A.
B.
C.
D.
XML tags are not predefined. We can create and define new tags as per our needs.
A. designed to display data.
B. designed to be self-descriptive.
C. platform dependent.
D. inextensible.
XML tags are not predefined, rather these are to be created by the author to describe the content in appropriate manner. Therefore, each XML document is unique in itself and is able to describe its contents without prior knowledge.
A. subset of SGML.
B. super set of SGML.
C. complex set of SGML.
D. minor set of SGML.
XML is a subset of SGML, i.e., SGML minus its complex and optional features. XML is based on SGML. It includes only the parts of SGML required for web publishing. XML did not include complex and optional features of SGML.
A.
B.
C.
D.
HTML is about displaying information, while XML is about describing information. HTML is designed to display data and hence, focussed on the ‘look’ of the data.
A.
B.
C.
D.
XML tags are case-sensitive whereas HTML tags are not case-sensitive. In XML, < parts >, < Parts > and < PARTS > are not the same. The XML processing instruction must be all lowercase. However, our own elements and attributes may be in any case.
A. Declaration Type Document.
B. Document Type Definition.
C. Definition Type Document.
D. Definition Type Declaration.
The document type declaration consists of Markup code that indicates grammar rules for the particular class of the document. Grammar rules are called Document Type Definition (DTD). A DTD begins with !DOCTYPE declaration.
A.
B.
C.
D.
SGML stands for Standard Generalized Markup Language. It is powerful but very complex and suffers from lack of industry support. It is the basis for XML.
A.
B.
C.
D.
XML documents can be viewed only if proper stylesheet file is also available along with XML file.
A. < xml version="1.0" / >.
B. < ?xml version="1.0" / >.
C. < ?xml version="1.0"/ >.
D. < ?xml version="1.0"? >.
The XML declaration begins with a special tag < ?xml…? >. It can have three pseudo attributes as explained below:
Well-formed documents and valid documents.
The three pseudo-attributes of XML are: version, encoding and standalone.
There are two types of entities: Internal entity and External entity.
A. hackers.
B. breakers.
C. burglers.
D. crackers.
Hacking refers to the attempts to gain information from undisclosed areas. Mostly hackers hack systems with malicious intent and damage some of the important system information.
A. spyware.
B. adware.
C. backup.
D. malware.
Adware is a type of spyware that records search information and forwards it to an advertising agency or market research firm that later uses it to tailor pop-up ads for delivery to users without their knowledge or consent.
A. developer gets credit for the creation of the software.
B. developer doesn't get popularity for the creation of the software.
C. programmer gets more programs to write.
D. software becomes popular.
Software ethics refer to ensuring that the software being used is not pirated or unauthorised. It also includes that the software developers should be given a fair return of their work.
A. firewall.
B. SSL.
C. SDL.
D. digital signature.
Secure Sockets Layer (SSL) is a secure protocol developed for sending information securely over the internet. SSL is an industry standard which is used by millions of websites in the protection of their online transactions with their customers.
A. remote server.
B. CD.
C. software.
D. database.
Online backup is also known as remote backup because all the files and folders are stored on a remote server. A number of companies provide online backup services like Badongo, BigFileBox, Media Fire etc.
A. worms.
B. Torjan.
C. malware.
D. adware.
Most worms disrupt services and create system management problems. Some worms scan for passwords and other loopholes and then send the information back to the attacker. In some cases, worms can install trojan horses or viruses that can cause damage to the systems.
A. mail.
B. spam.
C. worm.
D. virus.
Spam is the flooding of many copies of the same message in an attempt to force the message on people who would not otherwise choose to receive it. Mostly spam includes commercial advertising, often for dubious products, get-rich-quick schemes etc.
A. social ethics.
B. computer ethics.
C. information ethics.
D. technology ethics.
Ethics is a set of moral principles that govern the behaviour of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns and how computers affect the society.
A. un-ware.
B. harmware.
C. malware.
D. adware.
Malware is any program or file that is harmful to a computer user. It includes computer viruses, worms, trojan horses, spyware and programming that gathers information about a computer user without his/her permission.
A. software.
B. knowledge.
C. malicious intent.
D. high thinking.
Hackers are basically interested in gaining knowledge about computer systems and use this for playful pranks. Mostly hackers hack systems with malicious intent and damage important system information.
