BENCHMARK PUBLICATION
Chapter 1:Network and telecommunication
a) The term network basically refers to:
i) Communication Interconnection Sharing All of them
Ans: All of above
b) Which of the following are network services?
i) Database services LAN services Print services Both i and iii
Ans: Both i and iii
c) Which of the following are is not a goal of computer networks?
i) Resource sharing High reliability Scalability None of the above
Ans: None of the above
d) The network architecture used in most home networks is:
i) Client-server LAN Peer-to-peer LAN Client-server WAN Peer-to-peer WAN
Ans: Peer-to-peer LAN
e) The maximum speed at which data can be transmitted between two nodes on a network.
i) Bit rate Bandwidth Band length None of them
Ans: Bandwidth
f) __________ is the main line of defense between a local network or intranet and the Internet.
i) USB port Encryption key Firewall Decryption key
Ans: Firewall
g) Which is the network operating system?
i. MS-DOS Windows 7 MS-UNIX Windows NT
Ans: Windows NT
h) Microwave and Infrared technology are related with:
i. Unbounded media Bounded Media Confounded Hot Bounded
Ans: Unbounded media
i) An example of guided media_______
i. Radio wave Infrared Fiber Optics Micro wave
Ans: Fiber Optics
j) Devices installed on long cable runs to amplify the signal are called:
i. Repeaters Adapters Switches Routers
Ans: Repeaters
k) A network navigation device that merely retransmits a signal to all other nodes attached to it:
i. Router NIC Hub Adapter
Ans: Hub
l) Physical layout of computer:
i. Network Topology LAN MAN
Ans: Topology
m) Token passing system is used in _____ topology.
i. Star Ring Bus Mesh
Ans: Ring
n) Which of the following is protocol?
i. TCP/IP HTTP FTP All of them
Ans: All of them
o) _______ is the protocol used to send email:
i. HTTP SMTP POP FTP
Ans: SMTP
2. Match the following:
Q. i. a. Protocol i. MODEM
b. WAN ii. Fiber Optic
c. Network component iii. HTTP
d. Transmission media iv. Internet
Answers
a. Protocol
|
HTTP
|
b. WAN
|
Internet
|
c. Network component
|
MODEM
|
d. Transmission media
|
Fiber Optic
|
Q. ii. a. Coaxial Cable i. RJ45
b. Optical Fiber cable ii. BNC
c. Twisted Pair iii. ST
d. Copper Wire iv. RJ11
Answers
a. Coaxial Cable
|
BNC
|
b. Optical Fiber cable
|
ST
|
c. Twisted Pair
|
RJ45
|
d. Copper Wire
|
RJ11
|
Q. iii. a. Star i. Powerful computer
b. WAN ii. Computers on the network provided to users
c. Server iii. Internet
d. Node iv. Topology
Answers
a. Star
|
Topology
|
b. WAN
|
Internet
|
c. Server
|
Powerful computer
|
d. Node
|
Computers on the network provided to users
|
Q. iv. a. TCP/IP i. Addressing data, converting them into packets and Routing
b. FTP ii. Transfer mail and attachment on the network
c. POP iii. Transfer files between two computers
d. SMTP iv. Fetching mails from the mail server to a user’s computer
Answers
a. TCP/IP
|
Addressing data, converting them into packets and Routing
|
b. FTP
|
Transfer files between two computers
|
c. POP
|
Fetching mails from the mail server to a user’s computer
|
d. SMTP
|
Transfer mail and attachment on the network
|
3. Write either true or false for the following statements:
a) Computer network is basically connection of computers.True
b) Computer network cannot transfer multimedia contents.False
c) Duplex device can transfer data in both directions.True
d) Computer Network can share both hardware and software resources.True
e) Guided transmission media does not use cables.False
f) RJ-45 is the connector for co-axial cable.False
g) Data are transmitted in the form of light in the fiber optic cable.True
h) Router is a network component that regenerates electric signals.False
i) Bus topology requires more media than other topology.False
j) STAR topology is the most popular network topology used to connect computers.True
k) Protocol is the computer language only understood by computer.True
l) Fiber optic is one of the cheapest networks.False
m) A bridge is a network device that connects different LAN segments using the same access method.True
