91
Which of the following uses the flip-flop circuit in a memory cell?
A.
B.
C.
D.
Answer & Solution
SRAM (Static Random Access
Memory) uses flip-flop circuits
in its memory cells. These flip-flops store each bit of data as a stable state
and do not require refreshing, unlike DRAM.
92
Which of the following is the data control language in SQL?
A.
B.
C.
D.
Answer & Solution
Data Control Language (DCL) in SQL is used to control access to data in the database. The primary commands in DCL are:
GRANT: Gives a user or role specific privileges (such as SELECT, INSERT, UPDATE, DELETE).
REVOKE: Removes privileges from a user or role.
93
Banking software is a/an______________ .
A.
B.
C.
D.
Answer & Solution
Banking softare is an application softare.
Example-Microbanker, Finacle, T24, Mysis, Flora Bank Online, Bank Ultimas,
Ababil, Stealer.
94
Hyperlink is used to_____________ .
A.
B.
C.
D.
Answer & Solution
Hyperlink is a link from a hypertext document to another
location, activated by clicking on a highlighted word or image.
95
Which one of the following is an object-oriented Programming language?
A.
B.
C.
D.
Answer & Solution
Object Oriented Programming Languages are Java and C++.
96
The balance and transactions of a bank account are recorded into ____________ .
A.
B.
C.
D.
Answer & Solution
DBMS software are Oracle, DB2 and SQL Server.
97
Where a Dark Fiber is used?
A.
B.
C.
D.
Answer & Solution
Dark Fiber is a dedicated direct fiber optic (high bandwidth
and high speed) between two points.
98
A hash function is used to detect ___________ .
A.
B.
C.
D.
Answer & Solution
A hash function
is commonly used in cryptography and data integrity applications to ensure that
a message or piece of data has not been altered. It generates a fixed-size
string (hash) from input data. When the data is received, the hash can be
recalculated and compared to the original hash to check if the data has been
changed or tampered with.
99
Which of the following is used to identify and verify individuals and ensure the integrity of the message?
A.
B.
C.
D.
Answer & Solution
A digital signature
is used to identify and verify individuals
(ensuring the sender’s identity) and ensure the integrity of the
message (making sure the message hasn’t been altered). It is
created using the sender's private key and can be verified by anyone using the
sender's public key.
100
Compromising confidential information results in ____________ .
A.
B.
C.
D.
Answer & Solution
Compromising confidential
information refers to unauthorized access, disclosure, or
leakage of sensitive data. This situation leads to a threat because it can pose a
risk to the security, privacy, and integrity of individuals, organizations, or
systems.
