Which of the following computer technology helps you to easily insert, retrieve, and manage data from databases with appropriate security measures? Database Management Systems (DBMS) Firewall Antivirus software Which of the following constraints help uniquely identify records in a table? Primary key constraint Foreign key constraint Check constraint Which of the following is an input device? Printer Keyboard Monitor Which of the following is NOT a computer peripheral? Scanner Motherboard LCD projector ____________ is a temporary memory that loses information when the computer is switched off. Read Only Memory (ROM) Flash memory Random Access Memory (RAM) Bluetooth is a widely used technology for: Wireless Personal Area Network (WPAN) Local Area Network (LAN) Wide Area Network (WAN) A variable in programming is a: procedure that performs some operation named piece of memory for storing data Classification of data An object in an object oriented programming is: A template that defines a collection of fields and methods A builtin data type An instance of a class Protocol used for forwarding email messages is: Post Office Protocol (POP) Simple Mail Transfer Protocol (SMTP) Internet Message Access Protocol (IMAP) _________ is the electronic equivalent of ordinary signatures that provides authenticity of the electronic data. Digital signature Access control Encipherment You got out of 10 correct. The correct answers are
A template that defines a collection of fields and methods A builtin data type An instance of a class
Post Office Protocol (POP) Simple Mail Transfer Protocol (SMTP) Internet Message Access Protocol (IMAP)
No comments:
Post a Comment