CBSE - MCQ Question Banks (के. मा. शि. बो . -प्रश्नमाला )

PreviousNext

Q. 194501 Nihar is a chef at Hotel Taj. He wants to write the code for preparing pakoras using a markup language, wherein he can choose the tags according to his choice. We can create tags of our own choice in


A. HTML.

B. DHTML.

C. SQL.

D. XML.

Right Answer is: D

SOLUTION

XML tags are not predefined. We can create and define new tags as per our needs.


Q. 194502 Madhur’s teacher asked him to use XML to write a code for students who are participating in the Summer Camp along with the tags of his choice. XML is


A. designed to display data.

B. designed to be self-descriptive.

C. platform dependent.

D. inextensible.

Right Answer is: B

SOLUTION

XML tags are not predefined, rather these are to be created by the author to describe the content in appropriate manner. Therefore, each XML document is unique in itself and is able to describe its contents without prior knowledge.


Q. 194503 Nimisha has read in brief about SGML and now she is learning XML. She is not aware of the relation between the two languages. XML is a


A. subset of SGML.

B. super set of SGML.

C. complex set of SGML.

D. minor set of SGML.

Right Answer is: A

SOLUTION

XML is a subset of SGML, i.e., SGML minus its complex and optional features. XML is based on SGML. It includes only the parts of SGML required for web publishing. XML did not include complex and optional features of SGML.


Q. 194504 Siddharth wants to use a markup language that will help him to display the output in the browser. The language that is about displaying information is


A. XML.

B. SGML.

C. HTML.

D. SQL.

Right Answer is: C

SOLUTION

HTML is about displaying information, while XML is about describing information. HTML is designed to display data and hence, focussed on the ‘look’ of the data.


Q. 194505 Mehak wants to use a markup language where the tags < parts >, < Parts > and < PARTS > are treated as different cases. Tags are case-sensitive in


A. PLSQL.

B. XML.

C. SQL.

D. HTML.

Right Answer is: B

SOLUTION

XML tags are case-sensitive whereas HTML tags are not case-sensitive. In XML, < parts >, < Parts > and < PARTS > are not the same. The XML processing instruction must be all lowercase. However, our own elements and attributes may be in any case.


Q. 194506 Aanchal has learnt XML with the help of online tutorials. Before she starts writing codes, she wants to test her knowledge. So, she decides to solve a paper on XML that consists of objective questions. DTD stands for


A. Declaration Type Document.

B. Document Type Definition.

C. Definition Type Document.

D. Definition Type Declaration.

Right Answer is: B

SOLUTION

The document type declaration consists of Markup code that indicates grammar rules for the particular class of the document. Grammar rules are called Document Type Definition (DTD). A DTD begins with !DOCTYPE declaration.


Q. 194507 Ali wants to become an expert in all types of markup languages. He has an expertise in HTML. Now, he wants to learn XML. But before he starts with the coding, he desires to have a brief introduction about it. The ancestor of XML is


A. SXML.

B. SGML.

C. SML.

D. DHTML.

Right Answer is: B

SOLUTION

SGML stands for Standard Generalized Markup Language. It is powerful but very complex and suffers from lack of industry support. It is the basis for XML.


Q. 194508 Ashish has created an XML document for a book store. He wants to see how it appears in the browser. The step/steps involved to view an XML document are


A. XML >> browser.

B. XML >> style-sheet >> browser.

C. XML >> HTML >> browser.

D. Start >> browser.

Right Answer is: B

SOLUTION

XML documents can be viewed only if proper stylesheet file is also available along with XML file.


Q. 194509 The correct syntax of the declaration that defines the XML version is


A. < xml version="1.0" / >.

B. < ?xml version="1.0" / >.

C. < ?xml version="1.0"/ >.

D. < ?xml version="1.0"? >.

Right Answer is: D

SOLUTION

The XML declaration begins with a special tag < ?xml…? >. It can have three pseudo attributes as explained below: 1. version pseudo-attribute specifies the XML version < ?xml version= “1.0”? > 2. encoding pseudo-attribute(optional) specifies the character set < ?xml version=”1.0” encoding = “UTF-8”? > 3. standalone pseudo-attribute(optional) specifies whether the document refers/needs external entities < ?xml version=”1.0” encoding = “UTF-8” standalone = “no”? >


Q. 194510 What are the two categories of XML document?
Right Answer is:

SOLUTION

Well-formed documents and valid documents.


