Computer Grade 8 Solved 100 MCQs For Preparation of Competitive Exam

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

OXFORD ACADEMY OF SCIENCE, COMMERCE & ARTS

Defence Road Hotel Javson Street Sialkot


Tel: 0345-6757872

Computer Grade 8 MCQs

Subject Name: Eight/Computer 8

I) Tick the Correct Option: (All questions / options - 100 / 0 ) 0 Marks

1. McAfee is the name of:

a) An antivirus b) A computer c) A computer d) A game


program program hardware

Correct Answer
An antivirus program

2. The value which is given at the timing of creating a program called as:

a) Expression b) Constant c) Equation d) None of these

Correct Answer
Expression

3. comparison operators are also known as :

a) Relational b) Assignment c) Arithmetic d) None of these

Correct Answer
Arithmetic

4. To share a peripheral device we attach to it.

a) A computer b) A telephone c) A computer d) A monitor


network

Correct Answer
A computer network

5. Nortan Antivirus software developed by:

a) McAfee b) Symantec c) AVG d) NORTAN

Correct Answer
NORTAN

6. Companies that are writing antivirus software:

a) McAfee b) Symantec c) AVG d) All of them

Correct Answer
All of them

7. Which of the following tasks are performed by most of the algorithms:

a) Input b) Output c) Processing d) All of the above

Correct Answer
All of the above

2017/11/23 08:55
8. The uppermost bar in spreadsheet is:

a) Tool bat b) Menu Bar c) Title barNo

Correct Answer
Tool bat

9. A program or a set of programs that causes extensive damage to your computer called:

a) Extensive b) Bacteria c) Virus d) All of these


Program

Correct Answer
Virus

10. The computer virus spread from:

a) a sick person b) a person who is c) someone who is d) One computer to another


suffering from suffering from computer by copying itself
maleria common cold

Correct Answer
One computer to another computer by copying itself

11. A string constant is a sequence of

a) Numeric b) Alphanumeric c) Alphabetic d) None of the above


characters Characters characters

Correct Answer
Alphanumeric Characters

12. The oldest services for sending data over a cellular communication network is know as.

a) Cellular b) Satellite c) Cellular digital d) A geostationary satellie


telephone sets stelephon packet data

Correct Answer
Cellular digital packet data

13. The computer used a a server, controls access to the.

a) New computer b) Internet and c) Hardware d) Modern and old modals


networks telephone software and other
devices on the
network

Correct Answer
Hardware software and other devices on the network

14. The character used for integer variable is:

a) % b) ! c) & d) None of the above

Correct Answer
%

15. Different types of viruses found in:

a) Unknown b) New Websites c) Insecure d) CMS Websites

2017/11/23 08:55
websites websites

Correct Answer
Unknown websites

16. A cell address is the basic unit for data:

a) Storing b) Deleting c) Inserting d) None of these

Correct Answer
Storing

17. For editing the data in active cell we press:

a) F2 b) F4 c) F9 d) F1

Correct Answer
F2

18. In GW-BASIC every program ends with:

a) String b) Variable c) Constant d) None of the above

Correct Answer
String

19. The intersection of column C and Row 5 has the address:

a) 5C b) C5 c) C1-5 d) C5-1

Correct Answer
C5

20. Basic was developed by:

a) John smith b) Pascal c) John Kemeny d) None of the above


and Thomas Kurtz

Correct Answer
John Kemeny and Thomas Kurtz

21. Any electronic device that is used to receive data called as.

a) Monitor b) Input device c) Telephone d) Receiving device

Correct Answer
Receiving device

22. What is the cell address and cell range?

23. The total number of basic relational operators are:

a) four b) six c) eight d) ten

Correct Answer
six

24. The servers on a network that performs only one specific task called.

a) Special servers b) Client c) Dedicated d) Internet computer


servers

Correct Answer
2017/11/23 08:55
Dedicated servers

25. The symbol for relational operators for equal to is:

a) b) > c) = d) < =

Correct Answer
=

26. In flow chart all necessary reqirements should be listed in:

a) a logical order b) a alphabetical c) a problem d) strange form


order

Correct Answer
a logical order

27. In cellular communication the bands of radio spectrum used are.

a) 324 to 349 MHz b) 424 to 449 MHz c) 524 to 549 MHz d) 824 to 849 MHz and 869 to
and 269 to 294 and 469 to 894 and 569 to 594 894 MHz
MHz MHz MHz

