Computer Science/IT MCQs
Topic Notes: Computer Science/IT
MCQs and preparation resources for competitive exams, covering important concepts, past papers, and detailed explanations.
Plato
- Biography: Ancient Greek philosopher (427–347 BCE), student of Socrates and teacher of Aristotle, founder of the Academy in Athens.
- Important Ideas:
- Theory of Forms
- Philosopher-King
- Ideal State
21
By default, Access is typically configured to ___________ macros in databases from untrusted sources.
Answer:
Disable all with notification
This is the default security posture. Access blocks potentially dangerous content but informs the user via the Message Bar, giving them the choice to enable it if they trust the source.
22
An "embedded macro" is a macro that is:
Answer:
Stored as part of an object's event property, rather than as a separate object in the Navigation Pane
Embedding a macro directly into a button's "On Click" property is convenient because the macro logic travels with the form if you copy it to another database. Standalone macros are separate, reusable objects.
23
Where would you go to manage security settings like Trusted Locations and Macro Settings?
Answer:
The Access Options > Trust Center
The Trust Center is the central hub for all security and privacy settings in all Microsoft Office applications, including Access.
24
Splitting a database into a "front-end" and a "back-end" is a common strategy to:
Answer:
Improve performance and security in a multi-user environment
Each user gets a copy of the front-end (with forms, queries, etc.) on their computer, while the back-end (with the shared data tables) resides on a network server. This reduces network traffic and makes it easier to distribute updates.
25
Which of the following is an example of an "Action" you can choose in the Macro Builder?
Answer:
All of the above
The Macro Builder provides a dropdown list of dozens of predefined actions that allow you to manipulate almost every aspect of the database, from opening and closing objects to running queries and displaying messages.
26
The "Encrypt with Password" feature in Access is used to:
Answer:
Scramble the entire database file so that it cannot be opened without the correct password
This provides a strong layer of security by making the database file unreadable to anyone who does not possess the password.
27
To create a macro that runs when a user clicks a button on a form, you would attach the macro to the button's _________ event.
Answer:
On Click
Event properties determine when a macro or piece of code will run. The "On Click" event is triggered specifically when a user clicks on the object.
28
What is a "Trusted Location" in Access security settings?
Answer:
A folder on your computer or network that you have designated as safe, allowing databases in it to run without security warnings
By setting up trusted locations, you can bypass the security warnings for databases you have created yourself or that you know are from a reliable source.
29
When you open an Access database from an untrusted location, a yellow ____________ often appears below the Ribbon.
Answer:
Message Bar with a security warning
The Message Bar is a security feature that warns you that potentially unsafe active content (like macros or certain queries) has been disabled. You must explicitly click "Enable Content" to allow it to run.
30
What is a Macro in Microsoft Access?
Answer:
A tool for automating tasks and adding functionality to your database without writing programming code
A macro is a saved sequence of actions that Access can execute. It allows you to automate common or repetitive tasks, like opening a form or running a query when a button is clicked.