Almost all MCQs of Computer

2013


Forget about Wi-Fi - the future of home wireless networking is, according to boffins, the light bulb.
So say a number of researchers and technologists who are looking to light to provide the next step in high-speed data networking in the home.
PureVLC D-Light
The principle is simple: turn a light on and off so rapidly that the human eye can't see the flicker, but a photodetector can nonetheless pick up the stream of 1s and 0s the blinking bulb is transmitting. Compress the data, and you up the throughput even more. Old-style filament bulbs and fluorescent tubes aren't up to the task, but new, LED-based lighting is.
It's not hard to envisage home lighting with an integrated photodetector - to pick up signals sent back from networked devices - and perhaps a powerline adaptor on board to maintain a connection over electrical wiring back to the router.
The technique is called Visible Light Communications - or VLC, not to be confused with the open source media player of the same name - but the companies springing up to deliver the technology are already branding it "Li-Fi". The similarity to the name "Wi-Fi" is deliberate: they hope VLC will become as ubiquitous a networking technology as 802.11 has become.

Lightbulbs, lightbulbs everywhere

One of VLC's key proponents, Harald Haas of the University of Edinburgh, reckons that isn't hyperbole. With tens of billions of regular lightbulbs installed in homes and offices across the globe, as they're replaced with LED light sources, Li-Fi can be a communications technology that can be found almost everywhere.
Li-Fi bulbs will inevitably be more costly than regular LED bulbs, but then the potential volumes will, Haas reckons, push prices right down.
How Li-Fi works
More to the point, Li-Fi could be used in almost every location where regulations forbid the use of Wi-Fi: aircraft cabins and hospitals, to name but two. And light isn't affected by the spectrum regulations that govern how radio frequencies can be used.
Of course, getting it out of the lab and into the living room - and every other space illuminated by a lightbulb - is another matter.


Forms Personalization

What is Forms Personalization? Where it is used? What For?
Forms Personalization is a standard feature provided by oracle and supported by oracle to customize the forms. With Forms personalization you can hide fiedls, make fields mandatory, create zoom functionality, change lov dynamically e.t.c
More at:www.cs-mcqs.blogspot.com.
What are different triggers that can be used in personalization?
WHEN-NEW-FORM-INSTANCE WHEN-NEW-BLOCK-INSTANCE WHEN-NEW-RECORD-INSTANCE WHEN-NEW-ITEM-INSTANCE WHEN-VALIDATE-RECORD MENUS SPECIAL EVENTS
More at:www.cs-mcqs.blogspot.com.
What is the difference between having personalization at function level rather than form level?
A Form can have multiple functions. Having the personalization at function level limits the scope of the personalization. For example in Inventory for both "Master Item form" and "Organization Item form" uses same form named INVIDITM where as both have different fucntions linked to them.
More at:www.cs-mcqs.blogspot.com.
Can you use global variables in forms personalization? If so How?
Yes.
More at:www.cs-mcqs.blogspot.com.
Can you hide a text field using personalization? How?
Yes. In the actions set DISPLAYED property to false.
More at:www.cs-mcqs.blogspot.com.
How do you make a field mandatory or not mandatory using Forms Personalization?
More at:www.cs-mcqs.blogspot.com.
Can you transfer the data from one form to another form using personalization?
Yes. Using global Variables.
More at:www.cs-mcqs.blogspot.com.
How do you move personalization from one instance/database to other?
Form Personlizations can be moved easily through FNDLOAD from one instance to other.
More at:www.cs-mcqs.blogspot.com.
What is personalization and what features can be achieved through personalization?
Personalization gives us the ability to customize Forms in a very easy manner. The below customizations are possible through Personalization: Zoom from one form to another Pass data from one form to another through global variables Change LOV values dynamically Enable/Disable/Hide fields dynamically Display user friendly messages when required Launch URL directly from oracle form Execute PL/SQL programs through FORM_DDL package Call custom libraries dynamically
More at:www.cs-mcqs.blogspot.com.
Can you default a value in a text filed through personalization? How?
More at:www.cs-mcqs.blogspot.com.
How can you restrict the access (to oracle apps) to A GROUP OF users using personalization?
More at:www.cs-mcqs.blogspot.com.
At what level you can restrict personalization code?
FORM level and FUNCTION level
More at:www.cs-mcqs.blogspot.com.
What can be implemented through Forms Personalization?
The below can be done using PErsonalization: Zoom from one form to another Pass data from one form to another through global variables Change LOV values dynamically Enable/Disable/Hide fields dynamically Display user friendly messages when required Launch URL directly from oracle form Execute PL/SQL programs through FORM_DDL package Call custom libraries dynamically
More at:www.cs-mcqs.blogspot.com.
How to do implement ZOOM Functionality using personalization?
More at:www.cs-mcqs.blogspot.com.
What are the advantages/disadvantages of Forms Personalization when compared to CUSTOM.pll?
Advantages: Personalizations are stored in tables rather than files Will not have a bigger impact when you upgrade or apply patches to the environment Can be moved easily through FNDLOAD from one instance to other Can be restricted at site/responsibility/user level Easy to disable/enable with click of a button. Personalization will store who columns with which we have the ability to track who created/modified it where as in CUSTOM.PLL we don¿t have that ability. Disadvantages: Not all can be customized using Personalization.
More at:www.cs-mcqs.blogspot.com.
When you display a error message at WHEN-VALIDATE Trigger will the data will be saved into database?
No. If it is normal message or warning data will be saved but not for error message.
More at:www.cs-mcqs.blogspot.com.




