CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
General Knowledge
‣
Computer
Comments
Question
In Microsoft Excel, the _________() function is used to count the number of cells that contain numbers within the list of arguments.
Options
A. COUNTIF
B. COUNT
C. SUMCOUNT
D. COUNTSUM
Correct Answer
COUNT
Tags:
Bank Exams
Computer problems
Search Results
1. Using _________ one can resize, tag digital images, organise pictures into albums by drag and drop, can export the pictures for external use (by e-mail or print).
Options
A. Data Organiser
B. Facebook Organiser
C. Image Organiser
D. Media Organiser
Show Answer
Scratch Pad
Discuss
Correct Answer: Image Organiser
2. In Microsoft Excel, the ______() function is used to count the number of cells within a range that meet the given criteria.
Options
A. COUNTIF
B. COUNT
C. SUMCOUNT
D. COUNTSUM
Show Answer
Scratch Pad
Discuss
Correct Answer: COUNTIF
3. Constantly running system - program processes are known as
Options
A. Daemons
B. Processes
C. Process Block
D. Process Control Block
Show Answer
Scratch Pad
Discuss
Correct Answer: Daemons
4. Which of the following statement is true?
Options
A. A Primary key is also a candidate key
B. Each relation has at least one foreign key
C. Foreign keys can't have null values
D. A Primary key is also an alternate key
Show Answer
Scratch Pad
Discuss
Correct Answer: A Primary key is also a candidate key
5. In IT, the technique of delaying outgoing acknowledgements temporarily is known as
Options
A. AR Acknowledgement
B. AR request
C. Piggybacking
D. Piggyframing
Show Answer
Scratch Pad
Discuss
Correct Answer: Piggybacking
6. _____________ is a collection of data values of same types having a common name.
Options
A. Object
B. String
C. Array
D. Numbers
Show Answer
Scratch Pad
Discuss
Correct Answer: Array
7. _________ software are freely available and can be edited and customized by anyone.
Options
A. Free Source
B. Open Source
C. Easy Source
D. Unpaid Source
Show Answer
Scratch Pad
Discuss
Correct Answer: Open Source
8. The attribute ___________ specifies (in pixels) the distance between two adjacent cells.
Options
A. Width
B. Height
C. Cellpadding
D. Cellspacing
Show Answer
Scratch Pad
Discuss
Correct Answer: Cellspacing
9. ______ Disk Encryption is a technology (hardware or software) where data is encrypted before storage.
Options
A. Half
B. Whole
C. Double
D. Triple
Show Answer
Scratch Pad
Discuss
Correct Answer: Whole
10. Which of the following is an example of Electrically-Erasable Programmable Read-Only Memory?
Options
A. Flange
B. Fury
C. Flash
D. FRAM
Show Answer
Scratch Pad
Discuss
Correct Answer: Flash
Comments
There are no comments.
Enter a new Comment
Save
More in General Knowledge:
Animals and Birds
Basic General Knowledge
Biology
Books and Authors
Business Awareness
Chemistry
Computer
Country Capitals
Days and Years
English
Famous Personalities
Famous Places
General Science
Honours and Awards
Indian Culture
Indian Economy
Indian Geography
Indian History
Indian Politics
Inventions
Longest Shortest Deepest
Physics
Sports
Technology
World History
World Geography
World Organizations