1. A transparent DBMS?
(1) Cannot hide sensitive information from users
(2) Keep its logical structure hidden from users
(3) Keeps its physical structure hidden from users
(4) Both 2 and 3
(5) Access by any user
Ans. (3) keeps its physical structure hidden from users
2. A locked file can be _____.
(1) Accessed by only one user
(2) Modified by users with the correct password
(3) Is used to hide sensitive information
(4) Both 2 and 3
(5) Modified by users with the correct username
Ans. (1) Accessed by only one user
3. A trigger is?
(1) A statement that enables to start any DBMS
(2) A statement that is executed by the user when debugging an application program
(3) A condition the system tests for the validity of the database user
(4) A statement that is executed automatically by the system as a side effect of modification to the database.
(5) A statement that enables to end any DBMS
Ans. (4) A statement that is executed automatically by the system as a side effect of modification to the database.
4. Manager's salary details are hidden from the employee. This is ______.
(1) Conceptual level data hiding
(2) Physical level data hiding
(3) External level hiding
(4) Internal level data hiding
(5) Logical level data hiding
Ans. (3) External level hiding
5. What are the primitive operations common to all record management systems?
(1) Addition
(2) deletion
(3) modification
(4) All
(5) None of these
Ans. (4) All
6. Which scheduling policy is most suitable for time-shared operating system?
(1) Shortest job first
(2) Round-robin
(3) Elevator
(4) First-come-first-serve
(5) Last-come-first-serve
Ans. (2) Round-robin Scheduling
7. Which of the following storage is fastest?
(1) RAM
(2) ROM
(3) Register
(4) Blu-ray disc
(5) Magnetic Disk
Ans. (3) Register
8. A polymorphic virus ______.
(1) Modifies its program code each time it attaches itself to another program or file.
(2) Is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains.
(3) A malicious-logic program that hides within or looks like a legitimate program.
(4) Infects a program file, but still reports the size and creation date of the original, uninfected program.
(5) Both 1 and 3
Ans. (1) Modifies its program code each time it attaches itself to another program or file
9. Cache Memory ______.
(1) Helps to store more data in hard disk
(2) Placed between Hard Disk and microprocessor
(3) Stores data permanently
(4) Holds last time visited web site only
(5) Placed between main memory and microprocessor
Ans. (5) Placed between main memory and microprocessor
10. SWIFT stands for:
(1) Society for Worldwide Interbank Financial Technology
(2) Society for Worldwide International Financial Telecommunication
(3) Society for Worldwide Interbank Financial Transmission
(4) Society for Worldwide Interbank Financial Transfer
(5) Society for Worldwide Interbank Financial Telecommunication
Ans. (5) Society for Worldwide Interbank Financial Telecommunication