DITA QUESTION - MCQ 1 | YCTC Dita Question Paper
1. Two main measures for the efficiency of an algorithm are_____a) Processor and memory
b) Complexity and capacity
c) Time and space
d) Data and space
Answer: C
a) O(n)
b) O(log n)
c) O(n2)
d) O(n log n)
Answer: D
a) Hyper Text Transfer Protocol
b) Hyper Text Transmission Protocol
c) Hyper Text Tie Protocol
d) None of these
Answer: A
a) Boolean
b) Number
c) String
d) None
Answer: B
a) Hide
b) Show
c) Visible
d) Enabled
Answer: C
a) O(n)
b) O(log n)
c) O(n2)
d) O(n log n)
Answer: A
a) residing in many computers
b) created using HTML
c) with links to other web pages
d) residing in many computers linked together using HTML
Answer: D
a) One object is used to create one class.
b) One class is used to create one object.
c) One object can create many classes.
d) One class can create many objects.
Answer: D
a) .flv
b) .xls
c) .com
d) .rrr
Answer: C
a) properties
b) methods
c) events
d) All of the above
Answer: D
11. The complexity of
the average case of an algorithm is_____
a) Much more
complicated to analyze than that of worst case
b) Much more simpler
to analyze than that of worst case
c) Sometimes more
complicated and some other times simpler than that of worst case
d) None or above
Answer: A
12. What is the
internet explorer ?
a) An icon
b) a file manager
c) A browser
d) an Internet
Answer: C
13. ______ is text
with hyperlinks.
a) Lower Text
b) Upper Text
c) Toggle Text
d) Hypertext
Answer: D
14. Program
flowcharts are the parts of_____
a) operation chart
b) process chart
c) algorithms
flowchart
d) system flowcharts
Answer: C
15. If you Convert
Numeric to Character expression then use_____
a) Str( )
b) Val( )
c) Instr( )
d) Len( )
Answer: A
16. How many MDI
forms can be added in a Project File ?
a) 3
b) 1
c) 2
d) 4
Answer: B
17. A module-level is
available to all the _______ in the module
a) Data
b) Procedures
c) Event.
d) Task
Answer: B
18. In the IDE, which
of following is used to design the layout of an application?
a) Form Designer
window.
b) Project Explorer
window.
c) Context Menu.
d) Form Layout
window.
Answer: A
19. Code window
consists of a ______ box and procedure list box
a) Object.
b) Event.
c) Tool.
d) Message.
Answer: A
20. Code in VB is
stored in______
a) Module.
b) Report.
c) Both (a) and (b).
d) None of above.
Answer: A
41. Tables in any
database related to one another through ______
a) Primary Key
b) Foreign Key
c) Composite Key
d) Alternate Key
Answer: B
42. Internet Explorer
came into market in the year_____
a) 1994
b) 1995
c) 1996
d) 1997
Answer: B
43. Internet explorer
falls under_____
a) Operating System
b) Compiler
c) Browser
d) IP address
Answer: C
44. Firefox came into
market in the year____?
a) 2001
b) 2003
c) 2002
d) 2004
Answer: D
45. What should be
minimum requirement of random access memory (RAM) for internet access?
a) 8 MB
b) 16 MB
c) 32 MB
d) 64 MB
Answer: C
46. A person who
produces or creates new programs for industrial and business users is
called____?
a) System analysts
b) Program
coordinator
c) Computer
coordinator
d) User interface
Answer: A
47. In a flowchart a
calculation (process) is represented by____.
a) A rectangle
b) A rhombus
c) A parallelogram
d) A circle
Answer: A
48. Dim statement is
used to _____.
a) Declare only
string variables.
b) Declare only
integer variables.
c) Declare the
variables.
d) None of these.
Answer: C
49. The Activated
event is found only in which object?
a) Form.
b) Button
c) TextBox
d) Label
Answer: A
50. Which datatype
store yes/no type data ?
a) Variant
b) Integer
c) Boolean
d) String
Answer: C
51. In Flowcharts of
algorithms, messages are classified as_____
a) steps of algorithm
b) selection of steps
c) cancellation of
procedures
d) addition of steps
Answer: A
52. In flowcharts, a
circle with a vertical line drawn is a symbol used to show_____
a) systematic
operation
b) manual operation
c) magnetic tape
d) display screen
Answer: C
53. Symbol used in
flowchart such as rectangle with horizontal lines on two sides is used for_____
a) rhombus
b) parallelogram
c) circle
d) trapezoid
Answer: C
54. The ____
statement checks in the module for usage of any undeclared variables and reports
an error tothe user.
a) looping
b) iteration.
c) dim
d) external
Answer: C
55. The _____property
in Visual basic is common for many a tools.
a) location.
b) Place.
c) window status.
d) name
Answer: D
56. What are the
three algorithm constructs?
a) Sequence,
selection, repetition.
b) Input, output,
process.
c) Input/output,
decision, terminator.
d) Loop,
input/output, process.
