Computer Objective Question 17


1) In word processing the red underline indiacates

  1. Spelling mistakes
  2. Line mistakes
  3. Number mistakes
  4. Space mistake

Ans:- (A) Spelling mistakes

2) The shortcut key to print document is

  1. Ctrl + A
  2. Ctrl + B
  3. Ctrl + P
  4. Ctrl + C

Ans:- (C) Ctrl + P

3) First laYer in the OSI reference Model is

  1. Data link
  2. Nerwork
  3. Physical
  4. Application

Ans:- (C) Physical

4) Viruses, Trojan horses and worms are

  1. able to harm computer system
  2. Unable to detect if affected on computer
  3. User-friendly applications
  4. harmless application resident on computer

Ans:- (A) able to harm computer system

5) Program threats are

  1. Trap doors
  2. Trojan horse
  3. Both ‘A’ AND ‘b’
  4. Virus

Ans:- (b) Trojan horse

6) Failure of passwords security due to exposure can result from

  1. Electronic monitoring
  2. Visual
  3. Both 'A' AND 'B'
  4. Light

Ans:- (c) Both 'A' AND 'B'

7) Data security treats include

  1. Hardware failure
  2. Privacy invasion
  3. Fraudulent manipulation of data
  4. All of the above

Ans:- (b) Privacy invasion

8) The bar which displays information about the current page number is

  1. Title bar
  2. Status bar
  3. Standard bar
  4. Formatting bar

Ans:- (b) Status bar

9) Graphical pictures that represent an object like file, folder etc. are

  1. Task bar
  2. Windows
  3. Desktop
  4. Icons

Ans:- (d) Icons

10)Who invented the super-computer ?

  1. P.T. Garnsworth
  2. J.R. Whinfield
  3. J.H. Van Tassell
  4. Charles Ginsberg

Ans:- (c) J.H. Van Tassell

11) Accessing records grok a file directly without searching from the begining of the file is

  1. Time sharing
  2. Random
  3. Direct access
  4. Access time

Ans:- (c) Direct access

12) Time during which a job is processed by the computer is

  1. Delay time
  2. Real time
  3. Execution time
  4. Down time

Ans:- (c) Execution time

13) Database redesign is not terribly diffucult if the

  1. Database is structured
  2. Database has no data
  3. Database is well-designed
  4. Database is relatively small

Ans:- (c) database has no data

14) a regular subquery can be processed

  1. From the top down
  2. From the bottom up
  3. By nesting
  4. From the right up

Ans:- (b) from the bottom up

15) Which of the following SQL statements are helpful in database redesign ?

  1. Correlated subqueries only
  2. EXISTS/ NOT EXISTS expressions only
  3. Both of the above are helpful
  4. Creating the database are helpful

Ans:- (c) Both of the above are helpful

16) Which is not true of a correlated subquery ?

  1. EXISTS/NOT EXISTS is a form of a correlated subquery
  2. The provcessing of the SELECT statements nested
  3. They can be used to verify functional dependencies
  4. They are very similar to aregular subquery

Ans:- (d) They are very similar to aregular subquery

17) The EXISTS keyword will be true if

  1. Any row in the subquery meets the condition only
  2. All rows in the subquery fail the condition only
  3. both of these two conditions are met
  4. neither of these two conditions is met

Ans:- (a) Any row in the subquery meets the condition only

18) The NOT EXISTS keyword will be true if

  1. any row in the subquery meets the condition
  2. all town in the subquery fail the condition
  3. both of these two conditions are met
  4. neither of these two conditions is met

Ans:- (b) all town in the subquery fail the condition

19) How can you find rows that do not match some specified condition ?

  1. EXISTS
  2. Double use of NOT EXISTS
  3. NOT EXISTS
  4. ROWS EXIT

Ans:- (c) NOT EXISTS

20) Before any changes to database structure are attempted one should first

  1. clearly understand the current structure nd contents of the database only
  2. Test any changes on a test database only
  3. create a complete backup of the operational database only
  4. All of the above should be done

Ans:- (d) All of the above should be done

Next Topic