Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
6181
What is the relationship between bandwidth and throughput?
Answer:
Throughput can never be greater than bandwidth.
Bandwidth is the theoretical maximum, while throughput is the actual performance, which is always less than or equal to the bandwidth.
6182
What is the difference between a switch and a bridge?
Answer:
Both a and b
A switch is essentially a faster, multiport bridge. They both operate at Layer 2 and use MAC addresses.
6183
The IEEE 802.11 standard refers to:
Answer:
Wireless networks (Wi-Fi)
The IEEE 802.11 family of standards defines the protocols for wireless local area networks.
6184
An expansion card that connects a computer to a network is called what?
Answer:
Network interface card
A Network Interface Card (NIC) is a hardware component that allows a computer to connect to a network.
6185
To protect the intellectual property contained in your forms and reports, you should distribute your application as a(n) ________ file.
Answer:
ACCDE
The ACCDE "execute only" format prevents users from entering Design View for forms, reports, and modules, thereby protecting your design and source code.
6186
The `RunCode` action in a macro is used to:
Answer:
Execute a custom function written in VBA
This action provides a bridge between the simplified macro system and the more powerful VBA programming language, allowing you to call custom code from within a macro.
6187
User-Level Security, a feature of older Access MDB files, allowed an administrator to:
Answer:
Assign detailed permissions (e.g., read, edit, delete) to specific users and groups for individual objects
This complex security model was removed from the newer ACCDB format. Security for modern Access databases is typically handled by file system permissions or by using a more robust back-end like SQL Server.
6188
An "AutoExec" macro is a special macro that:
Answer:
Automatically executes when the database is first opened
If you create a macro and name it "AutoExec", Access will automatically run it every time the database starts, making it a useful tool for initialization tasks.
6189
Disabling macros in the Trust Center will:
Answer:
Prevent any macros from running in any database you open, unless it is in a trusted location
The Trust Center settings provide a global level of control over how Access handles active content.
6190
The back-end of a split database contains only the:
Answer:
Tables
The back-end file (`_be.accdb`) is purely a data container. It holds the tables and the relationships between them. All the application logic and user interface are in the front-end.