CBSE - MCQ Question Banks (के. मा. शि. बो . -प्रश्नमाला )

PreviousNext

Q. 194601 The programmers that break into secure systems for malicious purpose are


A. hackers.

B. crackers.

C. analysts.

D. network engineers.

Right Answer is: B

SOLUTION

Crackers are the programmers that break the secure systems for malicious purpose.


Q. 194602 The attack which finishes all resources of a computer and stops all applications is related to


A. virus.

B. denial of services.

C. sweep.

D. worm.

Right Answer is: B

SOLUTION

Denial of services eats up all the resources of a system and the system or the applications come to a halt. Example of such an attack is flooding a system with the junk mail.


Q. 194603 Software that spies on a user’s activities on computer and reports about it is known as


A. malware.

B. adware.

C. spyware.

D. spam.

Right Answer is: C

SOLUTION

A spyware is a software which is installed on your computer to spy on your activities and reports this data to people willing to pay for it. These are used to spy on someone either for legal or illegal purpose.


Q. 194604 A digital document issued by certification authority to a site is known as


A. SSL.

B. digital certificate.

C. SDL.

D. digital signature.

Right Answer is: B

SOLUTION

A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web. It is issued by a Certification Authority (CA). It contains your name, a serial number, expiration dates and a copy of the certificate holders.


Q. 194605 A term that refers to infectious software such as virus is known as


A. malware.

B. hacking.

C. cracking.

D. adware.

Right Answer is: A

SOLUTION

Malware refers to software programs designed to damage or do other unwanted actions on a computer system. Common examples of malware include viruses, worms, trojan horses and spyware.


Q. 194606 The attempt to gain information from undisclosed areas is known as


A. authorised access.

B. unauthorised login.

C. hacking.

D. unauthorised access.

Right Answer is: C

SOLUTION

Hacking refers to the attempts to gain information from undisclosed areas. Mostly hackers hack systems with malicious intent and damage some of the important system information.


Q. 194607 Computer viruses are


A. malicious code.

B. non-malicious code.

C. utility program.

D. text editor.

Right Answer is: A

SOLUTION

Computer viruses are malicious codes that cause damage to the data and files on systems. Viruses can attack any part of a computer’s software such as boot block, operating system, files etc.


Q. 194608 The type of backup in which only the data that changed since last backup is saved is known as


A. backup.

B. add-backup.

C. copy backup.

D. differential backup.

Right Answer is: D

SOLUTION

Differential backup contains all the files that have changed since the last FULL backup. The advantage of a differential backup is that it shortens restore time compared to a full backup. However, if you perform the differential backup too many times, the size of the differential backup might grow to be larger than the baseline full backup.


Q. 194609 A self-replicating program that eats up the entire disk space or memory is known as


A. malware.

B. adware.

C. spyware.

D. worm.

Right Answer is: D

SOLUTION

A worm is a program very similar to a virus. It has the ability to self-replicate and can cause negative effects on your system, as they reproduce programs that run independently and travel across network connections.


Q. 194610 A virus that is often disguised as a useful computer program is known as a


A. trojan horse.

B. spyware.

C. worm.

D. hacker.

Right Answer is: A

SOLUTION

A trojan horse is a program that appears harmless but actually performs malicious functions such as deleting or damaging files.


Q. 194611 SSL security technology establishes an encrypted link between the


A. browser and web server.

B. browser and user computer.

C. hacker and cracker.

D. virus and worms.

Right Answer is: A

SOLUTION

SSL is a secured protocol developed for sending information securely over the internet. SSL is most commonly seen on the Web (HTTP). It is also used to secure other internet services such as sending e-mail, e-shopping, e-reservation etc.


Q. 194612 An attacker slows down the speed of our mail server by sending a


A. pop.

B. ghost.

C. spam.

D. spoof.

Right Answer is: C

SOLUTION

Spamming refers to the sending of bulk mail by an identified or unidentified source. In non-malicious form, bulk advertising mail is sent to many accounts. In malicious form, the attacker keeps on sending bulk mails until the mail server slows down or runs out of disk space.


Q. 194613 A malicious program that deletes all the data from the system is known as


A. spam.

B. sweeper.

C. phishing.

D. adware.

Right Answer is: B

SOLUTION

Sweeper is a malicious program used by hackers. By using this, one can erase the cookies, urls, history of internet explorer, recent documents list etc.