n) Connecting computer between two different countries is an example of WAN.True
o) Protocol is required to transfer data between two computers.True
p) A MODEM is a central network device that connects network devices in a star topology.False
4. Write down the most appropriate technical terms for the following statements:
a) A device that forwards signals between networks in networks in network traffic.Router
b) Medium that carries data without physical path.Unguided media
c) Physical layout of network.Topology
d) A hardware device that provide common wiring point in LAN.Hub
e) Formal set of rules that govern the exchange of information in a network. Protocol
f) The computer that acts the central authority on a network. Server
g) Device used to convert analog to digital signals and vice versa.MODEM
h) A private internet. Intranet
i) Network confined to relatively small area.LAN
j) Mode of data transmission in which transmission exist in both directions at a time.Full-duplex mode
k) Network in which every computer acts as both client and server.Peer to Peer
l) Device to amplify or regenerate digital signals received.Repeater
Chapter 2: email and internet
- Choose the best answer
a) ____________ is the service of the Internet through which remote computer can be accessed from another location.
i. Newsgroup FTP Telnet E-mail
Ans: Telnet
b) Which software is needed for net surfing?
i. Web browser Word Processor Multimedia player Windows Explorer
Ans: Web browser
c) Which protocol sends outgoing mail to mail server?
i. POP FTP HTTP SMTP
Ans: SMTP
d) The process of transferring file from a remote computer to local computer is:
Uploading Downloading Searching File transfer protocol
Ans: Downloading
e) Which of the following is valid e-mail ID?
Ans: mail@brushuponline.edu.np
f) Which of the flowing is the internet service?
i. Chat E-Mail FAQ All of above
Ans: All of the above
g) Which of the following is online business?
i. E-Commerce E-shopping E-Business All of the above
Ans: All of the above
- Mention either true or false
a) ARPANET was the first computer network.True
b) Internet is the service provided by WWW.False
c) Websites have their own uniqueness address known as United Resource Locator. False
d) Chatting only supports voice messages.False
e) Search engines are used to locate information on the Internet.True
f) ISP provides the Internet service to end users.True
g) Google chrome is a search engine.False
- Mention the full form of the following
a) ADSL ARPA SMTP ISDN
b) HTTP URL DNS TCP/IP
- Write the technical term for the following
a) The largest computer network.Internet
b) Website used to search information on the internet.Search engine
c) A business through Internet.E-Commerce
d) The process of transferring data/file from user’s computer to Internet.Uploading
e) A company that provides the Internet facility.ISP
f) Software used to open WebPages.Web browser
g) Visual communication over the internet.Video conference
h) Protocol used to receive email from mail server.POP
i) Online postal service.E-mail
j) Internet service that allows real time communication. IRC
k) An online meeting and information system that allows people to carry on discussions.Newsgroup
Chapter 3: computer security
- Choose the best answer
a) The term computer security refers to:
i. Use of antivirus Protection of software Protection to a computer system
ii. Use of firewall
Ans: Protection to computer system
b) An important counter measure against data corruption or loss.
i. Password policy Defragmentation Scan disk Backup system
Ans: Backup system
c) Which is not the power protection device?
i. UPS Spike Guard Volt Guard Scan disk
Ans: Scan disk
d) _______ protects the machine and peripheral devices from being damage.
i. Information security Hardware security Software security None of them
Ans: Hardware security
e) To prevent the loss of data during power failures, we use:
i. Encryption program Surge protector Firewall UPS
Ans: UPS
f) _____ are used to avoid access for unauthorized users.
