Skip to main content

Posts

Showing posts from December, 2013

Healthcare Systems Article Category

Medical Factors Which make it The most effective  just by Sejal Kakadiya  Medicine and health agencies with now consentrate on top quality, charge together with great satisfaction health of their solutions. These are typically that support beams which a lot of these agencies redefine the direction they trade. The following really results in thrilled clients.  How come Serious Treatment Direction Can be a Trend Inside Medicine and health Sector  just by Steven Orange  A whole lot of North american healthcare systems' options are generally about that direction together with procedure with serious circumstances. Direction with serious health conditions which include diabetes, excessive circulation demand, cardiovascular disease, together with hypothyroidism can be a vital component of easiest treatment healthcare provider's succeed. Inside standard product, that general practitioner spots someone on an automobile accident with treatment, inspects that condition ...

Interview MCQ Questions of Basic of IT Set-4

1. What program included in windows can be used to record sound? A) Media Recorder Mesh network topology, own work (Photo credit: Wikipedia ) B) Sound Player C) Media Player D) Sound Recorder 2. Which of the following is not database program? A) DB2 B) Fox-pro C) Ms Access D) Ms Excel 3. Which of the following is/are HTML tags type? A) Paired Tags B) Singular Tags C) Both of the above D) None of the above 4. Which of the following is are Network topology? A) Mesh Topology B) Ring Topology C) Hybrid Topology D) All of the above 5. Which of the following is not a data type? A) Picture/Graphic B) Date/Time C) Text D) Number 6. An organized collection of logically related data is known as ... A) Data B) Meta data C) Database D) DBMS 7. Which is/are Network protocols ? A) TCP/IP B) IPX/SPX C) NetBEUI D) All of the above 8. A character is equal to .. A) One Bit B) One Byte C) Bits D) All of the above 9. Which of the following input devices is also known as memory device? A) Keyboard B) Punc...

Interview MCQ Questions of Computer Fundamentals set-3

1. Which is special register, which holds machine instructions? A) Control unit B) RAM C) Control instruction register D) None of the above 2. A language used to express algorithms in computer understandable form is A) Assembly language B) Low-level language C) Algorithmic language D) Programming language 3. Which statement is not valid about computer A) Can accept data supplied by the user B) Can process the data C) Can output the data as result D) None of the above 4. Central processing Unit is combination of A) Control and Storage unit B) Control and Output unit C) Arithmetic Logic and Input Unit D) Arithmetic Logic and Control Unit 5. ASCII stands for A) American Standard Code for Introduction Interchange B) American Standard Code for Information Interchange C) American Start Code for Information Interchange D) American Stop Code for Information Interchange 6. Seek time is A) Time to position the head over proper track B) Time to position the head over proper sector C) Time to posi...

Computer Networks MCQ Interview Questions with Answer set-8

1. In addresses for ................... networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host.  SMTP (Photo credit: Wikipedia ) A) class A B) class B C) class C D) class D 2. The .............. protocol is based on end to end delivery. A) SMTP B) TCP C) IP D) SCTP 3. A/An .................... routing scheme is designed to enable switches to react to changing traffic patterns on the network. A) static routing B) fixed alternate routing C) adaptive routing D) dynamic routing 4. The IPV4 address is a .................. address because it is assigned at the internet layer. A) logical B) physical C) common D) shared 5. The ................... layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames. A) Data Link B) Physical C) Network D) Session 6. A distributed data processing configuration in which all activities must pass through a centrally located c...

Solved MCQ of Wireless Mobile Communication set-1

GSM Network Architecture (Photo credit: Wikipedia ) 1. Which of the following is/are the main part(s) of basic cellular system . A) A mobile Unit B) A cell Site C) A mobile Telephone Switching Office D) All of the above 2. Fading of the received radio signals in a mobile communication environment occurs because of ..... A) Direct propagation B) Multipath Propagation C) Bi-path Propagation D) None of the above 3.State whether True of False. i) The cells or subdivisions of a geographical area are always hexagonal. ii) A land to Mobile call originates through the Telephone exchange . A) True, False B) False, True C) False, False D) True, True 4. In .............. Frequency Spectrum is divided into smaller spectra and is allocated to each user. A) TDMA B) CDMA C) FDMA D) FGMA 5. In ................ multiple access is achieved by allocating different time slots for the different users. A) TDMA B) CDMA C) FDMA D) FGMA 6. State whether True of False. i) In GSM only TDMA is used. ii) There is...

