Description : The most open source DBMS. A) Microsoft SQL Server B) Microsoft Access C) MySQL D) Oracle
Last Answer : MySQL
Description : The most popular commercial DBMS. A) Microsoft SQL Server B) Microsoft Access C) MySQL D) Oracle
Last Answer : Oracle
Description : IMB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operating system from Microsoft, the printer from Epson and the application software from ... the country which contributed the video display? a. India b. China c. Germany d. Taiwan
Last Answer : Taiwan
Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned
Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content
Description : What kind of program is FoxPro ?
Last Answer : FoxPro database type program.
Description : Which one of the following applications software’s is used to obtain an accurate root locus for? a) LISP b) MATLAB c) dBase d) Oracle Ans: B 6.Lenz devised a rule to find out direction of a)current induced in a circuit b)electromagneticdifference c)potential difference d)flow of power in fuse
Last Answer : Ans: A
Description : 'Foxpro' is 1) a medicine 2) a disease 3) a computer language 4) an animal
Last Answer : 3) a computer language
Description : Which of the following packages is used for composition in printing press? 1) Lotus 2) dBase 3) Page Maker 4) Word Perfect
Last Answer : 3) Page Maker
Description : An enterprise needs highly controlled storage and access to their databases as well as managing the infrastructure for web front ends and other applications. They have a large existing IT infrastructure and they ... to reduce cost? A. public cloud B. hybrid cloud C. private cloud D. internal cloud
Last Answer : hybrid cloud
Description : Which of the following statements concerning Object-Oriented databases is FALSE? (A) Objects in an object-oriented database contain not only data but also methods for processing the data. (B ... Object-oriented databases store more types of data than relational databases and access that data faster.
Last Answer : (C) Object-oriented databases are more adapt at handling structures (analytical) data than relational databases.
Description : A sport/event organization that wants to obtain information about the population in a certain geographic location might use A. Government sources B. Primary Databases C. Personal Questionaires D. telephone surveys
Last Answer : B. Primary Databases
Description : Bluetooth is an example of __________ a) personal area network b) local area network c) virtual private network d) wide area network
Last Answer : a) personal area network
Description : RAD Model was purposed by ? IBM Motorola Microsoft Lucent Technologies
Last Answer : IBM
Description : Which American computer company is called Big Blue ? IBM Compaq Corp Microsoft Tandy Svenson
Description : Which country created the most used networking software in 1980's ? Sun IBM Novell Microsoft Collection From: www.cs-mcqs.blogspot.com
Last Answer : Microsoft
Description : Which of the following companies developed MS Office 2000? A. Microsoft B. Corel C. Novell D. Lotus
Last Answer : Microsof
Description : What is MAC ? A computer made by Apple Memory address corruption Mediocre Apple Computer Media Access Control
Last Answer : Media Access Control
Description : Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port C. Console D. LLC E. Telnet F.
Last Answer : Aux Port
Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access
Last Answer : Serial access
Description : The disk drive component used to position read/write heads over a specific track I known as a. Acoustic couples b. Access arm c. Cluster d. All of the above
Last Answer : Access arm
Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register
Last Answer : Address register
Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction
Last Answer : Memory protection
Description : Which of the following memories has the shortest access times? a. Cache memory b. Magnetic bubble memory c. Magnetic core memory d. RAM
Last Answer : Cache memory
Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method
Last Answer : Random access memory
Description : Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify? a. Track number b. Sector number c. Surface number d. All of above
Last Answer : Track number
Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above
Last Answer : It provides only sequential access to stored data
Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time
Last Answer : Sequential and random
Description : Offline device is a. A device which is not connected to CPU b. A device which is connected to CPU c. A direct access storage device d. An I/O device
Last Answer : A device which is not connected to CPU
Description : Access time is a. seek time + latency time b. seek time c. seek time – latency time d. latency time
Last Answer : seek time + latency time
Description : Magnetic disks are the most popular medium for a. Direct access b. Sequential access c. Both of above d. None of above
Last Answer : Both of above
Description : Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium
Last Answer : all of above including access to transmission medium
Description : The x.25 standard specifies a a. technique for start-stop data b. technique for dial access c. DTE/DCE interface d. data bit rate e. none of above
Last Answer : DTE/DCE interface
Description : The access method in Bluetooth is________. A) FDMA B) TDD-TDMA C) CDMA D) none of the above
Last Answer : TDD-TDMA
Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above
Last Answer : polling
Description : In IEEE 802.11, the access method used in the DCF sublayer is _________. A) ALOHA B) CSMA/CA C) CSMA/CD D) none of the above
Last Answer : CSMA/CA
Description : In IEEE 802.11, a___ is made of stationary or mobile wireless stations and anoptional central base station, known as the access point (AP). A) ESS B) BSS C) CSS D) none of the above
Last Answer : BSS
Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above
Last Answer : Channelization
Description : We discussed ______ popular controlled-access methods. A) two B) three C) four D) none of the above
Last Answer : three
Description : In _______ methods,a stationcannot send unless it hasbeen authorized byother stations. A) random access B) controlledaccess C) channelization D) none of the above
Last Answer : controlledaccess
Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above
Description : In ___________ methods, no station is superior to another station and none is assigned the controlover another. A) random access B) controlledaccess C) channelization D) none of the above
Last Answer : random access
Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)
Last Answer : both (a) and (b)
Description : The _____sublayer is responsible for the operation of the CSMA/CD access method and framing. A) LLC B) MII C) MAC D) none of the above
Last Answer : MAC
Description : The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation 10-Mbps Ethernet. A) 1-persistent B) p-persistent C) non-persistent D) none of the above
Last Answer : 1-persistent
Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove
Last Answer : All of theabove
Description : Goals for the design of thelogical schema include A. avoiding data inconsistency B. being ableto construct queries easily C. being ableto access data efficiently D. All of theabove E. None of the above
Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : To access properties of an object, the mouse technique to use is– (A) dragging (B) dropping (C) right-clicking (D) shift-clicking (E) None of these
Last Answer : right-clicking
Description : A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a– (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer
Last Answer : hacker