This page provides Computer Officer sample paper which will be very useful for various computer practical exams such as schools, colleges, psc exam, bank exams, governmental and non-governmental jobs exam etc.  So keep practice around on are really helpful.
Computer Officer Exam Sample Question Paper
F.M.:
50Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â PM:
20Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Time: 30 mins
Attempt
all of the following questions. Each question carries equal marks.
1. The _____ states that a foreign key must either match a primary key value
in another relation or it must be null.
(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these
2. An applet __________
(a) is an interpreted program that runs on the client
(b) tracks the number of visitors to a Website
(c) is a compiled program that usually runs on the client
(d) collects data from visitors to a Website
(e) None of these
(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these
2. An applet __________
(a) is an interpreted program that runs on the client
(b) tracks the number of visitors to a Website
(c) is a compiled program that usually runs on the client
(d) collects data from visitors to a Website
(e) None of these
3.
A _____ sometimes called a boot sector virus, executes when a computer boots
up because it resides in the boot sector of a floppy disk or the master boot
record of a hard disk.
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of theseÂ
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of theseÂ
4.
Which error detection method uses one’s complement arithmetic?
(a) Simply parity check
(b) Checksum
(c) Two-dimensional parity check
(d) CRC
(e) None of theseÂ
(a) Simply parity check
(b) Checksum
(c) Two-dimensional parity check
(d) CRC
(e) None of theseÂ
5.
A result of a computer virus can not lead to ___.
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption of program
(d) Deletion of files
(e) None of theseÂ
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption of program
(d) Deletion of files
(e) None of theseÂ
6.
The network interface card of LAN is related to following layer of
OSI Model-
(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of theseÂ
(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of theseÂ
7.
Which of the following does not describe a data warehouse?
(a) Subject-oriented
(b) Integrated
(c) Time-variant
(d) Updateable
(e) None of theseÂ
(a) Subject-oriented
(b) Integrated
(c) Time-variant
(d) Updateable
(e) None of theseÂ
8.
Which of the following is true ?
(a) Logical design is software-dependent
(b) In a distributed database, database is stored in one physical location
(c) Conceptual design translates the logical design into internal model
(d) Logical design is software independent
(e) None of theseÂ
(a) Logical design is software-dependent
(b) In a distributed database, database is stored in one physical location
(c) Conceptual design translates the logical design into internal model
(d) Logical design is software independent
(e) None of theseÂ
9.
A range check _____
(a) ensures that only the correct data type is entered into a field
(b) verifies that all required data is present
(c) determines whether a number is within a specified limit
(d) tests if the data in two or more associated fields is logical
(e) None of theseÂ
(a) ensures that only the correct data type is entered into a field
(b) verifies that all required data is present
(c) determines whether a number is within a specified limit
(d) tests if the data in two or more associated fields is logical
(e) None of theseÂ
10.
The total set of interlinked hypertext documents worldwide is-
(a) HTTP
(b) Browser
(c) WWW
(d) B2B
(e) None of these
11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(a) HTTP
(b) Browser
(c) WWW
(d) B2B
(e) None of these
11. With the object-oriented (OO) approach, an object encapsulates, or_____.a programmer.
(a)
carries out, the details of an object for
(b) hides, the details of an object from
(c) reveals, the details of an object to
(d) extends, the details of an object beyond
(e) None of theseÂ
(b) hides, the details of an object from
(c) reveals, the details of an object to
(d) extends, the details of an object beyond
(e) None of theseÂ
12.
Every computer connected to an intranet or extranet must have a
distinct_____
(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of theseÂ
(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of theseÂ
13.
A table of bits in which each row represents the distinct values of a key?
(a) Join index
(b) Bitmap index
(c) B + Tree
(d) Hierarchical index
(e) None of theseÂ
14. The degree of detail that should be incorporated into a database depends on what?
(a) Join index
(b) Bitmap index
(c) B + Tree
(d) Hierarchical index
(e) None of theseÂ
14. The degree of detail that should be incorporated into a database depends on what?
(a)
Data integrity
(b) The type of database
(c) The user’s perspective
(d) The business practices and policies
(e) None of theseÂ
(b) The type of database
(c) The user’s perspective
(d) The business practices and policies
(e) None of theseÂ
15.