Solved MCQ of Client Server Computing set-1

1. ........................ tier it's much easier to design the application to be DBMS agnostic. A) Middle application server Client-Server Model (Photo credit: Wikipedia ) B) Multithreaded application C) Application server D) Client server application 2. Which of the following is not the correct benefit of distributed computing . A) Resource sharing B) Performance C) Availability D) Security 3. ................... serve as the 'glue' between the client and server applications respectively, and that ORB . A) ORB and ORB Interface B) CORBA IDL stubs and skeletons C) Client and servant D) Client and server 4. In ........................ the client invokes the request, and then blocks waiting for the response. A) Deferred Synchronous Invocation B) One way Invocation C) Synchronous Invocation D) Two way Invocation 5. In ...................... the client invokes the request, continues processing while the request in dispatched, and later collects the response. A) Deferred Synch...

Computer Organization and Architecture Objective Questions set-5

1. Memory unit that communicates directly with the CPU is called the ............... A) Main memory RISC (Photo credit: Wikipedia ) B) Secondary memory C) Auxiliary memory D) Register 2. CISC stands for ................ A) Common Instruction Set Computers B) Complex Instruction Set Compilers C) Complex Instruction Set Computers D) Compound Instruction Set Computers 3. The communication between central system and the outside environment is done by A) Input-output subsystem B) Control system C) Memory system D) Logic system 4. The register that keeps track of the instructions in the program stored in memory is .. A) Control register B) Program counter C) Status register D) Direct register 5. ................ is a small very speed register file maintained by the instruction fetch segment of the pipeline. A) Branch Target Buffer B) Loop buffer C) Branch loop buffer D) Target register 6. In case of only one memory operand, when a second operand is needed, as in the case of an Add instruct...

Computer Organization and Architecture Interview Questions set-4

1. The computer code for the interchange of information between terminal is .. A) ASCII Example of how to construct a NAND gate from NOR gates (Photo credit: Wikipedia ) B) BCD C) EBCDIC D) All of the above 2. SIMD stands for .... A) Single Instruction Stream Over Multiple Data Streams B) Single Instruction Stream Over Minimum Data Streams C) Single Instruction Stream Over Media Data Streams D) Multiple Instruction Streams and Single Data Stream 3. The NOR gate is complement of .. A) AND gate B) OR gate C) NAND gate D) NOT gate 4. A .............. is a digital circuit that performs the inverse operation of decodes. A) multiplexer B) adder C) subtractor D) encoder 5. Pipelining increases the CPU instruction .......... A) efficiency B) latency C) throughput D) Both a and c 6. The ............... is a program whose function is to start the computer software operating when power is turned on. A) Bootstrap loader B) Multi programming C) Loader D) None of the above 7. .................. i...

Java MCQ Interview Questions With Answers set-10

1. Java was developed by the company A) Sun Micro systems Sun Micro systems Image CrunchBase B) Microsoft C) Micro tech D) IBM 2. What is the file extension of compiled java program? A) .class B) .java C) .css D) .html 3. .................. keyword is used to invoke the current object. A) New B) That C) This D) Me 4. Which of the function is used to convert string to Number in java program? A) to Number() B) conString() C) valueOf() D) toString() 5. What are the part in executing a Java program and their purposes? A) Java Compiler B) Java Interpreter C) Java Pre-processor D) Directive Pre-processor 6. Method overloading is one of the way that Java supports ............ A) encapsulation B) class C) inheritence D) polymorphism 7. Java support RMI. What does this RMI stands for? A) Random Memory Interface B) Remote Method Invocation C) Random Method Invocation D) Remote Memory Interface 8. Which of the following represent legal flow control statements? A) break; B) break(); C) continue(in...

