table <table name>
(4) Alter table <table name>
(5) None of these
Q.26. Entities having primary key are Called?
(1) Primary Entities
(2) Strong Entities
(3) Weak Entities
(4) Primary Key
(5) None of these
Q.27. In the E-R diagrams, the term cardinality is a synonym for the term?
(1) Attribute
(2) Degree
(3) Entities
(4) Cartesian
(5) None of these
Q.28. TRUNCATE statement in SQL is a __.
(1) DML statement
(2) DDL statement
(3) DCL statement
(4) TCL statement
(5) None of above
Q.29. The default date format in SQL is?
(1) DD-MON-YY
(2) DD-MM-YY
(3) DD-MM-YYY
(4) DD-MM-YYYY
(5) None of these
Q.30. For adding number of hours to a date, which of the following statement is used
(1) Date + Number
(2) Date + Number/24
(3) Date + Number of Hours
(4) Date +Hour/30
(5) None of above
Q.31. A data dictionary is a special file that contains
(1) the data types of all fields in all files
(2) the names of all fields in all files
(3) the widths of all fields in all files
(4) All of above
(5) None of above
Q.32. A command that lets you change one or more fields of a record is?
(1) Insert
(2) Modify
(3) Look-up
(4) All of above
(5) None of above
Q.33. In a large DBMS?
(1) Each user can see only a small part of
the entire database
(2) Each user can access every sub schema
(3) Each sub schema contains every field in the logical schema
(4) All of above
(5) None of above
Q.34. It is better to use files than a DBMS when there are ___ .
(1) Stringent real-time requirements
(2) Multiple users who wish to access the data
(3) Complex relationships among data
(4) All of the above
(5) None of these
Q.35. The conceptual model is ___
(1) dependent on hardware
(2) dependent on software
(3) dependent on both hardware and software
(4) independent of both hardware and software
(5) None of these
Q.36. What is a relationship called when it is maintained between two entities?
(1) Unary
(2) Binary
(3) Ternary
(4) Quaternary
(5) 1 and 2
Q.37. Which of the following operation is used if we are interested in only certain columns of a table?
(1) PROJECTION
(2) SELECTION
(3) UNION
(4) JOIN
(5) Intersect
Q.38. Which of the following is a valid SQL type?
(1) CHARACTER
(2) NUMERIC
(3) FLOAT
(4) DATE
(5) All of the above
Q.39. The RDBMS terminology for a row is ___?
(1) Tuple
(2) Relation
(3) Attribute
(4) Degree
(5) Field
Q.40. Which of the following operations need the participating relations to be union compatible?
(1) UNION
(2) INTERSECTION0
(3) DIFFERENC
(4) All of the above
(5) None of these
Q.41. The full form of DDL is ___?
(1) Dynamic Data Language
(2) Detailed Data Language
(3) Data Definition Language
(4) Data Derivation Language
(5) Data Dimensional Language
Q.42. Which of the following is an advantage of a View?
(1) Data security
(2) Derived columns
(3) Hiding of complex queries
(4) All of the above
(5) None of these
Q.43. Which database level is closest to the users?
(1) External
(2) Internal
(3) Physical
(4) Conceptual
(5) None of these
Q.44. Which are the two ways in which entities can participate in a relationship?
(1) Passive and active
(2) Total and partial
(3) Simple and Complex
(4) All of the above
(5) None of these
Q.45. The result of the UNION operation between R1 and R2 is a relation that
includes ___.
(1) All the tuples of R1
(2) All the tuples of R2
(3) All the tuples of R1 and R2
(4) All the tuples of R1 and R2 which have common columns
(5) None of these
Q.46. Which of the following option appropriate is a comparison operator in SQL?
(1) =
(2) LIKE
(3) BETWEEN
(4) All of the above
(5) None of these
Q.47. ____ is a process when relation between two entity is treated as a single entity.
(1) Normalization
(2) Aggregation
(3) Generalization
(4) Specialization
(5) Simplification
Q.48. In an ER Diagram, ellipse with underlying lines is used to represent ___?
(1) attribute
(2) Key attribute
(3) Composite attribute
(4) Multivalued attribute
(5) Entity
Q.49. ___ constraint is used to restrict actions that would destroy links between tables ?
(1) Primary key
(2) Foreign Key
(3) Check
(4) Not Null
(5) Unique
Q.50. In a table of data base, degree refers
(1) total Numbers of row
(2) row in a table
(3) column in a table
(4) total number of Column in a table
(5) none of these
Q.51. In OSI network architecture, the routing is performed by
(1) Network layer
(2) Data link layer
(3) Transport layer
(4) Session layer
(5) None of these
Q.52. Which of the following performs modulation and demodulation?
