Hssc Computer Health Department Exam 2016 (Shift-II)

Total Questions: 100

21. Which of the following com-puter technology helps you to easily insert, retrieve, and manage data from database with appropriate security measures?

Correct Answer: (1) DBMS (Data base management systems)
Solution:Data base management System is a software which is made for the management of date and its efficient use.

22. Which of the following constraints help uniquely identify records in a table?

Correct Answer: (1) Primary key constraint
Solution:Primary key constraint helps to provide a unique identification of records in a table.

23. Which of the following is an input device?

Correct Answer: (1) Keyboard
Solution:Input devices are: Key-board, Mouse, Joystick, Scanner etc.

24. Which of the following is not a computer peripheral?

Correct Answer: (1) Mother board
Solution:Motherboard, rest are Computer peripheral.

25. _______is a temporary memory that loses information when the computer is switched off.

Correct Answer: (1) Random Access Memory (RAM)
Solution:Random access memory is a temporary memory that loses information when the computer is swithedoff.

26. Bluetooth is widely used technology for:

Correct Answer: (1) Wireless personal Area Network (WPAN)
Solution:Bluetooth is a wireless technology standard by which data exchanges can be made possible for short distances using radio waves of small wave lengths.Different devices such as mouse, keyboard, Printer, modems etc. with it, are connected without wire, wireless personal area network can also be made by connecting computer at short distances.

27. A variable in Programming is a:

Correct Answer: (1) Named piece of Memory for storing data
Solution:Piece of memory for storing data is a variable for programming.

28. An object in an object oriented programming is:

Correct Answer: (1) An instance of a class
Solution:An instance of a class is an object oriented programming.

29. Protocol used for forwarding e-mail messages is:

Correct Answer: (1) Simple Mail Transfer Protocol (SMTP)
Solution:Simple mail transfer protocol is used for forwarding e-mail messages.

30. ____is the electronic equivalent of ordinary signatures that provides authenticity of the electronic data.

Correct Answer: (1) Digital Signature
Solution:Digital signature is the electronic equivalent of ordinary signature that provides authenticity.