1. The overall description of a database is called______:
(1) Data definition
(2) Data manipulation
(3) Data integrity
(4) Database schema
(5) None of these
Ans. (4) The overall description of a database is called Database schema.
2. Which is proper subset designed to support ‘views’ belonging to different classes of users in order to hide or protect information?
(1) Schema
(2) Subschema
(3) Non-schema
(4) None-subschema
(5) None of these
Ans. (2) Sub schema is proper subset designed to support ‘views’ belonging to different classes of users in order to hide or protect information.
3. Who interact with the system without writing a program?
(1) Naïve users
(2) Casual users
(3) Sophisticated user
(4) All of these
(5) None of these
Ans (3) Sophisticated Users -- These people interact with the system without writing programs.
4. The performance of a data communication network depends on ........................
(1) The number of users
(2) The transmission media
(3) The hardware and software
(4) All of the above
(5) None of these
Ans. (4) The performance of a data communication network depends on all given options.
5. Viruses are network ................... issue.
(1) Performance
(2) Reliability
(3) Security
(4) Management
(5) None of these
Ans. (3) Viruses are network security issue.
6. The information to be communicated in a data communication system is the ....................
(1) Medium
(2) Protocol
(3) Message
(4) Transmission
(5) Topology
Ans. (3) The information to be communicated in a data communication system is the Message.
7. ..................... is the division of one task among multiple computers.
(1) Distributed Processing
(2) Distributed Messaging
(3) Distributed Telephony
(4) Electronic Messaging
(5) None of these
Ans. (1) Distributed Processing is the division of one task among multiple computers.
8. Which topology requires a central controller or hub?
(1) Mesh
(2) Star
(3) Bus
(4) Ring
(5) Router
Ans. (2) Star topology requires a central controller or hub.
9. ____________ is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet.
(1) Routing
(2) Network address translation (NAT)
(3) Signature referencing
(4) Packet filtering
(5) None of these
Ans. (2) NAT is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet.
10. Dynamic addressing makes it more difficult for hackers to find likely victims because ______.
(1) the ISP assigns counterfeit IP addresses.
(2) the IP address is protected by a firewall.
(3) the ISP hides the IP addresses for computers on their network.
(4) the IP address changes each time a user logs on to their ISP.
(5) None of these
Ans. (4) Dynamic addressing makes it more difficult for hackers to find likely victims because the IP address changes each time a user logs on to their ISP