Learn With Us Earn With US

Tittle icon

NIELIT ECC MOCK TEST SERIES

NIELIT ECC MOCK TEST -1

1 / 100

1.Which of the following is generally used for performing tasks like creating the structure of the relations, deleting relation?

2 / 100

2.Which of the following provides the ability to query information from the database and insert tuples into, delete tuples from, and modify tuples in the database?

3 / 100

3.The given Query can also be replaced with :

SELECT name, course id FROM instructor, teaches

WHERE instructor ID= teaches ID;

4 / 100

4.Which one of the following given statements possibly contains the error?

5 / 100

5.Ready the Query carefully:

SELECT emp_name FROM department

WHERE dept_name LIKE '           Computer Science';

In the above-given Query, which of the following can be placed in the Query's blank portion to select the "dept_name" that also contains Computer Science as its ending string?

6 / 100

6.What do you mean by one to many relationships?

 

7 / 100

7.In the following Query, which of the following can be placed in the Query's blank portion to display the salary from highest to lowest amount, and sorting the employs name alphabetically?

SELECT *

FROM instructor

ORDER BY salary         , name       ;

8 / 100

8.The given Query can be replaced with :

SELECT name FROM instructor1

WHERE salary <= 100000 AND salary >= 90000;

9 / 100

9.A Database Management System is a type of __________Software

 

10 / 100

10.The term "FAT" is stands for

 

11 / 100

11.Which of the following can be considered as the maximum size that is supported by FAT?

AD

12 / 100

12. Ctrl, Shift and Alt are called …. keys.

 

13 / 100

13.Which of the following can be considered as the maximum size that is supported by NTFS?

14 / 100

14.A huge collection of the information or data accumulated form several different sources is known as :

 

15 / 100

15.Which of the following can be used to extract or filter the data & information from the data warehouse?

 

16 / 100

16.Which one of the following refers to the copies of the same data (or information) occupying the memory space at multiple places.

 

17 / 100

17.Which one of the following refers to the "data about data"?

 

18 / 100

18.Which of the following refers to the level of data abstraction that describes exactly how the data actually stored?

19 / 100

19.To which of the following the term "DBA" referred?

 

20 / 100

20.In general, a file is basically a collection of all related .

 

21 / 100

21.The term "Data" refers to:

22 / 100

22.Rows of a relation are known as the .

23 / 100

23.Which of the following refers to the number of tuples in a relation?

 

24 / 100

24.Which one of the following is a type of Data Manipulation Command?

 

25 / 100

25.Which of the following command is a type of Data Definition language command?

 

26 / 100

26.Which of the following is a top-down approach in which the entity's higher level can be divided into two lower sub-entities

27 / 100

27.In which one of the following, the multiple lower entities are grouped (or combined) together to form a single higher-level entity?

 

28 / 100

28.In a relation database, every tuples divided into the fields are known as the _______.

 

29 / 100

29.The term "TCL" stands for                 .

 

30 / 100

30.In the relational table, which of the following can also be represented by the term "attribute"?

31 / 100

31.Which of the following refers to the number of attributes in a relation?

 

32 / 100

32.Which of the following is used in the application programs to request data from the database management system?

33 / 100

33.Which one of the following command is used to delete the existing row in a table?

 

34 / 100

34.Which of the following commands is used to save any transaction permanently into the database?

 

35 / 100

35.Which one of the following commands is used for removing (or deleting) a relation forms the SQL database?

36 / 100

36.Which one of the following commands is used to restore the database to the last committed state?

37 / 100

37.The database management system can be considered as the collection of                       that enables us to create and maintain the database.

38 / 100

38.The term "DFD" stands for?

39 / 100

39.Which of the following refers collection of the information stored in a database at a specific time?

40 / 100

40.The term "SQL" stands for

41 / 100

41.The term "Data independence" refers to __________

42 / 100

42.What is the relation calculus?

43 / 100

43.Which one of the following refers to the total view of the database content?

 

44 / 100

44.For what purpose the DML is provided?

45 / 100

45.The term "ODBC" stands for__________

 

46 / 100

46.In the relation model, the relation are generally termed as                        

 

47 / 100

47.The Database Management Query language is generally designed for the __________

 

48 / 100

48.Which of the following keys is generally used to represents the relationships between the tables?

