- ________ are used to identify a user who returns to a website.
1) ASPs
2) Scripts
3) Cookies
4) Plug-ins
5) None of These
- Rows of a relation are called__________
1) Relation
2) Tuples
3) Data structure
4) An entity
5) None of these
- Which layer of OSI determines the interface of the system with the user_________
1) Network
2) Application
3) Data link
4) Session
5) None of these
- Most database management systems allow you to have more than one key so that you can sort records in different ways. One of the keys is designated the ________and must hold a unique value for each record.
1) Unique Key
2) Prime attribute
3) Index key
4) primary key
5) None of these
- _______ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.
1) TCP (Transfer Control Protocol)
2) DNS (Domain Name System)
3) SHA (Secure Hash Algorithm)
4) Simple Network Management Protocol (SNMP)
5) None of these
- ________ is a virus that inserts itself into a system’s memory. Then it takes a number of actions when an infected file is executed.
1) Web scripting virus
2) Polymorphic Virus
3) Resident virus
4) Boot sector virus
5) Resident virus
- The ________ model remains operative until the software is retired.
1) Waterfall model
2) Incremental model
3) Spiral model
4) Prototyping model
5) Incremental model
- Which of the following TCP/IP protocol is used for remote terminal connection service?
1) Telnet
2) RARP
3) FTP
4)all of above
5) None of these
- A ________ means that one record in a particular record type is related to only one record of another record type.
1) One-to-one relationship
2) One-to-many relationship
3) Many-to-one relationship
4) Many-to-many relationship
5) None of these
- A heap allows a very efficient implementation of a__________
1) Double-ended queue
2) Priority queue
3) Stack
4) Trees
5) None of these
Friday, January 1, 2016
GK
Labels:
quiz
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment