Which of the following is part of an administrative policy to secure a database?


Options: Authentication policies,    Limiting particular areas within a building to only authorized people,    Ensure appropriate responses rates are in external maintenance agreements,    All of the above.

Ans:D ,D

More Database Systems Related questions:


what is full form of ABC
Options:

Ans:Atanasoff-Berry Computer,


Dr. Zakir Hussain was
Options: the first Muslim president of India,    first vice president of India,    first president of Indian National Congress,    first speaker of Lok Sabha

Ans:A,A


RAM is used as a short memory because it is
Options: Volatile,    Has small capacity,    Is very expensive,    Is programmable

Ans:A,(Aanswer


A small square or rectangular piece of silica on which several layers of an integrated circuit are etched or imprinted is called
Options: VLSI,    micro,    wafer,    chip

Ans:D ,D


How may valence electrons does a silicon atom have?
Options: 0,    1,    2,    4

Ans:D ,D


Multiprogramming was made possible by
Options: input/output units that operate independently of the CPU,    operating systems,    both (a) and (b),    neither (a) nor (b)

Ans:C ,C


The way of thinking that might facilitate attainment of a single, integrated information system is the
Options: marketing concept,    marketing mix,    marketing grid,    marketing matrix

Ans:A ,A


In Air Force, Air Commodore has one rank higher than
Options: Squadron Leader,    Air Vice-Marshal,    Group Captain,    Air Marshal

Ans:C,C


0.Software instructions intended to satisfy a user specific processing needs are called
Options: (A)systems software (B) microcomputer (C) documentation (D) applications software 12

Ans:120. (D),120. (D)


The time interval from when the given star passes directly overhead to when it next passed directly overhead, is defined as
Options: one sidereal day,    one solar day,    both the terms are similar, so any of these may be used,    None of the above

Ans:A,A


How long are professional Golf Tour players allotted per shot?
Options: 45 seconds,    25 seconds,    1 minute,    2 minutes

Ans:A,A


6.Auditable is
Options: (A)Here each component has a unique name and an associated set of attribute, which differs for each version of component (B) Extent to which a software system records information concerning transactions performed against the system (C) Extent to which a system or component is operational and accessible when required for use (D) They are used to describe the over all behavior of the system 12

Ans:126. (B),126. (B)


550. rediyo ka aavishkaar kisane kiya?
Options: NA

Ans: italee nivaasee maarakonee ne, italee nivaasee maarakonee ne


Which command is executed before the others when a computer is first turned on?
Options: Device=c:\emm386.exe,    Device=c:\dos\himem.sys,    Prompt=$p$g,    Patch c:\dos

Ans:B ,B


. The ….is a temporary storage area in memory where you can attach text or graphics information
Options: a. Clipboard b. Copyboard c. Both a and b d. None of above

Ans:3 – a ,3 – a


. The windows feature is the ability of computer to automatically configure a new hardware component is that
Options: a. Auto detect b. Plug and play c. Add remove hardware d. None of above

Ans:2 – b ,2 – b


What is the shortcut key to “Center Align ” the selected text?
Options: Ctrl + C B. Ctrl + E C. Ctrl + F D. None of above

Ans:– B ,


. .... runs on a computer hardware and serves as a platform for other system to run on
Options: a. Operating system b. Application system c. System software d. All of above

Ans: a, a


438. raajyasabha ka paden sabhaapati kaun hota hai?
Options: NA

Ans: uparaashtrapati, uparaashtrapati


bandali wild life senctuary is in which district
Options: kangra, shimla, mandi, sirmour

Ans:mandi,mandi


What will be the output of the program if the array begins 1200 in memory? #include<stdio.h> int main() { int arr[]={2, 3, 4, 1, 6}; printf("%u, %u, %u\n", arr, &arr[0], &arr); return 0; }
Options: 1200, 1202, 1204,    1200, 1200, 1200,    1200, 1204, 1208,    1200, 1202, 1200

Ans:B ,B


. Fonts install from
Options: a. Add from control panel b. Font setup file c. Font.exe file d. All of above

Ans:2 – d ,2 – d


During the fusing process, toner is:
Options: dry pressed into the paper,    electrically bonded to the paper,    melted into the paper,   high pressure sprayed onto the paper

Ans: high pressure sprayed onto the paper,D


The DBMS that is most difficult to use is ________ .
Options: Microsoft's SQL Server,    Microsoft's Access,    IBM's DB2,    Oracle Corporation's Oracle

