[1] An error in software or hardware is called a bug. What is the alternative computer jargon for it?
A.
Leech
B.
Squid
C.
Slug
D.
Glitch
Ans:
Glitch
Explanation :
Glitch and Bug are essentially synonymous. Glitches/bugs are software errors that can cause drastic problems within the code, and typically go unnoticed or unsolved.
[2] Personal computers use many chips mounted on the main circuit board. What is the common name for such board containing the principal components?
A.
Daughter board
B.
Motherboard
C.
Father board
D.
Breadboard
Ans:
Motherboard
Explanation :
A motherboard is the main printed circuit board (PCB) found in general-purpose microcomputers and other expandable systems.
[3] Which among the following is an OOP principle?
A.
Structured programming
B.
Procedural programming
C.
Inheritance
D.
Linking
Ans:
Inheritance
Explanation :
In object-oriented programming, inheritance enables new objects to take on the properties of existing objects.
[4] Which of the following is true about Assembly language?
A.
It is a Machine Language
B.
It is a High-level programming language
C.
It is a low-level programming language
D.
It is a language for assembling computers
Ans:
It is a low-level programming language
Explanation :
An assembly (or assembler) language, is a low-level programming language for a computer, or other programmable device.
[5] Which of the following HTML elements is the starting element in all HTML document?
A.
Root
B.
Metadata
C.
Section
D.
Heading
Ans:
Root
Explanation :
The Root element is the starting element in an HTML document, and it is present in all HTML documents.
[6] Who invented the QWERTY keyboard?
A.
Carl Sholes
B.
Karl Sholes
C.
Christopher Latham Sholes
D.
Khristopher Sholes
Ans:
Christopher Latham Sholes
Explanation :
The arrangement of characters on a QWERTY keyboard was designed in 1868 by Christopher Sholes, the inventor of the typewriter. According to popular myth, Sholes arranged the keys in their odd fashion to prevent jamming on mechanical typewriters by separating commonly used letter combinations.
[7] What is Windows Vista?
A.
Processor
B.
Operating System
C.
Input device
D.
Memory
Ans:
Operating System
Explanation :
Windows Vista is an operating system that was produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.
[8] Constraints are applied on:
A.
rows
B.
columns
C.
entire table
D.
entire database
Ans:
columns
Explanation :
Constraints are the special rules applied on the columns to discard users from entering invalid data in the table columns.
[9] In a database, a column in the table is also called _.
A.
degree
B.
tuple
C.
entity
D.
attribute
Ans:
attribute
Explanation :
Each row in a database table represents one instance of the type of object described in that table. A row is also called a record. The columns in a table are the set of facts that we keep track of about that type of object. A column is also called an attribute.
[10] Which of the following is not a type of SQL statement?
A.
Data Manipulation Language
B.
Data Definition Language
C.
Data Standard Language
D.
Data Control Language
Ans:
Data Standard Language
Explanation :
Common categories of SQL statements include DML, DCL, DDL, TCL, etc. DDL statements are used to define a database structure, DML statements are used for the management of data within database objects and DCL statements are used for setting privileges to access data.
[11] Which of the following is not a type of DVD?
A.
DVD-ROM
B.
DVD-R
C.
DVD-RW
D.
DVD-O
Ans:
DVD-O
Explanation :
DVD-ROM, DVD-R and DVD-RW are all types of DVD. There are 3 common types of DVDs: DVD-5, DVD-9, and DVD-10. A DVD-5 is a single layer DVD that holds up to 4.7GB of data (around 120-133 minutes of video depending on compression). DVD-9 is a dual layer single sided DVD that holds up to 8.5GB of data (around 240 minutes of video depending on compression).
[12] Which among the following devices has highest storage capacity?
A.
SSD
B.
CD
C.
DVD
D.
PD
Ans:
SSD
Explanation :
Solid State Drive (SSD) has the highest storage capacity. It can store up to 4 TB of data.
[13] An image that is displayed on the monitor includes thousands of small coloured dots known as .
A.
Bytes
B.
Bits
C.
Pixels
D.
Nibble
Ans:
Pixels
Explanation :
An image that is displayed on that monitor comprises thousands of small coloured dots known as pixels.
[14] Which of the following statements is true for a piconet?
A.
It works on TCP/IP
B.
