A computer works faster with
(A) GUI
(B) Mouse
(C) Keyboard
(D) All of these
(E) None of these
SMTP protocol is used for
(A) Sending email messages between servers
(B) Sits between client server
(C) Transmit news to all clients
(D) All of the above
(E) None of these
Which form of job scheduling uses triggers?
(A) Manual scheduling
(B) Distributed scheduling
(C) Mainframe scheduling
(D) Automated scheduling
(E) None of these
MICR devices can read:
(A) Characters
(B) Numbers
(C) Both of these
(D) All of these
(E) None of these
Auxiliary storage consists of
(A) Magnetic tapes
(B) CDs
(C) Both of these
(D) All of these
(E) None of these
Who can provides access rights to users?
(A) Data custodian
(B) Data owner
(C) The data base administrator
(D) Management
(E) None of these
Security policy of an organization need not have
(A) The overall security philosophy of the organization *:
(B) The authorization procedure for accessing data
(C) Security awareness program
(D) Highlights and identity of the sensitive security features
(E) None of these
In case of a virus getting into computer, which of the following will help?
(A) Encryption
(B) NORTON
(C) Police complaint
(D) All of these
(E) None of these
Which of the following do you think is NOT necessary for computerization system in a bank?
(A) Effective customer service
(B) Effective back office integration
(C) Focus on manual records
(D) All of these
(E) None of these
BCNF is needed because:
(A) Otherwise tuples may be duplicated
(B) When a data is deleted tuples may be lost
(C) Updating is otherwise is difficult
(D) When there is dependent attributes in two possible composite keys one of the attribute is unnecessarily duplicated in the tuples.
(E) None of these
Which of the following is reliable service?
(A) TCP
(B) UDP
(C) Both [A] & [B]
(D) Either [A] nor [B]
(E) None of these
Firewall is used in PC for
(A) Security
(B) Authentication
(C) Data transmission
(D) All of these
(E) None of these
A transmission in which receiver receives the data simultaneously as it is relayed is called
(A) Video-conferencing
(B) Online transmission
(C) Real-time transmission
(D) Offline transmission
(E) None of these
A protocol is:
(A) Service that helps in communicating
(B) Rules that help computer talk
(C) Way of transmission data over the net
(D) All of these
(E) None of these
Which of the following are relational integrity constraints?
(A) Null value
(B) Primary key
(C) Referential integrity
(D) All the above
(E) None of these
Which of the following do think is NOT to develop an application for computer?
(A) Feasibility study
(B) Designing
(C) Testing
(D) All the above
(E) None of these
Binary equivalent to 87 is:
(A) 1010111
(B) 1101 111
(C) 1011111
(D) 10111111
(E) None of these