Ans:D ,D


An open rectangle
Options: defines a source or destination of system data,    identifies data flow,    represents a process that transforms incoming data flow(s) into outgoing data flows,    is a data store-data at rest, or a temporary repository of data

Ans:D ,D


The unit of current is
Options: ohm,    watt,    ampere,    None of the above

Ans:C,C


. Which menu option can be used to split windows into two?
Options: a. Format -> Window b. View -> Window-> Split c. Window -> Split d. View –> Split

Ans:– c,– c


The most common security failure is
Options: carelessness by users,    depending on passwords,    too much emphasis on preventing physical access,    insufficient technology used to prevent breaches

Ans:A ,A


A devices that links two homogeneous packet-broadcast local networks, is
Options: hub,    bridge,    repeater,    gateway

Ans:B ,B


A type of channel used to connect a central processor and peripherals which uses multipling is known as
Options: Modem,    Network,    Multiplexer,    All of the above

Ans:C ,C


. Which is not a view for displaying a report object?
Options: a. Datasheet view b. Design view c. Print preview d. Layout preview

Ans:– a,– a


What command is used to count the total number of lines, words, and characters contained in a file?
Options: countw,    wcount,    wc,    count p

Ans:C ,C


The major crops found in Sudan are
Options: rice, barley, bananas, cocoa,    maize, cotton, bananas, groundnut,    bajra, oats, tobacco,    wool, wine, jute

Ans:B,B


What is the output of the program? #include<stdio.h> int main() { extern int a; printf("%d\n", a); return 0; } int a=20;
Options: 20,    0,    Garbage Value,    Error

Ans:A ,A


What will be the output of the program? #include<stdio.h> #include<string.h> int main() { char dest[] = {97, 97, 0}; char src[] = "aaa"; int i; if((i = memcmp(dest, src, 2))==0) printf("Got it"); else printf("Missed"); return 0; }
Options: Missed,    Got it,    Error in memcmp statement,    None of above

Ans:B ,B


. SQL stands for __________.
Options: a. Standard Query Language b. Structured Query Language c. Simplified Query Language d. Static Query Language

Ans:5 – b ,5 – b


Biggest iceberg , glashior in HP
Options: shigri, shipki, thunaag, thural

Ans:shipki,shipki


The territory of Porus who offered strong resistance to Alexander was situated between the rivers of
Options: Sutlej and Beas,    Jhelum and Chenab,    Ravi and Chenab,    Ganga and Yamuna

Ans:B,B


The command chmod 761 letter is equivalent to
Options: chmod 4=7, g = 6, o = 1 letter,    chmod a = 761 letter,    chmod u = rwx, g = rw, o = x letter,    chmod 167 letter

Ans:C ,C


What item of apparel was invented by Ellery Chun, a Hawaiian clothing merchant, in 1931?
Options: String bikini,    Muumuu,    Aloha shirt,    Capri pants

Ans:C,C


Related fields in a data base are grouped to form
Options: data file,    data record,    menu,    bank

Ans:B ,B


2. Hacktivism is
Options: (A)someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these 2

Ans:22. (C),22. (C)


In which year were chips used inside the computer for the first time?
Options: 1964,    1975,    1977,    1981

Ans:B,B


The strongest bonds exist between the particles found within
Options: metamorphic rocks,    igneous rocks,    sedimentary rock,    all have similar strength of bonds

Ans:B,B


Which of the following is not critical in PC CAD software?
Options: Crosshatching,    Layering,    Drawing/editing,    Damping

Ans:D ,D


In MS Word, Ctrl+S is for …..
Options: a. Scenarios b. Size c. Save d. Spelling Check

Ans:–  C,–  C


You are unsuccessful in telnetting into a remote device. What could the problem be? IP addresses are incorrect. Access control list is filtering Telnet. There is a defective serial cable. The VTY password is missing.
Options: 1 only,    3 only,    2 and 4 only,    All of the above

Ans:C ,C


3.The Window 2000 (W2K) and Linux are the example of
Options: (A)User Level Thread (ULT) (B) Kernel Level Thread (KLT) (C) A and B both (D) None of these. 2

Ans:23. (B),23. (B)


What file specifies the order in which to use specified name services?
Options: /etc/services,    /etc/nsorder,    /etc/nsswitch.conf,    /etc/hosts

Ans:C ,C


Where can system and mail logs be found in Ret Hat Linux?
Options: /var/log,    /etc/log,    /mail,    All of the above

Ans:A ,A

www.000webhost.com