0% found this document useful (0 votes)
793 views14 pages

Holistic Quation WD & DBA Part One

The document contains a series of multiple-choice questions covering various topics in computer science, programming, database management, and web development. Each question presents a scenario or concept, asking for the correct answer from a list of options. The content is structured to assess knowledge in technical areas relevant to systems development and IT infrastructure.

Uploaded by

bonsasolomon47
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
793 views14 pages

Holistic Quation WD & DBA Part One

The document contains a series of multiple-choice questions covering various topics in computer science, programming, database management, and web development. Each question presents a scenario or concept, asking for the correct answer from a list of options. The content is structured to assess knowledge in technical areas relevant to systems development and IT infrastructure.

Uploaded by

bonsasolomon47
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

1.

Which of the following is a display unit that acts as an interface between the user and the
computer system?

a. Printer C. Monitor
b. Scanners d. Mouse

2. What document defines the what, when, and who questions of systems development including all
activities to be performed, the individuals, or resources, who will perform the activities, and the
time required to complete each activity?
A. Requirements B. Project plan C. Project milestones D. Critical success factors
3. All of the following are key elements are which used to implementing a comprehensive Disaster
Recovery Program EXCEPT
a. Recovery Procedures
b. Implementation Procedure
c. Back-Up Procedures
d. Non Critical Application Assessment
4. Which of the following is true about Java script?
a. It is a database
b. It is client side scripting
language It is a server side
scripting language
d. It is Software
5. Which one describes and explains anything to do with your software product, ranging from
internal documentation for teams to external documentation written for end users. ?
A. User documentation
B. Security tester
C. Development methods
D. Technical documentation
6. Which is the correct syntax to call an external JavaScript file in the current HTML document?
A. <script src="jsfile.js"></script>
B. <script href=" jsfile.js"></script>
C. <import src=" jsfile.js"></import>
D. <script link=" jsfile.js"></script>

7. In the three-tier architecture, the intermediate layer between database and client servers is
classified as?
a. functional server
b. transaction server
c. application server
d. disk server
8. It is a field (collection of fields) in one table that refers to the primary key in another table which
insures a relationship is created?
A. meta data
B. primary key
C. relational integrity
D. foreign key
9. Suppose the database consists of multiple transactions that are used to manage organization's
group of related data. So, which database attribute best describes the characteristics of a
transaction that it shouldn't be divided or split rather it can exist as a single unit is.
A. Consistency
B. Isolation
C. Atomicity
D. Durability
10. From the 5s procedures, which one is used to remove unnecessary items from each area?
a. Sort
b. Sustain
c. Standardize
d. Shine

11. Which one is a step that records client support requirements based on organizational rules,
regulations, and policies?
a. Client
b. Escalate
c. Log
d. Priority
12. The most important role of a systems analyst in business is
a. Technical understanding of information systems
b. Knowing what data needs to be stored and used
c. Problem solving
d. Special programming skills
13. A network device used to connect two or more dissimilar networks.
a. Switch
b. Hub
c. Router
d. Gateway
14. Which of the following techniques can be used for optimizing backed up data space?
A. Authentication and Deduplication
B. Compression and Deduplication
C. Deduplication only
D. Encryption and Deduplication
15. Which of the following is the correct syntax to make the background-color of all paragraph
elements to yellow?
A. all (background-color: yellow;}
B. p {background-color: #yellow;}
C. p (background-color: #yellow;}
D. p {background-color: yellow;}
16. Among the following, which one is the cheapest type of hosting?
A. VPS Web Hosting services

2| Instructor: Gemechu. A (MBA)


B. Shared web hosting service
C. Dedicated web hosting service
D. Free web hosting service
17. What will be the output of the following CSS code snippet?

span
border 1px solid red;
outline: green dotted thick,
{
a. All span elements will have a green thick border and a red outline

b. All span elements will have an outer red border and inner green dotted border

c. All span elements will have a red border and a green dotted outline

d. All span elements will have an outer green dotted border and an inner red border

