Professional Documents
Culture Documents
Class 8
Class 8
Answer
Tabular
Answer
DBMS
Answer
Record Navigation Bar
Answer
database
Answer
Redundancy
Answer
.accdb
Answer
Database Management System
Answer
Currency
Answer
Lookup Wizard
Answer
Relational database, Foreign, Cascade Update Related Fields,
Query, Customise
Answer
Selected Fields
Answer
Sort & Filter
Answer
Toggle Filter
Answer
Ctrl + F
16. ............. does not delete any data, it just hides the rest.
Answer
Filtering
Answer
printable
18. You can customize a form and add fields of your choice by
using ............. .
Answer
Form Design
Answer
database
20. Select ............. from the drop-down list box to make sure that
the report appears in the ascending order.
Answer
Field
21. You can also ............. the table name to view the field names
in the table.
Answer
Double-click
22. To view the form, on the Design tab, in the ............. group,
from the drop-down list, click Form View.
Answer
Create
Answer
Report Wizard
24. A ............. allows you to enter, change and view the data in a
database.
Answer
Form
Answer
Record Navigation bar
26. ............. button helps in selecting all the fields under the
Selected Fields list.
Answer
Add All
Answer
Hardware
Answer
Malfunction
Answer
Hardware
Answer
Software
Answer
Hardware
33. Identify the troubleshoot areas.
Computer restarts without any warning message. .............
Answer
Operating System
Answer
Random Access Memory
Answer
Application
Answer
backbone
37. The hardware inside the CPU box can be identified usually
by a ............. .
Answer
Hardware Specialist/Computer Technician
Answer
Social Networking Site
39. A social networking website allows ............. with all over the
world.
Answer
Communication/Engagement
Answer
Google Photos
Answer
Mark Zuckerberg
Answer
Cyber Crime
Answer
Hacking
Answer
Software piracy
Answer
LinkedIn
Answer
Facebook
Answer
Phishing
Answer
Manipulation
Answer
Path Tool
Answer
Splash
Answer
Selection
52. Pattern and Font Panel is used to select ............. and font for
the images.
Answer
Pattern
Answer
Undo History
54. Small ............. at the lower right of the tool indicates the
presence of hidden tools.
Answer
Triangle
Answer
.xcf format
57. ............. is used to draw free hand lines with a hard edge.
Answer
Pencil Tool
Multiple choice 43 X = 0
58. Access 2016 is an example of ____________ .
· Database Management System (DBMS)
· Relational Database Management System (RDBMS)
· Relative Database Management System (RDBMS)
· Databar Management System (DBMS)
Answer
Relational Database Management System (RDBMS)
Answer
Duplicated
Answer
Flat file database
Answer
Short text
Answer
16
64. Out of the following fields (P_ID, P_Name, P_Address,
P_Phone) of Patients table, which field will be preferred to
become a primary key.
· P_Name
· P_Address
· P_Phone
· P_ID
Answer
P_ID
Answer
Home
Answer
Alt + F4
Answer
OLE Object
Answer
Edit Relationships
Answer
MM/DD/YYYY
Answer
All of these
Answer
Find Next
Answer
Create
Answer
Cascade Delete Related Records
74. Which option in Edit Relationships dialog box prevents you
from entering a value in the Foreign Key field?
· Cascade Update Related Fields
· Enforce Referential Integrity
· Cascade Delete Related Records
· None of these
Answer
Enforce Referential Integrity
Answer
Ctrl+F
76. What is the function of 'Filter' in the Sort and Filter group?
· To filter and delete the data
· To arrange the data alphabetically
· To hide the data
· To just filter the data
Answer
To just filter the data
Answer
Query Wizard
Answer
Null value
Answer
Query
Answer
Create
81. By default, the form displays the _________ member details
· first
· last
· Second
· Fifth
Answer
first
Answer
Create
Answer
Worksheets
Answer
Report
Answer
Query
Answer
Windows
Answer
Software
Answer
Hardware
Answer
Task Manager
Answer
Safe Mode
Answer
20
Answer
Gradient
Answer
Crop tool
Answer
All of these
Answer
.wav
Answer
Layers Panel
Answer
Move Tool
Answer
.xcf
100. This tool selects paths and path segments showing anchor
points.