Q. 194511 Name the three pseudo-attributes of XML declaration?
Right Answer is:

SOLUTION

The three pseudo-attributes of XML are: version, encoding and standalone.


Q. 194512 What is a mark-up language?
Right Answer is:

SOLUTION

A markup language is a set of rules/tags that defines the structure and format of text while presenting text.


Q. 194513 What are the different types of entities?
Right Answer is:

SOLUTION

There are two types of entities: Internal entity and External entity.


Q. 194514 The programmers that break the secure systems are known as


A. hackers.

B. breakers.

C. burglers.

D. crackers.

Right Answer is: A

SOLUTION

Hacking refers to the attempts to gain information from undisclosed areas. Mostly hackers hack systems with malicious intent and damage some of the important system information.


Q. 194515 The software that delivers unwanted ads to a computer is known as


A. spyware.

B. adware.

C. backup.

D. malware.

Right Answer is: B

SOLUTION

Adware is a type of spyware that records search information and forwards it to an advertising agency or market research firm that later uses it to tailor pop-up ads for delivery to users without their knowledge or consent.


Q. 194516 Software ethics ensure that the


A. developer gets credit for the creation of the software.

B. developer doesn't get popularity for the creation of the software.

C. programmer gets more programs to write.

D. software becomes popular.

Right Answer is: A

SOLUTION

Software ethics refer to ensuring that the software being used is not pirated or unauthorised. It also includes that the software developers should be given a fair return of their work.


Q. 194517 Establishing an encrypted link between the web server and browser is known as


A. firewall.

B. SSL.

C. SDL.

D. digital signature.

Right Answer is: B

SOLUTION

Secure Sockets Layer (SSL) is a secure protocol developed for sending information securely over the internet. SSL is an industry standard which is used by millions of websites in the protection of their online transactions with their customers.


Q. 194518 In online backup, all the data are stored on


A. remote server.

B. CD.

C. software.

D. database.

Right Answer is: A

SOLUTION

Online backup is also known as remote backup because all the files and folders are stored on a remote server. A number of companies provide online backup services like Badongo, BigFileBox, Media Fire etc.


Q. 194519 Viruses that disrupt services and create system management problems are known as


A. worms.

B. Torjan.

C. malware.

D. adware.

Right Answer is: A

SOLUTION

Most worms disrupt services and create system management problems. Some worms scan for passwords and other loopholes and then send the information back to the attacker. In some cases, worms can install trojan horses or viruses that can cause damage to the systems.


Q. 194520 The electronic junk mail is known as


A. mail.

B. spam.

C. worm.

D. virus.

Right Answer is: B

SOLUTION

Spam is the flooding of many copies of the same message in an attempt to force the message on people who would not otherwise choose to receive it. Mostly spam includes commercial advertising, often for dubious products, get-rich-quick schemes etc.


Q. 194521 A set of moral principles that regulate the use of computers is known as


A. social ethics.

B. computer ethics.

C. information ethics.

D. technology ethics.

Right Answer is: B

SOLUTION

Ethics is a set of moral principles that govern the behaviour of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns and how computers affect the society.


Q. 194522 The general term that refers to viruses, worms etc. is


A. un-ware.

B. harmware.

C. malware.

D. adware.

Right Answer is: C

SOLUTION

Malware is any program or file that is harmful to a computer user. It includes computer viruses, worms, trojan horses, spyware and programming that gathers information about a computer user without his/her permission.


Q. 194523 Hackers hack systems with


A. software.

B. knowledge.

C. malicious intent.

D. high thinking.

Right Answer is: C

SOLUTION

Hackers are basically interested in gaining knowledge about computer systems and use this for playful pranks. Mostly hackers hack systems with malicious intent and damage important system information.


Q. 194524 The data and files on our systems are damaged by


A. computer virus.

B. crackers.

C. operating system.

D. software.

Right Answer is: A

SOLUTION

Computer viruses are malicious codes/programs that cause damage to data and files on a system. A virus can attack any part of the computer software such as boot block, operating system, files etc.


Q. 194525 A person who breaks into computer system/network as a part of computer security program is known as a


A. programmer.

B. cracker.

C. hacker.

D. network administrator.

Right Answer is: C

SOLUTION

Hacker is the person who enjoys in exploring the details of programmable system. They are more interested in gaining knowledge about computer systems and possibly use this knowledge for playful pranks.


