Which key do you press to check spelling?

Options: F3 B. F5    C. F7 D. F9

Ans:– C ,

More MS-Powerpoint Related questions:

144. kisane sarvapratham ashok ke abhilekhon ko padha ?
Options: NA

Ans: jems prinsep, jems prinsep

How long is an IPv6 address?
Options: 32 bits,    128 bytes,    64 bits,    128 bits

Ans:D ,D

When were blue jeans invented?
Options: 1900s,    1860s,    1870s,    1850s


What command is used with vi editor to delete three words?
Options: 3$d,    3 dw,    3 x,    3 dd

Ans:B ,B

Options: NA

Ans: 897. gaimibat’ shabd kis khel se juda hai?, 897. gaimibat’ shabd kis khel se juda hai?

The UNO was founded at
Options: Moscow,    London,    Paris,    San Francisco


298. baal pen kis siddhaant par kaam karata hai?
Options: NA

Ans: prshtheey tanaav, prshtheey tanaav

472. mahaatma gaandhee dvaara saabaramatee aashram kahaan sthaapit kiya gaya?
Options: NA

Ans: ahamadaabaad, ahamadaabaad

719. ek rupe ke not par kisake hastaakshar hote hain?
Options: NA

Ans: sachiv, vitt mantraalay, sachiv, vitt mantraalay

What command do you use to create Linux file systems?
Options: fdisk,    mkfs,    fsck,    mount

Ans:B ,B

Resistance is measured in ?
Options: Volts,    Amps,    Watts,    Ohms

Ans:D ,D

. How are data organized in a spreadsheet?
Options: a. Lines and spaces b. Layers and planes c. Rows and columns d. Height and width

Ans:– c,– c

76. How do you close a word document without closing Word window?
Options: a. Click on the Close button on the title bar b. Click on Xminimize button on the title bar c. Click on the Close command on Office menu d. Click Exit on the File menu

Ans:– C ,– C

A computer vision technique that relies on image templates is:
Options: edge detection,    binocular vision,    model-based vision,    robot vision

Ans:C ,C

What is not true of a Java bean?
Options: There are no public instance variables.,    All persistent values are accessed using getxxx and setxxx methods.,    It may have many constructors as necessary.,    All of the above are true of a Java bean.

Ans:C ,C

. How to specify cell range from A9 to A99 in Excel?
Options: a. (A9, A99) b. (A9 to A99) c. (A9 : A99) d. (A9 – A99)

Ans:– c,– c

672. bhaarat mein metro-purush’ kaun kahalaate hain?
Options: NA

Ans: shreedharan, shreedharan

. How do you rearrange the data in ascending or descending order?
Options: Data, Sort B. Data, Form C. Data, Table D. Data Subtotals

Ans: – A ,

0. Data access time is depends on
Options: Seek time B. Rotational delay C. Operating frequency D. All of the above

Ans: – D ,

Who is the highest wicket taker in Test cricket?
Options: Shane Warne,    Brian Lara,    Courtney Walsh,    Muttiah Muralitharan


. Which is not an option for Filter on a text field?
Options: a. Begins With b. Between c. Contains d. End With

Ans:5 – b ,5 – b

The term "remote job entry" relates to
Options: batch processing,    realtime processing,    transaction processing,    distributed processing

Ans:A ,A

Getting data from a cell located in a different sheet is called …
Options: a. Accessing b. Referencing c. Updating d. Functioning

Ans:#8211; b,#8211; b

A key verifier machine is used In controlling
Options: transaction entry,    data communication,    computer processing,    transaction origination

Ans:A ,A

The number of records contained within a block of data on magnetic tape is defined by the
Options: block definition,    record contain clause,    blocking factor,    record per block factor

Ans:C ,C

A microprocessor has memory locations from 0000 to 3FFF. Each memory location stores 1 byte. How bytes can the memory store? Express this in kilobytes?
Options: 4,095, 4K,    16,384, 16K,    32,740, 32K,    46,040, 46K