Q. 194614 In a residential university, two files are maintained – one for school and the other for hostel. Ramesh, who is a hosteler, informs the university authorities as well as the hostel authorities about the change of his address. But, the school authorities forgot to change the student’s address, but hostel file is maintained with changed address. This situation leads to


A. data inconsistency.

B. data redundancy.

C. unsharable data.

D. data insecurity.

Right Answer is: A

SOLUTION

Here, there are two addresses pertaining to the same student. Such a situation is called data inconsistency. Data inconsistency exists when different and conflicting versions of the same data appear in different places.


Q. 194615 Ajay inserted his ATM card into the automatic teller machine (ATM) in a bank. The machine read his ID number printed on the card and then asked him to enter his pin code (password). In DBMS, you can call it as


A. sharing of data.

B. data inconsistency.

C. data security.

D. data redundancy.

Right Answer is: C

SOLUTION

Data security is the protection of database from unauthorised users. Only authorised persons are allowed to access the database. Most of the users are allowed to access a part of the database, i.e., the data that is related to them or related to their department. Most of the DBMSs provide security sub-system, which the DBA uses to create accounts of users and to specify account restrictions. The user enters his/her account number (or user name) and password to access the data from database.


Q. 194616 A health provider company has multiple offices in many different states. Many doctors work for the company and each doctor takes care of multiple patients. Some doctors just work in one office and others work in different offices on different days. To keep information about each doctor, such as name, address, contact phones, area of specialization etc., the company needs a/an


A. inventory house.

B. database.

C. storage room.

D. file.

Right Answer is: B

SOLUTION

A database is a collection of interrelated data stored together to serve multiple applications. Here, each patient can be assigned to one or more doctors. Specific patient information can also kept in the database (name, address, phones, health record number, date of birth, history of appointments, prescriptions, blood tests, diagnoses etc.).


Q. 194617 In a school, student records are maintained. The hostel also maintains records of all those school students who live in the hostel. Even though the records for hostel students are already maintained by the school, the hostel keeps a separate copy of it, which results in the duplication of the data. This duplication of data is called


A. data inconsistency.

B. data redundancy.

C. unstandardised data.

D. unsharable data.

Right Answer is: B

SOLUTION

Data redundancy occurs when the data file or the database file contains redundant (unnecessarily duplicated) data. That is why one major goal of good database design is to eliminate data redundancy.


Q. 194618 Harish Narain is working as a S.E. with Q-Equip. For every employee, the company maintains two files - one for Admin Dept. and the other for HR Dept. Now, Harish informed both the departments about his new correspondence address. But, the Admin Dept. forgot to change it. This situation will lead to


A. data redundancy.

B. unsharable data.

C. insecure data.

D. data inconsistency.

Right Answer is: D

SOLUTION

Data inconsistency exists when different and conflicting versions of the same data appear in different places. Data inconsistency creates unreliable information, because it will be difficult to determine which version of the information is correct.


Q. 194619 Define DBMS.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Database Management System (DBMS) is a computer program that manages a database effectively and efficiently.


Q. 194620 What is a file?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

A file is a collection of logically related records.


Q. 194621 Name the database that is used in OpenOffice.org.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

OOo Base


Q. 194622 Write the full form of RDBMS.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Relational Database Management System


Q. 194623 What is the alternative name of a record in a table?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Row


Q. 194624 What do you understand by entity?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

An entity is a collection of fields that user wants to collect and store.


Q. 194625 Define Primary Key.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

A field that uniquely identifies records in the table is known as Primary Key.


Q. 194626 What is the alternative name of a field in a table?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Column


Q. 194627 Define data inconsistency.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

The multiple mismatching copies of same data is known as data inconsistency.


Q. 194628 What does DBMS stand for?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

DBMS stands for Database Management System.


Q. 194629 What is the advantage of using database?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Storage and retrieval of data becomes convenient and faster.


Q. 194630 What do you understand by the term ‘database’?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Database is a collection of related information organised as tables.


