1) ___ is the response of the receiver after perceiving the message.
a) Encoding
b) Decoding
c) Channel
d) Feedback
2) Which of the following is the category of file system?
a) Text file
b) Graphics file
c) EXT
d) None of these
3) In which of the following does entrepreneurship play a crucial role?
a) economic growth
b) employment generation
c) both a and b
d) none of these
4) how many goals of sustainable development?
a) 15
b) 3
c) 17
d) 18
5) which of the following belongs to 4 R'S?
a) Recycle
b) Repurpose
c) Both a & b
d) None of these
6) ___ are you before nouns to show whether the nouns are general or specific.
a) adverb
b) noun
c) articles
d) none of these
7) what is the shortcut keys of style and formatting?
a) F2
b) F1
c) F11
s) F7
8) what is the shortcut keys of spelling and grammar?
a) F2
b) F1
c) F11
d) F7
9) In which location writer content various objects like a rose icons bullets it is he that can be inserted into a text document.
a) pen drive
b) gallery
c) hard disk
d) none of these
10) which tab is used to set the attributes of the table of contents?
a) Entries
b) Background
c) Type
d) none of these
11) ___ is a feature available in spreadsheet that help to analyse all possible outcome with respect to change made in input value.
a) Subtotal
b) What if Analysis
c) Consolidate
d) none of these
12) which hyperlink contains the location of the link document with respect to the current location of active spreadsheet.
a) Relative
b) absolute
c) both a and b
d) none of these
13) which is your location in memory by data cut or copied by user lies temporary till it is wasted in under location?
a) menu bar
b) clipboard
c) record
d) none of these
14) ___ refers to arrangement of data in a particular order either ascending or descending order.
a) position
b) rotation
c) sorting
d) none of these
15) the person having the centralise control over the database system and responsible for managing called ____.
a) engineer
b) database administrator
c) user
d) none of these
16) In ____ situation section 140 lockdown or curfew maybe declared by the government.
a) natural emergency
b) external emergency
c) government emergency
d) none of these
17) ___ is a very cute medical support ki date can be used as a basic safety measure.
a) First Aid
b) Doctor Kit
c) both a and b
d) none of these
18) what is the best way to prevent strength while using laptops?
a) lowering the screen height
b) using external keyboard and mouse
c) keeping laptops on your lab
d) none of these
19) ____ often arise from poor ergonomic practices and environmental factors.
a) headache
b) treatment
c) prevention
d) none of these
20) which of the following comes under physical hazards?
a) injuries due to machinery
b) loud noise
c) both a and b
d) none of these
21) A ____ is anything that has the potential because physical or mental harm.
a) hazard
b) falling
c) tripping
d) none of these
22) which database can store yes or no type value in the form of 0 or 1 in library office base table?
a) Boolean
b) time
c) date
d) none of these
23) which key field mark the identification of record in a database?
a) candidate key
b) alternet key
c) Primary Key
d) none of these
24) Data integrity is also known as ____.
a) data security
b) data validation
c) data consistency
d) none of these
25) A ___ summarize or display the information in a format that is suitable for giving or publishing.
a) Form
b) Report
c) Table
d) none of these
26) which tool is used to evaluate and manipulate data in a database?
a) Table
b) Query
c) Form
d) Report
27) What is the full form of RDBMS?
a) relational data management system
b) relational date management system
c) Relational Database Management System
d) all of these
28) ___ enable to provide a user friend interface for entering data in a table in an attractive and easy to read format.
a) Table
b) Query
c) Form
d) Report
29) Which type of relationship occurs when there is a one record of table A corresponds to exactly call record of Table B.
a) Many to many
b) One to One
c) One to Many
d) All of these
30) Data redundancy means____.
a) Duplication of data
b) data security
c) data consistency
d) data validation
No comments:
Post a Comment