Professional Documents
Culture Documents
Questions 1:
Question 2:
Question 3:
Question 4:
Question 5:
Question 6:
What is the language used by most of the DBMSs for helping their users to access data?
pg. 1 Xhweet Kashu…….
Xhweet KAshu…….
a. High level language
b. SQL
Question 7:
Question 8:
Question 9:
In a large DBMS
a. each user can "see" only a small part of the entire database
b. each subschema contains every field in the logical schema
c. each user can access every subschema
Question 10:
Answers:
1. c 2. b 3. e 4. a 5. c 6. c 7. d 8. c 9. a 10. d
Questions 1:
Which of the following fields in a student file can be used as a primary key?
a. class
b. Social Security Number
c. GPA
Question 2:
Which of the following is not an advantage of the database approach
a. Elimination of data redundancy
b. Ability of associate deleted data
c. increased security
d. program/data independence
e. all of the above
Question 3:
Which of the following contains a complete record of all activity that affected the contents of
a database during a certain period of time?
a. report writer
b. query language
c. data manipulation language
d. transaction log
e. none of the above
Question 4:
In the DBMS approach, application programs perform the
a. storage function
b. processing functions
c. access control
d. all of the above
e. none of the above
Question 5:
A set of programs that handle a firm's database responsibilities is called
a. database management system (DBMS)
b. database processing system (DBPS)
c. data management system (DMS)
d. all of above
Question 6:
Which is the make given to the database management system which is able to handle full text
data, image data, audio and video?
Question 7:
A record management system
a. can handle many files of information at a time
b. can be used to extract information stored in a computer file
c. always uses a list as its model
d. both a and b
Question 8:
A command that lets you change one or more fields in a record is
a. insert
b. modify
c. lookup
d. none of above
Question 9:
A transparent DBMS
a. can not hide sensitive information from users
b. keeps its logical structure hidden from users
c. keeps its physical structure hidden from users
d. both b and c
Question 10:
A file produced by a spreadsheet
a. is generally stored on disk in an ASCII text fromat
b. can be used as is by the DBMS
c. both a and b
d. none of the above
Answers:
.b 2.e 3.d 4.b 5.d 6.c 7.b 8.b 9.c 10.a
Questions 1:
Which of the following is not true of the traditional approach to information processing
a. there is common sharing of data among the various applications
b. it is file oriented
c. programs are dependent on the file
d. it is inflexible
e. all of the above are true
Question 2:
Which of the following hardware component is the most important to the operation of
database management system?
a. high resolution video display
b. printer
c. high speed, large capacity disk
d. plotter
e. mouse
Question 3:
Generalized database management system do not retrieve data to meet routine request
a. true
b. false
Question 4:
Batch processing is appropriate if
a. large computer system is available
b. only a small computer system is avilbale
c. only a few transactions are involved
d. all of the above
e. none of the above
Question 5:
Large collection of files are called
a. fields
b. records
c. database
Question 6:
Which of the following is not a relational database?
a. dBase IV
b. 4th Dimension
c. FoxPro
d. Reflex
Question 7:
In order to use a record management system
a. you need to understand the low level details of how information is stored
b. you need to understand the model the record management system uses
c. bother a and b
d. none of the above
Question 8:
Sort/Report generators
a. are faster than index/report generators
b. require more disk space than indexed/report generators
c. do not need to sort before generating report
d. both a and b
Question 9:
If a piece of data is stored in two places in the database, then
a. storage space is wasted
b. changing the data in one spot will cause data inconsistency
c. in can be more easily accessed
d. both and b
Question 10:
An audit trail
a. is used to make backup copies
b. is the recorded history of operations performed on a file
c. can be used to restore lost information
d. none of the aobve
Answers:
1.a 2.c 3. b 4.e 5.c 6.d 7.b 8.b 9.d 10.b
Questions 1:
The relational database environment has all of the following components except
a. users
b. separate files
c. database
d. query languages
e. database
Question 2:
Database management systems are intended to
a. eliminate data redundancy
b. establish relationship among records in different files
c. manage file access
d. maintain data integrity
e. all of the above
Question 3:
One approach to standardization storing of data?
