Computer SQE

download Computer SQE

of 5

Transcript of Computer SQE

  • 7/21/2019 Computer SQE

    1/5

    COMPUTER PAST SQE

    1. Which of the following is not necessary in order to attain computer literacy?

    a. Ability to interact with a computer

    b. Expertise in computer programming

    c. Knowledge of the basics of how computer work

    d. Awareness of the importance of computers

    2. Characteristics of computers include all the following except:

    a. Reliability of accurate results c. Capacity for high storage volume

    b. Speed of processing d. Propensity to make errors

    3. Most computer errors are caused by:

    a. Humans c. Hardware Failures

    b. Data corruption d. Program Bugs

    4. A computer program is considered to be:

    a. Network c. User

    b. Hardware d. Software

    5. The set of instructions that tell a computer what to do is called a:

    a. Program c. Instruction Set

    b. Programmer d. System

    6. Another term for processed data is:

    a. Information c. Processor

    b. Storage d. Output Device

    7. The general term used for describing software that helps solve everyday personal or business

    tasks is:

    a. Application Software c. Custom Software

    b. Vertical Software d. System Software

    8. Software that controls the computing resources, such as an operating system, is referred to as:

    a. System Software c. Application Software

    b. Custom Software d. Vertical Software

    9. A softwares documentation is:

    a. The purchase agreement for the software

    b. The instructions for using the software

    c. The data that users input into the computer when running the software

    d. The program code written by the computer programmer

    10.Software that has not been copyrighted is considered to be:

    a. Open Source c. Public Domain

    b. Software Piracy d. Shareware

    11. In order for programmers to be able to modify a programs operations,

    a. They must purchase a site license

    b. The program must be machine-readable

    c. The source code must be available

    d. The software cannot be copyrighted

    12.Another term for commercial software is:

    a. Spreadsheet Software c. ASP

    b. Packaged Software d. Private Software

    13.An operating system is considered to be:

    a. System Software c. Application Software

    b. Computer Hardware d. Memory

    14.Which of the following types of software would not be considered to be system software?

    a. Spreadsheet Software c. Operating Software

    b. Program Language Translators d. Utility Programs

  • 7/21/2019 Computer SQE

    2/5

    15.The program that initiates in the bootstrapping process permanently resides:

    a. On a CD c. In the computers RAM

    b. On the Hard Drive d. In the computers ROM

    16.Which of the following operating systems offers only a command-line user interface?

    a. Windows XP c. Linux

    b. MS Dos d. Mac OS

    17.All of the following involve using the computers monitor in the input process except:

    a. Electronic Pen c. Touch Screen

    b. Touch Pad d. Kiosk

    18.Converting a document image into text that can be edited in a word processor requires special

    software for:

    a. Discrete Word Systems c. Document Imaging

    b. Optical Character Recognition d. Continuous Word Systems

    19.A decentralized data communications network is considered to be:

    a. Server c. LAN

    b. Distributed d. Internet

    20.A computer system that uses communications equipment to connect two or more computers

    and their resources is:

    a. Intranet c. LAN

    b. Network d. Modem

    21.To represent binary digits in an analog signal, one can:

    a. Alter the amplitude of a carrier wave c. Modulate the signal

    b. Duplex a carrier wave d. Demodulate the signal

    22.The feature by which word processing program recognizes that the word being typed in by a

    user wont fit on a line, and therefore moves it to the next line, is called:

    a. Text Justification c. Margin Set

    b. Word Wrap d. Autoformat

    23.The benefit of word wrap is to:

    a. Wrap a highlight around text for the purpose of selecting and copying

    b. Automatically move full words of text that dont fit on one line to the next

    c. Allow the user to control the type of text justification in the document

    d. Remind the user to hit the enter key for each line of text.

    24.The first electronic spreadsheet program was called:

    a. VisiCalc c. Lotus

    b. Excel d. Quanto Pro

    25.The total number of columns in most electronic spreadsheets is:

    a. 1024 c. 26

    b. 100 d. 256

    26.Older systems that often contain data of poor quality are called _____ systems.

    a. Controlled c. Database

    b. Legacy d. Mainframe

    27.The most common source of database failures on organization is:

    a. Lack of planning c. Inadequate hardware

    b. Inadequate budget d. Failure to implement a strong DBA

    28.Which of the following is not a component of an information systems architecture:

    a. Data c. Networks

    b. Hardware d. Reasons for events and rules

    29.The SDLC phase in which functional data specifications and processing rules are created is the

    _____ phase.

    a. Planning c. Analysis

    b. Design d. Implementation

  • 7/21/2019 Computer SQE

    3/5

    30.A requirement to begin designing physical files and database is:

    a. Normalize relations c. Technology descriptions

    b. Definitions of each attribute d. All of the above

    31.One of the most popular RAD methods is:

    a. Automated Design c. Prototyping

    b. Structured Walkthrough d. Crafting

    32.The first in a series of steps to follow when creating a table is to:

    a. Identify columns that must be unique

    b. Identify columns that must be null

    c. Identify each attribute and its characteristics

    d. Create an index

    33.User-defined data types:

    a. Can be a subclass of a standard type c. Can have define functions and methods

    b. Can behave as an object d. All of the above

    34.Which of the following have affected the way businesses use computing systems to meet the

    demand of the competitive marketplace?

    a. GUI evolutions c. Communication changes

    b. Networking advances d. All of the above

    35.A device that manages file operations and is shared by each client PC on a LAN is called a:

    a. File server c. Database server

    b. File processor d. Fat client

    36.A PC configured to handle user interface with little or no local storage is called a:

    a. Server c. Thin client

    b. Fat client d. Workstation

    37.The most common bottleneck in a client/server environment is the:

    a. Users c. Network

    b. Software d. Company politics

    38.All of the following are characteristics of the Web environment which have supported the rapid

    adoption of Internet and intranet business applications except:

    a. Simplicity and functional similarity of browsers

    b. End-users buying habits

    c. Software and hardware independence of browsers

    d. Reduced development time and costs

    39.A star schema contains both fact and _____ tables.

    a. Narrative c. Dimension

    b. Cross functional d. Starter

    40.Quality data can be defined as being:

    a. Unique c. Historical

    b. Inaccurate d. Precise

    41.Which of the following is true of poor data and/or database administration?

    a. Data timing problems c. Unknown meaning of stored data

    b. Multiple entity definitions d. All of the above

    42._____ is a technical function responsible for database design, security, and disaster recovery.

    a. Data administration c. Technical support

    b. Database administration d. Operations

    43.An open-source DBMS is:

    a. Free source code RDMS that provides the functionality of an SQL-compliant DBMS

    b. Beta release of a commercial RDBMS

    c. Object oriented Database Management System

    d. Source Code for a commercial RDBMS

    44.Which of the following is a type of network security:

  • 7/21/2019 Computer SQE

    4/5

    a. Authentication of the client workstation

    b. Password naming conventions

    c. Guidelines for frequency of password changes

    d. All of the above

    45.Controls designed to restrict access and activities are called:

    a. Schemas c. Encryptions Controls

    b. Business Rules d. Authorization Rules

    46.A device to measure or detect fingerprints or signatures is called a(n) _____ device.

    a. Biometric c. Ink

    b. View d. Laser

    47.A(n) _____ is a database stored on multiple computers in multiple locations that are not

    connected by a data communications link.

    a. Distributed database c. Unlinked database

    b. Decentralized database d. Data repository

    48.Which of the following is true of distributed databases?

    a. Less reliable c. Slower response time

    b. Better local control d. None of the above

    49.Which of the following is an advantage to data replication?

    a. Reliability c. Node decoupling

    b. Fast response d. All of the above

    50.Which of the following is a reason for using an object oriented design?

    a. The analysis model is not formal enough to be implemented in a programming language.

    b. The actual system must be adapted to the environment in which the system will actually be

    implemented.

    c. The analysis results can be validated using object-oriented design

    c. All of the above

  • 7/21/2019 Computer SQE

    5/5

    ANSWER KEY:

    1. B

    2. D

    3. A

    4. D

    5. A

    6. A

    7. A

    8. A

    9. B

    10. C

    11. C

    12. B

    13. A

    14. A

    15. D

    16. B

    17. B18. B

    19. B

    20. B

    21. D

    22. B

    23. B

    24. A

    25. D

    26. B

    27. D

    28. B

    29. B

    30. D

    31. C

    32. C

    33. C

    34. D

    35. A

    36. C

    37. C

    38. A

    39. C

    40. A

    41. D

    42. B

    43. A

    44. D

    45. D

    46. A

    47. B

    48. B

    49. D

    50. D