_____________ refers to the correctness and completeness of the data in a database?

Options: Data security B. Data integrity C. Data constraint D. Data independence

Ans:– B ,

Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 19645 | Level: Moderate

Got some suggestion about this question or to make this site better? Please leave your comments below.

Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Database Systems Related questions:

Some advantages of the database approach include all, but:
Options: minimal data redundancy.,    improved data consistency.,    improved data sharing.,    program-data dependency.

Ans:D ,D

The punched card used in the IBM System/3 contains
Options: 80 columns,    120 columns,    96 columns,    126 columns

Ans:C ,C

The Average case occur in linear search algorithm
Options: a. When Item is somewhere in the middle of the array b. When Item is not in the array at all c. When Item is the last element in the array d. When Item is the last element in the array or is not there at all  


. Worksheet can be renamed by 
Options: a. Adding ? symbol at the end of filename while saving workbook b. Click on Worksheet tab by Holding CTRL Key and type new name c. Double Click on the Worksheet tab and type new name d. Worksheet cannot renamed

Ans:– c,– c

. Which of the following is not an XT microprocessor?
Options: A) 8006 B) 8086 C) 8088 D) None of above


In OSI model, which of the following layer provides error-free delivery of data?
Options: Data link,    Network,    transport,    Session

Ans:C ,C

When assessing the table structure of an acquired set of tables with data, determining foreign keys is (part of) the:
Options: first step.,    second step.,    third step.,    fourth step.

Ans:B ,B

.Two main measures for the efficiency of an algorithm are
Options: A)Processor and memory b.Complexity and capacity c.Time and space d.Data and space


When a new trunk link is configured on an IOS-based switch, which VLANs are allowed over the link?
Options: By default, all VLANs are allowed on the trunk.,    No VLAN's are allowed, you must configure each VLAN by hand.,    Only configured VLAN's are allowed on the link.,    Only extended VLAN's are allowed by default.

Ans:A ,A

. What do you call the programs that are used to find out possible faults and their causes?

Options: A) Operating system extensions B) Cookies C) Diagnostic software D) Boot diskettes


Stepping motors:
Options: can run at varying speeds,    can be built to index different amounts by changing the pole configuration,    can run both clockwise and counterclockwise,    do not require commutators

Ans:E ,E

2. ….is the layer of a computer system between the hardware and the user program
Options: a. Operating environment b. Operating system c. System environment d. None

Ans:Correct Answer: b,Correct Answer: b

. Excel displays the current cell address in the ……….
Options: a. Formula bar b. Status Bar c. Name Box d. Title Bar

Ans:– c,– c

. Which is an internal command?
Options: a. Scandisk b. XCOPY c. Deltree d. None of the above

Ans:1 – d ,1 – d

Which of the following resources must be protected by the operating system?
Options: I/O B. Memory C. CPU D. All of the above

Ans:– D ,

What will be the output of the program? #include<stdio.h> int main() { int X=40; { int X=20; printf("%d ", X); } printf("%d\n", X); return 0; }
Options: 40 40,    20 40,    20,    Error

Ans:B ,B

Which command is used to terminate a process?
Options: shutdown,    haltsys,    cancel,    kill

Ans:D ,D

. Relationships between tables can be graphically viewed in the _______________ window.
Options: a. Design b. Joins c. Relationships d. Tables

Ans:4 – c ,4 – c

In LISP, the addition 3 + 2 is entered as
Options: 3 + 2,    3 add 2,    3 + 2 =,    (+ 3 2)

Ans:D ,D

. When you cut or copy the text or picture, it stores temporarily in the
Options: a. File b. Clipboard c. Icon d. All of above

Ans:3 – b ,3 – b

Which option is used with rm command to make the command prompt the user with each filename and a ?, before acting on it
Options: -r,    -x,    -i,    -1

Ans:C ,C

. Formulas in Excel start with
Options: a. % b. = c. + d. –

Ans:– b,– b

The rotating coil of wire in an electric motor is called the:
Options: armature,    brush,    commutator,    loop

Ans:A ,A

How can you remove tab stop markers from ruler?
Options: a. Double click the tab marker and choose Clear All b. Drag the tab stop marker out of the ruler c. Right click the tab stop marker and choose remove d. All of above

Ans:– B,– B

A sequence controller:
Options: is difficult to program,    is a mechanical only controller,    is no longer in widespread use,    performs on/off control functions in relation to time.