Answer: A
57. Blink the Cursor
in specific Textbox then use_____
a) Caption
b) List
c) Val( )
d) Setfocus
Answer: D
58. In order to use
cable for browsing web you will need : _____
a) A cable modem.
b) Network Interface
Card (NIC).
c) Both (a) &
(b).
d) None Of the above.
Answer: C
59. The space factor
when determining the efficiency of algorithm is measured by_____
a) Counting the
maximum memory needed by the algorithm.
b) Counting the
minimum memory needed by the algorithm.
c) Counting the
average memory needed by the algorithm.
d) Counting the
maximum disk space needed by the algorithm.
Answer: A
60. The time factor
when determining the efficiency of algorithm is measured by_____
a) Counting
microseconds.
b) Counting the
number of key operations.
c) Counting the
number of statements.
d) Counting the
kilobytes of algorithm.
Answer: B
41. Tables in any
database related to one another through ______
a) Primary Key
b) Forign Key
c) Composite Key
d) Alternate Key
Answer: B
42. Internet Explorer
came into market in the year_____
a) 1994
b) 1995
c) 1996
d) 1997
Answer: B
43. Internet explorer
falls under_____
a) Operating System
b) Compiler
c) Browser
d) IP address
Answer: C
44. Firefox came into
market in the year____?
a) 2001
b) 2003
c) 2002
d) 2004
Answer: D
45. What should be
minimum requirement of random access memory (RAM) for internet access?
a) 8 MB
b) 16 MB
c) 32 MB
d) 64 MB
Answer: C
46. A person who
produces or creates new programs for industrial and business users is
called____?
a) System analysts
b) Program
coordinator
c) Computer
coordinator
d) User interface
Answer: A
47. In a flowchart a
calculation (process) is represented by____.
a) A rectangle
b) A rhombus
c) A parallelogram
d) A circle
Answer: A
48. Dim statement is
used to _____.
a) Declare only
string variables.
b) Declare only
integer variables.
c) Declare the
variables.
d) None of these.
Answer: C
49. The Activated
event is found only in which object?
a) Form.
b) Button
c) TextBox
d) Label
Answer: A
50. Which datatype
store yes/no type data ?
a) Varient
b) Integer
c) Boolean
d) String
Answer: C
51. In Flowcharts of
algorithms, messages are classified as_____
a) steps of algorithm
b) selection of steps
c) cancellation of
procedures
d) addition of steps
Answer: A
52. In flowcharts, a
circle with a vertical line drawn is a symbol used to show_____
a) systematic
operation
b) manual operation
c) magnetic tape
d) display screen
Answer: C
53. Symbol used in
flowchart such as rectangle with horizontal lines on two sides is used for_____
a) rhombus
b) parallelogram
c) circle
d) trapezoid
Answer: C
54. The ____
statement checks in the module for usage of any undeclared variables and
reports an error tothe user.
a) looping
b) iteration.
c) dim
d) external
Answer: C
55. The _____property
in Visual basic is common for many a tools.
a) location.
b) Place.
c) window status.
d) name
Answer: D
56. What are the
three algorithm constructs?
a) Sequence,
selection, repetition.
b) Input, output,
process.
c) Input/output,
decision, terminator.
d) Loop,
input/output, process.
Answer: A
57. Blink the Cursor
in specific Textbox then use_____
a) Caption
b) List
c) Val( )
d) Setfocus
Answer: D
58. In order to use
cable for browsing web you will need : _____
a) A cable modem.
b) Network Interface
Card (NIC).
c) Both (a) &
(b).
d) None Of the above.
Answer: C
59. The space factor
when determining the efficiency of algorithm is measured by_____
a) Counting the
maximum memory needed by the algorithm.
b) Counting the
minimum memory needed by the algorithm.
c) Counting the
average memory needed by the algorithm.
d) Counting the
maximum disk space needed by the algorithm.
Answer: A
60. The time factor
when determining the efficiency of algorithm is measured by_____
a) Counting
microseconds.
b) Counting the
number of key operations.
c) Counting the
number of statements.
d) Counting the
kilobytes of algorithm.
