WB Police Cyber Crime Consultant Question - West Bengal Police is inviting application for the post of Cyber Crime Consultant, Software Support Personnel. Interested and eligible candidates may apply within 31-March-2020. Before apply you must visit West Bengal Police Official Website to know details advertisement.
The West Bengal Police Previous Papers for various job role is uploaded here. Hence, applicants looking for previous papers can check the following sections. The West Bengal Police Question Paper is very important for the aspirants who are going to appear for the written examination. Thus, aspirants can check and download the West Bengal Police Previous Year Question Paper in the Pdf format. Also, you can visit the official website of West Bengal Police for more details.
1. Which of the following transport layer protocols is used to support electronic mail?
(a) SMTP
(b) IP
(c) TCP
(d) UDP
2. Which layer is responsible for process to process delivery?
(a) network layer
(b) transport layer
(c) data link layer
(d) session layer
3. Which address identifies a process on a host?
(a) specific address
(b) port address
(c) physical address
(d) logical address
4. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
(a) logical link control sublayer
(b) media access control sublayer
(c) network interface control sublayer
(d) none of these
5. An effective way to prevent attenuation is -
(a) Adding repeaters or amplifiers to a circuit
(b) Shorting a circuit
(c) Half duplex
(d) Shielding wires
6. Which one of the following is the multiple access protocol for channel access control?
(a) CSMA/CD
(b) CSMA/CA
(c) both (a) & (b)
(d) None of these
7. A subset of a network that includes all the routers but contains no loops is called -
(a) spider structure
(b) spider tree
(c) spanning tree
(d) none of these
8. What is the access point (AP) in wireless LAN?
(a) device that allows wireless devices to connect to a wired network
(b) wireless devices itself
(c) both (a) & (b)
(d) none of these
9. The DBMS is the software that interacts with the ___________ and the database.
(a) User’s application programs
(b) User’s system programs
(c) User’s system database
(d) None of these
10. DDL stands for -
(a) Database Definition Level
(b) Data Definition Language
(c) Data Device Latency
(d) None of these
11. An advantage of the database management approach is -
(a) Data is dependent on programs
(b) Data redundancy increases
(c) Data is integrated and can be accessed by multiple programs
(d) None of the above
12. To include integrity constraint in a existing relation use:
(a) Create table
(b) Modify table
(c) Alter table
(d) None of these
13. Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?
(a) Candidate key
(b) Sub key
(c) Super key
(d) Foreign key
14. An attribute in a relation is a foreign key if the ___________ key from one relation is used as an attribute in that relation.
(a) Candidate
(b) Primary
(c) Super
(d) Sub
15. A ___________ integrity constraint requires that the values appearing in specified attributes of any tuple in the referencing relation also appear in specified attributes of at least one tuple in the referenced relation.
(a) Referential
(b) Referencing
(c) Specific
(d) Primary
16. The term ___________ is used to refer to a row.
(a) Attribute
(b) Tuple
(c) Field
(d) Instance
17. A domain is atomic if elements of the domain are considered to be ____________ units.
(a) Different
(b) Indivisible
(c) Constant
(d) Divisible
18. The result which operation contains all pairs of tuples from the two relations, regardless of whether their attribute values match.
(a) Join
(b) Cartesian product
(c) Intersection
(d) Set difference
19. A ___________ is a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys.
(a) Schema diagram
(b) Relational algebra
(c) Database diagram
(d) Schema flow
20. In the relational modes, cardinality is termed as :
(a) Number of tuples
(b) Number of attributes
(c) Number of tables
(d) Number of constraints
No comments:
Post a Comment