It is small network that connects computers and network device through cables
C.
It is an adhoc network
D.
Option (3) and
Ans:
Option (3) and
Explanation :
Piconet is an adhoc network that works on the Bluetooth technology and connects up to eight devices. It is also called personal area network (PAN). A scatternet is a type of ad hoc computer network consisting of two or more piconets.
[15] What is the full form of EDI?
A.
Electronic Data Input
B.
Electric Data Interchange
C.
Electronic Datum Interchange
D.
Easy Data Interchange
Ans:
Electric Data Interchange
Explanation :
EDI stands for Electronic Data Interchange. It is a computer-to-computer exchange of data or information such as business documents between companies. It involves the use of a standardized format that allows companies send information or documents to another companies electronically without human intervention.
[16] In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?
A.
Star
B.
Mesh
C.
Ring
D.
Bus
Ans:
Ring
Explanation :
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.
[17] Which among the following appears in a URL whenever you search anything on a Search Engine?
A.
google
B.
https://
C.
bing
D.
en
Ans:
https://
Explanation :
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.
[18] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[19] A virus that migrates freely within a large population of unauthorized email user is called a .
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[20] Which protocol is used to convert IP addresses to MAC addresses?
A.
IP
B.
RARP
C.
In ARP
D.
ARP
Ans:
ARP
Explanation :
The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
[21] Which IEEE Standards is used for Wi-Fi system?
A.
802.11
B.
802.1
C.
802.2
D.
802.3
Ans:
802.11
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
Glitch and Bug are essentially synonymous. Glitches/bugs are software errors that can cause drastic problems within the code, and typically go unnoticed or unsolved.
[2] Personal computers use many chips mounted on the main circuit board. What is the common name for such board containing the principal components?
A.
Daughter board
B.
Motherboard
C.
Father board
D.
Breadboard
Ans:
Motherboard
Explanation :
A motherboard is the main printed circuit board (PCB) found in general-purpose microcomputers and other expandable systems.
[3] Which among the following is an OOP principle?
A.
Structured programming
B.
Procedural programming
C.
Inheritance
D.
Linking
Ans:
Inheritance
Explanation :
In object-oriented programming, inheritance enables new objects to take on the properties of existing objects.
[4] Which of the following is true about Assembly language?
A.
It is a Machine Language
B.
It is a High-level programming language
C.
It is a low-level programming language
D.
It is a language for assembling computers
Ans:
It is a low-level programming language
Explanation :
An assembly (or assembler) language, is a low-level programming language for a computer, or other programmable device.
[5] Which of the following HTML elements is the starting element in all HTML document?
A.
Root
B.
Metadata
C.
Section
D.
Heading
Ans:
Root
Explanation :
The Root element is the starting element in an HTML document, and it is present in all HTML documents.
[6] Who invented the QWERTY keyboard?
A.
Carl Sholes
B.
Karl Sholes
C.
Christopher Latham Sholes
D.
Khristopher Sholes
Ans:
Christopher Latham Sholes
Explanation :
The arrangement of characters on a QWERTY keyboard was designed in 1868 by Christopher Sholes, the inventor of the typewriter. According to popular myth, Sholes arranged the keys in their odd fashion to prevent jamming on mechanical typewriters by separating commonly used letter combinations.
[7] What is Windows Vista?
A.
Processor
B.
Operating System
C.
Input device
D.
Memory
Ans:
Operating System
Explanation :
Windows Vista is an operating system that was produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.
[8] Constraints are applied on:
A.
rows
B.
columns
C.
entire table
D.
entire database
Ans:
columns
Explanation :
Constraints are the special rules applied on the columns to discard users from entering invalid data in the table columns.
[9] In a database, a column in the table is also called _.
A.
degree
B.
tuple
C.
entity
D.
attribute
Ans:
attribute
Explanation :
Each row in a database table represents one instance of the type of object described in that table. A row is also called a record. The columns in a table are the set of facts that we keep track of about that type of object. A column is also called an attribute.
[10] Which of the following is not a type of SQL statement?
A.
Data Manipulation Language
B.
Data Definition Language
C.
Data Standard Language
D.
Data Control Language
Ans:
Data Standard Language
Explanation :
Common categories of SQL statements include DML, DCL, DDL, TCL, etc. DDL statements are used to define a database structure, DML statements are used for the management of data within database objects and DCL statements are used for setting privileges to access data.