Correct Answer
824 to 849 MHz and 869 to 894 MHz

28. A constant can be:

a) Long or Short b) New or old c) Numeric or d) None of the above


string

Correct Answer
Long or Short

29. The relational operator for greater than and equal to is:

a) b) > = c) > d) None of the above

Correct Answer
>=

30. The simplest form of algorithm is:

a) complete form b) step form c) particular form d) None


algorithm algorithm algorithm

Correct Answer
step form algorithm

31. The symbol represents:

a) Start b) End c) Input d) None

Correct Answer
Start

32. When we press the enter key after completion of data entry the cursor:

a) Stops b) vanishes c) vibrates d) automatically moves to next


cell

2017/11/23 08:55
Correct Answer
automatically moves to next cell

33. The diamond symbol represents the:

a) Decision b) Input c) Output d) Processing


making

Correct Answer
Decision making

34. The Global positioning system is a.

a) Central b) Radio c) Cellular d) Central position station


switching station navigation sytem communication

Correct Answer
Radio navigation sytem

35. Total types of modem are.

a) 2 b) 3 c) 4 d) 5

Correct Answer
3

36. MS excel is a:

a) Spreadsheet b) Database c) Application d) System Software


software software software

Correct Answer
Spreadsheet software

37. The worms does not spread from file to file but from:

a) Internet to b) file to computer c) virus to virus d) computer to computer


computer

Correct Answer
computer to computer

38. Spreadsheet in office is used for:

a) Arranging data b) Gathering data c) Gathering data d) None of these


and storing and printing and saving
information

Correct Answer
Arranging data and storing information

39. GPS stand for.

a) Global b) Grand c) Great position d) Globalization positioning


positioning system positioning system system system

Correct Answer
Global positioning system

40. In GW -BASIC variables can be used without:

2017/11/23 08:55
a) line number b) number c) declaration d) strings

Correct Answer
declaration

41. In GW-BASIC the command LOAD is used :

a) Load a program b) Clear screen c) Save the d) none of these


file from disk to program to disk
main memory

Correct Answer
Load a program file from disk to main memory

42. The satellite that remain stationary approximately 23300 miles above the earth called as.

a) Communication b) Television c) Geostationary d) Nuclear stations


satellite satellite satellite

Correct Answer
Geostationary satellite

43. The operator that is used to compare two values is called:

a) Assignment b) Relational c) Equal operator d) None of the above


operator operator

Correct Answer
Relational operator

44. In cellular communication a geographical area in divided.

a) In wide area b) into a LAN c) Wifi networks d) Into a grid


network

Correct Answer
Into a grid

45. The formula for multiplication in excel is:

a) A1 * A2 b) =A1 * A2 c) MUL(A1 : A2) d) None of these

Correct Answer
=A1 * A2

46. A computer virus written in a:

a) Computer b) Human c) Binary language d) English language


language language

Correct Answer
Computer language

47. In a computer the most valuable thing is its:

a) processor b) hard disk c) ram d) data

Correct Answer
data

48. For start in a flow chart we use the symbol:


2017/11/23 08:55
a) b) c) d) None of the above

Correct Answer

49. Symantec is the registered name of:

a) A hacker b) a virus c) An antivirus d) None of these

Correct Answer
An antivirus

50. In a computer the thing that damages tehe data most is:

a) a virus b) to shut down c) not save data d) not to let computer takes rest
computer without every two seconds after every 10 minutes
saving

