Professional Documents
Culture Documents
(a)Seven
(b)Five
(c)Two
2.All of the field used to describe the attribute of an entity are grouped to form
a________.
(a)record
(b)file
(c)Database
(a)attribute
(b)field
(c)Database
4.A______store data that have been extracted from various opertional,external and
other
Database of an organization.
(a)Data mining
(b)Data warehouse
(a)3
(b)8
(c)5
(b)network structure
(a) record
(b)field
(c) character
8.the first field in a record is used to store some type of unique identifier for the
(a) field
(B) record
(C)file
(B)Database structure
(C)both a & b
Answer
8.Primary key
9.Field
10.Database management
4. The OSI reference model defines _________ layers of functions that take
place at each end of communication
a) Six layers
b) Five layers
c) Three layers
d) Seven layers
5. OSI model layer that supports error free organization and transmission of
data in the network is
a) Physical layer
b) Network layer
c) Data link layer
d) Transport layer
6. OSI model layer that support the organization and transfer of data between
nodes in the network
a) Physical layer
b) Network layer
c) Data link layer
d) Transport layer
7. OSI model layer that provides communication services for end user
application
a) Presentation layer
b) Session layer
c) Application layer
d) Transport layer
a) Terminals
b) Telecommunication processors
c) Telecommunication channels
d) Control software
a) Star topology
b) Ring topology
c) Bus topology
d) None of these
a) Star topology
b) Ring topology
c) Bus topology
d) None of these
1. Extranets for e-commerce used to access inventory replenish stock and send
documents are used by:
A) Suppliers
B) Inventory Management System
C) Both a and b
D) Remote offices
(Answer: A. Suppliers)
5. Which of the following consists of programs that control and manage the
functions of telecommunication networks:
A) Ethernet
B) Terminals
C) Telecommunication Processors
D) Telecommunication control software
(Answer: D. Telecommunication control software)
7. A secure network that uses internet as its main backbone network but relies
on network firewalls encryption or other security features are called:
A) VPN
B) Virtual Private Network
C) Virtual Personal Network
D) Both a and b
(Answer: D. Both a and b)
8. A short range wireless device that serves as a cable free wireless connection
to computer, printers and scanners is called:
A) Wifi
B) Bluetooth
C) Both a and b
D) None of the above
(Answer: B. Bluetooth)