Computer Objective Question 31) The purpose of the primary key is database is to
Ans:- (B) provide a map of the data 2) It contains specific rules and words that express the logical steps of an algorithm
Ans:- (C) programming structure 3) The design of the network is called the network
Ans:- (A) architecture 4) The most frequently used instructions of a computer program are likely to be fetched from
Ans:- (B) cache memory 5) It contains data descriptions and defines the name, data type, and length of each field in the database
Ans:- (A) data dictionary 6) Personal logs or journal entries posted on the Web are known as
Ans:- (C) blogs 7) It uses picture (called icons) and menus displayed on the screen to send commands to the computer system
Ans:- (B) GUI 8) The manual tells you how to use a software program
Ans:- (A) Documentation 9) Which of the following is NOT a type of broadband Internet connection ?
Ans:- (C) Dial-up 10) Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as
Ans:- (D) malware 11) In making a field this property show that it cannot be left blank
Ans:- (B) required 12) It is the process of finding errors in software code
Ans:- (B) Compiling 13) There are viruses that are triggered by the passage of time or on a certain date.
Ans:- (C) Time bombs 14) Linux is which type of operating system ?
Ans:- (C) Windows 15) what is a backup ?
Ans:- (D) All of the above 16) Which of the following places the common data elements in order from smallest to largest ?
Ans:- (C) character, field, record, file, database 17) The internet is
Ans:- (D) All of the above 18) These are lists of commands that appear on the screen
Ans:- (C) Menus 19) Which of the following statement is FALSE concerning file names ?
Ans:- (D) The file extension come before the dot (.) followed by the file name 20) Verification of a login name an password is known as
Ans:- (C) authentication |