Correct Answer
a virus

51. In GW- BASIC every program must begin with :

a) String b) Variable c) Line number d) END statement

Correct Answer
String

52. Programming languages are:

a) Binary b) Computer c) Low level d) None of the above


Language language language

Correct Answer
Computer language

53. We can open MS Excel from:

a) My computer b) Recycle bin c) Start menu d) Documents

Correct Answer
Start menu

54. The shortcut key for paste the data is:

a) Ctrl + v b) Alt + V c) Ctrl + y d) None of these

Correct Answer
Ctrl + v

55. The operator that is used to assign a value to a variable:

a) + operator b) - operator c) = operator d) No

Correct Answer
= operator

56. Most common devices used to transfer data between computers known as:

a) A floppy disk b) USB Flash drive c) Hard disk d) CDs

Correct Answer

2017/11/23 08:55
USB Flash drive

57. The types of computer architecture or network model are.

a) 1 b) 2 c) 3 d) 4

Correct Answer
2

58. A command which is used to exit from GW-BASIC and return to operate system environment:

a) SYSTEM b) SAVE c) LIST d) None of the above

Correct Answer
SYSTEM

59. An error caused by wrong syntax written in program is called:

a) Logical error b) Syntax error c) Runtime error d) Data error

Correct Answer
Syntax error

60. A signal that has finite number of values between its minimum and maximum possible value
called as.

a) Digital signal b) Analog signal c) Simple signal d) Short signal

Correct Answer
Digital signal

61. The geostationary satellite are used as.

a) Computer b) Television c) Relay stations d) Radio station


network network

Correct Answer
Relay stations

62. A flow chart is the pictorial representation of:

a) a flow chart b) a computer c) an algorithm d) None


program

Correct Answer
an algorithm

63. In Microsoft excel we can fill data automatically din different cell with:

a) Formula b) Function c) Equal Sign d) Fill Handle

Correct Answer
Fill Handle

64. The * operator is used for:

a) Multiplication b) Addition c) Subtraction d) Division

Correct Answer
Multiplication

65. Example of communication devices are.


2017/11/23 08:55
a) Modem, NIC, b) NIC, switch, c) Network card, d) Modem, Bluetooth, bouter
router printer scanner, router

Correct Answer
Modem, NIC, router

66. Status bar shows the:

a) figures of rows b) figures of c) Alphabet rows d) Basic information about the


columns status of the spreadsheet

Correct Answer
Basic information about the status of the spreadsheet

67. The satellite remains in the space almost.

a) 23300 miles b) 2300 miles c) 2000 miles d) 200 miles above the earth
above the earth above the earth above the earth

Correct Answer
23300 miles above the earth

68. A compiler converts all the source code into machine code creating an:

a) source code b) executable file c) inside copy d) None of the above

Correct Answer
executable file

69. Modem is an abbreviation of.

a) Module/Demod b) Modulator/Dem c) Mode/Demode d) Modulation/Demodulation


ule odulator

Correct Answer
Modulator/Demodulator

70. After writing a program in source code the programmer convert it into:

a) Program file b) Save file c) Machine code d) None of the above

Correct Answer
Machine code

71. The clients on a network send requests to a.

a) Modem b) Server c) Router d) Switch

Correct Answer
Server

72. A statement which is used to get data from the user during the execution of program is:

a) INPUT b) PRINT c) LIST d) LOAD

Correct Answer
INPUT

73. The effective range of Bluetooth device is.

a) 10 feet b) 32 feet c) 10 miles d) 32 meters

2017/11/23 08:55
Correct Answer
32 feet

74. The maximum length of string constant is:

a) 55 Characters b) 155 characters c) 255 characters d) None of the above

Correct Answer
255 characters

75. A formula is a:

a) Mathematical b) Mathematical c) Mathematical d) None of these


Expression data information

Correct Answer
Mathematical Expression

76. After designing our algorithm we verify it through:

a) Flow chart b) Comparison c) Processing d) Desk Checking

Correct Answer
Desk Checking

77. A constant is a quality whose value cannot be:

a) Read b) Printed c) Changed d) memorized

Correct Answer
Changed

78. 1 s and 0 s called:

