computer science and engineeringweb.cse.ohio-state.edu/~reeves.92/cse200/mc-2.doc · web viewc....

53
1. CPU can do which of the following? a. Decode the instruction. b. Store the program to be executed. c. Facilitate document writing. d. Numerical manipulation of data. 2. What does Netscape Communicator feature? a. Reading and Posting to Newsgroups b. Store commonly used web addresses c. Access and display web pages from the internet d. Use search engines to find specific sites 3. Application software pertains to which of the following? a. Windows b. Unix c. Word d. MS Dos 4. A Megabyte is a. 8 bits b. 1000 bytes c. 100,000,000 bytes d. 1,000,000 bytes > 1.)Which of the following is not related to the internet? > A.)HTTP > B.)IXP > C.)IPP > D.)HTML > E.)FTP > the answer is letter B > 2.)Which of the following is not a "object" of a database? > A.)Query > B.)Form > C.)Field > D.)Report > E.)Table > the answer is letter C

Upload: others

Post on 26-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

1. CPU can do which of the following? a. Decode the instruction. b. Store the program to be executed. c. Facilitate document writing. d. Numerical manipulation of data.

2. What does Netscape Communicator feature? a. Reading and Posting to Newsgroups b. Store commonly used web addresses c. Access and display web pages from the internet d. Use search engines to find specific sites

3. Application software pertains to which of the following? a. Windows b. Unix c. Word d. MS Dos

4. A Megabyte is a. 8 bits b. 1000 bytes c. 100,000,000 bytes d. 1,000,000 bytes

> 1.)Which of the following is not related to the internet?> A.)HTTP> B.)IXP> C.)IPP> D.)HTML> E.)FTP> the answer is letter B> 2.)Which of the following is not a "object" of a database?> A.)Query> B.)Form> C.)Field> D.)Report> E.)Table> the answer is letter C> 3.)All of the following are components of a Microsoft excel financial> function except:> A.)Past value> B.)Future value> C.)Present value> D.)Rate> E.)Payment> the answer is A

Page 2: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

> 4.)The correct way to absolute reference the cell C5 so that only the column> will move and not the row is:> A.)C5> B.)$C5> C.)C$5> D.)$C$5> the answer is C> 5.)Which is not a Boolean logic operator?> A.)And> B.)Vlookup> C.)Or> D.)Not> the answer is B

1. The rules of communication observed between the peices is called _________. A. Architecture B. Protacol C. Networks D. Protocol 2. Internet Architecture consists of ___________. A. FTP B. IPP C. ISP D. B and C E. All of the above 4. Which memory allows for memory to be stored after the computer is turned off? A. RAM C. Auxillary memory B. ROM D. Teporal memory

1. A primary key a. Is a field which identifies a record in a tableb. Is a field which uniquely identifies a record in a tablec. Defines the relationship between tablesd. Defines the relationship between 2 or more tables

2. Which of these are modes of communication?a. E-mailb. World Wide Web (WWW)c. Newsgroupsd. All of the above

3. What is the language used to write web pages?a. httpb. htmlc. TCP

Page 3: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

d. .jpg

4. Windows is an example of a. Application softwareb. Memoryc. Compilerd. System Software

Answers: 1) B2) D3) B4) D

1. Referential date integrity will be violated in a database if... a.) a foreign key value is the same as other foreign key values within the database. b.) information within the primary key is not unique c.) there is a foreign key value that does not exist in the primary key value d.) the foreign key is connected to other primary keys

2. To specify a criteria in the total row, what aggregate function would be used within a query? a.) sum b.) group by c.) total d.) where

3. The role of an Internet Presence Provider is to... a.) give a location for a website b.) control and eliminate illegal use within the internet c.) provide service of access to internet d.) handle individual accounts of internet users

4. What function allows us to determine an input value that would be needed to get a given output? a.) IF b.) goal seek c.) or d.)Vlookup

2. An example of an Input Device is a. speakers b. monitor c. touch screen d. printer

Page 4: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

3. RAM memory is a. not erased when you turn off the computer b. large and slow c. measured in kilobytes d. measured in megabytes

4. Databases a. store and retrieve data b. store and analyze data c. provide support for complex calculations d. can do simple data organizing and selecting

Answer Key: 2. C 3. D 4. A

In an Access query: when you place two expressions in the same row of the criteria:

a. It is treated as an “AND” functionb. It is treated as an “OR” functionc. You have to place all expressions in a different celld. The first expression has a higher priority

If you change your data after making a pivot table in Excel do you:

a. Refresh the tableb. The table changes automaticallyc. The table is now obsoleted. Make a new table

Special effects that control how a bulleted point appears to fly onto the screen are called:

a. Transitionsb. Graphicsc. GUId. animations

In Microsoft Word the Autotext feature:

Page 5: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

a. Includes commonly used phrasesb. Will insert the datec. Will insert the timed. All of the above

1.) A(n) ______ is a collection of conditions.

a.) query c.) aggregate functionb.) criterion d.) report

2.) What is an example(s) of a boolean operator?

a.) AND c.) ORb.) SUM d.) a, c

3.) ________ is a field, or combination of fields, which uniquely identifies a record in a database.

