Q 1: | Locks which are placed by command are known as |
(1) | Implicit locks |
(2) | Explicit locks |
(3) | Exclusive locks |
(4) | Shared locks |
Correct Answer: Explicit locks | |
Q 2: | GRANT and REVOKE are |
(1) | Mandatory Access Control |
(2) | Discretionary Access Conrol |
(3) | Database Access Control |
(4) | DBMS Access Control |
Correct Answer: Discretionary Access Conrol | |
Q 3: | Which of the following is a property of transactions? |
(1) | Atomicity |
(2) | Consistency |
(3) | Isolation |
(4) | All |
Correct Answer: All | |
Q 4: | An attribute A of datatype varchar (20) has value 'Ram' and the attribute B of datatype char (20) has value 'Sita' in oracle. The attribute A has......... memory spaces and B has.............. memory spaces. |
(1) | 20,20 |
(2) | 3,20 |
(3) | 3,4 |
(4) | 20,4 |
Correct Answer: 3,20 | |
Q 5: | How many characters per sec (7bits + 1 parity) can be transmitted over a 2400 bps line if the transfer in synchronous (1 start and 1 stop unit)? |
(1) | 300 |
(2) | 240 |
(3) | 250 |
(4) | 275 |
Correct Answer: 300 | |
Q 6: | Sniffers can be deployed in |
(1) | Wifi |
(2) | Ethernet LAN |
(3) | Wired environment |
(4) | All |
Correct Answer: All | |
Q 7: | TCP/IP model has ................ layers |
(1) | 7 |
(2) | 4 |
(3) | 2 |
(4) | none |
Correct Answer: 4 | |
Q 8: | Which quantization level results in a more faithful reproduction of the signal |
(1) | 2 |
(2) | 8 |
(3) | 16 |
(4) | 32 |
Correct Answer: 32 | |
Q 9: | The........... protocol provides message authentication and integrity, but not privacy. |
(1) | AH |
(2) | ESP |
(3) | SPE |
(4) | none |
Correct Answer: AH | |
Q 10: | By economic feasibility of a system we mean that |
(1) | It is economical to operate |
(2) | It is expensive to operate |
(3) | It will be cost-effective if implemented |
(4) | Finances are available to implement the system and it will be cost-effective |
Correct Answer: Finances are available to implement the system and it will be cost-effective | |