Practice Important Computer Questions Questions and Answers
- Data duplication wastes the space, but also promotes a more serious problem called
- What is the mounting of file system?
- Which of the following is a programming language for creating special programs like Applets?
- A collection of conceptual tools for describing data, relationships, semantics and constraints is referred to as
- Which of the following is known as the process of viewing cross-tab with a fixed value of one attribute?
- The highest level in the hierarchy of data organization is called
- DI stands for
- Which forms has a relation that possesses data about an individual entity:
- The __________________ contains a list of blocks that have been updated in the database buffer.
- A process is thrashing if ____________
- A graphical or text depiction of the relationship between different groups of content on a website is a:
- The_____ operation allows the combining of two relations by merging pairs of tuples, one from each relation, into a single tuple.
- The top level of the hierarchy consists of ______ each of which can contain _____.
- The first Network was called ________
- Which of the following is not an internal command of DOS?
- The code that relational database management systems use to perform their database task is referred to as
- File extensions are used in order to
- What type of memory stores data in a swap file on a hard drive?
- The attacker using a network of compromised devices is known as _____________
- Which tool is used for Wi-Fi hacking?
- Which of the following is not a stream cipher?
- The cardinality property of a relation, refers to the
- Three bits used To control access the in UNIX are represented by :
- RTOS stands for
- Internet works on _______
- Which of the following is not an application layer service?
- MICR stands for
- Which of these output devices are used for the translation of information from any computer into a pictorial form on the papers?
- Which of the following is used in main memory?
- Wall maps are actually
- The process of capturing satellite image is called
- What is the function of the puck?
- The mechanism that brings a page into memory when it is needed is called
- Data integrity constraints are used to:
- The program used in the digitization technique is
- Which of the following map is also known as chorographical map?
- ............. is the functional key to display save-as box.
- An HTTP request contains ......... parts
- Hackers often gain entry to a network be pretending to be at a legitimate computer
- It is a prepared application that takes advantage of a known weakness.
More Topics
- Browser Questions
- Computer Architecture Questions
- Computer Awarenes Questions
- Computer Book Questions
- Computer Language Questions
- Computer Memory Questions
- Computer Miscellaneous Questions
- Computer paper Questions
- Database Management System Questions
- Email Questions
- MS Office Questions
- Network Questions
- Software System Questions