_______ allow us to identify uniquely a tuple in the relation.


Options: Superkey B. Domain C. Attribute D. Schema

Ans:– A ,






More Database Systems Related questions:


. What is the symbol for dividing?
Options: a. A ./ b. % c. & d. #

Ans:– a,– a


Multiprogramming was made possible by
Options: input/output units that operate independently of the CPU,    operating systems,    both (a) and (b),    neither (a) nor (b)

Ans:C ,C


Which of the following will happen when data is entered into a memory location?
Options: It will add to the content of the location,    It will change the address of the memory location,    It will erase the previous content,    It will not be fruitful if thjere is already some data at that location

Ans:C ,C


A 32 bit microprocessor has the word length equal to
Options: 2 bytes,    32 bytes,    4 bytes,    8 bytes

Ans:C ,C


The number of records contained within a block of data on magnetic tape is defined by the
Options: block definition,    record contain clause,    blocking factor,    record per block factor

Ans:C ,C


When three or more AND and OR conditions are combined, it is easier to use the SQL keyword(s):
Options: LIKE only.,    IN only.,    NOT IN only.,    Both IN and NOT IN.

Ans:D ,D


What will be the output of the program? #include<stdio.h> #include<stdlib.h> int main() { int *p; p = (int *)malloc(20); /* Assume p has address of 1314 */ free(p); printf("%u", p); return 0; }
Options: 1314,    Garbage value,    1316,    Random address

Ans:A ,A


A microprocessor unit, a memory unit, and an input/output unit form a:
Options: CPU,    compiler,    microcomputer,    ALU

Ans:C ,C


. Which of the following field properties is an expression that specifies criteria or requirements for entering data?
Options: a. Field Size b. Format c. Input Mask d. Validation Rule

Ans:1 – d ,1 – d


Which of the following is not a factor in the failure of a systems development project ?
Options: inadequate user involvement,    failure of systems integration,    size of company,    continuation of a project that should have been cancelled

Ans:C ,C


. Which programming languages are classified as low level languages?
Options: A) Basic, COBOL, FORTRAN B) Prolog 2, Expert Systems C) Knowledge based Systems D) Assembly Languages

Ans:D,D


. A One-To-Many relationship that is not enforcing referential integrity, displays what symbol next to the foreign key field?
Options: a. 1 b. ? c. r d. None

Ans:5 – d ,5 – d


. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?

Options: A) Memory address register B) Memory data register C) Instruction register D) Program counter

Ans:D,D


Most AC power is obtained from:
Options: generators,    batteries,    oscillators,    lightning

Ans:C ,C


A double sided magnetic disk pack has six disks. Can you tell how many surfaces of this pack are normally used?
Options: 10,    12,    6,    9

Ans:A,A


The dielectric constant of a material is a measure of:
Options: the amount of voltage it can withstand before breaking down,    how well the material concentrates electrostatic lines of force,    the amount of opposition to the current flow,    how well the material concentrates magnetic lines of force

Ans:B ,B


The process of entering data into a storage location
Options: adds to the contents of the location,    cause variation in its address number,    is known as a readout operation,    is destructive of previous contents

Ans:D,D


What are inserted as cross-reference in Word?
Options: A. Placeholders B. Bookmarks C. Objects D. Word fields

Ans:D ,Word fields


  Which PowerPoint feature adds special effects to modify the appearance of the slides and the timing between each slide?
Options: Color Schemes B. Animation C. Transition Settings D. Handouts

Ans:– C ,


For what purposes are views used?
Options: To hide columns only,    To hide rows only,    To hide complicated SQL statements only,    All of the above are uses for SQL views.

Ans:D ,D


MS-EXCEL can be used to automate
Options: Financial statements, Business forecasting B. Transaction registers, inventory control C. Accounts receivable, accounts payable D. Any of the above

Ans:– D ,


The main function of the dispatcher (the portion of the process scheduler) is
Options: swapping a process to the disk,    assigning ready process to the CPU,    suspending some of the processes when the CPU load is high,    bring processes from the disk to the main memory

Ans:B ,B


In the PROLOG language system, facts are manipulated by:
Options: algorithms,    rules,    memory,    simulations

Ans:B ,B


The "Turing Machine" showed that you could use a/an _____ system to program any algorithmic task.
Options: binary,    electro-chemical,    recursive,    semantic

Ans:A ,A


CD-ROM is a
Options: A) Semiconductor memory B) Memory register C) Magnetic memory D) None of above

Ans:-D,-D


The _____ is a business-oriented data-processing association which publishes a monthly journal, Data Management.
Options: DPMA,    CDP,    CISA,    ACM