What hides your identity from the Web sites you visit?

Web log
Click stream
An anonymous Web browsing service
None of the above
      _____________________________________________________________________________________
In which file the compiler manage the various objects, which are used in windows programming ?

Control File
Binary File
Text File
Obj File
      _____________________________________________________________________________________
E-commerce infrastructure involves

Web servers
E-catalogs
Network
All of these
      _____________________________________________________________________________________
Which type of application is built by app wizard in MFC?

SDI
MDI
Dialog
All of these
      _____________________________________________________________________________________
Which of the following programs can use key logger software?

E-mail
Instant messages
Applications
All of the above
      _____________________________________________________________________________________
M-Commerce” refers to

a myth which does not exist in reality
the ability of business to reach potential customers wherever they arE
the ability to have large capacity of memory storage dealing trade and commerce
None of the above
      _____________________________________________________________________________________
What component of .NET includes services used to support web services?

Platform
Framework
Visual Studio
System
      _____________________________________________________________________________________
MFC stands for

Microsoft File Class
Microsoft Foundation Class
Microsoft Form Class
None of the above
      _____________________________________________________________________________________
Which of the following is a dilemma faced by businesses today?

Customers want businesses to know them, but want to be left alone
Customers want businesses to provide what they want, but do not want businesses to monitor their habits and preferences
Customers do not like ads but want to know what services and products are available
All of the above
      _____________________________________________________________________________________
Which infrastructure includes application servers, data servers, and clients?

Client/server
Thin Client
2-tier infrastructure
3-tier infrastructure
      _____________________________________________________________________________________
 Which of the following is false concerning Enterprise Resource Planning (ERP) ?

It attempts to automate and integrate the majority of business processes.
It shares common data and practices across the enterprise
It is inexpensive to implement.
It provides and access information in a real-time environment.
      _____________________________________________________________________________________
What is it called when IT specialists within your organization develop the systems?

Insourcing
Selfsourcing
Outsourcing
All of the above
      _____________________________________________________________________________________
What is the unauthorized use, duplication, distribution or sale of copyrighted software?

Fair Use Doctrine
Pirated software
Counterfeit software
Privacy
      _____________________________________________________________________________________
At any given time Parallel Virtual Machine (PVM) has ________ send buffer and ________ receive buffer.

one-one
one-two
two-two
two-one
      _____________________________________________________________________________________
Which is the most valuable electronic commerce to the individual customer in long run ?

Business to Customer
Business to Business
Customer to Customer
None of the above
      _____________________________________________________________________________________
The Linker allows access for LIB. files for

Runtime
Source code
Execution
All of these
      _____________________________________________________________________________________
Which segment is eBay an example?

B2B
C2B
C2C
None of the above
      _____________________________________________________________________________________
What is an electronic representation of cash?

Digital cash
Electronic cash
E-cash
All of the above
      _____________________________________________________________________________________
The best products to sell in B2C e-commerce are

Small products
Digital products
Specialty products
Fresh products
      _____________________________________________________________________________________
Telnet is a

Network of telephones
Television network
Remote login
None of these
      _____________________________________________________________________________________
One of the distinguished features of super-computer over other category of computer is

parallel processing
highest accuracy level
more speed
more capacity
      _____________________________________________________________________________________
Which is used to connect messages sent to a program along with functions meant for handling such messages?