Q. 194526 A person who gains unauthorised access to a computer network for the purpose of breaking the copyright of a software is known as a


A. programmer.

B. cracker.

C. hacker.

D. network administrator.

Right Answer is: B

SOLUTION

A cracker is a computer user who attempts to break the copyrighted software or a network computer system. Sometimes this is done with the intent of releasing the software, so that it can be used without paying royalties.


Q. 194527 An independent computer program that copies itself from one computer to other in a network is called


A. a bug.

B. an antivirus.

C. a worm.

D. an error.

Right Answer is: C

SOLUTION

A worm is a program very similar to a virus. It has the ability to self-replicate and can cause negative effects on your computer.


Q. 194528 Two major threats in the security of software and information resources are


A. hacking and piracy.

B. hacking and cracking.

C. unauthorised access and login.

D. illegal use of documents and data.

Right Answer is: B

SOLUTION

Two major threats in security of software and information resources are:
• Hacking
• Cracking Cracker is a malicious programmer who breaks into secure systems whereas hackers are more interested in gaining knowledge about computer system.


Q. 194529 What is a piracy?
Right Answer is:

SOLUTION

Piracy is unauthorised duplication of computer software.


Q. 194530 What is computer ethics?
Right Answer is:

SOLUTION

Computer ethics deal with how computing professionals should make decisions regarding their professional and social conduct.


Q. 194531 Can I backup files while my computer is running?
Right Answer is:

SOLUTION

Yes, you can safely backup up open files and programs while they are running. You can also verify this with your online backup service provider.


Q. 194532 What does a Malware contain?
Right Answer is:

SOLUTION

A malware includes computer virus, worms, trojan horse, spyware, crimeware, dishonest adware and other true viruses.


Q. 194533 Name the two types of backup.
Right Answer is:

SOLUTION

The two types of backup are: 
(i) Full backup 
(ii) Differential backup


Q. 194534 The fixed length for [SMALLINT] is


A. 9.

B. 3.

C. 5.

D. 6.

Right Answer is: C

SOLUTION

Small Integer [SMALLINT] field accepts integers or whole numbers with a fixed length of five (5) spaces, i.e., 5 digits numbers.


Q. 194535 To control the look of data entered in a field, we use


A. formatting.

B. default value.

C. forms.

D. queries.

Right Answer is: A

SOLUTION

Formatting is used to control the look of data entered in a field. The formatting types depend upon the field types.


Q. 194536 If you save a database called CUSTOMER, then the extension in BASE will be


A. TEXT Data Type.

B. MBD

C. OBD

D. ODB

Right Answer is: D

SOLUTION

The .odb file extension is most commonly associated with the OpenOffice database application.


Q. 194537 Tiny Integer is a


A. DATE/TIME data type.

B. Numeral data type.

C. Text data type.

D. Special data type.

Right Answer is: B

SOLUTION

Numeral Data Types are classified into two sub-categories – Whole Number data type and Fractional Values data types. The Whole Number data types are Tiny Integer, Small Integer, Integer and Big Integer. The Fractional Values data types are Float, Real, Double, Numeric and Decimal.


Q. 194538 Text [VARCHAR] is a


A. variable length text datatype.

B. fixed length text datatype.

C. date type datatype.

D. special data type.

Right Answer is: A

SOLUTION

Text [VARCHAR] is default field type when you create a new field. The default length (field-width) is 50 but can be altered using Length property. In this type of field, BASE stores only characters entered, maximum up to the specified length. However, if the data entered is shorter than the length specified, no trailing spaces are padded. It is variable-length text datatype.


Q. 194539 Text (fix) [CHAR] is a


A. variable length text datatype.

B. fixed length text datatype.

C. date type datatype.

D. special data type.

Right Answer is: B

SOLUTION

The Text (fix) char data type stores exactly the length specified by the user. The default length (field-width) is 50. This value can be altered using Length property. If the data entered in the field type is less than the length specified, then BASE pads the field with trailing spaces. It is fixed length text datatype.