a.) primary key c.) queryb.) foreign key d.) criterion

4.) What is NOT an input device?

a.) keyboard c.) printerb.) mouse d.) touch screen

Answers: 1.) B 2.) D 3.) A 4.) C

1) The ________ fetches data, fetches, decodes and executes instructions,and writes back results. a) Secondary Memory B*) CPU c) RAM d) a or b e) a or c

2) If you invested $5000 two years ago at 10% per year compoundedquarterly and you want to determine the current value, your formulawould be: a) FV(.10/4,2*4,5000) b) FV(.10/12,2*12,0,-5000) C*) FV(.10/4,2*4,0,-5000) c) FV(.10/4,2,5000)

3) Pick the true statement a) A foreign key uniquely identifies a record in a database.

Page 6: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

B*) In Excel, the default for reference funtions is true, if not otherwise specified.

4) When you want to show a functional relationship between two or more variables you should use a: a) Line chart B*)XY chart c) Bar/Column Chart d) Pie chart

1. Which of the following can shut down without effecting it's entiresystem?

A. A node in a backbone LAN architectureB. A node in a ring LAN architectureC. A NODE IN A WAN ARCHITECTURED. A server in a WAN architecture

2. Which of the following is not true of a browser tag?

A. It can show a graphicB. A tag tells the browser what to doC. TAGS ALWAYS COME IN PAIRSD. The tags you write are not visible, but their effects are.

3. Which of the following is not a transfer protocol?

A. smtpB. HTMLC. httpD. ftp

4. Which of these is not a predefined Excel worksheet function?

A. sumB. ARGUMENTC. sumifD. countif

1.) UNIX, DOS and Windows are example of: (B. Operating Systems) a. Application Software b. Operating Systems c. Auxiliary Memory d. Primary Memory

Page 7: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

2.) Sorting allows the user to order the records by a specific field. (B. Temporarily) a. permanently b. temporarily c. numerically d. uniquely 3.) Inserts a copy of the original object which can be modified separately from the source file. (A. Embedding) a. embedding b. linking c. copying d. pasting 4.) Allows us to see the change in outcome if we change the input values. (C. What-if Analysis) a. Nested IF's b. Goal Seeking c. What-if Analysis d. V-Lookup

. A Web Spider:A. Populates a search engine's database.B. Retrieves the searched for websites from the internet.C. Scours the internet for specific search words or phrases.D. None of the aboveANS=A. 2. Data Precision in the Excel program is:A. The number that appears in the cell.B. Is a formula to calculate percent.C. The number of decimal places used in calculations and stored in the computer.D. Both A and CANS=C 3. A Bar/Column chart is best used when:A. One wants to show a trend over time that is plotted at equal intervals.B. One wants to display parts that make up a whole.C. One wants to plot two sets of data at scaled intervals.D. One wants to show and compare discreet objects.ANS=D 4. The Boolean Operator in this equation (5-4+3)>(1*4)/2 is:A. +B. >

Page 8: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

C. *D. 2ANS=B

1. What is the definition of a filter?A. an association that tells access how data between table is relatedB. printed output you generate from tablesC. A restriction you place on records in the open datasheet or form to temporarily isolate and display a subset of recordsD. text objects

Answer: C

2. One-to-many, many-to-many and one-to-one are different types of?A.filtersB.queriesC. RelationshipsD.Formats

Answer: C

3. A ---------- is a association that tells Access how data between tables is related.

A. inquiryB. JoinC.formD. object

Answer: B

4. Design View is used to?A. Link ObjectsB. sequenceC. create vertical columns or horizontal rowsD. Creat new database objects and modify the design of existing objects

Answer: D

1.) This is a field which uniquely identifies a record in a table a.) Primary Key b.) Foreign Key c.) Inner join d.) Both a and b e.) None of the above

Page 9: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

2.) The following is NOT a Boolean Operator a.) AND b.) NOT c.) IF d.) OR e.) Both b and c 3.) Forms can be created in the following ways except a.) Auto Forms b.) Data Sorting Forms c.) Forms Design View d.) Forms Wizard 4.) Following are part of Form Component except a.) Form Header b.) Detail c.) Page Header d.) Page Footer e.) Both b and c f.) Both c and d ANSWERS:1.) A 2.) C 3.)B 4.) F

1. Word, excel, and access are examples of:A. Systems Software B. Applications SoftwareC. Communications ChannelsD. Local Area Networks

2. Which of the following is the file externsion for excel?A. .docB. .xlsC. .exeD. html

3. Vlookup and hlookup are examples of ____ functions.A. LogicalB. StatisticalC. ReferenceD. Boolean

4. In the file path C:\mydocuments\1999\cis200\lab1.doc which of the following is the root directory?

A. 1999

Page 10: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

B. lab1.docC. CD. mydocuments

1. In a query with aggregate functions, if a certain field specifies a criteria, this field uses the aggregate function of:a. Expressionb. Group Byc. Whered. Vare. When 2. In Microsoft Excel, the Goal Seeking tool:a. allows you to change the input value to see the affected outputb. allows you to set up a workbook page to set goals using boolean valuesc. finds the needed input for the output value that you specifyd. allows you to set up a pivot table 3. An example of presentation software is:a. Microsoft PowerPointb. Microsoft Accessc. Microsoft Exceld. Microsoft Word 4. TCP/IP stands for:a. Transfer computer protocol/internet protocolb. Transfer control protocol/internet protocol c. Tangent control protocol/internet protocold. Transmitting control protocol/internet protocol answers:1. c2. c3. a4. b