(1) Fiber optics
(2) Satellite
(3) Coaxial Cable
(4) Encoder/Decoder
(5) None of these
Q.53. Which is the first layer of OSI model-
(1) Physical layer
(2) Link layer
(3) Transport layer
(4) Network layer
(5) None of these
Q.54. Which of the following is not a transmission medium?
(1) Telephones lines
(3) Fiber optic cable
(4) Coaxial cable
(5) All
Q.83. What is the purpose of a firewall on a computer?
(1) To protect a computer from unauthorized access
(2) To protect a computer in case of fire
(3) To protect a computer from spam
(4) All of the above
(5) None of these
Q.84. Which of the following layer is not in OSI model?
(1) Physical layer
(2) Internet layer
(3) Network layer
(4) Transport layer
(5) Application layer
Q.85. Copper wire is an example of?
(1) Guided Transmission Media
(2) Shield Media
(3) Group Media
(4) Unguided Transmission Media
(5) None of these
Q.86. An unauthorized user is a network ___ issue.
(1) Performance
(2) Reliability
(3) Security
(4) Firewall
(5) None of these
Q.87. Which topology requires a central controller or hub?
(1) Mesh
(2) Star
(3) Bus
(4) Ring
(5) Tree
Q.88. Which topology requires a multipoint connection?
(1) Mesh
(2) Star
(3) Bus
(4) Ring
(5) Tree
Q.89. Which of the following refers to a small, single-site network?
(1) LAN
(2) DSL
(3) RAM
(4) USB
(5) CPU
Q.90. Computers connected to a LAN (Local Area Network) can—
(1) Run faster
(2) Go on line
(3) Share information and/or share peripheral equipment
(4) E-mail
(5) None of these
Q.91. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is—
(1) Modem
(2) Gateway
(3) Router
(4) Bridge
(5) All of these
Q.92. A group of computers and other devices connected together is called____.
(1) Network
(2) Intranet
(3) Internetworking
(4) Both 2 and 3
(5) Extranet
Q.93. Transmission Lines are also called as____.
(1) Circuits
(2) Channels
(3) Trunks
(4) Circuits channels, or trunks
(5) Wire
Q.94. The Switching Elements are also called as ___.
(1) Host
(2) Terminal
(3) Interface Message Processors (IMPs)
(4) Both 1 and 2
(5) Subnet
Q.95. The distance a simple signal can travel in one period is called ____.
(1) Wavelength
(2) Frequency
(3) Propagation speed
(4) Both 1 and 2
(5) None of these
Q.96. How many collision domains are created when you segment a network with a 12-port switch?
(1) 1
(2) 12
(3) 5
(4) 2
(5) 10 12
Q.97. Which protocol does Ping use?
(1) TCP
(2) ARP
(3) ICMP
(4) Boot P
(5) UDP
Q.98. What is a stub network?
(1) A network that has only one entry and exit point.
(2) A network with only one entry and no exit point.
(3) A network with more than one exit point.
(4) A network with more than one exit and entry point.
(5) A network with more than one entry point.
Q.99. Which of the following services use TCP?
(1) DHCP
(2) SMTP
(3) FTP
(4) HTTP
(5) 2, 3 and 4
Q.100. Which of the following terms is used to describe a hardware- or software-based device that protects networks from outside threats?
(1) NIC
(2) Gateway
(3) Firewall
(4) Hub
(5) Server
Q.101. Which class of IP address provides a maximum of only 254 host addresses per network ID?
(1) Class E
(2) Class B
(3) Class C
(4) Class D
(5) Class A
Q.102. Which of the following devices translates
hostnames into IP addresses?
(1) DNS Server
(2) Hub
(3) DHCP Server
(4) Firewall
(5) MAC
Q.103. Which of the following devices takes data sent from one network device and forwards it to all devices on the network regardless of the intended recipient?
(1) Switch
(2) DNS Server
(3) Hub
(4) Gateway
(5) All
Q.104. Which of the following devices takes data sent from one network device and forwardsit to the destination node based on MAC address?
(1) Hub
(2) Switch
(3) Gateway
(4) Modem
(5) All
Q.105. Which of the following devices is used to connect same network segments andmanage the traffic between them?
(1) Switch
(2) Hub
(3) Modem
(4) Repeater
(5) Bridge
Q.106. Which of the following network devices/systems translates data from one format to another?
