Learning Mode - Computer

Computer

Which of following stores data in an organized form?

A. Word Processor
B. Ledger
C. Spread sheet
D. Database

The shape that is used to represent an attribute in an ERD is?

A. A diamond
B. An octagon
C. A rectangle
D. An ellipse

The relationship that matches one record of an entity with only one record of another entity is called?

A. One-to-One relationship
B. One-to Many relationship
C. Many-to-One relationship
D. Many-to-Many relationship

Data Redundancy means?

A. Duplication of Data
B. Variety of Data
C. Size of Data
D. Data Type

A key that allows only unique entries in a field is called?

A. Primary Key
B. Secondary Key
C. Foreign Key
D. Super Key

A field that stores the names of students should be defined as?

A. Integer
B. Float
C. String
D. Boolean

In a relational database, keys are used to create a?

A. Table
B. Fields
C. Records
D. Relationship

In a database table of "Students", the particulars of a single student will be a?

A. Record
B. Field
C. Entity
D. Data type

In a database table of "Students", the address of the students will be a?

A. Record
B. Field
C. Entity
D. Boolean

The basic limitation of a flat file database is that?

A. It is complicated
B. It stores data in a single
C. It is very heavy
D. It is not supported on internet

Which of the following Microsoft Office packages is a DBMS?

A. MS-Word
B. MS-Excel
C. MS-Power Point
D. MS-Access

Utility software designed to protect computers from any potential threats of data or hardware loss from viruses or malware are called?

A. Firewalls
B. Anti-spywares
C. Security-wares
D. Anti-virus

The illegal use, copying or distribution of copyrighted software is called?

A. Software piracy
B. Software theft
C. Software threat
D. Software robbery

Persons who gain unauthorized access to another system are called?

A. Hackers
B. Phishers
C. Crackers
D. All of these

The crime that is committed through a computer or a network is called?

A. Net-crime
B. Internet crime
C. Cyber-crime
D. Online crime

It is presenting someone else work or ideas as your own without full acknowledgement to the author or conceiver?

A. Trademark
B. Patent
C. Copyright
D. Plagiarism

It is one of the largest computer security companies in the world?

A. Avira
B. MacAfee
C. Norton
D. Avast

A malware that monitors a device and steals important information and sends such information to another person or organization is called?

A. Viruses
B. Adware
C. Spyware
D. Worm

Boot sector, Resident and file infector are some examples of?

A. Viruses
B. Adware
C. Spyware
D. Worm

It is a method of trying to gather personal information using false e-mails and websites?

A. Hacking
B. Click jacking
C. Phishing
D. Cracking

According to Pakistan's Cyber Crime Law, any offender may be sent to jail for?

A. 1 to 3 years
B. 3 to 5 years
C. 5 to 7 years
D. 7 to 10 years

"Click this link and win a $5 voucher at McDonald's". This is an example of?

A. Scam
B. Phishing
C. Click jacking
D. Hacking

Through which virus spreads?

A. Email Attachments
B. Internet Downloads
C. Flash Disks and CDs
D. All of them

The malware that replicates itself and doesn't need to attach with any files is?

A. Virus
B. Adware
C. Spyware
D. Worm

Since it does not harm or steal data, the least harmful malware is?

A. Virus
B. Adware
C. Spyware
D. Trojan