". VdoTips: COMPUTER FUNDAMENTAL PRACTICE SET 30

APPLY LATEST GOVT JOBS

hi

COMPUTER FUNDAMENTAL PRACTICE SET 30

236. Data security threats include
(A) Hardware failure
(B) Privacy invasion
(C) Fraudulent manipulation of data
(D) All of the above
237. Graphical pictures that represent an object like file, folder etc. are
(A) Task bar
(B) Windows
(C) Desktop
(D) Icons
238. Accessing records from a file directly without searching from the beginning of the file is
(A) Time sharing
(B) Random
(C) Direct access
(D) Access time
239. Database redesign is not terribly difficult if the
(A) Database is structured
(B) Database is well-designed
(C) Database has no data
(D) Database is relatively small
240. Which of the following SQL statements are helpful in database redesign ?
(A) Correlated sub queries only
(B) EXISTS/ NOT EXISTS expressions only
(C) Both of the above are helpful
(D) Creating the database are helpful