. Multiple calculations can be made in a single formula using…..

Options: Standard Formulas B. Array Formula C. Complex Formulas D. Smart Formula

Ans: – B ,

More MS-Excel Related questions:

Which of the following statements correct about the below program? #include<stdio.h> int main() { union a { int i; char ch[2]; }; union a u1 = {512}; union a u2 = {0, 2}; return 0; } 1: u2 CANNOT be initialized as shown. 2: u1 can be initialized as shown. 3: To initialize char ch[] of u2 '.' operator should be used. 4: The code causes an error 'Declaration syntax error'
Options: 1, 2,    2, 3,    1, 2, 3,    1, 3, 4

Ans:C ,C

. Which of the following is the DBMS type
Options: a. Flat File System b. Hierarchical DBMS c. Relational DMBS d. All of the Above

Ans:– d,– d

. What is the use of Cascade Delete Option in MS Access?
Options: a. It makes sure that all the records from the parent table and child table is deleted from selected database b. It makes sure that all the related records will be deleted automatically from child table when the records from parent table is deleted c. It makes sure that all the related records will be deleted automatically from Parent table when the records from child table is deleted d. None of above

Ans:– b,– b

Which of the following can be used to navigate documents?
Options: frames B. hyperlinks C. web toolbar D. all of the above

Ans:– B ,

Which of the following is not one of the major components of decision-support system?
Options: language system,    knowledge system,    expert system,    problem-processing system

Ans:C ,C

Revenue of the state governments are raised from the following sources, except
Options: entertainment tax,    expenditure tax,    agricultural income tax,    land revenue


With which sport is the Jules Rimet trophy associated?
Options: Basketball,    Football,    Hockey,    Golf


Which of the following is not an isotope of hydrogen?
Options: Tritium,    Deuterium,    Protium,    Yttrium


A monitor's _____ is the distance between the holes in the mask behind the screen. This helps determine how sharp the dots appear.
Options: refresh rate,    dot pitch,    resolution,    color depth

Ans:B ,B

raibeej ya haidrophobiya
Options: NA

Ans: 818. dakshin bhaarat ka sarvochch parvat shikhar kaunasa hai?, 818. dakshin bhaarat ka sarvochch parvat shikhar kaunasa hai?

Which of the following is measured on the Richter scale?
Options: Density of liquids,    Intensity of earthquakes,    Velocity of tornadoes,    Height of mountains


1.The system failure due to power failure is considered under
Options: (A)Hardware reliability (B) Software reliability (C) Operation reliability (D) None of these 7

Ans:71. (A),71. (A)

where is state museum
Options: kangra, shimla, bilaspur, hamirpur, kullu


The dielectric constant of a material is a measure of:
Options: the amount of voltage it can withstand before breaking down,    how well the material concentrates electrostatic lines of force,    the amount of opposition to the current flow,    how well the material concentrates magnetic lines of force

Ans:B ,B

517. vijayastambh kahaan sthit hai?
Options: NA

Ans: chittodagadh mein, chittodagadh mein

63. hamaara raashtreey panchaang kaunasa hai ?
Options: NA

Ans: shak sanvat, shak sanvat

5.The data in a record is of the following types
Options: (A)four text fields and three numeric fields (B) two integer fields and five text fields (C) three text fields and four numeric fields (D) none of the above

Ans:5. (B),5. (B)

Which is not application software?
Options: a. Windows NT b. Page Maker c. WinWord XP d. Photoshop


. Which command is used to display the contents of the text file of DOS?
Options: a. Copy con b. Copy c. Type d. Dir

Ans: c, c

5.Security exploit is
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. 1

Ans:15. (A),15. (A)

. Which of the following is valid statement?
Options: A) Data in itself is useless unless it is processed B) The data that is processed is called a program C) The data which is not yet processed is information D) Information is processed by computer to generate data.


529. kisake janmadin ko shiksha divas ke roop mein manaate hain?
Options: NA

Ans: bhaarat ke pahale shiksha mantree maulaana abulakalaam aajaad ke janmadin ko, bhaarat ke pahale shiksha mantree maulaana abulakalaam aajaad ke janmadin ko

Batch files contain a group of MS-DOS commands that are run in successive order. What filename extension identifies batch files?
Options: COM,    BAT,    EXE,    SYS

Ans:B ,B

The tropical easterlies wind lie at
Options: 0-30? latitude,    30-60? latitude,    60-90? latitude,    10-40? latitude


Microsoft Office is an office suite, for the
Options: (A) Microsoft Windows operating systems (B) Mac OS X operating systems (C) Both A and B are true (D) None is true 3..

Ans:2. (C),2. (C)

6.In Excel you can print
Options: (A)A range of cells by range name (B) An entire worksheet (C) A single worksheet (D) All of the above 7

Ans:76. (D),76. (D)

The receiving data system involves which of the following files?
Options: vendor,    inventory,    purchasing,    All of the above

Ans:D ,D

185. raamakrshn mishan’ kee sthaapana kisane kee—
Options: NA

Ans:Swami Vivekananda,Swami Vivekananda

The analog computer measures dimensions and its circuits use the differential and integral equations of continuous variables. The digital computer counts units and its circuits use
Options: Logic gates,    Discrete switches,    Boolean algebra id) Bayes' theorem,    None of the above

Ans:C ,C

The famous player 'Pele' is associated with which games?
Options: Football,    Hockey,    volleyball,    Tennis


kadchham vangtu


Singalila National Park
Options: Karnataka,West Bengal,Tripura,MadhyaPradesh

Ans:West Bengal,

0.A specialist in charge of the database of an organization select the best fit for answer
Options: (A)Database management approach (B) DBMS uses (C) Database administrator (D) Query language 6

Ans:60. (B),60. (B)

. ENIAC uses
Options: A) Decimal Numbering System B) Octal Numbering System C) Binary Numbering System D) Hexadecial Numbering System


A file containing multiple indices to the data is called a/an
Options: indexed file,    sequential file,    indexed-sequential file,    inverted file

Ans:D ,D

What is the approximate area of Bihar?
Options: 94,163 sq. km,    1,35,100 sq. km,    3,702 sq. km,    1,96,024 sq. km


373. bharatanaatyam nrty shailee jo mukhy roop se raajy se sambandhit hai maana jaata hai?
Options: NA

Ans: tamilanaadu, tamilanaadu

. Which of the following command is an internal command?
Options: a. Del b. Scandisk c. CHKDSK d. Deltree

Ans:0 – a ,0 – a

Where have the program and data to be located before the ALU and control unit of a computer can operate on it?
Options: Internal memory,    Secondary memory,    Microprocessor,    Magnetic tapes

Ans:A ,A

1.The following is not true for client-server model
Options: (A)It contains the set of stand alone servers (B) A set of clients that can use services offered by servers (C) A network which allows the clients to access these services (D) An intersection between clients by passing the server 9

Ans:91. (D),91. (D)

4.Safety argument is
Options: (A)Associated with the role of people involved in software process and the activities for which they are responsible. (B) The most effective technique for demonstrating the safety of a system is proof by contradiction. (C) It is concerned with establishing a confidence level in the system that might vary from low to high (D) None of these 23

Ans:234. (B),234. (B)

To center worksheet titles across a range of cells, you must
Options: a. Select the cells containing the title text plus the range over which the title text is to be centered b. Widen the columns c. Select the cells containing the title text plus the range over which the title text is to be enfettered d. Format the cells with the comma style

Ans:#8211; a,#8211; a

How can you remove tab stop markers from ruler?
Options: a. Double click the tab marker and choose Clear All b. Drag the tab stop marker out of the ruler c. Right click the tab stop marker and choose remove d. All of above

Ans:– B,– B

Artificial intelligence operates on the principle of using a _____ base as opposed to a data base.
Options: Character,    Knowledge,    PROLOG,    LISP

Ans:B ,B

455. devis kap ka sambandh kis khel se hai?
Options: NA

Ans: tenis, tenis

  To insert new slide in the current Presentation, we can choose:
Options: Ctrl+M B. Ctrl+N C. Ctrl+O D. Ctrl+F

Ans:– A ,

When did the USSR formally disintegrates into 15 republics?
Options: 1991,    1992,    1993,    1994


4.In semaphore when the order of processes that are waiting to be removed from the queue is first in first out (FIFO) then it is called
Options: (A)Weak semaphore (B) Strong semaphore (C) Binary semaphore (D) None of these. 6

Ans:64. (B),64. (B)

If you want to insert some slides from other presentation into current one choose
Options: a. From Insert menu choose Slides from Files b. From Insert menu choose Slides from Presentation c. From Insert menu choose Slides d. None of above

Ans: – A , – A

1.In Windows operating system to minimize all of the windows
Options: (A)Windows Logo (B) Windows Logo + BREAK (C) Windows Logo + D (D) Windows Logo + M 1

Ans:11. (D),11. (D)