0% found this document useful (0 votes)
134 views3 pages

Is 512 MCQ

This document contains 41 multiple choice questions about various computing topics including operating systems, networking, databases, security, and presentation software. The questions cover concepts such as protocols, file types, database structures, security threats, and features of presentation software. Primary keys, relationships between database tables, and the system development life cycle are some of the specific topics addressed.

Uploaded by

dorian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views3 pages

Is 512 MCQ

This document contains 41 multiple choice questions about various computing topics including operating systems, networking, databases, security, and presentation software. The questions cover concepts such as protocols, file types, database structures, security threats, and features of presentation software. Primary keys, relationships between database tables, and the system development life cycle are some of the specific topics addressed.

Uploaded by

dorian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

2. Which operating system doesn't support networking between computers?

Windows 3.1

3.Which of the following expresses correct order?

Characters, Fields, Records, Tables, Files, Databases

4.To create relationship between two tables

drag the primary key of a table into foreign key of another table

5.The key uniquely identifies each record in a table.

primary key

6.A __________ enables you to view data from a table based on a specific criterion

Form

7.Which one is not operating system?

P11

8............... is a potential damaging computer program designed to affect or infect you computer
negetively.

Computer Virus

9.Which protocol does Ping use?

ICMP

10.Although they've fallen out of favor, which of the following devices is used to connect different
network segments and manage the traffic between them?

Bridge

11.Ethernet is used the

Free space

12.A ________ is used to define overall design of the database

Schema

13.The___ operator will cause a record to be selected only if two or more conditions are satisfied
Select one:

And

14.The default and maximum size of text field in Access

50 and 255 Characters

15.Which of the following cannot be toggled from View >> Toolbars?

Slides
16.Internal information for MIS may come from any one of the following department.

Customers care department

17.Which menu bar selection would you access to open file?

None of above ( not view, option ,help)

18.Most supervisors started out working in the department they now supervise because of their
superior _____, which are very important to first-level managers.

technical skills

19.In notes master view, how do you modify the font size of text for all hte4 notes of a presentation?

Modify the text within the body placeholder

20.Computer security risk that occurs when someone steals personal or confidential information

Information theft

21.The complete information about an entity in a database is called

Record

22.Which of the following is drop down list?

List

23.Which of the following terms is used to describe a hardware- or software-based device that
protects networks from outside threats?

Firewall

24.Which is the first program run on a computer when the computer boots up?

Operating system

25.Influencing employees to act or not to act in certain ways is part of the management function

leading.

26.Which of the following filter method is not available in Access?

Advanced filter

27.What are the different events in Triggers?

Insert, Update, Delete

28.In a _____________, a user types commands represented by short keywords or abbreviations or


presses special keys on the keys on the keyboard to enter data and instructions.

Command-line interface

30.The category of software most appropriate for controlling the design and layout of complex
document like newsletters and brochure is:

Desktop publishing
31.Wireless transmission is divided into

3 broad groups

32.Gaining unauthorized access or obtaining confidential information by taking advantage of the


trusting human nature of some victims and the naivety of others.

social engineering

33.The organized process or set of steps that needs to be followed to develop an information system
is known as the:

system development life cycle.

34.What happens if you select first and second slide and then click on New Slide button on toolbar?

A new slide is inserted as third slide in presentation

35.A new presentation can be created from

All of the options (From Design Template, From Existing Presentation, Blank Presentation)

36.What do you need if you should enforce many-to-many relationship between two tables?

Junction table

37.DCL provides commands to perform actions like

authorizing access and other control over database

38.The first step in the systems development life cycle (SDLC) is:

Problem/Opportunity Identification.

39.Which of the field has width 8 bytes?

Date/Time

40.Program that protects a computer against viruses by identifying and removing any computer
viruses found in memory, on storage media, or on incoming files.

antivirus program

41.When a peripheral device needs immediate attention from the operating system, it generates
a(n)

Interrupt

You might also like