". VdoTips: COMPUTER FUNDAMENTAL PRACTICE SET 29

APPLY LATEST GOVT JOBS

hi

COMPUTER FUNDAMENTAL PRACTICE SET 29

231. Data security threats include
(A) Hardware failure
(B) Privacy invasion
(C) Fraudulent manipulation of data
(D) All of the above
232. Graphical pictures that represent an object like file, folder etc. are
(A) Task bar
(B) Windows
(C) Desktop
(D) Icons
233. Accessing records from a file directly without searching from the beginning of the file is
(A) Time sharing
(B) Random
(C) Direct access
(D) Access time
234. Database redesign is not terribly difficult if the
(A) Database is structured
(B) Database is well-designed
(C) Database has no data
(D) Database is relatively small
235. Which of the following SQL statements are helpful in database redesign ?
(A) Correlated sub queries only
(B) EXISTS/ NOT EXISTS expressions only
(C) Both of the above are helpful
(D) Creating the database are helpful