Q. 194631 Explain Primary Key with the help of an example.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

One or more fields (columns) whose value or values uniquely identify each record in a table is called Primary Key. For example, if Student is a table and rollno, name, class etc. are the fields, then rollno is the Primary Key because it is a unique field in the Student table.


Q. 194632 What are the components of OpenOffice.org Base Window?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

The components of OpenOffice.org Base Window are: Tables, Queries, Forms and Reports.


Q. 194633 What is the difference between ‘Rows’ and ‘Columns’ in a table?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

In a table, rows are called the records and columns are called fields. A row stores complete information of a record, whereas a column stores only similar data values for number of records.


Q. 194634 Which field property sets limits on the data that is entered?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Field Length property


Q. 194635 Which field property specifies that the field can be left empty when entering data into a record?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Format property


Q. 194636 List all possible attributes for a student entity.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Name, Rollno, Marks, Address, Phone no and Date of birth.


Q. 194637 Which property would you set if you want to be sure that a FirstName Field has a value for each record?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Default value


Q. 194638 Write one example for which memo data type is used.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Let us consider a field called Description field for Company table, which is a memo data type and stores up to 64,000 characters.


Q. 194639 Sudisha is working for a nationalised bank and is in the process of creating a table to store the details of customers of the bank. Find out which of the following fields of table Bank can be selected as Primary Key. 
AccountNo CustomerName Dateofbirth OpeningBalance
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Primary Key: AccountNo


Q. 194640 Name two possible Primary key fields for an Employee table.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Possible Primary Key fields for an Employee table are – Empcode, Empname.


Q. 194641 What is the significance of Primary Key?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

A Primary Key cannot allow Null Values and must always have a unique index.


Q. 194642 What is the file extension of an OpenOffice.org Base database?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

ODB


Q. 194643 Neha is a programmer in a public school and is asked to handle the records containing information about students. Suggest five field names that you think must be present in the table called Student.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Table Name : Student

   Column Names:

   RedgNo

   RollNo

   Name

   Address
   Class


Q. 194644 Look at the table called “Item” given below and answer the questions.
ItemId Item Name Item Stock Item
DOP
Quantity Purchased
1.  Suggest the data types of all the fields. 
2. Which two fields can act as the Primary Key from the above table?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

1.  ItemId                      :  Char
     Item Name               : Text 
     Item Stock               :  Number
     Item DOP                 : Date 
     Quantity Purchased  : Number

2. 
ItemID and ItemName can act as the primary key.


Q. 194645 Priya is a programmer in an institution and is asked to handle the records containing personal information of the teachers in this institution. Suggest five fieldnames that you think must be present in the table called TeacherInfo.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Table Name: TeacherInfo

        Column Names:

        TNO

        TName

                    DOB

                    Address
                    Salary


Q. 194646 Look at the table structure shown below and identify the column(s) out of the given three tables that should not be present in each line of the following tables.
1.   Table1: Stock
Item No. Date Of Birth Item Quantity

2. Table2: Book
Admn No. Price Accss No.

3.   Table3: Student
Rollno. Marks Phone Number
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

1. Table1 : Items

     Field should be omitted: Date Of Birth

       

2. Table2 : Book
       Field should be omitted: Admno

       

3.   Table 3: Student

       Field should be omitted: Phone Number


Q. 194647 Give suitable data types for the following Teacher Table columns:
TNO, TNAME, TADDRESS, SALARY, DEPT_NAME and DOJ.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Field Name

Field Type

TNO

NUMBER

TNAME

VARCHAR

TADDRESS

VARCHAR

SALARY

DOUBLE

DEPT_NAME

VARCHAR

               DOJ

DATE


Q. 194648 Give suitable data types for the following Customer table columns: Cust_ID, Cust_Name, Cust_Add, Pin_Code, Cust_Phone and BILL_NO.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Field Name

Field Type

Cust_ID

NUMBER

Cust_Name

VARCHAR

Cust_Add

VARCHAR

Pin_Code

NUMBER

Cust_Phone

NUMBER

BILL_NO

NUMBER


Q. 194649 Define Primary Key with the help of an example.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Primary key of a relational table uniquely identifies each record in the table. A primary key consists of a column or columns whose value uniquely identifies a row. For example, if Student is a table and rollno, name, class, etc. are the fields, then rollno is the Primary Key because it is a unique field in the Student table.


