Which key is used to increase left indent?


Options: Ctrl+I B. Ctrl+M C. Alt+I D. F10

Ans:– B ,






More MS-Word Related questions:


The key uniquely identifies each record in a table.
Options: a. primary key b. key word c. filed name d. All of above

Ans:ndash; a,ndash; a


. Which mode loadsminimal set of drivers when starting Windows?
Options: a. Safe Mode b. Normal Mode c. VGA Mode d. Network Support Mode

Ans: a, a


In a computer system, which device is functionally opposite of a Key-board?
Options: Mouse,    Trackball,    Printer,    Joystick

Ans:C,C


. Which tab is not available on left panel when you open a presentation?
Options: a.  Outline b.  Slides c.  Notes d.  All of above are available

Ans:9 – C ,9 – C


The transport layer protocol is connectionless.
Options: NVT,    FTP,    TCP,    UDP

Ans:D ,D


. HTML stands for ____.
Options: a. High Text Mail List b. Hyperlink Markup Language c. HyperText Markup Language d. Hyperlink Transfer Markup Language

Ans:4 – c ,4 – c


EDP auditors can be acquired from
Options: computer consulting firms,    accounting firms,    general management consulting firms,    All of the above

Ans:D ,D


. Dial up connection allows you to
Options: a. Connect ISP b. Internet c. Server d. All of above

Ans:1 – a ,1 – a


How many DMA channels are there in an AT class PC?
Options: 3,    4,    7,    8

Ans:D ,D


. What type of controls are text boxes when data from the recordset is visible?
Options: a. Align b. Bound c. Calculated d. Unbound

Ans:3 – b ,3 – b


ADSL is the abbreviation of
Options:  Asymmetric Dual Subscriber Line B.  Asymmetric Digital System Line C.  Asymmetric Dual System Line D.  Asymmetric Digital Subscriber Line

Ans:– D ,


During the maintenance phase
Options: System requirements are established,    System analysis is carried out,    Programs are tested,    All of the above

Ans:E ,E


MSD exe does not have information on:
Options: cache,    video,    operation system,    com ports

Ans:A ,A


An instruction that transfers program control to one or more possible paths is known as
Options: Utility program,    System software,    Broadband channel,    Application program

Ans:C,C


If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?
Options: Discard it and send an error message back to the originating host,    Flood the network with the frame,    Add the source address and port to the MAC address table and forward the frame out the destination port,    Add the destination to the MAC address table and then forward the frame

Ans:C ,C


Which of the following was a special purpose computer?
Options: A) ABC B) ENIAC C) EDVAC D) All of the above

Ans:-A,-A


. Which of the following is not a mode in starting Windows?
Options: a. Command Prompt b. Safe Mode c. Normal Mode d. Turbo Mode

Ans:8 – d ,8 – d


Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?
Options: report writer,    query language,    data manipulation language,    transaction log

Ans:D ,D


What is a form in MS Access
Options: a. It is a printed page where users will write their data to fill it up b. It is an input screen designed to make the viewing and entering data easier c. This is an important part of database used by analysts to draw conclusions d. All of above

Ans:ndash; b,ndash; b


Which device uses much less computer time than the light pen and gives resolutions equal to that of the CRT display.
Options: Mouse,    Touch tablet,    Touch panel,    Data tablet

Ans:D ,D


The prime concern of financial control is
Options: accounting for the liabilities incurred,    meeting payroll commitments,    providing financial status information,    All of the above

Ans:C ,C


Footnotes, endnotes, and indexes are all inserted as __________
Options: bookmarks B. cross-references C. hyperlinks D. word fields

Ans:– D ,


Which of the following is major activities of an operating system in regard to secondary-storage management?
Options: Free-space management B. Storage allocation C. Disk scheduling D. All of the above

Ans:– D ,


Which of the following occurs when one transaction reads a changed record that has not been committed to the database?
Options: Nonrepeatable read,    Phantom read,    Dirty read,    Consistent read

Ans:C ,C


Computer memory consists of
Options: RAM,    ROM,    PROM,    All of the above

Ans:D ,D


What layer of OSI determines the interface of the system with the user?
Options: Session,    Data-link,    Application,    Network

Ans:C ,C


Which of the following commands is used to display your working directory?
Options: dir,    prompt $p$g,    pwd,    path

Ans:C ,C


When assessing the table structure of an acquired set of tables with data, accessing the validity of possible referential integrity constraints on foreign keys is (part of) the:
Options: first step.,    second step.,    third step.,    fourth step.

