Computer Knowledge Practice Question and Answer
8 5 Q:
61b8bbf9a9d1da035de50376 5 Q:
61b8bb8ca9d1da035de50355 5 Q:
61b8bada3dcf35035ce1b76d 5 Q:
61b8ba5cb700dd1b9f6d0353 5 Q:
61b8b9c5a9d1da035de500fc 5 Q:
61b8b93f27b9dc0335ba42aa 5 Q:
61b8b8283dcf35035ce1af04 5 Q:
61b8b7a23dcf35035ce1aef5
Q: The goal of normalization is to _______.
831 061b8bbf9a9d1da035de50376
61b8bbf9a9d1da035de50376- 1Minimize the number of relationshipsfalse
- 2Minimum number of entitiesfalse
- 3Minimize the number of tablesfalse
- 4Minimizing data redundancytrue
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Minimizing data redundancy"
Q: If you want to share broadband internet connection, you have to install _________ on the network.
743 061b8bb8ca9d1da035de50355
61b8bb8ca9d1da035de50355- 1Routerfalse
- 2Modemtrue
- 3Nodefalse
- 4Cablefalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Modem"
Q: ______ denotes what is in the data base fields?
644 061b8bada3dcf35035ce1b76d
61b8bada3dcf35035ce1b76d- 1Structuresfalse
- 2Field markerstrue
- 3Field definitionsfalse
- 4Field namefalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Field markers"
Q: What is the primary difference between virus and worm?
743 061b8ba5cb700dd1b9f6d0353
61b8ba5cb700dd1b9f6d0353- 1A worm has the ability to self-propagate from the infected computer of the user to other computers.false
- 2The worm is usually written by a cracker - script bunnies do not have the skill of worm program developmenttrue
- 3Viruses are very harmful for the computers it infects; Worm is not such a serious problem.false
- 4Antivirus is effective for fighting software, not for fighting wormsfalse
- 5None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "The worm is usually written by a cracker - script bunnies do not have the skill of worm program development"
Q: ___________ are the words which the programming language has introduced in its
580 061b8b9c5a9d1da035de500fc
61b8b9c5a9d1da035de500fc- 1Control Busfalse
- 2Reserved Bustrue
- 3Control Structuresfalse
- 4Rigid Keysfalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Reserved Bus"
Q: What happens when the data is changed in multiple lists and all the lists are not updated?
743 061b8b93f27b9dc0335ba42aa
61b8b93f27b9dc0335ba42aa- 1Data redundancyfalse
- 2Information overloadfalse
- 3Duplicate datafalse
- 4Data inconsistencytrue
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Data inconsistency"
Q: Proxy server is used for which of the following?
4806 061b8b8283dcf35035ce1af04
61b8b8283dcf35035ce1af04- 1To provide protection against unauthorized users.false
- 2Processing client requests for web pages.false
- 3Processing client requests for database access.false
- 4Providing TCP / IP.true
- 5None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Providing TCP / IP."
Q: Which of the following is not a purpose of transaction processing system?
1091 061b8b7a23dcf35035ce1aef5
61b8b7a23dcf35035ce1aef5- 1Capture, process and store transactionsfalse
- 2Reducing manual effort associated with routine business activitiesfalse
- 3Minimizing the manual effort associated with processing business transactionsfalse
- 4To produce standard reports used for making management decisionstrue
- 5None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "To produce standard reports used for making management decisions"
en100270latest