1. Which layers of the OSI model are included in the lower layers?
A. Application, Session, Presentation
B. Physical, Transport, Data Link
C. Data Link, Physical, Network
D. Session, Data Link, Physical
E. None of these
2. From smallest to largest, rank the following logical pieces of the database : data block, table space, extent, segment
A. table space, segment, extent, data block
B. data block, segment, extent, table space
C. Segment, extent, data block, table space
D. data block, extent, segment, table space
E. None of these
3. Where are cookies stored?
A. On the server
B. In web.xml
C. On the client
D. In HTML
E. None of these
4. How is power supplied to a low-power USB device?
A. Through a power cable
B. From an external power supply
C. Directly from the computer's power supply
D. Through the USB cable
E. None of these
5. When you are selecting a mouse for a particular computer system, what is the most important consideration?
A. The type of drivers that come with the mouse
B. The length of the mouse cord
C. The type of connector the mouse is equipped with
D. The number of buttons the mouse has
E. None of these
6. Programme that automatically submit your search request to several search engines simultaneously are called..................
A. Metasearch engines
B. Webcrawlers
C. Spiders
D. Hits
E. None of these
7. You are planning on using a single network that support 208 users. Which IP address class would you choose to be the most effect?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E
8. Which of the following options is not a JSP implicit object?
A. Out
B. In
C. Response
D. Page
E. None of these
9. In Oracle, which statement is true about segments?
A. Each table has its own segment
B. A segment is created every time an extent is created, extended, or altered
C. An index segment is created every time a table is created
D. A segment is deleted whenever a table is truncated
E. None of these
10. All of the following are basic principles of networks, except ...............
A. each computer must have a network card
B. there must be communications media connecting the network hardware devices
C. there must be at least one connecting device
D. each computer must have software that supports the movement of information
E. None of these
11. Which of the following could be a legitimate Media Access Control address?
A. 192.168.254.3
B. 3FA2.4756.F9A3
C. A5514
D. C1.3A.77.5B
E. None of these
12. The term, hypertext means .................
A. Non-sequential writing
B. Hypermedia
C. Blinking text
D. Text with heavy formatting
E. None of these
13. You receive an e-mail message that forms you that a terrible virus has been unleashed on the Internet and that you should warn all the people in your Address Book. Which of the following have you most likely encountered?
A. A virus hoax
B. A filter
C. A spam
D. A virus
E. A worm
14. If 20 people need to communicate using symmetric-key cryptography, .................symmetric keys are needed
A. 190
B. 200
C. 20
D. 19
E. 210
15. What should you do as soon as you have successfully created the data base and the data dictionary?
A. Open the data base for users to start adding data
B. Start adding a bunch of table space to allow users to use
C. Leave it running for a few days to make sure that nothing bad is going to happen
D. Shut it down and take a cold back up
E. None of these
16. Which of the following is the default mask of a class A IP address?
A. 255.0.0.255
B. 255.255.0.0
C. 255.0.0.0
D. 255.255.255.0
E. None of these
17. What is Internet 2?
A. A new type of cabling system for Wide Area Networks
B. A second local area network that can connect with another online LAN to share access
C. A new standard for Internet browsers
D. An association to develop advanced Internet technology
E. None of these
18. Which of the following objects is passed to a Java Bean when one of its properties is set via at JSP action?
A. Servlet Request
B. Http Servlet Request
C. Servlet Response
D. Http Servlet Response
E. None of these
19. If you wanted to locate the hardware address to a local device, which protocol would you use?
A. ARP
B. RARP
C. ICMP
D. PING
E. PONG
20. In oracle, which table space is the minimum required when creating a new data base?
A. Undo table space
B. Temporary table space
C. System table space
D. Users table space
E. None of these
21. Data space red sign is not terribly difficult if the .........................
A. data base is structured
B. data base is well- designed
C. data space has no data
D. data base is relatively small
E. data base is relatively large
22. Which of the following are normally used to initialize a computer system's hard ware?
A. Bootstrap memory
B. Volatile memory
C. External mass memory
D. Static memory
E. Random access memory
23. Which of the following is not true about two-tier client-server data base architecture?
A. SQL statements are processed on the server
B. SQL statements may be processed on some of the clients
C. Business logic is mostly processed on clients
D. Business logic may be processed on the server
E. None of these
24. The process by which the structure of the data base is modified to eliminate hidden dependencies and repeating groups is .............
