Which of the following is part of an administrative policy to secure a database?

Options: Authentication policies,    Limiting particular areas within a building to only authorized people,    Ensure appropriate responses rates are in external maintenance agreements,    All of the above.

Ans:D ,D

More Database Systems Related questions:

what is full form of ABC

Ans:Atanasoff-Berry Computer,

Dr. Zakir Hussain was
Options: the first Muslim president of India,    first vice president of India,    first president of Indian National Congress,    first speaker of Lok Sabha


RAM is used as a short memory because it is
Options: Volatile,    Has small capacity,    Is very expensive,    Is programmable


A small square or rectangular piece of silica on which several layers of an integrated circuit are etched or imprinted is called
Options: VLSI,    micro,    wafer,    chip

Ans:D ,D

How may valence electrons does a silicon atom have?
Options: 0,    1,    2,    4

Ans:D ,D

Multiprogramming was made possible by
Options: input/output units that operate independently of the CPU,    operating systems,    both (a) and (b),    neither (a) nor (b)

Ans:C ,C

The way of thinking that might facilitate attainment of a single, integrated information system is the
Options: marketing concept,    marketing mix,    marketing grid,    marketing matrix

Ans:A ,A

In Air Force, Air Commodore has one rank higher than
Options: Squadron Leader,    Air Vice-Marshal,    Group Captain,    Air Marshal


0.Software instructions intended to satisfy a user specific processing needs are called
Options: (A)systems software (B) microcomputer (C) documentation (D) applications software 12

Ans:120. (D),120. (D)

The time interval from when the given star passes directly overhead to when it next passed directly overhead, is defined as
Options: one sidereal day,    one solar day,    both the terms are similar, so any of these may be used,    None of the above


How long are professional Golf Tour players allotted per shot?
Options: 45 seconds,    25 seconds,    1 minute,    2 minutes


6.Auditable is
Options: (A)Here each component has a unique name and an associated set of attribute, which differs for each version of component (B) Extent to which a software system records information concerning transactions performed against the system (C) Extent to which a system or component is operational and accessible when required for use (D) They are used to describe the over all behavior of the system 12

Ans:126. (B),126. (B)

550. rediyo ka aavishkaar kisane kiya?
Options: NA

Ans: italee nivaasee maarakonee ne, italee nivaasee maarakonee ne

Which command is executed before the others when a computer is first turned on?
Options: Device=c:\emm386.exe,    Device=c:\dos\himem.sys,    Prompt=$p$g,    Patch c:\dos

Ans:B ,B

. The ….is a temporary storage area in memory where you can attach text or graphics information
Options: a. Clipboard b. Copyboard c. Both a and b d. None of above

Ans:3 – a ,3 – a

. The windows feature is the ability of computer to automatically configure a new hardware component is that
Options: a. Auto detect b. Plug and play c. Add remove hardware d. None of above

Ans:2 – b ,2 – b

What is the shortcut key to “Center Align ” the selected text?
Options: Ctrl + C B. Ctrl + E C. Ctrl + F D. None of above

Ans:– B ,

. .... runs on a computer hardware and serves as a platform for other system to run on
Options: a. Operating system b. Application system c. System software d. All of above

Ans: a, a

438. raajyasabha ka paden sabhaapati kaun hota hai?
Options: NA

Ans: uparaashtrapati, uparaashtrapati

bandali wild life senctuary is in which district
Options: kangra, shimla, mandi, sirmour


What will be the output of the program if the array begins 1200 in memory? #include<stdio.h> int main() { int arr[]={2, 3, 4, 1, 6}; printf("%u, %u, %u\n", arr, &arr[0], &arr); return 0; }
Options: 1200, 1202, 1204,    1200, 1200, 1200,    1200, 1204, 1208,    1200, 1202, 1200

Ans:B ,B

. Fonts install from
Options: a. Add from control panel b. Font setup file c. Font.exe file d. All of above

Ans:2 – d ,2 – d

During the fusing process, toner is:
Options: dry pressed into the paper,    electrically bonded to the paper,    melted into the paper,   high pressure sprayed onto the paper

Ans: high pressure sprayed onto the paper,D

The DBMS that is most difficult to use is ________ .
Options: Microsoft's SQL Server,    Microsoft's Access,    IBM's DB2,    Oracle Corporation's Oracle

Ans:D ,D

An open rectangle
Options: defines a source or destination of system data,    identifies data flow,    represents a process that transforms incoming data flow(s) into outgoing data flows,    is a data store-data at rest, or a temporary repository of data

Ans:D ,D

The unit of current is
Options: ohm,    watt,    ampere,    None of the above


. Which menu option can be used to split windows into two?
Options: a. Format -> Window b. View -> Window-> Split c. Window -> Split d. View –> Split

Ans:– c,– c

The most common security failure is
Options: carelessness by users,    depending on passwords,    too much emphasis on preventing physical access,    insufficient technology used to prevent breaches

Ans:A ,A

A devices that links two homogeneous packet-broadcast local networks, is
Options: hub,    bridge,    repeater,    gateway

Ans:B ,B

A type of channel used to connect a central processor and peripherals which uses multipling is known as
Options: Modem,    Network,    Multiplexer,    All of the above

Ans:C ,C

. Which is not a view for displaying a report object?
Options: a. Datasheet view b. Design view c. Print preview d. Layout preview

Ans:– a,– a

What command is used to count the total number of lines, words, and characters contained in a file?
Options: countw,    wcount,    wc,    count p

Ans:C ,C

The major crops found in Sudan are
Options: rice, barley, bananas, cocoa,    maize, cotton, bananas, groundnut,    bajra, oats, tobacco,    wool, wine, jute


What is the output of the program? #include<stdio.h> int main() { extern int a; printf("%d\n", a); return 0; } int a=20;
Options: 20,    0,    Garbage Value,    Error

Ans:A ,A

What will be the output of the program? #include<stdio.h> #include<string.h> int main() { char dest[] = {97, 97, 0}; char src[] = "aaa"; int i; if((i = memcmp(dest, src, 2))==0) printf("Got it"); else printf("Missed"); return 0; }
Options: Missed,    Got it,    Error in memcmp statement,    None of above

Ans:B ,B

. SQL stands for __________.
Options: a. Standard Query Language b. Structured Query Language c. Simplified Query Language d. Static Query Language

Ans:5 – b ,5 – b

Biggest iceberg , glashior in HP
Options: shigri, shipki, thunaag, thural


The territory of Porus who offered strong resistance to Alexander was situated between the rivers of
Options: Sutlej and Beas,    Jhelum and Chenab,    Ravi and Chenab,    Ganga and Yamuna


The command chmod 761 letter is equivalent to
Options: chmod 4=7, g = 6, o = 1 letter,    chmod a = 761 letter,    chmod u = rwx, g = rw, o = x letter,    chmod 167 letter

Ans:C ,C

What item of apparel was invented by Ellery Chun, a Hawaiian clothing merchant, in 1931?
Options: String bikini,    Muumuu,    Aloha shirt,    Capri pants


Related fields in a data base are grouped to form
Options: data file,    data record,    menu,    bank

Ans:B ,B

2. Hacktivism is
Options: (A)someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these 2

Ans:22. (C),22. (C)

In which year were chips used inside the computer for the first time?
Options: 1964,    1975,    1977,    1981


The strongest bonds exist between the particles found within
Options: metamorphic rocks,    igneous rocks,    sedimentary rock,    all have similar strength of bonds


Which of the following is not critical in PC CAD software?
Options: Crosshatching,    Layering,    Drawing/editing,    Damping

Ans:D ,D

In MS Word, Ctrl+S is for …..
Options: a. Scenarios b. Size c. Save d. Spelling Check

Ans:–  C,–  C

You are unsuccessful in telnetting into a remote device. What could the problem be? IP addresses are incorrect. Access control list is filtering Telnet. There is a defective serial cable. The VTY password is missing.
Options: 1 only,    3 only,    2 and 4 only,    All of the above

Ans:C ,C

3.The Window 2000 (W2K) and Linux are the example of
Options: (A)User Level Thread (ULT) (B) Kernel Level Thread (KLT) (C) A and B both (D) None of these. 2

Ans:23. (B),23. (B)

What file specifies the order in which to use specified name services?
Options: /etc/services,    /etc/nsorder,    /etc/nsswitch.conf,    /etc/hosts

Ans:C ,C

Where can system and mail logs be found in Ret Hat Linux?
Options: /var/log,    /etc/log,    /mail,    All of the above

Ans:A ,A