Ans:C ,C


“Ctrl + End” is used to
Options: a. Moves the cursor to the end of Line b. Moves the cursor to the end of Document c. Moves the cursor to the end of Paragraph d. None of the Above

Ans:–  B,–  B


What do the following declaration signify? void (*cmp)();
Options: cmp is a pointer to an void function type.,    cmp is a void type pointer function.,    cmp is a function that return a void pointer.,    cmp is a pointer to a function which returns void .

Ans:D ,D


Point out the error in the following program. #include<stdio.h> #include<stdarg.h> void varfun(int n, ...); int main() { varfun(3, 7, -11.2, 0.66); return 0; } void varfun(int n, ...) { float *ptr; int num; va_start(ptr, n); num = va_arg(ptr, int); printf("%d", num); }
Options: Error: too many parameters,    Error: invalid access to list member,    Error: ptr must be type of va_list,    No error

Ans:C ,C


Information systems with common hardware, software, and network standards that provide easy access for end users and their networked computer systems. Select the best fit for answer:
Options: TCP/IP,    Protocol,    Open Systems,    Internetwork processor

Ans:C ,C


Prior to the invention of time sharing, the prevalent method of computer access was:
Options: batch processing,    telecommunication,    remote access,    All of the above

Ans:A ,A


. Assembly language started to be used from
Options: A) first generation computers B) second generation computers C) third generation computers D) fourth generation computers

Ans:2-B,2-B


. If you want all of the white cats grouped together in the database, you need to sort by ________.
Options: a. Color, then Gender b. Pet Type, then Color c. Pet Type, then Gender d. Color, then Pet Name

Ans:– b,– b


To create a formula, you first:
Options: a. Select the cell you want to place the formula into b. Type the equals sign (=) to tell Excel that you’re about to enter a formula c. Enter the formula using any input values and the appropriate mathematical operators that make up your formula d. Choose the new command from the file menu

Ans:#8211; a,#8211; a


What is the turns ratio of a power transformer that shows 50 V at its secondary winding when you apply 150 V to its primary winding?
Options: 1/4,    1/3,    2,    3

Ans:D ,D


. The central processing unit (CPU) consists of
Options: A) Input, output and processing B) Control unit, primary storage, and secondary storage C) Control unit, arithmetic-logic unit and primary storage D) Control unit, processing, and primary storage

Ans:C,C


The two types of relays in a PC are:
Options: an output relay and a control relay,    a control relay and a retentive relay,    a retentive relay and a non-retentive relay,    All of the above

Ans:A ,A


What is the name of the computer program that simulates the thought processes of human beings?
Options: Human logic,    Expert reason,    Expert system,    Personal information

Ans:C ,C


People overcome natural language problems by:
Options: grouping attributes into frames,    understanding ideas in context,    identifying with familiar situations,    both (b) and (c)

Ans:D ,D


A ________ is a stored program that is attached to a table or a view.
Options: pseudofile,    embedded SELECT statement,    trigger,    None of the above is correct.

Ans:C ,C


Number of bits per symbol used in Baudot code is
Options: 1,    5,    8,    9

Ans:B ,B


. Operating system, editors, and debuggers comes under?
Options: A) System Software B) Application Software C) Utilities D) None of the above

Ans:A,A


Within a database, the sequential organization of data by a common key is called:
Options: logical structure,    inverted structure,    simple structure,    All of the above

Ans:C ,C


. Which of the following registers is loaded with the contents of the memory location pointed by the PC?
Options: A) Memory address registers B) Memory data registers C) Instruction register D) Program counter

Ans:C,C


The journal voucher file includes
Options: general ledger accounts involved,    date of entry,    rupees posted to each account,    All of the above

Ans:B ,B


Accounting data
Options: is oriented to the future,    is prone to error,    deals only with internal activities of the firm,    must be converted into information to be of value to the manager

Ans:D ,D


What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates?
Options: Router(config-if)# no routing,    Router(config-if)# passive-interface,    Router(config-router)# passive-interface s0,    Router(config-router)# no routing updates

Ans:C ,C


Which of the following is correct?
Options: =AVERAGE(4, 5, 6, 7) B. =AVERAGE(A1, B1, C1)               C. =AVERAGE(A1:A9, B1:B9) D. =All of the above

Ans:– D ,

www.000webhost.com