a. MIS
b. structured programming
c. CODASYL specification
d. none of the above
Question 4:
The language used application programs to request data from the DBMS is
referred to as the
a. DML
b. DDL
c. query language
Question 5:
The highest level in the hierarchy of data organization is called
a. data bank
b. data base
c. data file
d. data record
Question 6:
Choose the RDBMS which supports full fledged client server application development
a. dBase V
b. Oracle 7.1
c. FoxPro 2.1
d. Ingress
Question 7:
Report generators are used to
a. store data input by a user
b. retrieve information from files
c. answer queries
d. both b and c
Question 8:
A form defined
a. where data is placed on the screen
b. the width of each field
c. both a and b
d. none of the above
Question 9:
A top-to-bottom relationship among the items in a database is established by a
a. hierarchical schema
b. network schema
c. relational schema
Question 10:
The management information system (MIS) structure with one main computer
system is called a
a. hierarchical MIS structure
b. distributed MIS structure
c. centralized MIS structure
d. decentralized MIS structure
Answers:
1.b 2.e 3.c 4.a 5.b 6. b 7.d 8.a 9.a 10.c
Question 1:
Where does a computer add and compare data?
a. Hard disk
b. Floppy disk
c. CPU chip
d. Memory chip
Question 2:
Which of the following registers is used to keep track of address of the memory location
where the next instruction is located?
a. Memory Address Register
b. Memory Data Register
c. Instruction Register
d. Program Register
Question 3:
A complete microcomputer system consists of
a. microprocessor
b. memory
c. peripheral equipment
d. all of above
Question 4:
CPU does not perform the operation
a. data transfer
b. logic operation
c. arithmetic operation
d. all of above
Question 5:
Pipelining strategy is called implement
a. instruction execution
b. instruction prefetch
c. instruction decoding
d. instruction manipulation
Question 6:
A stack is
a. an 8-bit register in the microprocessor
b. a 16-bit register in the microprocessor
c. a set of memory locations in R/WM reserved for storing information temporarily during
the execution of computer
d. a 16-bit memory address stored in the program counter
Question 7:
A stack pointer is
a. a 16-bit register in the microprocessor that indicate the beginning of the stack memory.
b. a register that decodes and executes 16-bit arithmetic expression.
c. The first memory location where a subroutine address is stored.
d. a register in which flag bits are stored
Question 8:
The branch logic that provides decision making capabilities in the control unit is known as
a. controlled transfer
b. conditional transfer
c. unconditional transfer
d. none of above
Question 9:
Interrupts which are initiated by an instruction are
a. internal
b. external
c. hardware
d. software
Question 10:
A time sharing system imply
a. more than one processor in the system
b. more than one program in memory
c. more than one memory in the system
d. None of above
Answers
1. c
2.d
3.d
4.d
5.b
Question 1:
Processors of all computers, whether micro, mini or mainframe must have
a. ALU
b. Primary Storage
c. Control unit
d. All of above
Question 2:
What is the control unit's function in the CPU?
a. To transfer data to primary storage
b. to store program instruction
c. to perform logic operations
d. to decode program instruction
Question 3:
What is meant by a dedicated computer?
a. which is used by one person only
b. which is assigned to one and only one task
c. which does one kind of software
d. which is meant for application software only
Question 4:
The most common addressing techiniques employed by a CPU is
a. immediate
b. direct
c. indirect
d. register
e. all of the above
Question 5:
Pipeline implement
a. fetch instruction
b. decode instruction
c. fetch operand
d. calculate operand
e. execute instruction
f. all of abve
Question 6:
Which of the following code is used in present day computing was developed by IBM
corporation?
Question 7:
When a subroutine is called, the address of the instruction following the CALL instructions
stored in/on the
a. stack pointer
b. accumulator
c. program counter
d. stack
Question 8:
A microprogram written as string of 0's and 1's is a
a. symbolic microinstruction
b. binary microinstruction
c. symbolic microprogram
d. binary microprogram
Question 9:
Interrupts which are initiated by an instruction are
a. internal
b. external
c. hardware
d. software
Question 10:
Memory access in RISC architecture is limited to instructions
a. CALL and RET
b. PUSH and POP
c. STA and LDA
d. MOV and JMP
Answers:
1. d 2. d 3. b 4. e 5. f 6. d 7. d 8. d 9. b 10. c
Question 1:
A collection of 8 bits is called
a. byte
b. word
c. record
Question 2:
The ascending order or a data Hierarchy is
a. bit - bytes - fields - record - file - database
b. bit - bytes - record - field - file - database
c. bytes - bit- field - record - file - database
d. bytes -bit - record - field - file - database
Question 3:
How many address lines are needed to address each memory locations in a 2048 x 4 memory
chip?
