Which keystroke is used for updating a field?


Options: A. F6 B. F9 C. F11 D. F12

Ans:B ,F9


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 9466 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More MS-Word Related questions:


You were installing an application in Windows 95, and the computer crashes, what do you do?
Options: press alt + Ctrl + delete, twice,    press alt + Ctrl + delete, and end task,    press the reset button on the computer,    turn off computer and boot from a floppy disk

Ans:D ,D


. Which is an internal command?
Options: a. Scandisk b. XCOPY c. Deltree d. None of the above

Ans:1 – d ,1 – d


After typing header text, how can you quickly enter footer text?
Options:  A) Press PageDown key and type the text for footer, B) Click on Switch between Heder & Footer then type the text, C) Both of above, D) None of above,

Ans:C,Both of above


Which of the following is not considered a tool at the system Design phase?
Options: Data-Flow Diagram,    Decision Table,    Pie chart,    System Flowchart

Ans:C ,C


To copy formatting from one area in a worksheet and apply it to another area you would use:
Options: a. The Edit>Copy Format and Edit>Paste Format commands form the menu. b. The Copy and Apply Formatting dialog box, located under the Format>Copy and Apply menu. c. There is no way to copy and apply formatting in Excel – You have to do it manually d. The Format Painter button on the standard toolbar

Ans:#8211; d,#8211; d


A global network of millions of business, government, educational, and research networks; computer systems; database; and end users. Select the best fit for answer:
Options: Internet works,    The Internet,    Internet revolution,    Internet technologies

Ans:B ,B


Which of the following are used to quickly accept, store, and transfer data and instructions that are being used immediately by the CPU?
Options: microprocessors,    registers,    ROM chips,    data buses

Ans:B ,B


ASK, PSK, FSK, and QAM are examples of _____ encoding.
Options: digital-to-digital,    digital-to-analog,    analog-to-analog,    analog-to-digital

Ans:B ,B


What Oracle backup and recover file contains user and system data?
Options: Control file,    Datafile,    OnLine ReDo file,    Offline ReDo file

Ans:B ,B


A traditional data administrator performs which of the following roles?
Options: Tune database performance,    Establish backup and recovery procedures,    Resolve data ownership issues,    Protect the security of the database.

Ans:C ,C


What is another name for a one-shot?
Options: monostable,    bistable,    astable,    tristable

Ans:A ,A


After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration?
Options: Ping the broadcast address,    Ping the Microsoft Web site,    Ping a distant router.,    Ping the address of the local host

Ans:D ,D


. The BIOS is the abbreviation of ________.
Options: A) Basic Input Output System B) Best Input Output System C) Basic Input Output Symbol D) Base Input Output System

Ans:A,A


The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted decimal notation as
Options: 128.10.2.30,    210.20.2.64,    164.100.9.61,    148.20.2.30

Ans:A ,A


What are the two main types of access control lists (ACLs)? Standard IEEE Extended Specialized
Options: 1 and 3,    2 and 4,    3 and 4,    1 and 2

Ans:A ,A


Which one of the following statements most accurately reflects the nature of ac power?
Options: The current in an ac circuit flows in one direction, but changes value periodically,    The current in an ac circuit flows in one direction at a steady level,    The current in an ac circuit changes direction periodically,    The current in an ac circuit flows in two directions at the same time

Ans:C ,C


What will be the output of the program? #include<stdio.h> int main() { int X=40; { int X=20; printf("%d ", X); } printf("%d\n", X); return 0; }
Options: 40 40,    20 40,    20,    Error

Ans:B ,B


. Each excel file is a workbook that contains different sheets. Which of the following can not be a sheet in workbook?
Options: a.  work sheet b.  chart sheet c.  module sheet d.  data sheet

Ans:– d,– d


Having compatibility and commonality in and between vendors' equipment is called:
Options: registration,    standardization,    integration,    networking

Ans:B ,B


. Which is not concerned with control panel?
Options: a. Printer b. Run application c. Font d. Keyboard

Ans:4 – b ,4 – b


. It is possible to _______ a data source before performing a merge.
Options: a. create b. modify c. sort d. all of the above

Ans:– D,– D


A printer in which the characters are embossed on a band is
Options: Dot-matrix,    Laser,    Golf-ball,    Chain

Ans:D ,D


In a magnetic disk, data is recorded in a set of concentric tracks which are subdivided into
Options: periods,    sectors,    zones,    groups

Ans:B ,B


A relation has which of the following properties?
Options: Each row is not unique.,    Attributes can have the same name within a given table.,    Each relation has a unique name.,    The order of the columns is significant.

