CITA & DITA Computer Question & Answer | YCTC CITA & DITA Computer Exam Question & Answer Paper SET – 2

Last Updated:

CITA & DITA Computer Question & Answer | YCTC CITA and DITA Computer Exam Question & Answer Paper

CITA & DITA Computer Question & Answer

Download App
Computer MCQ APP

 

  1. Which are the standard prefixes for the text box and label controls respectively?
    a.) tex and lbl
    b.) tex and lab
    c.) txb and lbl
    d.) txb and lab
    e.) txt and labAnswer: c
  2. Which task is accomplished in the Code editor?
    a.) Adding forms to the project
    b.) Adding controls to the form
    c.) Adding event procedures to the form
    d.) Both a and b.
    e.) All of the above.Answer: c
  3. An object is composed of:
    a.) properties.
    b.) methods.
    c.) events.
    d.) Both a and b.
    e.) All of the above.Answer: e
  4. Which statement about objects is true?
    a.) One object is used to create one class.
    b.) One class is used to create one object.
    c.) One object can create many classes.
    d.) One class can create many objects.
    e.) There is no relationship between objects and classes.Answer: d
  5. Which is not true about forms and controls in Visual Basic?
    a.) They are pre-built.
    b.) They are graphical objects.
    c.) New versions of the classes must be created with each project.
    d.) Buttons can be created with the drag and drop method.
    e.) All of the above are true.Answer: c

  6. Which is an example of Visual Basic Objects?
    a.) Control objects
    b.) ASP.NET
    c.) ADO.NET
    d.) Both a and b.
    e.) All of the above.Answer: e
  7. The .Net class library:
    a.) contains over 25,000 classes.
    b.) uses namespaces to manage all of the classes.
    c.) has the System. Form namespace for classes used in Windows-based application.
    d.) Both a and b.
    e.) All of the above.Answer: d
  8. Which is not a property of the Common control class?
    a.) Show
    b.) Back Color
    c.) Font
    d.) Fore Color
    e.) NameAnswer: a
  9. Which property determines whether a control is displayed to the user?
    a.) Hide
    b.) Show
    c.) Visible
    d.) Enabled
    e.) CursorAnswer: c
  10. The Button control can be activated:
    a.) programmatically through the click event.
    b.) by clicking the button with the mouse.
    c.) with the form’s Default Button property.
    d.) Both a and b.
    e.) All of the above.Answer: d

11. The complexity of the average case of an algorithm is_____
a) Much more complicated to analyze than that of worst case
b) Much more simpler to analyze than that of worst case
c) Sometimes more complicated and some other times simpler than that of worst case
d) None or above
Answer: A

12. What is the internet explorer ?
a) An icon
b) a file manager
c) A browser
d) an Internet
Answer: C

13. ______ is text with hyperlinks.
a) Lower Text
b) Upper Text
c) Toggle Text
d) Hypertext
Answer: D

14. Program flowcharts are the parts of_____
a) operation chart
b) process chart
c) algorithms flowchart
d) system flowcharts
Answer: C

15. If you Convert Numeric to Character expression then use_____
a) Str( )
b) Val( )
c) Instr( )
d) Len( )
Answer: A

16. How many MDI forms can be added in a Project File ?
a) 3
b) 1
c) 2
d) 4
Answer: B

17. A module-level is available to all the _______ in the module
a) Data
b) Procedures
c) Event.
d) Task
Answer: B

18. In the IDE, which of following is used to design the layout of an application?
a) Form Designer window.
b) Project Explorer window.
c) Context Menu.
d) Form Layout window.
Answer: A

19. Code window consists of a ______ box and procedure list box
a) Object.
b) Event.
c) Tool.
d) Message.
Answer: A

20. Code in VB is stored in______
a) Module.
b) Report.
c) Both (a) and (b).
d) None of above.
Answer: A
41. Tables in any database related to one another through ______
a) Primary Key
b) Foreign Key
c) Composite Key
d) Alternate Key
Answer: B

42. Internet Explorer came into market in the year_____
a) 1994
b) 1995
c) 1996
d) 1997
Answer: B

43. Internet explorer falls under_____
a) Operating System
b) Compiler
c) Browser
d) IP address
Answer: C

44. Firefox came into market in the year____?
a) 2001
b) 2003
c) 2002
d) 2004
Answer: D

45. What should be minimum requirement of random access memory (RAM) for internet access?
a) 8 MB
b) 16 MB
c) 32 MB
d) 64 MB
Answer: C

46. A person who produces or creates new programs for industrial and business users is called____?
a) System analysts
b) Program coordinator
c) Computer coordinator
d) User interface
Answer: A