(1) DHCP Server
(2) Hub
(3) Gateway
(4) NIC
(5) Switch
Q.107. Switch is a device of ___ Layer of OSI Model.
(1) Network Layer
(2) Data Link Layer
(3) Application Layer
(4) Session Layer
(5) None of these
Q.108. HUB is a ___ Device and Switch is a ____ Device.
(1) Unicast, Multicast
(2) Multicast, Unicast
(3) Broadcast, Unicast
(4) Unicast, Unicast
(5) Multicast, Multicast
Q.109. Star Topology is based on a Central Device that can be ____.
(1) HUB
(2) Switch
(3) Router
(4) Both 1 and 2
(5) Gateway
Q.110. Which of the following devices modulates digital signals into analog signals that can besent over traditional telephone lines?
(1) Router
(2) Gateway
(3) Switch
(4) Modem
(5) NIC
Q.111. Computer systems that transmit data over communications lines, such as telephonelines or cables are called____.
(1) home-based systems
(2) centralized data systems
(3) data networks
(4) data communications systems
(5) Wi-Fi system
Q.112. ____ method places all processing, hardware, and software in one central location.
(1) Wide area data processing
(2) Network data processing
(3) Centralized data processing
(4) Distributed data processing
(5) None of these
Q.113. ___ processing method allows both remote access and remote processing.
(1) Analog transmission
(2) Centralized data processing
(3) Distributed data processing
(4) Digital transmission
(5) Hierarchy processing
Q.114. A computer system that uses communications equipment to connect twoor more computers and their resources is a ____.
(1) network
(2) hub
(3) bridge
(4) router
(5) firewall
Q.115. The protocol that makes Internet universality possible is ___.
(1) FEP
(2) WAN
(3) POTS
(4) TCP/IP
(5) MAN
Q.116. A network of personal computers that share hardware, software, and data is called a ____.
(1) local area network (LAN)
(2) metropolitan area network (MAN)
(3) wide area network (WAN)
(4) plain old telephone service (POTS)
(5) None of these
Q.117. A network of geographically distant computers and terminals is called a:
(1) Integrated Services Digital Network
(ISDN)
(2) local area network (LAN)
(3) metropolitan area network (MAN)
(4) wide area network (WAN)
(5) All of the above
Q.118. In this network arrangement, all computers have equal status.
(1) Client/server
(2) Client-to-client
(3) Peer-to-peer
(4) Token ring
(5) Server/ Terminal
Q.119. The most common communications devices all use ____ transmission, a continuous electrical signal in the form of a wave.
(1) analog
(2) digital
(3) automatic
(4) all
(5) None of these
Q.120. A (n) ____ adapter can move data at 128,000 bps, more than double a standard modem
(1) Fax
(2) Dial-Up
(3) Telephone modem
(4) ISDN
(5) None of these
ANSWERS
Q.1.(2) Tools
Q.2.(1) Query
Q.3.(1) Relate Multiple Table
Q.4.(1) Collection of fields
Q.5.(2) Entry
Q.6.(3) Form
Q.7.(1) DML
Q.8.(3) TQL (Transaction Query Language)
Q.9.(3) Attributes
Q.10.(3) Extension
Q.11.(2) My SQL
Q.12.(2) Workbooks
Q.13.(2) Schema
Q.14.(3) Data string
Q.15.(1) Record
Q.16.(2) Structural
Q.17.(3) Queries
Q.18.(1) Domain
Q.19.(3) Primary key must satisfy unique and not null condition for sure.
Q.20.(3) Logical design of database is called Database Schema.
Q.21.(2) Snapshot of the data in the database at a given instant of time is called Database Instance.
Q.22.(4) Union is not Unary operation.
Q.23.(5) Project is not binary operation.
Q.24.(5) None of these
Q.25.(2) Drop table <table name>
Q.26.(2) Strong Entities
Q.27.(4) Cartesian
Q.28.(2) TRUNCATE statement in SQL removes all records from table, including all spaces allocated for the records are removed.
Q.29.(4) The default date format in SQL is DDMM-YYYY.
Q.30.(2) Date + Number/24
Q.31.(4) the data types of all fields in all files,
the names of all fields in all files and
the widths of all fields in all files
Q.32.(2) Modify
Q.33.(1) Each user can see only a small part of the entire database.
Q.34.(2) Multiple users who wish to access the data
Q.35.(4) Independent of both hardware and Sofware.
Q.36.(2) Binary
Q.37.(1) PROJECTION operation is used if we are interested in only certain columns of a table.
Q.38.(5) All are valid SQL data type.
Q.39.(1) The RDBMS terminology for a row is Tuple.
