Òåñò: ÈÊÒ %


Ñïèñîê âîïðîñîâ


1. We use queries for updating data to add, change or delete

1) A part of one or more records in the database
2) Required to enter numbers
3) Required to skip that field
4) Required not to enter anything
5) The entire record

2. To update the data in a table, we use the command

1) Caption
2) Hyperlink
3) Update
4) Modify Table
5) Alter Table

3. Using the command DELETE

1) Required to enter numbers
2) Required to skip that field
3) Required not to enter anything
4) We remove the entire table from the database
5) We delete individual records in the tables

4. Which tool from the Tools menu do we use to create connections?

1) Caption
2) Modify Table
3) Relationships
4) Spelling
5) Analyze

5. Relationship between two tables in which the primary key value of each record in the primary table corresponds to the value in the appropriate field or fields of many records in the connected table is called

1) Many-to-many-to-one
2) One-to-many
3) Many-to-one
4) One-to-one
5) Many-to-many

6. Which keyboard key should you use to move the cursor to the next cell in a table?

1) Esc
2) Backspace
3) F1
4) Tab
5) Caps Lock

7. When the spreadsheet application recognizes the entered content as a number, how will it be aligned within a cell?

1) Horizontal
2) Justified
3) Central
4) Aligned left
5) Aligned right

8. Which of the following actions is necessary in order to add content to a non-empty cell?

1) Double-click the cell and enter the additional content
2) Enter the additional content
3) Right click the cell and enter the additional content
4) Left-click the cell and enter the additional content
5) Select the cell that you want to modify and enter the additional content

9. How do we call the cell references that adapt while being copied to the consecutive cells with Fill Series option?

1) Totally
2) Absolute cell reference
3) Relative cell references
4) Relational cell references
5) Relevant cell references

10. Which of the following commands should you use to remove the content from a range, but leave, for example, the fill color intact?

1) Del Formats
2) Delete Everything Except Colors
3) Clear Formats
4) Clear All
5) Clear Contents

11. Which file extension indicates Microsoft Excel 2007 and 2010 files?

1) .doc
2) .xlsx
3) .jpeg
4) .vmv
5) .mdb

12. Formula writing starts by entering

1) |
2) =
3) $
4) *
5) /

13. How many default Worksheets are there in a Workbook?

1) 3
2) 6
3) 5
4) 4
5) 2

14. How does Microsoft Excel application align text?

1) Horizontal
2) Justify
3) Central
4) To the left cell margin
5) To the right cell margin

15. Column width is changed by

1) The home tab
2) Left mouse button, right mouse button
3) The file tab
4) View tab
5) Page layout tab

16. A worksheet is deleted by the command Delete which is located in

1) the Home tab or the right click pop-up menu
2) left mouse button
3) TheView tab
4) Page Layout tab
5) The File tab

17. SUM function presents

1) Adjustingcellbackgroundcolour
2) Sum of results above, under or between the selected cell
3) Sum of values of a particular cell range
4) The number of cells with data inserted
5) The sum of all worksheet cells

18. In order to, for example, round the number in E3 cell to one decimal, which of the following functions is inserted?

1) =ROUND(E3,1)
2) =ZAOKR(address=E3,number decimal=1)
3) =ROUND(address=E3,number decimal= 1)
4) = IF(cellE3, decimal1)
5) =ZAOKR(E3,1)

19. New rows within a cell can be added by pressing

1) SHIFT+CTRL+F2
2) Alignment
3) New Line in Same Cell
4) Ctrl+ Enter
5) Alt+Enter

20. What is the keyboard shortcut for adding or editing comments?

1) ALT+CTRL+F2
2) ALT+F2
3) SHIFT+CTRL+F2
4) CTRL+F2
5) SHIFT+F2

21. To record a macro, we use the Macros tool and which other button?

1) Add Macro
2) Record Macro
3) Delete Macro
4) Save Macro
5) View Macros

22. If cell A1 contains the text "reflections association", what will the formula =PR0PER (A1) display?

1) A129
2) Reflections Association
3) A1
4) lookup
5) Some error

23. What is the maximum number of nested IF functions in a single formula?

1) 32
2) 128
3) 64
4) 16
5) 8

24. Using the OR function and some range of arguments that does not contain logical values, OR returns which error?

1) # VALUE!
2) #NULL!
3) #DIV/0!
4) #N/A
5) #REF!

