Explore topic-wise MCQs in 9th Class.

This section includes 299 Mcqs, each offering curated multiple-choice questions to sharpen your 9th Class knowledge and support exam preparation. Choose a topic below to get started.

101.

_______is a downloadable image recognition application by Google.

A. Google Images
B.        GoogleMovies
C. Google Goggles
D.        Google Video
Answer» D.        Google Video
102.

Google Now, an intelligent personal assistant by Google can provide_________.

A. Weather Information                  
B. Sports Updates
C. Nearby Events
D.        All of these
Answer» E.
103.

Live television, Video on Demand and time shifted television are services offered by _________.

A. IPTV                
B.        HTTV
C. VOTP              
D.        Colde TV
Answer» B.        HTTV
104.

Which of the following is an online multiplayer gaming and digital media service for Xbox One?

A. Xbox Station     
B. Xbox Shipping
C. Xbox Live  
D. Xbox Digital
Answer» D. Xbox Digital
105.

Identify the logo.

A. Wimax
B. Click Force
C. PlayStation Network       
D. Lulzsec Hackers
Answer» D. Lulzsec Hackers
106.

What is the output of the following Visual Basic code?  

A. HelloWorld    
B. Hello/World
C. Hello World    
D. helloworld
Answer» C. Hello World    
107.

In Visual Basic, the key to display the Properties window is _______.

A.   
B.                     
C.           
D.         
Answer» C.           
108.

The statements which control the flow of execution of a program are called conditional statements. VB provides two conditional statements which are______.

A. If _ _ Then _ _ Else and Select Case
B. If _ _ Then _ _ Else and Do While
C. Select Case and For _ _ Next
D. For Next and Do _ _ Loop
Answer» B. If _ _ Then _ _ Else and Do While
109.

A VB application works in three modes. Which among the following is NOT a valid mode?

A. Design mode                             
B. Run mode
C. Interaction mode
D. Break / suspended mode
Answer» D. Break / suspended mode
110.

What is the base of a user interface in a Visual Basic application?

A. Lable               
B. Text Box
C. Command Button
D.        Form
Answer» E.
111.

An environment that contains all tools and characteristics needed to create, run and test your program is called a/an ________.

A. IDE           
B. OOD
C. OOP                
D.        EIDE
Answer» B. OOD
112.

Which of the following string functions returns the numbers contained in a string as numeric values?

A. Val( )   
B.        lnstr( )
C. Len( )   
D.        Digit( )
Answer» B.        lnstr( )
113.

In Visual Basic, what value of the ScrollBars property in the properties of the textbox indicates that both horizontal and vertical scrollbars are included if you have set the MultiLine property as True?

A. 0                     
B. 1
C. 2                     
D. 3
Answer» E.
114.

The form interface in Visual Basic is shown here that adds the two numbers entered by the user. Which of the following codes is correct for adding two numbers?Assume the Name property of the controls as:(b) First Number TextBox : Text1(c) Second Number TextBox : Text2(d) Answer TextBox : Text3(e) add Command Button  : cmdAdd 

A. Private Sub cmdAdd_Click()Text3.Text=Val(Text1.Text)+Val(Text2.Text)End Sub
B. Private Sub cmdAdd_Click()Text1 .Text=Val (Text1 .Text) +Val (Text3. Text)End Sub 
C. Private Sub cmdAdd_Click()Text1.Text=Val(Text2.Text), Add, Val(Text3.Text)End Sub
D. Both [B] and [C]
Answer» B. Private Sub cmdAdd_Click()Text1 .Text=Val (Text1 .Text) +Val (Text3. Text)End Sub 
115.

You have designed a form in VB and now you want to view where it will be positioned on the screen at run time. Which of the following is a tool available in VB that gives you a thumbnail view of the current form and also let you move this thumbnail to change the position of form?

A. Project Explorer
B.        Menu Bar
C. Form Layout window
D. Object Browser
Answer» D. Object Browser
116.

Which of the statements marked as Line 1, Line 2, Line 3 and Line 4 will cause an error?  

