Wednesday, January 18, 2012

IT Quiz - 1

1. In virtual memory, program instructions and data are divided into units of fixed size called

2. Which of the following is not true about Systems Development Life Cycle (SDLC)?
[A]It is a multi-step process that uses systems approach to develop information system solutions
[B]The steps involved in SDLC are Investigation, Analysis, Design, Implementation and Maintenance
[C]Only one developmental activity can occur at a time in Systems Development Life Cycle
[D]Prototyping, CASE and End User Development are automating and changing some of the activities of information systems development

3. Which of the following commands in Novell Netware Operating System is used to print to a network printer from an application that does not support network printing?

4. __________ intranet groupware helps the user to create a document management library at an intranet web site.
[C]Lotus Notes
[D]MS Exchange

5. Encryption and firewalls are the two most commonly used
[A]Facility controls
[B]Procedural controls
[C]Information system controls
[D]Biometric controls

6. Which of the following is not an activity of Data Planning?
[A]Prepare strategic and technical database plans
[B]Identify opportunities for data sharing and potential database applications
[C]Set procedures for data retention
[D]Develop and enforce policies governing data ownership and access control

7. All Shell statements and Unix commands can be entered in the command line itself, using ___________ as the delimiter.
[A]Comma (,)
[B]Semicolon (;)
[C]Colon (:)
[D]Hash (#)

8. Which of the following is not true about Shutdown Process in Unix?
[A]Messages are sent to the user terminals to save their work and log out
[B]All activities are suspended including the scheduler
[C]The memory contents of the super block and other buffers to the disk are updated
[D]The file system except the root is dismounted

9. The number of main( ) functions in a C program is
[A]Only one
[B]At least one
[C]More than one
[D]Dependent on the program

10. The validity of data contained in a database is termed as
[A]Data integrity
[B]Data independence
[C]Data maintenance
[D]Data security

11. In C, a variable that contains the address of another variable is called
[C]Linked List

12. Which of the following is an Application Software?
[A]MS Windows 95
[B]MS Windows 98
[C]MS Word

13. ________ minimizes line costs as only n-1 lines are required for connecting n computers.
[A]Ring network
[B]Star network
[C]Bus network
[D]PBX network

14. ____________ refer(s) to the ability to look at the database from different viewpoints.
[D]Both (a) and (b) above

15. This is a system where messages about any subject can be posted and other people on the Internet can reply to them.