How to remove the unwanted action from recorded macro without recording the whole macro again?


Options: By using the Find and Edit Action Option B. By clicking on the Refresh button in the Macro toolbar C. By edit the macro in the Visual Basic Editor D. Macro cannot be edited.

Ans:– C ,


Description: mcqquestions






More MS-Excel Related questions:


. One computer that is not considered a portable is
Options: A) Minicomputer B) Laptop computer C) Notebook computer D) All of above

Ans:A,A


Hard disks are formatted in the same manner as floppy disks. However, before a hard disk can be formatted, it must first be _____
Options: partitioned,    sectioned,    deleted,    inter-sectioned

Ans:A ,A


The advantage(s) of incorporating the macro processor into pass 1 is(are):
Options: many functions do not have to be implemented twice.,    Functions are combined and it is not necessary to create intermediate files as output from the macros processor and input to the assembler.,    more flexibility is available to the programmer in that he may use all the features of the assembler in conjunction with macros.,    all of the above

Ans:D ,D


Which of the following is a special purpose language used to describe to a computer's operating system.
Options: LOGO,    APL,    ICL,    CORAL

Ans:C ,C


Which of the following is not a logical data-base structure?
Options: tree,    relational,    network,    chain

Ans:D ,D


In wildcard specification ? is used as replacement for
Options: a. one character b. two character c. three character d. none of the above

Ans:8 a.,8 a.


A file organization component of a VSAM file is:
Options: relative record data set,    keyed sequential data set,    entry sequential data set,    all of the above

Ans:D ,D


The autoexec.bat configuration file
Options: Is run after config.sys on system boot-up,    Contains all windows configuration files,    Is also known as config.sys,    Checks for system polarity

Ans:A ,A


The Memory Buffer Register (MBR)
Options: is a hardware memory device which denotes the location of the current instruction being executed.,    is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory.,    contains the address of the memory location that is to be read from or stored into.,    contains a copy of the designated memory location specified by the MAR after a "read" or the new contents of the memory prior to a "write".

Ans:D ,D


. HTML stands for ____.
Options: a. High Text Mail List b. Hyperlink Markup Language c. HyperText Markup Language d. Hyperlink Transfer Markup Language

Ans:4 – c ,4 – c


B7:B9 indicates
Options: a. Cells B7 and cell B9 only, b. Cells B7 through B9, c. Cell B8 only, d. None of the above

Ans:b,Cells B7 through B9


A transitive dependency is which of the following?
Options: A functional dependency between two or more key attributes.,    A functional dependency between two or more nonkey attributes.,    A relation that is in first normal form.,    A relation that is in second normal form.

Ans:B ,B


. A ….allows you to write on screen with a digital pen and convert that writing into characters that the PC can process
Options: a. Monitor RS b. Tablet PC c. Database manager d. Media Center

Ans:7 – b ,7 – b


In SQL, GRANT command is used to
Options: allow user to access databases,    allow user to create databases,    grant system privileges, roles, and object privileges to uses and roles,    choose auditing for specific SQL commands

Ans:C ,C


A data structure where elements can be added or removed at either end but not in the middle
Options: a. Linked lists b. Stacks c. Queues d. Deque  

Ans:d,d


Which one of the following principles best describes the basic operation of a generator?
Options: Like magnetic poles repel; unlike poles attract,    Current is induced in a conductor that is moving through a magnetic field,    Like magnetic poles attract; unlike poles repel,    Current flowing through a conductor generates a magnetic field

Ans:B ,B


What is a Firewall in Computer Network?
Options:  The physical boundary of Network B.  An operating System of Computer Network       C.  A system designed to prevent unauthorized access D.  A web browsing Software

Ans:– C ,


What will be the output of the program ? #include<stdio.h> int main() { static int a[2][2] = {1, 2, 3, 4}; int i, j; static int *p[] = {(int*)a, (int*)a+1, (int*)a+2}; for(i=0; i<2; i++) { for(j=0; j<2; j++) { printf("%d, %d, %d, %d\n", *(*(p+i)+j), *(*(j+p)+i), *(*(i+p)+j), *(*(p+j)+i)); } } return 0; }
Options: 1, 1, 1, 1 2, 3, 2, 3 3, 2, 3, 2 4, 4, 4, 4,    1, 2, 1, 2 2, 3, 2, 3 3, 4, 3, 4 4, 2, 4, 2,    1, 1, 1, 1 2, 2, 2, 2 2, 2, 2, 2 3, 3, 3, 3,    1, 2, 3, 4 2, 3, 4, 1 3, 4, 1, 2 4, 1, 2, 3

Ans:C ,C


You have a network with a subnet of 172.16.17.0/22. Which is the valid host address?
Options: 172.16.17.1 255.255.255.252,    172.16.0.1 255.255.240.0,    172.16.20.1 255.255.254.0,    172.16.18.255 255.255.252.0

Ans:D ,D


If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?
Options: Any available route,    RIP route,    Static route,    IGRP route

Ans:C ,C


An encoder:
Options: is used to send telegraph signals,    converts an input to a binary number,    converts a binary number to a decimal number.,    can have only four keys

Ans:B ,B


The transistor has a collector current of 10 mA and a base current of 40 mA. What is the current gain of the transistor?
Options: 250 μA,    350 μA,    0.25 μA,    300 μA

Ans:A ,A


The software used to drive microprocessor-based systems is called:
Options: assembly language programs,    firmware,    BASIC interpreter instructions,    flowchart instructions

Ans:A ,A


. From where can we set the timing for each object?
Options: a. slide show, custom transition b. Slide show, Slide transition c. slide show, custom animation d. view, slide sorter

Ans:1 – C ,1 – C


What is the latest write-once optical storage media?
Options: Digital paper,    Magneto-optical disk,    WORM disk,    CD-ROM disk

Ans:A ,A


What does a VLAN do?
Options: Acts as the fastest port to all servers.,    Provides multiple collision domains on one switch port.,    Breaks up broadcast domains in a layer 2 switch internetwork.,    Provides multiple broadcast domains within a single collision domain.