Q. 194540 The default length for Text [VARCHAR] is


A. 10.

B. 90.

C. 35.

D. 50.

Right Answer is: D

SOLUTION

It is default field type when you create a new field. The default length (field-width) is 50 but can be altered using Length property. In this type of field, BASE stores only characters entered, maximum up to the specified length. However, if the data entered is shorter than the length specified, no trailing spaces are padded.


Q. 194541 The default length for Text (fix) char is


A. 48.

B. 50.

C. 90.

D. 10.

Right Answer is: B

SOLUTION

The Text (fix) char data type stores exactly the length specified by the user. The default length (field-width) is 50. This value can be altered using Length property.


Q. 194542 To have varied lengths, we use


A. variable length fields.

B. fixed length fields.

C. field types.

D. special data types.

Right Answer is: A

SOLUTION

Variable length Fields have varied lengths, i.e., field length is determined separately for every data element inside the field. There is no wastage of space, however, processing is complex.


Q. 194543 For fixed lengths, we use


A. Field Types.

B. Data Types.

C. Fixed length fields.

D. Numeral data types.

Right Answer is: C

SOLUTION

Fixed lengths have fixed lengths, i.e., they occupy fixed number of bytes for every data element they store. These numbers of bytes are determined by maximum number of characters the fields can store.


Q. 194544 To know the type of information, we use


A. Field Type.

B. Field Length.

C. Field Name.

D. Primary Key.

Right Answer is: C

SOLUTION

Field name is the label that tells what type of information is being stored in this field. For example, EID tells us that the field stores the ID of the employees.


Q. 194545 A set of related data items is called a


A. field.

B. file.

C. record.

D. entry.

Right Answer is: A

SOLUTION

Databases store information in the form of records. Each RECORD represents a unique item in the database. Records consist of fields. Each FIELD represents a unique piece of information about the record.


Q. 194546 A record is also known as a


A. column.

B. field.

C. file.

D. row.

Right Answer is: D

SOLUTION

A record is a collection of data items that represent a complete unit of information. A record is also known as a row of information in a table.


Q. 194547 Data items grouped together for storage purpose is called a


A. table.

B. relation.

C. record.

D. tree.

Right Answer is: C

SOLUTION

An ordered set of fields, usually stored contiguously is known as a record.


Q. 194548 We can identify the processing of database through


A. status bar.

B. menu bar.

C. tool bar.

D. title bar.

Right Answer is: A

SOLUTION

Status bar is located on the lower left corner of BASE window and this reports all the progress of database processing.


Q. 194549 Base


A. provides all common multimedia presentation tools.

B. has all the advanced analysis, charting and decision making features.

C. provides tools for day-to-day database work within a simple interface.

D. is a tool for creating letters, books, reports, newsletters etc.

Right Answer is: C

SOLUTION

Base can create and edit forms, reports, queries, tables, views and relations so that managing a connected database is much the same as in other popular database applications.


Q. 194550 A primary key uniquely identifies records in a


A. database.

B. record.

C. table.

D. DBMS.

Right Answer is: C

SOLUTION

One or more fields (columns) whose value or values uniquely identifies each record in a table is called a primary key.


Q. 194551 The database file of BASE is stored with extension


A. .ods

B. .odc

C. .odb

D. .odx

Right Answer is: C

SOLUTION

The database file of BASE is stored with extension .odb that expands to OpenOffice database.


Q. 194552 BASE is an example of


A. flat database.

B. forms.

C. relational database.

D. tables.

Right Answer is: C

SOLUTION

When the data is stored in multiple tables that are linked via common fields, then such a database is called relational database. Microsoft Access, BASE, Oracle, MYSQL etc. are examples of Relational Database.


Q. 194553 BASE database is made up of following components EXCEPT


A. tables.

B. queries.

C. forms.

D. formula bars.

Right Answer is: D

SOLUTION

When a database is open, it displays various object buttons to navigate through various database objects like Tables, Queries, Forms and Reports etc.


Q. 194554 Data is a collection of


A. facts and entities relevant to user.

B. raw material.

C. a set of numbers and alphabet.

D. input material for a computer.

Right Answer is: A

SOLUTION

Data is a collection of facts and entities relevant to user because it produces some meaningful information.


Q. 194555 When we give meaning to the data so that people can understand it, it is known as


A. input.

B. information.

C. database.

D. suite.

Right Answer is: B

SOLUTION

Information adds context and meaning to the data. This gives it a meaning so that people can understand it. Data must have some kind of headings or structure around it to become information.