18. is used to anticipate, react to and recover from events that threaten the security of
information and information assets in the organization?
A. Manning plan
B. Quality assurance plan
C. Contingency Plan
D. Action plan
19. A small piece of data sent from a website and stored in users web browser while a user is
browsing a website
A. Web cookie
B. Web firewall
C. Web cache
D. Web client
20. A UNION query is which of the following?
A. Combines the output from no more than two queries and must include the same number of
columns
B. Combines the output from multiple queries and does not include the same number of columns
C. Combines the output from multiple queries and must include the same number of
columns.
D. Combines the output from no more than two queries and does not include the same number of
columns
21. When deadlock is detected, the recovery is normally accomplished by
A. Rollback of transaction
B. Consistency checking
C. Transaction lock
D. Locking of data
22. You are looking for a website hosting service to host your online shopping website what is the
criteria that will put first when you compare a hosting company?
A. Security Features
B. Uptime
C. Email availability
3| Instructor: Gemechu. A (MBA)
D. Customer Service
23. You have table in your database having a foreign Key. What type of command does you to add
new column to the table.
A. ON UPDATE CASCADE
B. ON UPDATE RESTRICT
C. ON UPDATE SET DEFAULT
D. ON UPDATE NO ACTION
24. The collection of documents that are designed to help people who need to manage, operate or
maintain computer hardware or software
A. Inventory documents
B. Inventory record
C. Hardware inventory
D. Technical documentation
25. In which HTML element, we put the JavaScript code?
A. (javascript> </javascript
B. css>/CSS
C. javascript> </javascript
D. (script></script>
26. Which Microsoft office package enables users to perform mathematical computation and
visualization of data?
A. Microsoft Excel
B. Microsoft Publisher
C. Microsoft PowerPoint
D. Microsoft Word
27. The first step in developing a plan is
a. Putting the plan into action
b. Prioritization of problems
c. Situational analysis
d. Setting the organizational objectives
28. Which feature of OOPS described the reusability of code?
a. Encapsulation
b. Inheritance
c. Abstraction
d. Polymorphism
29. One of the following critical resources needs to be considering in system infrastructure design
plan for system deployment?
a. Procedure
b. Time requirement
c. Network and hardware resources
d. Performance of user
30. Among the following, which one is used for communication between the Web server and the
database server?
A. Native support

4| Instructor: Gemechu. A (MBA)


B. Common Gateway Interface (CGI) script
C. Middleware
D. Java database connectivity (JDBC)
31. Assume that you are asked to design the logical view of database for ABC PLC As database
expert which one clearly shows the skeleton structure that defines how the data is organized and
how the relationships are associated?
a. Database Manipulation
b. Database Schema
c. Database Retrieval
d. Database Architecture
32. Which process involves developing an approximation of the costs of resources needed to
complete a project?
a Finalizing the cost baseline
b. Estimating costs
C. Controlling costs
d Determining the budget
33. Commercial Bank of Ethiopia would like to distribute to all branches about business applications
across multiple locations and computer systems, reserving the data center for Web server,
database, and telecommunications functions. This is example of -
a Technology Architecture Planning
b. Enterprise Resource Planning (ERP)
C. Applications Architecture Planning
d. Strategic Planning
34. Which of the following is a feature of the database?
A. Lack of Authentication
B. Store data in multiple locations
C. User interface provided
D. No-backup for the data stored
35. The process finding the defect and suggesting improvements about the system quality
a Prevent and recovery
b. Total Quality Management
C Quality Planning
e. Process Management
36. From computer maintenance procedures which one is the process of reorganizing the data stored
on the hard drive so that related p are put back together, all lined up in a continuous fashion
A. Defragmenter
B. Disk formatter
C. Antivirus
D. Memory Partitioning
37. Mr'sAlemu was ICT technician for ABC PLC Company. He is responsible for interpreting system
requests and specifications, site preparation and user training, and contact point for customers.
This skill is
a. Team management

5| Instructor: Gemechu. A (MBA)