Q. 194650 What is Primary Key? How do we set Primary Key?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

One or more fields (columns) whose value or values uniquely identifies each record in a table is called a Primary Key.

To set Primary Key:

a. Open the file in Design View.

b. Click on the field which you want to set as Primary Key.
c. In the Table Design view toolbar, click the Primary Key button.


Q. 194651 What is the consequence of changing field size attributes in a table?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Reducing field size saves memory. For example, the shorter the text, the less memory it uses. Similarly for number fields, Integer uses less memory than Real and Real in turn uses less memory than Double. In general, using a shorter field length also leads to faster database operation.

On the negative side, you could lose data if the text length is too small or you could lose the accuracy of your numeric data. For example, converting from Real to Integer will result in loss of all fractional data. This cannot be recovered by converting back to the original length or type.


Q. 194652 What do you mean by Entry required field information?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

If any of the fields requires an entry, set Entry required to Yes. If Entry required is set to Yes, this field must have something in it. For example, if FirstName has Entry required set to ‘Yes’, an entry with the first name missing will not be allowed. In general, only set Entry required to ‘Yes’ if something must always be out in that field. By default, Entry required is set to No.


Q. 194653 Define AutoNumber data type in Base?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

AutoNumber data type starts with a number for the first record and increases the number by a set amount in subsequent records. For example, in a table Bank, the accno (Account No.) is an AutoNumber field, as for every new customer the accno field will automatically increase and give a new number.


Q. 194654 Differentiate between a report and a form.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

A report is an effective way to present data in a printed format. It is a formal, presentable printed document that lists data in a formatted manner.

Whereas, a form is an interface in user specified layout that lets users view, enter, change data directly in the table.


Q. 194655 List all possible attributes for a student entity.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Name, Roll No, Marks, Address, Phone no, Date of Birth.


Q. 194656 Define forms. What is the need of using them?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

A form is an interface in the user specified layout that lets users view, enter, change data directly in the table. Forms focus on one record at a time and they can display fields from multiple tables.


Q. 194657 Distinguish between a record and a field.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

A record is a collection of data items that represents a complete unit of information. A record is also called a row of information in a table.

A field is a category of information. It contains a set of characters which have a proper meaning. For example, if a student is a table, then roll number, name, class, section, date of birth are the fields.


Q. 194658 What are the main purposes of a database system?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

The main purposes are:

1. Storage and retrieval

2. Sorting

3. Performing numerical analysis on the data such as counting, averaging and summation.

4. Filtering: Selecting on data that satisfies certain criteria.

5. Reporting: Producing output in some standardised and readable format.


Q. 194659 Distinguish between Data and Information.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Data are facts or the raw material of information. Data are represented by symbols. After processing the data, information is produced. Thus, information is data arranged in an order that would be useful to the user.


Q. 194660 Differentiate between Flat Database and Relational Database.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

In a flat database, all the data is stored in a single file. For example, a spreadsheet.

Whereas in a relational database, data is stored in multiple tables linked via common fields, e.g., BASE of OpenOffice.org.


Q. 194661 Define Table. What are the components of a table?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

A table refers to a storage container storing data pertaining to single object, subject or purpose.

The various components of a table are as follows:

1. Data Item (Field): A data item is the smallest unit of named data. It may consist of any number of bits or bytes. A data item represents one type of information and is often referred to as a field or data element.

2. Record: A record is a named collection of data items which represents a complete unit of information.

3. Table: A table is a named collection of all occurrences of a given type of logical record.


Q. 194662 Differentiate between DBMS and RDBMS.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

DBMS is an integrated set of programs. It helps us to manipulate database. The manipulation of database means collection, addition, insertion, modification and deletion of records into a database. For example, MS-Access, FoxPro, OOo Base.

RDBMS is a database which consists of tables of related information that are linked together based on a key field. In RDBMS, the data is organised in the form of tables (i.e., rows and columns). These tables are called relations. Each row in a table represents a relationship among a set of values.


Q. 194663 Define database. What is its importance?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

A database is collection of logically related data that is stored in a predictable manner. The database systems store data centrally at one place wherefrom all applications can get the data required.