a) Numbers b) Arithmetic c) Binary Number d) none of these


system

Correct Answer
Binary Number system

79. 1,2,3 shows the name of:

a) Rows b) Columns c) Cells d) None of these

Correct Answer
Rows

80. Which of the following operators processed first:

a) ^ (Exponent) b) Multiplication or c) MOD (Modulus) d) None of the above


Division

Correct Answer
^ (Exponent)

81. The satellite communication consists of

a) Several b) Several radio c) Earth stations d) Many users of televisions


microwave wave and a satellite
mediums communication

2017/11/23 08:55
Correct Answer
Earth stations and a satellite

82. Mr. Arthur C. Clark gave the idea of.

a) GPS technology b) Satellite c) Cellular d) Bluetooth technology


technology technology

Correct Answer
Satellite technology

83. In cellular communication each section of this grid is a king of.

a) Network b) Area c) Cell d) Telephone

Correct Answer
Cell

84. In GW-BASIC the command RUN is used to:

a) Compile a b) Execute the c) Save the d) None of the above


program program program on disk

Correct Answer
Execute the program

85. Coaxial cable used in.

a) WLAN b) LAN c) WAN d) PAN

Correct Answer
LAN

86. Antivirus can protect computer by:

a) Updating and b) installing and c) Shutdown and d) Installing and shutdown


Scnning scanning net browsing

Correct Answer
Updating and Scnning

87. At the right hand of the worksheet on vertical side is the:

a) Vertical scroll b) Cell address c) Tool bar d) Formula bar

Correct Answer
Vertical scroll

88. For End in a flow chart we use the symbol:

a) b) c) d)

Correct Answer

89. Each MS-Excel file carries extension:

a) Excel b) .xcl c) .xlsx d) .xdl

Correct Answer
.xlsx

2017/11/23 08:55
90. A group of adjacent cells in a worksheet is called:

a) Ranfge b) values c) Label d) Data

Correct Answer
values

91. The virus like malicious programs that read e-mail addresses and automatically send email to
all addresses is called:

a) Tragon horse b) macro virus c) worms d) adware

Correct Answer
worms

92. Spreadsheet use -------------- to express relationship of two or more cells:

a) Formulas b) Symbols c) Commands d) Sheets

Correct Answer
Formulas

93. A maximum numbers of characters can be used for naming a cell or a range:

a) 255 b) 259 c) 260 d) 275

Correct Answer
255

94. How many steps are involving to solve a problem:

a) Three b) Five c) Four d) Six

Correct Answer
Five

95. The symbol used for relational operator in computer in computer programming:

a) / b) = c) < > d) *

Correct Answer
<>

96. SQL slammer is an example of:

a) Antivirus b) Worms c) Adware d) virus

Correct Answer
Worms

97. The receiving process of a modem called.

a) Receiver b) Sender c) Demodulation d) Modulation

Correct Answer
Demodulation

98. An expression that represents a numeric value is called:

a) Logical b) Arithmetic c) Common d) None of the above


expression expression expression

2017/11/23 08:55
Correct Answer
Arithmetic expression

99. a keyboard key combination which is used to cut the data in spreadsheet with:

a) Ctrl + x b) Alt + x c) Ctrl + z d) None of these

Correct Answer
Ctrl + x

100. In which stage the problem is observing carefully:

a) Coding b) Designing c) Testing d) None of the above

Correct Answer
Coding
OXFORD ACADEMY OF SCIENCE, COMMERCE & ARTS
Defence Road Hotel Javson Street Sialkot
Tel: 0345-6757872

Computer Grade 8 MCQs

Student Name:____________________Roll No.___________Marks Obtained/Total Marks:________/ 0


