Minimal Superkeys are called


Options: Schema keys B. Candidate keys C. Domain keys D. Attribute keys

Ans:– B ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 19717 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Database Systems Related questions:


. You can tell when an object is active because
Options: a. The object is highlighted b. Eight small sizing handles appear surrounding the text c. A box frame appears surrounding the text d. b and c

Ans:8 – A ,8 – A


A systems theory of management includes
Options: the manager as the control mechanism,    the use of both environmental and internal information describing what should be achieved,    the use of objectives or standards of performance describing what is being achieved,    All of the above

Ans:A ,A


You have a 15 pin female connector with the pins in two rows. What could you connect with this?
Options: Serial device,    Parallel device,    MIDI device,    Joystick

Ans:Joystick,D


. You can detect spelling and grammar errors by
Options: a. Press Shift + F7 b. Press Ctrl + F7 c. Press Alt+ F7 d. Press F7

Ans:– D,– D


Localizing an object in an image and selectively analyzing the object in a series of redundant layers is referred to as the:
Options: Turing test,    pyramid,    Gaussian pyramid,    Maxwell pyramid

Ans:C ,C


Ctrl + T
Options: a. Hanging Indent b. Left Indent c. Open Tabs Dialog box d. Terminate all opened Dialog box

Ans:–  A,–  A


UML is stands for
Options: Universal Modeling Language B. Unified Modeling Language C. United Modeling Language D. Uni Modeling Language

Ans:– B ,


The bubbles in a bubble memory pack are created with the help of?
Options: Laser beam,    Magnetic field,    Electric field,    X-ray

Ans:B ,B


. Objects on the slide that hold text are called
Options: a. Placeholders b. Object holders c. Auto layout d. Text holders

Ans:1 – A ,1 – A


Speech recognition:
Options: will never be used in industrial controls,    is already widely used in industrial controls,    will be used in more applications as the technology matures.,    All of the above

Ans:C ,C


While working with MS-DOS, which command will you use to transfer a specific file from one disk to another?
Options: COPY,    DISKCOPY,    TIME,    RENAME

Ans:A ,A


The real "brain" of an artificial intelligence system is referred to as:
Options: bubble memory,    the expert system,    recursive technology,    natural language interfaces

Ans:B ,B


Which statement about sequences is not true?
Options: A sequence is an object that generates a sequential series of unique numbers.,    Sequences are most often used to provide values for surrogate keys.,    NextVal and CurrVal are both sequence methods.,    Sequences guarantee valid surrogate key values.

Ans:D ,D


A(n) ____ device is any device that provides information which is sent to the CPU.
Options: input,    output,    CPU,    memory

Ans:A ,A


An application suitable for sequential processing is
Options: A) Processing of grades B) Payroll processing C) Both a and b D) All of above

Ans:-C,-C


The organization and interconnection of the various components of a computer system is
Options: Architecture,    Networks,    Graphics,    Designing

Ans:A ,A


Indicate which, of the following, in not true about an interpreter
Options: Interpreter generates an object program from the source program,    Interpreter is a kind of translator,    Interpreter analyses each source statement every time it is to be executed,    All of the above

Ans:A ,A


If the following program (myproc.c) is present in the directory "C:\TC" then what will be output of the program if run it from DOS shell? /* myproc.c */ #include<stdio.h> int main(int argc, char *argv[]) { printf("%s", argv[0]); return 0; }
Options: SAMPLE.C,    C:\TC\MYPROC.EXE,    C:\TC,    Error

Ans:B ,B


The _____ layer is the layer closest to the transmission medium.
Options: transport,    network,    data link,    physical

Ans:D ,D


Which of the following is NOT a type of SQL constraint?
Options: PRIMARY KEY,    FOREIGN KEY,    ALTERNATE KEY,    UNIQUE

Ans:C ,C


A system program which helps the execution of user programs is known as
Options: System software,    Application program,    Batch operating system,    Utilities

Ans:C ,C


. The ability of an operating system to control the activities of multiple program at the same time is called
Options: a. Multitasking b. Multiprocessing c. Multioperating d. Multipaging

Ans:3 – a ,3 – a


Personnel Administration Data systems, personnel planning data systems and the payroll system all
Options: calculate payroll deductions,    update the accounts payable file,    access the inventory file,    Ail of the above

Ans:E ,E


Which of the following is not an example of a value?
Options: a. 350 b. May 10, 2001 c. 0.57 d. Serial Number 50771

Ans:#8211; d,#8211; d


If you see a diskette with a piece of foil covering its notch, it is said to be
Options: write-protected,    copy-protected,    write-enabled,    foil-covered

Ans:A ,A


What is the storage capacity of a Hollerith card which is organized into nibbles?
Options: 32,    64,    128,    240

Ans:D ,D


You can use the formula palette to
Options: a. Format cells containing numbers b. Create and edit formulas containing functions c. Enter assumptions data d. Copy a range of cells