Q.40.(4) Union, Intersection and difference
Q.41.(3) DDL stands for Data Definition Language.
Q.42.(4) All are advantages of view.
Q.43.(1) External database level is closest to the users.
Q.44.(2) Total and partial.
Q.45.(4) All the tuples of R1 and R2 which have common columns.
Q.46.(4) =, Like and Between are comparison operators in SQL.
Q.47.(2) Aggregation is a process when relation between two entities is treated as a single entity.
Q.48.(2) In an ER Diagram, ellipse with underlying lines is used to represent Key attribute.
Q.49.(2) Foreign Key constraint is used to restrict actions that would destroy links between tables.
Q.50.(4) Total number of columns in a table.
Q.51.(1) Network layer
Q.52.(5) None of these
Q.53.(1) Physical layer
Q.54.(3) Modem
Q.55.(2) 2
Q.56.(1) Attenuation
Q.57.(2) Wireless
Q.58.(5) Supercomputer
Q.59.(1) Internet is example of
connectivity.
Q.60.(4) Mesh
Q.61.(3) Netware is an operating system, which is developed by Novell.
Q.62.(3) WAN
Q.63.(5) None of these to connect a computer over telephone line, modem is required.
Q.64.(1) No navigate shared computer and folder in Network
Q.65.(2) Keyboard
Q.66.(1) Computer in network is work group.
Q.67.(3) For an Ip Address to be valid, there should be four numbers separated by dots, and every number must lie between 0 to 255
Q.68.(4) Intranet
Q.69.(3) Application layers
Q.70.(5) All are broad band communication channel.
Q.71.(4) Cable
Q.72.(2) half-duplex
Q.73.(2) Senior Manage or Chief information security officer (CISO) of IT assurance manager who is in charge of information security.
Q.74.(2) Network administrator
Q.75.(1) Discrete value
Q.77.(4) Bandwidth is the amount of data that can be transmitted along a channel during a specified period of time.
Q.78.(3) Dial-up
Q.79.(2) Spam
Q.80.(3) A WAN uses long - distance transmission media to link computers separated by distance.
Q.81.(3) Data Bus is NOT considered a network communications device.
Q.82.(3) 202.50.20.148
Q.83.(2) Twisted-pair wire of transmission media is known as regular telephone wire.
Q.84.(1) To protect a computer from unauthorized access
Q.85.(2) Internet layer
Q.86.(1) Guided Transmission Media
Q.87.(3) Security
Q.88.(2) Star
Q.89.(3) Bus topology requires a multipoint connection.
Q.90.(1) Local Area Network refer to a small, single-site network.
Q.91.(3) Computers connected to a LAN (Local Area Network) can share information and/ or share peripheral equipment.
Q.92.(2) Gateway
Q.93.(1) A group of computers and other devices connected together is called Network.
Q.94.(4) Transmission Lines are also called as circuits channels, or trunks
Q.95.(3) The Switching Elements are also called as IMPs.
Q.96.(1) The distance a simple signal can traveling one period is called wavelength.
Q.97.(3) ICMP
Q.98.(1) A network that has only one entry and exit point.
Q.99.(5) SMTP, HTTP and FTP use TCP.
Q.100.(3) Firewall
Q.101.(3) Class C
Q.102.(1) DNS Server
Q.103.(3) Hub
Q.104.(2) Switch
Q.105.(5) Bridge is used to connect same network segments and manage the traffic between them.
Q.106.(3) Gateway network devices/systems translate data from one format to another.
Q.107.(2) Switches operate on the second layer of OSI Model, that is Data Link Layer.
Q.108.(3) Hub is a Broadcasting Device and Switch is a Unicasting Device.
Q.109.(4) Hub and Switch are used in Star topology.
Q.110.(4) Modem
Q.111.(4) data communications systems
Q.112.(3) Centralized data processing
Q.113.(3) Distributed data processing
Q.114.(1) network A computer Network system that uses communications equipment to connect two or more computers and their resources.
Q.115.(4) The TCP/IP protocol that makes Internet universality possible.
Q.116.(1) local area network (LAN) A network of personal computers that share hardware, software, and data is called a local area network (LAN).
Q.117.(4) wide area network (WAN) A network of geographically distant computers and terminals is called a wide area network (WAN).
Q.118.(1) Client/server In Peer-to-peer network arrangement, all computers have equal status.
Q.119.(1) analog Analog Transmission
Q.120.(4) ISDN
Thanks for sharing
ReplyDeleteNice and informative content
ReplyDeleteSsc ky bhi share krdo plzz
ReplyDelete