b. Customer relations
C. Leadership
d .Conflict Management
38. You are a Database developer for an insurance company every insurance policy is managed by
one and only one product manager one product manager can manage many policies. How can you
represent that information in the Database?
a. Create another entity which contains policy ID and the manager ID
b. Include the manager ID in the Policies entity
C. Include the manager ID in the Policies entity and the policy ID in the Managers entity.
d. Include the policy ID in the Managers entity
39. The horizontal bar chart that depicts project task against the calendar
A. Manning
B. Functional break down
C. Budget break down
D. Schedule Gantt chart
40. The last step of the analyst's approach to problem solving is
a. Decide which solution is best, and make a recommendation
b. Verify that the benefits of solving the problem outweigh the costs
c. Monitor to make sure that you obtain the desired results
d. Implement the solution
41. One of the following is included in web and database need strategy
a. Evaluate current financial requirement
b. Evaluate impact of changes
c. Business benefit
d. People involvement
42. Database Regression test can be done
A. Sometimes
B. Occasionally
C. Regular basis
D. Not required
43. Among the following which refers to describing the data description, representing data semantics,
and describing the consistency constraints that apply to the data
a. Modifying data
b. Refining data
c Modeling
data
e. Adding data
44. Part of normal work and that does not require a special event to occur and alien with a sequence
of events or project.
a Continuous improvement
b. Relevant Metrics
C Organizational Knowledge.
d. Breakthrough Improvement.
45. What is the correct HTML for creating a hyperlink?

6| Instructor: Gemechu. A (MBA)


a. <a>https://w.w.w.gkseries.com</a>
b. <a href="https://www.gkseries.com"> Gkseries.com</a>
c. <a name="https://w.w.w.gkseries.com"> Gkseries.com</a>
d. <a url="https://w.w.w.gkseries.com> Gkseries.com</a>
46. It is a video transmission interface that offers better resolution than the others and supports up to
8K (7680 x 4320) resolution at 60 Hz with an increased bandwidth of 77 37 Gbps
a. DVI Port
b. VGA Port
C. HDMI Port
d Display
Port
47. A copy of database is called
a. Sandbox
b. Alias
c. Instance
d. Mailbox
48. Suppose you are recruited as Database Administrator in FullBright PLC Company where records
of Exchange commodities are expected to be managed centrally for the sake of administration
using SQL. Thus, which of the following syntax is the correct implementation of SQL commands
used to build a Table PRODUCTS and add fields such as Prodid, Prod Name, Item Quantity,
ProdUnitPrice and Description for the table?
a. INSERT TABLE PRODUCTS (Prodid, Prod Name, ItemQuantity, ProdUnitPrice,
Description:)
b. SELECT FROM Prodid, Prod Name, Item Quantity, ProdUnitPrice, Description,
C. UPDATE PRODUCTS SET Prodld, ProdName, ItemQuantity, ProdUnitPrice, Description;
WHERE ProdId='ETH30';
d CREATE TABLE PRODUCTS (Prodid, ProdName, Item Quantity, ProdUnitPrice,
Description ;)
49. The systems development life cycle is
a. a structured approach for developing information systems.
b. a set of guidelines that an end user follows when developing their own business applications.
C. the analysis and assessment tasks that need to be completed when designing and developing
information systems.
d. method for testing new IT applications.
50. What is a Functional Requirement?
a. specifies the tasks the program should not complete
b. specifies the tasks the system must complete
C. defines system attributes such as security, reliability, performance, maintainability, scalability,
and usability.
d. specifies the system's operation capabilities and constraints and attempt to improve its
functionality
51. A person or organization that has an interest in system or is impacted by the system?

a Network Admin

7| Instructor: Gemechu. A (MBA)


b. Stakeholder.

C. System Analyst.

d Database Admin

52. A security mechanism used in data communication environment to filter the packets forwarded to
and from the network is referred to be
a. Encryption
b. Cryptography
c. Biological Biometrics
d. Firewall
53. Solution developers, business clients working together, or number of third-party solution
developers working together are
a. Client
b. Suppliers and Vendors.
c. Manager
d. Project Team
54. Which type of data can NOT be stored in the database?
a. Text, files containing data
b. JSON javascript object notation
c. Image oriented data
d. Data in the form of audio or video
55. Connecting website to backend servers, processing the data and controlling the behavior of the
higher layers are done by
a. Server-side PHP scripts
b. CSS scripts
C. Java scripts
d. HTML language
56. Which of the following is true?

a. Data recovery from optical devise is faster than tape

b. Tape library is not an example of near line storage

c. Data recovery can take hours for offline backup

d. Data can be recovered slower in online backup

57. Which of the following CSS selectors are used to specify a group of elements?
A. tag
b. class
C. id
c. collector
58. To bring solution to prevent Database system crash in your company. What action you are going
to take

8| Instructor: Gemechu. A (MBA)


a. Escalate the issue
b. Document the issue and the solution that has implemented
c. Test the solution in a similar organization
d. Gather more information about the issue
59. Which one of the following given statements possibly contains the error?
a select empid from emp where empid = 10006,
b select empid from emp;
C. select * from emp where empid = 10003;
d select empid where empid = 1009 and Lastname = 'GELLER',
60. Which of the following is the correct syntax to link an external style sheet in the HTML file?
a.<linkrel="stylesheet"src="style.css">
b.<style rel="style sheet" link="style.css" />
C<stylerel="stylesheet"src="style.css"/>
d.<linkrel="stylesheet" href="style.css"/>
61. Which one of the following refers to the division of a system into processes or subsystems
A. Programming
B. Functional decomposition
C. Data management
D. System design
62. Which one of the following is an integrated part of database that can restore the database to the
consistent state of before failure?

a. Transaction scheme

b. Restoring scheme

C. Backup scheme

d. Recovery scheme

63. Which of the following is generally used for performing tasks like creating the structure of the
relations, deleting relation?

a. DML(Data Manipulation Language)

b. DDL(Data Definition Language)

C. Relational Schema

d. Query

64. Media recovery refers to recovering database

a. After a system crash

b. After deadlock

c. After database has been physically damaged

9| Instructor: Gemechu. A (MBA)


d. After some individual transaction has failed

65. A database user who maintains a Database Management System and necessarily responsible for
looking after its overall usage and apply limitations to maintain isolation enforce security is:

a Database Architects

b. Database Designers

c. Database Administrators

d. End Users

66. Over a period of time, a system failure may result in a program crash and/or loss of data. As an IT
expert, you are called to restore system files and to restart the system. Which of the following best
describes this activity?

a. Technical Support

b. System enhancement

c. Program Maintenance

d. System Recovery

67. The first official activity of the project team as it initiates the project planning phase is to

a. Write a project proposal

b. Develop a cost/benefit analysis

C. Define the business problem

d. Staff the project team

68. Microsoft Windows, IOS, and Linux are all types of software that belong to category.
A. Application software
B. Operating system
C. Database system
D. Hardware systems
69. Data schemas represent the skeleton structure of a database and it represent the view of the
database as a whole.
A. Practical View
B. Logical View
C. Semantic View
D. Analytical View
70. DHTML, HTML, and XML are an example of
a. Markup language
b. Web Browsers

10 | Instructor: Gemechu. A (MBA)


c. Word processor
d. Data structure
71. The most common risk management strategy in web-based system.
a. Avoidance
b. Acceptance
c. Mitigation
d. Transference
72. Unnecessary conveyance of products, from one location to another, or handoff from one
employee to another is
a. Over-production waste
b. Transport waste
c. C. Waiting-time waste
d. Processing waste
73. Which SQL operator is used as a conjunction that connects the two queries to return only the
required sets of data?
a. FROM Clause
b. LIKE
c. AND
d. UPDATE
74. A database keyword that indicates the constraint of a database whose column values of a Table
are required to be assigned an initial values in the database is usually.
a. VALUES
b. WHERE clause
c. DISTINCT
d. NOT NULL
75. A technique that seeks to alter the nature of the work done in a business function, with the
objective of radically improving performance, is called
a. Information Systems Strategic Planning
b. Business Process Reengineering
c. Strategic Planning
d. Enterprise Resource Planning
76. Which of the following is not common in conducting an applied research regarding the
improvement of an ICT infrastructure in an organization?
A.Acknowledge others to communicate with you verbally and non-verbally
B.Organizational needs and selection criteria are taken for granted.
C.Reporting your findings to an appropriate person.
D.Maintain a positive attitude for your research area.
77. Mr. Alemu is a Database Manager at XYZ Company. He is required to plan and organize the
overall works done in his respective responsibility. Then, which task is going to be executed at
last by Mr. Alemu?

a. Reviewing and evaluating work plans and activities as per the set plan.

b. Implementation of the work plan outlined.

11 | Instructor: Gemechu. A (MBA)


c. Setting the organizational objectives

d. Escalation of problems

78. A description of the hardware, software, and communications networks required to implement
planned information systems is called .

A. information systems strategic planning C. technology architecture plan

B. applications architecture planning d. enterprise resource planning (ERP)

79. Most new information systems must communicate with other, existing systems, so the design of
the method and details of these communication links must be precisely defined. These are called
.

