Saturday, October 22, 2016

Solved Objectives: Benchmark Publication

BENCHMARK PUBLICATION

Chapter 1:Network and telecommunication
1.      Choose the best answer:
a)      The term network basically refers to:
i)                    Communication                                   Interconnection                                    Sharing                                    All of them
Ans:  All of above
b)      Which of the following are network services?
i)                    Database services                    LAN services                           Print services               Both i and iii
Ans: Both i and iii
c)      Which of the following are is not a goal of computer networks?
i)                    Resource sharing                     High reliability                         Scalability        None of the above
Ans: None of the above
d)      The network architecture used in most home networks is:
i)                    Client-server LAN                   Peer-to-peer LAN        Client-server WAN      Peer-to-peer WAN
Ans: Peer-to-peer LAN
e)      The maximum speed at which data can be transmitted between two nodes on a network.
i)                    Bit rate                                     Bandwidth                   Band length                 None of them
Ans: Bandwidth
f)       __________ is the main line of defense between a local network or intranet and the Internet.
i)                    USB port                      Encryption key                                    Firewall                        Decryption key
Ans: Firewall
g)      Which is the network operating system?
                      i.            MS-DOS                            Windows 7                              MS-UNIX                    Windows NT
Ans: Windows  NT
h)      Microwave and Infrared technology are related with:
i.                    Unbounded media       Bounded Media                                   Confounded                Hot Bounded
Ans: Unbounded  media
i)        An example of guided media_______
i.                    Radio wave                  Infrared                                               Fiber Optics                 Micro wave
Ans: Fiber Optics
j)        Devices installed on long cable runs to amplify the signal are called:
i.                    Repeaters                     Adapters                                  Switches                      Routers
Ans: Repeaters
k)      A network navigation device that merely retransmits a signal to all other nodes attached to it:
i.                    Router                          NIC                                          Hub                             Adapter
Ans: Hub
l)        Physical layout of computer:
i.                    Network                       Topology                                 LAN                            MAN
Ans: Topology
m)    Token passing system is used in _____ topology.
i.                    Star                              Ring                                         Bus                              Mesh
Ans: Ring
n)      Which of the following is protocol?
i.                    TCP/IP                         HTTP                                       FTP                              All of them
Ans: All of them
o)      _______ is the protocol used to send email:
i.                    HTTP                           SMTP                                       POP                             FTP
Ans: SMTP


2.      Match the following:
Q. i.      a. Protocol                                           i. MODEM
             b. WAN                                              ii. Fiber Optic
             c. Network component                                   iii. HTTP
             d. Transmission media                                    iv. Internet
Answers
a. Protocol
HTTP
b. WAN
Internet
c. Network component
MODEM
d. Transmission media
Fiber Optic


Q. ii.    a. Coaxial Cable                                 i. RJ45
             b. Optical Fiber cable                          ii. BNC
             c. Twisted Pair                                                iii. ST
             d. Copper Wire                                               iv. RJ11
Answers
a. Coaxial Cable
BNC
b. Optical Fiber cable
ST
c. Twisted Pair
RJ45
d. Copper Wire        
RJ11


Q. iii.   a. Star                                      i. Powerful computer
            b. WAN                                   ii. Computers on the network provided to users
            c. Server                                  iii. Internet
            d. Node                                                iv. Topology

Answers
a. Star
Topology
b. WAN
Internet
c. Server
Powerful computer

d. Node           
Computers on the network provided to users




Q. iv.   a. TCP/IP                                 i. Addressing data, converting them into packets and Routing
            b. FTP                                      ii. Transfer mail and attachment on the network
            c. POP                                      iii. Transfer files between two computers
            d. SMTP                                   iv. Fetching mails from the mail server to a user’s computer
Answers
a. TCP/IP
Addressing data, converting them into packets and Routing
b. FTP
Transfer files between two computers
c. POP
Fetching mails from the mail server to a user’s computer

