1)Database Management Question:- ERA6 OBJECTIVE QUSESTION 1) While Creating a Table using the MS Access, you will get an interface, as shown on the screen this Interface shows, you are Working on the View a) Data sheet b) Design c) Pivot Table d) Report 2) Referring to the given Table structure, you should ensure that every record in the field should be non-blank and must be unique. a) Category b) Cost of Goods c) Salary d) ID 3) is a database object that is mainly used to enter and display records and make changes to existing onscreen a) Query b) Form c) Report d) Input Mask 4) The field property specifies a value which is automatically entered in a filed when a new record is added in a table. a) Caption b) Default Value c) Input Mask d) Required 5) All of the following are data types available in MS Access, EXCEPT a) Boolean b) Date/Time c) Hyperlink d) Currency 6) Refer the image shown on the screen. You can enter maximum 255 characters in the Category field.
7) You are creating a from using MS Access. While working on the form, you get a view as shown in the given image. Identify the name of this form view. a) Datasheet View b) Form View c) Layout View d) Design View 8) Refer the image given on the screen, Using this wizard you can generate a report Showing only ID, Category, Sale, Cost of Goods and Salary fields on the screen. 9) In MS Access, You can store the information/ records by using a) Reports b) Tables c) Wizards d) Buttons 10) Which of the following is not a valid way to add a new table to the database? a) Select from several premade table themes b) Create a table in design view c) Begin entering data into a data sheet d) Use the table template to create a table
2)All About Computer Question:- ERA6 OBJECTIVE QUSESTION 1) You want to start a computer which has been turned off. The process of starting the computer which has been turned off is called a) Worm Boot b) Cold Boot c) Online Boot d) Offline Boot 2) You received a DVD containing some official documents from your manager. He wants to create copy of this DVD. Referring to the above requirement identify the name of the peripheral which you will use? a) CD Writer b) CD ROM c) CD R d) DVD Writer 3) Refer to given image. This is a secondary storage device which is used to store data. 4) Referring to given image, identify the valid statement a) These devices are used to display output on the screen b) These devices are used to transfer data from memory to hard disk. c) These devices are used to store data in a Computer. d) These devices are used to input data or instructions that are used by a computer. 5) In the given reference image which is not an input devices. a) Scanner b) Joystick c) Printer d) Mouse 6) Which of the following key is not a toggle key? a) Caps Look b) Num Look c) Scroll Lock d) Control
7) is mainly used for computer games and ultrasound scanners in hospitals a) Scanner b) Joystick c) Printer d) Mouse 8) devices typically combine the capabilities of a scanner, printer, fax and copy machine a) Merging b) Multi Programming c) Multifunctional d) Many level 9) are similar to notebook computer, usually having a touch screen or penenabled interface. a) Desktop Computers b) Mainframe Computers c) Handheld Computers d) Tablet PC 10) The image given on the screen is of an/a devices which is used to capture and read information contained in a bar code. a) Input b) Output c) Processing d) Internet 11) Pointing, Clicking, Double Clicking, Dragging and right Clinking are the five techniques to use a a) Keyboard b) Monitor c) Mouse d) Headphone 12) The function keys on the keyboard of the computer a) Are keyboard shortcuts for specific tasks b) Cancel selections or procedures c) Enter numbers and arithmetic symbols d) Control the insertion point on the screen 13) Refer the image shown on the screen. This device is used to store programs and very large data files.
