61. The purpose of a swap (or page) file is to: (1) maintain pages - TopicsExpress



          

61. The purpose of a swap (or page) file is to: (1) maintain pages of documents that are being spooled to the printer. (2) hold a program’s data or instructions in virtual memory when it can’t fit in RAM. (3) prevent thrashing in a multitasking environment. (4) allow multiple print jobs to print their pages out simultaneously. (5) None of these Answer : 2 62. Software programs that allow you to legally copy files and give them away at no cost are called which of the following : (1) Time sharing (2) Public domain (3) Shareware (4) Freeware (5) None of these Answer : 3 63. Which of the following is NOT a goal of Transaction processing system? (1) Capture, process and store transactions (2) Produce a variety of documents related to Routine business activities (3) Reduce manual effort associated with Processing business transactions (4) Produce standard reports used for Management decision making (5) None of the above Answer : 2 64. The degree of detail that should be incorporated into a database depends on what? (1) Data integrity (2) The type of database (3) The user’s perspective (4) The business practices and policies (5) None of these Answer : 2 65. Superscript refers to — (1) Characters displayed below the line of the normal text (2) Characters displayed above the line of the normal text (3) Characters displayed vertically centre (4) Both (1) and (2) (5) None of these Answer : 2 66. A — is an additional set of commands that the computer displays after you make a selection from the main menu : (1) dialog box (2) submenu (3) menu selection (4) All of the above (5) None of these Answer : 1 67. The difference between people with access to computers and the Internet and those without this access is known as the : (1) digital divide (2) Internet divide (3) Web divide (4) broadband divide (5) None of these Answer : 1 68. How will you remove all formatting added to your documents (such as bold, italics, and underline etc.) (1) Save (2) Save as plain text file (3) Save as (4) All of the above (5) None of these Answer : 2 69. With the object-oriented (OO) approach, an object encapsulates, or — a programmer. (1) carries out, the details of an object for (2) hides, the details of an object from (3) reveals, the details of an object to (4) extends, the details of an object beyond (5) None of these Answer : 2 70. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called : (1) robotics (2) simulation (3) computer forensics (4) animation (5) None of these Answer : 3 71. Granting an outside organisation access to Internet web pages is often implemented using a (an) : (1) Extranet (2) Intranet (3) Internet (4) Hacker (5) None of these Answer : 1 72. The purpose of the primary key in a database is to : (1) Unlock the database (2) Provide a map of the data (3) Uniquely identify a record (4) Establish constraints on database operations (5) None of the above Answer : 3 73. The code that relational database management Systems use to perform their database task is referred to as : (1) QBE (2) SQL (3) OLAP (4) Sequel Server (5) None of these Answer : 2 74. VIRUS stands for : (1) Vital Information Recourse Under Siege (2) Vital Information Reason Under Siege (3) Vital Information Recourse Under System (4) Virus Information Recourse Under Siege (5) None of these Answer : 1 75. Data becomes ................ when it is presented in a format that people can understand and use. (1) processed (2) graphs (3) information (4) presentation (5) None of these Answer : 3 76. The term ............. designates equipment that might be added to a computer system to enhance its functionality. (1) digital device (2) system add-on (3) disk pack (4) peripheral device (5) None of these Answer : 4 77. ……… is the language that enable user to access or manipulate data as organized by appropriate data model : (1) DML (2) SDL (3) DDL (4) All of the above (5) None of these Answer : 1 78. The user commands that are used to interact with a database is called as : (1) Query (2) Interaction (3) Command (4) Instruction (5) None of these Answer : 3 79. RAM can be thought of as the ......... for the computer’s processor : (1) factory (2) operating room (3) waiting room (4) planning room (5) None of these Answer : 3 80. ……… is computer software designed to operate the computer hardware and to provide platform for running application software : (1) Application software (2) System software (3) Software (4) Operating system (5) None of these Answer : 2
Posted on: Fri, 23 Aug 2013 04:22:25 +0000

Trending Topics



Recently Viewed Topics




© 2015