· Path Selection Tool
· Pencil Tool
· Pen Tool
· Paintbrush Tool
Answer
Path Selection Tool
True/False
101. MySQL is a type of Database Management System.
True
False
Answer
True
Answer
False
103. The first result that matches your search term using Record
Search Box will appear highlighted with a red border.
True
False
Answer
False
104. In the File tab, click the Recent section and the file name to
open the databases you recently worked on.
True
False
Answer
True
Answer
False
106. When clicked on Blank desktop database, the Microsoft
Access opens the last saved file.
True
False
Answer
False
Answer
False
Answer
False
Answer
True
Answer
True
Answer
True
Answer
False
Answer
True
115. IS NULL helps to retrieve records where the column is
having values in the database.
True
False
Answer
False
116. Two tables are linked by defining Primary key in both tables.
True
False
Answer
False
Answer
True
Answer
True
119. DD/MM/YYYY is the data format when your language of
your computer is set to English (U.K.).
True
False
Answer
True
Answer
False
Answer
False
Answer
True
123. Click the Add All button to shift all the fields that appear
under the Available Fields list box.
True
False
Answer
False
Answer
False
Answer
True
Answer
True
Answer
False
Answer
True
129. Reports and forms are more or less similar. Only difference
being, forms are printed, reports are viewed online.
True
False
Answer
False
Answer
False
Answer
True
133. Noise of the fan does not affect the hardware performance.
True
False
Answer
False
Answer
True
Answer
True
Answer
False
137. YouTube is a professional networking site.
True
False
Answer
False
Answer
False
139. It might affect your health if you spend too much time
playing online games.
True
False
Answer
True
Answer
False
Answer
True
Answer
False
Answer
True
144. There is no law which governs the virtual world i.e. Cyber
world.
True
False
Answer
False
Answer
True
147. When you start GIMP, the first screen that appears is called
Splash screen.
True
False
Answer
True
Answer
False
Answer
False
150. When you start GIMP, the Tools panel appears in the right
of the screen.
True
False
Answer
False
Answer
It can store up to 255 characters.
This field can store both integer and decimal values.
To store date and time
To store values involving money
A random number that is automatically inserted and
incremented when a record is added.
Answer
Design and Datasheet View
Answer
Currency Data Type
Answer
It helps in uniquely identifying each record in a table.
Answer
In case of system failure, it provides facility for data recovery, as
database has lots of integrity. Checkpoints prevent the loss of
data from secondary memory.
Answer
DBMS makes sure that data are not duplicated. Both the files will
only have several identical fields. For example, personal details
are stored in two files in a database. DBMS will reduce the
multiple copies of the same data to a single copy.
158. Explain the rules for naming the fields in Access 2016.
Answer
Rules for naming the fields in Access 2016: a) The field name
should not be more than 64 characters. b) It can include
lowercase, uppercase or mixed case letters, numbers and an
underscore. c)It cannot have period(.). Exclamation (!), or a
square brackets ([]). d) It cannot start with blank space.
160. What do you understand by the term Data Type? Name the
data type used for storing date and time in tables.
Answer
A Data type refers to the type of data which can be stored I a
column of a table. "Date/Time" data type is used to store date
and time values for years.
Answer
The Primary Key is a unique identifier for a record. This field can
never be blank or can contain a null value. The Primary Key is a
unique value for that column and hence it cannot be the same
for two records.
162. How are field and record different from each other?
Answer
Fields are the columns in a table while Records are the rows in
the table.
Answer
Yes, relationship between two tables can be created. Its purpose
is to avoid duplicate entries of data.
164. How does the criteria option help in defining the results of a
query?
Answer
Criteria option helps to retrieve records based on the given
condition.
Answer
It helps in keeping records in related fields valid and accurate,
Referential integrity ensures that you don't accidently change or
delete related data in one table but not in the other.
Answer
Duplicate entries can be avoided in tables by using a Primary
key or a Unique key on a table with appropriate fields to stop
duplicate records.