25. Excel passwords can have up to ______ letters, numbers, spaces and symbols

1) 255
2) 125
3) 256
4) 512
5) 128

26. Which command removes the protection from a worksheet?

1) Unlock
2) Lock
3) Protect and share work book
4) Protect sheet
5) Unprotect sheet

27. In addition to the Home tab, which other tab also contains the buttons for sorting and filtering?

1) Formulas
2) Page Layout
3) File
4) Insert
5) Data

28. Control in VR occurs by contact and contactless ways. When contacting the user uses

1) File
2) monitor
3) computer
4) Steering wheel, Pedals
5) gun with target designation function

29. In which menu is the Sort command located?

1) View
2) Tools
3) Data
4) Insert
5) File

30. Which of the following functions adds up all the numbers in a range that meet a certain condition?

1) SUMIF
2) COUNTA
3) ROUND
4) IF
5) COUNTIF

31. In cells from A17 to A24 we have the following numbers: 15, 20,10, -30, 5, -70,10 and -25; which of the following formulas will add up only the numbers greater than zero?

1) #ÈÌß?
2) #ÈÌß?
3) =SUMIF(A17:A24,
4) =SUMIF(A17:A24,
5) #ÈÌß?

32. Files that are templates of spreadsheets have the extension

1) .xlt (.xltx)
2) .docx
3) .csv
4) .xml (.xmlx)
5) .xls (.xlsx in Microsoft Office 2007 onwards)

33. Function =TODAY() returns which of the following?

1) yesterday date
2) today's date
3) which month of the year it is
4) what year it is
5) what day of the week it is

34. Which of the following functions adds up all the values in a range that meet a certain condition?

1) IF
2) COUNTA
3) ROUND
4) SUMIF
5) COUNTIF

35. Reference $b$2 indicates that the cell address is

1) Absolute
2) About
3) Value
4) Relative
5) Mixed

36. What characterizes a WLAN network?

1) It has a wireless connection
2) Only video clips
3) It only works outdoors
4) It has a wired connection
5) It only works indoors

37. A collection of computers and devices connected together and in this collection, computers can exchange and share information and resources

1) Multimedia
2) Cloud
3) Networks
4) Data management
5) Data analysis

38. Which type of computer stores the common files in a network?

1) USB Thumb Drive
2) Desktop
3) Laptop
4) Main frame
5) Server

39. Which of the following devices do you need to be able to communicate with other computers using the telephone network?

1) A network operating system
2) Modem
3) Speakers
4) Plotter
5) CD-ROM

40. The speed of the Modem is measured in

1) Bits per second (Bps)
2) Podcast
3) Megabytes (MB)
4) Gigabytes (GB)
5) Megahertz (MHz)

41. The practice of defending computers and servers, mobile devices, electronic systems, networks and data from malicious attacks

1) Multimedia technologies
2) Cloud technologies
3) Data management
4) Cybersafety
5) Data analysis

42. What is important for an anti-virus program to effectively find computer viruses?

1) Make sure it is recently backed up
2) Make sure it is not a free program version
3) Make sure it is checking system files only
4) Make sure it is updated regularly
5) An image editing application

43. Which one of the following is the best way to protect a computer against computer viruses?

1) Only virus-check e-mail attachments
2) Always make sure that the operating system is up to date
3) Only download files from the Internet during business hours
4) All passwords are made up of less than four characters
5) Update antivirus software on a regular basis

44. What is the best way to prevent a computer virus from entering your computer?

1) Install and use anti-virus software on your computer
2) Log out of your computer each time you have finished using it
3) Do not use emails on your machine
4) Make sure all your files are safely stored to your floppy disks
5) It gives the user the right to modify the software

45. Which one of the following protects a computer from the risk of malicious programs?

1) Anti-spyware software
2) PC diagnostic software
3) Web tracking software
4) Anti-spam software
5) Maintaining regularly updated anti-virus software

46. Which one of the following describes why it is important to update antivirus software regularly?

1) To ensure the software identifies old viruses
2) To protect your computer from all known viruses
3) To protect your computer from unwanted bulk messages
4) To prevent the spread of malicious programs on the Internet
5) A skilled programmer who writes programs to train new employees

47. Which one of the following describes a computer hacker?

1) A skilled programmer who uses authorized access to exploit information available on a computer
2) A skilled programmer who writes programs to train new employees
3) A skilled programmer who secretly invades computers without authorization
4) Opening only virus-checked file attachments from known sources
5) A skilled programmer who helps in the installation of new software for an organization

48. Which one of the following statements about the Internet is TRUE?

1) The Internet is a private company network
2) The Internet is a global network that links many computer networks together
3) The Internet is a visual representation of linked documents
4) The Internet is a network operating system
5) Lack of human contact

49. Which type of software is used to access the Internet?

1) Interface
2) Presentation
3) System
4) Spreadsheet
5) Browser

50. The Internet service that enable us to "surf the Web" (browse through web pages connected with hyperlinks) is called

1) World Wide Web (WWW)
2) Internet
3) Hypertext Transfer Protocol (HTTP)
4) Uniform Resource Locator (URL)
5) Transmission Control Protocol Internet Protocol (TCP IP)