Q. 194556 The database component of OpenOffice.org is known as


A. Access.

B. FoxPro.

C. Excel.

D. Base.

Right Answer is: D

SOLUTION

A database is a collection of information that is related to a particular subject or purpose, e.g. student database, event management database etc.BASE (database component of OpenOffice.org), which is a popular RDBMS (Relational Database Management System – a system that manages data in terms of special tables called relations), lets us manage the database by offering a variety of features.


Q. 194557 Vishal is a programmer in a school and is asked to handle the information of grades for the students of class 10. He wants to use the case in which the letters of the grade are ignored, for example, ‘a’ or ‘A’. To accomplish this, he should use


A. Memo [LONGVARCHAR]

B. Text (fix) [CHAR]

C. Text [VARCHAR]

D. Text [VARCHAR - IGNORECASE]

Right Answer is: D

SOLUTION

Text [VARCHAR - IGNORECASE] is similar to Text [VARCHAR] except for one thing. Case of the letters is ignored in it. It simply converts everything into capitals as you type.


Q. 194558 Akshita is working as a trainee in Info Systems, Noida. She is asked to create a table Employee with EmpNo and EmpName in OOo Base. The data type for EmpName field is


A. Integer.

B. Text (fix) [CHAR].

C. Text [VARCHAR].

D. Date [DATE].

Right Answer is: C

SOLUTION

The data type for EmpName field is Text [VARCHAR] because it helps us to share variable characters.


Q. 194559 Akash works as a programmer with a Marketing firm. He has to create a table containing information about all the employees. He desires to use a field type which lets him put an image as an entry in a field. To store an object like image, you need to create a field in table, having field type as


A. Yes/No.

B. Binary (fix).

C. Image.

D. Picture.

Right Answer is: C

SOLUTION

Image [LONGVARBINARY] field is specifically designed if you want to put an image as an entry to the field. However, it is dependent on the capability of OOo BASE if it can display or process the type of image entered in code.


Q. 194560 Suruchi works as a programmer in a boarding school. She has been asked by the school authorities to record the information of teachers’ reporting time and date in OOo. The combination of Date and Time field types is known as


A. [TIME].

B. [DATE].

C. [DATESTAMP].

D. [TIMESTAMP].

Right Answer is: D

SOLUTION

Date/Time [TIMESTAMP] field type is a combination of above mentioned data types, i.e., Data and Time field types. Its format can also be changed using Format property.


Q. 194561 The Binary [VARBINARY]


A. is set to handle a “Yes” or “No” input, which is a common boolean argument.

B. is specifically designed to put an image as an entry to the field.

C. is set to handle any kind of binary “code” that you may want to enter.

D. is set to have a fixed length in terms of spaces.

Right Answer is: C

SOLUTION

The Binary [VARBINARY] is set to handle any kind of binary “code” that you may want to enter. This actually may include varied kinds of files, including encrypting ones if you like. It is dependent on the capability of OOo BASE if it can display or process the code you entered.


Q. 194562 Format Example


A. property controls how data is displayed.

B. property specifies the value that gets entered automatically in a field when records are created.

C. property specifies the number of places to the right of the decimal.

D. property sets whether the data entry in the field can be skipped or is mandatory.

Right Answer is: A

SOLUTION

Format Example is the property to control how data is displayed. You can use predefined formats or customise your own.


Q. 194563 The Length property


A. specifies the value that gets entered automatically in a field when records are created.

B. sets the maximum length of text field or numeric field.

C. null

D. specifies the number of places to the right of the decimal.

Right Answer is: B

SOLUTION

The Length property sets the maximum length of text field or numeric field.


Q. 194564 The Entry Required field property


A. specifies the number of places to the right of the decimal.

B. specifies the value that gets entered automatically in a field when records are created.

C. controls how data is displayed.

D. sets whether the data entry in the field can be skipped or is mandatory.

Right Answer is: D

SOLUTION

The field properties control the behaviour of a field. In BASE, following Field Properties’ categories can be assigned: Entry Required, Length, Decimal Places, Default Value and Format Example.