a. 10
b. 11
c. 8
d. 12
Question 4:
A computer program that converts an entire program into machine language at one time is
called a/an
a. interpreter
b. simulator
c. compiler
d. commander
Question 5:
In immediate addressing the operand is placed
a. in the CPU register
b. after OP code in the instruction
c. in memory
d. in stack
Question 6:
Microprocessor 8085 can address location upto
a. 32K
b. 128K
c. 64K
d. 1M
Question 7:
Question 8:
When the RET instruction at the end of subroutine is executed,
a. the information where the stack is iniatialized is transferred to the stack pointer
b. the memory address of the RET instruction is transferred to the program counter
c. two data bytes stored in the top two locations of the stack are transferred to the program
counter
d. two data bytes stored in the top two locations of the stack are transferred to the stack
pointer
Question 9:
A microporgram is sequencer perform the operation
a. read
b. write
c. execute
d. read and write
e. read and execute
Question 10:
Interrupts which are initiated by an I/O drive are
a. internal
b. external
c. software
d. all of above
Answers:
1. a 2. a 3. b 4. c 5.b 6.c 7.b 8.c 9.e 10.b
Question 1.
How many steps are in the systems development life cycle (SDLC)?
A. 4
B. 5
Question 2.
The first step in the systems development life cycle (SDLC) is:
A. Analysis.
B. Design.
C. Problem/Opportunity Identification.
D. Development and Documentation.
Question 3.
Most modern software applications enable you to customize and
automate various features using small custom-built “miniprograms” called:
A. macros.
B. code.
C. routines.
D. subroutines.
Question 4.
The organized process or set of steps that needs to be followed to
develop an information system is known as the:
A. analytical cycle.
B. design cycle.
C. program specification.
D. system development life cycle.
Question 5.
How many steps are in the program development life cycle (PDLC)?
A. 4
B. 5
C. 6
D. 10
Question 6.
The make-or-buy decision is associated with the step in
the SDLC.
A. Problem/Opportunity Identification
B. Design
C. Analysis
D. Development and Documentation
Question 7.
In the Analysis phase, the development of the occurs,
Question 8.
Actual programming of software code is done during the
step in the SDLC.
A. Maintenance and Evaluation
B. Design
C. Analysis
D. Development and Documentation
Question 9.
Enhancements, upgrades, and bug fixes are done during the
step in the SDLC.
A. Maintenance and Evaluation
B. Problem/Opportunity Identification
C. Design
D. Development and Documentation
Question 10.
The determines whether the project should go
forward.
A. feasibility assessment
B. opportunity identification
C. system evaluation
D. program specification
Question 11.
Technical writers generally provide the for the new
system.
A. programs
B. network
C. analysis
D. documentation
Question 12.
design and implement database structures.
A. Programmers
B. Project managers
C. Technical writers
D. Database administrators
Question 13.
spend most of their time in the beginning stages of the
SDLC, talking with end-users, gathering information, documenting
systems, and proposing solutions.
A. Systems analysts
B. Project managers
C. Network engineers
D. Database administrators
Question 14.
manage the system development, assign staff, manage
the budget and reporting, and ensure that deadlines are met.
A. Project managers
B. Network engineers
C. Graphic designers
D. Systems analysts
Question 15.
is the process of translating a task into a series of
commands that a computer will use to perform that task.
A. Project design
B. Installation
C. Systems analysis
D. Programming
Question 16.
Debugging is:
A. creating program code.
B. finding and correcting errors in the program code.
C. identifying the task to be computerized.
D. creating the algorithm.
Question 17.
Translating the problem statement into a series of sequential steps
describing what the program must do is known as:
A. coding.
B. debugging.
C. creating the algorithm.
D. writing documentation.
Question 18.
Translating the algorithm into a programming language occurs at the
step of the PDLC.
A. Debugging
Question 19.
The problem statement should include all of the following EXCEPT:
A. input.
B. output.
C. processing.
D. storage.
Question 20.
