Which of the following is correct regarding the Background of slides


Options: Background color of slides can be change B. Picture can be set as Slide Background C. Texture can be set as Slide Background D. All of the Above

Ans:– D ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 9159 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More MS-Powerpoint Related questions:


0. What is a file extension of Templates in Microsoft Word?
Options: .Dtep B. .Dott C. .Dotx D. .Doct

Ans: – C ,


What is the use of “Hide Slide” option?
Options: to hide the selected slides during Presentation B. to hide the selected slides during Editing C. to hide the selected slides during Printing D. to hide the selected slides during Deleting

Ans: – A ,


52. Ctrl + B
Options: a. Search the selected text b. Paste the selected text c. Bold the selected text d. Open the specified file

Ans:–  C ,–  C


The nucleus of the copper atom contains how many protons?
Options: 1,    4,    18,    29

Ans:D ,D


Functional information subsystems can be classified into
Options: input and output subsystems,    processing and output subsystems,    input and processing subsystems,    input, processing, and output subsystems

Ans:A ,A


Suppose a step-down transformer has a turns ration of 5:1. If the secondary current is 1A rms, what is the primary-current?
Options: 0.3 A,    0.2 A,    0.4 A,    0.6 A

Ans:B ,B


. Dot-matrix is a type of
Options: A) Tape B) Printer C) Disk D) Bus

Ans:B,B


The maximum combined length of the command-line arguments including the spaces between adjacent arguments is
Options: 128 characters,    256 characters,    67 characters,    It may vary from one operating system to another

Ans:D ,D


The main difference between TCP and UDP is
Options: UDP is connection oriented where as TCP is datagram service,    TCP is an Internet protocol where as UDP is an ATM protocol,    UDP is a datagram where as TCP is a connection oriented service,    All of the above

Ans:C ,C


Who coordinates the sequencing of events within the central processor of a computer?
Options: Logic unit,    Arithmetic unit,    Register,    Control unit

Ans:D,D


. Which of the following resources must be protected by the operating system?
Options: a. I/O b. Memory c. CPU d. All of the above

Ans:9 – d ,9 – d


Which of the following is a secondary memory device?
Options: Keyboard,    Disk,    ALU,    All of the above

Ans:B ,B


. A collection of related instructions organized for a common purpose is referred to as
Options: A) File B) Database C) Program D) None of above

Ans:C,C


An example of a management by exception report is a(n)
Options: aged accounts receivable report,    overtime earnings report,    both (a) and (b),    neither (a) nor (b)

Ans:C ,C


Middle-level managers are responsible for making the _____ decisions to allocate resources and establish controls.
Options: strategic,    structured,    simulation,    tactical

Ans:D ,D


A flat-bed plotter uses a pen which moves in two directions across a piece of paper fixed on a flat-bed. Can you tell who controls the movements of this pen?
Options: microfilm,    microfiche,    film card,    COM

Ans:C ,C


A program language:
Options: defines the form of the instruction,    is always machine dependent,    is never machine dependent,    All of the above

Ans:A ,A


Which device does the general population associate most with automation?
Options: Flexible manufacturing,    Robots,    Numerical control machine,    Computer graphics workstation

Ans:B ,B


The term used to refer to the checking of outputs of a computer, with the corresponding input documents, is called
Options: auditing around the computer,    auditing through the computer,    process control,    beta-test

Ans:A ,A


What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array?
Options: The element will be set to 0.,    The compiler would report an error.,    The program may crash if some important data gets overwritten.,    The array size would appropriately grow.

Ans:C ,C


The central processor of a modern digital computer consists of
Options: control unit,    primary memory,    control unit and primary memory,    All of the above

Ans:C ,C


Which of the following describe the DHCP Discover message? It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast. It uses UDP as the Transport layer protocol. It uses TCP as the Transport layer protocol. It does not use a layer 2 destination address.
Options: 1 only,    1 and 2,    3 and 4,    4 only

Ans:B ,B


. BIOS is used by
Options: a. Operating system b. Compiler c. Interpreter d. Application software

Ans:8 – a ,8 – a


Which of the following is the correct usage of conditional operators used in C?
Options: a>b ? c=30 : c=40;,    a>b ? c=30;,    max = a>b ? a>c?a:c:b>c?b:c,    return (a>b)?(a:b)

Ans:C ,C


  What is a slide transition?
Options: Overheads B. Letters C. A special effect used to introduce a slide in a slide show D. The way one slide looks

Ans:– C ,


. RATS stand for
Options: A) Regression Analysis Time Series B) Regression Analysis Time Sharing C) Real Analysis Series D) All of above

Ans:A,A


39. Which key is used to increase left indent?
Options: a. Ctrl+I b. Ctrl+M c. Alt+I d. F10

Ans:–  B ,–  B


. Which of the following is correct regarding Underline in MS-Word?
Options: a. Color of Underline can be change b. Style of Underline can be change c. Underline can be set using by shortcut key d. All of the above

Ans: –  D , –  D


What does the command routerA(config)#line cons 0 allow you to perform next?
Options: Set the Telnet password.,    Shut down the router.,    Set your console password.,    Disable console connections.