Q. 194565 To store images, we should use


A. text data types.

B. date/time data types.

C. special data types.

D. numeral data types.

Right Answer is: C

SOLUTION

In OOo BASE, the data types belong to one of the following categories: a. Text data types: To store strings and text type values. b. Date/Time data types: To store dates, times etc. c. Numeral data types: To store all types of numbers. d. Special data types: To store other types of data, e.g., images etc.


Q. 194566 Bhavya is a Sales Manager. She wants to maintain a database containing the information of all the sales persons in his company. The data that she wants to store is as follows: Salesman Id, First Name, Last Name, Sales Made and Target. To fulfill her requirements, she should use


A. forms.

B. tables.

C. reports.

D. queries.

Right Answer is: B

SOLUTION

A table refers to a storage container storing data pertaining to single object, subject or purpose. To store the data, we can create one table for each type of information that we track. To bring the data from multiple tables together in a query, form or report, we can define relationships between the tables.


Q. 194567 Sunaina works as a programmer in a college. The Dean has asked her to handle the information of class 10th students, such as their rollno, name and aggregate marks obtained in their pre-boards. As per the given information, the key that uniquely identifies each record is known as


A. alternate key.

B. primary key.

C. secondary key.

D. candidate key.

Right Answer is: B

SOLUTION

One or more fields (columns) whose value or values uniquely identifies each record in a table is called Primary Key.


Q. 194568 A programmer at the State Bank of India has been asked to create a table Account with AccNo and AccName in OOo Base. The data type for AccName field is


A. Integer.

B. Text (fix) [CHAR].

C. Text [VARCHAR].

D. Date [DATE].

Right Answer is: C

SOLUTION

The data type for AccName field is Text [VARCHAR], because it helps us to share variable characters.


Q. 194569 The MAX hospital has multiple branches in different states. Many doctors work for the company and each doctor takes care of multiple patients. Some doctors just work in one branch, and others work in different branches on different days. To keep information about each doctor, such as name, address, contact phones, area of specialisation and so on. The hospital needs a/an


A. inventory house.

B. database.

C. storage room.

D. files.

Right Answer is: B

SOLUTION

A database is a collection of interrelated data stored together to serve multiple applications. Here, each patient can be assigned to one or more doctors. Specific patient information can also be kept in the database (name, address, phones, health record number, date of birth, history of appointments, prescriptions, blood tests, diagnoses etc.).


Q. 194570 What is a data type?
A. inventory house.
B. database.
C. storage room.
D. files.

Right Answer is:

SOLUTION

Data types are the properties of each field. The attribute of a field that determines the kind of data the field can contain is called data type. For example, Roll No as Number, Name as Text, Date_Of_Birth as Date etc.


Q. 194571 What happens when you enter numbers in a Text data type field?
A. inventory house.
B. database.
C. storage room.
D. files.

Right Answer is:

SOLUTION

When we enter numbers in a Text data type field, Base will accept if there is no validation rule or any validation text.


Q. 194572 A table named School (containing data of students) is created where each record consists of several fields including AdmissionNo (Admission Number) RollNo (Roll Number) and Name. Which field, out of these three should be set as Primary Key and why?
A. inventory house.
B. database.
C. storage room.
D. files.

Right Answer is:

SOLUTION

AdmissionNo should be set as Primary Key. As primary key is the unique key, therefore AdmissionNo in a school is a unique record.


Q. 194573 In Base, for which type of field is “Default value” property not applicable?
A. inventory house.
B. database.
C. storage room.
D. files.

Right Answer is:

SOLUTION

The field which does not have Default value property is Binary.


Q. 194574 Firewall protects a server and individual PC from


A. virus.

B. software.

C. messages.

D. privacy.

Right Answer is: A

SOLUTION

Firewall protects a server, a network and individual PCs from attacks by viruses and hackers. It also protects the resources of a private network from users of other networks.


Q. 194575 The advantage of online backup is that it saves our data from


A. hackers.

B. crackers.

C. spams.

D. catastrophic failures.

Right Answer is: D

SOLUTION

Online backup is a type of off-site backup. It stores your data at different locations in different countries. So, there is no risk of losing the data due to natural disasters.


Q. 194576 Unique digital-ID code attached to a message is known as


A. SSL.

B. firewall.

C. SDL.

D. digital signature.

Right Answer is: D

SOLUTION

Digital signature is a digital code that can be attached to an electronically transmitted message that uniquely identifies the sender.