d. SMTP
Transfer mail and attachment on the network


3.      Write either true or false for the following statements:
a)      Computer network is basically connection of computers.True
b)     Computer network cannot transfer multimedia contents.False
c)      Duplex device can transfer data in both directions.True
d)     Computer Network can share both hardware and software resources.True
e)      Guided transmission media does not use cables.False
f)       RJ-45 is the connector for co-axial cable.False
g)      Data are transmitted in the form of light in the fiber optic cable.True
h)      Router is a network component that regenerates electric signals.False
i)        Bus topology requires more media than other topology.False
j)       STAR topology is the most popular network topology used to connect computers.True
k)      Protocol is the computer language only understood by computer.True
l)        Fiber optic is one of the cheapest networks.False
m)    A bridge is a network device that connects different LAN segments using the same access method.True
n)      Connecting computer between two different countries is an example of WAN.True
o)      Protocol is required to transfer data between two computers.True
p)      A MODEM is a central network device that connects network devices in a star topology.False

4.      Write down the most appropriate technical terms for the following statements:
a)      A device that forwards signals between networks in networks in network traffic.Router
b)     Medium that carries data without physical path.Unguided media
c)      Physical layout of network.Topology
d)      A hardware device that provide common wiring point in LAN.Hub
e)      Formal set of rules that govern the exchange of information in a network. Protocol
f)       The computer that acts the central authority on a network. Server
g)      Device used to convert analog to digital signals and vice versa.MODEM
h)      A private internet. Intranet
i)        Network confined to relatively small area.LAN
j)        Mode of data transmission in which transmission exist in both directions at a time.Full-duplex mode
k)     Network in which every computer acts as both client and server.Peer to Peer
l)        Device to amplify or regenerate digital signals received.Repeater

                                    Chapter 2: email and internet
  1. Choose the best answer
a)      ____________ is the service of the Internet through which remote computer can be accessed from another location.
i.                    Newsgroup                        FTP                  Telnet              E-mail
Ans: Telnet
b)      Which software is needed for net surfing?
i.                    Web browser                     Word Processor                       Multimedia player        Windows Explorer
Ans: Web browser
c)      Which protocol sends outgoing mail to mail server?
i.                    POP                       FTP                  HTTP               SMTP
Ans: SMTP
d)      The process of transferring file from a remote computer to local computer is:
Uploading                    Downloading               Searching                     File transfer protocol
Ans: Downloading
e)      Which of the following is valid e-mail ID?
i.                    mail@brushuponline@com                                   mail.brushuponline@com
ii.                  BrushUp-Online@edu.com                                   mail@brushuponline.edu.np
Ans: mail@brushuponline.edu.np
f)       Which of the flowing is the internet service?
i.                    Chat                       E-Mail              FAQ                 All of above
Ans: All of the above
g)      Which of the following is online business?
i.                    E-Commerce          E-shopping      E-Business       All of the above
Ans: All of the above
  1. Mention either true or false
a)      ARPANET was the first computer network.True
b)      Internet is the service provided by WWW.False
c)      Websites have their own uniqueness address known as United Resource Locator. False
d)      Chatting only supports voice messages.False
e)      Search engines are used to locate information on the Internet.True
f)       ISP provides the Internet service to end users.True
g)      Google chrome is a search engine.False
  1. Mention the full form of the following
a)      ADSL                    ARPA                          SMTP                           ISDN
b)      HTTP                     URL                             DNS                             TCP/IP
  1. Write the technical term for the following
a)      The largest computer network.Internet
b)      Website used to search information on the internet.Search engine
c)      A business through Internet.E-Commerce
d)      The process of transferring data/file from user’s computer to Internet.Uploading
e)      A company that provides the Internet facility.ISP
f)       Software used to open WebPages.Web browser
g)      Visual communication over the internet.Video conference
h)      Protocol used to receive email from mail server.POP
i)        Online postal service.E-mail
j)        Internet service that allows real time communication. IRC
k)      An online meeting and information system that allows people to carry on discussions.Newsgroup
                                    Chapter 3: computer security
  1. Choose the best answer
a)      The term computer security refers to:
i.                    Use of antivirus                 Protection of software             Protection to a computer system
ii.                  Use of firewall
Ans:  Protection to computer system
b)      An important counter measure against data corruption or loss.
i.                    Password policy                 Defragmentation          Scan disk                     Backup system
Ans: Backup system
c)      Which is not the power protection device?
i.                    UPS                                   Spike Guard                 Volt Guard                   Scan disk
Ans: Scan disk
d)      _______ protects the machine and peripheral devices from being damage.
i.                    Information security          Hardware security        Software security         None of them
Ans: Hardware security
e)      To prevent the loss of data during power failures, we use:
i.                    Encryption program                       Surge protector                        Firewall                        UPS
Ans: UPS
f)       _____ are used to avoid access for unauthorized users.
i.                    Logins                                Passwords                    Encryption                   Lock and key
Ans: Passwords
g)      Scandisk is used for
i.                    Removing virus                 Removing bad clusters             Backup data     All of above
Ans:  Removing bad clusters
  1. Mention either true or false.
a)      Loss of information costs more than protecting it.True
b)      Power protection devices protect computer software.False
c)      Insurance is one of the computer security measures.True
d)      UPS is a device that maintains a constant voltage level. False
e)      Defragmentation is the tool that ensures error free file management.False
f)       Scandisk helps to scan and remove viruses from computer. False
g)      Password policy is very important for software security.True
  1. Fill in the blanks.
a)      The protection given to the computer hardware and software from being lost or damaged is known as computer security.
b)      Hardware securityprotects the machine and peripheral devices from theft, damage and electronic instruction.
c)      The regular maintenance of hardware keeps the computer devices in good operating condition and helps to find out the problems in hardware.
d)      Backup policy is related with software security.
e)      Voltage regulator device is an electrical regulator designed to automatically maintain a constant voltage level.
f)       The suitable temperature in the computer room should be maintained between 21 to 24 degree Celsius.
g)      The tool that is used to maintain performance and error free file management is called scandisk.
  1. Write the technical term for the following
a)      The securing data and programs from being lost or damaged due to accidental or intentional harm.software security
b)     A secret word that gives a user access to a particular program and system.Password
c)      A disk tool which helps to fix errors in the disk and also remove bad sectors.Scandisk
d)      A copy of file, which is used in the event of original file being corrupted.Backup
e)      The scattering of the parts of the same disk file over different locations. fragmentation
f)       A battery supported power unit, which supplies power during the failure of electricity.UPS
g)      The process of rearranging the fragmented files in the contiguous locations on the disks. Defragmentation
  1. Match the following
i.                    a. password                                                      i. Duplicate copy of data
b. Encryption                                                   ii. Secret word or phrase
c. Backup                                                        iii. Authentication
d. Access Control                                            iv. Rearrangement of fragmented file
v. Scrambled and unreadable form of information
Answers
a. password
Secret word or phrase
b. Encryption
Scrambled and unreadable form of information
c. Backup      
Duplicate copy of data
d. Access Control
Authentication
           
                       

ii.                  a. Antivirus                                                      i. Software that prevent gaining access
b. Scandisk                                                      ii. Arranging the scattered data
c. Defragmentation                                          iii. Checking for disk error
d. Firewall                                                        iv. Software to remove malicious Programs
                                                                         v. Duplicating disk
Answers

a. Antivirus
Software to remove malicious Programs
b. Scandisk
Checking for disk error
c. Defragmentation  
Arranging the scattered data
d. Firewall
Software that prevent gaining access




iii.                a. Hardware security                                        i. Rewriting the files to contiguous sector
b. Software                                                       ii. Scattering the disk file over different locations
c. Fragmentation                                              iii. Provide access to the computer system
d. Password                                                    iv. Antivirus
v. Insurance policy
Answers
a. Hardware security
Insurance policy
b. Software                                                       
Antivirus
c. Fragmentation                                             
Scattering the disk file over different locations
d. Password                                                      
Provide access to the computer system


Chapter 4:computer virus
  1. Choose the best answer.
a)      Computer virus is a _____ software.
i.                    System program                 Application                  Destructive                  Utility
Ans: Destructive
b)      Route of virus transmission.
i.                    Mouse                    Print                 Microphone                 Pen drive
Ans: Pen drive
c)      ________ Virus are often transmitted by a floppy disk left in the floppy disk drive.
i.                    Boot-sector                        Trojan horse                Script               logic bomb
Ans: Boot sector
d)      A virus that infects Master Boot Record of the computer system.
i.                    Macro virus                       Multipartite virus                     Program infectors        Boot sector virus
Ans: Boot sector virus
e)      A virus that changes its appearance in every infection is called _______
i.                    Macro virus                       System infectors                      Polymorphic virus       Multipartite virus
Ans: Polymorphic virus
f)       A virus that is designed to infect executable files is
i.                    File infectors          Macro virus                             Polymorphic virus       Multipartite virus
Ans: File infectors
g)      __________ Virus can infect both programs and boot sectors.
i.                    Stealth virus           File infectors                            Multipartite virus         Polymorphic virus
Ans: Multipartite virus
h)      Viruses attach themselves to documents such as Word and Excel.
i.                    Macro virus                       File infectors                            Polymorphic virus       Multipartite virus
Ans: Macro virus
i)        A program that is designed to detect and delete virus.
i.                    Antivirus                Malware                                   Freeware                      Shareware
Ans: Antivius
  1. Mention either true or false.
a)      Virus is a destructive computer programTrue
b)      Viruses are easily identified as other programs. False
c)      Viruses help to stop software piracy. True
d)      Script viruses attach themselves to any executable file, usually .COM, .BIN, EXE etc.False
e)      Viruses mostly spread through computer network. True
f)       A macro virus infects both the application program and the boot sector of disk.False
g)      Viruses change the size of file and memory. True
  1. Fill in the blanks.
a)      Computer Virusis a program containing code that can generate multiple copies of itself.
b)      Firewallare software programs or hardware devices designed to keep computers safe from hackers.
c)      Trojan horse is a computer virus.
d)      Avira is an example of antivirus.
e)      Program virus infects executable program files having an extension .exe, .com or .dll.
f)       A program designed to protect software from viruses is called  antivirus software.
  1. Write the technical term for the following
a)      A software program with the ability to generate multiple copies itself.Computer virus
b)      Software that protects computer system from computer viruses.Antivirus software
c)      A virus that damages documents created in MS-Word and MS-Excel.Macro virus
d)      A virus that shows different behavior in each infection.Polymorphic virus
e)      Software that do not come from reliable sources.Pirated software
f)       A virus that infects executable files.Program virus
                                                Chapter 5:Multimedia and its application
  1. Choose the best answer
a)      Which one is the software used in multimedia?
i.                    CD-ROM               Sound Card                  Sound Forge                MS-Word
Ans: Sound Forge
b)      The element of multimedia is ______
i.                    Keyboard               Windows XP                Track Ball                    Sound Card
Ans: Sound card
c)      Main component of multimedia is.
i.                    CD-ROM               Sound Card                  Hard Disk                    RAM
Ans: Sound card
d)      _____ deals with the recording and display sequence of images at a reasonable speed to create an impression of movement.
i.                    Graphics                Video                           Animation                    Text
Ans: Video
e)      In order to work with multimedia, a personal computer typically requires the following hardware components.
i.                    Power microprocessor                   Huge main memory     Compact disk   All of them
Ans: All of them
f)       Software used in multimedia system.
i.                    Photoshop              Flash                            Maya                           All of them
Ans: All of them
g)      _______ provides a visual impact.
i.                    Image                     Graphics                      Video               None of them
Ans: Graphics
  1. Mention either true or false.
a)      Multimedia uses more than one media.True
b)      Multimedia manipulates the information for better communication. True
c)      Multimedia helps to develop creative ideas. True
d)      Multimedia products take much time to develop and are expensive. True
e)      All computers can easily handle multimedia.False
f)       Multimedia is used extensively in entertainment. True
g)      Multimedia is only applicable in information technology sector.False
  1. Match the following
i.                    a. Virtual Reality                                              i. Combination of various media
b. Graphics                                                      ii. Artificial environment
c. Animation                                                    iii. Visual impact
d. Multimedia                                                  iv. Moving images
                                                                        v. Adobe Photoshop
Answers:
a. Virtual Reality
Artificial environment
b. Graphics
Visual impact
c. Animation
Moving images
d. Multimedia
Combination of various media

           

ii.                  a. Audio                                                           i. Monitor
b. Video                                                           ii. Speaker
c. Sound Card                                                  iii. Still frame pictures
d. Graphics                                                      iv. Recording and playing sound                                                                                                         v. Multimedia card
Answers:
a. Audio
Speaker
b. Video
Monitor
c. Sound Card          
Recording and playing sound
d. Graphics
Still frame pictures


iii.                a. Real player                                                   i. Upgrade the PC
b. MUK                                                           ii. Headsets and data gloves
c. Animation                                                    iii. Software to view multimedia content
d. Virtual reality                                               iv. Cartoon on television
                                                                        v. Multimedia component
Answers:
a. Real player
Software to view multimedia content
b. MUK
Upgrade the PC
c. Animation 
Cartoon on television
d. Virtual reality
Headsets and data gloves


4.      Write most appropriate technical term.
a)      The integration of text, audio, sound and animation.Multimedia
b)      The moving graphic images.Animation
c)      A technology that makes teaching-learning easier in a classroom. CAL
d)      The artificial environment created by computer technology to entertain user.Virtual reality
e)      The display of still frame pictures or photos or photos on computer screen.Graphics
5.      Write the full form
a)      CBT                       CD-ROM                     DVD                CBE
b)      JPEG                      PDF                             WiFi
                                          Chapter 6:Cyber law and ethics
  1. Choose the best answer
a)      A genetic term that is concerned to the legal and regulatory aspects of Internet and computer technology.
i.                    Copyright law                    Cyber law                    Computer Crime          None of them
Ans: Cyber law

b)      A criminal activity within the information technology infrastructure.
i.                    Digital crime                      Intellectual property     Cybercrime                  All of them
Ans: cyber crime
c)      Cyber law of Nepal of Nepal was enacted in Nepal in ________BS.
i.                    2064                      2061                            2062                            2063
Ans: 2061
d)      A criminal activity within the information technology infrastructure.
i.                    Digital crime          Intellectual property     Cybercrime                  All of them
Ans: cybercrime
e)      _______ is the normal Principal that regulates the use of computers.
i.                    Cyber Law             Cyber act                     Computer ethics           All of them
Ans: computer ethics
f)       The method of making the data or message unreadable by unauthorized people.
i.                    Digital signature                 Decryption                   Encryption                   All of them
Ans: Encryption
  1. Mention either true or false.
a)      Cyber law is legal and regulatory framework in cyber space.True
b)      The copyright law makes it legal to produce extra copies of software for sale.False
c)      Telecommunication covers the Internet and computers as well as places where two or more cables or wires meet. True
d)      Cybercrime refers any illegal act that involves a computer. True
e)      Nepal does not have issued cyber law yet. False
f)       The digital signature allows the user to attach an original signature on the document of electronic records. False
g)      Moral principles that regulate the use of computers are also explained in cyber law. True
  1. Write the technical term for the following.
a)      The legal issued adopted by the government to minimize the computer crime.Cyber law
b)      Electronic fraud committed by people by  the use of computer.Cyber crime
c)      Law that prevents illegal copying.Copyright law
d)      A person who steals the password or credit card number of Internet users and make unauthorized access of it.Hacker
e)      An electronic equivalent of a signature.Digital signature
f)       Moral principals in cyberspace.Computer ethics
                                                Chapter 8: Database Management system
  1. Choose the best answer.
a)      What is extension of access database? (MS-Access 2003 version)
i.                    DBF                       MDB                MBD                DBM
Ans: MDB
b)      _____ is the table design creating option to create custom table design.
i.                    Datasheet               Design view                 Wizard             Link Table
Ans: Design View
c)      Object primarily used to store the data in database.
i.                    Table                     Form                Query              Report
Ans: Table
d)      A field name can be up to _____ characters long.
i.                    40                          46                    64                    2048
Ans: 64
e)      _____ is a data type used for lengthy text and numbers
i.                    Text                       Long Text                    OLE Object                  Memo
Ans: Memo

f)       Data type that requires 8 bytes of storage.
i.                    Yes/No                  Currency                      Long Integer                All of them
Ans: Currency
g)      The name of caption can be declared up to _____ characters.
i.                    1024                      2024                            2048                            2005
Ans: 2048
h)      Memory space used by a auto number data type is _____
i.                    1 Byte                    2 Bytes                                    4 Bytes                                    8 Bytes
Ans: 4 Bytes
i)        The primary key contains _____ value.
i.                    Null                       No Null                                    Number                       Auto number
Ans: No Null
j)        Which specifies the expression that checks the invalid data.
i.                    Validation Rule                  Validation Text                        Input Mask                  Required
Ans: Validation Rule
k)      _____ is not a field property of MS-Access.
i.                    Caption                  Index                           Color                           Format
Ans:Color
l)        Format symbol that converts all characters to uppercase.
i.                    @                           &                                 <                                  >
Ans:>
  1. Mention either true or false.
a)      Field names are used to define properties for a database.False
b)     Lookup Wizard is a tool that automates many database tasks.True
c)      Default field size of text type of data is 65535 characters. False
d)      Date/Time type of data requires 8 bytes of memory. True
e)      Removing a primary key does not delete a field. True
f)       FORMAT property allows us to delete data from database. False
g)      Maximum length for the validation text property setting is 25 characters.False
h)      Subtype of number data type is integer. True
i)        Deleting a field does not delete data in the field. False
j)        Validation rule is used to specify whether a value is required in a field. False
k)      Indexed field property speeds up searching and sorting of records based on a field. True
  1. Match the following
Group A
Group B
a)      Number
a)      50
b)      Yes/No
b)      8 bytes
c)      Currency
c)      Long integer
d)      Text
d)      1 bit

e)      short integer
  (a)
Answers:
a)      Number
Long integer
b)     Yes/No
1 bit
c)      Currency
8 bytes
d)     Text
50


Group A
Group B
a)      Data redundancy
a)      Error message
b)      Validation Text
b)      Pattern of data in a field
c)      Input Mask
c)      Lookup wizard
d)      Validation Rule
d)      Data duplication

e)      Limits the value
(b)
Answers:
a)      Data redundancy
Data duplication
b)      Validation Text
Error message
c)      Input Mask
Pattern of data in a field
d)      Validation Rule
Limits the value




Group A
Group B
a)      Text
a)      2048 characters
b)      Currency
b)      up to 255 Characters
c)      Memo
c)      8 Bytes
d)      Hyperlink
d)      0-65535 Characters

e)      4 Bytes
            (c)        
                       
            Answers:

a) Text
up to 255 Characters
b) Currency
8 Bytes
c) Memo
0-65535 Characters
d) Hyperlink
2048 characters
                              








Group A
Group B
a)      Indexing data
a)      Retrieves data
b)      Long text
b)      Caption
c)      FoxPro
c)      Memo field
d)      Label for a field
d)      DBMS

e)      Searching fast
(d)




Indexing data
Searching fast
Long text
Memo field
FoxPro
DBMS
Label for a field
Caption

Answers:







a) Data Integrity                                   i. No. of character can be entered
b) Automatic                                        ii. Contains distinct value
c) Field size                                         iii. Validation Rule
d) Primary key                                     iv. Indexed
                                                            v. Default value
Answers:
Data Integrity
Validation Rule
Automatic     
Default value
Field size        
No. of character can be entered
Primary key  
Contains distinct value


           



Choose the correct option.
a)…………….is the collection of related information.
i. Data                      ii. Meta data                iii. Database                iv. Facts
Ans:  Database
b)………….is the raw form of any facts and figures.
i. Information                       ii. DBMS                     iii. Records                  iv. Data
Ans:  data
c)…………is a  DBMS software.
i. MS-Access                        ii.MS-Excel                 iii. B-Dase                   iv .None of them
Ans:  MS-Access
d)A………. is a collection of data about a specific topic
i. DBMS                   ii .Database                 iii. Table                      iv. All of them
Ans:  table
e .In a table, row called ……………… and column is called……………..
i. record,field                       ii.filed, record             iii. record, tuple                       iv .none of them
Ans:  record, field
f)A…………….. is a unit of information in a record.
i. record                    ii. field             iii. data source             iv .data
Ans:  field
         Mention either true or false.
a) Collection of any data can be a database.  false
b) MS-Access is RDBMS. true
c) Every record in a table is unique. true
d)A group of related field describes a person, place, or thing is called a field. false
e) DBMS is an application software. true
f) Deleting a field does not delete data in  the field. false
  Technical terms:
a) Field property that limits the values that can be entered into field. validation rule
b) The value automatically enters for a new record.  default value
c) A field or group of fields that uniquely identifies the records in database.  primary key
d) A message displayed after data is entered and checked into a field. validation text
e) Field property that defines label for the field. caption
f) A data type used for link address type of data. hyperlink
g) Standard pattern for an appearance of data in a field.  input mask
h) View records in a table either in ascending or descending order.  sorting
i) A Microsoft tool that automates many database tasks. wizard
         Choose the best answer:
a) In a datasheet , what does each column represent?
i. Record                   ii. Field                        iii. Database                iv. Table
Ans:  field
b) In a datasheet, what does each row represent?
i. Record                   ii. Field                        iii.        Database                     iv. Table
Ans:  record
c) A table structure can be modified in ……………..
i. Datasheet view      ii. Wizard        iii. Design view                       iv. None of them
Ans:  design view
d) Viewing required record of a table that matches the specified criteria is known as filtering
i. Sorting                   ii. Indexing                  iii. Filtering                  iv. All of them
Ans:  filtering
e) The process of arranging all the records in a table either ascending or descending order
i. Sorting                   ii. Indexing                  iii. Filtering                  iv. All of them
Ans:  sorting
          Mention true or false:
a) We cannot change the structure of a table once it is made. False
b) We can enter the data using datasheet view. True
c) We cannot unhide the hidden columns in a table. False
d) Data can be modified in datasheet view. True
e) Field with Memo, Hyperlink and OLE objects data types cannot be sorted. True
         Choose the best answer:
a) The frame work for viewing with some criteria in database is
i. Query                       ii .Form                        iii. Report                    iv. Table
Ans:  Query
b) Which query do you use to answer the question “Which employees earn more than $5000 in a month?”
i. Search query ii. Append queryiii. Select query        iv. Update query
Ans:  Select Query
c) Which criteria in query return only those names beginning with the letter “S”?
i.name=”S”      ii.name=”S*”               iii.name=”S?”              iv.name=”S#”
Ans:  name="S*)_
d) ……………query is used to display the relevalent data from the database without making any changes.
i. Select                        ii. Parameter                .iii. Crosstab                iv. Append
Ans:  select
e) An ……………query makes entire changes to a record or group of records in one or more tables
i. Select                        ii. Make table              iii. Update                   iv. Append
Ans:  update
         Mention true or false:
a) A query is used to select fields and records from one or more tables. True
b) A query can be created without tables. False
c) You can select all or part of data from a single or multiple links tables using query. True
d) A append query deletes a record or group of records from one or more tables.  False
e) Update query can even make changes to the auto number field. False
         Mention true or false:
a) The fame work for entering records in database is form. True
b) Forms can be used to enter, retrieve and display information.True
c) Forms can be created without table or query.False
d) Data changed using form gets changed into a table.True
e) User interface of the form can be changed as per user’s choice.True
         
         Match the following:
i. a. Table                     (b)Graphical interface for data entry
b. Form                        (c)search & selects
c. Query                      (d)output in user desires format
d. Report                     (a)primary database object
                                    formatting record
ii. a. show final information                table
b. data entry                                        (c)design view
c. create table structure                                   (d)field
d. each column in a table                    (b)form
                                                            (a)report
         True or False:
a. The framework for viewing desired information in a specific format in database is report. True
b. Report can be used to enter, retrieve and display information. False
c. Reports are only created with tables. False
d. A report can be used to modify data of a table. False
e. Reports are the methods of retrieving information in meaningful way. True
         Select the best answer:
a. ­­­­­­­­­­­­­­­­­_________ is not a database of MS-Access.
i. Number        ii. Text             iii. Memo                     iv. Form
Ans: Form
b. Primary key doesn't accept _________.
i. text               ii. Number       iii. Null value               iv. None of the above
Ans: Null value
c. _______ objects of Access is used to print formatted data.
i. Query           ii. Form                        iii.Report                     iv. Table
Ans: Report
d. In MS-Access data are stored in _________.
i. Form             ii. Query          iii. Table                      iv. All of them
Ans: Table
        Match the following:
a. Indexing                  -                       search fast
b. Report                     -                       final output
c. Validation rule        -                       limits the value
d.Query                       -                       MS-Access


1 comment:

  1. Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Benchmark Publication >>>>> Download Now

    >>>>> Download Full

    Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Benchmark Publication >>>>> Download LINK

    >>>>> Download Now

    Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Benchmark Publication >>>>> Download Full

    >>>>> Download LINK nJ

    ReplyDelete