Answer
A Foreign key is the primary key of another table which creates
the link between two tables based on a common column.
176. How can you show only selected records with a form?
Answer
There are different ways in which you can limit the records that
you will see with a form, you can:
a. Open a form and apply a Filter.
b. Create a query that selects records and base the Form on that
Query.
177. Describe how Microsoft Access is useful in filling and
analysing the data.
Answer
Options like Forms in Microsoft Access allows efficient data entry
and options like Query and Filter allows to quickly retrieve data
and analyze it accordingly.
Answer
The Record Navigation bar shows the number of records in a
table. It also provides numerous navigation buttons to view the
records.
185. What are the two ways by which we can design forms?
Answer
By using Form Wizard and Form Design
Answer
Columnar, Tabular, Datasheet, Justified
Answer
Report is a database object. It is used to view and summarise
the data in a printable format.
195. Ram was writing a letter and suddenly the keyboard stops
working. What will be the first step that he should take to
troubleshoot the keyboard problem?
Answer
The first step that Ram will take to troubleshoot the keyboard
problem is to check the connection of keyboard with CPU,
sometimes it gets loose.
Answer
She will check the volume level; click the audio button on the
Navigation bar to make sure that the sound is turned ON. Also,
check that the volume is high.
Answer
Answer may vary from student to student.
201. What are the different problems which are encountered with
an Operating system?
Answer
The problems which are encountered with operating systems
are: OS restarts without any warning message, OS stops
responding and OS file does not boot.
207. How can you become a smart netizen while using the
internet?
Answer
By following the set of moral rules or a code of behavior, while
being online, for example, not to send viruses or malicious
codes, do not attempt to gain unauthorized access to computers,
not to post indecent content on the Internet and do not obtain
property or services online by deception.
208. How does social networking lead to Digital Competence?
Answer
Technology is evolving faster than ever before. Learning to adapt
to new technologies or new applications at a young age will help
you adapt to future technology.
Answer
A social networking site (SNS) is a web-based service that
enables you to communicate with friends and family, share
experiences, promote a cause or keep you updated with news.
214. Share examples of social networking websites.
Answer
Examples of Social Networking websites: Facebook, Twitter,
Google+ and a lot more.
Answer
Rectangle Select Tool and Ellipse Select Tool.
Answer
Brush, Size, Opacity
Answer
Linear, Bilinear, Radial, Square, Conical, Shaped or Spiral.
220. Write down the steps to draw a straight line using Pencil
tool.
Answer
If you want to draw straight lines with the Pencil tool, Click at the
starting point, then hold down Shift and click at the ending point.
222. Which GIMP tools will you use to draw a scenery using
shapes?
Answer
To draw a scenery using shapes, use Drawing Tools, such as,
Pen Tool, Path Selection Tool, and Rectangle Tool.
Answer
Each time you perform an action, it gets recorded in the Undo
History panel. You can view any recent stage of the image. You
can also undo multiple actions. After saving or closing the
document, the History panel clears all the contents.
227. Which tool will you use if you need a specific image size or
want to eliminate the unwanted areas of your image?
Answer
Crop Tool makes a precise selection of an image that you want
to trim.
228. List the types of DBMS. Which type is the most commonly
used database and why?
Answer
There are four types of DBMS: Hierarchical, Network, Relational,
Object oriented Among these databases, the most commonly
used database is Relational Database Management System
(RDBMS). It has multiple tables of data that are related to the
tables of other databases making it more flexible than other
types of databases, hence it is most commonly used.
231. Differentiate between short text and long text data types.
Answer
Short Text: It is used to store alphanumeric data, that is, text or
combinations of text and numbers.
Long Text: It is used for larger blocks of text, such as notes or
description. It stores up to 64,000 characters.
Answer
Datasheet view is helpful for inserting data in tables. To insert
and save records in a table, follow these steps; Step1: On the
design tab, in the View group, click the view drop down arrow.
Step 2: Select datasheet view. Step 3: Enter he values in the
field, press the Tab key to enter value in another field. Similarly,
enter data in the remaining fields. Step 4: Click the File tab and
select the Save As option. Step 5: Click Save Database As
option. Step 6: In the Save As dialogue box, in the File name text
box, type name of the database. Step 7: Click Save.
