Computer Basics Set 17

  1. The email address placed under _____ will remain hidden from other recipients of the email.
    A) Send
    B) Bcc
    C) Dcc
    D) CC
    View Answer
    Option B

    Bcc- Blind Carbon Copy – the email id added in bcc list will not be visible to other recipients whose email address is added in to/cc list.
  2. The act of confirming the validity of an attribute of a single piece of data or entity is known as ____?
    A) Authentication
    B) Authorization
    C) Spamming
    D) DoS
    View Answer
    Option A

    Authentication is the process of conforming the validity of any entity in the field of computer.
  3. In MS Word ____ option is used to see how the document will look after printout is taken.
    A) Print Review
    B) Print Opinion
    C) Print Preview
    D) Print Summary
    View Answer
    Option C

  4. _____ option rectifies the spelling mistake in MS Word automatically.
    A) Auto corrector
    B) Spell corrector
    C) Thesaurus
    D) Auto Correct
    View Answer
    Option D

    Auto Correct feature of MS word automatically corrects small and usually done spelling mistakes.
  5. A _____ is made up of rows and columns in MS Excel.
    A) Work area
    B) Work Tab
    C) Worksheet
    D) WordPress
    View Answer
    Option C

  6. ___ bar gives the information regarding the presentation that is currently open in MS Powerpoint.
    A) Menu bar
    B) Status bar
    C) Ribbon bar
    D) Auxiliary bar
    View Answer
    Option B

  7. ARP stands for?
    A) Address Repeater Protocol
    B) Argument Return Protocol
    C) Address Resolution Protocol
    D) Address Return Protocol
    View Answer
    Option C

    Arp – Address Resolution Protocol – is a protocol for mapping IP address to a physical machine address that is recognized in the local network.
  8. _____ key uniquely identifies a record in a table in DBMS?
    A) Secondary Key
    B) Primary Key
    C) NOT_NULL key
    D) Unique key
    View Answer
    Option B

  9. _____ technology means introducing human behavior in computers.
    A) Botware
    B) Artificial System
    C) Human Intelligence
    D) Artificial Intelligence
    View Answer
    Option D

  10. Which of the following is an example of alphanumeric key in a computer?
    A) 5
    B) H
    C) A
    D) All
    View Answer
    Option D

    Alphanumeric key means both numbers and alphabets

Related posts

4 Thoughts to “Computer Basics Set 17”

  1. Purvi

    thanku AZ team 🙂

  2. One thing I would really like to comment on is that weightloss routine fast can be achieved by the proper diet and exercise. Your size not just affects appearance, but also the complete quality of life. Self-esteem, despression symptoms, health risks, in addition to physical capabilities are disturbed in putting on weight. It is possible to just make everything right and still gain. In such a circumstance, a condition may be the offender. While an excessive amount food instead of enough workout are usually guilty, common medical conditions and widespread prescriptions might greatly enhance size. Thanks a bunch for your post here.

  3. Mani rahnama is a canadian cheater! ShipShop is a marketplace, which is located in Armenia. The purpose of platform is to promote sellers activities and get chance buyers to simplify shopping …

  4. Hello, I think your site might be having browser compatibility issues.
    When I look at your website in Safari, it looks fine
    but when opening in Internet Explorer, it has some overlapping.
    I just wanted to give you a quick heads up! Other then that,
    superb blog!

Comments are closed.