The ___.converts digital signals to analog signals for the purpose of
transmitting data over telephone lines.
(a) Modem
(b)Â Router
(c) Gateway
(d) Bridge
(e) All of theseÂ
(a) Modem
(b)Â Router
(c) Gateway
(d) Bridge
(e) All of theseÂ
16.
Before a package can be used in a java program it must be___.
(a) executed
(b) referenced
(c) imported
(d) declared
(e) None of theseÂ
(a) executed
(b) referenced
(c) imported
(d) declared
(e) None of theseÂ
17.
Choose the correct way to indicate that a line in a C++ program is a
comment line, that is, a line the will not be executed as an instruction___.
(a) begin the line with a # sign
(b) begin the line with double slashes (/ /)
(c) begin and end the line with double hyphens (-_-)
(d) indent the line
(e) None of these
18. Programming language built into user programs such as Word and Excel are known as____
(a) begin the line with a # sign
(b) begin the line with double slashes (/ /)
(c) begin and end the line with double hyphens (-_-)
(d) indent the line
(e) None of these
18. Programming language built into user programs such as Word and Excel are known as____
(a)
4GLs
(b) macro languages
(c) object-oriented languages
(d) visual programming languages
(e) None of theseÂ
(b) macro languages
(c) object-oriented languages
(d) visual programming languages
(e) None of theseÂ
19.
Firewalls are used to protect against___.
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of theseÂ
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of theseÂ
20.
This is a standard way for a Web server to pass a Web user’s request to an
application program and to receive data back to forward to the user-
(a) Interrupt request
(b) Forward DNSÂ lookup
(c) Data-Link layer
(d) File Transfer Protocol
(e) Common gateway interfaceÂ
(a) Interrupt request
(b) Forward DNSÂ lookup
(c) Data-Link layer
(d) File Transfer Protocol
(e) Common gateway interfaceÂ
21.
Three SQL, DDL, CREATE commands are__.
(a) Schema, Base and Table
(b) Base, Table and Schema
(c) Key, Base and Table
(d) Schema, Table and View
(e) None of theseÂ
(a) Schema, Base and Table
(b) Base, Table and Schema
(c) Key, Base and Table
(d) Schema, Table and View
(e) None of theseÂ
22.
Data are ________ in client/server computing.
(a) never sent to the client machine
(b) sent in very large sections to save processing time
(c) sent only upon the client’s request
(d) sent in complete copies for the client to filter and sort
(e) sent from the client to the server for processing
23. Which of the following will not eliminates the ambiguities of a null value?
(a) never sent to the client machine
(b) sent in very large sections to save processing time
(c) sent only upon the client’s request
(d) sent in complete copies for the client to filter and sort
(e) sent from the client to the server for processing
23. Which of the following will not eliminates the ambiguities of a null value?
(a)
Define the attribute as required
(b) Define subtypes
(c) Define each attribute as having an initial value that is recognized as blank
(d) Define supertypes
(e) None of theseÂ
(b) Define subtypes
(c) Define each attribute as having an initial value that is recognized as blank
(d) Define supertypes
(e) None of theseÂ
24.
The____directory is mandatory for every disk.
(a) Root
(b) Base
(c) Sub
(d) Case
(e) None of theseÂ
(a) Root
(b) Base
(c) Sub
(d) Case
(e) None of theseÂ
25.
This is a group of servers that share work and may be able to back
each other up if one server fails.
(a) Channel bank
(b) Cluster
(c) Tiger team
(d) Serverless backup
(e) Logical unit
If you have any problem or want to ask anything regarding on it, you can ask me in the comment section. Visit next page to read more.
(a) Channel bank
(b) Cluster
(c) Tiger team
(d) Serverless backup
(e) Logical unit
If you have any problem or want to ask anything regarding on it, you can ask me in the comment section. Visit next page to read more.
aru officer ko question xena
ReplyDeleteOk ma upload garxu.. website ma kehi din ma
ReplyDelete