- Full form of OLAP?
- What is HoneyPot site?
- What is Extranet?
- How to provide ACCESS CONTROL in DB ?
- What is ARP?
- What is BACKWARD in DataBase?
- RFID Chip
- What is COMMON GATEWAY INTERFACE?
- Small code present in GIF image
- What is WEP
- Why DATA MINING used?
- Copy of DB in multiple servers called
- Data Isolation
- Why Data Redundancy is needed?
- A DATABASE having millions records called
- Why system review is needed?
- Name the matrix to show number if viewers on particular site (HIT METRIX/ visitor metrix / viewer metrix)
- Cryptanalysis basic use
- Question on paas/ saas/
- One OS running on other location
- Systemetic storation of data is called ---(Database mgmt or Data warehouse)
- Why ER diagram used
- Which model used to estimate process in software
- Hierarchical tree used in
- Prototyping method used for
- Extract data, filter data and thn load data is called
- Theft IP address is called
- Error or trail method to access paaword --(Brute force attack)
- One question from Security Brech
- one question from Disaster recovery
* NO QUESTIONS FROM ORACLE / NETWORKING / TESTING
Follow PK Series for IT Officers exam here