Ans:D ,D

Which type of display is the latest to be used for portable computer?
Options: LED display,    LCD display,    Plasma display,    Electroluminescent display

Ans:D ,D

. The
Options: A) Analog Computers B) Digital Computers C) Hybrid Computers D) Mainframe Computers


. What are inserted as cross-reference in Word?
Options: a. Placeholders b. Bookmarks c. Objects d. Word fields

Ans:–  D,–  D

Functional subsystems are connected by
Options: resource flows,    decision flows,    information flows,    data flows

Ans:A ,A

Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
Options: Five,    Two,    Four,    Six

Ans:A ,A

To create a new table, in which method you don’t need to specify the field type and size?
Options: a. Create table in Design View b. Create Table using wizard c. Create Table by Entering data d. All of above

Ans:dash; c,dash; c

A technique used by codes to convert an analog signal into a digital bit stream is known as
Options: Pulse code modulation,    Pulse stretcher,    Query processing,    Queue management

Ans:A ,A

Expand EDVAC

Ans:Electronic Discrete Variable Automatic Computer,

ASK, PSK, FSK, and QAM are examples of _____ encoding.
Options: digital-to-digital,    digital-to-analog,    analog-to-analog,    analog-to-digital

Ans:B ,B

As compared to diskettes, the hard disks are
Options: more expensive,    more portable,    less rigid,    slowly accessed


What type of magnetic material is normally used in bubble memories?
Options: Magnetic core,    Cobalt,    Garnet,    Metallic


.   An organization has a president, vice president, managers and supervisors. On what level of an organization chart are the vice presidents
Options: a. Fourth level b. Third level c. Second level d. First level

Ans:0 – C ,0 – C

What was the total number of UNIVAC-I sold eventually and by which company?
Options: A -30 British Tabulating Machine Co. (BTM), B -40 International Business Machines (IBM), C - 48 Remington Rand, D- 40 International Computer Ltd. (ICL)

Ans:C ,48

You are working with a network that has the network ID What subnet should you use that supports up to 12 hosts and a maximum number of subnets?
Options:,,    255.255.255. 240,

Ans:C ,C

A relation in this form is free of all modification anomalies.
Options: First normal form,    Second normal form,    Third normal form,    Domain/key normal form

Ans:D ,D

________ is an open source DBMS product that runs on UNIX, Linux and Windows.
Options: MySQL,    JSP/SQL,    JDBC/SQL,    Sun ACCESS

Ans:A ,A

Which of the following is not a type of page margin?
Options:  A) Left, B) Right, C) Center, D) Top, 


18. Which command is used to delete all the files extension .txt on the current drive and directory?
Options: a. Del .txt b. Erase .txt c. Del *.txt d. Del *.*/p

Ans:Correct Answer: c ,Correct Answer: c

A file that is organized in uniform format is formally referred to as a _____ or a database file.
Options: Document,    Database,    Record,    Structured data file

Ans:D ,D

What will you do to treat the constant 3.14 as a float?
Options: use float(3.14f),    use 3.14f,    use f(3.14),    use (f)(3.14)

Ans:B ,B

How does a host on an Ethernet LAN know when to transmit after a collision has occurred? In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting. You can improve the CSMA/CD network by adding more hubs. After a collision, the station that detected the collision has first priority to resend the lost data. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
Options: 1 and 3,    2 and 4,    1,3 and 4,    2 and 5

Ans:D ,D

. The selected design template can be applied
Options: a.  To current slide only b.  To all the slides c.  To all the new presentation you create d.  All of above

Ans:5 – D ,5 – D

Which Chart can be created in Excel?
Options: Area B. Line C. Pie D. All of the above

Ans:– D ,

Which of the following best describes the scopes on each DHCP server, in the absence of configuration problems with DHCP addresses, if you use multiple DHCP servers in your environment?
Options: Unique to that subnet only,    For different subnets,    For no more than two subnets,    For no subnets

Ans:B ,B

. In a worksheet you can select
Options: a. The entire worksheet b. Rows c. Columns d. a, b, and c

Ans:– d,– d