Òåñò: ÈÊÒ %
Ñïèñîê âîïðîñîâ
1. We use queries for updating data to add, change or delete |
|
1) A part of one or more records in the database | |
2) Required to enter numbers | |
3) Required to skip that field | |
4) Required not to enter anything | |
5) The entire record | |
2. To update the data in a table, we use the command |
|
1) Caption | |
2) Hyperlink | |
3) Update | |
4) Modify Table | |
5) Alter Table | |
3. Using the command DELETE |
|
1) Required to enter numbers | |
2) Required to skip that field | |
3) Required not to enter anything | |
4) We remove the entire table from the database | |
5) We delete individual records in the tables | |
4. Which tool from the Tools menu do we use to create connections? |
|
1) Caption | |
2) Modify Table | |
3) Relationships | |
4) Spelling | |
5) Analyze | |
5. Relationship between two tables in which the primary key value of each record in the primary table corresponds to the value in the appropriate field or fields of many records in the connected table is called |
|
1) Many-to-many-to-one | |
2) One-to-many | |
3) Many-to-one | |
4) One-to-one | |
5) Many-to-many | |
6. Which keyboard key should you use to move the cursor to the next cell in a table? |
|
1) Esc | |
2) Backspace | |
3) F1 | |
4) Tab | |
5) Caps Lock | |
7. When the spreadsheet application recognizes the entered content as a number, how will it be aligned within a cell? |
|
1) Horizontal | |
2) Justified | |
3) Central | |
4) Aligned left | |
5) Aligned right | |
8. Which of the following actions is necessary in order to add content to a non-empty cell? |
|
1) Double-click the cell and enter the additional content | |
2) Enter the additional content | |
3) Right click the cell and enter the additional content | |
4) Left-click the cell and enter the additional content | |
5) Select the cell that you want to modify and enter the additional content | |
9. How do we call the cell references that adapt while being copied to the consecutive cells with Fill Series option? |
|
1) Totally | |
2) Absolute cell reference | |
3) Relative cell references | |
4) Relational cell references | |
5) Relevant cell references | |
10. Which of the following commands should you use to remove the content from a range, but leave, for example, the fill color intact? |
|
1) Del Formats | |
2) Delete Everything Except Colors | |
3) Clear Formats | |
4) Clear All | |
5) Clear Contents | |
11. Which file extension indicates Microsoft Excel 2007 and 2010 files? |
|
1) .doc | |
2) .xlsx | |
3) .jpeg | |
4) .vmv | |
5) .mdb | |
12. Formula writing starts by entering |
|
1) | | |
2) = | |
3) $ | |
4) * | |
5) / | |
13. How many default Worksheets are there in a Workbook? |
|
1) 3 | |
2) 6 | |
3) 5 | |
4) 4 | |
5) 2 | |
14. How does Microsoft Excel application align text? |
|
1) Horizontal | |
2) Justify | |
3) Central | |
4) To the left cell margin | |
5) To the right cell margin | |
15. Column width is changed by |
|
1) The home tab | |
2) Left mouse button, right mouse button | |
3) The file tab | |
4) View tab | |
5) Page layout tab | |
16. A worksheet is deleted by the command Delete which is located in |
|
1) the Home tab or the right click pop-up menu | |
2) left mouse button | |
3) TheView tab | |
4) Page Layout tab | |
5) The File tab | |
17. SUM function presents |
|
1) Adjustingcellbackgroundcolour | |
2) Sum of results above, under or between the selected cell | |
3) Sum of values of a particular cell range | |
4) The number of cells with data inserted | |
5) The sum of all worksheet cells | |
18. In order to, for example, round the number in E3 cell to one decimal, which of the following functions is inserted? |
|
1) =ROUND(E3,1) | |
2) =ZAOKR(address=E3,number decimal=1) | |
3) =ROUND(address=E3,number decimal= 1) | |
4) = IF(cellE3, decimal1) | |
5) =ZAOKR(E3,1) | |
19. New rows within a cell can be added by pressing |
|
1) SHIFT+CTRL+F2 | |
2) Alignment | |
3) New Line in Same Cell | |
4) Ctrl+ Enter | |
5) Alt+Enter | |
20. What is the keyboard shortcut for adding or editing comments? |
|
1) ALT+CTRL+F2 | |
2) ALT+F2 | |
3) SHIFT+CTRL+F2 | |
4) CTRL+F2 | |
5) SHIFT+F2 | |
21. To record a macro, we use the Macros tool and which other button? |
|
1) Add Macro | |
2) Record Macro | |
3) Delete Macro | |
4) Save Macro | |
5) View Macros | |
22. If cell A1 contains the text "reflections association", what will the formula =PR0PER (A1) display? |
|
1) A129 | |
2) Reflections Association | |
3) A1 | |
4) lookup | |
5) Some error | |
23. What is the maximum number of nested IF functions in a single formula? |
|
1) 32 | |
2) 128 | |
3) 64 | |
4) 16 | |
5) 8 | |
24. Using the OR function and some range of arguments that does not contain logical values, OR returns which error? |
|
1) # VALUE! | |
2) #NULL! | |
3) #DIV/0! | |
4) #N/A | |
5) #REF! | |
25. Excel passwords can have up to ______ letters, numbers, spaces and symbols |
|
1) 255 | |
2) 125 | |
3) 256 | |
4) 512 | |
5) 128 | |
26. Which command removes the protection from a worksheet? |
|
1) Unlock | |
2) Lock | |
3) Protect and share work book | |
4) Protect sheet | |
5) Unprotect sheet | |
27. In addition to the Home tab, which other tab also contains the buttons for sorting and filtering? |
|
1) Formulas | |
2) Page Layout | |
3) File | |
4) Insert | |
5) Data | |
28. Control in VR occurs by contact and contactless ways. When contacting the user uses |
|
1) File | |
2) monitor | |
3) computer | |
4) Steering wheel, Pedals | |
5) gun with target designation function | |