47. In a flowchart a calculation (process) is represented by____.
a) A rectangle
b) A rhombus
c) A parallelogram
d) A circle
Answer: A

48. Dim statement is used to _____.
a) Declare only string variables.
b) Declare only integer variables.
c) Declare the variables.
d) None of these.
Answer: C

49. The Activated event is found only in which object?
a) Form.
b) Button
c) TextBox
d) Label
Answer: A

50. Which datatype store yes/no type data ?
a) Variant
b) Integer
c) Boolean
d) String
Answer: C

51. In Flowcharts of algorithms, messages are classified as_____
a) steps of algorithm
b) selection of steps
c) cancellation of procedures
d) addition of steps
Answer: A

52. In flowcharts, a circle with a vertical line drawn is a symbol used to show_____
a) systematic operation
b) manual operation
c) magnetic tape
d) display screen
Answer: C

53. Symbol used in flowchart such as rectangle with horizontal lines on two sides is used for_____
a) rhombus
b) parallelogram
c) circle
d) trapezoid
Answer: C

54. The ____ statement checks in the module for usage of any undeclared variables and reports an error tothe user.
a) looping
b) iteration.
c) dim
d) external
Answer: C

55. The _____property in Visual basic is common for many a tools.
a) location.
b) Place.
c) window status.
d) name
Answer: D

56. What are the three algorithm constructs?
a) Sequence, selection, repetition.
b) Input, output, process.
c) Input/output, decision, terminator.
d) Loop, input/output, process.
Answer: A

57. Blink the Cursor in specific Textbox then use_____
a) Caption
b) List
c) Val( )
d) Setfocus
Answer: D

58. In order to use cable for browsing web you will need : _____
a) A cable modem.
b) Network Interface Card (NIC).
c) Both (a) & (b).
d) None Of the above.
Answer: C

59. The space factor when determining the efficiency of algorithm is measured by_____
a) Counting the maximum memory needed by the algorithm.
b) Counting the minimum memory needed by the algorithm.
c) Counting the average memory needed by the algorithm.
d) Counting the maximum disk space needed by the algorithm.
Answer: A

60. The time factor when determining the efficiency of algorithm is measured by_____
a) Counting microseconds.
b) Counting the number of key operations.
c) Counting the number of statements.
d) Counting the kilobytes of algorithm.
Answer: B
41. Tables in any database related to one another through ______
a) Primary Key
b) Forign Key
c) Composite Key
d) Alternate Key
Answer: B

42. Internet Explorer came into market in the year_____
a) 1994
b) 1995
c) 1996
d) 1997
Answer: B

43. Internet explorer falls under_____
a) Operating System
b) Compiler
c) Browser
d) IP address
Answer: C

44. Firefox came into market in the year____?
a) 2001
b) 2003
c) 2002
d) 2004
Answer: D

45. What should be minimum requirement of random access memory (RAM) for internet access?
a) 8 MB
b) 16 MB
c) 32 MB
d) 64 MB
Answer: C

46. A person who produces or creates new programs for industrial and business users is called____?
a) System analysts
b) Program coordinator
c) Computer coordinator
d) User interface
Answer: A

47. In a flowchart a calculation (process) is represented by____.
a) A rectangle
b) A rhombus
c) A parallelogram
d) A circle
Answer: A

48. Dim statement is used to _____.
a) Declare only string variables.
b) Declare only integer variables.
c) Declare the variables.
d) None of these.
Answer: C

49. The Activated event is found only in which object?
a) Form.
b) Button
c) TextBox
d) Label
Answer: A

50. Which datatype store yes/no type data ?
a) Varient
b) Integer
c) Boolean
d) String
Answer: C
51. In Flowcharts of algorithms, messages are classified as_____
a) steps of algorithm
b) selection of steps
c) cancellation of procedures
d) addition of steps
Answer: A

52. In flowcharts, a circle with a vertical line drawn is a symbol used to show_____
a) systematic operation
b) manual operation
c) magnetic tape
d) display screen
Answer: C

53. Symbol used in flowchart such as rectangle with horizontal lines on two sides is used for_____
a) rhombus
b) parallelogram
c) circle
d) trapezoid
Answer: C

54. The ____ statement checks in the module for usage of any undeclared variables and reports an error tothe user.
a) looping
b) iteration.
c) dim
d) external
Answer: C

55. The _____property in Visual basic is common for many a tools.
a) location.
b) Place.
c) window status.
d) name
Answer: D

56. What are the three algorithm constructs?
a) Sequence, selection, repetition.
b) Input, output, process.
c) Input/output, decision, terminator.
d) Loop, input/output, process.
Answer: A