A. Line 1              
B. Line 2
C. Line 3              
D. Line 4
Answer» B. Line 2
117.

Given here is the syntax of message box. What value should be entered for style value. If you want to display yes and no command buttons on the message box? MsgBox (Prompt, style value, title) 

A. 0
B. 1
C. 3                                 
D. 4
Answer» E.
118.

Match the components given in Column-I with the functions they provide given in Column-II. Column -IColumn -II(a) Form window(i) To write the instruction for any object.(b) Properties window(ii) Displays a list of forms and other objects that constitute an application.(c) Project Explorer window(iii) Used to place various controls on a blank area.(d) Code window(iv) Used to set the characteristic of forms and other controls placed on them. 

A. (a) - (iv), (b) - (iii), (c) - (i), (d) - (ii)
B. (a) - (iv), (b) - (i), (c) - (ii), (d) - (iii)
C. (a) - (iii), (b) - (iv), (c) - (ii), (d) - (i)
D. (a) - (iv), (b) - (i), (c) - (iii), (d) - (ii)
Answer» D. (a) - (iv), (b) - (i), (c) - (iii), (d) - (ii)
119.

Which of the following lines of code will display an input box and then store the value entered in an Input Box into a variable of integer type?

A. n = Input Box ("Enter number", Input, 0)
B. Input Box ('Enter number", Input, 0) = n
C. n = Val (Input Box ("Enter number", Input, 0))
D. All of these
Answer» B. Input Box ('Enter number", Input, 0) = n
120.

______ is used to display some text.

A. Label               
B.        Toolbox
C. Properties     
D.        IDE  
Answer» B.        Toolbox
121.

What would be the value of variable res after execution? res = 9 Mod 2+1-2 

A. -1
B. 3
C. 0                     
D. 4
Answer» C. 0                     
122.

A _____ is the primary work area where a user draws a GUI interface by placing several controls.

A. Toolbox
B.        Form window
C. Project window
D.        Properties
Answer» C. Project window
123.

Which is not a view for displaying a report object?

A.  Datasheet view             
B.  Design view
C.  Print preview                
D.  Layout preview
E.  None of these
Answer» B.  Design view
124.

DBMS full form is:

A.  Database Management System   
B.  Data Manage System
C.  Data Based Manage System      
D.  Database Managed System
E.  None of these
Answer» B.  Data Manage System
125.

In MS-Access 2013, text data type may contain maximum character of:

A.  255 character               
B.  256 characters
C.  2 characters                 
D.  8 characters
E.  None of these
Answer» B.  256 characters
126.

Query can be use to select data from:

A.  Single table                  
B.  Key record
C.  Unique key                   
D.  Field name
E.  None of these
Answer» D.  Field name
127.

Queries in Access can be used as:

A.  View, change and analyze data in different ways
B.  A source of records for forms and reports
C.  Name of fields, field type and size
D.  Both [a] and [b]
E.  None of these
Answer» E.  None of these
128.

A ______ name must be unique with a database.

A.  Table         
B.  Field
C.  Record                         
D.  Text
E.  None of these
Answer» B.  Field
129.

This option allows you to build a new table by entering data directly into the datasheet.

A.  Datasheet view             
B.  Design view
C.  Link table                    
D.   [a] and [b]
E.  None of these
Answer» B.  Design view
130.

This key uniquely identifies each record:

A.  Primary key
B.  Key record
C.  Unique key                   
D.  Field name
E.  None of these
Answer» B.  Key record
131.

To create a table in MS-Access 2013:

A.  Database should be created before create table.
B.  Table can be created using table templates.
C.  There must be at least one Primary key in a table.
D.  All of these
E.  None of these
Answer» D.  All of these
132.

Steve wants to convert 10111 to decimal number. Which one of the following is the correct conversion?

A.  48                               
B.  23
C.  29                               
D.  3000
E.  None of these
Answer» C.  29                               
133.

NOR is a complement of:

A.  AND                         
B.  OR
C.  XOR              
D.  Both [a] and [b]
E.  None of these
Answer» C.  XOR              
134.

\[X.{{X}^{1}}\] is equal to:

A.  1              
B.  0
C.  X                                
D. \[{{X}^{1}}\]
E.  None of these
Answer» B.  0
135.

A Boolean function may be transformed into:

A.  logical diagram             
B.  logical graph
C.  matrix            
D.  All of these
E.  None of these
Answer» B.  logical graph
136.

The hexadecimal number system is based on 16. Which one of the following is an example of hexadecimal number?

A.  232G                          
B.  137H
C.  120AG                        
D.  121BC
E.  None of these
Answer» E.  None of these
137.

The _____ rule is used to make sure that the property always be applied whether another property appears in CSS.

A.  @important                 
B.  #important
C.  !important                    
D.  !first
E.  None of these
Answer» D.  !first
138.

The different ways to associate styles with a HTML document is/are:

A.  Embedded CSS with <style> element
B.  Inline CSS with style attribute.
C.  External CSS with <link> element.
D.  All of the above
E.  None of these
Answer» E.  None of these
139.

How do you add a background color for all elements?

A.  all. h1 {background-color:#FFFFFF}
B.  h1. all {background-color:#FFFFFF}
C.  h1 {background-color:#FFFFFF}
D.  h1 {background-color;#FFFFFF}
E.  None of these
Answer» D.  h1 {background-color;#FFFFFF}
140.

How do you insert a comment in a CSS file?

A.  / / this is a comment / /
B.  / * this is a comment * /
C.  ' this is a comment
D.  / / this is a comment
E.  None of these
Answer» C.  ' this is a comment
141.

Which HTML tag is used to define an internal style sheet?

A.  <style>                        
B.  <css>
C.  <script>                       
D.  <internal>
E.  None of these
Answer» E.  None of these
142.

Where in an HTML document is the correct place to refer to an external style sheet?

A.  At the end of the document
B.  In the <head> section
C.  At the top of the document
D.  In the <body> section
E.  None of these
Answer» C.  At the top of the document
143.

The technology that creates a secure and private connection between two or more computers is called a _________.

A. Network Tethering          
B. Encryption
C. FTP                 
D.        Secure Socket Layer
Answer» E.
144.

A low power WLAN technology that facilitates interoperability among smartphones and portable consumer devices such as headphones fitness accessories and heart rate monitor. It is also called "Bluetooth 4.0".

A. Bluetooth Smart Ready  
B. Bluetooth Berry casting
C. Bluetooth Handoff         
D. Podcasts
Answer» B. Bluetooth Berry casting
145.

Rerouting from a requested site to an undesired site without your intervention is called ______.

A. Pharming     
B.        Spamming
C. Hijacking          
D. Trapping
Answer» B.        Spamming
146.

Identify the virus. 1. It was distributed by David L. Smith. 2. It was distributed as e-mail attachment.

A. Melissa      
B. Code Red
C. Blue Whale                   
D. ILOVEYOU 
Answer» B. Code Red
147.

When you copy the address book contents of one of your mobile phones to another mobile phone, where both your phones are in your two hands, you may be using ____ technology.

A. Parallel             
B.        Bluetooth
C. Fidelity             
D.        Personal
Answer» C. Fidelity             
148.

Which of the following technologies uses encryption to protect the privacy of all your data transmissions between two points?

A. Secure Socket Layer       
B. Virtual Private Network
C. Transport Layer Security 
D. All of these
Answer» B. Virtual Private Network
149.

In which of the following ways computer worm spreads? (i) Via e-mail attachments (ii) Via hyperlinks to web or any such source or network (iii) Via peer to peer networks

A. Only (i)                         
B. Only (ii)
C. Only (iii)           
D.                    All (i), (ii) and (iii)
Answer» E.
150.

Match the following.Column - IColumn - II(a) Password(i) Detects and removes viruses and other malicious software from the computer.(b) Antivirus software(ii) Protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.(c) Firewall(iii) Secret sequence of characters that enables a user to control access to a computer program of file.(d) Disk Encryption (iv) A security system designed to protect a computer from hacker attacks. 

A. (a) - (iv), (b) - (i), (c) - (i), (d) - (ii)
B. (a) - (iv), (b) - (i), (c) - (ii), (d) - (iii)
C. (a) - (iv), (b) - (iii), (c) - (i), (d) - (ii)
D. (a) - (iii), (b) - (i), (c) - (iv), (d) - (ii)
Answer» E.