MCQOPTIONS
Saved Bookmarks
This section includes 299 Mcqs, each offering curated multiple-choice questions to sharpen your 9th Class knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
_______is a downloadable image recognition application by Google. |
| A. | Google Images |
| B. | GoogleMovies |
| C. | Google Goggles |
| D. | Google Video |
| Answer» D. Google Video | |
| 102. |
Google Now, an intelligent personal assistant by Google can provide_________. |
| A. | Weather Information |
| B. | Sports Updates |
| C. | Nearby Events |
| D. | All of these |
| Answer» E. | |
| 103. |
Live television, Video on Demand and time shifted television are services offered by _________. |
| A. | IPTV |
| B. | HTTV |
| C. | VOTP |
| D. | Colde TV |
| Answer» B. HTTV | |
| 104. |
Which of the following is an online multiplayer gaming and digital media service for Xbox One? |
| A. | Xbox Station |
| B. | Xbox Shipping |
| C. | Xbox Live |
| D. | Xbox Digital |
| Answer» D. Xbox Digital | |
| 105. |
Identify the logo. |
| A. | Wimax |
| B. | Click Force |
| C. | PlayStation Network |
| D. | Lulzsec Hackers |
| Answer» D. Lulzsec Hackers | |
| 106. |
What is the output of the following Visual Basic code? |
| A. | HelloWorld |
| B. | Hello/World |
| C. | Hello World |
| D. | helloworld |
| Answer» C. Hello World | |
| 107. |
In Visual Basic, the key to display the Properties window is _______. |
| A. | |
| B. | |
| C. | |
| D. | |
| Answer» C. | |
| 108. |
The statements which control the flow of execution of a program are called conditional statements. VB provides two conditional statements which are______. |
| A. | If _ _ Then _ _ Else and Select Case |
| B. | If _ _ Then _ _ Else and Do While |
| C. | Select Case and For _ _ Next |
| D. | For Next and Do _ _ Loop |
| Answer» B. If _ _ Then _ _ Else and Do While | |
| 109. |
A VB application works in three modes. Which among the following is NOT a valid mode? |
| A. | Design mode |
| B. | Run mode |
| C. | Interaction mode |
| D. | Break / suspended mode |
| Answer» D. Break / suspended mode | |
| 110. |
What is the base of a user interface in a Visual Basic application? |
| A. | Lable |
| B. | Text Box |
| C. | Command Button |
| D. | Form |
| Answer» E. | |
| 111. |
An environment that contains all tools and characteristics needed to create, run and test your program is called a/an ________. |
| A. | IDE |
| B. | OOD |
| C. | OOP |
| D. | EIDE |
| Answer» B. OOD | |
| 112. |
Which of the following string functions returns the numbers contained in a string as numeric values? |
| A. | Val( ) |
| B. | lnstr( ) |
| C. | Len( ) |
| D. | Digit( ) |
| Answer» B. lnstr( ) | |
| 113. |
In Visual Basic, what value of the ScrollBars property in the properties of the textbox indicates that both horizontal and vertical scrollbars are included if you have set the MultiLine property as True? |
| A. | 0 |
| B. | 1 |
| C. | 2 |
| D. | 3 |
| Answer» E. | |
| 114. |
The form interface in Visual Basic is shown here that adds the two numbers entered by the user. Which of the following codes is correct for adding two numbers?Assume the Name property of the controls as:(b) First Number TextBox : Text1(c) Second Number TextBox : Text2(d) Answer TextBox : Text3(e) add Command Button : cmdAdd |
| A. | Private Sub cmdAdd_Click()Text3.Text=Val(Text1.Text)+Val(Text2.Text)End Sub |
| B. | Private Sub cmdAdd_Click()Text1 .Text=Val (Text1 .Text) +Val (Text3. Text)End Sub |
| C. | Private Sub cmdAdd_Click()Text1.Text=Val(Text2.Text), Add, Val(Text3.Text)End Sub |
| D. | Both [B] and [C] |
| Answer» B. Private Sub cmdAdd_Click()Text1 .Text=Val (Text1 .Text) +Val (Text3. Text)End Sub | |
| 115. |
You have designed a form in VB and now you want to view where it will be positioned on the screen at run time. Which of the following is a tool available in VB that gives you a thumbnail view of the current form and also let you move this thumbnail to change the position of form? |
| A. | Project Explorer |
| B. | Menu Bar |
| C. | Form Layout window |
| D. | Object Browser |
| Answer» D. Object Browser | |
| 116. |
Which of the statements marked as Line 1, Line 2, Line 3 and Line 4 will cause an error? |
| A. | Line 1 |
| B. | Line 2 |
| C. | Line 3 |
| D. | Line 4 |
| Answer» B. Line 2 | |
| 117. |
Given here is the syntax of message box. What value should be entered for style value. If you want to display yes and no command buttons on the message box? MsgBox (Prompt, style value, title) |