i. Logins Passwords Encryption Lock and key
Ans: Passwords
g) Scandisk is used for
i. Removing virus Removing bad clusters Backup data All of above
Ans: Removing bad clusters
- Mention either true or false.
a) Loss of information costs more than protecting it.True
b) Power protection devices protect computer software.False
c) Insurance is one of the computer security measures.True
d) UPS is a device that maintains a constant voltage level. False
e) Defragmentation is the tool that ensures error free file management.False
f) Scandisk helps to scan and remove viruses from computer. False
g) Password policy is very important for software security.True
- Fill in the blanks.
a) The protection given to the computer hardware and software from being lost or damaged is known as computer security.
b) Hardware securityprotects the machine and peripheral devices from theft, damage and electronic instruction.
c) The regular maintenance of hardware keeps the computer devices in good operating condition and helps to find out the problems in hardware.
d) Backup policy is related with software security.
e) Voltage regulator device is an electrical regulator designed to automatically maintain a constant voltage level.
f) The suitable temperature in the computer room should be maintained between 21 to 24 degree Celsius.
g) The tool that is used to maintain performance and error free file management is called scandisk.
- Write the technical term for the following
a) The securing data and programs from being lost or damaged due to accidental or intentional harm.software security
b) A secret word that gives a user access to a particular program and system.Password
c) A disk tool which helps to fix errors in the disk and also remove bad sectors.Scandisk
d) A copy of file, which is used in the event of original file being corrupted.Backup
e) The scattering of the parts of the same disk file over different locations. fragmentation
f) A battery supported power unit, which supplies power during the failure of electricity.UPS
g) The process of rearranging the fragmented files in the contiguous locations on the disks. Defragmentation
- Match the following
i. a. password i. Duplicate copy of data
b. Encryption ii. Secret word or phrase
c. Backup iii. Authentication
d. Access Control iv. Rearrangement of fragmented file
v. Scrambled and unreadable form of information
Answers
a. password
|
Secret word or phrase
|
b. Encryption
|
Scrambled and unreadable form of information
|
c. Backup
|
Duplicate copy of data
|
d. Access Control
|
Authentication
|
ii. a. Antivirus i. Software that prevent gaining access
b. Scandisk ii. Arranging the scattered data
c. Defragmentation iii. Checking for disk error
d. Firewall iv. Software to remove malicious Programs
v. Duplicating disk
Answers
a. Antivirus
|
Software to remove malicious Programs
|
b. Scandisk
|
Checking for disk error
|
c. Defragmentation
|
Arranging the scattered data
|
d. Firewall
|
Software that prevent gaining access
|
iii. a. Hardware security i. Rewriting the files to contiguous sector
b. Software ii. Scattering the disk file over different locations
c. Fragmentation iii. Provide access to the computer system
d. Password iv. Antivirus
v. Insurance policy
Answers
a. Hardware security
|
Insurance policy
|
b. Software
|
Antivirus
|
c. Fragmentation
|
Scattering the disk file over different locations
|
d. Password
|
Provide access to the computer system
|
Chapter 4:computer virus
- Choose the best answer.
a) Computer virus is a _____ software.
i. System program Application Destructive Utility
Ans: Destructive
b) Route of virus transmission.
i. Mouse Print Microphone Pen drive
Ans: Pen drive
c) ________ Virus are often transmitted by a floppy disk left in the floppy disk drive.
i. Boot-sector Trojan horse Script logic bomb
Ans: Boot sector
d) A virus that infects Master Boot Record of the computer system.
i. Macro virus Multipartite virus Program infectors Boot sector virus
Ans: Boot sector virus
e) A virus that changes its appearance in every infection is called _______
i. Macro virus System infectors Polymorphic virus Multipartite virus
Ans: Polymorphic virus
f) A virus that is designed to infect executable files is
i. File infectors Macro virus Polymorphic virus Multipartite virus
Ans: File infectors
g) __________ Virus can infect both programs and boot sectors.
