subject

IT Test-4 M. M-40 (HSR CLASS 10TH C) Hi ADITYA, when you submit this form, the owner will be able to see your name and email address.

1. is the standard filename extension of database in MS Office Access 2010. 1 Mark

.accdb

.pdf

.odt

.data

2.Which data type has the largest storage capacity. 1 Mark

Text

Hyperlink

Memo

Attachment

3.To quit the MS Access application, click on the file tab and select the. 1 Mark

Close

Exit

Quit

None of these

4. includes commands which help in maintaining the rights, permissions and security of the database. 1 Mark

DCL

TCL

SQL

5.When a new database is created an empty table gets created by MS Access, called as. 1 Mark

Data table

Table 1

Table

6.The shortcut key to open Ease of Access Center option is . 1 Mark

Windows key+ V

Windows keys+ U

Windows key + P

7.The TCP/ IP uses switching technique to transfer message through internet. 1 Mark

Message

Circuit

Packet

8.Ebuddy is an example of IM software. 1 Mark

Web based

Application based

9.Camera option in hangout is used for . 1 Mark

Voice calling

Video calling

None of these

10. is used to transmit the data only in one direction. 1 Mark

Star topology

bus topology

hybrid topology

11.we can design our blog post without knowing HTML by clicking on the tab. 1 Mark

Preview

HTML

Visual

12.Which view is used to compose the post? 1 Mark

source

Edit

Preview

13. are those reservation which are confirmed on the spot. 1 Mark

Live Reservation

Non- Live Reservation

14.The command for renaming a database falls under data language. 2 marks

15.While creating a table in the Design view, key is used to move from the field column to data type. 2 marks

16.The is a sort of check on the table that every record in the table is unique. 2 marks

17.The detail section is where you place the controls that make up the of the report. 2 marks

18.The rows in a table are called and the columns in a table are called. 2 marks

19.The process of selling and buying products over the internet is called. 2 marks

20.A set of rules used to communicate in a network is called. 2 marks

21.Making sure that your data is adds another layer of security around your data. 2 marks

22.Click on the tab to start making your first blog post. 2 marks

23.A global interconnection of computer network around the world is known as the . 2 marks

24.Favorites are sited which you visit quite often. 1 mark

True

False

25.The computer where your blog is stored is called the host. 1 mark

True

False

26.Roboform is not a password manager software. 1 mark

True

false

27.To publish your offline post, you need to be connected to the internet. 1 mark

True

plese answer

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 14:40
You begin your first day of responsibilities by examining the recent is security breach at gearup to get ideas for safeguards you will take. at gearup, criminals accessed the company's improperly-secured wireless system and stole customers' credit card information as well as employee social security numbers. what kind of computer crime did gearup face?
Answers: 3
question
Computers and Technology, 23.06.2019 06:20
What is a point-in-time measurement of system performance?
Answers: 3
question
Computers and Technology, 23.06.2019 13:30
Font size, font style, and are all aspects of character formatting.
Answers: 2
question
Computers and Technology, 24.06.2019 07:20
3pointsyou've found an image you want to insert into your slide presentation. youwant to make the image look more gray so that it looks like an older imagewhat would you need to adjust? 0.00o a. sizeo b. hueo c. contrasto d. tones
Answers: 2
You know the right answer?
IT Test-4 M. M-40 (HSR CLASS 10TH C) Hi ADITYA, when you submit this form, the owner will be able t...
Questions
question
Business, 09.12.2020 20:00
question
English, 09.12.2020 20:00
question
Mathematics, 09.12.2020 20:00
question
English, 09.12.2020 20:00
Questions on the website: 13722361