Answer
Examples of operating-system problems which you may
encounter are:
• OS restarts without any warning message
• OS stops responding
• OS file does not boot
Answer
Following are the advantages of social networking:
• Educational development: You can use social networking to
discuss schoolwork and share assignments.
• Research: You can gather information for projects.
• Digital competence: Technology is evolving faster than ever
before. Learning to adapt to new technologies or new
applications, at a young age will help you to adapt to future
technology.
Answer
The different properties of the Brush tool are:
• Brush: It lets you change the brush.
• Size: It lets you change the size of the brush.
• Opacity: It sets the level of transparency.
• Decreasing the percentage of opacity will make the brush more
transparent.
Answer
The pencil and paintbrush are similar tools. The main difference
between the two tools is that although both use the same type of
brush, the Pencil tool will not produce fuzzy edges, even with a
Fuzzy brush. It does not even do anti-aliasing.
244. What is the use of Fuzzy Select tool for select a part of
image? Write down the steps to access Fuzzy select tool.
Answer
The Fuzzy Select (Magic Wand) tool is designed to select areas
of the current layer or image based on color similarity.
When using this tool, it is very important to pick the right starting
point. If you select the wrong spot, you might get something very
different from what you want, or even the opposite.
You can access the Magic Wand Tool with following steps:
From the image menu bar, Tools Selection Tools Fuzzy Select
Answer
a) Enforce Referential Integrity-If corresponding value does not
exist in the primary key field, it prevents you from entering a
value in the foreign key field.
b) Cascade Update Related Fields-If you modify the primary key
value, it allows you to update all the related foreign key values.
c) Cascade Delete Related Record-If you delete records from
the primary key table, it allows you to delete the related records
from the foreign key table.
Answer
The Query Wizard is an interface through which you can view
the database tables and fields. It enables you to create queries
based on the database logic. For example: This query wizard will
allow you to create a query that reports any orphan or widowed
records between two Microsoft Access tables. An orphaned
record is when a record in the many-side (child or related) table
relationship has no corresponding record in the one-side (parent
or primary) table.
Query Design View displays table schemes, along with their
relationships, and allows the user to select columns to return
(projection) and specify criteria for the returned data (selection).
Answer
HARDWARE-Computer hardware is the physical part of the
computer. Examples of hardware problems that you might
encounter are: power failure, loose connection with devices,
noise of the fan and increased dissipation of heat and hard disk
crash.
SOFTWARE-Computer software is a program or an application
running on the computer. Examples of software problems you
might encounter are: error messages, unable to install the
software, slow speed while working on a particular software and
system crash.
OPERATING SYSTEM (OS)-Operating system is the backbone
of a computer. Without an operating system you cannot work on
a computer. It can be frustrating when you switch on the
computer and it is unable to boot.
Answer
By using Pinterest, you can pin your favorite websites. Pinterest
acts as a digital bulletin board or digital scrapbook for collecting
the links that you like on the Internet. Also, it helps you keep
everything organized on your board. It is different from other
social networks like Facebook, that focus mainly on personal
sharing and status updates.
Answer
Cybercrime is a term to describe a crime or illegal activity done
through the Internet. Crimes which involve use of information or
usage of electronic means in furtherance of crime are covered
under the ambit of cybercrime.' It may be committed against
persons, property, government and society at large. It can be
prevented by following cyber ethics (a set of a moral rules or a
code of behavior). Handle your username and password, and
personal information with extra care. Some most commonly
occurred crimes in cyber space are:
Hacking: An illegal intrusion into a computer system or network.
Spreading of computer virus: The spreading of computer viruses
or infecting of other programs is another form of cybercrime.
Denial of service attack: Denial of service attacks is done to a
website by flooding it with data with the intention of crashing and
preventing the owners from gaining access to it.
Cyber stalking: An act of threatening or harassing someone by
using the Internet services is known as cyber stalking.
Software privacy: Theft of software for illegal use or distribution
of products is referred to as software piracy.