Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
11
A macro can be triggered by a "key press" event on a form.
Answer:
True
Form and control events are very granular. You can trigger macros based on events like `On Key Down`, `On Key Press`, and `On Key Up` to capture keyboard input.
12
Why might a company choose to disable all macros by default across their organization via group policy?
Answer:
As a security measure to prevent users from accidentally running malicious code from an untrusted email attachment
Because macros can be used to deliver malware (macro viruses), many organizations enforce a strict security policy that disables them, only allowing them to run from centrally managed trusted locations.
13
The "Single Step" mode for debugging a macro allows you to:
Answer:
Run the macro one action at a time, pausing after each step
Single-stepping is a crucial debugging tool. It lets you walk through your macro's logic step-by-step to identify exactly where an error is occurring.
14
To run a macro that opens a report and then closes the database, you would need how many actions in the Macro Builder?
Answer:
Two
You would create a macro with two sequential actions: the first would be `OpenReport` (with the report name as an argument), and the second would be `QuitAccess`.
15
What is the role of an "argument" for a macro action?
Answer:
It provides the specific information needed for an action to run, such as which form to open or which query to run
When you select an action like `OpenForm`, you must provide arguments like the "Form Name" to tell Access exactly which form you want it to open.
16
If you forget the password you used to encrypt an Access database:
Answer:
The data is generally considered unrecoverable
The encryption used by Access is strong. There is no "backdoor" or master key. Forgetting the password means losing access to the data permanently.
17
A "data macro" is a type of macro that is attached to:
Answer:
A table event (e.g., Before Change, After Insert)
Data macros are triggered by data events directly at the table level. This allows you to enforce business logic regardless of how the data is being changed (whether through a form, a query, or directly in the datasheet).
18
What does "compiling" an Access database into an ACCDE file do?
Answer:
It compiles all VBA code, removes the source code, and prevents changes to the design of forms, reports, and modules
Creating an ACCDE file is a way to distribute an Access application to users. It protects your design and code from being viewed or modified, effectively locking the application down.
19
The `MsgBox` macro action is used to:
Answer:
Display a pop-up message box with information or a warning for the user
The `MsgBox` action is a simple way to provide feedback to the user, for example, to confirm that a record has been saved or to display a validation error.
20
What is the main security benefit of a split database design?
Answer:
Both A and B
Users interact with the data only through the forms and queries you provide in the front-end, which gives the developer more control. It also makes deploying updates much simpler.