Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Topic :: Base





Base Interview Questions
Questions Answers Views Company eMail

Which of the following is a control over database administration activities? A. A database checkpoint to restart processing after a system failure B. Database compression to reduce unused space C. Supervisory review of access logs D. Backup and recovery procedures to ensure database availability

1 6859

A TCP/IP-based environment is exposed to the Internet. Which of the following BEST ensures that complete encryption and authentication protocols exist for protecting information while transmitted? A. Work is completed in tunnel mode with IP security using the nested services of authentication header (AH) and encapsulating security payload (ESP). B. A digital signature with RSA has been implemented. C. Digital certificates with RSA are being used. D. Work is being completed in.TCP services.

1 5388

While developing a risk-based audit program, which of the following would the IS auditor MOST likely focus on? A. Business processes B. Critical IT applications C. Corporate objectives D. Business strategies

CISA,

3 15040

The PRIMARY benefit of database normalization is the: A. minimization redundancy of information in tables required to satisfy users? needs. B. ability to satisfy more queries. C. maximization of database integrity by providing information in more than one table. D. minimization of response time through faster processing of information.

2 8824

When conducting an audit of client/server database security, the IS auditor would be MOST concerned about the availability of: A. system utilities. B. application program generators. C. system security documentation. D. access to stored procedures.

2 8630

In a risk-based audit approach, an IS auditor, in addition to risk, would be influenced by: A. the availability of CAATs. B. management's representation. C. organizational structure and job responsibilities. D. the existence of internal and operational controls

2 10512

A TCP/IP-based environment is exposed to the Internet. Which of the following BEST ensures that complete encryption and authentication protocols exist for protecting information while transmitted? A. Work is completed in tunnel mode with IP security using the nested services of authentication header (AH) and encapsulating security payload (ESP). B. A digital signature with RSA has been implemented. C. Digital certificates with RSA are being used. D. Work is being completed in TCP services.

2 7477

If a database is restored using before-image dumps, where should the process be restarted following an interruption? A. Before the last transaction B. After the last transaction C. The first transaction after the latest checkpoint D. The last transaction before the latest checkpoint

CISA, IBM, Oracle,

2 30315

What is an extension table and how is it related to base table?

IBM, Siebel Systems,

3 8861

Why is it not recommended to modify existing base tables?

Siebel Systems,

1 5978

Why do you need to create employees at the database in Siebel?

2 8576

How can all organisms share the same 4 bases DNA and still be so diverse?

2658

How to I override a base class method in Visual Studio .NET and in Visual Studio 2005?

2276

How to write a formula to change a font based upon data ?

2 20711

How to conditionally suppress a field based on whether a page number is odd or even?

3 24040




Un-Answered Questions { Base }

Can we install Oracle database in VT100 Server?

2360


Is there anyway to automatically update the Datasource name in Database Checkpoints object when we migrate tests to a new release?

3822


How to connect to a remote database using Applet?

2495


How database connectivity in XML is achieved?

2202


How data can be inserted into long row column of database?

2115


Why does RNA have 5 bases and DNA has only 4?

2185


How will you edit a baseline file of a verification point?

2144


How to connect to ms word wit VB ojective is to prepare s/w to generate question paper , selects questions randomly from the ms access , database

2426


How do you do EURO conversion at the database level?

2066


Define the database structure in CO-PA?

1915


Allowed program to auto-correct the database when loading a presentation.

2208


What is the Differnce between Client/Server Testing and Web Based Testing?

9206


Explain the difference between $ORACLE_HOME and $ORACLE_BASE.

7582


what r the strategies & methodologies r u following in preperation of test cases based on usecase?

2038


1) how will you do validation testing in combo box ? (2)Suppose user does not want maximum length validation message, but when tester inserts data in textbox and it gets truncated, how will you resolve this issue ? (3)if a user inserts maximum number in quantity textbox in a PHP based web application then what result will show?

1989