0

Computer Awareness

Description: E-Com.
Number of Questions: 15
Created by:
Tags: E-Commerce and Oracle Introduction to E-Commerce Database Data Communication and Networks
Attempted 0/15 Correct 0 Score 0

Which of the following securities is more suitable for blocking unauthorized users on one network to gain access to another network?

  1. Protocols

  2. Encryption

  3. Firewall

  4. HTML

  5. XML


Correct Option: C
Explanation:

This type of security is more suitable for blocking unauthorized users on one network to gain access to another network.

Which of the following properties of object oriented databases specifies that two objects in the database are related together?

  1. Relationship

  2. Attribute

  3. Interface

  4. Class

  5. Extents


Correct Option: A
Explanation:

This property of object oriented databases specifies that two objects in the database are related together.

Which of the following programming languages does not support query language proposal for the ODMG object model?

  1. Smalltalk

  2. C++

  3. Java

  4. C

  5. None of these


Correct Option: D
Explanation:

This programming language does not support query language proposal for the ODMG object model.

Which of the following SQL statements are used to specify querying, insert, delete and update operations?

  1. DDL statements

  2. DML statements

  3. Transaction control statements

  4. Session control statements

  5. System control statements


Correct Option: B
Explanation:

These SQL statements are used to specify querying, insert, delete and update operations.

Which of the following schema objects in oracle is used as a special data type for automatic attribute value generation?

  1. Synonyms

  2. Program units

  3. Sequences

  4. Indexes

  5. Clusters


Correct Option: C
Explanation:

This schema object in oracle is used as a special data type for automatic attribute value generation.

Which of the following forms of e-commerce is used by two persons, who want to sell/purchase items?

  1. B2C

  2. B2B

  3. C2C

  4. B2G

  5. None of these


Correct Option: C
Explanation:

This form of e-commerce is used by two persons who want to sell/purchase items.

Which of the following database system is a network of two or more oracle databases that reside on one or more machines?

  1. Heterogeneous Distributed Database System

  2. Client/Server Database Architecture

  3. Homogenous Distributed Database System

  4. Prepared

  5. Abort


Correct Option: C
Explanation:

This is a database system is a network of two or more oracle databases that reside on one or more machines.

Which of the following literals in object data management group(ODMG) correspond to the values of basic data types and are predefined?

  1. Structured literals

  2. Atomic literals

  3. Collection literals

  4. Identifiers

  5. Keywords


Correct Option: B
Explanation:

This type of literals in object data management group(ODMG) correspond to the values of basic data types and are predefined.

Which of the following layers in OSI performs data encryption and compression of data so that it can be easily transferred to different computers?

  1. Application

  2. Presentation

  3. Transport

  4. Data link

  5. Physical


Correct Option: B
Explanation:

This layer in OSI performs data encryption and compression of data so that it can be easily transferred to different computers.

Which of the following database links is used to access remote database to a user, which requires an account on the remote database with the same username as its account on the local database?

  1. Connected user link

  2. Fixed user link

  3. Auditing database links

  4. Current user link

  5. Synonyms


Correct Option: A
Explanation:

This database link is used to access remote database to a user, which requires an account on the remote database with the same username as its account on the local database.

Which of the following partitionings in distributed databases is specified by a list of values of the partitioning key?

  1. Range partitioning

  2. List partitioning

  3. Composite Range-Hash partitioning

  4. Composite Range-List partitioning

  5. Local indexes


Correct Option: B
Explanation:

This type of partitioning in distributed databases is specified by a list of values of the partitioning key.

Which of the following applications of distributed database is the one that reduces the amount of data transfer required between sites, when a transaction retrieves data from remote tables referenced in a distributed SQL statement?

  1. Location transparency

  2. Remote procedure calls

  3. Distributed query optimization

  4. Replication transparency

  5. System change number


Correct Option: C
Explanation:

This application of distributed database is the one that reduces the amount of data transfer required between sites when a transaction retrieves data from remote tables referenced in a distributed SQL statement.

Which of the following attributes is used in PL/SQL to fetch all the records from the cursor until the last record?

  1. %FOUND

  2. %NOTFOUND

  3. ISOPEN

  4. %ROWCOUNT

  5. Program counter


Correct Option: B
Explanation:

This attribute is used in PL/SQL to fetch all the records from the cursor until the last record.

Which of the following networks defines protocols to communicate logically among computers linked by the physical network?

  1. Logical network

  2. Physical network

  3. World Wide Web

  4. E-commerce

  5. HTML


Correct Option: A
Explanation:

This network defines protocols to communicate logically among computers linked by the physical network.

Which of the following algorithms of TCP allows old implementation of TCP to start a connection with the sender so that multiple segments can be injected into the network up to the window size advertised by the receiver?

  1. Congestion avoidance

  2. Fast retransmit

  3. Slow start

  4. Fast recovery

  5. Listen


Correct Option: C
Explanation:

This algorithm of TCP allows old implementation of TCP to start a connection with the sender so that multiple segments can be injected into the network up to the window size advertised by the receiver.

- Hide questions