Computer Awareness for Banking 2020-2021 - 1

Question: 1

Collecting personal information and effectively posing as another individual is known as the crime of _____

(A) Spooling

(B) Identity theft

(C) Hacking

(D) Spoofing

Ans: D

Spoofing

Question: 2

A DBMS that combines a DBMS and an application generator is ____

(A) Oracle Corporation’s Oracle

(B) Microsoft’s SQL Server

(C) Microsoft’s Access

(D) None of these

Ans: C

Microsoft’s Access

Question: 3

E.F. Codd represented _____ rules that a database must obey if it has to be considered truly relational.

(A) 6

(B) 8

(C) 10

(D) 12

Ans: D

12

Question: 4

The ability to find an individual item in a file immediately

(A) Sequential access

(B) File allocation table

(C) Directory

(D) Direct access

Ans: D

Direct access

Question: 5

A prescribed set of well- defined instructions for solving mathematical problems is called ____

(A) An algorithm

(B) A description

(C) A code

(D) A compiler

Ans: A

An algorithm

Related Questions