Ans:C ,C


. Objects on the slide that hold text are called
Options: a. Placeholders b. Object holders c. Auto layout d. Text holders

Ans:1 – A ,1 – A


Which command is used to upgrade an IOS on a Cisco router?
Options: copy tftp run,    copy tftp start,    config net,    copy tftp flash

Ans:D ,D


. A real time operating system is most likely to be used for which of the following task?
Options: a. Controlling access to a shared printer in a network b. Ensuring that system clock works correctly on server c. Managing the access to system files in a laptop computers d. Controlling the fuel injection system of an automobile engines

Ans:1 – d ,1 – d


The function(s) of the Storage Assignment is/are:
Options: to assign storage to all variables referenced in the source program,    to assign storage to all temporary locations that are necessary for intermediate results,    to assign storage to literals, and to ensure that the storage is allocated and appropriate locations are initialized,    All of the above

Ans:D ,D


An error-detecting code inserted as a field in a block of data to be transmitted is known as
Options: Frame check sequence,    Error detecting code,    Checksum,    flow control

Ans:A ,A


User views are included as part of which schema?
Options: Internal,    Conceptual,    External,    None of the above.

Ans:C ,C


What is the maximum distance running the lowest data rate for 802.11a?
Options: About 100 feet,    About 175 feet,    About 300 feet,    About 350 feet

Ans:B ,B


The input unit of a computer
Options: feeds data to the CPU or memory,    retrieves data from CPU,    directs all other units,    All of the above

Ans:A ,A


31. The _____ in the Resume Wizard dialog box indicates the wizard is ready to create the document.
Options: a. Start panel b. Address panel c. Add/Sort Heading panel d. Finish panel

Ans:– D ,– D


Which of the following layer of OSI model also called end-to-end layer?
Options: Presentation layer B. Network layer C. Session layer D. Transport layer

Ans: – D ,


According to ANSI specifications which is the correct way of declaring main when it receives command-line arguments?
Options: int main(int argc, char *argv[]),    int main(argc, argv) int argc; char *argv; ,    int main() { int argc; char *argv; } ,    None of above

Ans:A ,A


The first items defined for a new system are its :
Options: inputs,    outputs,    storage,    processing

Ans:B ,B


What will be the output of the program? #include<stdio.h> #include<stdarg.h> void fun1(char, int, int *, float *, char *); void fun2(char ch, ...); void (*p1)(char, int, int *, float *, char *); void (*p2)(char ch, ...); int main() { char ch='A'; int i=10; float f=3.14; char *p="Hello"; p1=fun1; p2=fun2; (*p1)(ch, i, &i, &f, p); (*p2)(ch, i, &i, &f, p); return 0; } void fun1(char ch, int i, int *pi, float *pf, char *p) { printf("%c %d %d %f %s \n", ch, i, *pi, *pf, p); } void fun2(char ch, ...) { int i, *pi; float *pf; char *p; va_list list; printf("%c ", ch); va_start(list, ch); i = va_arg(list, int); printf("%d ", i); pi = va_arg(list, int*); printf("%d ", *pi); pf = va_arg(list, float*); printf("%f ", *pf); p = va_arg(list, char *); printf("%s", p); }
Options: A 10 3.14 A 10 3.14,    A 10 10 3.140000 Hello A 10 10 3.140000 Hello,    A 10 Hello A 10 Hello,    Error

Ans:B ,B


A device used to bring information into a computer is
Options: ALU,    Input device,    Control unit,    Output device

Ans:B ,B


Which of the following is considered a high-level language?
Options: Machine language,    FORTRAN,    Assembly language,    All of the above

Ans:B ,B


When a label is too long to fit within a worksheet cell, you typically must
Options: a. Shorten the label b. Increase the column width c. Decrease the column width d. Adjust the row height

Ans:#8211; b,#8211; b


Which program is used to schedule particular jobs or programs at particular times on the system?
Options: vi,    Outlook,    Scheduler,    cron

Ans:D ,D


In LISP, the function assigns the symbol x to y is
Options: (setq y x),    (set y = 'x'),    (setq y = 'x'),    (setq y 'x')

Ans:D ,D


You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?
Options: access-list 10 deny 172.16.192.0 0.0.31.255,    access-list 10 deny 172.16.0.0 0.0.255.255,    access-list 10 deny 172.16.172.0 0.0.31.255,    access-list 10 deny 172.16.188.0 0.0.15.255

Ans:A ,A


Most important advantage of an IC is its
Options: Easy replacement in case of circuit failure,    Extremely high reliability,    Reduced cost,    Low power consumption

Ans:B ,B


A class 2 materials transaction (movement from one production department to another) does not require updating of the
Options: cost center file,    inventory file,    work order file,    All of the above

Ans:B ,B


What are the most likely conditions for ESD?
Options: Hot and dry,    Hot and wet,    Cold and dry,    Cold and wet

Ans:B ,B


Point out the error in the program. #include<stdio.h> const char *fun(); int main() { char *ptr = fun(); return 0; } const char *fun() { return "Hello"; }
Options: Error: Lvalue required,    Error: cannot convert 'const char *' to 'char *'.,    No error and No output,    None of above

Ans:C ,C


You can convert existing excel worksheet data an charts to an HTML document by using
Options: a. FTP wizard b. Internet assistant wizard c. Intranet wizard d. Import wizard

Ans:#8211; b,#8211; b

www.000webhost.com