- The pair of files used to produce merged letters during a mail merge is?
- Primary document and data source
- Primary document and merged letters
- Data source and merged letters
- Primary document and current letter
- Text entered into a spreadsheet is aligned towards the left by default. These entries are called
- values
- labels
- formulae
- functions
- Which of the following formatting features is unique to numbers in spreadsheet?
- Bold
- Custom
- Italics
- Indent
- To center the title rows of a spreadsheet across the column
- Center align the title rows
- Center align the title columns
- Merge and center the title rows
- Merge and center the title columns
- Formulae in a spreadsheet involve
- Cell addresses, values and labels
- Cell addresses, values and mathematical operators
- Cell addresses and labels
- Cell addresses and values
- Which of the following statements is NOT true of primary keys?
- They do not contain blank value
- They are unique identifiers
- They are always in text form
- They may be composed of one or more attributes
- The shortcut key that can be used to activate or open the find and replace screen is
- CtrlG
- CtrlH
- AltG
- AltH
- Footers are found at the ……………..of a document.
- Bottom of every page
- Top of every page
- End of a page
- end
- Susan is using the ‘Find and Replace’ feature of a word processing tool, to search for the word “DELL”, in a document that she is typing. Which word or words can be found if she has the “Match case’ option disabled?
- dell
- Dell
- DELL
- DeLL
- All of the above
- The following words could be found in the document that Susan typed
sad set star street
Susan performed a ‘Find and Replace’ action with the ‘Find what’ entry set to “s?t” and the ‘Use wildcard’ option selected. Which string from the list above would be found?
- sad
- set
- star
- street
- Software piracy involves………………
- The authorized copying, use or selling of software that is copyrighted.
- The authorized copying, use or selling of software that is not copyrighted.
- The unauthorized copying, use or selling of software that is copyrighted.
- The unauthorized copying, use or selling of software that is not copyrighted.
- The purpose of the icon Σ is to
- Move data to the clipboard
- Insert a sum formula on the worksheet
- Access the chart wizard
- Provide on-screen help
- A field in a table appears as a match of the primary key in another table is called a
- Candidate key
- Secondary key
- Foreign key
- Composite key
- Given the following algorithm
Jß5
Kß J
Jß J+K
Kß J+3
Display K
The value displayed for K is?
- 10
- 11
- 13
- 14
- The following variables s, t and u have been assigned the values shown
Sß 5
Tß 6
Uß 3
Which of the following statements does NOT evaluate to TRUE?
- U>7 and T <=7
- S< T or U < S – 2
- U – 2 >= 1
- T <> 4 or s = 5
- Which of the following algorithms satisfies the requirement of asking the user to input two numbers, calculate the average and displaying the result
- Display ‘Enter two numbers’
Input a, b
Cß(a+b)/2
Display C
- Input a, b
Cß(a+b)/2
Display c
- Display ‘Enter two numbers’
Input a,b
Cßa+b/2
Display C
- Input a, b
Cßa+b/2
Display C
Leave a Comment