i. Stealth virus File infectors Multipartite virus Polymorphic virus
Ans: Multipartite virus
h) Viruses attach themselves to documents such as Word and Excel.
i. Macro virus File infectors Polymorphic virus Multipartite virus
Ans: Macro virus
i) A program that is designed to detect and delete virus.
i. Antivirus Malware Freeware Shareware
Ans: Antivius
- Mention either true or false.
a) Virus is a destructive computer programTrue
b) Viruses are easily identified as other programs. False
c) Viruses help to stop software piracy. True
d) Script viruses attach themselves to any executable file, usually .COM, .BIN, EXE etc.False
e) Viruses mostly spread through computer network. True
f) A macro virus infects both the application program and the boot sector of disk.False
g) Viruses change the size of file and memory. True
- Fill in the blanks.
a) Computer Virusis a program containing code that can generate multiple copies of itself.
b) Firewallare software programs or hardware devices designed to keep computers safe from hackers.
c) Trojan horse is a computer virus.
d) Avira is an example of antivirus.
e) Program virus infects executable program files having an extension .exe, .com or .dll.
f) A program designed to protect software from viruses is called antivirus software.
- Write the technical term for the following
a) A software program with the ability to generate multiple copies itself.Computer virus
b) Software that protects computer system from computer viruses.Antivirus software
c) A virus that damages documents created in MS-Word and MS-Excel.Macro virus
d) A virus that shows different behavior in each infection.Polymorphic virus
e) Software that do not come from reliable sources.Pirated software
f) A virus that infects executable files.Program virus
Chapter 5:Multimedia and its application
- Choose the best answer
a) Which one is the software used in multimedia?
i. CD-ROM Sound Card Sound Forge MS-Word
Ans: Sound Forge
b) The element of multimedia is ______
i. Keyboard Windows XP Track Ball Sound Card
Ans: Sound card
c) Main component of multimedia is.
i. CD-ROM Sound Card Hard Disk RAM
Ans: Sound card
d) _____ deals with the recording and display sequence of images at a reasonable speed to create an impression of movement.
i. Graphics Video Animation Text
Ans: Video
e) In order to work with multimedia, a personal computer typically requires the following hardware components.
i. Power microprocessor Huge main memory Compact disk All of them
Ans: All of them
f) Software used in multimedia system.
i. Photoshop Flash Maya All of them
Ans: All of them
g) _______ provides a visual impact.
i. Image Graphics Video None of them
Ans: Graphics
- Mention either true or false.
a) Multimedia uses more than one media.True
b) Multimedia manipulates the information for better communication. True
c) Multimedia helps to develop creative ideas. True
d) Multimedia products take much time to develop and are expensive. True
e) All computers can easily handle multimedia.False
f) Multimedia is used extensively in entertainment. True
g) Multimedia is only applicable in information technology sector.False
- Match the following
i. a. Virtual Reality i. Combination of various media
b. Graphics ii. Artificial environment
c. Animation iii. Visual impact
d. Multimedia iv. Moving images
v. Adobe Photoshop
Answers:
a. Virtual Reality
|
Artificial environment
|
b. Graphics
|
Visual impact
|
c. Animation
|
Moving images
|
d. Multimedia
|
Combination of various media
|
ii. a. Audio i. Monitor
b. Video ii. Speaker
c. Sound Card iii. Still frame pictures
d. Graphics iv. Recording and playing sound v. Multimedia card
Answers:
a. Audio
|
Speaker
|
b. Video
|
Monitor
|
c. Sound Card
|
Recording and playing sound
|
d. Graphics
|
Still frame pictures
|
iii. a. Real player i. Upgrade the PC
b. MUK ii. Headsets and data gloves
c. Animation iii. Software to view multimedia content
d. Virtual reality iv. Cartoon on television
v. Multimedia component
Answers:
a. Real player
|
Software to view multimedia content
|
b. MUK
|
Upgrade the PC
|
c. Animation
|
Cartoon on television
|
d. Virtual reality
|
Headsets and data gloves
|
4. Write most appropriate technical term.
a) The integration of text, audio, sound and animation.Multimedia
b) The moving graphic images.Animation
c) A technology that makes teaching-learning easier in a classroom. CAL
d) The artificial environment created by computer technology to entertain user.Virtual reality
e) The display of still frame pictures or photos or photos on computer screen.Graphics
5. Write the full form
a) CBT CD-ROM DVD CBE
b) JPEG PDF WiFi
Chapter 6:Cyber law and ethics
- Choose the best answer
a) A genetic term that is concerned to the legal and regulatory aspects of Internet and computer technology.
i. Copyright law Cyber law Computer Crime None of them
Ans: Cyber law
b) A criminal activity within the information technology infrastructure.
i. Digital crime Intellectual property Cybercrime All of them
Ans: cyber crime
c) Cyber law of Nepal of Nepal was enacted in Nepal in ________BS.
i. 2064 2061 2062 2063
Ans: 2061
d) A criminal activity within the information technology infrastructure.
i. Digital crime Intellectual property Cybercrime All of them
Ans: cybercrime
e) _______ is the normal Principal that regulates the use of computers.
i. Cyber Law Cyber act Computer ethics All of them
Ans: computer ethics
f) The method of making the data or message unreadable by unauthorized people.
i. Digital signature Decryption Encryption All of them
Ans: Encryption
- Mention either true or false.
a) Cyber law is legal and regulatory framework in cyber space.True
b) The copyright law makes it legal to produce extra copies of software for sale.False
c) Telecommunication covers the Internet and computers as well as places where two or more cables or wires meet. True
d) Cybercrime refers any illegal act that involves a computer. True
e) Nepal does not have issued cyber law yet. False
f) The digital signature allows the user to attach an original signature on the document of electronic records. False
g) Moral principles that regulate the use of computers are also explained in cyber law. True
- Write the technical term for the following.
a) The legal issued adopted by the government to minimize the computer crime.Cyber law
b) Electronic fraud committed by people by the use of computer.Cyber crime
c) Law that prevents illegal copying.Copyright law
d) A person who steals the password or credit card number of Internet users and make unauthorized access of it.Hacker
e) An electronic equivalent of a signature.Digital signature
f) Moral principals in cyberspace.Computer ethics
Chapter 8: Database Management system
- Choose the best answer.
a) What is extension of access database? (MS-Access 2003 version)
i. DBF MDB MBD DBM
Ans: MDB
b) _____ is the table design creating option to create custom table design.
i. Datasheet Design view Wizard Link Table
Ans: Design View
c) Object primarily used to store the data in database.
i. Table Form Query Report
Ans: Table
d) A field name can be up to _____ characters long.
i. 40 46 64 2048
Ans: 64
e) _____ is a data type used for lengthy text and numbers
i. Text Long Text OLE Object Memo
Ans: Memo
f) Data type that requires 8 bytes of storage.
i. Yes/No Currency Long Integer All of them
Ans: Currency
g) The name of caption can be declared up to _____ characters.
i. 1024 2024 2048 2005
Ans: 2048
h) Memory space used by a auto number data type is _____
i. 1 Byte 2 Bytes 4 Bytes 8 Bytes
Ans: 4 Bytes
i) The primary key contains _____ value.
i. Null No Null Number Auto number
Ans: No Null
j) Which specifies the expression that checks the invalid data.
i. Validation Rule Validation Text Input Mask Required
Ans: Validation Rule
k) _____ is not a field property of MS-Access.
i. Caption Index Color Format
Ans:Color
l) Format symbol that converts all characters to uppercase.
i. @ & < >
Ans:>
- Mention either true or false.
