What is the smallest and largest font size available in Font Size tool on formatting toolbar?

Options:  A) 8 and 72, B) 8 and 64, C) 12 and 72, D) None of above,


More MS-Word Related questions:

.   The quickest way to create a PowerPoint presentation is to use the
Options: a. Word for windows templates b. Auto creation wizard c. Auto content wizard d. Presentation wizard

Ans:7 – C ,7 – C

. What do you mean by a Workspace?
Options: a. Group of Columns b. Group of Worksheets c. Group of Rows d. Group of Workbooks

Ans:– d,– d

Options: stands for Linux loader,    is the Linux boot loader,    is a tool used to boot the Kernel on x86 hardware,    All of the above

Ans:D ,D

. The __________ field is used to hold a yes or no answer.
Options: a. object b. number c. text d. logical

Ans:9 – d ,9 – d

 In PowerPoint, when the mouse pointer appears as this it indicates that the Draw Table feature is on
Options:  Solid plus sign B.  Solid arrow C.  I-beam D.  Pencil

Ans:– D ,

359. 1856 mein vidhava punarvivaah qaanoon kisake prayaason se banaaya gaya tha ?
Options: NA

Ans: eeshvarachandr vidyaasaagar ke prayaason se, eeshvarachandr vidyaasaagar ke prayaason se

When you link data maintained in an excel workbook to a word document
Options: a. The word document cannot be edit b. The word document contains a reference to the original source application c. The word document must contain a hyperlink d. The word document contains a copy of the actual data

Ans:#8211; b,#8211; b

. End Key
Options: a. Moves the cursor end of the line b. Moves the cursor end of the document c. Moves the cursor end of the paragraph d. Moves the cursor end of the screen

Ans:–  A,–  A

Which of the following is helpful in evaluating applications software what will best suit your needs?
Options: recommendations by other users,    computer magazines,    objective software reviews,    all of the above

Ans:D ,D

4.Spoofing attack is
Options: (A)an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (B) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (C) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (D) None of these 1

Ans:14. (C),14. (C)

Which of the following option is use to retrieval of data? a. Stack b. Data Structure c. Linked list d. Query
Options: Every primary-key value must match a primary-key value in an associated table B. Every primary-key value must match a foreign-key value in an associated table C. Every foreign-key value must match a primary-key value in an associated table D. Every foreign-key value must match a foreign-key value in an associated table

Ans:– d ,

What inspired reflecting road lights to be invented?
Options: Car door reflecting mirrors,    The light a cat's eyes gave off on a fence,    Sun light on steel posts on road sides,    The sun light on the windshield


7.In Excel worksheet range is a
Options: (A)A command used for data modeling (B) A range of values such as from 23 to 234 (C) A group of cells (D) A group of worksheets 5

Ans:57. (C),57. (C)

778. shoje-vatan’ pustak kisane likhee?
Options: NA

Ans: munshee premachand, munshee premachand

6.In Microsoft PowerPoint to edit the text within the boxes of an organization chart, you
Options: (A)Select the box and text, then make changes (B) Select the box, then make the dchanges (C) Highlight the text, them make the changes (D) (A)and (B) both 1

Ans:16. (A),16. (A)

Paleontology is a branch of science that deals with the
Options: behavior of animals,    origin and growth of plants,    the forms of life as revealed by fossils of animals or plants,    formation of new stars


If you want to have a blank line after the title in a worksheet, what is the best thing for you to do?
Options: Re-format the spreadsheet B. Insert a row C. Increase the column width D. Use the spacebar

Ans:– B ,

The XV Asian Games are scheduled to be held at
Options: Qatar,    Hiroshima,    Beijing,    Jakarta


The computers that we use are digital whereas we live in an analog world which means that we have to translate analog data into digital data. What is the name of the circuit which helps us in this conversion?
Options: D/A converter,    A/D converter,    Voice recognition,    Adapter

Ans:B ,B

Options: NA

Ans: 771. sundaralaal bahuguna ka sambandh kis aandolan se hai?, 771. sundaralaal bahuguna ka sambandh kis aandolan se hai?

largest airport in HP
Options: gaggal, kullu, naggar, dadlaghat


. Which is built directly on the hardware?
Options: a. Computer Environment b. Application Software c. Operating System d. Database System

Ans:0 – c ,0 – c

. Primary key is
Options: a. Uniquely identifies each record b. Cannot be repeated c. AutoNumber is example of Primary key d. All of the above

Ans:– d,– d

. If we use the command prompt $P$L which of the following prompt may be set?
Options: a. C :> b. C: c. C: d. C :<

Ans:1 – d ,1 – d

What will be the output of the program (sample.c) given below if it is executed from the command line? cmd> sample friday tuesday sunday /* sample.c */ #include<stdio.h> int main(int argc, char *argv[]) { printf("%c", **++argv); return 0; }
Options: s,    f,    sample,    friday