The problem statement includes the , which lists specific
input numbers a program would typically expect the user to enter and
precise output values that a perfect program would return for those input
values.
A. testing plan
B. error handler
C. IPO cycle
D. input-output specification
Answers
1. c
2. c
3. a
4. d
5. b
6. b
7. c
8. d
9. a
10. a
11. d
12. d
13. a
14. a
15. d
16. b
17. c
18. b
19. d
20. a
1. Which data structure allows deleting data elements from front and inserting at rear?
2. Identify the data structure which allows deletions at both ends of the list but insertion at only
one end.
a. Input-restricted deque
b. Output-restricted deque
c. Priority queues
d. None of above
a. Strings
b. Lists
c. Stacks
d. None of above
a. Strings
b. Lists
c. Queues
d. All of above
a. Deque
b. Priority
c. Tree
d. All of above
6. A binary tree whose every node has either zero or two children is called
d. None of above
a. Dn = n log2n
b. Dn = n log2n+1
c. Dn = log2n
d. Dn = log2n+1
8. When representing any algebraic expression E which uses only binary operations in a 2-tree,
a. the variable in E will appear as external nodes and operations in internal nodes
b. the operations in E will appear as external nodes and variables in internal nodes
10. When converting binary tree into extended binary tree, all the original nodes in binary tree are
d. None of above
11. The post order traversal of a binary tree is DEBFCA. Find out the pre order traversal
a. ABFCDE
b. ADBFEC
c. ABDECF
d. ABDCEF
a. Bubble sort
b. Insertion sort
c. Quick sort
d. All of above
a. Sub algorithm
b. Recursion
c. Polish notation
d. Traversal algorithm
14. In a binary tree, certain null entries are replaced by special pointers which point to nodes higher
in the tree for efficiency. These special pointers are called
a. Leaf
b. branch
c. path
d. thread
15. The in order traversal of tree will yield a sorted listing of elements of tree in
a. Binary trees
c. Heaps
d. None of above
a. Values in a node is greater than every value in left sub tree and smaller than right sub tree
a. endpoints of e
b. adjacent nodes
c. neighbors
d. all of above
a. a tree graph
b. free tree
c. a tree
d. All of above
d. both b and c
a. isolated
b. complete
c. finite
d. strongly connected
Answers:
1. Which data structure allows deleting data elements from front and inserting at rear?
b. Queues
2. Identify the data structure which allows deletions at both ends of the list but insertion at only
one end.
a. Input-restricted deque
d. None of above
d. All of above
c. Tree
6. A binary tree whose every node has either zero or two children is called
d. Dn = log2n + 1
8. When representing any algebraic expression E which uses only binary operations in a 2-tree,
a. the variable in E will appear as external nodes and operations in internal nodes
10. When converting binary tree into extended binary tree, all the original nodes in binary tree are
11. The post order traversal of a binary tree is DEBFCA. Find out the pre order traversal
c. ABDECF
c. Quick sort
b. Recursion
14. In a binary tree, certain null entries are replaced by special pointers which point to nodes higher
in the tree for efficiency. These special pointers are called
d. thread
15. The in order traversal of tree will yield a sorted listing of elements of tree in
d. all of above
d. All of above
d. both b and c
b. complete
a. floor address
b. foundation address
2. The memory address of fifth element of an array can be calculated by the formula
a. linear arrays
b. linked lists
c. both of above
d. none of above
4. Which of the following is not the required condition for binary search algorithm?
a. tables arrays
b. matrix arrays
c. both of above
d. none of above
8. Which of the following data structure can't store the non-homogeneous data elements?
a. Arrays
b. Records
c. Pointers
d. None
9. Which of the following data structure store the homogeneous data elements?
a. Arrays
b. Records
c. Pointers
d. None
10. Each data item in a record may be a group item composed of sub-items; those items which are
indecomposable are called
a. elementary items
b. atoms
c. scalars
d. all of above
a. An array is suitable for homogeneous data but hte data items in a record may have different data
type
b. In a record, there may not be a natural ordering in opposed to linear array.
