91
Which of the following uses the flip-flop circuit in a memory cell?
A.
B.
C.
D.
Answer & Solution
Solution:

SRAM (Static Random Access Memory) uses flip-flop circuits in its memory cells. These flip-flops store each bit of data as a stable state and do not require refreshing, unlike DRAM.

92
Which of the following is the data control language in SQL?
A.
B.
C.
D.
Answer & Solution
Solution:

Data Control Language (DCL) in SQL is used to control access to data in the database. The primary commands in DCL are:

                GRANT: Gives a user or role specific privileges (such as SELECT, INSERT, UPDATE, DELETE).

                REVOKE: Removes privileges from a user or role.

93
Banking software is a/an______________ .
A.
B.
C.
D.
Answer & Solution
Solution:

Banking softare is an application softare. Example-Microbanker, Finacle, T24, Mysis, Flora Bank Online, Bank Ultimas, Ababil, Stealer.

94
Hyperlink is used to_____________ .
A.
B.
C.
D.
Answer & Solution
Solution:

Hyperlink is a link from a hypertext document to another location, activated by clicking on a highlighted word or image.

95
Which one of the following is an object-oriented Programming language?
A.
B.
C.
D.
Answer & Solution
Solution:

Object Oriented Programming Languages are Java and C++.

96
The balance and transactions of a bank account are recorded into ____________ .
A.
B.
C.
D.
Answer & Solution
Solution:

DBMS software are Oracle, DB2 and SQL Server.

97
Where a Dark Fiber is used?
A.
B.
C.
D.
Answer & Solution
Solution:

Dark Fiber is a dedicated direct fiber optic (high bandwidth and high speed) between two points.

98
A hash function is used to detect ___________ .
A.
B.
C.
D.
Answer & Solution
Solution:

A hash function is commonly used in cryptography and data integrity applications to ensure that a message or piece of data has not been altered. It generates a fixed-size string (hash) from input data. When the data is received, the hash can be recalculated and compared to the original hash to check if the data has been changed or tampered with.

99
Which of the following is used to identify and verify individuals and ensure the integrity of the message?
A.
B.
C.
D.
Answer & Solution
Solution:

A digital signature is used to identify and verify individuals (ensuring the sender’s identity) and ensure the integrity of the message (making sure the message hasn’t been altered). It is created using the sender's private key and can be verified by anyone using the sender's public key.

100
Compromising confidential information results in ____________ .
A.
B.
C.
D.
Answer & Solution
Solution:

Compromising confidential information refers to unauthorized access, disclosure, or leakage of sensitive data. This situation leads to a threat because it can pose a risk to the security, privacy, and integrity of individuals, organizations, or systems.