Ans:B ,B

What is the maximum data rate for the 802.11g standard?
Options: 6Mbps,    11Mbps,    22Mbps,    54Mbps

Ans:D ,D

A software that allows a personal computer to pretend it as a terminal is
Options: auto-dialing,    bulletin board,    modem,    terminal emulation

Ans:A ,A

King Hammurabi raised the first army of the world in
Options: 2000 BC,    1500 BC,    1480 BC,    1027 BC


Who was the first Indian Chief of Army Staff of the Indian Army ?
Options: Gen. K.M. Cariappa,    Vice-Admiral R.D. Katari,    Gen. Maharaja Rajendra Singhji,    None of the above


5.Attribute-based identification is
Options: (A)Here each component has a unique name and an associated set of attribute, which differs for each version of component (B) Extent to which a software system records information concerning transactions performed against the system. (C) Extent to which a system or component is operational and accessible when required for use (D) They are used to describe the over all behavior of the system. 12

Ans:125. (A),125. (A)

Suppose the peak value of a sinusoidal voltage is 50 V. What is the rms value?
Options: 37.4 V,    35.4 V,    38.74 V,    30.4 V

Ans:B ,B

8.In Excel LEN function does what?
Options: (A)Compares the content in two cells (B) Counts the numbers of characters in a cell (C) Deletes extra space in text (D) All of above 16

Ans:168. (A),168. (A)

You wished to justify text over the height of paper, which option will you choose
Options:  A) Page Setup from File menu, B) Paragraph from Format menu, C) From formatting toolbar, D) Font from Format menu, 


Each data item in a record may be a group item composed of sub-items; those items which are indecomposable are called
Options: a. elementary items b. atoms c. scalars d. all of above

Ans: d, d

While working with MS-DOS, which command is used to sort the file in ascending order?
Options: SORT filename,    SORT < filename,    SORT > filename,    SORT | filename

Ans:B ,B

3.Background knowledge referred to
Options: (A)Additional acquaintance used by a learning algorithm to facilitate the learning process (B) A neural network that makes use of a hidden layer. (C) It is a form of automatic learning. (D) None of these

Ans:3. (A),3. (A)

. Floppy disks typically in diameter
Options: A) 3 B) 5.25 C) 8 D) All of above


Sanyukt raashtr sangh suraksha parishad ke asthaayee sadasy kitane varsh ke liye
Options: NA

Ans:2 years,

Who invented fuel cells in 1839?
Options: Buckminster Fuller,    Sir William Grove,    Sylvester Graham,    Joyce Hall


The major crude oil markets are the
Options: Middle East regions,    far east regions,    both (a) and (b),    None of the above


What will be the output of the program ? #include<stdio.h> int main() { void fun(int, int[]); int arr[] = {1, 2, 3, 4}; int i; fun(4, arr); for(i=0; i<4; i++) printf("%d,", arr[i]); return 0; } void fun(int n, int arr[]) { int *p=0; int i=0; while(i++ < n) p = &arr[i]; *p=0; }
Options: 2, 3, 4, 5,    1, 2, 3, 4,    0, 1, 2, 3,    3, 2, 1 0

Ans:B ,B

You can group noncontiguous worksheets with
Options: The alt+enter key B. The ctrl key and mouse C. The shift key and the mouse D. The group button on the standard toolbar

Ans: – B ,

In 1901, Nobel Prize was not given for
Options: Chemistry,    Physics,    Economics,    Peace


Large collections of files are called
Options: fields,    records,    databases,    file system

Ans:C ,C

. How to insert Section Break in Microsoft Word 2010?
Options: Insert ribbon – Pages group – Page Break button B. View ribbon – Document Views group – Breaks button C. References ribbon – Index group – Insert Index button D. Print Layout ribbon – Page Setup group – Breaks button

Ans:– D ,

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?
Options: STP,    VTP,    DHCP,    ISL

Ans:B ,B

9.Digital Computer is a computer
Options: (A)that works with discrete quantities (B) that works with analog quantities (C) Both A & B (D) None of these 4

Ans:39. (A),39. (A)

Point out the error in the program? #include<stdio.h> int main() { struct bits { float f:2; }bit; printf("%d\n", sizeof(bit)); return 0; }
Options: 4,    2,    Error: cannot set bit field for float,    Error: Invalid member access in structure

Ans:C ,C

Which of the following is an unsupervised data mining technique?
Options: Cluster analysis only,    Regression Analysis only,    RFM Analysis only,    Both Regression Analysis and RFM Analysis

Ans:A ,A

'Vijay Stambha' is situated in
Options: Jaipur,    Agra,    Delhi,    Chittor