Message queue
Message handler
Message map
Windows procedure
      _____________________________________________________________________________________
Organizations with both physical and online presences are referred to as what?

Multi-presence organizations
Dual-presence companies
Click-and-mortar
All of the above
      _____________________________________________________________________________________
The idea of MFC document architecture was created by

Microsoft
Oracle
Xerox
IBM
      _____________________________________________________________________________________
LDAP stands for

Light weight Data Access Protocol
Light weight Directory Access Protocol
Large Data Access Protocol
Large Directory Access Protocol
      _____________________________________________________________________________________
Which of the following is not one of the four primary focuses of e-government?

G2G
G2B
IG2B
IG2G
      _____________________________________________________________________________________
Cookies are used to do which of the following?

Store your ID and password for subsequent logons to the site
Store contents of electronic shopping carts
To track web activity
All of the above and more
      _____________________________________________________________________________________
Which of the following applies to the implementation of an idea?

Copyright
Intellectual property
Patent
Denial-of-service attack
      _____________________________________________________________________________________
What is the meaning of ‘Hibernate’ in Windows XP/Windows 7 ?

Restart the computers in safe mode
Restart the computers in normal mode.
Shutdown the computer terminating all the running applications.
Shutdown the computer without closing the running applications.
      _____________________________________________________________________________________
A document supports________view.

One
One or more
Two
None of these
      _____________________________________________________________________________________
External data is stored in the

Customer file
Forecast allocation file
Market forecast file
All of these
      _____________________________________________________________________________________
Electronic credit card can be

Unencrypter form only
Encrypter form only
Both A and C
None of these
      _____________________________________________________________________________________
___________is not a category of EPS.

E banking
Direct payments
Retailing payments
Cash on delivery
      _____________________________________________________________________________________
A technique used to gain personal information for the purpose of identity theft, often by e-mail, is called?

Phishing
Carding
Brand spoofing
All of the above
      _____________________________________________________________________________________
The trend to outsource IT functions to other countries is termed

Foreign outsourcing
Offshore outsourcing
External outsourcing
Outer outsourcing
      _____________________________________________________________________________________
EPS is needed because

Inexpensive
Global breakthrough
Fast and secure
All of these
      _____________________________________________________________________________________
Which class is used to control the data being used by application?

Document class
View class
Frame class
Application class
      _____________________________________________________________________________________
Sales figures in the market forecast file are updated by the

Market research procedure
Sales analysis procedures
Sales forecasting
All of the above
      _____________________________________________________________________________________
A honey pot is an example of what type of software?

Encryption
Security-auditing
Virus
Intrusion-detection
      _____________________________________________________________________________________
Which of the following describes e-commerce?

Buying products from each other
Buying services from each other
Selling services from each other
All of the above
      _____________________________________________________________________________________
What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?

Customer relationship management systems cards
E-government identity cards
FEDI cards
Smart cards
      _____________________________________________________________________________________
 ______ is not an E-Commerce application.

House banking
Buying stocks
Conducting an auction
Evaluating an employee
      _____________________________________________________________________________________
The programming that provides complex solution uses

MFC
API
GUI
None of these
      _____________________________________________________________________________________
Enterprise Resource Planning (ERP)

has existed for over a decade
does not integrate well with the functional areas other than operations
is inexpensive to implement
automate and integrates the majority of business processes
      _____________________________________________________________________________________
A clustering technique that permits a convenient graphical display is

partition based clustering
probabilistic model based clustering
hierarchical clustering
agglomerative clustering
      _____________________________________________________________________________________
To compare, overlay or cross analyze to maps in GIS

both maps must be in digital form
both maps must be at the same equivalent scale.
both maps must be on the same coordinate system
All of the above
      _____________________________________________________________________________________
The mercantile process model consists of the following phases

The pre-purchase phase
Purchase consummation phase
Post-purchase Interaction phase
All of the above
      _____________________________________________________________________________________
What is the electronic commerce activities performed between a government and its business partners for such purposes as purchasing direct and indirect materials, soliciting bids for work, and accepting bids for work?

G2G
G2B
G2C
IG2G
      _____________________________________________________________________________________
  ______ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking methods on their handles.

Windows NT
Windows XP
Windows VISTA
Windows 95/98
      _____________________________________________________________________________________
What is a workstation with a small amount of processing power and costs less than a full powered workstation?

Client/server network
Intranet
Extranet
Thin client
      _____________________________________________________________________________________

MKRdezign

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget