Computer Awareness Questions Practice Question and Answer
8 4 Q:
613893a4576b113a3fa22cb7 5 Q:
61b8bbf9a9d1da035de50376 5 Q:
61b8bb8ca9d1da035de50355 5 Q:
61b8bada3dcf35035ce1b76d 5 Q:
61b8ba5cb700dd1b9f6d0353 5 Q:
61b8b9c5a9d1da035de500fc 5 Q:
61b8b93f27b9dc0335ba42aa 5 Q:
61b8b8283dcf35035ce1af04
Q: The Processed data is called?
964 0613893a4576b113a3fa22cb7
613893a4576b113a3fa22cb7- 1Outputfalse
- 2Informationtrue
- 3Inputfalse
- 4allfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Information"
Q: The goal of normalization is to _______.
861 061b8bbf9a9d1da035de50376
61b8bbf9a9d1da035de50376- 1Minimize the number of relationshipsfalse
- 2Minimum number of entitiesfalse
- 3Minimize the number of tablesfalse
- 4Minimizing data redundancytrue
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Minimizing data redundancy"
Q: If you want to share broadband internet connection, you have to install _________ on the network.
759 061b8bb8ca9d1da035de50355
61b8bb8ca9d1da035de50355- 1Routerfalse
- 2Modemtrue
- 3Nodefalse
- 4Cablefalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Modem"
Q: ______ denotes what is in the data base fields?
653 061b8bada3dcf35035ce1b76d
61b8bada3dcf35035ce1b76d- 1Structuresfalse
- 2Field markerstrue
- 3Field definitionsfalse
- 4Field namefalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Field markers"
Q: What is the primary difference between virus and worm?
754 061b8ba5cb700dd1b9f6d0353
61b8ba5cb700dd1b9f6d0353- 1A worm has the ability to self-propagate from the infected computer of the user to other computers.false
- 2The worm is usually written by a cracker - script bunnies do not have the skill of worm program developmenttrue
- 3Viruses are very harmful for the computers it infects; Worm is not such a serious problem.false
- 4Antivirus is effective for fighting software, not for fighting wormsfalse
- 5None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "The worm is usually written by a cracker - script bunnies do not have the skill of worm program development"
Q: ___________ are the words which the programming language has introduced in its
588 061b8b9c5a9d1da035de500fc
61b8b9c5a9d1da035de500fc- 1Control Busfalse
- 2Reserved Bustrue
- 3Control Structuresfalse
- 4Rigid Keysfalse
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Reserved Bus"
Q: What happens when the data is changed in multiple lists and all the lists are not updated?
755 061b8b93f27b9dc0335ba42aa
61b8b93f27b9dc0335ba42aa- 1Data redundancyfalse
- 2Information overloadfalse
- 3Duplicate datafalse
- 4Data inconsistencytrue
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Data inconsistency"
Q: Proxy server is used for which of the following?
4824 061b8b8283dcf35035ce1af04
61b8b8283dcf35035ce1af04- 1To provide protection against unauthorized users.false
- 2Processing client requests for web pages.false
- 3Processing client requests for database access.false
- 4Providing TCP / IP.true
- 5None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Providing TCP / IP."
en4249