The centralised storage facilitates many advantages like:

a. Controlled Redundancy

b. Data Sharing

c. Controlled Data Inconsistency

d. Standardisation

e. Enhanced Data Security


Q. 194664 Explain OOo Base functioning in brief.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

BASE is a database management system part of OpenOffice.org. It offers many features to manage databases. With BASE, one can manage all information stored in a .odb file. Within the file,

a. one can divide one’s data into separate storage containers called Tables.

b. one can view, add and update table data using Forms.

c. one can find and retrieve just the data, which is required using Queries.

d. one can analyse or print data in a specific layout using Reports.


Q. 194665 Write the steps for designing a database.
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

The steps for designing a database are:

1. Determine the purpose of your database.

2. Determine the tables you need.

3. Determine the fields you need.

4. Identify the field or fields with unique values in each record (i.e., Primary Key).

5. Determine the relationships between tables.

6. Refine your design.

7. Enter data and create other database objects.


Q. 194666 A table named School (containing data of students of the whole school) is created where each record consists of several fields including Admission No (Admission Number) RollNo (Roll Number), Name. Which field out of these three should be set as a Primary Key and why?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Admission No. should be set as the primary key. As the primary key is the unique key, so AdmissionNo in a school is the unique entry.


Q. 194667 What is data inconsistency and why does it occur?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

Data inconsistency exists when different and conflicting versions of the same data appear in different places. Data inconsistency creates unreliable information, because it will be difficult to determine which version of the information is correct. (It’s difficult to make correct and timely decisions if those decisions are based on conflicting information.)

Data inconsistency is likely to occur when there is data redundancy. Data redundancy occurs when the data file/database file contains redundant – unnecessarily duplicated – data. That’s why one major goal of good database design is to eliminate data redundancy.


Q. 194668 What do you understand by tables in a database management system?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

A table is a storage container that stores data pertaining to single object, subject or purpose. For example, an employee table may contain all information pertaining to an employee – employee no, employee name, designation, department, grade, basic etc. Similarly, Attendance table may contain data pertaining to the attendance of employees – employees no, months, years, no of days worked, no of leaves taken, CL, ML etc. Both these tables reside in a single database as both of them are related to single object called employee. Two tables are maintained to minimise redundancy. Therefore, tables provide a way to store related data together under one roof, taking care of things like reduced redundancy, standardisation and data integrity.


Q. 194669 What are the advantages of Databases?
A. data redundancy.
B. unsharable data.
C. insecure data.
D. data inconsistency.

Right Answer is:

SOLUTION

The advantages of Databases are as follows:

1. Databases reduce data redundancy to a large extent.

2. They can control data inconsistency to a large extent.

3. They facilitate sharing of data.

4. Databases enforce standards.

5. They ensure data security.


Q. 194670 A memo field in BASE table can store characters up to


A. 1GB.

B. 2GB.

C. 4GB.

D. 2KB.

Right Answer is: B

SOLUTION

Memo fields can store upto 2 GB. They are used for storing large information about fields, e.g., in library database, a memo field can store detailed information about books such as edition, author, author’s background etc. The memo fields cannot be indexed, i.e., records cannot be arranged in the order of memo fields.


Q. 194671 TINY Integers can contain digits upto


A. 4.

B. 1.

C. 3.

D. 2.

Right Answer is: C

SOLUTION

The fixed length of TINY Integers is 3 and stores numbers from -128 to +127. Its storage size is 1 byte.


Q. 194672 Integers can contain digits upto


A. 10.

B. 9.

C. 127.

D. 5.

Right Answer is: A

SOLUTION

Fixed length of Integers is 10 and stores numbers in the range -231 to +231-1, i.e., through 2147483648 to 2147483647. Its storage size is 4 bytes.


Q. 194673 The fixed length for [BIGINT] is


A. 10.

B. 15.

C. 18.

D. 19.

Right Answer is: D

SOLUTION

This field accepts integers or whole numbers with a fixed length of nineteen (19) spaces. It also has an auto value feature that fills up the field with a value you set automatically.


Q. 194674 Name some of the digital attacks.  
Right Answer is:

SOLUTION

Some of the digital attacks are spam, worm, virus, malware, trojan horse, sweeper etc.