Ans:C ,C


A(n) ____ device is any device that provides information which is sent to the CPU.
Options: input,    output,    CPU,    memory

Ans:A ,A


When using PowerPoint, to play a PowerPoint show for previewing the show, select
Options: a. View, slide sorter b. View, slide c. View, slide show d. View outline

Ans: – C , – C


Which of the following programs give instructions about operations inside the computer
Options: System software,    Application,    Utility id) Compiler,    None of the above

Ans:A ,A


You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
Options: access-list 10 deny 192.168.160.0 255.255.224.0,    access-list 10 deny 192.168.160.0 0.0.191.255,    access-list 10 deny 192.168.160.0 0.0.31.255,    access-list 10 deny 192.168.0.0 0.0.31.255

Ans:C ,C


An operating system intended for use on microprocessor based systems that support a single user is
Options: PC-DOS,    MS-DOS,    UNIX,    CP/M

Ans:D,(Danswer


. What is the shortcut key to insert new sheet in current workbook?
Options: a. F11 b. Alt + F11 c. Ctrl + F11 d. Shift + F11

Ans:– d,– d


What is the port number for NNTP?
Options: 119,    80,    79,    70

Ans:A ,A


Voltage is
Options: The flow of charged particles through a material,    The smallest electrically charged particle,    Trie force that causes electrons to flow,    The number of free electrons in an atom

Ans:C ,C


. The purpose of vacuum tube was to NOT ack like
Options: A) an amplifier B) a switch C) a router D) None of above

Ans:3-C,3-C


The bubbles in a bubble memory pack are created with the help of?
Options: Laser beam,    Magnetic field,    Electric field,    X-ray

Ans:B,B


Management by exception is based on a
Options: positive attitude towards problem recognition,    negative attitude toward problem recognition,    indifferent attitude toward problem recognition,    All of the above

Ans:A ,A


. Which of the following command is used to switch between the window programs?
Options: a. Alt+Tab b. Alt+F4 c. Ctrl+Tab d. None of the above

Ans:5 – a ,5 – a


A storage area used to store data to compensate for the difference in speed at which the different units can handle data is
Options: Memory,    Buffer,    Accumulator,    Address

Ans:B ,B


The analog computer measures dimensions and its circuits use the differential and integral equations of continuous variables. The digital computer counts units and its circuits use
Options: Logic gates,    Discrete switches,    Boolean algebra id) Bayes' theorem,    None of the above

Ans:C ,C


A database management system based on the concept of ownership is
Options: Network topology,    Network layer,    Network database system,    Network license system

Ans:C ,C


Different computers are connected to a LAN by a cable and a/an
Options: modem,    interface card,    special wires,    telephone lines

Ans:B ,B


. This is the menu command used to apply a design template in PowerPoint.
Options: a. Tools -> Slide Design b. Format -> Slide Design c. Insert -> Slide Design d. Insert -> Slide Design

Ans:7 – B ,7 – B


. Which file system Windows 95 typically use?
Options: a. FAT 16 b. FAT 32 c. NTFS d. LMFS

Ans:7 – b ,7 – b


What is the best data type definition for Oracle when a field is alphanumeric and has a fixed length?
Options: VARCHAR2,    CHAR,    LONG,    NUMBER

Ans:B ,B


83. Ctrl + O
Options: a. Save Document b. Print Document c. Close Document d. Open Document

Ans:–  D ,–  D


Difference between Decision - Tables and Decision Trees is (are):
Options: value to end user,    form of representation,    one shows the logic while other shows the process,    All of the above

Ans:B ,B


. Which of the following is not the classification of computers based on application?

Options: A) Electronic Computers B) Analog Computers C) Digital Computers D) Hybrid Computers

Ans:A,A


Which of the following is not one of the three ‘Mail Merge Helper’ steps?
Options: a. merge the two files b. create the main document c. set the mailing list parameters d. create the data source

Ans:– C,– C


A composite key is
Options: a. Required when a table does not have any unique fields in it b. The primary key with AutoNumber as the field type c. Made up of two or more fields to uniquely identify records d. Is a foreign key that uniquely identifies records

Ans:ndash; c,ndash; c


Information in a memory that is no longer valid or wanted is known as
Options: non-volatile,    volatile,    surplus,    garbage

Ans:D ,D


.   What is the term used when you press and hold the left mouse key and move the mouse around the slide?
Options: a. Highlighting b. Dragging c. Selecting d. b and c

Ans:3 – D ,3 – D

www.000webhost.com