Answer: B
61. Controls are:
_____
a) Code
b) Method
c) Object
d) None
Answer: C
62. DCL Provides
Commands To Perform Actions Like_____
a) Change The
Structure Of Tables.
b) Insert, Update Or
Delete Records And Data Values
c) Authorizing Access
And Other Control Over Database
d) None Of Above
Answer: C
63. Debug window is
the same as ____ window.
a) procedure.
b) object.
c) form
d) code
Answer: D
64. Autoredraw = True
Property is used for_____
a) Display Text on
Command Button
b) Display Text on
Label
c) Display Text on
Frame
d) Display Some Text
on Form Body
Answer: D
65. What is name of
format : abc@rediffmail.com?
a) Email Id
b) Web site
c) WordProcessor
d) None
Answer: A
66. Which of the
following sorting algorithms is of divide-and-conquer type?
a) Bubble sort
b) Insertion sort
c) Quick sort
d) All of above
Answer: C
67. Which one is not
the property of algorithm?
a) Generality
b) Infiniteness
c) Finiteness
d) Correctness
Answer: B
68. MAX Property is
for_____
a) Label
b) TextBox
c) HScrollBar
d) ComboBox
Answer: C
69. What Are The
Different Views To Display A Table?
a) Datasheet view
b) Design view
c) Pivot table and
Pivot Chart view
d) All of above
Answer: D
70. MS-Access is a
_____
a) RDBMS package.
b) Language.
c) Drawing package.
d) Operating system.
Answer: A
71. How many types of
query are present in MS-Access?
a) 6
b) 3
c) 8
d) 9
Answer: D
72. Property of
primary key is _______
a) Unique.
b) Not null.
c) Indexed.
d) All of above.
Answer: D
73. Following Is Not
A Database Model_____
a) Network Database
Model.
b) Relational
Database Model.
c) Object Oriented
Database Model.
d) None.
Answer: D
74. What is the
difference between 'Open' and 'Open Exclusively'?
a) Open statement
opens access database files and Open Exclusively opens database files of other
program like Oracle.
b) Open Exclusive
locks whole database so that no one can access it whereas Open locks only the
record that is being accessed.
c) Both Open and Open
Exclusively are same.
d) Open Exclusive
command does not exist in MS Access.
Answer: B
75. All components
work together as a unit is called____
a) System
b) Component
classification
c) Storing system
d) Operating system
Answer: A
76. In flowchart,
invert trapezoid is used to show the____
a) On-line storage
symbol
b) Manual operations
c) Communication link
d) Show annotations
Answer: B
77. Flowchart act as
a guide or blue print during the system analysis. It is a advantage is
called____
a) Communication
b) Proper Debugging
c) Effective Analysis
d) Efficient Coding
Answer: D
78. DHCP stands
for____
a) Dynamic Host
Configuration Protocol
b) Dual Host
Configuration Protocol
c) Dual Host Control
Protocol
d) Dynamic Host
Control Protocol
Answer: A
79. The application
name always appears in the_____
a) Titlebar
b) Menubar
c) Properties window
d) Code window
Answer: A
80. In flowchart,
parallelogram is used to show_____
a) General input
symbol
b) Operation on data
c) Online use of
keyboard
d) Output data screen
Answer: A
81. Default data type
of a variable in VB is_____
a) Integer
b) String
c) Float
d) Variant
Answer: D
82. DHCP stands
for_____
a) Dynamic Host
Configuration Protocol.
b) Dual Host
Configuration Protocol
c) Dual Host Control
Protocol
d) Dynamic Host
Control Protocol
Answer: A
83. Shortcut of Web
page Refresh is_____
a) F4
b) F5
c) F6
d) F7
Answer: B
84. Stock maintaining
control system in store which consists hardware and software to contact and
manage suppliers is called_____
a) system
b) component
classification
c) information
processing system
d) operating system
Answer: C
85. DNS stands
for_____
a) Direct Naming
System
b) Drive Naming
Society
c) Domain Name System
d) Development New
Society
Answer: C
86. Dynamic arrays
can be declared when the user may not know the _____of the array at design
time.
a) exact column.
b) exact variable.
c) exact value.
d) exact size.