[11] Which of the following is not a type of DVD?
A.
DVD-ROM
B.
DVD-R
C.
DVD-RW
D.
DVD-O
Ans:
DVD-O
Explanation :
DVD-ROM, DVD-R and DVD-RW are all types of DVD. There are 3 common types of DVDs: DVD-5, DVD-9, and DVD-10. A DVD-5 is a single layer DVD that holds up to 4.7GB of data (around 120-133 minutes of video depending on compression). DVD-9 is a dual layer single sided DVD that holds up to 8.5GB of data (around 240 minutes of video depending on compression).
[12] Which among the following devices has highest storage capacity?
A.
SSD
B.
CD
C.
DVD
D.
PD
Ans:
SSD
Explanation :
Solid State Drive (SSD) has the highest storage capacity. It can store up to 4 TB of data.
[13] An image that is displayed on the monitor includes thousands of small coloured dots known as .
A.
Bytes
B.
Bits
C.
Pixels
D.
Nibble
Ans:
Pixels
Explanation :
An image that is displayed on that monitor comprises thousands of small coloured dots known as pixels.
[14] Which of the following statements is true for a piconet?
A.
It works on TCP/IP
B.
It is small network that connects computers and network device through cables
C.
It is an adhoc network
D.
Option (3) and
Ans:
Option (3) and
Explanation :
Piconet is an adhoc network that works on the Bluetooth technology and connects up to eight devices. It is also called personal area network (PAN). A scatternet is a type of ad hoc computer network consisting of two or more piconets.
[15] What is the full form of EDI?
A.
Electronic Data Input
B.
Electric Data Interchange
C.
Electronic Datum Interchange
D.
Easy Data Interchange
Ans:
Electric Data Interchange
Explanation :
EDI stands for Electronic Data Interchange. It is a computer-to-computer exchange of data or information such as business documents between companies. It involves the use of a standardized format that allows companies send information or documents to another companies electronically without human intervention.
[16] In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?
A.
Star
B.
Mesh
C.
Ring
D.
Bus
Ans:
Ring
Explanation :
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.
[17] Which among the following appears in a URL whenever you search anything on a Search Engine?
A.
google
B.
https://
C.
bing
D.
en
Ans:
https://
Explanation :
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.
[18] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[19] A virus that migrates freely within a large population of unauthorized email user is called a .
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[20] Which protocol is used to convert IP addresses to MAC addresses?
A.
IP
B.
RARP
C.
In ARP
D.
ARP
Ans:
ARP
Explanation :
The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
[21] Which IEEE Standards is used for Wi-Fi system?
A.
802.11
B.
802.1
C.
802.2
D.
802.3
Ans:
802.11
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
In object-oriented programming, inheritance enables new objects to take on the properties of existing objects.
[4] Which of the following is true about Assembly language?
A.
It is a Machine Language
B.
It is a High-level programming language
C.
It is a low-level programming language
D.
It is a language for assembling computers
Ans:
It is a low-level programming language
Explanation :
An assembly (or assembler) language, is a low-level programming language for a computer, or other programmable device.
[5] Which of the following HTML elements is the starting element in all HTML document?
A.
Root
B.
Metadata
C.
Section
D.
Heading
Ans:
Root
Explanation :
The Root element is the starting element in an HTML document, and it is present in all HTML documents.
[6] Who invented the QWERTY keyboard?
A.
Carl Sholes
B.
Karl Sholes
C.
Christopher Latham Sholes
D.
Khristopher Sholes
Ans:
Christopher Latham Sholes
Explanation :
The arrangement of characters on a QWERTY keyboard was designed in 1868 by Christopher Sholes, the inventor of the typewriter. According to popular myth, Sholes arranged the keys in their odd fashion to prevent jamming on mechanical typewriters by separating commonly used letter combinations.
[7] What is Windows Vista?
A.
Processor
B.
Operating System
C.
Input device
D.
Memory
Ans:
Operating System
Explanation :
Windows Vista is an operating system that was produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.
[8] Constraints are applied on:
A.
rows
B.
columns
C.
entire table
D.
entire database
Ans:
columns
Explanation :
Constraints are the special rules applied on the columns to discard users from entering invalid data in the table columns.
