Describe a data warehouse

Assignment Help Other Subject
Reference no: EM132361543

Technical Questions in an Interview -

Q1. The _____ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these

Q2. An applet __________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

(e) None of these

Q3. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

Q4. Which error detection method uses one's complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

Q5. A result of a computer virus can not lead to ___.

(a) Disk Crash

(b) Mother Board Crash

(c) Corruption of program

(d) Deletion of files

(e) None of these

Q6. The network interface card of LAN is related to following layer of OSI Model-

(a) Transport

(b) Network

(c) Data Link

(d) Physical

(e) All of these

Q7. Which of the following does not describe a data warehouse?

(a) Subject-oriented

(b) Integrated

(c) Time-variant

(d) Updateable

(e) None of these

Q8. Which of the following is true?

(a) Logical design is software-dependent

(b) In a distributed database, database is stored in one physical location

(c) Conceptual design translates the logical design into internal model

(d) Logical design is software independent

(e) None of these

Q9. A range check _____

(a) ensures that only the correct data type is entered into a field

(b) verifies that all required data is present

(c) determines whether a number is within a specified limit

(d) tests if the data in two or more associated fields is logical

(e) None of these

Q10. The total set of interlinked hypertext documents worldwide is-

(a) HTTP

(b) Browser

(c) WWW

(d) B2B

(e) None of these

Q11. With the object-oriented (OO) approach, an object encapsulates, or_____ a programmer.

(a) carries out, the details of an object for

(b) hides, the details of an object from

(c) reveals, the details of an object to

(d) extends, the details of an object beyond

(e) None of these

Q12. Every computer connected to an intranet or extranet must have a distinct_____

(a) firewall

(b) proxy server

(c) IP address

(d) domain name

(e) None of these

Q13. A table of bits in which each row represents the distinct values of a key?

(a) Join index

(b) Bitmap index

(c) B + Tree

(d) Hierarchical index

(e) None of these

Q14. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity

(b) The type of database

(c) The user's perspective

(d) The business practices and policies

(e) None of these

Q15. The ___.converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

(b) Router

(c) Gateway

(d) Bridge

(e) All of these

Q16. Before a package can be used in a java program it must be___.

(a) executed

(b) referenced

(c) imported

(d) declared

(e) None of these

Q17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction___.

(a) begin the line with a # sign

(b) begin the line with double slashes (/ /)

(c) begin and end the line with double hyphens (-_-)

(d) indent the line

(e) None of these

Q18. Programming language built into user programs such as Word and Excel are known as____

(a) 4GLs

(b) macro languages

(c) object-oriented languages

(d) visual programming languages

(e) None of these

Q19. Firewalls are used to protect against___.

(a) Unauthorized Attacks

(b) Virus Attacks

(c) Data Driven Attacks

(d) Fire Attacks

(e) All of these

Q20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

(a) Interrupt request

(b) Forward DNS lookup

(c) Data-Link layer

(d) File Transfer Protocol

(e) Common gateway interface

Q21. Three SQL, DDL, CREATE commands are__.

(a) Schema, Base and Table

(b) Base, Table and Schema

(c) Key, Base and Table

(d) Schema, Table and View

(e) None of these

Q22. Data are ________ in client/server computing.

(a) never sent to the client machine

(b) sent in very large sections to save processing time

(c) sent only upon the client's request

(d) sent in complete copies for the client to filter and sort

(e) sent from the client to the server for processing

Q23. Which of the following will not eliminates the ambiguities of a null value?

(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value that is recognized as blank

(d) Define super types

(e) None of these

Q24. The ____directory is mandatory for every disk.

(a) Root

(b) Base

(c) Sub

(d) Case

(e) None of these

Q25. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank

(b) Cluster

(c) Tiger team

(d) Server less backup

(e) Logical unit

Reference no: EM132361543

Questions Cloud

Explain or draw a demilitarized zone : 1. Explain defense in-depth or layered security. Give examples of the defenses for each layer.
How success will be measured based on your strategy-goals : Lay out a strategy to overcome these conflicts and improve workplace performance. Explain how success will be measured based on your strategy and goals.
Method of attack and preventative measures : Describe the method of attack and preventative measures. Also post your paper to discussion 3 and reply to two of your classmates' posts.
Making the data work for you : Excel is either the most terrifying and mystifying program, or one of the easiest and useful programs, on the face of the lanet...depending upon who you ask
Describe a data warehouse : Which of the following does not describe a data warehouse? The network interface card of LAN is related to following layer of OSI Model
Select the three factors of organization culture : Select the three factors of an organization's culture that you feel are important to successfully implement a new strategy.
Write a description of the patient case from your experience : Write a description of the patient case from your experiences, observations, and/or clinical practice from the last 5 years. Then, describe factors that might.
Design a questionnaire to conduct a heuristic review : CSE2ICX Internet Client Engineering-La Trobe University, Melbourne-Design a questionnaire to conduct a heuristic review of the websites.
Focuses on the genetic component of variations seen in trait : BIO3344-Traits and genetic disorders are influenced in one way or another by environment. Focuses on the genetic component of variations seen in a trait.

Reviews

Write a Review

Other Subject Questions & Answers

  Summarize your findings and analysis from the reports

Summarize your findings and analysis from the reports provided. Determine the main areas that engage students and the main areas that do not.

  Initial rate kinetic data

Consider the reaction: xA + yB → products. The following Initial Rate kinetic data were obtained:

  Demonstrate techniques to engage customers

Objectives: To discuss how "sales" drive the business in different segments of the Entertainment Business. To solve problems related to low sales (a problem)

  Argument against the person-abusive

Tom Larsen could not have written this fine term paper. Tom is as stupid as the day is long, and he can't put three words together to form an intelligent sentence.

  Persuasion and social movements 5th edition

are there chapter summaries and flashcards for Persuasion and Social Movements 5th edition?

  Mpbs align compensation policies issues

In what ways might the plan MPBS develops and the related compensation policies impact job performance?

  Approaches to studying social problems

According to Time magazine, the first decade of the 21st century was. Deviants are treated as the cause of their own problems by which of the following approaches to studying social problems?

  How you would avoid violating copyright

Describe how you would avoid violating copyright and intellectual property laws for the material used on your website.

  Discuss standardized nursing languages might assist nurses

Discuss one way that information technology and standardized nursing languages might assist nurses

  How social worker help clients to make meaning of the trauma

Provide a suggestion for how a social worker could help clients to understand and make meaning of the trauma within the client's values and belief framework.

  Warehouse move project

How will project communications and interactions work between the project manager, the stakeholders and the project team?

  What is the mass of the planet newtonia

On the planet Newtonia, a simple pendulum having a bob with mass 1.35kg and a length of 195.0cm takes 1.31s , when released from rest, to swing through an angle of 12.5 ^\circ, where it again has zero speed. The circumference of Newtonia is measur..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd