1.
Which one is the last column in Excel sheet?
Correct Answer
B. IV
Explanation
The correct answer is IV because in Roman numerals, IV represents the number 4. In Excel, columns are labeled alphabetically, starting from A and going up to Z. Once the alphabet reaches the letter Z, it continues with AA, AB, AC, and so on. The last column in Excel would therefore be IV, which corresponds to the number 256 in decimal notation.
2.
How many rows are there in MS Excel worksheet?
Correct Answer
D. 65536
Explanation
There are 65536 rows in an MS Excel worksheet.
3.
Which one is odd?
Correct Answer
D. External
Explanation
The given options consist of different types of data. Binary, numeric, and character are all types of data that can be represented and manipulated in computer systems. However, "external" does not fit into any specific category of data type. It is not a commonly recognized data type like the others, making it the odd one out.
4.
Find sum(a1:a7), if A1=2, A2=5, A3=1, A4=3, A5=4, A6=1, A7=Blank
Correct Answer
D. 16
Explanation
The sum of a1:a7 is 16. This is because the values given are 2, 5, 1, 3, 4, 1, and blank. The blank value is considered as 0 in this case. Therefore, the sum of all these values is 16.
5.
Which short-cut key is used to insert chart?
Correct Answer
B. F11
Explanation
The correct answer is F11. Pressing the F11 key is a shortcut to insert a chart in various software applications, such as Microsoft Excel or PowerPoint. This key is commonly used to quickly add a chart to a document or presentation without having to navigate through menus or toolbars.
6.
Which one is easiest way to insert a chart?
Correct Answer
A. Select Data >> Chart wizard
Explanation
The easiest way to insert a chart is by selecting the data and then using the Chart Wizard. This option allows users to easily select the data they want to include in the chart and provides step-by-step guidance in creating the chart.
7.
Best use of MS-Excel is:
Correct Answer
B. Spreadsheet management
Explanation
MS-Excel is widely recognized and utilized for its exceptional spreadsheet management capabilities. It allows users to create and manipulate spreadsheets efficiently, perform complex calculations, organize and analyze data, and generate visually appealing charts and graphs. With its extensive range of functions and formulas, MS-Excel enables users to automate tasks, streamline workflows, and make data-driven decisions. It serves as a powerful tool for businesses, analysts, and individuals alike, providing an efficient and reliable solution for data organization and analysis.
8.
The PowerPoint view that displays only text (title & text) is …
Correct Answer
C. Outline view
Explanation
The correct answer is Outline view because it is the PowerPoint view that displays only text, including the title and the main body text of the slides. In Outline view, the slides are represented as a text outline, making it easier to focus on the content and structure of the presentation rather than the visual design. This view is useful for creating and editing the text content of the slides without distractions from other elements such as images or animations.
9.
Which feature is available in custom animation?
Correct Answer
B. Transition
Explanation
Custom animation allows users to add various types of transitions to their slides. These transitions can be applied to individual objects or text within a slide, and they control how the objects enter, exit, or move within the slide. Transitions can add visual effects and make the presentation more engaging and dynamic. Therefore, the correct answer is "Transition."
10.
What is the capacity of MF2DD 9 sector 80 track?
Correct Answer
B. 720KB
Explanation
The capacity of MF2DD 9 sector 80 track is 720KB. This means that the floppy disk has a storage capacity of 720 kilobytes.
11.
Which standard is used for converting the keystroke into the corresponding bits?
Correct Answer
A. ASCII
Explanation
ASCII (American Standard Code for Information Interchange) is the standard used for converting keystrokes into corresponding bits. It is a character encoding standard that assigns unique numerical values to different characters, symbols, and control codes. ASCII uses 7 bits to represent a character, allowing for a total of 128 different characters to be encoded. This standard is widely used in computer systems and communication protocols to ensure compatibility and consistency in representing characters.
12.
When was first microprocessor developed?
Correct Answer
C. 1971
Explanation
In 1971, the first microprocessor was developed. This marked a significant milestone in the field of computer technology. The invention of the microprocessor revolutionized the way computers were built and operated. It allowed for the integration of multiple components onto a single chip, making computers smaller, faster, and more efficient. The development of the first microprocessor paved the way for the modern computing devices that we use today.
13.
To display the content of the disk to use.
Correct Answer
B. Dir
Explanation
The correct answer is "Dir" because the "Dir" command is used to display the contents of a disk or directory. It lists all the files and directories present in the current directory or the specified directory. This command is commonly used in command-line interfaces to navigate and view the file structure of a disk.
14.
Which one is not operating system?
Correct Answer
A. Pl1
Explanation
PL1 is a programming language, not an operating system. Operating systems are software that manage computer hardware and software resources and provide common services for computer programs. Examples of operating systems are OS/2, Windows, and Unix. PL1, on the other hand, is a high-level programming language used for scientific, engineering, and business applications.
15.
Which one is not multitasking operating system?
Correct Answer
D. DOS
Explanation
DOS is not a multitasking operating system. Unlike Windows, Linux, and Win NT, DOS does not have the capability to run multiple tasks simultaneously. It is a single-tasking operating system, meaning it can only execute one task at a time.
16.
Which one is not hardware?
Correct Answer
C. Scan Disk
Explanation
The correct answer is "Scan Disk" because it is a software utility used to check and repair errors on a computer's hard disk. It is not a physical hardware component like the Zip drive, hard disk, and NIC (Network Interface Card), which are all physical devices that can be connected to a computer.
17.
Which one is odd?
Correct Answer
B. Console
Explanation
The given options consist of electronic devices, but the console is the only one that is not typically used to display visual information. Monitors, screens, and printers are all commonly used to display or print visual content, while a console is usually used for inputting commands or controlling a system. Therefore, the console is the odd one out in this group.
18.
Which one is easily upgradable?
Correct Answer
A. Win 95 to 98
Explanation
Windows 95 can be easily upgraded to Windows 98 because they are both part of the same Windows 9x family of operating systems. Upgrading from Windows 95 to Windows 98 is a straightforward process that involves installing the Windows 98 operating system over the existing Windows 95 installation. On the other hand, upgrading from Windows NT to Windows 98 or from Windows 2000 to Windows 98 would not be as easy or straightforward, as they are part of different Windows families and have different system requirements and compatibility issues. Upgrading from Windows 95 to 3.1 is not possible as Windows 95 is a successor to Windows 3.1.
19.
How many ways can we go to control panel?
Correct Answer
C. 3
Explanation
There are three ways to go to the control panel.
20.
Which is the easiest method to go to MS Dos in Windows environment?
Correct Answer
D. Type COMMAND in Run dialog box
Explanation
Typing "COMMAND" in the Run dialog box is the easiest method to go to MS-DOS in the Windows environment. The Run dialog box can be accessed by pressing the Windows key + R on the keyboard. This method allows for quick access to the MS-DOS command prompt without the need to navigate through menus or icons.
21.
To print table structure is called
Correct Answer
A. Documenter
Explanation
The term "documenter" refers to a tool or software that is used to generate documentation or reports about a particular system or program. In this context, the question is asking for the correct term to describe the action of printing the table structure. Therefore, "documenter" is the most appropriate term as it aligns with the concept of generating documentation or reports about the table structure.
22.
Which object extracts the subset of data?
Correct Answer
C. Query
Explanation
A query is used to extract a subset of data from a database. It allows users to specify criteria and conditions to filter and retrieve specific information from a larger dataset. By using a query, users can retrieve only the relevant data they need, making it easier to analyze and work with the information.
23.
If you have to send a same letter to 100 customers use.
Correct Answer
C. Mail merge
Explanation
Mail merge is the correct answer because it is a feature in word processing software that allows the user to create personalized letters or documents by merging a template with a database of recipient information. This feature is commonly used when sending the same letter to multiple customers or recipients, as it automatically fills in the personalized details such as names and addresses. Therefore, mail merge is the most efficient and convenient option for sending a same letter to 100 customers.
24.
Which type of website is used for university library?
Correct Answer
D. .edu
Explanation
The .edu domain is used for educational institutions, including universities. Therefore, a website with a .edu domain would be used for a university library.
25.
Which option is not available in shut down dialog box?
Correct Answer
B. Network
Explanation
In the shut down dialog box, the option "Network" is not available. The shut down dialog box typically provides options for shutting down, restarting, or putting the computer on standby. However, the option to access the network is not included in this dialog box. This suggests that the computer will not be able to connect to any network or perform network-related tasks when it is shut down using this dialog box.
26.
Which is not put in top of the page?
Correct Answer
B. Footer
Explanation
The footer is not typically placed at the top of the page, but rather at the bottom. It usually contains information such as copyright notices, contact details, and page numbers. Therefore, the footer is the correct answer for the question.
27.
Which shortcut key is used to undo format?
Correct Answer
B. Ctrl+Z
Explanation
Ctrl+Z is the correct answer because it is a commonly used shortcut key to undo the most recent action or format applied. This shortcut is widely recognized and used in various software applications, including word processors, graphic design software, and web browsers. By pressing Ctrl+Z, users can quickly revert back to the previous formatting or action, saving time and effort.
28.
To set line spacing
Correct Answer
B. Format >> ParagrapH >> Indent and Spacing
Explanation
The correct answer is "Format >> Paragraph >> Indent and Spacing." This option is the most appropriate because it specifically mentions the "Indent and Spacing" option under the "Paragraph" menu in the "Format" tab. This is the most likely location where one would find the settings to adjust line spacing in a document. The other options mentioned do not directly relate to line spacing settings.
29.
What is the name of vertical space between two columns?
Correct Answer
C. Spacing
Explanation
The correct answer is "Spacing." Spacing refers to the vertical space between two columns. It is the amount of empty space left between the columns to provide visual separation and improve readability.
30.
Which one is used to locate the web address?
Correct Answer
A. Uniform resource locator
Explanation
A Uniform Resource Locator (URL) is used to locate a web address. It is a specific character string that provides the address of a resource on the internet. URLs are commonly used in web browsers to navigate to specific websites or web pages. They consist of various components such as the protocol (e.g., http, https), the domain name or IP address, and the path to the specific resource. The correct answer, "Uniform resource locator," accurately describes the term used for locating web addresses.
31.
Which is included in table?
Correct Answer
D. All of above
Explanation
All of the options mentioned (Record, Field, Index) are included in a table. In a database, a table is made up of records, which are individual rows of data. Each record consists of multiple fields, which are columns that contain specific types of data. An index is used to improve the performance of database queries by allowing faster access to specific data within a table. Therefore, all of the options mentioned are included in a table.
32.
Which one is default sheet order in MS-Excel?
Correct Answer
A. Sheet1 / Sheet2 / Sheet3
Explanation
The default sheet order in MS-Excel is Sheet1 / Sheet2 / Sheet3. This means that when you open a new Excel workbook, the sheets will be named Sheet1, Sheet2, and Sheet3 in that order.
33.
How many maximum pages is available in note page for printing?
Correct Answer
C. 6
Explanation
The maximum number of pages available in the note page for printing is 6.
34.
Which extension is used in MS-PowerPoint?
Correct Answer
A. Ppt
Explanation
MS-PowerPoint uses the .ppt extension for its files. This extension stands for "PowerPoint Presentation" and is used to save and open presentation files created in Microsoft PowerPoint.
35.
What is maximum data size in MS-Access?
Correct Answer
D. 2 GB
Explanation
MS-Access has a maximum data size of 2 GB. This means that the total size of all the tables, forms, queries, reports, and other objects in an MS-Access database cannot exceed 2 GB. This limitation is important to consider when designing and managing large databases, as exceeding the maximum data size can result in data corruption or performance issues.
36.
Which function is used to find the reminder?
Correct Answer
D. Mod()
Explanation
The function "Mod()" is used to find the remainder.
37.
Form and Report is called?
Correct Answer
A. Object
Explanation
In the context of databases, a form is used to input or display data, while a report is used to present data in a structured format. Both forms and reports are used to interact with and present data in a database. Therefore, they can be considered as objects in the database system.
38.
Web style is:
Correct Answer
B. Desktop style
Explanation
The term "Web style" refers to the design and layout of a web page, specifically how it is presented on a desktop computer. It encompasses the visual elements, such as colors, fonts, and images, as well as the overall structure and organization of the content. "Desktop style" is the most appropriate option among the given choices as it directly relates to the design and presentation of a web page on a desktop computer.
39.
Which one is unique key?
Correct Answer
D. Primary key
Explanation
A primary key is a unique identifier for each record in a database table. It ensures that each record has a unique value in the specified field, which helps in identifying and retrieving specific records efficiently. Unlike other keys such as index key, foreign key, or assigning a common field, a primary key is specifically designed to be unique and is essential for maintaining data integrity and enforcing data uniqueness in a table.
40.
To insert a form within a form in called
Correct Answer
A. Sub form
Explanation
A sub form refers to the practice of inserting a form within another form. This allows for a more organized and structured way of presenting and collecting data. By using sub forms, users can easily navigate through different sections of a form and input data in a more efficient manner. This technique is commonly used in database management systems to enhance user experience and improve data entry processes.
41.
Which of the following is input device?
Correct Answer
D. Keyboard
Explanation
A keyboard is an input device because it allows the user to input data or commands into a computer system. It consists of a set of keys that are used to type letters, numbers, and other characters. When a key is pressed, it sends a signal to the computer, which then processes the input accordingly. This makes the keyboard an essential tool for interacting with and controlling a computer.
42.
Which protocol is used to connect internet?
Correct Answer
A. TCP/IP
Explanation
TCP/IP (Transmission Control Protocol/Internet Protocol) is the correct answer because it is the primary protocol used for connecting devices to the internet. It is a set of rules that governs how data is transmitted over networks, ensuring reliable and efficient communication between devices. TCP handles the segmentation, reassembly, and error-checking of data packets, while IP is responsible for addressing and routing packets across networks. Together, TCP/IP enables devices to establish connections, exchange data, and access resources on the internet.
43.
Which is not essential system file of MS DOS?
Correct Answer
D. HIMEM.SYS
Explanation
HIMEM.SYS is not an essential system file of MS DOS. The other three files - IO.SYS, MSDOS.SYS, and COMMAND.COM - are essential for the functioning of MS DOS. IO.SYS is responsible for handling input and output operations, MSDOS.SYS contains the core operating system code, and COMMAND.COM is the command interpreter. However, HIMEM.SYS is a file that is used to manage extended memory in MS DOS, but it is not essential for the basic functioning of the operating system.
44.
Chart wizard completes any chart with … steps.
Correct Answer
C. 4
Explanation
The chart wizard completes any chart with 4 steps.
45.
Acronym of CRT
Correct Answer
B. Cathode Ray Tube
Explanation
The correct answer is "Cathode Ray Tube." A CRT is a vacuum tube that uses electron beams to display images on a screen. It was commonly used in older computer monitors and televisions. The other options, "Computer resource table," "Computer research tabulate," and "Command resource table," do not accurately represent the acronym CRT.
46.
Computer virus can be controlled by:
Correct Answer
A. Scanner
Explanation
A scanner is a software tool designed to detect and remove computer viruses. It scans the computer's files and programs, looking for any suspicious or malicious code that could indicate the presence of a virus. Once a virus is detected, the scanner can either quarantine or delete the infected files, effectively controlling the spread of the virus. Other options listed, such as email, floppy disks, and the internet, can be sources of virus transmission rather than tools for controlling them. Therefore, the correct answer is scanner.
47.
Hybrid computer is used in:
Correct Answer
D. Jet Plane
Explanation
Hybrid computers are used in jet planes because they combine the features of both analog and digital computers, making them suitable for real-time applications that require fast and accurate calculations. In jet planes, hybrid computers are used for various tasks such as flight control, navigation, engine monitoring, and data analysis. These computers can quickly process large amounts of data from various sensors and provide real-time feedback to the pilots, ensuring safe and efficient operation of the aircraft.
48.
What is the shortcut key to hide row?
Correct Answer
B. Ctrl+9
Explanation
Ctrl+9 is the shortcut key to hide a row in Microsoft Excel. This shortcut can be used to quickly hide a selected row without the need to go through the menu options. By pressing Ctrl+9, the selected row will be hidden from view, making it useful for organizing and managing data in a spreadsheet.
49.
Which is the most powerful computer?
Correct Answer
A. Super computer
Explanation
A supercomputer is considered the most powerful computer due to its ability to perform complex calculations at incredibly high speeds. It is designed to handle large amounts of data and execute multiple tasks simultaneously. Supercomputers are typically used for scientific research, weather forecasting, and other computationally intensive applications that require massive processing power. They often consist of multiple processors and have a large amount of memory and storage capacity.
50.
A nibble contains … bits.
Correct Answer
B. 4
Explanation
A nibble contains 4 bits. This is because a nibble is a unit of digital information that consists of 4 bits. Each bit can have a value of either 0 or 1, resulting in a total of 16 possible combinations (2^4 = 16). Therefore, the correct answer is 4.