Skip to main content

Computer Basic MCQ

Computer Basic MCQ

MULTIPLE CHOISE QUESTION



1. In order to tell Excel that we are entering a formula in a cell we must begin with an operator such as:
    A. $
    B. @
    C. Equal Sign (=)

Answer: C. Equal Sign (=)


2. In application software (MS Excel), there is __________ immediately below the title bar.
    A. Standard toolbar
    B. Scroll bar
    C. Menu bar

Answer: C. Menu bar


3. This is not a function category in Excel
    A. Data Series
    B. Text
    C. Logical

Answer: C. Logical


4. Excel can display up to __________ fields of a data form.
    A. 16
    B. 32
    C. 64

Answer: B. 32


5. Excel uses another name for the database. It is called:
    A. Listing
    B. Organizer
    C. List

Answer: C. List


6. Which of the following is not a valid data type in Excel?
    A. Number
    B. Character
    C. Label

Answer: B. Character


7. In Excel, each sheet in a workbook is displayed as
    A. Tab
    B. Marker
    C. Down Pointing Arrow

Answer: A. Tab


8. Which area in an Excel window allows entering values and formulas?
    A. Menu bar
    B. Title bar
    C. Formula bar

Answer: C. Formula bar


9. The file responsible for starting MS Excel is
    A. MS.EXCE
    B. EXCEL.EXE
    C. MS.EXE

Answer: B. EXCEL.EXE


10. Which sign is used to specify a cell range?
    A.  : (colon)
    B.  / (slash)
    C.  * (asterisk)

Answer: A.  : (colon)


11. What is an Excel:
    A. A Document
    B. A Graphic Program
    C. A Spreadsheet

Answer: C. A Spreadsheet


12. In Excel, _________ contains one or more worksheets.
    A. Template
    B. Workbook
    C. Active cell

Answer: B. Workbook


13. What is the file extension of MS Excel 2003 document:
    A. xls
    B. Txt
    C. xlsx

Answer: A. xls


14. Melissa was a __________ macro virus:
    A. Microsoft Excel
    B. Internet
    C. Microsoft Word

Answer: C. Microsoft Word


15. In which grouping, the formatting of text is done in Word?
    A. Tables, Paragraphs, and Indexes
    B. Paragraphs, Indexes, and Sections
    C. Characters, Sections, and Paragraphs

Answer: C. Characters, Sections, and Paragraphs


16. Microsoft Word is an example of a/an:
    A. Operating system
    B. Input device
    C. Application software

Answer: C. Application software


17. The internet has also known simply as:
    A. Nat
    B. Nft
    C. Net

Answer: C. Net


18. TCP/IP is a:
    A. Network Hardware
    B. Network Software
    C. Protocol

Answer: C. Protocol


19. OSI stands for:
    A. Open System Interface
    B. Open System Interconnection
    C. Out System Interface

Answer: B. Open System Interconnection


20. What is the full form of ROM?
    A. Read-only memory
    B. Read-on memory
    C. Read on memory

Answer: A. Read-only memory


21. What is the full form of RAM?
    A. Random-access memory
    B. Read-access memory
    C. Real all memory

Answer: A. Random-access memory


22. What is the full form of VDU?
    A. Video display unit
    B. Visual display unit
    C. Virtual display unit

Answer: B. Visual display unit


23. Graphics for word processor is:
    A. Clip Art
    B. Highlight
    C. Execute
    D. Run

Answer: A. Clip Art


24. Which among the following is folder:
    A. Floppy Disk
    B. Magnetic Drum
    C. DVD
    D. None of these

Answer: D. None of these



Comments

Popular posts from this blog

Languages in DBMS

Languages in DBMS Structured Query Language(SQL) as we all know is the database language by the use of which we can perform certain operations on the existing database and also we can use this language to create a database. SQL uses certain commands like Create, Drop, Insert, etc. to carry out the required tasks. These SQL commands are mainly categorized into five categories as: DDL – Data Definition Language DQL – Data Query Language DML – Data Manipulation Language DCL – Data Control Language TCL – Transaction Control Language Now, we will see all of these in detail. DDL (Data Definition Language): DDL or Data Definition Language actually consists of the SQL commands that can be used to define the database schema. It simply deals with descriptions of the database schema and is used to create and modify the structure of database objects in the database. DDL is a set of SQL commands used to create, modify, and delete database structures but not data. These commands are normally ...

Indexing in DBMS

Indexing in DBMS Indexing is used to optimize the performance of a database by minimizing the number of disk accesses required when a query is processed.  The index is a type of data structure. It is used to locate and access the data in a database table quickly. Index structure: Indexes can be created using some database columns. The first column of the database is the search key that contains a copy of the primary key or candidate key of the table. The values of the primary key are stored in sorted order so that the corresponding data can be accessed easily.  The second column of the database is the data reference. It contains a set of pointers holding the address of the disk block where the value of the particular key can be found. Indexing Methods Ordered indices The indices are usually sorted to make searching faster. The indices which are sorted are known as ordered indices. Example: Suppose we have an employee table with thousands of record and each of which is 10 byte...

SQL Injection

SQL Injection The SQL Injection is a code penetration technique that might cause loss to our database. It is one of the most practiced web hacking techniques to place malicious code in SQL statements, via webpage input. SQL injection can be used to manipulate the application's web server by malicious users. SQL injection generally occurs when we ask a user to input their username/userID. Instead of a name or ID, the user gives us an SQL statement that we will unknowingly run on our database. For Example - we create a SELECT statement by adding a variable "demoUserID" to select a string. The variable will be fetched from user input (getRequestString). demoUserI = getrequestString("UserId"); demoSQL = "SELECT * FROM users WHERE UserId =" +demoUserId; Types of SQL injection attacks SQL injections can do more harm other than passing the login algorithms. Some of the SQL injection attacks include: Updating, deleting, and inserting the data: An attack can mo...