Answer: D
87. Each computer
connected to the internet must_____
a) have a unique HTTP
address
b) be an IBM PC
c) have a modem
connection
d) Switch
Answer: B
88. E-Mail : The
Inbox is collection of_____
a) Deleted Mail
b) Draft Mails
c) Spam Mails
d) Incoming Mails
Answer: D
89. E-mail addresses
separate the user name from the ISP using the __________ symbol.
a) &
b) @
c) #
d) %
Answer: B
90. Which language is
not a true object-oriented programming language?
a) VB.NET
b) VB 6
c) C++
d) Java
Answer: B
91. Uses of
Internet_____
a) Communication
b) Information
Retrieval.
c) Presentation of
information.
d) All of the above.
Answer: D
92. A computer
language for informing the DBMS regarding the data structure used is_____
a) PASCAL
b) DDL
c) PROLOG
d) FORTRAN
Answer: B
93. A homepage
is_____
a) an index on
encyclopaedia articles.
b) where all internet
data is store.
c) required for
access to the internet.
d) the first page of
a web site.
Answer: D
94. The first part of
a complete URL is the __________ needed to access the web resource.
a) ADDRESS
b) NAME
c) LOCATION
d) PROTOCOL
Answer: D
95. What is an
algorithm?
a) A flowchart.
b) Step by step
instructions used to solve a problem.
c) A flowchart or
pseudocode.
d) A decision.
Answer: B
96. A textbox is an
example of_____
a) button
b) method
c) event
d) Control
Answer: D
97. In a relational
database, a Referential Integrity constraint is specified with the help of_____
a) Primary Key.
b) Foreign Key.
c) Both (a) and (b).
d) None of these.
Answer: B
98. How can you view
the properties of a form?
a) Select View >
Form properties form the menu.
b) Right click
anywhere on the form and select properties from the shortcut menu.
c) Double click the
form selector box in the upper left corner of the form.
d) All the Above.
Answer: B
99. How do you insert
a graphic of your company's logo on a report?
a) Design Tab ->
Logo.
b) You can't MS
Access won't let you insert graphics file.
c) Database Tools
-> logo.
d) Select Tools >
Insert Picture from the menu.
Answer: A
100. What is a form
in MS Access?
a) It is a printed
page where users will write their data to fill it up.
b) It is an input
screen designed to make the viewing and entering data easier
c) This is an
important part of database used by analysts to draw conclusions.
d) All of above.
Answer: B
101. FTP stands
for_____
a) File Total
Protocol.
b) Forward Total
Protocol.
c) File Transfer
Protocol.
d) File Transfer
Project
Answer: C
102. There are _____
types of modules in visual basic
a) Three
b) Two
c) Five
d) None of these
Answer: A
103. A value that is
automatically entered in a field for a new record_____
a) Validation rule
b) Default value
c) Input mask
d) None of above
Answer: B
104. Diagram that
represents steps or operations involved in any kind of process is called_____
a) System diagram
b) Management
hierarchy
c) Flowcharts
d) Convenience
diagrams
Answer: C
105. In flowchart,
symbol of rectangle with one curvy side is used to show_____
a) Document printed
b) Document written
c) Data stored
d) Display output
Answer: A
106. In a flowchart
an input or output instruction is represented by_____
a) A rectangle
b) A rhombus
c) A parallelogram
d) A circle
Answer: C
107. Binary search
algorithm cannot be applied to_____
a) Sorted linked
list.
b) Sorted binary
trees.
c) Sorted linear
array.
d) Pointer array.
Answer: A
108. Connectors used
to connect flowchart symbols to each other are classified as_____
a) Arrow lines.
b) Symbols.
c) Annotation.
d) Special symbols.
Answer: B
109. An algorithm
that calls itself directly or indirectly is known as_____
a) Sub algorithm.
b) Recursion.
c) Polish notation.
d) Traversal
algorithm.
Answer: B
110. The advantage of
For…Next loops over Do…Loops is that they are: _____
a) easier to read and
maintain.
b) less prone to
being infinite loops.
c) good for working
with arrays.
d) All of the above.
Answer: D
121. Option button
can be grouped in a ______control.
a) label
b) text box.
c) frame
d) check box
Answer: C
122. origin of Visual
basic is_____
a) Cobol
b) Fortran
c) Basic
d) All Of the above.
Answer: C
123. In which year
Hyperlink was coined?
a) 1969
b) 191
c) 1964
d) 1955
Answer: C
124. Verification of
a login name and password is known as_____
a) Configuration.
b) Accessibility.
c) Authentication.
d) Logging in.
