Computer Quiz 2 Welcome to your Computer Quiz 2 Name 1. What kind of lock includes a that can be used to control access into areas? None Of These Tumbler Warded Cipher Device 2. What do we call the process of collecting, organizing, storing, and otherwise maintaining complete historical records of programs and other documents used or prepared during various phases of the system? Documentation Data presentation Data history Data management Segmentation 3. Diagrammatic or symbolic representation of an algorithm is called___ E-R diagram Software Flowchart Data flow diagram 4. _____ controls the way in which the computer system functions and provides a means by which users can interact with the computer. The platform The motherboard Operating system Application software 5. What kind of protocol is used to provide internet access from mobile? TCP / IP WAP ISD None of these HTTP 6. Which of the following company launched the first laptop PC with VGA graphics in 1998? NEC Compaq Xerox IBM HP 7. Most database management systems allow you to have more than one key so that you can sort records in different ways. One of the keys is designated the ________and must hold a unique value for each record. Unique Key primary key Index key Prime attribute 8. WordStar is a software product that helps which of the following? Send emails Document processing Maintain inventory Presentation making Browse internet 9. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of__________ eight bytes eight characters eight kilobytes eight bits 10. A remote control that is used to turn on or off some machine is called_________ None of these instance message interface class 11. Which one of the following should I press to move the insertion point to the address bar, or to highlight the URL to the address bar? Alt + A Alt + D Shift + TAB TAB + CTRL 12. 13. 14. Which operator return the rows in the first query that are not present in the second query? Union all Union Intersect None of these Minus 15. What do we call the process of transferring a mobile station from one base station to another? Channeling Forwarding Looping Hand off 16. When an object has many forms, it has__________ Polymorphism Encapsulation Inheritance Scalability 17. The ability to find an individual item in a file immediately______ is used. Directory Sequential access File allocation table Direct access 18. Memory allocation at the run time is known as____ Demanding Paging Dynamic memory allocation Static memory allocation 19. The ________ model remains operative until the software is retired. Incremental model Waterfall model Spiral model Prototyping model 20. Which term refers to a small and fleeting error in a system that occurs due to unknown causes? Leech Glitch Whack Hiccup Slug 21. The loss is signal power as light travels down the fibre is called____? None of these Scattering Attenuation Interruption Prorogation 22. ____ is the logical structure of the database. Table Instances Schema Key