Ans:#8211; b,#8211; b


Processors of all computers, whether micro, mini or mainframe must have 
Options: a. ALU b. Primary Storage c. Control unit d. All of above

Ans:1.d,1.d


Hard disks and diskettes are:
Options: Direct access storage devices,    Sequential access storage devices,    Rarely used with microcomputers,    Both (a) and (c)

Ans:A ,A


Resistance is measured in units of:
Options: ohms,    farads,    helids,    amperes

Ans:A ,A


Historically, central systems were used because:
Options: semiconductor memory was not available,    memory was very expensive,    memory consumed a large amount of power,    All of the above

Ans:D ,D


. Generally quick launch toolbar is displayed on
Options: a. the left side of taskbar b. the right side of taskbar c. on the middle of taskbar d. a bar out of taskbar

Ans:4 – a ,4 – a


Which of the structure is correct? 1 : struct book { char name[10]; float price; int pages; }; 2 : struct aa { char name[10]; float price; int pages; } 3 : struct aa { char name[10]; float price; int pages; }
Options: 1,    2,    3,    All of above

Ans:A ,A


To enable RIPng, which of the following would you use?
Options: Router1(config-if)# ipv6 ospf 10 area 0.0.0.0,    Router1(config-if)# ipv6 router rip 1,    Router1(config)# ipv6 router eigrp 10,    Router1(config-rtr)# no shutdown

Ans:B ,B


Which of the following tools is not used for process descriptions?
Options: pseudocodes,    decision tables,    structured english,    data dictionaries

Ans:D ,D


You save the configuration on a router with the copy running-config startup-config command and reboot the router. The router, however, comes up with a blank configuration. What can the problem be?
Options: You didn't boot the router with the correct command.,    NVRAM is corrupted.,    The configuration register setting is incorrect.,    The newly upgraded IOS is not compatible with the hardware of the router.

Ans:C ,C


Which command is used to delete the directory that is empty?
Options: a. Del *.* b. RD c. Erase d. MD

Ans:Answer: b. RD,Answer: b. RD


Which type of system board is the MOST likely candidate for processor upgrading if you want maximum performance and future compatibility?
Options: ML,    PCI,    ISA,    EISA

Ans:B ,B


A good business rule is which of the following?
Options: Declarative,    Imprecise,    Redundant,    Compound

Ans:A ,A


If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?
Options: Any available route,    RIP route,    Static route,    IGRP route

Ans:C ,C


Point out the error in the program? #include<stdio.h> int main() { struct bits { float f:2; }bit; printf("%d\n", sizeof(bit)); return 0; }
Options: 4,    2,    Error: cannot set bit field for float,    Error: Invalid member access in structure

Ans:C ,C


Which would you do first when troubleshooting a faulty monitor?
Options: Check its connections to the computer and power source,    Use a meter to check the CRT and internal circuitry for continuity,    Power down the monitor, then turn it on again to see if that corrects the problem,    Power down the computer, then turn it on again to see if that corrects the problem

Ans:A ,A


Norton's theorem replaces a complicated circuit facing a load by an
Options: Ideal voltage source and parallel resistor,    Ideal current source and parallel resistor,    Ideal voltage source and series resistor,    Ideal current source and series resistor

Ans:B ,B


. Except for the …… function, a formula with a logical function shows the word “TRUE” or “FALSE” as a result
Options: a. IF b. AND c. OR d. NOT

Ans:– a,– a


. The _____ Smart Tag launches Microsoft Outlook to schedule an appointment or display a calendar.
Options: a. Date b. Time c. Calendar d. Appointment

Ans:6 – a ,6 – a


. Which of the following bypasses the print dialog box when printing individual slides or an entire presentation?
Options: a. File, Print Preview b. The print button c. File, print d. Ctrl + P

Ans:8 – B ,8 – B


. What is the use of Document Map?
Options: a. to quickly format the document b. to quickly print required page c. to quickly navigate the document d. to quickly correct spelling mistakes

Ans: –  C , –  C


Goals for the design of the logical schema include
Options: avoiding data inconsistency,    being able to construct queries easily,    being able to access data efficiently,    All of the above

Ans:D ,D


Which of the following function is correct that finds the length of a string?
Options: int xstrlen(char *s) { int length=0; while(*s!='\0') { length++; s++; } return (length); } ,    int xstrlen(char s) { int length=0; while(*s!='\0') length++; s++; return (length); } ,    int xstrlen(char *s) { int length=0; while(*s!='\0') length++; return (length); } ,    int xstrlen(char *s) { int length=0; while(*s!='\0') s++; return (length); }

Ans:A ,A


There are several procedures you can implement to provide maximum security. The most important of these is:
Options: do not leave training manuals unsecured,    run regular simulated tests using TARP (testing of Applications Recovery Planes),    Verify the reputation of the people installing your system,    do not allow unbonded service people to work on your equipment

Ans:B ,B

www.000webhost.com