14) You cannot start a computer without headphone. 15) Speaker and Headphone are the most common types of Audio-Output devices. 16) Resolution, Dot (Pixel) pitch, Refresh rate and size are features of a) Keyboard b) Mouse c) Headphone d) Monitor 17) Digital Music Players are specialized devices for storing, transferring and playing audio files. 18) Following are various of Binary Coding Schemes, EXCEPT a) ASCII b) EBCDIC c) Stylus d) Unicode 19) Refer the given image. This is called temporary or volatile storage because data stored on this is lost when the computer is switched off. 20) You can store and access information from anywhere internet using special services sites. This storage is called a) HTML Storage b) Internet Hard Drive c) Extranet Hard Drive d) Java Hard Drive
3)Making IT Work For You Question:- ERA6 OBJECTIVE QUSESTION 1) You can always keep a CD backup of important files. To burn a CD, You need to have to a) CD burning Software. TV Tuner Card b) CD burning, Pen Drive c) CD burning, CD burning Software d) CD burning, TV Tuner card 2) A is a self-replicating computer program that spreads by inserting copies of itself into other executable code or document. a) Computer Error b) Computer Bacteria c) Word Processing d) Computer virus 3) A is a program that controls network traffic to and from a computer system. a) CD Burning b) Personal Firewall c) Spread sheet d) Media Players 4) You want to listen to songs. You can use a) Windows Media Player b) Winamp c) Real Player d) ALL of these 5) Playing video or audio in real time as it is transferred to your computer over the world wide web is called a) Streaming b) Surfing c) Burning d) Searching 6) You want to watch TV your computer. Your computer can serve both as a computing device as well as a television with the help of a) Network Card b) CD ROM c) DVD ROM d) TV Tuner Card
7) Using wireless services you can send SMS from your mobile. What is the meaning of SMS? a) Streaming Mobile Service b) Switched Mode Service c) Short Message Service d) Start Multiple Service 8) Every day. You receive e-mail message from unknown senders. What is the term for this type of security threat? a) Phishing b) Reading c) Spoofing d) Spam 9) You can use your voice to control the computer. You can verbally say commands that the computer will respond to, and you can dictate text to the computer. This ability to accept voice input is called a) Processing Input b) Speech Recognition c) Language Translator d) Start narrator 10) A weblog is a journal or newsletter that is frequently updated and intended for general 11) You are playing games on the computer. These games help you improve the problem solving skills spellings general knowledge. Such games are known as a) Infotainment b) Simulation c) Edutainment d) Weblog 12) is a combination of information and entertainment a) Infotainment b) Simulation c) Edutainment d) Weblog 13) Refer the image shown on the screen. You can easily and communicate with your friends and share files using this interface.
14) You have two computers at your home. Now you want to share files and printer between these computers. You can use to do so. a) Streaming b) TV Turner Card c) Home Networks d) Webcam 15) wireless technology is mostly use in mobile phones to make voice and video calls, to download and upload data and to surf the internet a) Webcam b) 3G c) Streaming d) TV Tuner Card 16) You can use tablet computer developed by apple for audio and visual media such as books, periodicals, movies music, and games, as web content. a) Printer b) Joystick c) Weblog d) Ipad 2 17) Dual core, Trip core and Quad core are the types of Microprocessors. 18) Instant Messenger is used for the following purpose a) To send instant message b) To create a presentation c) To buy online items d) To create a document 19) Trojan Horse, Spyware, Identity Theft and Adware are common computer viruses. 20) software s are designed to protect computer from viruses. a) Operating System b) Disk Clean-up c) Paint d) Anti-virus
4)Internet ERA6 OBJECTIVE QUSESTION 1) You are searching information over the internet and found the page given in the reference image. Referring to the above scenario, identify the name of internet activity? a) Shopping b) Communicating c) Entertainment d) E-learning 2) You want to pay for the electricity bill online using internet. You require to make online electricity bill payment. a) PAN Card b) Online bank account c) G talk d) Yahoo Messenger 3) Consider that you are having a Hotmail account with the name person@hotmail.com and password human. Now you want to change the password human to 12345. You can change this password with the help of system administrator only. 4) You want to share your picnic photographs online with your friends. You can share these photographs by using a) Linked In b) McAfee c) Picasa Web d) HDFC Bank 5) You want to download the passport application from online but you don t know the web site address. In this scenario, how will you search the web site address? a) You can use Google search engine b) You can use AltaVista search engine c) You can use Yahoo search engine d) All of these 6) Referring the given image. Identify the URL(Uniform Resource Locator) of the given web page. a) Tours4fun b) http://www.tours c) http://blog.tours4fun.com/ d) http://www.tours4fun.com/us-tours/
7) Refer the given image. The given web page is an example of a) Net banking Account b) Search engine c) System Software d) ecommerce 8) In the given browser, you can see thumbnail view of all the open tabs. You should select option to view the webpages as shown in the reference image. a) Normal b) Preview c) Quick Tabs d) Favorites 9) You are using Yahoo Messenger for communication with your friend. But your friend is offline. Referring to the above scenario you cannot send message to offline friends. 10) is the process of converting digital signals to analog form. a) Modulation b) Demodulation c) Reading d) Writing 11) When the mouse pointer finds a link on a web page, the shape of mouse pointer changes to hand. 12) You want to delete temporary files. History, cookies files of internet explorer. You need to select option to do so. a) Source b) Favotites c) Internet options d) Properties