Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
6201
What does "compiling" an Access database into an ACCDE file do?
Answer:
It compiles all VBA code, removes the source code, and prevents changes to the design of forms, reports, and modules
Creating an ACCDE file is a way to distribute an Access application to users. It protects your design and code from being viewed or modified, effectively locking the application down.
6202
The `MsgBox` macro action is used to:
Answer:
Display a pop-up message box with information or a warning for the user
The `MsgBox` action is a simple way to provide feedback to the user, for example, to confirm that a record has been saved or to display a validation error.
6203
What is the main security benefit of a split database design?
Answer:
Both A and B
Users interact with the data only through the forms and queries you provide in the front-end, which gives the developer more control. It also makes deploying updates much simpler.
6204
By default, Access is typically configured to ___________ macros in databases from untrusted sources.
Answer:
Disable all with notification
This is the default security posture. Access blocks potentially dangerous content but informs the user via the Message Bar, giving them the choice to enable it if they trust the source.
6205
An "embedded macro" is a macro that is:
Answer:
Stored as part of an object's event property, rather than as a separate object in the Navigation Pane
Embedding a macro directly into a button's "On Click" property is convenient because the macro logic travels with the form if you copy it to another database. Standalone macros are separate, reusable objects.
6206
Where would you go to manage security settings like Trusted Locations and Macro Settings?
Answer:
The Access Options > Trust Center
The Trust Center is the central hub for all security and privacy settings in all Microsoft Office applications, including Access.
6207
Splitting a database into a "front-end" and a "back-end" is a common strategy to:
Answer:
Improve performance and security in a multi-user environment
Each user gets a copy of the front-end (with forms, queries, etc.) on their computer, while the back-end (with the shared data tables) resides on a network server. This reduces network traffic and makes it easier to distribute updates.
6208
Which of the following is an example of an "Action" you can choose in the Macro Builder?
Answer:
All of the above
The Macro Builder provides a dropdown list of dozens of predefined actions that allow you to manipulate almost every aspect of the database, from opening and closing objects to running queries and displaying messages.
6209
The "Encrypt with Password" feature in Access is used to:
Answer:
Scramble the entire database file so that it cannot be opened without the correct password
This provides a strong layer of security by making the database file unreadable to anyone who does not possess the password.
6210
To create a macro that runs when a user clicks a button on a form, you would attach the macro to the button's _________ event.
Answer:
On Click
Event properties determine when a macro or piece of code will run. The "On Click" event is triggered specifically when a user clicks on the object.