1. A database can be used for all of the following except: *a. storing and analyzing data

b. performing simple calculationsc. organizing and selecting datad. creating rep!orts for data output

2. All of the following are examples of Power Point presentation views except for this one:a. Slide Viewb. Outline View

*c. Design View

Page 11: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

d. Slide Show

3. When using the lookup function in Excel, specifying the type as “false” will return values: * a. that are exact matches of the criteria

b. the highest value that does not exceed the criteriac. the lowest value exceeding the criteriad. the value closest to the criteria

4. This type of chart is used to compare discrete objects:a. XY chartb. line chartc. pie chart

*d. column chart

1. When you receive a #ref! Error in excel, you know that:(B)A. You have a problem with a B. Cell reference not validnumber in a formula or function C. wrong type of argument or D. Numeric value too wide too

display operand in a formula

2. Excel uses: (B)A. Simple Interest B. Compound InterestC. Flat Rate Interest D. None of the above

3. The primary key: (D)A. Is a unique number B. Is a fieldC. Connects to the Foreign Key D. All of the above

4. When sorting fields in a query, you put the field that you want sorted first, (A)A. In the first column B. In the last columnC. In the middle column D. A or B

1. If an outer join is established between tables A and B in access (relative to Table B), the resulting dynaset will have:

a. only items that are on both tables b. all records from A, only related records from B c. only items in table B d. all records from B, only related records from A

2. .doc, .ppt, .html are all known as:

a. subdirectories b. main directories c. file extensions d. drives

Page 12: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

3. A strategy in excel that allows us to see the change in outcome if we change the input values is:

a. an IF function b. What-if Analysis c. A reference function d. Goal Seeking

4. Which of the following views in Powerpoint allows you to concentrate on entering and editing the presentation's content?

a. outline view b. slide view c. slide sorter view d. normal view

5. Which of the following is a wild card criteria?

a. >#1/1/01# b. "M" OR "N" c. ="M*" d. <=20

1. All of this are the standard features of presentation software except:a. On screen slide showsb. East preparation of slidesc. Slides animationd. Preparation of speaker notes and handoutse. Outline view

2. Which one on the following is the popular DBMS system:a. Netscapeb. Microsoft Power Pointc. Microsoft Accessd. Excel

3. What is thread?a. Open communication forumb. Send opinion (everyone can read this)c. Articles that accumulate across users on a topicd. Transferring messages

4. Which one on the following is not really search engine buy a directory of sites?a. Yahoob. Alta Vistac. Excite

Page 13: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

d. Hotbote. Google

(B) 1. A primary keya. defines the relationship between 2 or more tables.b. is a field which uniquely identifies a record in a table.c. is a relational operator.d. is a Boolean Operator.

(D) 2. An Example of an ISP isa. 14.4 kbpsb. Geocitiesc. HTTPd. AOL

(B) 3. All of the following are created in Microsoft Access Excepta. Queries b. Databasesc. Tablesd. Reports

(A) 4. All of the following can be used as Aggregate functions in a Query excepta. Dateb. Averagec. Countd. Where

1) Which of the following about RAM is not true?a) small, fast, but expensiveb) erased when you turn off the computerc) measured in gigabytesd) stores programs in machine language format

2) SMTP stands for which of the followinga) Standard Modem Transfer Processb) Sending Mail Transition Programc) Simple Mail Transfer Protocold) Sample Mainframe Transition Protocol

3) 1-http:// 2-.<domain> 3-.<host> 4-<path> 5-.code/ 6-www Put these in the proper URL sequence

a) 143625b) 156243c) 142563d) 163254

Page 14: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

4) Which of these is not a function in Excela) Meanb) Standard Distributionc) Mediand) Add (Sum is the correct addition function)e) Mode

1. What is the correct data type for a zip code in Access? (c)a. numberb. date/timec. textd. AutoNumber 2. You enter your data in to ______ in Access? (d)a. sheetsb. booksc. queriesd. tables 3. To do simple calculations in Access you would use the _______. (d)a. equation builderb. function wizardc. report wizardd. expression builder 4. Access stores queries in ______ format. (a)a. SQLb. SLRc. LSMd. CIS

1. In an access query, to make the query search a field that begins with the letter "J", the condition would be:

a. Like J b. Like "*J" c. Like J* d. "J*" e. = "J"

2. Which of the following is not a category for excel functions?

Page 15: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

a. statistics b. logical c. informational d. financial e. trigonometric

3. The abbreviation, SMTP, stands for:

a. simple mode transfer protocol b. systems mail transfer protocol c. simple mode transfer plan d. simple mail transfer plan e. none of the above

4. These are all components of a computer's hardware, except:

a. output devices b. RAM c. secondary memory d. simple communications

e. CPU

1. What appears in an Excel cell when the numeric value is to wide to display? a. #N/A b. #NUM! c. #REF! d. ##### 2. Which is not an input device? a. keyboard b. mouse c. touch screen d. monitors 3. Excel automatically adds the extension of _____ a filename when you save a document? a. .doc b. .txt c. .ppt d. .xls 4. Floppy disks are a type of ______ ?