A. computer virus.
B. crackers.
C. operating system.
D. software.
Computer viruses are malicious codes/programs that cause damage to data and files on a system. A virus can attack any part of the computer software such as boot block, operating system, files etc.
A. programmer.
B. cracker.
C. hacker.
D. network administrator.
Hacker is the person who enjoys in exploring the details of programmable system. They are more interested in gaining knowledge about computer systems and possibly use this knowledge for playful pranks.
A. programmer.
B. cracker.
C. hacker.
D. network administrator.
A cracker is a computer user who attempts to break the copyrighted software or a network computer system. Sometimes this is done with the intent of releasing the software, so that it can be used without paying royalties.
A.
B.
C.
D.
A worm is a program very similar to a virus. It has the ability to self-replicate and can cause negative effects on your computer.
A. hacking and piracy.
B. hacking and cracking.
C. unauthorised access and login.
D. illegal use of documents and data.
Two major threats in security of software and information resources are:
• Hacking
• Cracking
The two types of backup are:
(i) Full backup
(ii) Differential backup
A. 9.
B. 3.
C. 5.
D. 6.
Small Integer [SMALLINT] field accepts integers or whole numbers with a fixed length of five (5) spaces, i.e., 5 digits numbers.
A. formatting.
B. default value.
C. forms.
D. queries.
Formatting is used to control the look of data entered in a field. The formatting types depend upon the field types.
A. TEXT Data Type.
B. MBD
C. OBD
D. ODB
The .odb file extension is most commonly associated with the OpenOffice database application.
A. DATE/TIME data type.
B. Numeral data type.
C. Text data type.
D. Special data type.
Numeral Data Types are classified into two sub-categories – Whole Number data type and Fractional Values data types. The Whole Number data types are Tiny Integer, Small Integer, Integer and Big Integer. The Fractional Values data types are Float, Real, Double, Numeric and Decimal.
A. variable length text datatype.
B. fixed length text datatype.
C. date type datatype.
D. special data type.
Text [VARCHAR] is default field type when you create a new field. The default length (field-width) is 50 but can be altered using Length property. In this type of field, BASE stores only characters entered, maximum up to the specified length. However, if the data entered is shorter than the length specified, no trailing spaces are padded. It is variable-length text datatype.
A. variable length text datatype.
B. fixed length text datatype.
C. date type datatype.
D. special data type.
The Text (fix) char data type stores exactly the length specified by the user. The default length (field-width) is 50. This value can be altered using Length property. If the data entered in the field type is less than the length specified, then BASE pads the field with trailing spaces. It is fixed length text datatype.
A. 10.
B. 90.
C. 35.
D. 50.
It is default field type when you create a new field. The default length (field-width) is 50 but can be altered using Length property. In this type of field, BASE stores only characters entered, maximum up to the specified length. However, if the data entered is shorter than the length specified, no trailing spaces are padded.
A. 48.
B. 50.
C. 90.
D. 10.
The Text (fix) char data type stores exactly the length specified by the user. The default length (field-width) is 50. This value can be altered using Length property.
A. variable length fields.
B. fixed length fields.
C. field types.
D. special data types.
Variable length Fields have varied lengths, i.e., field length is determined separately for every data element inside the field. There is no wastage of space, however, processing is complex.
A. Field Types.
B. Data Types.
C. Fixed length fields.
D. Numeral data types.
Fixed lengths have fixed lengths, i.e., they occupy fixed number of bytes for every data element they store. These numbers of bytes are determined by maximum number of characters the fields can store.
A. Field Type.
B. Field Length.
C. Field Name.
D. Primary Key.
Field name is the label that tells what type of information is being stored in this field. For example, EID tells us that the field stores the ID of the employees.
A. field.
B. file.
C. record.
D. entry.
Databases store information in the form of records. Each RECORD represents a unique item in the database. Records consist of fields. Each FIELD represents a unique piece of information about the record.
A. column.
B. field.
C. file.
D. row.
A record is a collection of data items that represent a complete unit of information. A record is also known as a row of information in a table.
A. table.
B. relation.
C. record.
D. tree.
An ordered set of fields, usually stored contiguously is known as a record.
A. status bar.
B. menu bar.
C. tool bar.
D. title bar.
Status bar is located on the lower left corner of BASE window and this reports all the progress of database processing.
A. provides all common multimedia presentation tools.
B. has all the advanced analysis, charting and decision making features.
C. provides tools for day-to-day database work within a simple interface.
D. is a tool for creating letters, books, reports, newsletters etc.
Base can create and edit forms, reports, queries, tables, views and relations so that managing a connected database is much the same as in other popular database applications.