Q. 194675 What is an e-mail virus?
Right Answer is:

SOLUTION

An e-mail virus is a computer code sent to you as an e-mail attachment which, if activated, will cause some unexpected and usually harmful effects.


Q. 194676 Write the file extension which is commonly affected by a worm.
Right Answer is:

SOLUTION

The file extensions that are commonly affected by a worm are exe, com, bat, pif, vbs, scr, doc, xls, msi and eml.


Q. 194677 If your computer is attacked by a Trojan virus, what all can it damage?
Right Answer is:

SOLUTION

If the computer is attacked by Trojan Horse virus, it can: 
• steal passwords 
• copy sensitive data
• carry out any other harmful operations etc.


Q. 194678 An independent computer program that copies itself from one computer to other in a network is called:                               
a) Worm
b) Trojan
c) Bug
d) Anti Virus  
Right Answer is:

SOLUTION

Worm : A worm has the ability to self-replicate and can lead to negative effects on your system. They reproduce programs that run independently and travel across network connections.


Q. 194679 Is it possible to restore data to a different computer than the one it was backed up at?
Right Answer is:

SOLUTION

Yes, it is absolutely possible. This is a great feature of the online backup system. Data may be restored to any computer connected to the internet.


Q. 194680 What is the main impact of spyware over e-commerce?
Right Answer is:

SOLUTION

The main impact of spyware over e-commerce could be that people lose trust in the reliability of online business transactions.


Q. 194681 What precaution do we need to take before copying a file from an external storage device?
Right Answer is:

SOLUTION

Whenever we attach any external device (CD, pen drive, floppy etc.) for copying datum, we should scan that device.


Q. 194682 What is a computer crime? Give its type.
Right Answer is:

SOLUTION

Computer crime may include thefts or actions in electronic form that cause damage or difficulty to other computer users. A computer crime can be of following types:
1. Theft of computer time
2. Theft, destruction or manipulation of programs
3. Theft, destruction or alteration of data
4. Hacking
5. Software pirating


Q. 194683 Define hacking.
Right Answer is:

SOLUTION

Hacking refers to the attempts to gain information from undisclosed areas. During 1870’s, teenagers first hacked into a phone system. Mostly hackers hack systems with malicious intent and damage some important system information.


Q. 194684 What do you understand by denial-of-service?
Right Answer is:

SOLUTION

An attacker attempts to prevent legitimate users from accessing information or services. The attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.) or other services by sending heavy traffic on network.


Q. 194685 Why do hackers attack?
Right Answer is:

SOLUTION

There are many reasons to hack: 
• A large fraction of hacker attacks are pranks. 
• Financial gain. 
• Espionage. 
• Venting anger at a company or organisation. 
• Terrorism.


Q. 194686 What is a spyware?
Right Answer is:

SOLUTION

A spyware refers to programs that use your internet connection to send information from your personal computer to some other computer, normally without your knowledge or permission.


Q. 194687 What are computer worms?
Right Answer is:

SOLUTION

A worm is a program which is very similar to a virus. It has the ability to self-replicate and can lead to negative effects on your system. They reproduce programs that run independently and travel across network connections.


Q. 194688 What type of data can I backup?
Right Answer is:

SOLUTION

We can take the backup of all types of files that includes spreadsheets, databases, pictures, MP3s, emails or computer programs. You can rely on online backup providers for protecting and securing your data and information.


Q. 194689 Define antivirus.
Right Answer is:

SOLUTION

Antivirus is a software that searches your hard drive and floppy disks for any viruses. The market for this kind of program has expanded because of internet growth and the increasing use of the internet by businesses concerned about protecting their computer assets.


Q. 194690 What are the different ways wherein a virus can spread to other computers?
Right Answer is:

SOLUTION

A virus can spread to other computers in the following ways:
• When an infected file is copied through network
• When an infected file is downloaded from internet
• When an infected file is copied from floppy disk, USB etc. 
• Through e-mail attachments


Q. 194691 Write the characteristics of a worm.
Right Answer is:

SOLUTION

A worm is a program designed to replicate. The program may perform any variety of additional tasks as well. 
The following are the characteristics of a worm: 
• It is able to replicate. 
• It is self-contained and does not require a host. 
• It is activated by created process (it needs a multitasking system). 
• If it is a network worm, it can replicate across communication links.