Q. 194577 A malicious program that causes damage to the data and files on a system is known as


A. spyware.

B. adware.

C. computer virus.

D. malware.

Right Answer is: C

SOLUTION

Computer viruses are small programs or scripts that can negatively affect your computer. These malicious little programs can create files, move files, erase files and cause your computer not to function correctly. Some viruses can duplicate themselves, attach themselves to programs and travel across networks.


Q. 194578 A program that appears harmless but actually performs malicious functions is known as


A. spyware.

B. spam.

C. trojan horse.

D. phishing.

Right Answer is: C

SOLUTION

Trojan horse is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer.


Q. 194579 Sending of bulk mail by an identified or unidentified source is known as


A. malware.

B. adware.

C. spyware.

D. spam.

Right Answer is: D

SOLUTION

Spamming refers to sending of bulk mail by an identified or unidentified source. In non-malicious form, advertising mails in bulk are sent to many accounts. In malicious form, the attackers keep on sending bulk mail until the mail server runs out of disk space.


Q. 194580 Acquiring sensitive information like passwords, credit cards information etc. is known as


A. malware.

B. phishing.

C. hacking.

D. adware.

Right Answer is: B

SOLUTION

Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user name, passwords, credit cards information, account etc.


Q. 194581 A process in which all files and folders are backed up on a remote server is known as


A. online backup.

B. differential.

C. full backup.

D. storage backup.

Right Answer is: A

SOLUTION

Online backup is a type of offsite backup. Any files or folders are backed up onto a remote server. For the online backup. there are numerous providers on the internet that charge for storage. Fees are typically based on capacity.


Q. 194582 The activity that stores duplicate data for later use is known as


A. denial of service.

B. database.

C. backup.

D. phishing.

Right Answer is: C

SOLUTION

Backup is the activity of copying files or databases so that they will be preserved in case of equipment failure or any other catastrophe. Backup is usually a routine part of the operation of large businesses.


Q. 194583 A program that deletes all the data from a computer is


A. adware.

B. sweeper.

C. firmware.

D. malware.

Right Answer is: B

SOLUTION

Sweeper is a malicious program used by hackers. Using this, one can erase the cache, cookies, typed urls, history of Internet Explorer, recent documents list and recent run list of windows.


Q. 194584 Spamming refers to sending


A. viruses.

B. junk mails.

C. messages.

D. malware.

Right Answer is: B

SOLUTION

Spamming refers to commercial advertisements distributed online. Mostly spam comes to people via email. It can also be found in online chat rooms and message boards.


Q. 194585 The copy of data that can be used to restore and recover data is known as


A. backup.

B. copied data.

C. restoration data.

D. recovery.

Right Answer is: A

SOLUTION

Backup is the activity of copying files or databases so that they can be preserved in case of equipment failure or any other catastrophe (flood, fires etc).


Q. 194586 Software Piracy refers to unauthorised


A. access to the hardware components.

B. duplication of computer software.

C. access to the system.

D. access to the mail.

Right Answer is: B

SOLUTION

Software Piracy is the unauthorised duplication of computer software. It means denial of intellectual property rights to the software creator/developer. Developing a software application involves a major investment of time, money and effort.


Q. 194587 A digital code that is attached to your message is known as


A. digital message.

B. digital certificates.

C. digital proof.

D. digital signature.

Right Answer is: D

SOLUTION

Digital signature meets the need of authentication and integrity. It is a digital code that can be attached to an electronically transmitted message that uniquely identifies the sender.


Q. 194588 The common trojan horse virus is a/an


A. e-mail attachment.

B. e-commerce site.

C. e-shopping.

D. hardware component.

Right Answer is: A

SOLUTION

Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage. Example – email attachments and free downloading of games.


Q. 194589 A program designed to replicate and eat up a computer’s storage is called


A. mail.

B. spam.

C. worm.

D. virus.

Right Answer is: C

SOLUTION

A worm is a program very similar to a virus. It has the ability to self-replicate and can cause to negative effects on your system. Worms reproduce programs that run independently and travel across network connections.


Q. 194590 Software that spies on your computer activities is


A. malware.

B. stealth ware.

C. spyware.

D. adware.

Right Answer is: C

SOLUTION

Spyware refers to programs that use your internet connection to send information from your personal computer to some other computer normally without your knowledge or permission.