[9] In a database, a column in the table is also called _.
A.
degree
B.
tuple
C.
entity
D.
attribute
Ans:
attribute
Explanation :
Each row in a database table represents one instance of the type of object described in that table. A row is also called a record. The columns in a table are the set of facts that we keep track of about that type of object. A column is also called an attribute.
[10] Which of the following is not a type of SQL statement?
A.
Data Manipulation Language
B.
Data Definition Language
C.
Data Standard Language
D.
Data Control Language
Ans:
Data Standard Language
Explanation :
Common categories of SQL statements include DML, DCL, DDL, TCL, etc. DDL statements are used to define a database structure, DML statements are used for the management of data within database objects and DCL statements are used for setting privileges to access data.
[11] Which of the following is not a type of DVD?
A.
DVD-ROM
B.
DVD-R
C.
DVD-RW
D.
DVD-O
Ans:
DVD-O
Explanation :
DVD-ROM, DVD-R and DVD-RW are all types of DVD. There are 3 common types of DVDs: DVD-5, DVD-9, and DVD-10. A DVD-5 is a single layer DVD that holds up to 4.7GB of data (around 120-133 minutes of video depending on compression). DVD-9 is a dual layer single sided DVD that holds up to 8.5GB of data (around 240 minutes of video depending on compression).
[12] Which among the following devices has highest storage capacity?
A.
SSD
B.
CD
C.
DVD
D.
PD
Ans:
SSD
Explanation :
Solid State Drive (SSD) has the highest storage capacity. It can store up to 4 TB of data.
[13] An image that is displayed on the monitor includes thousands of small coloured dots known as .
A.
Bytes
B.
Bits
C.
Pixels
D.
Nibble
Ans:
Pixels
Explanation :
An image that is displayed on that monitor comprises thousands of small coloured dots known as pixels.
[14] Which of the following statements is true for a piconet?
A.
It works on TCP/IP
B.
It is small network that connects computers and network device through cables
C.
It is an adhoc network
D.
Option (3) and
Ans:
Option (3) and
Explanation :
Piconet is an adhoc network that works on the Bluetooth technology and connects up to eight devices. It is also called personal area network (PAN). A scatternet is a type of ad hoc computer network consisting of two or more piconets.
[15] What is the full form of EDI?
A.
Electronic Data Input
B.
Electric Data Interchange
C.
Electronic Datum Interchange
D.
Easy Data Interchange
Ans:
Electric Data Interchange
Explanation :
EDI stands for Electronic Data Interchange. It is a computer-to-computer exchange of data or information such as business documents between companies. It involves the use of a standardized format that allows companies send information or documents to another companies electronically without human intervention.
[16] In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?
A.
Star
B.
Mesh
C.
Ring
D.
Bus
Ans:
Ring
Explanation :
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.
[17] Which among the following appears in a URL whenever you search anything on a Search Engine?
A.
google
B.
https://
C.
bing
D.
en
Ans:
https://
Explanation :
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.
[18] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[19] A virus that migrates freely within a large population of unauthorized email user is called a .
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[20] Which protocol is used to convert IP addresses to MAC addresses?
A.
IP
B.
RARP
C.
In ARP
D.
ARP
Ans:
ARP
Explanation :
The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
[21] Which IEEE Standards is used for Wi-Fi system?
A.
802.11
B.
802.1
C.
802.2
D.
802.3
Ans:
802.11
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
The Root element is the starting element in an HTML document, and it is present in all HTML documents.
[6] Who invented the QWERTY keyboard?
A.
Carl Sholes
B.
Karl Sholes
C.
Christopher Latham Sholes
D.
Khristopher Sholes
Ans:
Christopher Latham Sholes
Explanation :
The arrangement of characters on a QWERTY keyboard was designed in 1868 by Christopher Sholes, the inventor of the typewriter. According to popular myth, Sholes arranged the keys in their odd fashion to prevent jamming on mechanical typewriters by separating commonly used letter combinations.
[7] What is Windows Vista?
A.
Processor
B.
Operating System
C.
Input device
D.
Memory
Ans:
Operating System
Explanation :
Windows Vista is an operating system that was produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.
[8] Constraints are applied on:
A.
rows
B.
columns
C.
entire table
D.
entire database
Ans:
columns
Explanation :
Constraints are the special rules applied on the columns to discard users from entering invalid data in the table columns.