Ans:C ,C


A technique for displaying applications where complex 3-D geometric are required for the exteror shall of a product is called:
Options: solid modeling,    2-D modeling,    3-D modeling,    surface modeling

Ans:D ,D


When determining the efficiency of algorithm the time factor is measured by
Options: A)Counting microseconds b.Counting the number of key operations c.Counting the number of statements d.Counting the kilobytes of algorithm

Ans:B,


A certain Professor at the Stanford University coined the word 'artificial intelligence' in 1956 at a conference held at Dartmouth college. Can you name the Professor?
Options: David Levy,    John McCarthy,    Joseph Weizenbaum,    Hans Berliner

Ans:B ,B


What will be the output of the program if it is executed like below? cmd> sample /* sample.c */ #include<stdio.h> int main(int argc, char **argv) { printf("%s\n", argv[argc-1]); return 0; }
Options: 0,    sample,    samp,    No output

Ans:B ,B


An action assertion must include which of the following?
Options: Anchor object,    Action,    Corresponding object,    All of the above.

Ans:D ,D


In DBMS FD stands for _______
Options: a. Facilitate data b. Functional data c. Facilitate dependency d. Functional dependency

Ans:– d ,


How many times the while loop will get executed if a short int is 2 byte wide? #include<stdio.h> int main() { int j=1; while(j <= 255) { printf("%c %d\n", j, j); j++; } return 0; }
Options: Infinite times,    255 times,    256 times,    254 times

Ans:B ,B


Example of non-numerical data is
Options: Employee address,    Examination score,    Bank balance,    All of the above

Ans:A ,A


. Ctrl + Q
Options: Paragraph formatting (Line Space and Paragraph Space) B. Close Word Application without saving Document C. Print Whole Document without confirmation D. Does nothing

Ans:– A ,


. Linux isa(n) ... operating system
Options: a. Open source b. Microsoft c. Windows d. Mac

Ans: a, a


. To insert slide numbers
Options: a.  Insert a text box and select Insert >> Page Number b.  Insert a textbox and select Insert >> Number >> PageNumber c.  Choose Insert >> Slide Number d.  Insert a new text box and select Insert >> slide Number

Ans:8 – D ,8 – D


. First operating system was developed in
Options: a. 1958 b. 1976 c. 1950 d. 1946

Ans:5 – c ,5 – c


If a variable is a pointer to a structure, then which of the following operator is used to access data members of the structure through the pointer variable?
Options: .,    &,    *,    ->

Ans:D ,D


A foreign key is:
Options: a column containing the primary key of another table.,    used to define data types.,    used to define null status.,    all of the above are above correct.

Ans:A ,A


What are the data transmission channels available for carrying data from one location to another?
Options: Narrowband,    Voiceband,    Broadband,    All of the above

Ans:D ,D


Which of the following terms is the most closely related to main memory?
Options: nonvolatile,    permanent,    control unit,    temporary

Ans:D ,D


The number of bits that are typically stored on each track of a magnetic disk is usually
Options: the same,    different,    depend on the program to be stored,    All of the above

Ans:A ,A


. Floppy disks which are made from flexible plastic material are also called?
Options: A) Hard disks B) High-density disks C) Diskettes D) Templates

Ans:C,C


. 1What is the shortcut key to hide entire row?
Options: a. CTRL + H b. CTRL + R c. CTRL + 9 d. CTRL + –

Ans:– c,– c


The receive equalizer reduces delay distortions using a
Options: tapped delay lines,    gearshift,    descrambler,    difference engine

Ans:A ,A


You need the IP address of the devices with which the router has established an adjacency. Also, the retransmit interval and the queue counts for the adjacent routers need to be checked. What command will display the required information?
Options: show ip eigrp adjacency,    show ip eigrp topology,    show ip eigrp interfaces,    show ip eigrp neighbors

Ans:D ,D

www.000webhost.com