Class: Eight Subject Name: Computer 8 Date:________

I) Tick the Correct Option: (All questions / options - 100 / 0 ) 0 Marks

1. McAfee is the name of:

a) An antivirus b) A computer c) A computer d) A game


program program hardware

2. The value which is given at the timing of creating a program called as:

a) Expression b) Constant c) Equation d) None of these

3. comparison operators are also known as :

a) Relational b) Assignment c) Arithmetic d) None of these

4. To share a peripheral device we attach to it.

a) A computer b) A telephone c) A computer d) A monitor


network

5. Nortan Antivirus software developed by:

a) McAfee b) Symantec c) AVG d) NORTAN

6. Companies that are writing antivirus software:

a) McAfee b) Symantec c) AVG d) All of them

7. Which of the following tasks are performed by most of the algorithms:

a) Input b) Output c) Processing d) All of the above

8. The uppermost bar in spreadsheet is:

a) Tool bat b) Menu Bar c) Title barNo

9. A program or a set of programs that causes extensive damage to your computer called:

a) Extensive Program b) Bacteria c) Virus d) All of these

10. The computer virus spread from:

a) a sick person b) a person who is c) someone who is d) One computer to


suffering from maleria suffering from another computer by
common cold copying itself

11. A string constant is a sequence of

a) Numeric b) Alphanumeric c) Alphabetic d) None of the above


characters Characters characters

12. The oldest services for sending data over a cellular communication network is know as.

a) Cellular telephone b) Satellite stelephon c) Cellular digital d) A geostationary

2017/11/23 08:55
sets packet data satellie

13. The computer used a a server, controls access to the.

a) New computer b) Internet and c) Hardware software d) Modern and old


networks telephone and other devices on modals
the network

14. The character used for integer variable is:

a) % b) ! c) & d) None of the above

15. Different types of viruses found in:

a) Unknown websites b) New Websites c) Insecure websites d) CMS Websites

16. A cell address is the basic unit for data:

a) Storing b) Deleting c) Inserting d) None of these

17. For editing the data in active cell we press:

a) F2 b) F4 c) F9 d) F1

18. In GW-BASIC every program ends with:

a) String b) Variable c) Constant d) None of the above

19. The intersection of column C and Row 5 has the address:

a) 5C b) C5 c) C1-5 d) C5-1

20. Basic was developed by:

a) John smith b) Pascal c) John Kemeny and d) None of the above


Thomas Kurtz

21. Any electronic device that is used to receive data called as.

a) Monitor b) Input device c) Telephone d) Receiving device

22. What is the cell address and cell range?


23. The total number of basic relational operators are:

a) four b) six c) eight d) ten

24. The servers on a network that performs only one specific task called.

a) Special servers b) Client c) Dedicated servers d) Internet computer

25. The symbol for relational operators for equal to is:

a) < b) > c) = d) < =

26. In flow chart all necessary reqirements should be listed in:

a) a logical order b) a alphabetical c) a problem d) strange form


order

27. In cellular communication the bands of radio spectrum used are.

a) 324 to 349 MHz b) 424 to 449 MHz c) 524 to 549 MHz d) 824 to 849 MHz and
and 269 to 294 MHz and 469 to 894 MHz and 569 to 594 MHz 869 to 894 MHz

28. A constant can be:

2017/11/23 08:55
a) Long or Short b) New or old c) Numeric or string d) None of the above