A. models C. help desks

B. system interfaces D. design interfaces

80. In determining customer needs, which one of the following should NOT be fulfilled?
A. Understanding Who they are
B. Understanding What they do
C. Understanding What they expect of you
D. Understanding how they wear
81. Suppose you are an employee in XYZ Company as a system Administrator. Your company need
to shift its process to an on-line service thorough out the branches. Which one of the following
solution is not good enough in shifting the process from manual to a web-based online service?
A. Installing new hardware or hardware upgrades that could satisfy the requirement
B. Installing new up-to date operating system software or application software upgrades to newer
versions.
C. User training before implementing a new system.
D. Promoting the new implemented system to clients so that they can benefit from the system.
82. Which of the following skill is not a management skill for system Analyst?
A. Resource Management
B. Project management
C. Risk management
D. Enterprise Resource Planning (ERP)
83. For an IT service Manager, one of the following is not a MUST to know about.
A. Broad knowledge of technology and product directions for evaluating and forecasting vendor
and technology trends
B. Broad knowledge for evaluating current system functionality to forecast for planning
C. Broad knowledge for evaluating external disputes of the organization.
D. Broad knowledge for evaluating the operating systems supported by the organization to
forecast for planning.
84. A person or organization that has an interest in system or is impacted by the system?
A. System Analyst.

12 | Instructor: Gemechu. A (MBA)


B. Database Admin
C. Network Admin
D. Stakeholder.
85. A way of preventing mistakes or defects and avoiding problems when delivering solutions or
services to customers.
A. Quality Control
B. Quality Improvement
C. Quality Assurance
D. Quality management Plan
86. Which of the following is not an example of DBMS?
A. MySQL
B. Microsoft Acess
C. IBM DB2
D. Google
87. The values appearing in given attributes of any tuple in the referencing relation must likewise
occur in specified attributes of at least one tuple in the referenced relation, according to
integrity constraint.

A. Referentia C. Referencing
l D. Specific
B. Primary

88. Which of the following command is correct to delete the values in the relation teaches?
A. Delete from teaches;

B. Delete from teaches where Id


=’Null’;
C. Remove table teaches;
D. Drop table teaches;
89. What does SQL stand for?
A. Structured Query Language B. Structured Question Language
C. Strong Question Language D. all
90. Which SQL statement is used to extract data from a database?
A, GET B. EXTRACT C. OPEN D. SELECT
100. Which SQL keyword is used to sort the result-set?
A. ORDER BY B. SORT BY C. ORDER D.SORT
101. Which MySQL statement is used to return only different values?
A. SELECT UNIQUE Your answer B. SELECT DIFFERENT
C. SELECT DISTINCT D
102. What does PHP stand for?
A. PHP: Hypertext Preprocessor Your answer
B. Private Home Page
13 | Instructor: Gemechu. A (MBA)
C. Personal Hypertext Processor
D. All

103 . PHP server scripts are surrounded by delimiters, which?


A.<?php...?> Yer B.<&>...</&> C.<script>...</script> D. <?php>...</?>
104. All variables in PHP start with which symbol?
A. $ Your ar B. ! C. & D. #
105. How do you get information from a form that is submitted using the "get" method?
A. $_GET[]; Your answer B. Request. Form; C. Request.QueryString D. All
106. Which super global variable holds information about headers, paths, and script locations?
A. $_GET B. $_SESSION C. $GLOBALS D. $_SERVER Correct answer
107. Choose the correct HTML element for the largest heading:
A.<h6> B.<heading> C.<h1> D. <head>

108. What is the correct HTML element for inserting a line break?
A.<br> B.<break> C.<lb> D. All

109. What is the correct HTML for adding a background color?


A.<body style="background-color:yellow;">
B.<background>yellow</background>
C.<body bg="yellow">
D. none
110. Choose the correct HTML element to define important text
A. <important> B.<b> C.<strong> D.<i>
111. Choose the correct HTML element to define emphasized text
A.<em> B.<italic> C.<i> D. All

112 . What is the correct HTML for creating a hyperlink?


A.<a>http://www.schools.com</a>
B.<a href="http://www.schools.com">Schools</a>
C.<a name="http://www.schools.com">Schools.com</a>
D.<a url="http://www.schools.com">Schools.com</a>

14 | Instructor: Gemechu. A (MBA)

You might also like