a) Field names are used to define properties for a database.False
b) Lookup Wizard is a tool that automates many database tasks.True
c) Default field size of text type of data is 65535 characters. False
d) Date/Time type of data requires 8 bytes of memory. True
e) Removing a primary key does not delete a field. True
f) FORMAT property allows us to delete data from database. False
g) Maximum length for the validation text property setting is 25 characters.False
h) Subtype of number data type is integer. True
i) Deleting a field does not delete data in the field. False
j) Validation rule is used to specify whether a value is required in a field. False
k) Indexed field property speeds up searching and sorting of records based on a field. True
- Match the following
Group A
|
Group B
|
a) Number
|
a) 50
|
b) Yes/No
|
b) 8 bytes
|
c) Currency
|
c) Long integer
|
d) Text
|
d) 1 bit
|
e) short integer
|
(a)
Answers:
a) Number
|
Long integer
|
b) Yes/No
|
1 bit
|
c) Currency
|
8 bytes
|
d) Text
|
50
|
Group A
|
Group B
|
a) Data redundancy
|
a) Error message
|
b) Validation Text
|
b) Pattern of data in a field
|
c) Input Mask
|
c) Lookup wizard
|
d) Validation Rule
|
d) Data duplication
|
e) Limits the value
|
(b)
Answers:
a) Data redundancy
|
Data duplication
|
b) Validation Text
|
Error message
|
c) Input Mask
|
Pattern of data in a field
|
d) Validation Rule
|
Limits the value
|
Group A
|
Group B
|
a) Text
|
a) 2048 characters
|
b) Currency
|
b) up to 255 Characters
|
c) Memo
|
c) 8 Bytes
|
d) Hyperlink
|
d) 0-65535 Characters
|
e) 4 Bytes
|
(c)
Answers:
a) Text
|
up to 255 Characters
|
b) Currency
|
8 Bytes
|
c) Memo
|
0-65535 Characters
|
d) Hyperlink
|
2048 characters
|
Group A
|
Group B
|
a) Indexing data
|
a) Retrieves data
|
b) Long text
|
b) Caption
|
c) FoxPro
|
c) Memo field
|
d) Label for a field
|
d) DBMS
|
e) Searching fast
|
(d)
Indexing data
|
Searching fast
|
Long text
|
Memo field
|
FoxPro
|
DBMS
|
Label for a field
|
Caption
|
Answers:
a) Data Integrity i. No. of character can be entered
b) Automatic ii. Contains distinct value
c) Field size iii. Validation Rule
d) Primary key iv. Indexed
v. Default value
Answers:
Data Integrity
|
Validation Rule
|
Automatic
|
Default value
|
Field size
|
No. of character can be entered
|
Primary key
|
Contains distinct value
|
Choose the correct option.
a)…………….is the collection of related information.
i. Data ii. Meta data iii. Database iv. Facts
Ans: Database
b)………….is the raw form of any facts and figures.
i. Information ii. DBMS iii. Records iv. Data
Ans: data
c)…………is a DBMS software.
i. MS-Access ii.MS-Excel iii. B-Dase iv .None of them
Ans: MS-Access
d)A………. is a collection of data about a specific topic
i. DBMS ii .Database iii. Table iv. All of them
Ans: table
e .In a table, row called ……………… and column is called……………..
i. record,field ii.filed, record iii. record, tuple iv .none of them
Ans: record, field
f)A…………….. is a unit of information in a record.
i. record ii. field iii. data source iv .data
Ans: field
Mention either true or false.
a) Collection of any data can be a database. false
b) MS-Access is RDBMS. true
c) Every record in a table is unique. true
d)A group of related field describes a person, place, or thing is called a field. false
e) DBMS is an application software. true
f) Deleting a field does not delete data in the field. false
Technical terms:
a) Field property that limits the values that can be entered into field. validation rule
b) The value automatically enters for a new record. default value
c) A field or group of fields that uniquely identifies the records in database. primary key
d) A message displayed after data is entered and checked into a field. validation text
e) Field property that defines label for the field. caption
f) A data type used for link address type of data. hyperlink
g) Standard pattern for an appearance of data in a field. input mask
h) View records in a table either in ascending or descending order. sorting
i) A Microsoft tool that automates many database tasks. wizard
Choose the best answer:
a) In a datasheet , what does each column represent?