[9] In a database, a column in the table is also called _.
A.
degree
B.
tuple
C.
entity
D.
attribute
Ans:
attribute
Explanation :
Each row in a database table represents one instance of the type of object described in that table. A row is also called a record. The columns in a table are the set of facts that we keep track of about that type of object. A column is also called an attribute.
[10] Which of the following is not a type of SQL statement?
A.
Data Manipulation Language
B.
Data Definition Language
C.
Data Standard Language
D.
Data Control Language
Ans:
Data Standard Language
Explanation :
Common categories of SQL statements include DML, DCL, DDL, TCL, etc. DDL statements are used to define a database structure, DML statements are used for the management of data within database objects and DCL statements are used for setting privileges to access data.
[11] Which of the following is not a type of DVD?
A.
DVD-ROM
B.
DVD-R
C.
DVD-RW
D.
DVD-O
Ans:
DVD-O
Explanation :
DVD-ROM, DVD-R and DVD-RW are all types of DVD. There are 3 common types of DVDs: DVD-5, DVD-9, and DVD-10. A DVD-5 is a single layer DVD that holds up to 4.7GB of data (around 120-133 minutes of video depending on compression). DVD-9 is a dual layer single sided DVD that holds up to 8.5GB of data (around 240 minutes of video depending on compression).
[12] Which among the following devices has highest storage capacity?
A.
SSD
B.
CD
C.
DVD
D.
PD
Ans:
SSD
Explanation :
Solid State Drive (SSD) has the highest storage capacity. It can store up to 4 TB of data.
[13] An image that is displayed on the monitor includes thousands of small coloured dots known as .
A.
Bytes
B.
Bits
C.
Pixels
D.
Nibble
Ans:
Pixels
Explanation :
An image that is displayed on that monitor comprises thousands of small coloured dots known as pixels.
[14] Which of the following statements is true for a piconet?
A.
It works on TCP/IP
B.
It is small network that connects computers and network device through cables
C.
It is an adhoc network
D.
Option (3) and
Ans:
Option (3) and
Explanation :
Piconet is an adhoc network that works on the Bluetooth technology and connects up to eight devices. It is also called personal area network (PAN). A scatternet is a type of ad hoc computer network consisting of two or more piconets.
[15] What is the full form of EDI?
A.
Electronic Data Input
B.
Electric Data Interchange
C.
Electronic Datum Interchange
D.
Easy Data Interchange
Ans:
Electric Data Interchange
Explanation :
EDI stands for Electronic Data Interchange. It is a computer-to-computer exchange of data or information such as business documents between companies. It involves the use of a standardized format that allows companies send information or documents to another companies electronically without human intervention.
[16] In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?
A.
Star
B.
Mesh
C.
Ring
D.
Bus
Ans:
Ring
Explanation :
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.
[17] Which among the following appears in a URL whenever you search anything on a Search Engine?
A.
google
B.
https://
C.
bing
D.
en
Ans:
https://
Explanation :
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.
[18] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[19] A virus that migrates freely within a large population of unauthorized email user is called a .
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[20] Which protocol is used to convert IP addresses to MAC addresses?
A.
IP
B.
RARP
C.
In ARP
D.
ARP
Ans:
ARP
Explanation :
The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
[21] Which IEEE Standards is used for Wi-Fi system?
A.
802.11
B.
802.1
C.
802.2
D.
802.3
Ans:
802.11
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
Windows Vista is an operating system that was produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.
[8] Constraints are applied on:
A.
rows
B.
columns
C.
entire table
D.
entire database
Ans:
columns
Explanation :
Constraints are the special rules applied on the columns to discard users from entering invalid data in the table columns.
[9] In a database, a column in the table is also called _.
A.
degree
B.
tuple
C.
entity
D.
attribute
Ans:
attribute
Explanation :
Each row in a database table represents one instance of the type of object described in that table. A row is also called a record. The columns in a table are the set of facts that we keep track of about that type of object. A column is also called an attribute.
[10] Which of the following is not a type of SQL statement?
A.
Data Manipulation Language
B.
Data Definition Language
C.
Data Standard Language
D.