c. A record form a hierarchical structure but a lienear array does not
d. All of above
14. When new data are to be inserted into a data structure, but there is no available space; this
situation is usually called
a. underflow
b. overflow
c. housefull
d. saturated
a. underflow
b. overflow
c. housefull
d. saturated
a. FIFO lists
b. LIFO list
c. Piles
d. Push-down lists
a. array
b. lists
c. stacks
d. all of above
19. A data structure where elements can be added or removed at either end but not in the middle
a. Linked lists
b. Stacks
c. Queues
d. Deque
20. When inorder traversing a tree resulted E A C K F H D B G; the preorder traversal would return
a. FAEKCDBHG
b. FAEKCDHGB
c. EAFKHDCBG
d. FEAKDCHBG
Answers
d. base address
2. The memory address of fifth element of an array can be calculated by the formula
4. Which of the following is not the required condition for binary search algorithm?
d. binary search algorithm is not efficient when the data elements are more than 1000.
c. both of above
8. Which of the following data structure can't store the non-homogeneous data elements?
a. Arrays
9. Which of the following data structure store the non-homogeneous data elements?
b. Records
10. Each data item in a record may be a group item composed of sub-items; those items which are
indecomposable are called
d. all of above
d. All of above
14. When new data are to be inserted into a data structure, but there is no available space; this
situation is usually called
b. overflow
a. underflow
d. none of above
a. FIFO lists
c. stacks
19. A data structure where elements can be added or removed at either end but not in the middle
d. Deque
20. When inorder traversing a tree resulted E A C K F H D B G; the preorder traversal would return
b. FAEKCDHGB
a. Counting microseconds
b. Counting the number of key operations
c. Counting the number of statements
d. Counting the kilobytes of algorithm
a. Best case
b. Worst case
c. Average case
d. Null case
a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)
a. O(n)
b. O(log )
c. O(n2)
d. O(n log n)
a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)
a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)
12. The indirect change of the values of a variable in one module by another module is called
a. internal change
b. inter-module change
c. side effect
d. side-module update
13. Which of the following data structure is not linear data structure?
a. Arrays
b. Linked lists
c. Both of above
d. None of above
a. Sorting
b. Merging
c. Inserting
d. Traversal
16. Finding the location of the element with a given value is:
a. Traversal
b. Search
c. Sort
d. None of above
19. Each array declaration need not give, implicitly or explicitly, the information about
20. The elements of an array are stored successively in memory cells because
a. by this way computer can keep track only the address of the first element and the addresses of
other elements can be calculated
b. the architecture of computer memory does not allow arrays to store other than serially
c. both of above
d. none of above
Answers
d. Null case
a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)
12. The indirect change of the values of a variable in one module by another module is called
c. side effect
13. Which of the following data structure is not linear data structure?
d. None of above
c. Arrays
d. Traversal
16. Finding the location of the element with a given value is:
b. Search
b. for the size of the structure and the data in the structure are constantly changing
19. Each array declaration need not give, implicitly or explicitly, the information about
20. The elements of an array are stored successively in memory cells because
a. by this way computer can keep track only the address of the first element and the addresses of
other elements can be calculated
12. Print server uses which is a buffer that holds data before it is send to the
printer.
a. Queue
b. Spool
c. Node
Answer : b
13. A standalone program that has been modified to work on a LAN by including
concurrency controls such as file and record locking is an example of
a. LAN intrinsic software
b. LAN aware software
c. Groupware
d. LAN ignorant software
Answer : a
14. The portion of LAN management software restricts access, records user
activities and audit data etc.
a. Configuration management
b. Security management
c. Performance management
Answer : b
Mcqs on Ms EXCEL
2. You can use a function to combine text from two cells into one cell. But you can
use an operator to do the same thing. Which operator is that?
a. & (ampersand)
b. = (equal sign)
c. (space)
d. All of the above
Correct Answer: a
6. To add two cells (A1 and A2) together you use the following formula
a. =A1 + A2
b. =Add(A1+A2)
c. =together(A1:A2)
d. A1 plus A2
Correct Answer: a
7. To make a number in cell C1 10% smaller than the number in C3 you enter
a. =C3*1.10
b. +C3*110
c. =C3%10
d. =C3*.90
Correct Answer: d
10. Using the F11 shortcut key to create a chart on chart sheet creates
a. A default chart
b. A 2-dimensional column chart
c. A 2-dimensional bar chart
12. You can create only a horizontal page break by first selecting
a. A row below the row where you want the page break to occure
b. A cell in row 1
c. A cell in column A
d. a and c
Correct Answer: d
14. The cell reference fro a range of cells that starts in cell B1 and goes over to
column G and down to row 10 is……
a. B1-G10
b. B1.G10
c. B1;G10
d. B1:G10
Correct Answer: d
19. If you press ……, the cell accepts your typing as its contents.
a. Enter
b. Ctrl+Enter
c. Tab
d. Insert
Correct Answer: a
20. which of the following special function keys allow the content in cell
a. esc
b. shift
c. return
d. Tab
Correct Answer: c
41. Late for your investors meeting? How can you quickly apply professional
formatting to your sales forecast worksheet?