A. database.
B. record.
C. table.
D. DBMS.
One or more fields (columns) whose value or values uniquely identifies each record in a table is called a primary key.
A. .ods
B. .odc
C. .odb
D. .odx
The database file of BASE is stored with extension .odb that expands to OpenOffice database.
A. flat database.
B. forms.
C. relational database.
D. tables.
When the data is stored in multiple tables that are linked via common fields, then such a database is called relational database. Microsoft Access, BASE, Oracle, MYSQL etc. are examples of Relational Database.
A. tables.
B. queries.
C. forms.
D. formula bars.
When a database is open, it displays various object buttons to navigate through various database objects like Tables, Queries, Forms and Reports etc.
A. facts and entities relevant to user.
B. raw material.
C. a set of numbers and alphabet.
D. input material for a computer.
Data is a collection of facts and entities relevant to user because it produces some meaningful information.
A. input.
B. information.
C. database.
D. suite.
Information adds context and meaning to the data. This gives it a meaning so that people can understand it. Data must have some kind of headings or structure around it to become information.
A. Access.
B. FoxPro.
C. Excel.
D. Base.
A database is a collection of information that is related to a particular subject or purpose, e.g. student database, event management database etc.BASE (database component of OpenOffice.org), which is a popular RDBMS (Relational Database Management System – a system that manages data in terms of special tables called relations), lets us manage the database by offering a variety of features.
A. Memo [LONGVARCHAR]
B. Text (fix) [CHAR]
C. Text [VARCHAR]
D. Text [VARCHAR - IGNORECASE]
Text [VARCHAR - IGNORECASE] is similar to Text [VARCHAR] except for one thing. Case of the letters is ignored in it. It simply converts everything into capitals as you type.
A. Integer.
B. Text (fix) [CHAR].
C. Text [VARCHAR].
D. Date [DATE].
The data type for EmpName field is Text [VARCHAR] because it helps us to share variable characters.
A.
B.
C.
D.
Image [LONGVARBINARY] field is specifically designed if you want to put an image as an entry to the field. However, it is dependent on the capability of OOo BASE if it can display or process the type of image entered in code.
A. [TIME].
B. [DATE].
C. [DATESTAMP].
D. [TIMESTAMP].
Date/Time [TIMESTAMP] field type is a combination of above mentioned data types, i.e., Data and Time field types. Its format can also be changed using Format property.
A. is set to handle a “Yes” or “No” input, which is a common boolean argument.
B. is specifically designed to put an image as an entry to the field.
C. is set to handle any kind of binary “code” that you may want to enter.
D. is set to have a fixed length in terms of spaces.
The Binary [VARBINARY] is set to handle any kind of binary “code” that you may want to enter. This actually may include varied kinds of files, including encrypting ones if you like. It is dependent on the capability of OOo BASE if it can display or process the code you entered.
A.
B.
C.
D.
Format Example is the property to control how data is displayed. You can use predefined formats or customise your own.
A.
B.
C. null
D.
The Length property sets the maximum length of text field or numeric field.
A.
B.
C.
D.
The field properties control the behaviour of a field. In BASE, following Field Properties’ categories can be assigned: Entry Required, Length, Decimal Places, Default Value and Format Example.
A. text data types.
B. date/time data types.
C. special data types.
D. numeral data types.
In OOo BASE, the data types belong to one of the following categories:
A.
B.
C.
D.
A table refers to a storage container storing data pertaining to single object, subject or purpose. To store the data, we can create one table for each type of information that we track. To bring the data from multiple tables together in a query, form or report, we can define relationships between the tables.
A.
B.
C.
D.
One or more fields (columns) whose value or values uniquely identifies each record in a table is called Primary Key.
A.
B.
C.
D.
The data type for AccName field is Text [VARCHAR], because it helps us to share variable characters.
A.
B.
C.
D.
A database is a collection of interrelated data stored together to serve multiple applications. Here, each patient can be assigned to one or more doctors. Specific patient information can also be kept in the database (name, address, phones, health record number, date of birth, history of appointments, prescriptions, blood tests, diagnoses etc.).
A. virus.
B. software.
C. messages.
D. privacy.
Firewall protects a server, a network and individual PCs from attacks by viruses and hackers. It also protects the resources of a private network from users of other networks.