Page 16: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

a. main memory b. systems software c. auxiliary memory d. applications software

1. The Primary Memory is: a. small, slow, cheap b. large, fast, expensive c. small, fast, expensive d. large, slow, cheap

2. The Excel formula that returns the number of items in a range is: a. COUNTIF b. SUM c. SUMIF d. COUNT

3. ISP stands for: a. Internet Service Provider b. Internal Service Protocol c. Internal System Protector d. Internet System Protocol

4. For the following web addres, what is the file extension stand for: C:\mydocuments\2001\cis200\lab1.mdb a. Powerpoint b. Access c. Excel

e. Word

1). What is the host in this web address? http://www.ohio-state.com/students/help.html

a. .com b. students

c. ohio-state d. .html

answer: c

2). <, >, <=, >= are all examples of what?

a. Boolean operators b. Relational operators

Page 17: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

c. operands d. Arithmetic operators

answer: b

3). Which one of these is an example of Applications Software? a. MS Dos b. Windows 98

c. keyboards d. Microsoft Excel

answer: d.

4). Which one of these is not a characteristic of Primary Memory?

a. not erased when you turn off the computer. b. small, fast, but expensive. c. Usually measured in Megabytes d. stores the program to be executed and data.

answer: a

#1. What is a dynaset? a.) the field uniquely identifying a record in a database b.) the first type of computer ever built c.) the results from performing a query in a databse d.) the set of values in a table #2. When working in Excel you get a #REF! error which means : a.) you are trying to access data that doesn't exist b.) you are referencing an invalid cell c.) your value is too big to be seen at the selected column width d.) you messed everything up, get away from the computer before it blows up\ #3. An outer join is needed in Access when : a.) you have values that need to be displayed and have no related records b.) you have records that need to be displayed but do not have values c.) you need to establish a one-to-one relationship d.) all of the above #4. A WAN is a : a.) Wide Area Network used for a one computer to many relationship b.) Wild Action Network that persistently goes down and needs fixed c.) Wired Announcement Network used to make mass-announcements to many people d.) Warped Area Network where computer signals are warped into overdrive and people connect to the internet faster

Page 18: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

1. A monitor is an example of: a.an input device b.an output device c.primary storage d.a communications channel answer: b

2. Which of the following is NOT system software? a.Windows b.UNIX c.Netscape d.Compilers and Interpreters answer: c

3. What is a Criterion? a.A relational operator b.A system component c.an expression that tells the DBMS what records to retrieve d.A special Chinese dish answer: c

4. Which of the following is NOT part of an Excel spreadsheet? a.Input area b.Output area c.Calculation area d.Construction area answer: d

1) A (n) is an organized collection of related information.a) objectb) databasec) worksheetd) document

2) If I borrow $20,000 at 8.5% annual interest rate compounded yearly and the loan of in 7 years, what is the payment that I will need to make every year? a) =PMT(.085/12, 7*12, 20000)b) =PMT(.085, 7, 20000)/12c) =PMT(.085, 7, 20000)d) =PMT(8.5, 7, 20000)

3) Which of the following is the following is a function of Database Management Systems (DBMS)?

a) Store and analyze datab) Store and retrieve data

Page 19: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

c) Provide support for complex calculationsd) Provides inefficient data handling

4) Which of the following relational operators used in Microsoft Excel means "not equal"?

a) b) ><c) <=>d) <>

1. What is netscape navigator? a. A graphical user interface. b. An application software package for browsing the world wide web. c. A tool designed to help find what you want on the web. d. A program that automatically follows web page links and reports details to the search engine database.

2. Which of the following is NOT a boolean operator? a. AND b. OR c. IF d. NOT

3. What is NOT true about primary memory(RAM)? a. is erased when the computer is turned off b. stores the programs that are to be executed c. larger, slower, and cheaper d. it typically runs on a system of 64 megabytes

4. What is the most popular form of internet communication? a. e-mail b. world wide web c. newsgroups

e. chatrooms

1. When speaking about Excel, the number of decimal places used in calculations andstored in the computer is the: a. precision b. formatted display c. operand d. value

2. Which is NOT a function of the Central Processing Unit (CPU)?

Page 20: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

a. decode the instruction b. execute an instruction c. store data and the program to be executed d. fetch data from specific memory location

3. America Online (AOL) is an example of a(n): a. Internet Presence Provider b. Internet Service Provider c. Wide Area Network d. Local Area Network

