1. Object (also called __) is a common data type that includes photograph, audio, video, or a document created in other applications.
(a) Number
(b) BLOB
(c) Integer
(d) Binary(e) None of these

2. In a database, a(n) __ is a group of related fields.
(a) Table
(b) Key
(c) Record
(d) Primary Field
(e) None of these

3. In a database, a(n) __ field is a field that uniquely identifies each record in a file.
(b) Identifying
(c) Master
(d) Key
(e) None of these

4. If the lowest annual fee at a discount warehouse is Rs.2025 and the highest is Rs. 5550, a(n) __ on the Annual Fee field ensures it is a value between Rs. 2025 and Rs. 5550.
(a)Range Check
(b) Completeness Check
(c) consistency check
(d) alphabetic/numeric check
(e) None of these

5. A DBMS uses the __ to perform validation checks.
(a)Data Server
(b) data mart
(c) data warehouse
(d) data dictionary
(e) None of these

6. __________ is a network technology that defines how messages are routed from one end of a network to the other, ensuring the data arrives correctly by dividing it into packets.
(a) HTML
(b) XML
(c) HTTP
(d) TCP/IP
(e) None of these

7. When a computer sends data over the Internet, the data is divided into small pieces, or __.
(a) Bundles
(b) Packets
(c) Slices
(d) Baskets
(e) None of these

8. The amount of data, instructions, and information that can travel over a communications channel sometimes is called the __.
(a) Broadband
(b) Baseband
(c) Latency
(d) Bandwidth
(e) None of these

9. Fiber-optic cables have all of the following advantages over cables that use wire except ___________.
(a) lower costs and easier installation and modification
(b)faster data transmission and smaller size
(c)less susceptible to noise from other devices
(d)better security for signals during transmission
(e)None of these

10. A __________is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building.
(a) local area network (LAN)
(b) metropolitan area network (MAN)
(c) wide area network (WAN)
(d) variable area network (VAN)
(e) None of these

11. With __________ memory, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM.
(a) Virtual
(b) Performance
(c) Device
(d) Managed
(e) None of these

12. If a new device, such as a printer or scanner, is attached to a computer, its __ must be installed before the device can be used.
(a) Driver
(b) Platform
(c) Manager
(d) Kernel
(e) None of these

13. A ____________is an icon on the desktop that provides a user with immediate access to a program or file.
(a) Kernel
(b) Spooler
(c) Buffer
(d) Shortcut
(e) None of these

14.___________ a disk, or reorganizing it so the files are stored in contiguous sectors, speeds up disk access and thus the performance of the entire computer.
(a) Formatting
(b) Defragmenting
(c) Spooling
(d) Compressing
(e) None of these

15. The term, computer _____________, describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
(a) Hotspot
(b) file compression utility
(c) virus
(d) file conversion utility
(e) None of these

16. In a diagram such as the one pictured in Figure below, a(n) __ shows the input or output of information into or out from a process.

(a) use case
(b) data flow
(c) entity relationship
(d) class diagram
(e) None of these

17. Although used in all types of business modeling, the __ has been adopted as a standard notation for object modeling.
(a) UML
(b) CASE Tool
(c) USE CASE diagram
(d) EMR
(e) None of these

18. For each input and output, a systems analyst typically develops a(n) __, which is a sample of the input or output and contains actual data.
(b) Prototype
(c) Mockup
(d) feasibility scheme
(e) None of these

19. A(n) __________ is a working model of a proposed system.
(b) feasibility scheme
(c) mockup
(d) prototype
(e) None of these

20. A unit test ___________.
(a)verifies that each individual program works by itself
(b)verifies that all programs in an application work together properly
(c)verifies that an application works with other applications
(d)is performed by end-users and verifies that the new system works with actual data
(e) None of these

Leave a Reply

Your email address will not be published. Required fields are marked *