Data Control Language
Ans:
Data Standard Language
Explanation :
Common categories of SQL statements include DML, DCL, DDL, TCL, etc. DDL statements are used to define a database structure, DML statements are used for the management of data within database objects and DCL statements are used for setting privileges to access data.
[11] Which of the following is not a type of DVD?
A.
DVD-ROM
B.
DVD-R
C.
DVD-RW
D.
DVD-O
Ans:
DVD-O
Explanation :
DVD-ROM, DVD-R and DVD-RW are all types of DVD. There are 3 common types of DVDs: DVD-5, DVD-9, and DVD-10. A DVD-5 is a single layer DVD that holds up to 4.7GB of data (around 120-133 minutes of video depending on compression). DVD-9 is a dual layer single sided DVD that holds up to 8.5GB of data (around 240 minutes of video depending on compression).
[12] Which among the following devices has highest storage capacity?
A.
SSD
B.
CD
C.
DVD
D.
PD
Ans:
SSD
Explanation :
Solid State Drive (SSD) has the highest storage capacity. It can store up to 4 TB of data.
[13] An image that is displayed on the monitor includes thousands of small coloured dots known as .
A.
Bytes
B.
Bits
C.
Pixels
D.
Nibble
Ans:
Pixels
Explanation :
An image that is displayed on that monitor comprises thousands of small coloured dots known as pixels.
[14] Which of the following statements is true for a piconet?
A.
It works on TCP/IP
B.
It is small network that connects computers and network device through cables
C.
It is an adhoc network
D.
Option (3) and
Ans:
Option (3) and
Explanation :
Piconet is an adhoc network that works on the Bluetooth technology and connects up to eight devices. It is also called personal area network (PAN). A scatternet is a type of ad hoc computer network consisting of two or more piconets.
[15] What is the full form of EDI?
A.
Electronic Data Input
B.
Electric Data Interchange
C.
Electronic Datum Interchange
D.
Easy Data Interchange
Ans:
Electric Data Interchange
Explanation :
EDI stands for Electronic Data Interchange. It is a computer-to-computer exchange of data or information such as business documents between companies. It involves the use of a standardized format that allows companies send information or documents to another companies electronically without human intervention.
[16] In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?
A.
Star
B.
Mesh
C.
Ring
D.
Bus
Ans:
Ring
Explanation :
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.
[17] Which among the following appears in a URL whenever you search anything on a Search Engine?
A.
google
B.
https://
C.
bing
D.
en
Ans:
https://
Explanation :
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.
[18] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[19] A virus that migrates freely within a large population of unauthorized email user is called a .
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[20] Which protocol is used to convert IP addresses to MAC addresses?
A.
IP
B.
RARP
C.
In ARP
D.
ARP
Ans:
ARP
Explanation :
The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
[21] Which IEEE Standards is used for Wi-Fi system?
A.
802.11
B.
802.1
C.
802.2
D.
802.3
Ans:
802.11
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
Each row in a database table represents one instance of the type of object described in that table. A row is also called a record. The columns in a table are the set of facts that we keep track of about that type of object. A column is also called an attribute.
[10] Which of the following is not a type of SQL statement?
A.
Data Manipulation Language
B.
Data Definition Language
C.
Data Standard Language
D.
Data Control Language
Ans:
Data Standard Language
Explanation :
Common categories of SQL statements include DML, DCL, DDL, TCL, etc. DDL statements are used to define a database structure, DML statements are used for the management of data within database objects and DCL statements are used for setting privileges to access data.
[11] Which of the following is not a type of DVD?
A.
DVD-ROM
B.
DVD-R
C.
DVD-RW
D.
DVD-O
Ans:
DVD-O
Explanation :
DVD-ROM, DVD-R and DVD-RW are all types of DVD. There are 3 common types of DVDs: DVD-5, DVD-9, and DVD-10. A DVD-5 is a single layer DVD that holds up to 4.7GB of data (around 120-133 minutes of video depending on compression). DVD-9 is a dual layer single sided DVD that holds up to 8.5GB of data (around 240 minutes of video depending on compression).
[12] Which among the following devices has highest storage capacity?
A.
SSD
B.
CD
C.
DVD
D.
PD
Ans:
SSD
Explanation :
Solid State Drive (SSD) has the highest storage capacity. It can store up to 4 TB of data.