4. Which is NOT a transfer protocol? a. smtp b. http c. ahtp d. ftp

_______ 1. Which of the following is not an example of a Boolean logic operator in Excel? ***A***

A) AVERAGE C) ORB) AND D) NOT

_______ 2. What does the “http” in a web address stand for? ***C***A) help trial training product C) hypertext transfer protocolB) hypertension transfer protocol D) hypertext transfer protection

_______ 3. In Access, which of the following uniquely identifies a record in a database? ***D***

A) foreign key C) unique keyB) primary query D) primary key

_______ 4. Which Microsoft Office program is primarily used for storing and looking up data, but has a weakness in making advanced calculations? ***C***

A) Word C) AccessB) Power Point D) Excel

1) Which is NOT a program of Operating Systems? A) MS DOS B) Unix

Page 21: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

C) Word D) Windows 2) Which is the correct order for a Universal Resource Locator (URL)? A) http://www.<host>.<domain>.code/<path> B) http://www.<host>.<code>.domain/<path> C) http://www.<host>.<path>.domain/<code> D) http://www.<host>.<domain>.path/<code> 3) What type of error would return if you have used the wrong type of argument or operand in a formula? A) #DIV/0 B) #NAME C) ##### D) #VALUE 4) Which of the following must be true in order to have a Foreign Key? A) The field names on each table must match B) The related fields must be the same data type C) There must be a Primary Key in at least one of the tables D) Both A and B E) Both B and C

1.) Cell C3 contains the formula = A$2+$B2. What is the excel formula which will result if you copy the contents of cell C3 into cell D3?

A.) $B2+$B2B.) B$2+$B3C.) A$2+$B2D.) B$2+$C3E.) none of the above

Answer: B

2.) The function Sum(A1:A3, D5, C7, 22) is the same as.

A.) A1+B3+D5+C7+22B.) A1+ A2+A3+D5+D7/22C.) A1+A2+A3+D5+C7+22D.) A1+A3+D5+C7/22

Answer: C

3.) Goal seek allows us to do all of the following except...

Page 22: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

A.) Allows us to work backward in a worksheetB.) Lets us vary only one input variableC.) What if analysis in the reverse directionD.) none of the aboveE.) all of the above

Answer: E

4.) A_______ is a line or several lines of text that appears at the bottom of each page just above the bottom margin.

A.) footerB.) headerC.) footingD.) heading

Answer: A

1.)Smtp has what format?A. Drive/Main Directory/Sub directory/File nameB. [email protected]. www.host.domain.code/pathD. http:// www.host.domain.code/path

2.)Which is not an input device?A. MouseB. Optical scannersC. Touch ScreenD. Monitor

3.)If you were to copy the formula A$2+$B2 from cell A1 to cell B2, what would be the resulting formula?A. A2+B$2B. A$3+B4C. B$2+$B3D. $B3+C$2

4.)Typing in ‘Like “Q?”’ into access would produce which results?A. QueryB. QAC. CompaqD. QUE

Answers:

Page 23: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

1.)B2.)D3.)C4.)B

Question 1:

I. Fetch an instructionII. Execute an instructionIII. Decode the instructionIV. Fetch data

______ is an operation done by the CPU at an extremely fast speed.

A. I, II, and IVB. II, III, and IVC. I, II, and IIID. All of the above

Question 2:

Which statement is false concerning conditions in Access?

A. If a criteria is on the same line it is automatically considered an AND.B. The Boolean Operators are only AND and OR.C. If criteria are on a separate line it is automatically considered an OR.D. The computer will apply sort precedence for sorting fields listed on query from

left to right.

Question 3:

Which statement is false about the following web page protocols?

A. .htm and .html are browser file standards.B. .gif and .jpg are graphical file standards.C. .wav is the sound file standard.D. None above, they are all true.

Question 4:

In Power Point which is true about object linking?

A. The object will be displayed in the target document but that is just a “linked copy” of the original object.

Page 24: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

B. A “link” to the object in the source document is inserted in the target document.C. All changes made to the original object are dynamically reflected on the “linked

copy”.D. The “linked copy” can not be modified independent of the original object.E. All of the above.

1) When using Microsoft Acess to create a relationship between tables one should go to ___________ on the menu bar. A) fileB) insertC) viewD) toolsE) edit answer: D 2) Objects used for viewing, editing, and entering fatra for a single record in Access are ___________. A) queriesB) formsC) tablesD) databasesE) program modules answer: B 3) A Universal Resources Locator is made up of: A) username, domain, and code.B) host, code, newsgroup, and path.C) host, domain, code, and path.D) username, host, code, and type.E) domain, code, and path. answer: C 4) In Microsoft Excel, the cell display of the row and column can be located: A) in the mailbox.B) on the sheet tab.