Answer: C
125. Referential
integrity of MS-Access denotes _______
a) The data of all
fields of a table must match with the data of the related table
b) A row of one table
must match with a row of the related table.
c) All the values in
foreign key field must match with the values of the primary key field of the
related table.
d) Any value in
foreign key field must match with the values of the primary key field of the
related table
Answer: C
126. The relational
model is concerned with _____
a) Data structure and
data integrity
b) Data manipulation
c) Both (a) and (b).
d) None of these
Answer: C
127. Cylinder symbol
represents ______
a) Magnetic Disk
b) Input
c) Connector
d) Annotation
Answer: A
128. The Worst case
occur in linear search algorithm when_____
a) Item is somewhere
in the middle of the array.
b) Item is not in the
array at all.
c) Item is the last
element in the array.
d) Item is the last
element in the array or is not there at all.
Answer: D
129. To write program
functions such as input four numbers and print their sum, program refinement
first level includes_____
a) input four numbers
b) calculate sum
c) print values
d) print variables
Answer: A
130. An array of
controls can be populated by: _____
a) assigning existing
controls to the array.
b) creating controls
and assigning them to the array.
c) borrowing controls
that will automatically assign them to the array.
d) Both a and b.
Answer: D
131. An Exception is
another name for a: _____
a) compile error.
b) logic error.
c) runtime error.
d) superficial error.
Answer: C
132. ARPANET stands
for: _____
a) Advanced Research
Policy Agency Network.
b) Advanced Research
Projects Agency Network.
c) Advanced Research
Projects Agency Norms.
d) Advanced Rejoin
Projects Agency Norms.
Answer: B
133. Which one of the
following is not a search engine?
a) Bing
b) Google
c) Yahoo
d) Windows
Answer: D
134. Safari browser
came into market in the year____
a) 2000
b) 2001
c) 2002
d) 2003
Answer: D
135. In internet
terminology IP means_____
a) Internet Provider
b) Internet Protocol
c) Internet Procedure
d) Internet Processor
Answer: B
136. The Internet was
originally a project for this Government agency_____
a) ARPA
b) NSF
c) NSA
d) FCC
Answer: A
137. Moving from one
website to another is called_____
a) Downloading
b) Browsing
c) Uploading
d) Attachment
Answer: B
138. Distinct parts
of documentation are_____
a) Technical
documentation.
b) Documentation for
user.
c) Program planning.
d) Both a and b.
Answer: D
139. Diamond shaped
symbol is used in flowcharts to show the_____
a) Decision box.
b) Statement box.
c) Error box.
d) If-statement box.
Answer: A
140. The first
Network_____
a) CNNET.
b) NSFNET.
c) ASAPNET.
d) ARPANET.
Answer: D
141. The extension of
standard modules is_____
a) .cls
b) .res
c) .bas
d) .xls
Answer: C
142. Which of the
following cases does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) Null Case
Answer: D
143. What is the full
form of CC option while Compose/Sending mail ?
a) Carbon copy
b) Copy carbon
c) Copy to copy
d) Carbon to Connect
Answer: A
144. What is the
minimum bandwidth required for broadband connection?
a) 128 kbps
b) 256 kbps
c) 512 kbps
d) 2048 kbps
Answer: B
145. When flowchart
direction lines are unclear then the programmer can use
a) arrows
b) horizontal lines
c) vertical lines
d) inverted triangle
Answer: A
146. Which of the
following is not the required condition for binary search algorithm?
a) The list must be
sorted.
b) There should be
the direct access to the. middle element in any sublist
c) There must be
mechanism to delete and/or insert elements in list
d) none of above
Answer: C
147. How many values
a CheckBox can have ?
a) 1
b) 2
c) 3
d) 4
Answer: C
148. Key fields of
the ConnectionString property are_____
a) Provider
b) Mode
c) Provider &
Data Source
d) Data Source
Answer: D
149. Link with
another part of program or connectors in flowchart are shown in_____
a) rhombus
b) parallelogram
c) circle
d) trapezoid
Answer: C
150. LIST Property is
used_____
a) Command Button
b) Label
c) TextBox
d) ComboBox
Answer: D
151. MAN refers to ?
a) Mega Area Network
b) Metropolitan Area
Network.
c) Mini Area Network.
d) Medium Area
Network.
Answer: B
152. In a relational
database, a Referential Integrity constraint is specified with the help of_____
a) Primary Key
b) Foreign Key
c) Both (a) and (b).
d) None of these
Answer: B
153. In a URL what
does .org represents_____
a) educational
institute
b) military site
c) organization
d) commercial
Answer: C
2 Comments