Q. 194591 Data recovery means


A. getting back the storage device.

B. storage of data.

C. transfer of data.

D. getting back the lost data.

Right Answer is: D

SOLUTION

Data recovery software is often used whenever files are deleted from a computer hard drive, either by fault of the user or by automated actions initiated by the computer's software. The files may have been deleted from within your system. However by using the correct software, it is possible to retrieve this deleted data.


Q. 194592 One can remove the viruses by


A. installing antivirus.

B. taking back-up.

C. clicking on unknown links.

D. clicking only on known links.

Right Answer is: A

SOLUTION

Antivirus is the name given to software that detects and removes viruses from hard disk (messages). Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses.


Q. 194593 Tricking people through authentic looking email or website is called


A. denial of service.

B. hacking.

C. malware.

D. phishing.

Right Answer is: D

SOLUTION

Phishing is an e-mail fraud method in which the perpetrator sends out email in an attempt to gather personal and financial information. Typically, the messages appear to come from well known & trustworthy websites. Example - eBay, MSN, Yahoo etc.


Q. 194594 How can you decide a field type in Base?
A. denial of service.
B. hacking.
C. malware.
D. phishing.

Right Answer is:

SOLUTION

If the field is going to have general information in it (for example a name or a description), then you should use text. If the field will always contain a number (for example a price), then type should be decimal or another appropriate numerical field.


Q. 194595 What is the importance of VARCHAR field format/type?
A. denial of service.
B. hacking.
C. malware.
D. phishing.

Right Answer is:

SOLUTION

Base uses VARCHAR as the field format for text fields. This format only uses the actual number of characters in a field up to the limit set. So, a field containing 20 characters will only use space for 20 characters even if the limit is set at 100. So, two names containing 25 and 32 characters respectively will use space for 25 and 32 characters and not 100 characters.


Q. 194596 Study the following data and answer the questions that follow:   Table: ACCOUNT
Acc_No Cust_Name Transaction Balance
A101 Ram Prasad Withdrawal 10,000
A102 Kamla Deposit 1,50,000
A103 Ramakant Deposit 12,000
A104 Sunita Withdrawal 36,000
            1.   Suggest the data types that should be used for each of the fields in the above. 2. Suggest a field from the above table that can be set as primary key.
A. denial of service.
B. hacking.
C. malware.
D. phishing.

Right Answer is:

SOLUTION

1. The data types are:

   Field Name           Data Type

    Acc_No                  Varchar

  Cust_Name                Text

 Transaction                 Text

 Balance                      Number

2. The primary key is: Acc_No


Q. 194597 Write down the steps to set a Primary Key for a table.
A. denial of service.
B. hacking.
C. malware.
D. phishing.

Right Answer is:

SOLUTION

The steps to set a Primary Key for a table are:

(1) Right click on the Table whose Primary key you wish to set or change and select Edit.

(2) Right click on the field that you wish to set as the primary key.
(3) Click on the Primary Key in the contextual menu.


Q. 194598 Distinguish between Number and Autonumber data type fields. Give example of each.
A. denial of service.
B. hacking.
C. malware.
D. phishing.

Right Answer is:

SOLUTION

Number – This field stores numbers. The range of numeric values they can store depends on the value you select from the Field Size property’s drop-down menu. For example, in a table Student, rollno is a Number type field.

AutoNumber – This data type starts with a number for the first record and increases the number by a set amount in subsequent records. For example, in a table Bank, the accno (Account No.) is an AutoNumber field, for every new customer, the accno field will automatically increment and give new number.


Q. 194599 Write one example of each field for which you would use 
(i) Text data type and 
(ii) Memo.
A. denial of service.
B. hacking.
C. malware.
D. phishing.

Right Answer is:

SOLUTION

If Student is a table and rollno, name and description are fields, then name will be a Text Field and description is a Memo Field because name is a character entry field. Therefore in Base, characters can be entered in text type field. Similarly, if we want to enter lengthy information, then the field type must be memo type. The reason is that memo fields contain alphanumeric characters, though memo fields can store much more data than text fields, i.e., up to 64,000 characters.


Q. 194600 A program that is designed to replicate itself is known as


A. virus.

B. firewall.

C. worm.

D. phishing.

Right Answer is: C

SOLUTION

A worm is a program designed to replicate. It runs independently and travels from computer to computer across network connections.


PreviousNext