29. The relational operator for greater than and equal to is:

a) < b) > = c) > d) None of the above

30. The simplest form of algorithm is:

a) complete form b) step form c) particular form d) None


algorithm algorithm algorithm

31. The symbol represents:

a) Start b) End c) Input d) None

32. When we press the enter key after completion of data entry the cursor:

a) Stops b) vanishes c) vibrates d) automatically moves


to next cell

33. The diamond symbol represents the:

a) Decision making b) Input c) Output d) Processing

34. The Global positioning system is a.

a) Central switching b) Radio navigation c) Cellular d) Central position


station sytem communication station

35. Total types of modem are.

a) 2 b) 3 c) 4 d) 5

36. MS excel is a:

a) Spreadsheet b) Database software c) Application d) System Software


software software

37. The worms does not spread from file to file but from:

a) Internet to b) file to computer c) virus to virus d) computer to


computer computer

38. Spreadsheet in office is used for:

a) Arranging data and b) Gathering data and c) Gathering data and d) None of these
storing information printing saving

39. GPS stand for.

a) Global positioning b) Grand positioning c) Great position d) Globalization


system system system positioning system

40. In GW -BASIC variables can be used without:

a) line number b) number c) declaration d) strings

41. In GW-BASIC the command LOAD is used :

a) Load a program file b) Clear screen c) Save the program d) none of these
from disk to main to disk
memory

42. The satellite that remain stationary approximately 23300 miles above the earth called as.

a) Communication c) Geostationary
2017/11/23 08:55
satellite b) Television satellite satellite d) Nuclear stations

43. The operator that is used to compare two values is called:

a) Assignment b) Relational operator c) Equal operator d) None of the above


operator

44. In cellular communication a geographical area in divided.

a) In wide area b) into a LAN c) Wifi networks d) Into a grid


network

45. The formula for multiplication in excel is:

a) A1 * A2 b) =A1 * A2 c) MUL(A1 : A2) d) None of these

46. A computer virus written in a:

a) Computer b) Human language c) Binary language d) English language


language

47. In a computer the most valuable thing is its:

a) processor b) hard disk c) ram d) data

48. For start in a flow chart we use the symbol:

a) b) c) d) None of the above

49. Symantec is the registered name of:

a) A hacker b) a virus c) An antivirus d) None of these

50. In a computer the thing that damages tehe data most is:

a) a virus b) to shut down c) not save data d) not to let computer


computer without every two seconds takes rest after every 10
saving minutes

51. In GW- BASIC every program must begin with :

a) String b) Variable c) Line number d) END statement

52. Programming languages are:

a) Binary Language b) Computer c) Low level language d) None of the above


language

53. We can open MS Excel from:

a) My computer b) Recycle bin c) Start menu d) Documents

54. The shortcut key for paste the data is:

a) Ctrl + v b) Alt + V c) Ctrl + y d) None of these

55. The operator that is used to assign a value to a variable:

a) + operator b) - operator c) = operator d) No

56. Most common devices used to transfer data between computers known as:

a) A floppy disk b) USB Flash drive c) Hard disk d) CDs

57. The types of computer architecture or network model are.

a) 1 b) 2 c) 3 d) 4
2017/11/23 08:55
58. A command which is used to exit from GW-BASIC and return to operate system environment:

a) SYSTEM b) SAVE c) LIST d) None of the above

59. An error caused by wrong syntax written in program is called:

a) Logical error b) Syntax error c) Runtime error d) Data error

60. A signal that has finite number of values between its minimum and maximum possible value
called as.

a) Digital signal b) Analog signal c) Simple signal d) Short signal

61. The geostationary satellite are used as.

a) Computer network b) Television network c) Relay stations d) Radio station

62. A flow chart is the pictorial representation of:

a) a flow chart b) a computer c) an algorithm d) None


program

63. In Microsoft excel we can fill data automatically din different cell with:

a) Formula b) Function c) Equal Sign d) Fill Handle

64. The * operator is used for:

a) Multiplication b) Addition c) Subtraction d) Division

65. Example of communication devices are.

a) Modem, NIC, b) NIC, switch, printer c) Network card, d) Modem, Bluetooth,


router scanner, router bouter

66. Status bar shows the:

a) figures of rows b) figures of columns c) Alphabet rows d) Basic information


about the status of the
spreadsheet

67. The satellite remains in the space almost.

a) 23300 miles above b) 2300 miles above c) 2000 miles above d) 200 miles above the
the earth the earth the earth earth

