1.The _____ states that a foreign key must either match a primary key value in another relation or it must be null.
A.referential integrity constraint
D.entity integrity rule Click for answer
2.A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
B. macro virus
C.none of these
D.both Click for answer
3.Which error detection method uses one's complement arithmetic?
A.Simply parity check
C.Two-dimensional parity check
D.CRC Click for answer
4.A result of a computer virus can not lead to ___.
B. Corruption of program.
C.Mother Board Crash
D.Deletion of files. Click for answer
5.The network interface card of LAN is related to following layer of OSI Model-
D.All of these Click for answer
6.Which of the following does not describe a data warehouse?
D.Integrated Click for answer
7.Which of the following is true ?
A.Logical design is software-dependent.
B.In a distributed database, database is stored in one physical location
C.Conceptual design translates the logical design into internal model
D.Logical design is software independent. Click for answer
8.A range check _____
A.determines whether a number is within a specified limit.
B.tests if the data in two or more associated fields is logical.
C.verifies that all required data is present.
D.ensures that only the correct data type is entered into a field. Click for answer