Ans:A ,A


Which statement(s) about IPv6 addresses are true? Leading zeros are required. Two colons (::) are used to represent successive hexadecimal fields of zeros. Two colons (::) are used to separate fields. A single interface will have multiple IPv6 addresses of different types.
Options: 1 and 3,    2 and 4,    1, 3 and 4,    All of the above

Ans:B ,B


The DBMS acts as an interface between what two components of an enterprise-class database system?
Options: Database application and the database,    Data and the database,    The user and the database application,    Database application and SQL

Ans:A ,A


. To locate a data item for storage is
Options: A) Field B) Feed C) Database D) Fetch

Ans:4-D,4-D


A stack is
Options: a . an 8-bit register in the microprocessor b . a 16-bit register in the microprocessor c . a set of memory locations in R/WM reserved for storing information temporarily during the execution of computer d . a 16-bit memory address stored in the program counter

Ans:6.c,6.c


Which of the following can be use as slide background?
Options: Gradient B. Texture C. Picture D. All of the Above

Ans:– D ,


When assessing the table structure of an acquired set of tables with data, counting the number of table rows is (part of) the:
Options: first step.,    second step.,    third step.,    fourth step.

Ans:A ,A


Which of the following is a graphic representation of the modules in the System and the interconnection between them
Options: Pie chart,    Flow chart,    Structural chart,    System chart

Ans:C ,C


The organization and interconnection of the various components of a computer system is
Options: Architecture,    Networks,    Graphics,    Designing

Ans:A ,A


Which of the following is associated with networks?
Options: Download, node,    Star topology,    Point-to-Point,    Both (a) and (b)

Ans:D ,D


What will be the output of the program? #include<stdio.h> #include<string.h> int main() { char dest[] = {97, 97, 0}; char src[] = "aaa"; int i; if((i = memcmp(dest, src, 2))==0) printf("Got it"); else printf("Missed"); return 0; }
Options: Missed,    Got it,    Error in memcmp statement,    None of above

Ans:B ,B


. The slide that is used to introduce a topic and set the tone for the presentation is called the
Options: a. Table slide b. Graph slide c. Bullet slide d. Title slide

Ans:2 – D ,2 – D


JDBC stands for:
Options: Java Database Connectivity,    Java Database Components,    Java Database Control,    None of the above is correct.

Ans:A ,A


When an input electrical signal A=10100 is applied to a NOT gate, its output signal is
Options: 01011,    10001,    10101,    00101

Ans:A ,A


. in MS Access, which data type is appropriate to store large text and numbers?
Options: a. Text b. Memo c. OLE d. Large Text

Ans:– b,– b


If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?
Options: access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftp access-list 111 permit ip any 0.0.0.0 255.255.255.255,    access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any,    access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp,    access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 permit ip any 0.0.0.0 255.255.255.255

Ans:D ,D


. .... runs on a computer hardware and serves as a platform for other system to run on
Options: a. Operating system b. Application system c. System software d. All of above

Ans: a, a


A central purpose of most decision-support systems is
Options: to build a model of the decision¬making problem,    to design a data-base manage¬ment system,    to build an expert system,    to determine the key decisions in the problem area

Ans:A ,A


Is the following statement a declaration or definition? extern int i;
Options: Declaration,    Definition,    Function,    Error

Ans:A ,A


. How do you print your slides in a handout that includes lines for notes?
Options: a. In the print dialog box, select handout and set the number of slides per page to 3 b. In the print dialog box, select handout and set the number of slides per page, then select the include comment page option c. In the print dialog box select note page instead of handout d. All of above

Ans:3 – A ,3 – A


An AI system developed by Terry A. Winograd to permit an interactive dialogue about a domain he called blocks-world.
Options: SHRDLU,    SIMD,    BACON,    STUDENT

Ans:A ,A


. Comments put in cells are called …..
Options: a. Smart Tip b. Cell Tip c. Web Tip d. Soft Tip

Ans:– b,– b


If a table has been normalized so that all determinants are candidate keys, then that table is in:
Options: 1NF.,    2NF.,    3NF.,    BCNF.

Ans:D ,D


Which device should not be plugged into a standard ups?
Options: monitor,    laser printer,    ink-jet printer,    an external modem

Ans:B ,B


Which of the following is not true of a magnetic disk?
Options: It is expensive relative to magnetic tape,    It provides only sequential access to stored data,    Users can easily update records by writing over the old data,    It does not provide an automatic audit trail

Ans:B,B

www.000webhost.com