68. A compiler converts all the source code into machine code creating an:

a) source code b) executable file c) inside copy d) None of the above

69. Modem is an abbreviation of.

a) Module/Demodule b) Modulator/Demodu c) Mode/Demode d) Modulation/Demodul


lator ation

70. After writing a program in source code the programmer convert it into:

a) Program file b) Save file c) Machine code d) None of the above

71. The clients on a network send requests to a.

a) Modem b) Server c) Router d) Switch

72. A statement which is used to get data from the user during the execution of program is:

a) INPUT b) PRINT c) LIST d) LOAD

2017/11/23 08:55
73. The effective range of Bluetooth device is.

a) 10 feet b) 32 feet c) 10 miles d) 32 meters

74. The maximum length of string constant is:

a) 55 Characters b) 155 characters c) 255 characters d) None of the above

75. A formula is a:

a) Mathematical b) Mathematical data c) Mathematical d) None of these


Expression information

76. After designing our algorithm we verify it through:

a) Flow chart b) Comparison c) Processing d) Desk Checking

77. A constant is a quality whose value cannot be:

a) Read b) Printed c) Changed d) memorized

78. 1 s and 0 s called:

a) Numbers b) Arithmetic c) Binary Number d) none of these


system

79. 1,2,3 shows the name of:

a) Rows b) Columns c) Cells d) None of these

80. Which of the following operators processed first:

a) ^ (Exponent) b) Multiplication or c) MOD (Modulus) d) None of the above


Division

81. The satellite communication consists of

a) Several microwave b) Several radio wave c) Earth stations and d) Many users of
mediums communication a satellite televisions

82. Mr. Arthur C. Clark gave the idea of.

a) GPS technology b) Satellite technology c) Cellular technology d) Bluetooth technology

83. In cellular communication each section of this grid is a king of.

a) Network b) Area c) Cell d) Telephone

84. In GW-BASIC the command RUN is used to:

a) Compile a program b) Execute the c) Save the program d) None of the above
program on disk

85. Coaxial cable used in.

a) WLAN b) LAN c) WAN d) PAN

86. Antivirus can protect computer by:

a) Updating and b) installing and c) Shutdown and net d) Installing and


Scnning scanning browsing shutdown

87. At the right hand of the worksheet on vertical side is the:

a) Vertical scroll b) Cell address c) Tool bar d) Formula bar

2017/11/23 08:55
88. For End in a flow chart we use the symbol:

a) b) c) d)

89. Each MS-Excel file carries extension:

a) Excel b) .xcl c) .xlsx d) .xdl

90. A group of adjacent cells in a worksheet is called:

a) Ranfge b) values c) Label d) Data

91. The virus like malicious programs that read e-mail addresses and automatically send email to
all addresses is called:

a) Tragon horse b) macro virus c) worms d) adware

92. Spreadsheet use -------------- to express relationship of two or more cells:

a) Formulas b) Symbols c) Commands d) Sheets

93. A maximum numbers of characters can be used for naming a cell or a range:

a) 255 b) 259 c) 260 d) 275

94. How many steps are involving to solve a problem:

a) Three b) Five c) Four d) Six

95. The symbol used for relational operator in computer in computer programming:

a) / b) = c) < > d) *

96. SQL slammer is an example of:

a) Antivirus b) Worms c) Adware d) virus

97. The receiving process of a modem called.

a) Receiver b) Sender c) Demodulation d) Modulation

98. An expression that represents a numeric value is called:

a) Logical expression b) Arithmetic c) Common d) None of the above


expression expression

99. a keyboard key combination which is used to cut the data in spreadsheet with:

a) Ctrl + x b) Alt + x c) Ctrl + z d) None of these

100. In which stage the problem is observing carefully:

a) Coding b) Designing c) Testing d) None of the above

You might also like