1. _____________ are words that a programming language has set aside for its own use.
(A) Control worlds (B) Reserved words
(C) Control structures (D) Reserved keys
(E) None of these
2. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy (B) information overload
(C) duplicate data (D) data inconsistency
(E) None of these
(A) Control worlds (B) Reserved words
(C) Control structures (D) Reserved keys
(E) None of these
2. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy (B) information overload
(C) duplicate data (D) data inconsistency
(E) None of these
3. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
4. ______ describe what are database fields.
(A) Structures (B) Field markers
(C) Field definition (D) Field names
(E) None of these
(A) Structures (B) Field markers
(C) Field definition (D) Field names
(E) None of these
5. A goal of normalization is to __________
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these
6. Granting an outside organization access to internet web pages is often implemented using a (n) ____
(A) extranet (B) intranet
(A) extranet (B) intranet
(C) internet (D) hacker
(E) None of these
(E) None of these
7. The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk (B) cache memory
(C) RAM (D) registers
(E) None of these
(A) the hard disk (B) cache memory
(C) RAM (D) registers
(E) None of these
8. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A) Boot-sector viruses (B) Macro viruses
(C) Time bombs (D) Worms
(E) None of these
(A) Boot-sector viruses (B) Macro viruses
(C) Time bombs (D) Worms
(E) None of these
9. A process known as ____________ is used by large retailers to study trends.
(A) data mining (B) data selection
(A) data mining (B) data selection
(C) POS (D) data conversion
(E) None of these
10. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
(A)Data (B)Point-of-sale (POS)
(A)Data (B)Point-of-sale (POS)
(C)Sales (D) Query
(E) None of these
Answers:
1 | B | 6 | A |
2 | D | 7 | B |
3 | B | 8 | C |
4 | D | 9 | A |
5 | D | 10 | B |
No comments:
Post a Comment