By default, on which page the header or the footer is printed?



Which topology is shown:   A.   A bus network B.   A ring network C.   A mesh network D.   A fully connected network E.   A tree network 2. Which protocol is used to send a destination network unknown message back to originating hosts? A.   TCP B.   ARP C.   ICMP D.   BootP E.   Boot 3. Which of the following is private IP address? A.   12.0.0.1 B.   168.172.19.39 C.   172.15.14.36 D.   192.168.24.43 E.   165.172.19.39 4. Which topology is shown: A.   A bus network B.   A star network C.   A mesh network D.   A fully connected network E.   A tree network 5. Which network topology offers the highest reliability and availability? A. Bus B. Star C. Ring D. Mesh E. Tree 6. The three primary methods for authenticating users to a system or network are…? A. passwords, tokens, and biometrics. B. authorization, identification, and tokens. C. passwords, encryption, and identification. D. identification, encryption, and authorization. E. integrity, availability, and authentication 7. What role does biometrics have in logical access control? A. Certification B. Authorization C. Authentication D. Confirmation E. Password Security 8. What is Internet security? A. is a branch of computer security B. is a branch of computer security specifically related to the Internet. C. is the protection of information systems D. is the practice of preventing unauthorized access E. is crime that involves a computer and a network 9. What is Cybercrime? A. is a branch of computer security B. is a branch of computer security specifically related to the Internet. C. is the protection of information systems D. is the practice of preventing unauthorized access E. is crime that involves a computer and a network 10. What is a vulnerability? A. is a weakness which allows an attacker to reduce a system's information assurance. B. is a branch of computer security specifically related to the Internet. C. is the protection of information systems D. is the practice of preventing unauthorized access E. is crime that involves a computer and a network 11. What is Trojan horse? A. is any malicious computer program B. is a branch of computer security specifically related to the Internet. C. is the protection of information systems D. is the practice of preventing unauthorized access E. is crime that involves a computer and a network 12. What is a computer virus? A. is any malicious computer program B. is a type of malicious software program ("malware") C. is the protection of information systems D. is the practice of preventing unauthorized access E. is crime that involves a computer and a network 13. What is Antivirus? A. is any malicious computer program B. is computer software used to prevent, detect and remove malicious software. C. is the protection of information systems D. is the practice of preventing unauthorized access E. is crime that involves a computer and a network   14. What is Password manager? A. is any malicious computer program B. is computer software used to prevent, detect and remove malicious software. C. is the protection of information systems D. is the practice of preventing unauthorized access E. is a software application that helps a user store and organize passwords 15. Which file format can be added to a PowerPoint? A. .jpg B. .giv C. .wav D. .wav/ .giv/.jpg E. .doc 16. Which of the following is not a logical database structure? A. Chain B. Network C. Tree D. Relational E. None of the above   17. An organized collection of logically related data is known as A. Database B. Information C. Data D. Meta data E. None of the above   18. In a datasheet, what does each row represent? A. Record B. Table C. Database D. Field E. Meta data   19. In a datasheet, what does each column represent? A. Field B. Table C. Record D. Database E. Meta data   20. What do you call a primary key field included in another table? A. Foreign key B. Child key C. Index D. Parent key E. Record   21. A ________ is a unit of information in a ________ A. Field, record B. Record, field C. Record, data source D. Data source, field E. None of the above   22. Which type of field is incremented automatically? A. AutoNumber B. Auto Elevate C. Auto Increment D. Auto Value E. None of the above     23. Which tool do you use to create a query object? A. Simple query wizard B. Simple filter wizard C. Database wizard D. Table query wizard E. None of the above   24. How many relations may exist between tables in databases? A. 3 B. 1 C. 4 D. 2 E. 5   25. Which object is used to create a form? A. Tables and Queries B. Tables only C. Queries and reports D. Tables and reports E. None of the above   26. What is an intersection of a row and a column? A. Cell B. Cursor C. Record D. Form E. None of the above     27. Which query do you use to answer the question "What is the average salary of the employees"? A. Select query B. Cross tab query C. Search query D. Update query E. None of the above     28. Access: Which query do you use to answer the question "Which employees earn more than $5000 a month"? A. Select query B. Search query C. Cross tab query D. Update query E. None of the above   29. In an application created using the database wizard, the main menu is presented as a: A. Form, called a switchboard B. Table, called a switchboard C. Report, called a menu D. Query, called a menu E. None of the above     30. Which leads you through the process of creating a table? A. Wizard B. Coach C. Relation D. Assistant E. Query   31. The basic elements of a form or a report are called: A. Controls B. Objects C. Properties D. Windows E. Query     32. Which data type is better to use for storing the price of an item? A. Currency B. AutoNumber C. Number D. Text E. None of the above     33. A _________ is a computerized filing system that is used to organize and maintain a collection of information for future use. A. Database B. Spreadsheet C. Word processor D. Query E. Report

By default, on which page the header or the footer is printed?

A. On every page

B. On first page

C. On alternate page

D. On next page

E. None of the above

 

35. MS-Word automatically moves the text to the next line when it reaches the right edge of the screen and is called?

A. Word Wrap

B. Carriage Return

C. Enter

D. On next page

E. None of the above

 

36. Which key should be pressed to start a new paragraph in MSWord?

A. Enter Key

B. Down Cursor Key

C. Shift + Enter

D. Control + Enter

E. Control + Z

 

37. Which option in File pull-down menu is used to close a file in MSWord?

A. Close

B. Exit

C. New

D. Quit

E. Save

 

38. Which bar is usually located below that Title Bar that provides categorized options?

A. Menu bar

B. Tool bar

C. Scroll bar

D. Status Bar

E. None of the above

 

39. Which menu in MSWord can be used to change character size and typeface?

A. Format

B. Data

C. View

D. Tools

E. Save

 

 

40. Which key is used to select all the text in the document?

A. Ctrl+A

B. Ctrl+F

C. Ctrl+N

D. Ctrl+T

E. Ctrl+Z

 

 

41. Which key is used to increase left indent?

A. Ctrl+M

B. F10

C. Alt+I

D. Ctrl+I

E. Ctrl+Z

 

42. To undo the last work, press …..

A. Ctrl+Z

B. Ctrl+Y

C. Ctrl+U

D. Ctrl+W

E. Ctrl+A

 

43. In MS Word, Ctrl+S is for …..

A. Save

B. Spelling Check

C. Size

D. Scenarios

E. Paste

 

 

44. Which language does MS-Word use to create Macros?

A. Visual Basic

B. Access

C. FoxPro

D. Visual C++

E. Turbo Pascal

 

45. Which keystroke is used for updating a field?

A. F9

B. F6

C. F11

D. F12

E. F1

 

46. Which key deletes the character to the right of the cursor?

A. Delete

B. Home

C. Backspace

D. End

E. Page Up

 

47. Which would you choose to save a document with a new name?

A. Click File, Save As

B. Click Tools, Options, Save

C. Press Ctrl+S

D. Click File, Save

E. Press Ctrl+A

 


Дата добавления: 2018-04-05; просмотров: 487; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!