29. In which menu is the Sort command located? |
|
1) View | |
2) Tools | |
3) Data | |
4) Insert | |
5) File | |
30. Which of the following functions adds up all the numbers in a range that meet a certain condition? |
|
1) SUMIF | |
2) COUNTA | |
3) ROUND | |
4) IF | |
5) COUNTIF | |
31. In cells from A17 to A24 we have the following numbers: 15, 20,10, -30, 5, -70,10 and -25; which of the following formulas will add up only the numbers greater than zero? |
|
1) #ÈÌß? | |
2) #ÈÌß? | |
3) =SUMIF(A17:A24, | |
4) =SUMIF(A17:A24, | |
5) #ÈÌß? | |
32. Files that are templates of spreadsheets have the extension |
|
1) .xlt (.xltx) | |
2) .docx | |
3) .csv | |
4) .xml (.xmlx) | |
5) .xls (.xlsx in Microsoft Office 2007 onwards) | |
33. Function =TODAY() returns which of the following? |
|
1) yesterday date | |
2) today's date | |
3) which month of the year it is | |
4) what year it is | |
5) what day of the week it is | |
34. Which of the following functions adds up all the values in a range that meet a certain condition? |
|
1) IF | |
2) COUNTA | |
3) ROUND | |
4) SUMIF | |
5) COUNTIF | |
35. Reference $b$2 indicates that the cell address is |
|
1) Absolute | |
2) About | |
3) Value | |
4) Relative | |
5) Mixed | |
36. What characterizes a WLAN network? |
|
1) It has a wireless connection | |
2) Only video clips | |
3) It only works outdoors | |
4) It has a wired connection | |
5) It only works indoors | |
37. A collection of computers and devices connected together and in this collection, computers can exchange and share information and resources |
|
1) Multimedia | |
2) Cloud | |
3) Networks | |
4) Data management | |
5) Data analysis | |
38. Which type of computer stores the common files in a network? |
|
1) USB Thumb Drive | |
2) Desktop | |
3) Laptop | |
4) Main frame | |
5) Server | |
39. Which of the following devices do you need to be able to communicate with other computers using the telephone network? |
|
1) A network operating system | |
2) Modem | |
3) Speakers | |
4) Plotter | |
5) CD-ROM | |
40. The speed of the Modem is measured in |
|
1) Bits per second (Bps) | |
2) Podcast | |
3) Megabytes (MB) | |
4) Gigabytes (GB) | |
5) Megahertz (MHz) | |
41. The practice of defending computers and servers, mobile devices, electronic systems, networks and data from malicious attacks |
|
1) Multimedia technologies | |
2) Cloud technologies | |
3) Data management | |
4) Cybersafety | |
5) Data analysis | |
42. What is important for an anti-virus program to effectively find computer viruses? |
|
1) Make sure it is recently backed up | |
2) Make sure it is not a free program version | |
3) Make sure it is checking system files only | |
4) Make sure it is updated regularly | |
5) An image editing application | |
43. Which one of the following is the best way to protect a computer against computer viruses? |
|
1) Only virus-check e-mail attachments | |
2) Always make sure that the operating system is up to date | |
3) Only download files from the Internet during business hours | |
4) All passwords are made up of less than four characters | |
5) Update antivirus software on a regular basis | |
44. What is the best way to prevent a computer virus from entering your computer? |
|
1) Install and use anti-virus software on your computer | |
2) Log out of your computer each time you have finished using it | |
3) Do not use emails on your machine | |
4) Make sure all your files are safely stored to your floppy disks | |
5) It gives the user the right to modify the software | |
45. Which one of the following protects a computer from the risk of malicious programs? |
|
1) Anti-spyware software | |
2) PC diagnostic software | |
3) Web tracking software | |
4) Anti-spam software | |
5) Maintaining regularly updated anti-virus software | |
46. Which one of the following describes why it is important to update antivirus software regularly? |
|
1) To ensure the software identifies old viruses | |
2) To protect your computer from all known viruses | |
3) To protect your computer from unwanted bulk messages | |
4) To prevent the spread of malicious programs on the Internet | |
5) A skilled programmer who writes programs to train new employees | |
47. Which one of the following describes a computer hacker? |
|
1) A skilled programmer who uses authorized access to exploit information available on a computer | |
2) A skilled programmer who writes programs to train new employees | |
3) A skilled programmer who secretly invades computers without authorization | |
4) Opening only virus-checked file attachments from known sources | |
5) A skilled programmer who helps in the installation of new software for an organization | |
48. Which one of the following statements about the Internet is TRUE? |
|
1) The Internet is a private company network | |
2) The Internet is a global network that links many computer networks together | |
3) The Internet is a visual representation of linked documents | |
4) The Internet is a network operating system | |
5) Lack of human contact | |
49. Which type of software is used to access the Internet? |
|
1) Interface | |
2) Presentation | |
3) System | |
4) Spreadsheet | |
5) Browser | |
50. The Internet service that enable us to "surf the Web" (browse through web pages connected with hyperlinks) is called |
|
1) World Wide Web (WWW) | |
2) Internet | |
3) Hypertext Transfer Protocol (HTTP) | |
4) Uniform Resource Locator (URL) | |
5) Transmission Control Protocol Internet Protocol (TCP IP) |