49 / 100

49.Which of the following levels is considered as the level closed to the end-users?

 

50 / 100

50.A computer security protocol for logging-in can be considered as the example of the

            component of an information system.

51 / 100

51.Which one of the following keyword is used to find out the number of values in a column?

52 / 100

52.Which one of the following is commonly used to define the overall design of the database?

53 / 100

53.Which one of the following commands is used to modify a column inside a table?

54 / 100

54. A hacker that changes or forges information in an electronic resource, is engaging in.

55 / 100

55.PROM in computer language stands for

56 / 100

56.You can check Spelling and grammatical mistakes by the________ option?

57 / 100

57.What is a Firewall in Computer Network?

58 / 100

58............ is used to create a set of document ,such as forms, letters,or labels.

59 / 100

59.The IC chip used in computer is made of

60 / 100

60.1 MB is equal to            

 

61 / 100

61.In which of the following, a person is constantly followed/chased by another person or group of several peoples?

62 / 100

62.Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?

63 / 100

63.________is a type of software designed to help the user's computer detect viruses and avoid them.

64 / 100

64.It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the :

65 / 100

65.Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?

66 / 100

66.Read the following statement carefully and find out whether it is correct about the hacking or not?

67 / 100

67.Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?

68 / 100

68.Which of the following refers to the violation of the principle if a computer is no more accessible?

69 / 100

69.Which one of the following refers to the technique used for verifying the integrity of the message?

70 / 100

70.In ethical hacking and cyber security, there are                           types of scanning: AD

71 / 100

71.To protect the computer system against the hacker and different kind of viruses, one must always keep on in the computer system.

72 / 100

72.Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system?

73 / 100

73.The term "TCP/IP" stands for____________

 

74 / 100

74.The response time and transit time is used to measure the                 of a Network

75 / 100

75.Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's limit

76 / 100

76.In the computer networks, the encryption techniques are primarily used for improving the________

77 / 100

77.Which of the following statements is correct about the firewall?

78 / 100

78.Which one of the following principles of cyber security refers that the security mechanism must be as small and simple as possible?

79 / 100

79.Which of the following principle of cyber security restricts how privileges are initiated whenever any object or subject is created?

80 / 100

80.Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or access should not be given to the employee unless that

 

employee has work that requires certain rights, privileges. It can be considered as a perfect example of which principle of cyber security?

81 / 100

81.Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?

82 / 100

82.The web application like banking websites should ask its users to log-in again after some specific period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?

83 / 100

83.Which one of the following statements is correct about Email security in the network security methods?

84 / 100

84.Which of the following statements is true about the VPN in Network security?

85 / 100

85.Which of the following type of text is transformed with the help of a cipher algorithm?

86 / 100

86.Which of the following are the types of scanning?

87 / 100

87.Which type of the following malware does not replicate or clone them self's through infection?

88 / 100

88.Which of the following malware's type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers.

89 / 100

89.Which of the following statements is true about the Trojans?

90 / 100

90.Which of the following is just opposite to the Open Design principle?

91 / 100

91.Which of the following is a type of independent malicious program that never required any host program?

92 / 100

92.Which of the following usually considered as the default port number of apache and several other web servers?

93 / 100

93.Which one of the following systems cannot be considered as an example of the operating systems?

94 / 100

94.In the CIA Triad, which one of the following is not involved?

95 / 100

95.In an any organization, company or firm the policies of information security come under___________

96 / 100

96.Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals?

97 / 100

97.An order to ensure the security of the data/ information, we need to ________________ the data:

98 / 100

98.Which one of the following is considered as the most secure Linux operating system that also provides anonymity and the incognito option for securing the user's information?

99 / 100

99.Which type following UNIX account provides all types of privileges and rights which one can perform administrative functions?

100 / 100

100.Which of the following is considered as the first hacker's conference?

Your score is

The average score is 11%

0%

Exit

Our Visitor

001006
Views Today : 10
Total views : 2825
Last Update : 7 SEPTEMBER 2024
GET IN TOUCH

All Rights Reserved Copyright © 1999-2024 MS Expert Team