57. Blink the Cursor in specific Textbox then use_____
a) Caption
b) List
c) Val( )
d) Setfocus
Answer: D

58. In order to use cable for browsing web you will need : _____
a) A cable modem.
b) Network Interface Card (NIC).
c) Both (a) & (b).
d) None Of the above.
Answer: C

59. The space factor when determining the efficiency of algorithm is measured by_____
a) Counting the maximum memory needed by the algorithm.
b) Counting the minimum memory needed by the algorithm.
c) Counting the average memory needed by the algorithm.
d) Counting the maximum disk space needed by the algorithm.
Answer: A

60. The time factor when determining the efficiency of algorithm is measured by_____
a) Counting microseconds.
b) Counting the number of key operations.
c) Counting the number of statements.
d) Counting the kilobytes of algorithm.
Answer: B
61. Controls are: _____
a) Code
b) Method
c) Object
d) None
Answer: C

62. DCL Provides Commands To Perform Actions Like_____
a) Change The Structure Of Tables.
b) Insert, Update Or Delete Records And Data Values
c) Authorizing Access And Other Control Over Database
d) None Of Above
Answer: C

63. Debug window is the same as ____ window.
a) procedure.
b) object.
c) form
d) code
Answer: D

64. Autoredraw = True Property is used for_____
a) Display Text on Command Button
b) Display Text on Label
c) Display Text on Frame
d) Display Some Text on Form Body
Answer: D

65. What is name of format : abc@rediffmail.com?
a) Email Id
b) Web site
c) WordProcessor
d) None
Answer: A

66. Which of the following sorting algorithms is of divide-and-conquer type?
a) Bubble sort
b) Insertion sort
c) Quick sort
d) All of above
Answer: C

67. Which one is not the property of algorithm?
a) Generality
b) Infiniteness
c) Finiteness
d) Correctness
Answer: B

68. MAX Property is for_____
a) Label
b) TextBox
c) HScrollBar
d) ComboBox
Answer: C

69. What Are The Different Views To Display A Table?
a) Datasheet view
b) Design view
c) Pivot table and Pivot Chart view
d) All of above
Answer: D

70. MS-Access is a _____
a) RDBMS package.
b) Language.
c) Drawing package.
d) Operating system.
Answer: A
71. How many types of query are present in MS-Access?
a) 6
b) 3
c) 8
d) 9
Answer: D

72. Property of primary key is _______
a) Unique.
b) Not null.
c) Indexed.
d) All of above.
Answer: D

73. Following Is Not A Database Model_____
a) Network Database Model.
b) Relational Database Model.
c) Object Oriented Database Model.
d) None.
Answer: D

74. What is the difference between ‘Open’ and ‘Open Exclusively’?
a) Open statement opens access database files and Open Exclusively opens database files of other program like Oracle.
b) Open Exclusive locks whole database so that no one can access it whereas Open locks only the record that is being accessed.
c) Both Open and Open Exclusively are same.
d) Open Exclusive command does not exist in MS Access.
Answer: B

75. All components work together as a unit is called____
a) System
b) Component classification
c) Storing system
d) Operating system
Answer: A

76. In flowchart, invert trapezoid is used to show the____
a) On-line storage symbol
b) Manual operations
c) Communication link
d) Show annotations
Answer: B

77. Flowchart act as a guide or blue print during the system analysis. It is a advantage is called____
a) Communication
b) Proper Debugging
c) Effective Analysis
d) Efficient Coding
Answer: D

78. DHCP stands for____
a) Dynamic Host Configuration Protocol
b) Dual Host Configuration Protocol
c) Dual Host Control Protocol
d) Dynamic Host Control Protocol
Answer: A

79. The application name always appears in the_____
a) Titlebar
b) Menubar
c) Properties window
d) Code window
Answer: A

80. In flowchart, parallelogram is used to show_____
a) General input symbol
b) Operation on data
c) Online use of keyboard
d) Output data screen
Answer: A
81. Default data type of a variable in VB is_____
a) Integer
b) String
c) Float
d) Variant
Answer: D

82. DHCP stands for_____
a) Dynamic Host Configuration Protocol.
b) Dual Host Configuration Protocol
c) Dual Host Control Protocol
d) Dynamic Host Control Protocol
Answer: A

83. Shortcut of Web page Refresh is_____
a) F4
b) F5
c) F6
d) F7
Answer: B

84. Stock maintaining control system in store which consists hardware and software to contact and manage suppliers is called_____
a) system
b) component classification
c) information processing system
d) operating system
Answer: C

85. DNS stands for_____
a) Direct Naming System
b) Drive Naming Society
c) Domain Name System
d) Development New Society
Answer: C

86. Dynamic arrays can be declared when the user may not know the _____of the array at design time.
a) exact column.
b) exact variable.
c) exact value.
d) exact size.
Answer: D

87. Each computer connected to the internet must_____
a) have a unique HTTP address
b) be an IBM PC
c) have a modem connection
d) Switch
Answer: B

88. E-Mail : The Inbox is collection of_____
a) Deleted Mail
b) Draft Mails
c) Spam Mails
d) Incoming Mails
Answer: D

89. E-mail addresses separate the user name from the ISP using the __________ symbol.
a) &
b) @
c) #
d) %
Answer: B

90. Which language is not a true object-oriented programming language?
a) VB.NET
b) VB 6
c) C++
d) Java
Answer: B
91. Uses of Internet_____
a) Communication
b) Information Retrieval.
c) Presentation of information.
d) All of the above.
Answer: D

92. A computer language for informing the DBMS regarding the data structure used is_____
a) PASCAL
b) DDL
c) PROLOG
d) FORTRAN
Answer: B

93. A homepage is_____
a) an index on encyclopaedia articles.
b) where all internet data is store.
c) required for access to the internet.
d) the first page of a web site.
Answer: D

94. The first part of a complete URL is the __________ needed to access the web resource.
a) ADDRESS
b) NAME
c) LOCATION
d) PROTOCOL
Answer: D

95. What is an algorithm?
a) A flowchart.
b) Step by step instructions used to solve a problem.
c) A flowchart or pseudocode.
d) A decision.
Answer: B

96. A textbox is an example of_____
a) button
b) method
c) event
d) Control
Answer: D

97. In a relational database, a Referential Integrity constraint is specified with the help of_____
a) Primary Key.
b) Foreign Key.
c) Both (a) and (b).
d) None of these.
Answer: B

98. How can you view the properties of a form?
a) Select View > Form properties form the menu.
b) Right click anywhere on the form and select properties from the shortcut menu.
c) Double click the form selector box in the upper left corner of the form.
d) All the Above.
Answer: B

99. How do you insert a graphic of your company’s logo on a report?
a) Design Tab -> Logo.
b) You can’t MS Access won’t let you insert graphics file.
c) Database Tools -> logo.
d) Select Tools > Insert Picture from the menu.
Answer: A

100. What is a form in MS Access?
a) It is a printed page where users will write their data to fill it up.
b) It is an input screen designed to make the viewing and entering data easier
c) This is an important part of database used by analysts to draw conclusions.
d) All of above.
Answer: B
101. FTP stands for_____
a) File Total Protocol.
b) Forward Total Protocol.
c) File Transfer Protocol.
d) File Transfer Project
Answer: C

102. There are _____ types of modules in visual basic
a) Three
b) Two
c) Five
d) None of these
Answer: A

103. A value that is automatically entered in a field for a new record_____
a) Validation rule
b) Default value
c) Input mask
d) None of above
Answer: B

104. Diagram that represents steps or operations involved in any kind of process is called_____
a) System diagram
b) Management hierarchy
c) Flowcharts
d) Convenience diagrams
Answer: C

105. In flowchart, symbol of rectangle with one curvy side is used to show_____
a) Document printed
b) Document written
c) Data stored
d) Display output
Answer: A

106. In a flowchart an input or output instruction is represented by_____
a) A rectangle
b) A rhombus
c) A parallelogram
d) A circle
Answer: C

107. Binary search algorithm cannot be applied to_____
a) Sorted linked list.
b) Sorted binary trees.
c) Sorted linear array.
d) Pointer array.
Answer: A

108. Connectors used to connect flowchart symbols to each other are classified as_____
a) Arrow lines.
b) Symbols.
c) Annotation.
d) Special symbols.
Answer: B

109. An algorithm that calls itself directly or indirectly is known as_____
a) Sub algorithm.
b) Recursion.
c) Polish notation.
d) Traversal algorithm.
Answer: B

110. The advantage of For…Next loops over Do…Loops is that they are: _____
a) easier to read and maintain.
b) less prone to being infinite loops.
c) good for working with arrays.
d) All of the above.
Answer: D
121. Option button can be grouped in a ______control.
a) label
b) text box.
c) frame
d) check box
Answer: C

122. origin of Visual basic is_____
a) Cobol
b) Fortran
c) Basic
d) All Of the above.
Answer: C

123. In which year Hyperlink was coined?
a) 1969
b) 191
c) 1964
d) 1955
Answer: C

124. Verification of a login name and password is known as_____
a) Configuration.
b) Accessibility.
c) Authentication.
d) Logging in.
Answer: C

125. Referential integrity of MS-Access denotes _______
a) The data of all fields of a table must match with the data of the related table
b) A row of one table must match with a row of the related table.
c) All the values in foreign key field must match with the values of the primary key field of the related table.
d) Any value in foreign key field must match with the values of the primary key field of the related table
Answer: C

126. The relational model is concerned with _____
a) Data structure and data integrity
b) Data manipulation
c) Both (a) and (b).
d) None of these
Answer: C

127. Cylinder symbol represents ______
a) Magnetic Disk
b) Input
c) Connector
d) Annotation
Answer: A

128. The Worst case occur in linear search algorithm when_____
a) Item is somewhere in the middle of the array.
b) Item is not in the array at all.
c) Item is the last element in the array.
d) Item is the last element in the array or is not there at all.
Answer: D

129. To write program functions such as input four numbers and print their sum, program refinement first level includes_____
a) input four numbers
b) calculate sum
c) print values
d) print variables
Answer: A

130. An array of controls can be populated by: _____
a) assigning existing controls to the array.
b) creating controls and assigning them to the array.
c) borrowing controls that will automatically assign them to the array.
d) Both a and b.
Answer: D
131. An Exception is another name for a: _____
a) compile error.
b) logic error.
c) runtime error.
d) superficial error.
Answer: C

132. ARPANET stands for: _____
a) Advanced Research Policy Agency Network.
b) Advanced Research Projects Agency Network.
c) Advanced Research Projects Agency Norms.
d) Advanced Rejoin Projects Agency Norms.
Answer: B

133. Which one of the following is not a search engine?
a) Bing
b) Google
c) Yahoo
d) Windows
Answer: D

134. Safari browser came into market in the year____
a) 2000
b) 2001
c) 2002
d) 2003
Answer: D

135. In internet terminology IP means_____
a) Internet Provider
b) Internet Protocol
c) Internet Procedure
d) Internet Processor
Answer: B

136. The Internet was originally a project for this Government agency_____
a) ARPA
b) NSF
c) NSA
d) FCC
Answer: A

137. Moving from one website to another is called_____
a) Downloading
b) Browsing
c) Uploading
d) Attachment
Answer: B

138. Distinct parts of documentation are_____
a) Technical documentation.
b) Documentation for user.
c) Program planning.
d) Both a and b.
Answer: D

139. Diamond shaped symbol is used in flowcharts to show the_____
a) Decision box.
b) Statement box.
c) Error box.
d) If-statement box.
Answer: A

140. The first Network_____
a) CNNET.
b) NSFNET.
c) ASAPNET.
d) ARPANET.
Answer: D
141. The extension of standard modules is_____
a) .cls
b) .res
c) .bas
d) .xls
Answer: C

142. Which of the following cases does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) Null Case
Answer: D

143. What is the full form of CC option while Compose/Sending mail ?
a) Carbon copy
b) Copy carbon
c) Copy to copy
d) Carbon to Connect
Answer: A

144. What is the minimum bandwidth required for broadband connection?
a) 128 kbps
b) 256 kbps
c) 512 kbps
d) 2048 kbps
Answer: B

145. When flowchart direction lines are unclear then the programmer can use
a) arrows
b) horizontal lines
c) vertical lines
d) inverted triangle
Answer: A

146. Which of the following is not the required condition for binary search algorithm?
a) The list must be sorted.
b) There should be the direct access to the. middle element in any sublist
c) There must be mechanism to delete and/or insert elements in list
d) none of above
Answer: C

147. How many values a CheckBox can have ?
a) 1
b) 2
c) 3
d) 4
Answer: C

148. Key fields of the ConnectionString property are_____
a) Provider
b) Mode
c) Provider & Data Source
d) Data Source
Answer: D

149. Link with another part of program or connectors in flowchart are shown in_____
a) rhombus
b) parallelogram
c) circle
d) trapezoid
Answer: C

150. LIST Property is used_____
a) Command Button
b) Label
c) TextBox
d) ComboBox
Answer: D

151. MAN refers to ?
a) Mega Area Network
b) Metropolitan Area Network.
c) Mini Area Network.
d) Medium Area Network.
Answer: B

152. In a relational database, a Referential Integrity constraint is specified with the help of_____
a) Primary Key
b) Foreign Key
c) Both (a) and (b).
d) None of these
Answer: B

153. In a URL what does .org represents_____
a) educational institute
b) military site
c) organization
d) commercial
Answer: C

× close ad