Go To Top Reset
<<= Back
Next =>>
You Are On Multi Choice Question Bank SET 2476
123801. In java, communication between objects is done by:
(A): calling a method (B): creating a class hierarchy (C): defining a Java class (D): creating a class (E): running a program
123802. What is the purpose of Address Resolution Protocol (ARP
(A): To resolve known IP addresses to unknown physical addresses (B): To resolve domain names to unknown IP addresses. (C): To resolve MAC addresses and NetBIOS names to IP addresses (D): To resolve known MAC addresses to unknown IP addresses (E): To resolve NetBIOS names to IP addresses
123803. Which phase of the SDLC involves converting to the new system
(A): Systems design (B): Systems implementation (C): Systems analysis (D): Systems development (E): Other than those mentioned as options
123804. A coding scheme recognized by system software for representing organizational data best defines a .
(A): Data type (B): Data size (C): Tuple (D): Hyperlink (E): Hashing algorithms
123805. Which device operates at the internet layer of the TCP/IP model
(A): Switch and Hub (B): Router (C): Switch (D): PBX (E): Firewall
123806. Which common backstage view task creates a PDF file from an existing file
(A): Export (B): Account (C): Create (D): Options (E): Info
123807. What is a brownout in an electrical supply system
(A): A slightly elevated voltage lasting from seconds to minute. (B): Alternating power out, power on lasting a few minutes. (C): Has nothing to do with electricity. (D): Complete power out lasting a few minutes. (E): A slightly decreased voltage lasting from seconds to minutes or more.
123808. An object-oriented database does not depend upon. For interactions.
(A): Data dictionary (B): Oracle (C): SQL (D): Index (E): DBMS
123809. What does iosate mean as an argument in ofstream in C++
(A): Open file for read access only (B): Open file, create (C): Open file, but do not creat (D): Open file, set the position to the end (E): Open file, for write access only
123810. Which protocol is used for transferring data and information from one network to the other network
(A): Internet Protocol (B): Transmission Control Protocol (C): File Transfer Protocol (D): Hyper-Text Transfer Protocol (E): Ethernet Protocol
123811. A hierarchical data model combines records and fields that are:
(A): Cross structure and Relational structure (B): Tree structure (C): Logical manner (D): Cross structure (E): Relational structure
123812. Which security model is used in a peer-to-peer network
(A): Password-protected Shares (B): Access Control Lists (ACLs) (C): Share-level Security (D): User-level Security (E): Access Control Entries (ACEs)
123813. ..produces printout of a data in user-defined manner.
(A): Query Language (B): DML (C): Report Generator (D): DCL (E): Metadata
123814. The Web Layout View is available in which Office 2013 application
(A): Excel (B): Word (C): Access (D): PowerPoint (E): Webmaker
123815. What are code generators
(A): CASE tools that enable the automatic generation of program and database definition code directly from the design documents diagrams, forms (B): CASE tools that support the circulation of graphical representations of various system elements such as process flow. data relationships, and program structures. (C): CASE tools that enables the easy production of user documentation in standard formats. (D): CASE tools that enable the easy production of technical documentation in standard formats. (E): CASE tools that support the production of systems forms and reports in order to prototype systems will ‘look and feel’ to users.
123816. A ROLLBACK command in a transaction..
(A): undoes the effects of the last UPDATE command (B): restores the content of the database to its state at the end of the previous day (C): does nothing (D): makes sure that all changes to the database are in effect (E): undoes all changes to the database resulting from the execution of the transaction
123817. When you visit certain Websites spyware may be automatically downloaded. This is called a.
(A): drive-by download (B): logic bomb (C): spybot (D): drive-in download (E): virus
123818. An internet diary of grouping of ongoing commentaries is known as a(n)
(A): blog (B): electronic email (C): mailbox (D): cookie (E): plug-in
123819. Metadata does not enable database designers users to :
(A): Understand what the data mean (B): know what the fine distinctions are between similar data items (C): understand what data exist (D): sample data (E): know more about the data
123820. A table in a relational database terminology is synonymous with :
(A): a value (B): a row (C): an attribute (D): a column (E): a relation
123821. What markup language includes all of the features of HTML and programming extensions ?
(A): Applets (B): HTTP (C): SML (D): XML (E): FTP
123822. Astore(s) data in two-dimensional tables.
(A): Hierarchical Database (B): Table Database (C): Relational Database (D): Network and Hierarchical (E): Network Database
123823. Ais a computer connected to two networks.
(A): bridgeway (B): server (C): link (D): gateway (E): modem
123824. Downloadable software extensions that add new features to a browser are known as :
(A): plug-in (B): cookies (C): framers (D): link (E): spam
123825. Web servers should be configured so that :
(A): unauthorized access is always possible (B): unauthorized access is restricted (C): any form of access is impossible (D): unauthorized access is sometimes possible (E): unauthorized access is unrestricted
<<= Back
Next =>>
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
Powered By:Omega Web Solutions © 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions