18/03/2014

SO Professional knowledge questions answers


Specialist Officers Professional knowledge Questions and Answers

201. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.
a) entity integrity rule
b) referential integrity constraint
c) action assertion
d) composite attribute
e) None of these
Ans: b

202. An applet ________
a) is an interpreted program that runs on the client
b) tracks the number of visitors to a Website
c) is a compiled program that usually runs on the client
d) collects data from visitors to a Website
e) None of these
Ans: d

203. A ________ , sometimes called a boot sector virus , executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
a) system virus
b) Trojan horse virus
c) file virus
d) macro virus
e) None of these
Ans: a

204. Which error detection method uses one's complement arithmetic?
a) Simple parity check
b) Checksum
c) Two-dimensional parity check
d) CRC
e) None of these
Ans: d

205. A result of a computer virus cannot lead to
a) Disk Crash
b) Mother Board Crash
c) Corruption of program
d) Deletion of files
e) None of these
Ans: b

206. The network interface card of LAN is related to following layer of OSI Model
a) Transport
b) Network
c) Data Link
d) Physical
e) All of these
Ans: b

207. Which of the following does NOT describe a data warehouse?
a) Subject-oriented b) Integrated c) Time-variant d) Updateable e) None of these | Ans: a

208. Which of the following is TRUE?
a) Logical design is software dependent
b) In a distributed database, database is stored in one physical location
c) Conceptual design translates the logical design into internal model
d) Logical design is software independent
e) None of these
Ans: a

209. A range check ________.
a) ensures that only the correct data type is entered into a field
b) verifies that all required data is present
c) determines whether a number is within a specified limit
d) tests if the data in two or more associated fields is logical
e) None of these
Ans: c

210. The total set of interlinked hypertext documents worldwide is
a) HTTP
b) Browser
c) WWW
d) B28
e) None of these
Ans: a

211. With the object-oriented (00) approach, an object encapsulates, or a programmer.
a) carries out, the details of an object for
b) hides, the details of an object from
c) reveals, the details of an object to
d) extends, the details of an object beyond
e) None of these
Ans: b

212. Every computer connected to an intranet or extranet must have a distinct
a) firewall
b) proxy server
c) IP address
d) domain name
e) None of these
Ans: c

213. A table of bits in which each row represents the distinct values of a key?
a) Join index
b) Bitmap Index
c) B+ Tree
d) Hierarchical index
e) None of these
Ans: e

214. The degree of detail that should be incorporated into a database depends on what?
a) Data integrity
b) The type of database
c) The user's perspective
d) The business practices and policies
e) None of these
Ans: c

215. The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
a) Modem
b) Router
c) Gateway
d) Bridge
e) All of these
Ans: a

216. Before a package can be used in a Java program it must be _________ .
a) executed
b) referenced
c) imported
d) declared
e) None of these
Ans: d

217. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line that will not be executed as an instruction.
a) begin the line with a # sign
b) begin the line with double slashes (//)
c) begin and end the line with double hyphens (- ... - )
d) indent the line
e) None of these
Ans: b

218. Programming languages built into user programs such as Word and Excel are known as _______ .
a) 4GLs
b) macro languages
c) object-oriented languages
d) visual programming languages
e) None of these
Ans: d

219. Firewalls are used to protect against _________
a) Unauthorized Attacks
b) Virus Attacks
c) Data Driven Attacks
d) Fire Attacks
e) All of these
Ans: a

220. This is a standard way for a Web server to pass .a Web user's request to an application program and to receive data back to forward to the user.
a) Interrupt request
b) Forward DNS lookup
c) Data-Link layer
d) File Transfer Protocol
e) Common gateway interface
Ans: d

221. Three SQL DDL CREATE commands are ________
a) Schema, Base and Table
b) Base, Table and Schema
c) Key, Base and Table
d) Schema, Table and View
e) None of these
Ans: d

222. Data are _______ in client/server computing.
a) never sent to the client machine 
b) sent in very large sections to save processing time
c) sent only upon the client's request
d) sent in complete copies for the client to filter and sort
e) sent from the client to the server for processing
Ans: e

223. Which of the following will NOT eliminate the ambiguities of a null value?
a) Define the attribute as required
b) Define subtypes
c) Define each attribute as having an initial value that is recognized as blank
d) Define super types
e) None of these
Ans: c

224. The directory is mandatory for every disk.
a) Root
b) Base
c) Sub
d) Case
e) None of these
Ans: a

225. This is a group of servers that share work and may be able to back each other up if one server fails.
a) Channel bank
b) Cluster
c) Tiger team
d) Server less backup
e) Logical unit
Ans: b

226. Execution of any 'C' Programme starts from ________.
a) the infinite function
b) the moderate function
c) the main function
d) the detection function
e) All of these
Ans: c

227. The four common types of files are -
a) document files, worksheet files, database files and digital files
b) document files, worksheet files, database files and presentation files
c) document files, worksheet files, database files and program files
d) document files, worksheet files, database files and workbook files
e) None of these
Ans: b

228. Software bugs can be caused by the following
a) Poorly validated requirements
b) Properly implemented designs
c) Simple misuse of the program
d) a) and c) both
e) a), b) and c) all
Ans: e

229. ________ is a primary key of one file that also appears in another file.
a) Physical key
b) Primary key
c) Foreign key
d) Logical key
e) None of these
Ans: c

230. ________ is a networking model proposed by International Standards Organization.
a) ISO Reference Model
b) IOS Reference Model
c) OSI Reference Model
d) SIO Reference Model
e) None of these
Ans: c

231. Transfer rates range from thousands of bits per second to billions of bits per second, called
a) Kilo bits per second (Kbps)
b) Megabits per second (Mbps)
c) Decabits per second (Dbps)
d) Gigabits per second (Gbps)
e) None of these
Ans: b

232. A universal standard for moving mail on the Internet is
a) MIME
b) POP
c) SMTP
d) IMAP
e) None of these
Ans: a

233. Which of the following is not a common feature of software applications?
a) Menus
b) Windows
c) Help
d) Search
e) None of these
Ans: b

234. A data analysis technique that organizes data attributes such that they are grouped in non-redundant, stable, flexible, and adaptable entities is known as
a) normalization
b) generalization
c) contextualization
d) concatenation
e) None of these
Ans: a

235. Which of the following is not a restriction for a table to be a relation?
a) The cells of the table must contain a single value.
b) All of the entries in any column must be of the same kind.
c) The columns must be ordered
d) No two rows in a table may be identical
e) None of these
Ans: c

236. In data flow diagrams
a) processes are represented by rounded rectangles
b) data flows are represented by straight lines
c) data stores are represented by open-ended boxes
d) a) and c) both
e) a), b) & c) all
Ans: c

237. Which of the following is a transaction?
a) A group of SQL statements consisting of one read and one write operation
b) A group of SQL statements consisting only of read operations
c) A group of SQL statements defining a user-oriented task
d) A group of SQL statements consisting only of write operations
e) None of these
Ans: a

238. The term, "hypertext" means
a) Non-sequential writing
b) Hypermedia
c) Blinking text
d) Text with heavy formatting
e) None of these
Ans: b

239. Programs that automatically submit your search request to several search engines simultaneously are called
a) Metasearch engines
b) Webcrawlers
c) Spiders
d) Hits
e) None of these
Ans: a

240. In Oracle, which statement is true about segments?
a) Each table has its own segment
b) A segment is created every time an extent is created, extended, or altered
c) An index segment is created every time a table is created
d) A segment is deleted whenever a table is truncated
e) None of these
Ans: d

241. If 20 people need to communicate using symmetric-key cryptography, ______ symmetric keys are needed.
a) 190 b)200 c) 20 d) 19 e) 210 | Ans: a

242. What is Internet 2?
a) A new type of cabling system for Wide Area Networks
b) A second local area network that can connect with another online LAN to share access
c) A new standard for Internet browsers
d) An association to develop advanced Internet technology
e) None of these
Ans: c

243. A device that copies or reproduces text and pages is also called a(n)
a) optical scanner
b) bar code reader
c) character device
d) digital camera
e) None of these
Ans: a

244. A monitor's clarity as indicated by its resolution is measured in
a) bits
b) pixels
c) arrays
d) inches
e) None of these
Ans: b

245. What should you do as soon as you have successfully created the database and the data dictionary?
a) Open the database for users to start adding data
b) Start adding a bunch of table spaces to allow users to use
c) Leave it running for a few days to make sure that nothing bad is going to happen
d) Shut it down and take a cold backup
e) None of these
Ans: a

246. How is power supplied to a low-power USB device?
a) through a power cable
b) From an external power supply
c) Directly from the computer's power supply
d) Through the USB cable
e) None of these
Ans: d

247. Where are cookies stored?
a) On the server
b) In web.xml
c) On the client
d) In HTML
e) None of these
Ans: c

248. The time between the computer's request for data from secondary storage and the completion of the data transfer is known as the disk's
a) cache time
b) access time
c) recording time
d) baud rate
e) None of these
Ans: b

249. _______ is an application of associative memory.
a) Pattern recognition
b) Function approximation
c) Image recognition
d) Retina recognition
e) None of these
Ans: b

250. When you are selecting a mouse for a particular computer system what is the most important consideration?
a) The type of drivers that come with the mouse
b) The length of the mouse cord
c) The type of connector the mouse is equipped with
d) The number of buttons the mouse has.
e) None of these
Ans: c

Learn More


Alerts: Dear viewer, “Hard work never fails”. Along with hard work include smart work for your goal. Your hard work and our smart work, guarantee success. To get in touch with you, we have created a WhatsApp Group named “Banking Awareness Study PDF”. Kindly send a message to +91-7893356131 as “add to Banking Awareness Study PDF" to add you to this group.

Updates: Don’t miss, what you want? So kindly, 1. Like our Facebook, 2. Subscribe by E-mail, 3. Follow our Google+, 4. Twitter 5. YouTube, 6. Download our Toolbar, 7. Install our App and 8. Others.

Help: If you have any suggestions, requests and problems, please comment below or ask us here.

Encourage us: Please don’t forget to G+1 and/ Like and/ Share and/ Recommend… thank you and all the best / best of luck for your bright future.

Our motto: Serve poor and needy whole heartedly – Nareddula Rajeev Reddy (NRR) and his team.

* Dear viewer, ask us what you want..?
EmoticonEmoticon

Request Admin

First search (top), didn't find; ask us, what you want? As a comment. ASAP, we will provide it...

*Interested to become co-admin, click here.