2. Which operating system doesn't support networking between computers?
Windows 3.1
3.Which of the following expresses correct order?
Characters, Fields, Records, Tables, Files, Databases
4.To create relationship between two tables
drag the primary key of a table into foreign key of another table
5.The key uniquely identifies each record in a table.
primary key
6.A __________ enables you to view data from a table based on a specific criterion
Form
7.Which one is not operating system?
P11
8............... is a potential damaging computer program designed to affect or infect you computer
negetively.
Computer Virus
9.Which protocol does Ping use?
ICMP
10.Although they've fallen out of favor, which of the following devices is used to connect different
network segments and manage the traffic between them?
Bridge
11.Ethernet is used the
Free space
12.A ________ is used to define overall design of the database
Schema
13.The___ operator will cause a record to be selected only if two or more conditions are satisfied
Select one:
And
14.The default and maximum size of text field in Access
50 and 255 Characters
15.Which of the following cannot be toggled from View >> Toolbars?
Slides
16.Internal information for MIS may come from any one of the following department.
Customers care department
17.Which menu bar selection would you access to open file?
None of above ( not view, option ,help)
18.Most supervisors started out working in the department they now supervise because of their
superior _____, which are very important to first-level managers.
technical skills
19.In notes master view, how do you modify the font size of text for all hte4 notes of a presentation?
Modify the text within the body placeholder
20.Computer security risk that occurs when someone steals personal or confidential information
Information theft
21.The complete information about an entity in a database is called
Record
22.Which of the following is drop down list?
List
23.Which of the following terms is used to describe a hardware- or software-based device that
protects networks from outside threats?
Firewall
24.Which is the first program run on a computer when the computer boots up?
Operating system
25.Influencing employees to act or not to act in certain ways is part of the management function
leading.
26.Which of the following filter method is not available in Access?
Advanced filter
27.What are the different events in Triggers?
Insert, Update, Delete
28.In a _____________, a user types commands represented by short keywords or abbreviations or
presses special keys on the keys on the keyboard to enter data and instructions.
Command-line interface
30.The category of software most appropriate for controlling the design and layout of complex
document like newsletters and brochure is:
Desktop publishing
31.Wireless transmission is divided into
3 broad groups
32.Gaining unauthorized access or obtaining confidential information by taking advantage of the
trusting human nature of some victims and the naivety of others.
social engineering
33.The organized process or set of steps that needs to be followed to develop an information system
is known as the:
system development life cycle.
34.What happens if you select first and second slide and then click on New Slide button on toolbar?
A new slide is inserted as third slide in presentation
35.A new presentation can be created from
All of the options (From Design Template, From Existing Presentation, Blank Presentation)
36.What do you need if you should enforce many-to-many relationship between two tables?
Junction table
37.DCL provides commands to perform actions like
authorizing access and other control over database
38.The first step in the systems development life cycle (SDLC) is:
Problem/Opportunity Identification.
39.Which of the field has width 8 bytes?
Date/Time
40.Program that protects a computer against viruses by identifying and removing any computer
viruses found in memory, on storage media, or on incoming files.
antivirus program
41.When a peripheral device needs immediate attention from the operating system, it generates
a(n)
Interrupt