a. Apply special attributes using Format Painter
b. Apply an Auto Format Style
c. Apply a selected background color
d. All of above
Correct Answer: b
42. What excel feature can you use if you want to work with one record at a time?
a. Auto Complete
b. Auto Filter
c. Data Form
d. Sub Totals
Correct Answer: c
44. You can copy cell formats from one cell to another by using the
46. You can use drag and drop to embed excel worksheet data in a word document
a. By dragging a range of excel data to the word button on the taskbar while
pressing the Ctrl key
b. By dragging a range of excel data to the Word button on the taskbar while
pressing Shift key
c. By displaying both applications side-by-side and dragging a selected range of
Excel data into the word application window while pressing the Ctrl key
d. a and c
Correct Answer: d
53. What chart object is horizontal or vertical line that extends across the plot area to
make it easier to read and follow the values?
a. Category axis
b. Data marker
c. Data point
d. Gridline
Correct Answer: d
55. Suppose you have columns of data that span more than one printed page. How can
you automatically print the column headings on each page.
a. Click page setup on the file menu, click the sheet tab, and enter the row that
contains these column headings under print titles.
b. Click page setup on the file menu, click the page tab, click the options button, then
enter your choices.
c. Click page setup on the finle menu, click the sheet tab, and make a selection under
the print heading.
d. All of above
Correct Answer: a
56. a fast way to add up this column of number is to click in the cell below the numbers
and then:
a. click subtotals on the data menu
b. view the sum in the formula bar
58. When you want to insert a blank embedded excel object in w word document you
can
a. Click the object command on the insert menu
b. Click the office links button on the standard toolbar
c. Click the create worksheet button on the formatting toolbar
d. Click the import excel command on the file menu
Correct Answer: a. Click the object command on the insert menu
59. Say that you want to paste a formula result – but not the underlying formula – to
another cell. In excel 2002, you would copy the cell with the formula, then place the
insertion point in the cell you want to copy to what next?
a. Click the Paste button on the standard toolbar
b. Click the arrow on the paste button on the standard toolbar, hen click formulas
c. Click the arrow on the paste button on the standard toolbar, then click values.
d. All of above
Correct Answer: c
61. Which of these will not select all the cells in a document?
a. Clicking three times with the right mouse button in the spreadsheet
62. The default style for new data keyed in a new workbook is
a. Comma
b. Currency
c. Normal
d. Percent
Correct Answer: c
64. Which function converts miles to kilometers, kilograms to pounds, and so on?
a. Convert
b. Product
c. Change
d. All of above
Correct Answer: a
67. Which formula can add the all the numeric values in a range of cells, ignoring those
which are not numeric, and place the resulting a differene cell
a. Count
b. Average
c. Sum
d. None of above
Correct Answer: c
72. It is acceptable to let long text flow into adjacent cells on a worksheet when
a. Data will be entered in the adjacent cells
b. No data will be ente4red in the adjacent cells
c. There is no suitable abbreviation for the text
d. There is not time to format the text
Correct Answer: b
73. Which function calculates depreciation at the same amount each year over an asset‟s
useful life?
a. DB (fixed-declining balance)
b. SLN (straight line)
c. DDB (double-declining)
d. All of above
Correct Answer: b
75. Which of the following is not an underline option in the format cells dialog box?
a. Double
b. Single Engineering
c. Single Accounting
d. Double Accounting
Correct Answer: b
80. To open an existing workbook, you can click the Open button on the …… toolbar.
a. Drawing
b. Formatting
c. Forms
d. Standard
Correct Answer: d
81. Which of the following is not an option in the spelling dialog box?
a. Edit
b. Ignore
c. Ignore all
d. Change
Correct Answer: a