A. enforcing data integrity
B. enforcing referential integrity
C. indexing
D. normalization
E. None of these
25. Which of the following functions is not performed by TCP?
A. Flow control
B. Sequencing
C. Error checking
D. Sub netting
E. None of these
26. In oracle, who owns the data dictionary?
A. Oracle
B. SYS
C. The DBA
D. SYSTEM
E. None of these
27. The reason the data outputs of most ROM ICs are tri-state outputs is to .........
A. allow for three separate data input lines
B. allow the bi-directional flow of data between the bus lines and the ROM registers
C. permit the connection of many ROM chips to a common data bus
D. isolate the registers from the data bus during read operations
E. None of these
28. To drop a column that is used as a foreign key, first......................
A. drop the primary key
B. drop the table
C. drop the foreign key constraint
D. All of these
E. None of these
29. In the straight CGI approach to data-base connectivity on the Internet.....................
A. the external program is located between the client and the web server
B. the external program is located between the data base server and the data base
C. the external program is located between the web server and the data base server
D. there is no external program
30. What is the name of protocol used to eliminate loops?
A. Switching
B. ISL
C. Frame Tagging
D. Spanning Tree Protocol
E. Scanning
31. The effect of the ROLLBACK command in a transaction is the following.............................
A. undo all changes to the data base resulting from the execution of the transaction
B. undo the effects of the last UPDATE command
C. restore the content of the data base to its state at the end of the previous day
D. make sure that all changes to the data base are in effect
E. None of these
32. In Oracle, what is the default number of transactions that MAXTRANS is set to if not specified?
A. 512
B. 10
C. 40
D. 1
E. 255
33. To which pin on the RAM chip does the address decoder connect in order to signal which memory chip is being accessed?
A. The address input
B. The output enable
C. The chip enable
D. The data input
E. The data output
34. Which of the following switching methods provides the greatest frame through out?
A. Store-and-forward switching
B. Frame-tag switching
C. Cut-through switching
D. ISL switching
E. Store-and-backward switching
35. Which kind of lock includes a keypad that can be used to control access into areas?
A. Cipher
B. Warded
C. Device
D. Tumbler.
E. Typelock
36. A gateway is .............................
A. a device that enables users to send information simultaneously over a network without slowing down transmission
B. an electronic device that connects several computing devices to a network
C. a point in one network that is an entrance point to another network
D. a device that links two or more segments of a network and helps direct traffic
E. None of these
37. Which of the following is considered a vulnerability of SNMP?
A. Clear text community strings
B. Its use of TCP
C. The fact that it is on by default in Windows 2000 server
D. The fact that it is on by default in Windows XP Professional
E. None of these
38. Network routing information distributed among routers is stored in which of the following?
A. Flash memory
B. Route table
C. Metric table
D. NVRAM
E. Router memory
39. If the destination did not receive a segment, how will the TCP host know to resend the information?
A. The ACK received will not include the segment number that was not received
B. The ACK received will include the segment number that was not received
C. The sending host will send a PACK to verify segment receipt
D. The destination host will send a YACK message back to the sending host
E. None of these
40. What are the effects of mixing RAM modules with different speed ratings?
A. The system runs at the speed of the slowest RAM stick
B. The system runs normally
C. The system runs at the speed of the memory bus
D. The system may not run, or it crashes periodically
E. None of these
41. What kind of scheme is the HTTP protocol?
A. Get/ put
B. Store/ forward
C. Queuing
D. Search/ return
E. Request/ response'
42. What type of error does a memory parity error create?
A. A fatal exception error
B. An NMI error
C. A corrupt windows operating system file
D. A GPF error
E. A GPA error
43. Which is not a part of the Oracle data base base block?
A. Header
B. Row directory
C. Data
D. Freelists
E. None of these
44. Which of the following cannot be used as the scope when using a Java Bean with JSP?
A. Page
B. Request
C. Session
D. Application
E. Response
45. Which of the following is used for integrity?
A. DES
B. Diffie-Hellman
C. SED
D. AES
E. MD5
46. What is ISL used for?
A. To allow an Ethernet interface to understand frame tags
B. To make two Ethernet interfaces appear as one
C. To connect an Ethernet switch with a high-speed core switch such as ATM
D. To allow simultaneous routing and switching
E. None of these
47. Which of the following describes programs that can run independently, travel from system and disrupt computer communications?
A. Trojans
B. Viruses
C. Idlers
D. Droppers
E. Worms
48. You need to configure a switch from a remote subnet. Which of the following must be configured on the switch?
A. Console port
B. IP
C. Hostname
D. SNMP
E. Default gateway
49. In Oracle, which is more appropriate to store a small list of values in a single column in each row in your address table?
A. ORACARRAY
B. Nested table
C. Index organised table
D. Index
E. VARRAY
50. While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?
A. Visit Google's cached page to view the older copy
B. Forget about it, as there is no way to find this information
C. Visit a partner site of the organisation to see if it is there
D. Use the way back machine
E. None of these
____________________________________________________________________________________________________
No comments:
Post a Comment
Open Researcher and Contributor ID (ORCID)