1. Where will we find the referential integrity command ?

Tools

View

Format

Table

Answer: Table

Explanation:

The referential integrity command is typically found in the Table menu in database management systems. Therefore, the correct option is (d) Table.


2. A field that uniquely identifies which person, thing, or event the record describes is a ______ ?

file

data

field

key

Answer: key

Explanation:

The field that uniquely identifies which person, thing, or event the record describes is called a "primary key". The primary key is a column or set of columns in a database table that contains unique values for each record. It is used to identify and retrieve specific records from the table, and it ensures that each record in the table is unique and identifiable.


3. What is a database ?

It is a collection of data arranged in rows

It is a collection of data arranged in columns

It is a collection of data arranged in rows and columns

All of the above

Answer: It is a collection of data arranged in rows and columns

Explanation:

A database is a collection of data that is organized in a structured format. This collection of data can be arranged in rows and columns, tables, indexes, schemas, and other related components. Therefore, the correct option is (c) It is a collection of data arranged in rows and columns.


4. Participants can see and hear each other in a/an ?

electronic mail system

message system

teleconference

bulletin board

Answer: teleconference

Explanation:

The correct answer is (c) teleconference.


5. A data dictionary doesn’t provide information about ?

where data is located

the size of the disk storage disk

who owns or is responsible for the data

how the data is used

Answer: the size of the disk storage disk

Explanation:

Size of storage disk. A data dictionary contains a list of all files in the database, the number of records in each file, and the names and types of each field. Data dictionaries do not contain any actual data from the database, only book-keeping information for managing it.


6. The path of creation of an executable is ?

coding, linking, compiling, parsing

coding, parsing, compiling, linking.

coding, compiling, parsing, linking

coding, compiling, linking, parsing.

Answer: coding, compiling, linking, parsing.

Explanation:

The path of creation of an executable is: (d) coding, compiling, linking, parsing.


7. How many options does a binary choice offer ?

One

Two

Three

It depends on the amount of memory in the computer

Answer: Two

Explanation:

A binary choice offers two options to choose from, typically represented as "yes" or "no", "on" or "off", "true" or "false", or "0" or "1". The term "binary" refers to the use of a two-digit system (base-2) to represent data, in which each digit can only have two possible values (0 or 1).


8. Collecting personal information and effectively posing as another individual is known as the crime of __________ ?

spooling

identity theft

spoofing

hacking

Answer: spoofing

Explanation:

Collecting personal information and effectively posing as another individual is known as the crime of spoofing.


9. The name of the location of a particular piece of data is its __________ ?

address

memory name

storage site

data location

Answer: address

Explanation:

The correct answer is (a) address. The name of the location of a particular piece of data is its address. In computing, data is stored in memory, which is organized into a series of addressable locations, each of which can store a fixed amount of data.


10. Meaningful filename helps in easy file ______ ?

Storing

Accessing

Identification

Printing

Answer: Accessing

Explanation:

The correct answer is (b) Accessing. Meaningful filenames can help in easy file accessing. When files are named descriptively and meaningfully, it becomes easier for users to identify and locate the files they need. This is particularly important when working with large numbers of files or when collaborating with others on a project.