Which of the following keys is used to move the cursor to the end of the paragraph.
A. }
B. {
C. |
D. $
E. None of the above

1 Answer

Answer :

A. }

Related questions

Description : To move the cursor to end of the document, press ................ A) Ctrl+End B) End C) Alt+End D) Shift+End

Last Answer : A) Ctrl+End

Description : You can use the tab key to 1) Move a cursor across the screen 2) Indent a paragraph 3) Move the cursor down the screen 4) Only (1) and (2) 5) None of these

Last Answer : Answer :2

Description : _______located between the main keypad and the numeric keypad, are used to move the cursor up, down, left and right: a) Numeric Keypad b) Arrow Keys c) Symbolic Keypad d) None of These

Last Answer : b) Arrow Keys

Description : The Unix command: $ vi file1 file2 (A) Edits file1 and stores the contents of file1 in file2 (B) Both files i.e. file1 and file2 can be edited using ex' command to travel between files (C) Both ... using the mv' command to move between the files (D) Edits file1 first, saves it and the edits file2

Last Answer : (B) Both files i.e. file1 and file2 can be edited using ‘ex’ command to travel between files

Description : In Excel, have you have ever had this problem with the cursor keys?

Last Answer : answer:The whole screen?! Like the desktop and everything… basically all lit pixels? Or do you mean the whole Excel window?

Description : Which of the following shortcut keys brings the cursor to the last cell on the sheet that contains data? -Technology

Last Answer : (b) Ctrl+End shortcut is used to bring the cursor to the last cell.

Description : What are Cursor Control Keys on Keyboard?

Last Answer : Ans. These four keys are used for moving the cursor from its current position to right, left, up or down.

Description : Which of the following keys is used to replace a single character with new text? A. S B. s C. r D. C E. None of the above

Last Answer : B. s

Description : Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: I: {B} II: {B, C} III: {A, D} IV: {C, D} If ... the database table? (A) I and III only (B) III and IV only (C) II only (D) I only

Last Answer : (C) II only

Description : The short cut key to start a new line without starting a new paragraph is ...... A) Ctrl+Enter B) Shift+Enter C) Alt+Enter D) Ente

Last Answer : B) Shift+Enter

Description : The relational model is based on the concept that data is organized and stored in two-dimensional tables called ………………………A) Fields B) Records C) Relations D) Keys

Last Answer : C) Relations

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : A) SSL handshake protocol

Description : What will be the output? d = {"john":40, "peter":45} print(list(d.keys())) a) [“john”, “peter”]. b) [“john”:40, “peter”:45]. c) (“john”, “peter”) d) (“john”:40, “peter”:45)

Last Answer : a) [“john”, “peter”].

Description : Read the code shown below carefully and pick out the keys? d = {"john":40, "peter":45} a) “john”, 40, 45, and “peter” b) “john” and “peter” c) 40 and 45 d) d = (40:”john”, 45:”peter”)

Last Answer : b) “john” and “peter”

Description : Translation Look-aside Buffer(TLB) is (A) a cache-memory in which item to be searched is compared one-by-one with the keys. (B) a cache-memory in which item to be searched is compared with ... keys. (D) an associative memory in which item to be searched is compared with all the keys simultaneously.

Last Answer : (D) an associative memory in which item to be searched is compared with all the keys simultaneously.

Description : Assuming there are n keys and each keys is in the range [0, m-1]. The run time of bucket sort is (A) O(n) (B) O(n lgn) (C) O(n lgm) (D) O(n+m)

Last Answer : (D) O(n+m)

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : For any B-tree of minimum degree t ≥2, every node other than the root must have atleast ............... keys and every node can have at most .............. keys. (A) t-1, 2t+1 (B) t+1, 2t+1 (C) t-1, 2t-1 (D) t+1, 2t-1

Last Answer : (C) t-1, 2t-1 

Description : Based on the cardinality ratio and participation ............... associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design. (A) Entity (B) Constraints (C) Rules (D) Keys

Last Answer : (B) Constraints

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n ≤ m, the expected number of collisions involving a particular key K is (A) less than 1 (B) less than lg n (C) greater than 1 (D) greater than lg n

Last Answer : (A) less than 1

Description : Fact-less fact table in a data warehouse contains (A) only measures (B) only dimensions (C) keys and measures (D) only surrogate keys

Last Answer : (D) only surrogate keys

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : The number of disk pages access in B-tree search, where h is height, n is the number of keys, and t is the minimum degree, is: (A) θ(logn h*t) (B) θ(logt n*h) (C) θ(logh n) (D) θ(logt n)

Last Answer : Answer: D

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n≤m, the expected number of collisions involving a particular key x is less than ................... (1) 1 (2) 1/n (3) 1/m (4) n/m

Last Answer : Answer: 1

Description : Which symbol is used to separate more than one command in the same command line? A. $ B. # C. : D. ;

Last Answer : D. ;

Description : The value of postfix expression: 8 3 4 + - 3 8 2 / + * 2 $ 3+ is (A) 17 (B) 131 (C) 64 (D) 52

Last Answer : (D) 52

Description : Which of the following commands would return process_id of sleep command? (A) Sleep 1 and echo $? (B) Sleep 1 and echo $# (C) Sleep 1 and echo $x (D) Sleep 1 and echo $!

Last Answer : (D) Sleep 1 and echo $!