[13] An image that is displayed on the monitor includes thousands of small coloured dots known as .
A.
Bytes
B.
Bits
C.
Pixels
D.
Nibble
Ans:
Pixels
Explanation :
An image that is displayed on that monitor comprises thousands of small coloured dots known as pixels.
[14] Which of the following statements is true for a piconet?
A.
It works on TCP/IP
B.
It is small network that connects computers and network device through cables
C.
It is an adhoc network
D.
Option (3) and
Ans:
Option (3) and
Explanation :
Piconet is an adhoc network that works on the Bluetooth technology and connects up to eight devices. It is also called personal area network (PAN). A scatternet is a type of ad hoc computer network consisting of two or more piconets.
[15] What is the full form of EDI?
A.
Electronic Data Input
B.
Electric Data Interchange
C.
Electronic Datum Interchange
D.
Easy Data Interchange
Ans:
Electric Data Interchange
Explanation :
EDI stands for Electronic Data Interchange. It is a computer-to-computer exchange of data or information such as business documents between companies. It involves the use of a standardized format that allows companies send information or documents to another companies electronically without human intervention.
[16] In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?
A.
Star
B.
Mesh
C.
Ring
D.
Bus
Ans:
Ring
Explanation :
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.
[17] Which among the following appears in a URL whenever you search anything on a Search Engine?
A.
google
B.
https://
C.
bing
D.
en
Ans:
https://
Explanation :
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.
[18] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[19] A virus that migrates freely within a large population of unauthorized email user is called a .
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[20] Which protocol is used to convert IP addresses to MAC addresses?
A.
IP
B.
RARP
C.
In ARP
D.
ARP
Ans:
ARP
Explanation :
The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
[21] Which IEEE Standards is used for Wi-Fi system?
A.
802.11
B.
802.1
C.
802.2
D.
802.3
Ans:
802.11
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
DVD-ROM, DVD-R and DVD-RW are all types of DVD. There are 3 common types of DVDs: DVD-5, DVD-9, and DVD-10. A DVD-5 is a single layer DVD that holds up to 4.7GB of data (around 120-133 minutes of video depending on compression). DVD-9 is a dual layer single sided DVD that holds up to 8.5GB of data (around 240 minutes of video depending on compression).
[12] Which among the following devices has highest storage capacity?
A.
SSD
B.
CD
C.
DVD
D.
PD
Ans:
SSD
Explanation :
Solid State Drive (SSD) has the highest storage capacity. It can store up to 4 TB of data.
[13] An image that is displayed on the monitor includes thousands of small coloured dots known as .
A.
Bytes
B.
Bits
C.
Pixels
D.
Nibble
Ans:
Pixels
Explanation :
An image that is displayed on that monitor comprises thousands of small coloured dots known as pixels.
[14] Which of the following statements is true for a piconet?
A.
It works on TCP/IP
B.
It is small network that connects computers and network device through cables
C.
It is an adhoc network
D.
Option (3) and
Ans:
Option (3) and
Explanation :
Piconet is an adhoc network that works on the Bluetooth technology and connects up to eight devices. It is also called personal area network (PAN). A scatternet is a type of ad hoc computer network consisting of two or more piconets.
[15] What is the full form of EDI?
A.
Electronic Data Input
B.
Electric Data Interchange
C.
Electronic Datum Interchange
D.
Easy Data Interchange
Ans:
Electric Data Interchange
Explanation :
EDI stands for Electronic Data Interchange. It is a computer-to-computer exchange of data or information such as business documents between companies. It involves the use of a standardized format that allows companies send information or documents to another companies electronically without human intervention.
[16] In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?
A.
Star
B.
Mesh
C.
Ring
D.
Bus
Ans:
Ring
Explanation :
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.
[17] Which among the following appears in a URL whenever you search anything on a Search Engine?
A.
google
B.
https://
C.
bing
D.
en
Ans:
https://
Explanation :
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.
[18] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[19] A virus that migrates freely within a large population of unauthorized email user is called a .
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[20] Which protocol is used to convert IP addresses to MAC addresses?
A.
IP
B.
RARP
C.
In ARP
D.
ARP
Ans:
ARP
Explanation :
The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
[21] Which IEEE Standards is used for Wi-Fi system?
A.
802.11
B.
802.1
C.
802.2
D.
