. Which of the following is true regarding Referential Integrity?
Options: Every primary-key value must match a primary-key value in an associated table
B. Every primary-key value must match a foreign-key value in an associated table
C. Every foreign-key value must match a primary-key value in an associated table
D. Every foreign-key value must match a foreign-key value in an associated table
Ans: â€“ C ,
Timing using a TM990 microÂ¬computer:
Options: require an external timer added by the user, is available on the standard CPU board, can be handled in software, both (b) and (c)
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Options: Network Server, Virtual Private Network, Network operating system, OSI
In analyzing the compilation of PL/I program, the term "Machine independent optimization" is associated with
Options: recognition of basic syntactic constructs through reductions, recognition of basic elements and creation of uniform symbols, creation of more optional matrix, use of macro processor to produce more optimal assembly code
Options: A. American Standard Code for Information Interchange B. American Scientific Code for International Interchange C. American Standard Code for Intelligence Interchange D. American Scientific Code for Information Interchange
. The short cut key Ctrl + R is used in Excel to
Options: a. Â Right align the content of cell
b. Â Remove the cell contents of selected cells
c. Â Fill the selection with active cells to the right
d. Â None of above
The file system â€œNTFSâ€ stands for
A) Â New Type File System
B) Â Never Terminated File System
C) Â New Technology File System
D) Â Non Terminated File System
Ans: â€“ C
Which of the following is most responsible for the inability of auditors to uncover computer crimes?
Options: the auditor's lack of knowledge in computer technology, the prohibitively expensive audit procedures needed to detect computer frauds, the client's concern that the public will learn of the crime, the relatively small average take of computer frauds
A subtype discriminator is which of the following?
Options: An attribute of the supertype whose values determine the subtype, An attribute of the subtype whose values determine the supertype, An attribute of the supertype whose values determine the supertype, An attribute of the subtype whose values determine the subtype
Options: Acts like a WHERE clause but is used for groups rather than rows., Acts like a WHERE clause but is used for rows rather than columns., Acts like a WHERE clause but is used for columns rather than groups., Acts EXACTLY like a WHERE clause.