A. hackers.
B. crackers.
C. spams.
D. catastrophic failures.
Online backup is a type of off-site backup. It stores your data at different locations in different countries. So, there is no risk of losing the data due to natural disasters.
A. SSL.
B. firewall.
C. SDL.
D. digital signature.
Digital signature is a digital code that can be attached to an electronically transmitted message that uniquely identifies the sender.
A. spyware.
B. adware.
C. computer virus.
D. malware.
Computer viruses are small programs or scripts that can negatively affect your computer. These malicious little programs can create files, move files, erase files and cause your computer not to function correctly. Some viruses can duplicate themselves, attach themselves to programs and travel across networks.
A. spyware.
B. spam.
C. trojan horse.
D. phishing.
Trojan horse is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer.
A. malware.
B. adware.
C. spyware.
D. spam.
Spamming refers to sending of bulk mail by an identified or unidentified source. In non-malicious form, advertising mails in bulk are sent to many accounts. In malicious form, the attackers keep on sending bulk mail until the mail server runs out of disk space.
A. malware.
B. phishing.
C. hacking.
D. adware.
Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user name, passwords, credit cards information, account etc.
A. online backup.
B. differential.
C. full backup.
D. storage backup.
Online backup is a type of offsite backup. Any files or folders are backed up onto a remote server. For the online backup. there are numerous providers on the internet that charge for storage. Fees are typically based on capacity.
A. denial of service.
B. database.
C. backup.
D. phishing.
Backup is the activity of copying files or databases so that they will be preserved in case of equipment failure or any other catastrophe. Backup is usually a routine part of the operation of large businesses.
A. adware.
B. sweeper.
C. firmware.
D. malware.
Sweeper is a malicious program used by hackers. Using this, one can erase the cache, cookies, typed urls, history of Internet Explorer, recent documents list and recent run list of windows.
A. viruses.
B. junk mails.
C. messages.
D. malware.
Spamming refers to commercial advertisements distributed online. Mostly spam comes to people via email. It can also be found in online chat rooms and message boards.
A. backup.
B. copied data.
C. restoration data.
D. recovery.
Backup is the activity of copying files or databases so that they can be preserved in case of equipment failure or any other catastrophe (flood, fires etc).
A. access to the hardware components.
B. duplication of computer software.
C. access to the system.
D. access to the mail.
Software Piracy is the unauthorised duplication of computer software. It means denial of intellectual property rights to the software creator/developer. Developing a software application involves a major investment of time, money and effort.
A. digital message.
B. digital certificates.
C. digital proof.
D. digital signature.
Digital signature meets the need of authentication and integrity. It is a digital code that can be attached to an electronically transmitted message that uniquely identifies the sender.
A. e-mail attachment.
B. e-commerce site.
C. e-shopping.
D. hardware component.
Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage. Example – email attachments and free downloading of games.
A. mail.
B. spam.
C. worm.
D. virus.
A worm is a program very similar to a virus. It has the ability to self-replicate and can cause to negative effects on your system. Worms reproduce programs that run independently and travel across network connections.
A. malware.
B. stealth ware.
C. spyware.
D. adware.
Spyware refers to programs that use your internet connection to send information from your personal computer to some other computer normally without your knowledge or permission.
A. getting back the storage device.
B. storage of data.
C. transfer of data.
D. getting back the lost data.
Data recovery software is often used whenever files are deleted from a computer hard drive, either by fault of the user or by automated actions initiated by the computer's software. The files may have been deleted from within your system. However by using the correct software, it is possible to retrieve this deleted data.
A. installing antivirus.
B. taking back-up.
C. clicking on unknown links.
D. clicking only on known links.
Antivirus is the name given to software that detects and removes viruses from hard disk (messages). Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses.
A. denial of service.
B. hacking.
C. malware.
D. phishing.
Phishing is an e-mail fraud method in which the perpetrator sends out email in an attempt to gather personal and financial information. Typically, the messages appear to come from well known & trustworthy websites. Example - eBay, MSN, Yahoo etc.
|
Acc_No |
Cust_Name |
Transaction |
Balance |
|
A101 |
Ram Prasad |
Withdrawal |
10,000 |
|
A102 |
Kamla |
Deposit |
1,50,000 |
|
A103 |
Ramakant |
Deposit |
12,000 |
|
A104 |
Sunita |
Withdrawal |
36,000 |
A. virus.
B. firewall.
C. worm.
D. phishing.