Q. 194692 Write the symptoms of an infected computer.
Right Answer is:

SOLUTION

The symptoms of an infected computer are: 
• The computer runs slower than usual. 
• The computer stops responding or it locks up frequently. 
• Computer crashes and then restarts every few minutes. 
• The computer restarts on its own. Additionally, the computer does not run as usual. 
• Applications on the computer do not work correctly. 
• Disks or disk drives are inaccessible. 
• You cannot print items correctly. 
• You see unusual error messages. 
• You see distorted menus and dialog boxes. 
• You see double extension on the recently opened attachment such as a .jpg, .vbs, .gif or .exe extension. 
• An antivirus program is disabled for no reason.


Q. 194693 What do you understand by 'Virus'? What are the different types of virus?
Right Answer is:

SOLUTION

A computer virus in an executable program. It depends on the nature of a virus that it may cause damage of your hard disk contents and/or interfere with normal operations of your computer.

A virus can be broadly classified into the following types:

Boot: This type of virus affects the boot sector of a floppy or hard disk.

File Infector: This type of virus infects programs or executable files (files with an .EXE or .COM extension).

Macro Virus: Macro viruses infect files that are created using certain applications or programs that contain macros.


Q. 194694 Abha has created a website for Starex School. The principal wants some modifications like change in color, style and size of the text. The correct tag is


A. < font > tag.

B. < style > tag.

C. < size > tag.

D. < color > tag.

Right Answer is: A

SOLUTION

To change the color, style and size of the text, Abha should use the < font > tag. The < font > tag is used for changing the appearance of a short segment of text.


Q. 194695 Rohan has prepared an article. He wants that the text should be displayed exactly (i.e., with all the tabs, blank lines etc.) in the same way as he has typed in the HTML code. The HTML tag that Rohan should use is


A. < br >…< /br >.

B. < p >…< /p >.

C. < p align = “center” >.

D. < pre >…< /pre >.

Right Answer is: D

SOLUTION

The < pre > tag defines preformatted text. The text in a pre-element is displayed in a fixed-width font and it preserves both spaces and line breaks.


Q. 194696 Roshan is creating the Maths Terminal Paper. He wants the names of the Sections to appear in center. The correct HTML tag is


A. < body style = “center” >.

B. < center > The text is centralized< /center >.

C. < /center > The text is centralized < center >.

D. < centralized > The text is centralized< /centralized >.

Right Answer is: B

SOLUTION

When a segment of text needs to be centralized, the < center > tag is used. The correct form to make the text appear in center is: < center > Text appears in center < /center >. Here, the text will appear in the center on the browser.


Q. 194697 Shalu wants to make the body text appear 70 pixels away from top edge of the page. The correct attribute to be used is


A. < body margin:top = “70” >.

B. < topmargin >70< /topmargin >.

C. < body style=”70”:topmargin >.

D. < body topmargin = “70” >.

Right Answer is: D

SOLUTION

To set the top margin, i.e., distance from the top edge, Shalu can use TOPMARGIN attribute. For example, < body topmargin = “70” > will make the body-text appear 70 pixels away from top edge of the page.


Q. 194698 The default font size set by BASEFONT is


A. 5.

B. 2.

C. 3.

D. 1.

Right Answer is: C

SOLUTION

The < BASEFONT > tag lets you define the basic size for the font. The default font size set by BASEFONT is 3. The size can have an absolute value from 1 to 7.
 For example, < BASEFONT size = 5 >.


Q. 194699 Bharti has to create a webpage on “Clean Environment” wherein she wants to use green colour in the background. The correct HTML code is


A. < body bgcolor="green" >.

B. < background >green< /background >.

C. < body="green", background >.

D. < body style="background-color:green">.

Right Answer is: A

SOLUTION

Bharti should use bgcolor attribute to make the background colour appear green.
The correct HTML is < body bgcolor="green">.


Q. 194700 To insert the field in table we need to


A. Right click-> Insert field.

B. Select Table.

C. Insert Table from View.

D. Create  Table Join field.

Right Answer is: A

SOLUTION

We can insert the field in the table using the steps given below:
Right click on the desired place where you want to insert the new field. Select insert field option from the short menu. Now you can easily work on it.


PreviousNext