| A. | 0 |
| B. | 1 |
| C. | 3 |
| D. | 4 |
| Answer» E. | |
| 118. |
Match the components given in Column-I with the functions they provide given in Column-II. Column -IColumn -II(a) Form window(i) To write the instruction for any object.(b) Properties window(ii) Displays a list of forms and other objects that constitute an application.(c) Project Explorer window(iii) Used to place various controls on a blank area.(d) Code window(iv) Used to set the characteristic of forms and other controls placed on them. |
| A. | (a) - (iv), (b) - (iii), (c) - (i), (d) - (ii) |
| B. | (a) - (iv), (b) - (i), (c) - (ii), (d) - (iii) |
| C. | (a) - (iii), (b) - (iv), (c) - (ii), (d) - (i) |
| D. | (a) - (iv), (b) - (i), (c) - (iii), (d) - (ii) |
| Answer» D. (a) - (iv), (b) - (i), (c) - (iii), (d) - (ii) | |
| 119. |
Which of the following lines of code will display an input box and then store the value entered in an Input Box into a variable of integer type? |
| A. | n = Input Box ("Enter number", Input, 0) |
| B. | Input Box ('Enter number", Input, 0) = n |
| C. | n = Val (Input Box ("Enter number", Input, 0)) |
| D. | All of these |
| Answer» B. Input Box ('Enter number", Input, 0) = n | |
| 120. |
______ is used to display some text. |
| A. | Label |
| B. | Toolbox |
| C. | Properties |
| D. | IDE |
| Answer» B. Toolbox | |
| 121. |
What would be the value of variable res after execution? res = 9 Mod 2+1-2 |
| A. | -1 |
| B. | 3 |
| C. | 0 |
| D. | 4 |
| Answer» C. 0 | |
| 122. |
A _____ is the primary work area where a user draws a GUI interface by placing several controls. |
| A. | Toolbox |
| B. | Form window |
| C. | Project window |
| D. | Properties |
| Answer» C. Project window | |
| 123. |
Which is not a view for displaying a report object? |
| A. | Datasheet view |
| B. | Design view |
| C. | Print preview |
| D. | Layout preview |
| E. | None of these |
| Answer» B. Design view | |
| 124. |
DBMS full form is: |
| A. | Database Management System |
| B. | Data Manage System |
| C. | Data Based Manage System |
| D. | Database Managed System |
| E. | None of these |
| Answer» B. Data Manage System | |
| 125. |
In MS-Access 2013, text data type may contain maximum character of: |
| A. | 255 character |
| B. | 256 characters |
| C. | 2 characters |
| D. | 8 characters |
| E. | None of these |
| Answer» B. 256 characters | |
| 126. |
Query can be use to select data from: |
| A. | Single table |
| B. | Key record |
| C. | Unique key |
| D. | Field name |
| E. | None of these |
| Answer» D. Field name | |
| 127. |
Queries in Access can be used as: |
| A. | View, change and analyze data in different ways |
| B. | A source of records for forms and reports |
| C. | Name of fields, field type and size |
| D. | Both [a] and [b] |
| E. | None of these |
| Answer» E. None of these | |
| 128. |
A ______ name must be unique with a database. |
| A. | Table |
| B. | Field |
| C. | Record |
| D. | Text |
| E. | None of these |
| Answer» B. Field | |
| 129. |
This option allows you to build a new table by entering data directly into the datasheet. |
| A. | Datasheet view |
| B. | Design view |
| C. | Link table |
| D. | [a] and [b] |
| E. | None of these |
| Answer» B. Design view | |
| 130. |
This key uniquely identifies each record: |
| A. | Primary key |
| B. | Key record |
| C. | Unique key |
| D. | Field name |
| E. | None of these |
| Answer» B. Key record | |
| 131. |
To create a table in MS-Access 2013: |
| A. | Database should be created before create table. |
| B. | Table can be created using table templates. |
| C. | There must be at least one Primary key in a table. |
| D. | All of these |
| E. | None of these |
| Answer» D. All of these | |
| 132. |
Steve wants to convert 10111 to decimal number. Which one of the following is the correct conversion? |
| A. | 48 |
| B. | 23 |
| C. | 29 |
| D. | 3000 |
| E. | None of these |
| Answer» C. 29 | |
| 133. |
NOR is a complement of: |
| A. | AND |
| B. | OR |
| C. | XOR |
| D. | Both [a] and [b] |
| E. | None of these |
| Answer» C. XOR | |
| 134. |
\[X.{{X}^{1}}\] is equal to: |
| A. | 1 |
| B. | 0 |
| C. | X |
| D. | \[{{X}^{1}}\] |
| E. | None of these |
| Answer» B. 0 | |
| 135. |
A Boolean function may be transformed into: |
| A. | logical diagram |
| B. | logical graph |
| C. | matrix |
| D. | All of these |
| E. | None of these |