Page 25: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

C) in the formula bar.D) on the toolbar.E) under view from the menu bar. answer: A

1. How many logical arguments can be used in the AND and OR functions?a. 10b. 15c. 20d. 30 2. Which Excel function allows you to determine an input value that would be needed to get a given output?a. What-if analysisb. Goal Searchingc. Plug-n-Chug methodd. Goal Seeking 3. Which of the following is an example of Application Software?a. Microsoft Windowsb. Microsoft Wordc. MS DOSd. Compilers 4. What are the four stages of database development?a. plan, create, enter and edit data, preview and printb. enter, edit, test, formatc. format, preview data, enter, revise

e. plan, create, edit data, test

Question #1When it is necessary to use data stored in multiple tables, we combine therecords in the two tables using a(n)______________.(answer D)A)outer joinB)queryC)inner joinD)both A and C

Question #2When dealing with the spreadsheet layout, the worksheet or part of aworksheet area where the results are displayed is called the______________.(answer B)A)Calculation area

Page 26: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

B)Output areaC)Title barD)Input area

Question #3The internet is comprised of a collection of ____________, each composed ofa collection of smaller ____________.(answer C)A)newsgroupsB)operating systemsC)networksD)protocols

Question #4What is NOT one of characteristics of the Database Management System ofAccess compared to Spreadsheets in Excel?(answer D)A)store and retreive dataB)provide support for data organizing and selectingC)efficient data handlingD)provide support for complex calculations

1. America Online would be considered a: a. LAN b. WAN c. ISP d. IPP

2. The first web browsers were introduced in what year?

a. 1982 b. 1986 c. 1989 d. 19903. The LAN architecture, Backbone, is also known by what name?

a. Log b. Vertebrae c. Trunk d. Ring

4. When moving a database from one file into another in MicrosftAccess in the computer labs, you must first?

a. Open My Computer and manually move the file. b. Open the file in Access, then select Compact & Repair

Page 27: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

c. Open Access, select Compact & Repair, then open the database d. Contact a consultant because you are not allowed to move databases in the computer labs

Answers1.c2.d3.c4.c

1) Which is NOT a program of Operating Systems?

A) MS DOS

B) Unix

C) Word

D) Windows

2) Which is the correct order for a Universal Resource Locator (URL)?

A) http://www.<host>.<domain>.code/<path>

B) http://www.<host>.<code>.domain/<path>

C) http://www.<host>.<path>.domain/<code>

D) http://www.<host>.<domain>.path/<code>

3) What type of error would return if you have used the wrong type of argument or operand in a formula?

A) #DIV/0

B) #NAME

C) #####

D) #VALUE

Page 28: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

4) Which of the following must be true in order to have a Foreign Key?

A) The field names on each table must match

B) The related fields must be the same data type

C) There must be a Primary Key in at least one of the tables

D) Both A and B

E) Both B and C

1. When you want to build a numerical or boolean value you use a) Num Lock key b) Expression Builder c) Aggregate Functions d) Nz

2. What is the default join type? a) Inner Join b) Outer Join c) Multiple Join d) None of the Above, you have to specify the join type

3. When using Excel, what allows you to vary one input variable and allowsyou to work backward in a worksheet? a) Range Lookup b) Reference Functions c) Goal Seek d) Boolean Logic Operators

4. Which microsoft program do you want to use to keep track of a company'semployees record. a) Excel b) Word c) PowerPoint d) Access e) None of the Above

5. What is considered to be the "Virtual Real Estate Landlord"? a) IPP (Internet Presence Provider) b) ISP (Internet Service Provider)

Page 29: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

c) FTP (File Transfer Protocol) d) WAN (Wide Area Network)

Answer:1. b2. a3. c4. d5. a

1) What function would you use to substitutefor the formula =B1+B2+B3+B4+B5=B6

A)Count(B1,B6) B)Sum(B1:B6) THIS IS THE CORRECT ANSWER C)Add(B1:B6) D)Sum(B1-B6)

2) What would be the appropriate "tags" for agraphical file standards A) Pic. B) GIF.,JPG THIS IS THE CORRECT ANSWER C) WAV. D) HTM.,HTML.

3) What is object embedding A) It is when you insert a copy of an objectwhich which can be modified separately from the source file. THIS IS THE CORRECT ANSWER B) It is a linked copy which cannot bemodified C) A function in excel that allows you tochange the way a worksheet looks D) It is another way to say "CUT and Paste"

4) When dealing with the "type" argument inexcel, What does type 0 mean A) The payments are made at end of theperiod.CORRECT ANSWER

Page 30: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

B) The payments are made at the beginning ofthe period C) This has nothing to do financial functions D) THe payments are made during the middle ofthe period

1. What type of chart is used to compare items? A. pie chart B. line chart C. Area chart D. bar chart

2. Cascade up delete can only be used if ____ is enforced? A. GUI B. RDI C. the primary key D. an inner join

3. What software is used to retrieve and store related data? A. word B. excel C. access D. powerpoint

4. What suffix is used for federal agenies websites? A. gov B. org C. com E. edu

1. TCP/IP stands for:a. Temporary control protocol, internet protocolb. Transfer control positioning, internet protocolc. Temporary control positioning, internet protocold. Transfer control protocol, internet protocol

2. Which of the following is not true?a. ISP and IPP hook the user up to the internet.b. A one to one query is a straight line when you set

it up in Access.

Page 31: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

c. In Access if you have a many to many relationship and more than 2 tables you can never do just 1 query.

d. Aggregate functions in Access always show up in the total line.

3. Which of the following is true?a. Line /area charts compare discrete objects.b. Line/area charts show changes/trends.c. Line/area charts display parts that make up a

whole.d. Line/area charts show standard deviation.

4. Which type of network architecture is most effective?a. Backbone architecture.b. Trunk architecture.c. Ring architecture.d. Fishnet architecture.

5. Which is not an example of a popular DBMS?a. Accessb. Oraclec. SoftProd. FoxPro

Answers are as following:1. d2. a3. b4. d5. c

1. What would result in a cell if data being referenced in a formula is not available?

A. #NAME? B. #REF! C. ##### D. #VALUE!**E. #N/A

2. A(n) _______ is a special tag that links one page to another page or resource.

Page 32: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

A. HTML Code**B. Hypertext Link C. ISP D. Search Engine

3. You borrow $20,000 at 7.5% annual interest rate compounded yearly and you pay the loan off in 6 years. Which of the following financial functions is correct to use to find the payment needed to make every year? =PMT(rate, nper, pv, fv,type)

**A. =PMT(0.075,6,20000) B. =PMT(0.075,6*12,20000) C. =PMT(0.075,6,-20000)/12 D. =PMT(0.075,6,0,20000) E. =PMT(0.075,6*12,-20000,0)

4. Suppose you have a STUDENTS table with the PK as studentID and a CLASSES table with the PK as class# and a FK as studentID. Which of the following operations is not valid?

A. Outer joing relative to STUDENTS table. B. Inner join of STUDENTS and CLASSES table.**C. Outer join relative to STUDENTS and CLASSES table.E. Inner join on studentID.

1) Another name of Web Address is:a) HTMLb) URLc) LANd) PROTOCOLanswer:B

2)”at least one condition must be true to get a TRUE” is a Boolean operators using:a) ANDb) ORc) NOTd) IFanswer:B

3) A field name is used to identify the_____ stored in a field.a) Charactersb) Keysc) Datad) Graphicsanswer:C

Page 33: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

4) The_____ key uniquely identifies each recorda) Primaryb) Databasec) Objectd) Premieranswer:A

1> the .edu code in email stands for:

a) US university

b) Government

c) Commercial

d) US organizations

e) Education organization

2> In Microsoft Word, The mail merge features can be found in which menu bar?

a) File menu

b) Edit menu

c) Format menu

d) Tools menu

e) Help menu

3> Which one of these software is application software?

a) DOS

b) Unix

c) Microsoft Windows NT

d) Microsoft word

4> Which one of these website serve as IPP?

a) AOL

b) MSN

c) Yahoo

d) CNN

Page 34: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

e) Angelfire

1) What is the name for a row in a data table?a) rowb) fieldc) data rowd) record

2) Which of the following collects and switches internet traffic during data

transfers between terminals?a) IPPb) LANc) WANd) ISP

3) Which of the follow are output devices?

a) Optical Scannersb) Touch Screensc) Monitorsd) Mousee) B and C

4) Which of the following is NOT a transfer protocol?

a) SMTPb) HTMLc) HTTPd) FTP

1) 1 Megabyte stands for a) 1000 bytes b) 8 bits c) 1,000,000 bytes d) 1,000,000,000 bytes

2) #VALUE! means a) numeric value too wide to display b) wrong type of argument or operand in a formula c) problem with a number in a formula d) text in formula is not recognized

3) Which one of the following is NOT a boolean operator? a) NOT

Page 35: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

b) IF c) AND d) OR

4) TCP/IP was designed to a) allow people to communicate with others that have different computers b) provide service to the internet c) allow people to create webpages d) none of the above

ANSWERS: 1-C 2-B 3-B 4-A

1) Which is not an example of an aggregate function? A) average B) group by C) product D) sum 2) In joining more than two tables, what term(s) is/are used to describe the relationship on thetables? A) many to one B) one to many C) many to many D) one to one E) both C and D 3) Which provider gives users a hookup to the Internet? A) FTP B) ISP C) IPP D) HTTP 4) What is not an example of a logical function from Microsoft Excel? A) IF B) AND C) NOT D) OR Answers: 1)C, 2)E, 3)B, 4)A

1) All of the following are functions performed by the CPU except: (d)

Page 36: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

a) execute an instructionb) write back the resultc) decode the instructiond) create an instruction

2) Which of the following is NOT an example of transmission media: (b)a) twisted pair wireb) a modemc) fiber optic cabled) microwave transmission

3) What is the root directory in this path: (a) k:\cis200\class_files\office2000

a) cis200b) k:c) class_filesd) office2000

4) What chart would best serve your purposes if you wanted to graph a range with discreet objects: (c)

a) Line Chartb) Pie Chartc) Bar/Column Chartd) XY Chart

1. Which of the following is not related to the characteristics of System Software?a. Diagnostic routines stored in the computer’s electronic circuitryb. Designed to help its users to accomplish specific tasksc. Provide interface between the user and the computerd. Controls computer system resources and coordinates the flow of data

2. The feature most helpful for copying an object into any other windows application over and over?a. Drag and dropb. Move and placec. Drag and placed. Clipboard

3. What formula will result if you copy the formula in cell H8 into cell A1?

B C D

Page 37: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

5 Marry Jane6Bananas $ 2.80 $ 2.30 7Strawberries $ 5.00 $ 8.00 8Plums $ 4.00 $ 6.00

a. ####

b. #N/Ac. #REF!d. #VALUE!

4. Which of the following is an inappropriate use of Boolean operators in Access?

a. “PA” And “OH”b. >8 And <11c. Not “CA”d. >=”O”

1. Programs to control computer operations are called (answer c) A. applications software B. database software C. system software D. spreadsheet software

2. This agency was created in response to the Soviet launch of Sputnik in 1957(d) A. WWW B. NSFNet C. APCD D. ARPA

3. How many items can be placed temporary on the clipboard(a) A. 12 B. 8 C. 16 D. 14

4. What is the correct tree structure for file management(a) A. drive, root directory, subdirectory paths, file name.extension B. file name.extension, drive, subdirectory, root directory C. root directory, file name.extension, subdirectory D. drive, subdirectory paths, root directory, file name.extension

Page 38: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

1). In the following URL, which part of the address is the code? www.cis.ohio-state.edu/cis200 A. cis B. ohio-state C. edu D. cis200 2). Which of the following is not one of the 3 basic Boolean Operators? A. AND B. IF C. OR D. NOT 3). How many primary keys should be assigned in any given table in Microsoft Access (assume that more than one table makes upyour database)? A. There is no limit B. Exactly one C. None D. Either B or C E. None of the Above 4). Which of the following statements is true about Microsoft Excel Goal Seek A. It allows users to work backward in a worksheet B. Lets users vary only one input variable C. It is what-if analysis in the reverse direction D. Answers A,B,and C are correct E. Neither answers A,B,nor C are correct.

1) To add the values in a field or do other computations with the data use this feature. a) AutoSum b) Group By c) Add d) Countif 2.) When joining tables in a query, this join type will allow you to select all records that have a matching value in the the foreign keyfield plus any unmatched records. a) inner join b) outer join c) full join d) group join

Page 39: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

3.) A _________ is a collection of cells used to store and analyze data. a) workbook b) record sheet c) worksheet d) timeline 4.) A set of instructions specifying how specific records or combination of records should be extracted is a a) Report b) Query c) Form d) Spreadsheet

1.) URL in computer terminology stands for a.) Universal Resource Link b.) Unit Restricted Limit c.) Universal

Resource Locator d.) Underwriters Rite Label2.) What are the three key areas of Spreadsheet Layout?

b.) ---------------------- b.) ------------------------- c.) -----------------------------3.)   a b c d e f  

1 Race Day Results2   lap 1 lap 2 lap 3 Totals Final Heat Qualifiers  3              4              5 Red Car 32.6 29.4 33.9 95.9  False  6 Blue Car 33.9 28.3 28.6 90.8  True  7 Green Car 30.2 31.5 30.5 92.2  False  8              

The cars racing in the heat above need to run a 91.00 second total to advance to the Final Heat. How can we determine if only Blue Car is a Final Heat Qualifier? 4.)(Two part question) Essay Question -What is the difference between an Inner Joined and an Outer Joined in Access, and what are the indicators to know which one to use?

Answers to the homework

1.) c. Universal Resource Locator2.) a. Input Area b. Calculation Area (workspace) c. Output Area3.) And(F6,Not(Or(F5,F7)))

An Inter Joined is the default join type, the result using it will be only those values in the Table that have matching values in their fields. The Inter Joined creates a new data set each time it is used. The Outer Joined is used when you want to show a value that doesn’t have matches in the tables that are available to you. This is the indicator that

Page 40: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

indicates which Join you will use. The Outer Join creates a data set that results from all records that have matching values in the foreign key fields plus any unmatched records in the table with the Primary key.

1) All of the following are examples of application software except? a) Microsoft Word b) Microsoft Front Page c) Microsoft Windows 95 d) Unix 2) When using excel, the function =SUM(B3:B7)/4 means a) (B3+B4+B5+B6+B7)/4 b) B3+B4+B5+B6+B7/4 c) B3+B7/4 d) (B3+B7)/4 3) Web Browsers retrieve information by doing which of the following a) Using Web Site Owner Submissions b) Populating their database with spiders c) Prioritizing hits from a certain web page d) a and b 4) In Excel, when reducing the decimal place by two, and formatting the cell for a percent, the number .098756 reads a) 10% b) 9.87% c).0987 d) none of the above answers: c, a, d, a

1. __A.__ Protocol on the internet refers to a.) rules on communication b.)backbone of a WAN c.) HTML syntax d.) none of the above

2. __B._ What chart is appropriate when graphing a percentage cost of eachfood item of a meal for a given group size? a.) Column/ Bar Chart b.) Pie Chart c.) Line/ Area Chart d.) Any of the above

Page 41: Computer Science and Engineeringweb.cse.ohio-state.edu/~reeves.92/CSE200/MC-2.doc · Web viewc. Internal System Protector d. Internet System Protocol 4. For the following web addres,

3.) _A.__ Microsoft Windows is an example of a(n) a.) Applications Software b.) Hardware c.) Slide View d.) Operating System