802.3
Ans:
802.11
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
An image that is displayed on that monitor comprises thousands of small coloured dots known as pixels.
[14] Which of the following statements is true for a piconet?
A.
It works on TCP/IP
B.
It is small network that connects computers and network device through cables
C.
It is an adhoc network
D.
Option (3) and
Ans:
Option (3) and
Explanation :
Piconet is an adhoc network that works on the Bluetooth technology and connects up to eight devices. It is also called personal area network (PAN). A scatternet is a type of ad hoc computer network consisting of two or more piconets.
[15] What is the full form of EDI?
A.
Electronic Data Input
B.
Electric Data Interchange
C.
Electronic Datum Interchange
D.
Easy Data Interchange
Ans:
Electric Data Interchange
Explanation :
EDI stands for Electronic Data Interchange. It is a computer-to-computer exchange of data or information such as business documents between companies. It involves the use of a standardized format that allows companies send information or documents to another companies electronically without human intervention.
[16] In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?
A.
Star
B.
Mesh
C.
Ring
D.
Bus
Ans:
Ring
Explanation :
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.
[17] Which among the following appears in a URL whenever you search anything on a Search Engine?
A.
google
B.
https://
C.
bing
D.
en
Ans:
https://
Explanation :
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.
[18] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[19] A virus that migrates freely within a large population of unauthorized email user is called a .
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[20] Which protocol is used to convert IP addresses to MAC addresses?
A.
IP
B.
RARP
C.
In ARP
D.
ARP
Ans:
ARP
Explanation :
The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
[21] Which IEEE Standards is used for Wi-Fi system?
A.
802.11
B.
802.1
C.
802.2
D.
802.3
Ans:
802.11
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
EDI stands for Electronic Data Interchange. It is a computer-to-computer exchange of data or information such as business documents between companies. It involves the use of a standardized format that allows companies send information or documents to another companies electronically without human intervention.
[16] In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?
A.
Star
B.
Mesh
C.
Ring
D.
Bus
Ans:
Ring
Explanation :
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.
[17] Which among the following appears in a URL whenever you search anything on a Search Engine?
A.
google
B.
https://
C.
bing
D.
en
Ans:
https://
Explanation :
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.
[18] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[19] A virus that migrates freely within a large population of unauthorized email user is called a .
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[20] Which protocol is used to convert IP addresses to MAC addresses?
A.
IP
B.
RARP
C.
In ARP
D.
ARP
Ans:
ARP
Explanation :
The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
[21] Which IEEE Standards is used for Wi-Fi system?
A.
802.11
B.
802.1
C.
802.2
D.
802.3
Ans:
802.11
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.
[18] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[19] A virus that migrates freely within a large population of unauthorized email user is called a .
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[20] Which protocol is used to convert IP addresses to MAC addresses?
A.
IP
B.
RARP
C.
In ARP
D.
ARP
Ans:
ARP
Explanation :
The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
[21] Which IEEE Standards is used for Wi-Fi system?
A.
802.11
B.
802.1
C.
802.2
D.
802.3
Ans:
802.11
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[20] Which protocol is used to convert IP addresses to MAC addresses?
A.
IP
B.
RARP
C.
In ARP
D.
ARP
Ans:
ARP
Explanation :
The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
[21] Which IEEE Standards is used for Wi-Fi system?
A.
802.11
B.
802.1
C.
802.2
D.
802.3
Ans:
802.11
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area networ (LAN) technology designed to provide in-building broadband coverage.
[22] Which of the following key is a minimal super key?
A.
Primary key
B.
Alternate key
C.
Candidate key
D.
Secondary key
Ans:
Candidate key
Explanation :
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.
[23] Which of the following language defines commands GRANT and REVOKE?
A.
DDL
B.
DML
C.
DCL
D.
DQL
Ans:
DCL
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema.
[24] The abbreviation ISP stands for -
A.
International spy project
B.
Indian social planning
C.
Internet solution provider
D.
Internet service provider
Ans:
Internet service provider
Explanation :
An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community- owned, non-profit, or otherwise privately owned.
[25] Which operation performs a set union of two ‘similarly structured’ tables?
A.
Union
B.
Select
C.
Product
D.
Intersect
Ans:
Union
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
Explanation :
Union operation performs a set union of two ‘similarly structured’ tables.