| Answer» B. logical graph | |
| 136. |
The hexadecimal number system is based on 16. Which one of the following is an example of hexadecimal number? |
| A. | 232G |
| B. | 137H |
| C. | 120AG |
| D. | 121BC |
| E. | None of these |
| Answer» E. None of these | |
| 137. |
The _____ rule is used to make sure that the property always be applied whether another property appears in CSS. |
| A. | @important |
| B. | #important |
| C. | !important |
| D. | !first |
| E. | None of these |
| Answer» D. !first | |
| 138. |
The different ways to associate styles with a HTML document is/are: |
| A. | Embedded CSS with <style> element |
| B. | Inline CSS with style attribute. |
| C. | External CSS with <link> element. |
| D. | All of the above |
| E. | None of these |
| Answer» E. None of these | |
| 139. |
How do you add a background color for all elements? |
| A. | all. h1 {background-color:#FFFFFF} |
| B. | h1. all {background-color:#FFFFFF} |
| C. | h1 {background-color:#FFFFFF} |
| D. | h1 {background-color;#FFFFFF} |
| E. | None of these |
| Answer» D. h1 {background-color;#FFFFFF} | |
| 140. |
How do you insert a comment in a CSS file? |
| A. | / / this is a comment / / |
| B. | / * this is a comment * / |
| C. | ' this is a comment |
| D. | / / this is a comment |
| E. | None of these |
| Answer» C. ' this is a comment | |
| 141. |
Which HTML tag is used to define an internal style sheet? |
| A. | <style> |
| B. | <css> |
| C. | <script> |
| D. | <internal> |
| E. | None of these |
| Answer» E. None of these | |
| 142. |
Where in an HTML document is the correct place to refer to an external style sheet? |
| A. | At the end of the document |
| B. | In the <head> section |
| C. | At the top of the document |
| D. | In the <body> section |
| E. | None of these |
| Answer» C. At the top of the document | |
| 143. |
The technology that creates a secure and private connection between two or more computers is called a _________. |
| A. | Network Tethering |
| B. | Encryption |
| C. | FTP |
| D. | Secure Socket Layer |
| Answer» E. | |
| 144. |
A low power WLAN technology that facilitates interoperability among smartphones and portable consumer devices such as headphones fitness accessories and heart rate monitor. It is also called "Bluetooth 4.0". |
| A. | Bluetooth Smart Ready |
| B. | Bluetooth Berry casting |
| C. | Bluetooth Handoff |
| D. | Podcasts |
| Answer» B. Bluetooth Berry casting | |
| 145. |
Rerouting from a requested site to an undesired site without your intervention is called ______. |
| A. | Pharming |
| B. | Spamming |
| C. | Hijacking |
| D. | Trapping |
| Answer» B. Spamming | |
| 146. |
Identify the virus. 1. It was distributed by David L. Smith. 2. It was distributed as e-mail attachment. |
| A. | Melissa |
| B. | Code Red |
| C. | Blue Whale |
| D. | ILOVEYOU |
| Answer» B. Code Red | |
| 147. |
When you copy the address book contents of one of your mobile phones to another mobile phone, where both your phones are in your two hands, you may be using ____ technology. |
| A. | Parallel |
| B. | Bluetooth |
| C. | Fidelity |
| D. | Personal |
| Answer» C. Fidelity | |
| 148. |
Which of the following technologies uses encryption to protect the privacy of all your data transmissions between two points? |
| A. | Secure Socket Layer |
| B. | Virtual Private Network |
| C. | Transport Layer Security |
| D. | All of these |
| Answer» B. Virtual Private Network | |
| 149. |
In which of the following ways computer worm spreads? (i) Via e-mail attachments (ii) Via hyperlinks to web or any such source or network (iii) Via peer to peer networks |
| A. | Only (i) |
| B. | Only (ii) |
| C. | Only (iii) |
| D. | All (i), (ii) and (iii) |
| Answer» E. | |
| 150. |
Match the following.Column - IColumn - II(a) Password(i) Detects and removes viruses and other malicious software from the computer.(b) Antivirus software(ii) Protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.(c) Firewall(iii) Secret sequence of characters that enables a user to control access to a computer program of file.(d) Disk Encryption (iv) A security system designed to protect a computer from hacker attacks. |
| A. | (a) - (iv), (b) - (i), (c) - (i), (d) - (ii) |
| B. | (a) - (iv), (b) - (i), (c) - (ii), (d) - (iii) |
| C. | (a) - (iv), (b) - (iii), (c) - (i), (d) - (ii) |
| D. | (a) - (iii), (b) - (i), (c) - (iv), (d) - (ii) |
| Answer» E. | |