Ans:B ,B

3.It is a prepared application that takes advantage of a known weakness.
Options: (A)security exploit (B) vulnerability scanner (C) packet sniffer (D) rootkit 2

Ans:23. (A),23. (A)

. A utility that can be used to minimize the number of fragmented files and enhance the speed
Options: a. Disk space b. Defrag c. Scandisk d. Double space

Ans:4 – b ,4 – b

. What is the use of Cascade Delete Option in MS Access?
Options: a. It makes sure that all the records from the parent table and child table is deleted from selected database b. It makes sure that all the related records will be deleted automatically from child table when the records from parent table is deleted c. It makes sure that all the related records will be deleted automatically from Parent table when the records from child table is deleted d. None of above

Ans:– b,– b

The smallest country of the world is
Options: Russia,    Vatican city,    Brazil,    Canada


. You have a Command button in the Form Footer, you click the Tabular Control Layout; an attached label will be added in what section?
Options: a. Detail b. Form Footer c. Form Header d. Page Header

Ans:4 – c ,4 – c

What service is not monitored by inetd ?
Options: SSH,    time,    ntalk,    finger

Ans:A ,A

The number of water molecules present in a drop of water (volume 0.0018 ml) at room temperature is
Options: 1.568 x 103,    6.023 x 1019,    4.84 x 1017,    6.023 x 1023


In analyzing the compilation of PL/I program, the description "creation of more optimal matrix" is associated with
Options: Assembly and output,    Code generation,    Syntax analysis,    Machine independent optimization

Ans:D ,D

Which of the following commands can be used to get information about yourself?
Options: who am i,    i /4,    pwd,    which

Ans:A ,A

9.In Excel Tab scrolling button
Options: (A)Allow you to view a different worksheet (B) Allow you to view additional worksheet rows down (C) Allow you to view additional worksheet columns to the right (D) Allow you to view additional sheets tabs 6

Ans:59. (D),59. (D)

Which type of pc card (PCMCIA) slot will allow the insertion of a hard drive?
Options: type I,    type II,    type III,    type IV

Ans:C ,C

Process of cell division can take place by
Options: heterosis,    fusion,    mitosis,    None of these


The linking of PCs with a communi¬cations system is referred to as:
Options: workstations,    streaming,    turnkey systems,    networking

Ans:D ,D

Software that's loaded into a computer primary storage area is known as
Options: Memory-resident package,    File management system,    Electronic spread sheet program,    Utilities

Ans:A ,A

What is the main purpose of the secondary storage device?
Options: To increase the speed of Computer B. To Install Operating System C. To Networking D. To Store Data

Ans:– D ,

The decimal equivalent of the binary number 11100001111 is
Options: 1806,    1807,    2806,    All of the above

Ans:B ,B

Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
Options: 4,    8,    15,    16

Ans:C ,C

Information is produced by processing data from which of the following sources?
Options: data provided by higher levels of management,    data provided by lower levels of management,    internally generated data,    externally generated data

Ans:E ,E

The size of a field with Number data type can not be
Options: a. 2 b. 4 c. 8 d. 16

Ans:ndash; d,ndash; d

A Compiler is ____
Options:  a combination of computer hardware B.  a program which translates from one high-level language to another C.  a program which translates from one high-level to a machine level language D.  None of these

Ans:– C ,

The command that can be used to restrict incoming messages to a user is
Options: mesg,    grep,    halt,    sleep

Ans:A ,A

The DROP TABLE statement:
Options: deletes the table structure only.,    deletes the table structure along with the table data.,    works whether or not referential integrity constraints would be violated.,    is not an SQL statement.

Ans:B ,B

804. 12 maarch 1940 ko jaliyaanvaala baag hatyaakaand karaane vaale maikal o daayar
Options: NA

Ans: kee kisane landan mein hatya kee thee?, kee kisane landan mein hatya kee thee?

When there is a decrease in the concentration of oxygen in the blood, the breathing rate
Options: increases,    decreases,    first increases and then decreases,    is not affected