Java Objective Questions with Answers set-9

1. In java a ....................... is a sequence of characters. Schema of the general architecture of a program running in a Java Virtual Machine (Photo credit: Wikipedia ) A) string B) arrayChar C) groupChar D) collection 2. Java programs perform I/O through ........... A) I/O methods B) I/O package C) streams D) compiler 3. What is byte code in the context of Java? A) The type of code generated by a Java compiler B) The type of code generated by a Java Virtual Machine C) It is another name for Java source file D) It is the code written within the instance methods of a class 4. Which of the following statements about abstract methods/classes in Java is true? A) An abstract class cannot be instantiated. B) Constructors can be abstract. C) A subclass of an abstract class must defined the abstract methods. D) Static methods may be declared abstract. 5. Which of the following statement is false? A) The sleep() method should be enclosed in try ......... catch block B) The yield() metho...

SQL Interview Multiple Choice Questions and Answers set-4

1. In SQL, which command is used to issue multiple CREATE TABLE , CREATE VIEW and GRANT statements in a single transaction? SQL database icon with shortcut identification (Photo credit: Wikipedia ) A) CREATE PACKAGE B) CREATE SCHEMA C) CREATE CLUSTER A) All of the above 2. In SQL, the CREATE TABLESPACE is used A) to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace. B) to create a database trigger . C) to add/rename data files, to change storage D) All of the above 3. Which character function can be used to return a specified portion of a character string ? A) INSTR B) SUBSTRING C) SUBSTR D) POS 4. Which of the following is TRUE for the System Variable $date$? A) Can be assigned to a global variable. B) Can be assigned to any field only during design time. C) Can be assigned to any variable or field during run time. D) Can be assigned to a local variable. 5. What are the different events in Triggers? A)...

SQL MCQ Interview Questions With Answers set-3

1. In SQL , which command is used to remove a stored function from the database? Cover of SQL Server magazine (Photo credit: Wikipedia ) A) REMOVE FUNCTION B) DELETE FUNCTION C) DROP FUNCTION D) ERASE FUNCTION 2. In SQL, which command is used to select only one copy of each set of duplicate rows A) SELECT DISTINCT B) SELECT UNIQUE C) SELECT DIFFERENT D) All of the above 3. Count function in SQL returns the number of A) Values B) Distinct values C) Groups D) Columns 4. Composite key is made up of ................ A) One column B) One super key C) One foreign key D) Two or more columns 5. What command is used to get back the privileges offered by the GRANT command? A) Grant B) Revoke C) Execute D) Run 6. Which command displays the SQL command in the SQL buffer, and then executes it? A) CMD B) OPEN C) EXECUTE D) RUN 7. What is a DATABLOCK? A) Set of Extents B) Set of Segments C) Smallest Database storage unit D) Set of blocks 8. If two groups are not linked in the data model editor, wha...

Solved Objective Questions of Database Management System set-9

1. ............................ is the powerful language for working with RDBMS . A) Embedded Programs Database Management System (Photo credit: Wikipedia ) B) Dynamic Programs C) Query Language D) Static Language Programs 2. The file in DBMS is called as .................. in RDBMS. A) console B) schema C) table D) object 3. In ..................... , we have a strict parent-child relationship only. A) hierarchical databases . B) network databases C) object oriented databases D) relational databases 4. Which normal form is considered adequate for relational database design ? A) 2 NF B) 3 NF C) 4 NF D) BCNF 5. What operator tests column for the absence of data? A) IS NULL operator B) ASSIGNMENT operator C) LIKE operator D) NOT operator 6. Which is proper subset designed to support views belonging to different classes of users in order to hide or protect information. A) Schema B) Sub-schema C) Non-schema D) Non-sub schema 7. Which contain information about a file needed by system progr...