Description : The output generated by the LINUX command : $ seq 1 2 10 will be (A) 1 2 10 (B) 1 2 3 4 5 6 7 8 9 10 (C) 1 3 5 7 9 (D) 1 5 10

Last Answer : (C) 1 3 5 7 9

Description : Unix command to change the case of first three lines of file “shortlist” from lower to upper (1) $ tr ‘[a-z]’ ‘[A-Z]’ shortlist | head-3 (2) $ head-3 shortlist | tr ‘[a-z]’ ‘[A-Z]’ (3) $ tr head-3 shortlist ‘[A-Z]’ ‘[a-z]’ (4) $ tr shortlist head-3 ‘[a-z]’ ‘[A-Z]’

Last Answer : (2) $ head-3 shortlist | tr ‘[a-z]’ ‘[A-Z]’ 

Description : I'm not able to move the cursor on my Dell laptop. What gives?

Last Answer : I’m the very last person to give computer advice, but I had this issue and I have a router on my laptop. My other computer was turned completly off and when I turned it on, everything worked. Note: I am a computer idiot so if this doesn’t seem correct, ignore me.

Description : What key is use to move the cursor to the next line?

Last Answer : enter

Description : Short cut key for 'Move the cursor to the beginning of the next word' is: a) Shift + Right Arrow b) Ctrl + Right Arrow c) Ctrl + Left Arrow d) None of These

Last Answer : b) Ctrl + Right Arrow

Description : What do you call the cross with arrows on each end image that comes on only when your cursor is within the screenshot you captured/trying to capture?

Last Answer : Please ignore the words “only”, and “trying to capture” in the Question.

Description : Which of the following should be done by user while typing a paragraph: a) Press Enter at the end of every line b) Press Enter at the end of every statement c) No need to press Enter d) Press Enter at the end of every paragraph e) None of The Above

Last Answer : d) Press Enter at the end of every paragraph

Description : Soft Pages breaks __________: a) are induced by the user b) are inserted by word automatically at the end of the page c) can be deleted d) are the one to show end of paragraph e) None of The Above

Last Answer : b) are inserted by word automatically at the end of the page

Description : When entering text within a document, the Enter key is normally pressed at the end of every a) Line b) Sentence c) Paragraph d) Word e) None of these

Last Answer : b) Sentence

Description : ............. is the time required to move the disk arm to the required track. A) Seek time B) Rotational delay C) Latency time D) Access time

Last Answer : A) Seek time

Description : In the …………….. traversal we process all of a vertex’s descendents before we move to an adjacent vertex. A) Depth First B) Breadth First C) With First D) Depth Limited

Last Answer : A) Depth First

Description : HTML stands for A) Hypertext Mass up language B) Hypertext Markup language C) Hypertext Move up language D) Hypertext Mark of language

Last Answer : B) Hypertext Markup language

Description : Which of the following is not true with respect to a trackball and/or spaceball ? I. A trackball is a two dimensional positioning device while as a spaceball provides six degrees of freedom II. Unlike the trackball a spaceball does ... of freedom. (A) I & II (B) II & III (C) II only (D) III only

Last Answer : (D) III only

Description : Consider a 3-puzzle where, like in the usual 8-puzzle game, a tile can only move to an adjacent empty space. Given the initial state  which of the following state cannot be reached? 

Last Answer : Answer: C

Description : How does randomized hill-climbing choose the next move each time? (A) It generates a random move from the moveset, and accepts this move. (B) It generates a random move from the whole state ... move from the whole state space, and accepts this move only if this move improves the evaluation function.

Last Answer : (C) It generates a random move from the moveset, and accepts this move only if this move improves the evaluation function. 

Description : How can you improve this paragraph, especially at the end of it.

Last Answer : answer:I capitalized my changes. Some changes you can't easily see because I deleted some words. I put questions for you in parenthesis (). Evolutionfresh.com is a highly interactive webpage ... move to relative area around the production, which relative images can shift behind the production image.

Description : Can you tell me a paragraph near the beginning of “Heart of Darkness” that is similar to one near the end of the book?

Last Answer : answer:Read the book (it is a good one) and then get back to me. I have to confess, and I apologize it it rubs you the wrong way, but I really do not like people who refuse to read for their ... initial impression is that you are sort of a loser. I could change my mind, but until then Read the book

Description : $ Sperm in Bryophytes are flagellated. ! Sperms in bryophytes move to the mature and dehisced archegonia, under the effect of chemicals.

Last Answer : $ Sperm in Bryophytes are flagellated. ! Sperms in bryophytes move to the mature and dehisced archegonia, under ... D. If both As and R are wrong.

Description : What is the output of the following? x = "abcdef" i = "i" while i in x: print(i, end=" ") a) no output b) i i i i i i … c) a b c d e f

Last Answer : a) no output

Description : What is the output of the following? x = "abcdef" while i in x: print(i, end=" ") a) a b c d e f b) abcdef c) i i i i i i … d) error

Last Answer : d) error

Description : Let R be the rectangular window against which the lines are to be clipped using 2D Sutherland-Cohen line clipping algorithm. The rectangular window has lower left-hand corner at (-5,1) and upper righthand corner at (3,7). ... s) is/are candidate for clipping? (A) AB (B) CD (C) EF (D) AB and CD

Last Answer : (D) AB and CD