i. Record ii. Field iii. Database iv. Table
Ans: field
b) In a datasheet, what does each row represent?
i. Record ii. Field iii. Database iv. Table
Ans: record
c) A table structure can be modified in ……………..
i. Datasheet view ii. Wizard iii. Design view iv. None of them
Ans: design view
d) Viewing required record of a table that matches the specified criteria is known as filtering
i. Sorting ii. Indexing iii. Filtering iv. All of them
Ans: filtering
e) The process of arranging all the records in a table either ascending or descending order
i. Sorting ii. Indexing iii. Filtering iv. All of them
Ans: sorting
Mention true or false:
a) We cannot change the structure of a table once it is made. False
b) We can enter the data using datasheet view. True
c) We cannot unhide the hidden columns in a table. False
d) Data can be modified in datasheet view. True
e) Field with Memo, Hyperlink and OLE objects data types cannot be sorted. True
Choose the best answer:
a) The frame work for viewing with some criteria in database is
i. Query ii .Form iii. Report iv. Table
Ans: Query
b) Which query do you use to answer the question “Which employees earn more than $5000 in a month?”
i. Search query ii. Append queryiii. Select query iv. Update query
Ans: Select Query
c) Which criteria in query return only those names beginning with the letter “S”?
i.name=”S” ii.name=”S*” iii.name=”S?” iv.name=”S#”
Ans: name="S*)_
d) ……………query is used to display the relevalent data from the database without making any changes.
i. Select ii. Parameter .iii. Crosstab iv. Append
Ans: select
e) An ……………query makes entire changes to a record or group of records in one or more tables
i. Select ii. Make table iii. Update iv. Append
Ans: update
Mention true or false:
a) A query is used to select fields and records from one or more tables. True
b) A query can be created without tables. False
c) You can select all or part of data from a single or multiple links tables using query. True
d) A append query deletes a record or group of records from one or more tables. False
e) Update query can even make changes to the auto number field. False
Mention true or false:
a) The fame work for entering records in database is form. True
b) Forms can be used to enter, retrieve and display information.True
c) Forms can be created without table or query.False
d) Data changed using form gets changed into a table.True
e) User interface of the form can be changed as per user’s choice.True
Match the following:
i. a. Table (b)Graphical interface for data entry
b. Form (c)search & selects
c. Query (d)output in user desires format
d. Report (a)primary database object
formatting record
ii. a. show final information table
b. data entry (c)design view
c. create table structure (d)field
d. each column in a table (b)form
(a)report
True or False:
a. The framework for viewing desired information in a specific format in database is report. True
b. Report can be used to enter, retrieve and display information. False
c. Reports are only created with tables. False
d. A report can be used to modify data of a table. False
e. Reports are the methods of retrieving information in meaningful way. True
Select the best answer:
a. _________ is not a database of MS-Access.
i. Number ii. Text iii. Memo iv. Form
Ans: Form
b. Primary key doesn't accept _________.
i. text ii. Number iii. Null value iv. None of the above
Ans: Null value
c. _______ objects of Access is used to print formatted data.
i. Query ii. Form iii.Report iv. Table
Ans: Report
d. In MS-Access data are stored in _________.
i. Form ii. Query iii. Table iv. All of them
Ans: Table
Match the following:
a. Indexing - search fast
b. Report - final output
c. Validation rule - limits the value
d.Query - MS-Access
Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Benchmark Publication >>>>> Download Now
ReplyDelete>>>>> Download Full
Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Benchmark Publication >>>>> Download LINK
>>>>> Download Now
Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Benchmark Publication >>>>> Download Full
>>>>> Download LINK nJ