The time required to complete a single, continuous execution of an object program is called — КиберПедия 

Двойное оплодотворение у цветковых растений: Оплодотворение - это процесс слияния мужской и женской половых клеток с образованием зиготы...

Биохимия спиртового брожения: Основу технологии получения пива составляет спиртовое брожение, - при котором сахар превращается...

The time required to complete a single, continuous execution of an object program is called

2023-01-16 27
The time required to complete a single, continuous execution of an object program is called 0.00 из 5.00 0 оценок
Заказать работу

● Run time

o Access time

o Random time

o Response time

Anonymous FTP is the

o Internet file transfer protocol

o Protocol that requires password

● Both (a) & (b)

o None of these

Following is not the form of secondary storage

o Magnetic tape

o CDs

● Scanner

o Hard disk

The overall design, construction, organization and interconnecting of the various components of a computer system is referred as

● Computer Architecture

o Computer Flow chart

o Computer Algorithm

o None of these

In the IBM PC's, the CPU, the device drives, memory, expansion slots and active components are mounted on a single board referred as

● Motherboard

o Breadboard

o Daughter board

o Father board

An association of several structure of a data base can be expressed graphically by?

o Tuple

o Record

● Relationship

o Field

The overall logical structure of data base can be expressed graphically by?

o Data flow chart

o Flow chart

o Directed Graph

● Entity relationship diagram

The overall design of a database is called?

● Scheme of the database

o The screen of database

o Structure of the database

o View of the database

40. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

● entity integrity rule

o referential integrity constraint

o action assertion

o composite attribute

41. The process by which the structure of the database is modified to eliminate hidden dependencies and replacing groups is _________

● Normalization

o Indexing

o Enforcing referential integrity

o Enforcing data integrity

42. Referential integrity controls relationships between:

o attributes in a table

o operations of an object

o instances of a class

● tables in a database

43. What rows will this select statement return? SELECT * FROM products WHERE ordernumber > = 1000

● All rows in the products table whose order number is greater than or equal to 1000

o All rows in the products table whose order number is less than or equal to 1000

o The first 1000 rows of the product table

o All rows in the products table whose order number is greater than 1000

44. The code that relational database management systems use to perform their database task is referred to as ...

o QBE

● SQL

o OLAP

o Sequel Server

How is it possible that both programs and data can be stored on the same floppy disk?

o Floppy disks can only store data, not programs

● Programs and data are both software, and both can be stored on any memory device

o A floppy disk has to be formatted for one or for the other

o A floppy disks has two sides, one for data and one for program

Related fields in a database are grouped to form?

o Data Field

● Data Record

o Menu

o Bank

47. The raw facts and figures are:

● Data

o Data field

o DBMS

o DBASE

Requires that data should be made available to only authorized users.

● Security

o Data integrity

o Privacy

o none

What is Hypertext Transfer Protocol (HTTP)?

o The protocol to copy files between computers

● The transfer protocol to transfer Web pages to a browser

o The database access protocol for SQL statements

o The hardware/software protocol that limits access to company data

Where does a computer add and compare data?

o Hard disk

o Floppy disk

● CPU chip

o Memory chip

Which generation of computers is converted by the period 1964-1977?

o First

o Second

● Third

o Forth

52. The word "Computer" usually refers to the Central processing unit plus?

o External memory

● Internal memory

o Input devices

o Output devices

Which of the following belongs to the first generation of computer?

o ENIAC

o IBM 1401

o IBM 8090

● UNIVAC

What hardware was used by first generation computer?

o Transistors

● Vacuum lamps

o VLSI

o ICs

A typical modern computer uses?

● SLIC chips

o Vacuum tubes

o Values

o All of above

Which device can produce the final product of machine processing into a form usable by humans?

o Storage

o Input devices

● Output devices

o Control

Which can read data convert them to a form that computer can use?

o Logic

o Storage

o Control

● Input device

Which is not true for primary storage?

o Information must be transferred to primary storage

o It is relatively more expensive

o It allows very fast access to data

● It is part of processor

A person who used his or expertise to gain access to other peoples computers to get information illegally or do damage is

● Hacker

o Analyst

o Instant messenger

o Programmer


Поделиться с друзьями:

Организация стока поверхностных вод: Наибольшее количество влаги на земном шаре испаряется с поверхности морей и океанов (88‰)...

Типы сооружений для обработки осадков: Септиками называются сооружения, в которых одновременно происходят осветление сточной жидкости...

Общие условия выбора системы дренажа: Система дренажа выбирается в зависимости от характера защищаемого...

Типы оградительных сооружений в морском порту: По расположению оградительных сооружений в плане различают волноломы, обе оконечности...



© cyberpedia.su 2017-2024 - Не является автором материалов. Исключительное право сохранено за автором текста.
Если вы не хотите, чтобы данный материал был у нас на сайте, перейдите по ссылке: Нарушение авторских прав. Мы поможем в написании вашей работы!

0.012 с.