q_desc
The ------ key can be used to select an existing company from list of
AC1 companies.
Import and Export of data between Tally and other programs is possible only
AC2 through ---------- Program.
The re-order point is the inventory quantity that trigger a stock replishment
AC3 activity.
AC4 A created company's detail can be modified through keys
A/An ------------- is the official notice that the firm sends to its customers to
AC5 advise then to the amount of money that is owed.
AC6 In tally,all masters have ________main options
AC7 In tally,to create a new column in balance sheet press _______
In tally,the use of group behaves like a sub-ledger, option is that we can
AC8 summarize many ledger accounts into one line statements
In tally, we can alter ledger details using either single or multiple modes but
AC9 not alble to delete a ledger from multiple modes.
AC10 In tally,a group company is marked with an ______________
q_id
op1
F1
Tally ODBC
TRUE
F3
Invoice
Two
Ctrl+C
TRUE
TRUE
*
The systems that work together to order,receive, and pay for replenishment of Puchasing and
AC11 stock are --------------Accounts payable
AC12 Tally allows to delete a ledger from --------- alteration mode.
AC13 --------------------- is/are useful for management in the decision making.
Single
Cash Flow
Statements
AC14 In tally,the group company must contain at least _____________ members
AC15 To cancel a vourcher entry in Tally, short-cut key is -----------
Two
Alt+D
AC16 The accounting masters and inventory masters related to
We press ------------- function key to display the age-wise analysis of Bills
AC17 Receivable or Bills Payable report
AC18 In Tally, we press ------------, to print report .
In Tally, Types of Accounts and Types of Vouchers passed during the period,
AC19 can be seen in ------------- report.
In the Tally Software, the ------------ directory stores all data entered by the
AC20 user.
AC21 The Ledger Accounts are unique in Financial Accounting Packages
Customers can be permitted to enter their own data into the firm‟s computer
AC22 using the firm‟s wide area network is an example of
AC23 In Tally, we can customize the Vouchers as per our requirements
AC24 The number of steps in Accounts Compilation are
AC25 Each action/transaction of a firm is described by a ----------------.
AC26 Tally is based on mercantile accounting system
Create Information
AC27 Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that
AC28 summarised information is possible.
AC29 Revenue Account also known as -------------- Account
AC30 Method of Voucher Numbering is/are
AC31 Accounts Receivable are displayed in
F4
Alt+P
Tally Audit
Bin
True
Enterprise Data
Interchange
TRUE
2
data element
FALSE
Display stock
valuation method
Ledgers
Personal
Manual
Balance Sheet
AC32 To assemble a product from different items -------------- entry is used
A --------- purchase orders data flow is directed to the purchasing system for
use in closing out the outstanding purchase orders in the receiving system
AC33 diagram.
AC34 Tally provides at least --------- predefined voucher formats
The value of the inventory is included in a ledger accounts as an asset on the
AC35 balance sheet
" The buyers can follow up with the suppliers to determine the reasons " is an
AC36 example of ----------------From voucher entry mode , if we press __________ then we get payment
AC37 voucher in tally
Journal
AC38 Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged
AC39 accounts member companies of the group.
AC40 A ----------- is a primary document for recording all financial transactions.
AC41 The field can have a value between ________________ in FA Package.
The _______ file maintains data that describes the supplier past transaction
AC42 with the firm in terms of material quality in AIS
AC43 It is necessary to manipulate data to transform it into ---------------AC44 In tally, to change the date of the voucher press ______
AC45 Tally can maintain budgets on ---------------AC46 The value of the inventory is included as an asset on the balance sheet
Main Location
Filled
11
FALSE
management by
objective
F4
True
Ledgers
0 to 9
Supplier
Report
F2
Net Transactions
True
In ratio analysis report of Tally FA packagewe we press ________________
AC47 function key to the display of bills receivable , bills payables report
F6 function key
The accounts payable system is responsible for paying the suppliers for the ---AC48 ------------Sales
1-4-1995 to 31-3AC49 What is the default financial year in Tally6.3 _________________
1996
AC50 Tally encrypts and stores TALLY DATA at the data directory
True
AC51 The Profit & Loss statement can be displayed in ---------------- format(s).
Horizontal
Balance sheet &
profit & loss profit
& loss and trial
AC52 Default ledger accounts in tally are ______
balance
AC53 Default 'godown' name in tally is ____________
Primary
Security
AC54 'Tally vault' is a _________________
mechanism
AC55 To create a sales voucher in tally , you have to press _______
F5
A Group Company is ------------------------- given to the merged accounts of
AC56 member companies of the group.
a name
AC57 In tally,"credit note" voucher type records entry for ________________
Sales return
Company
AC58 In tally you get currency symbol option from _______ menu
creation
------------------ gives the balance for each day for the voucher type has been
AC59 selected.
Trial Balance
AC60 For 'stock journal' entry we press ______________ in tally
F7
Changes in
Tally provides the capability to the administrator/auditor to track changes in the transactions or
AC61 areas is/are
vouchers
AC62 In tally, types of users are _______________
By pressing -------- key, a list of inventory reports can be displayed
AC63 straightaway from the balace sheet report
2
AC64 Projected approximation of income or expenses is called ______________ .
AC65 "Administrator" type user is also called 'Auditor' of a company in Tally
You will get company information , if you press __________ from gateway of
AC66 tally
Balance sheet
TRUE
AC67 A constituent(member) company can be a member of more than one group.
AC68 Default stock category in tally is ______
To create a log of the import activity in a file _____________ is located in the
AC69 same directory as an executable program in tally
AC70 In Tally,inventory valuation method option is available from _______
TRUE
Main location
F9
F3
Tally.imp
Stock summary
By pressing F11
AC71 Tally audit feature is available in a company __________________
function key
In tally, a group company can also be a constituent(member) of another group
AC72 company
TRUE
AC73 Default number of groups in tally are ________
128
AC74 During voucher entry ------------- are used.
AC75 User designated as --------------- can view audit list.
Ledger Accounts
Administrator
One company to
another company
created withon
AC76 Tally supports Importing of data from ---------------Tally Package
In an accounting information system, which of the following types of computer Inventory
AC77 files most likely would be a master file?
subsidiary.
Which of the following is an advantage of a computer-based system for
AC78 transaction processing over a manual system? A computer-based system:
Does not require
as stringent a set
of internal controls.
op2
op3
op4
ans
ALT+F1
CTRL+F1
None of the above A
Tally IMP
Tally INI
None of the above A
false
ALT+F3
CTRL+F3
A
None of the above B
Bill
Three
Alt+C
A or B
Four
Alt+Ctrl+C
None of the above C
Five
B
None of the above B
FALSE
A
FALSE
$
&
Puchasing and
Receiving
Accounts payable
and Receiving
^
Puchasing,
Receiving and
Accounts
payable
A
A
Multiple
Fund Flow
Statements
A or B
Mone of the above A
Ratio Analysis
All of the above
D
Three
Alt+X
One
Ctrl+D
A
B
Alter Information
Four
Ctrl+T
Display
Information
All of the above
D
F5
Ctrl+P
F6
Shift+P
F7
C
None of the above A
Statistics
Day Book
Journal Book
Data
False
Enterprise Data Information
FALSE
3
data record
TRUE
Sub
None of the above B
A
D
B
Electronic Data
Interchange.
All of the above
4
Field
5
All of the above
Open Calculator
Change Period
None of the above B
Groups
Nominal
Automatic
Profit & Loss
Journals
Real
None
Journal Book
None of the above
None of the above
All of the above
All of the above
C
A
C
B
B
B
B
B
A
Stock Journal
Physical Stock
Transfer
Reversing Journal B
Receipt
16
Issue
18
None of the above A
21
B
TRUE
management by
exception
electronic data
analysis
B
All of the above
B
Alt+f5
B
All of the above
C
Primary
F6
Primary Cost
Category
False
Reports
1 to 100
Vouchers
10 to 60
A
None of the above C
None
A
Order
Information
Ctrl+f2
A and B
All of the above
None of the above
Ctrl+f4
None of the above
F7 function key
None of the above A
Purchases
1-4-1996 to 31-31997
False
Vertical
A or B
1-4-1997 to 31-31998
None of the above B
Profit & loss and
trial balance
Main location
Cash and profit &
Cash and bank
C
loss
A or b
None of the above B
Ledger a/c
F7
Cost category
F8
None of the above A
D
F9
an identity
Purchase return
A and B
a or b
None of the above C
None of the above A
Stock items units
Regional setting
None of the above A
Daybook
Alt + F7
Balance Sheet
F10
None of the above B
F11
B
Changes in Ledger
Masters
Both A and B
None of the above C
F5
Suspense
Output
F4
Closing Balance
False
Alt + f6 function
key
A or B
A
C
A
C
A
None of the above B
A
None of the above C
3
4
1
B
F10
F11
F12
A
Profit & loss a/c
FALSE
Budget
None
C
A
Ctrl+F3
Alt+F3
None of the above C
FALSE
Primary
Symbol
None of them
Tally.ini
Stock journal
During the
creation of a
company
A or b
Stock analysis
In 'comp info ->
security control'
option
None
A
None of the above A
None
B
FALSE
228
28
16
A
C
Groups
Owner
Sub-Groups
Data Entry
B or C
TallyVault
A
A
Other programs - a
spreadsheet or a
database file.
Both A and B
Cash
disbursements.
Cash receipts.
Will be more
efficient at
Will produce a
more accurate set producing
financial
of financial
statements.
statements.
A
B
None of the above C
Payroll
transactions.
A
Eliminates the
need to reconcile
control accounts
and subsidiary
ledgers.
C
Q_id
Q_desc
BC1
The memory address register is used to store
BC2
BC3
BC4
Inefficient usage of excess computer equipment can be controlled by
Which of the following is not the component of a CPU
A trailer label is used on a magnetic tape file, it is the last record and
summarises the file. The following is an information not found in the
trailer label
BC5
Hard copy is a term used to describe...?
BC6
What do the abbreviations VAB stand for
What control would prevent the accidental erasure of customer
information from a magnetic tape
What are the individual dots which make up a picture on the monitor
screen called?
BC7
BC8
BC9
BC10
Op1
data to be
transferred to
memory
Contingency
Planning
NIC Card
Record Count
Writing on a hard
board
Voice activated
broadcasting
Validity check
Coloured spots
BC11
Header label normally include all the following except the
A daisy wheel is a type of...?
Which approach or technique is a control usually associated with
microcomputers
File Name
Printer
BC12
An impact printer creates characters by using...?
BC13
BC14
BC15
The best security control in a microcomputer environment is to
What would you NOT use with a flatbed plotter?
What do you need for an ink jet printer?
System Logs
Electrically charged
ink
Restrict physical
access
A pen
A cartridge
BC16
BC17
BC18
The greatest control exposure in a microcomputer environment is the
lack of
What do you need for an ink jet printer?
A laser printer does NOT use?
Separation of
duties
A cartridge
A print head
BC19
BC20
BC21
The amount of data that a disk may contain is known as the disks...?
You can ________ protect a floppy disk.
Information on a hard disk is usually backed-up using a...?
BC22
BC23
Magnetic tape is a...?
Hard disks can have a storage capacity in the region of...?
Volume
Read
Magnetic tape
Serial access
medium
1.44MB
BC24
Which storage device has the largest capacity in Mb?
A CD-ROM
BC25
BC26
BC27
Which storage device cannot be erased?
You can ________ protect a floppy disk
Where should floppy disks be stored?
A CD-ROM
Read
By a sunny window
BC28
BC29
BC30
The contents of these chips are lost when the computer is switched off? ROM chips
What are responsible for storing permanent data and instructions?
RAM chips
Which parts of the computer perform arithmetic calculations?
ALU
BC35
What are small high speed memory units used for storing temporary
results?
CPUs
How many bits of information can each memory cell in a computer chip
hold?
0 bits
What type of computer chips are said to be volatile?
RAM chips
Serial access
Magnetic tape is a...?
medium
Network software
and security
Software can be divided into two areas:
software
BC36
Travel agents use this computer system when reserving flights
BC37
BC38
Which computers are used in the weather forecasting industry?
Vacuum tube based electronic computers are...?
Supercomputer
Notebook
computers
First generation
BC39
Which generation of computer was developed from microchips?
Second generation
BC40
BC41
Second generation
Second generation
BC42
Which generation of computer uses more than one microprocessor?
Which generation of computer developed using integrated circuits?
Which generation of computer developed using solid state
components?
BC43
Name three steps involved in developing an information system
Second generation
Specification,
Design, and
Testing
BC44
How do you define analysis of an information system?
Analysis translates
program code of a
high level language
to machine code
BC45
Only hardware and
What areas need to be considered in the SOFTWARE design process? software
BC46
What is the function of systems software?
BC47
Formatting a disk results in all the data being...?
BC31
BC32
BC33
BC34
BC48
What is Direct Implementation?
BC49
What is parallel running?
BC50
What documents are produced during the development of a system?
To collect data
Deleted from the
disk
Users operate the
manual system and
computer system at
the same time
The new system is
introduced
alongside the
existing system
Instructions and
technical
documentation
BC51
What are User Guides are used for?
For technical
support
BC52
Systems software can be categorised into:
BC53
Which storage device cannot be erased?
BC54
Application software are programs that are written
Operating systems
and system
services
Magnetic tape
storage
To maintain a
backup copy of all
the information
BC55
BC56
BC57
Which bus carries information between processors and peripherals?
Convert the decimal number 2989 to Hexadecimal
Which bus controls the sequencing of read/write operations?
Data bus
FDDI
Data bus
BC58
BC59
What are utilities?
Numbers are stored and transmitted inside a computer in
Peripherals that are
connected to a
computer.
binary form
BC60
BC61
The original ASCII codes
A Nibble corresponds to
BC62
A gigabyte represents
BC63
A 32-bit processor has
BC64
A parity bit is
32 registers
used to indicate
uppercase letters
BC65
BC66
he contents of these chips are lost when the computer is switched off?
Clock speed is measured in
ROM
bits per second
BC67
Cache memory enhances
BC68
BC69
CISC machines
Which parts of the computer perform arithmetic calculations?
memory capacity
have fewer
instructions than
RISC machines
ALU
BC70
BC71
BC72
Every data from the primary memory will be erased if
An RS-232 interface is
For print quality you would expect best results from
Power is switched
off
a parallel interface
line printer
BC73
ROM
is faster to access
than RAM
were 7 bits
4 bits
More than 1000
mega bytes
BC74
A UPS
increased the
storage capacity of a
computer system
BC75
smart card
is a form of ATM
card
BC76
Laptop computers use
BC77
Multiprogramming refers to
BC78
BC79
Multitasking refers to
What are small high speed memory units used for storing temporary
results?
BC80
A good way to exchange information that changes rapidly is through
brochures
BC81
Multiprogramming is a prerequisite for
multitasking
BC82
Timesharing is the same as
BC83
Virtual memory is
multitasking
related to virtual
reality
BC84
BC85
Multiprocessing is
To help keep sensitive computer-based information confidential, the
user should
BC86
What is the function of a disk drive?
BC87
BC88
A 4GL is
A nanosecond is
What small, hand-held device is used to move the cursor to a specific
location on the screen?
BC89
BC90
BC91
CRT displays
having several
programs in RAM
at the same time
having several
softwares running at
the same time
ALU
same as
multitasking
save the file
to calculate
numbers
Uses Cobol
106 sec
a keypad
The memory address register is used to store
data to be
transferred to
memory
The memory data register is used to store
data to be
transferred to or
from memory
BC92
BC93
BC94
BC95
BC96
BC97
BC98
The instruction register stores
Which of the following is used to indicate the location on the computer
monitor?
A mathematical procedure that can be explicitly coded in a set of
computer language instructions that manipulate data.
Which of the following translates a program written in high-level
language into machine language for execution?
Detecting errors in real memory is a function of
an instruction that
has been decoded
a cursor
Formula
Assembler
Memory protection
use the directory
search tools
To find where a file has been saved on disk, the user should
A series of instructions telling the computer how to process data or files
is defined as a
Network
To ensure that data is not lost if a computer system fails, the user
BC99 should
Having a single CPU alternatively process tasks entered from multiple
BC100 terminals is called
The place in the CPU where the data and programs are temporarily
BC101 stored during processing is called the
BC102 All are examples of computer software except
Computer manufactures are now installing software programs
BC103 permanently inside the computer. It is known as
Which of the following file organisation forms most efficiently allows
BC104 access to a record
The part of the computer system controlling data manipulation is called
BC105 the
BC106 For direct access storage devices the recording area is divided into
BC107 The data hierarchy from the largest to the smallest is
save copies of the
file with the same
name on the system
Multiprocessing
ROM
Firmware
Firmware
Sequential
Operating System
Tracks and
Sectors
Character, field,
database
Which of the following hardware or software system controls provides a Valid character
BC108 detailed record of all activities performed by a computer system
check
Which one of the following parts of a computer is necessary to enable it
BC109 to play music?
Sound card.
An educational CD-ROM on Indian Poets contains 1000 pages of text,
500 colour pictures, 15 minutes of sound and 1 minute of video. Which
BC110 of the four different media listed takes up most space on the CD-ROM? Text
Which one of the following printers is suitable for printing sprocket fed
BC111 carbon copies?
Laser
BC112 Multimedia software can be most productively used for
viewing an
encyclopaedia CDROM.
BC113 To be effective a virus checker should be
replaced regularly
Which one of the following software applications would be the MOST
BC114 appropriate for performing numerical and statistical calculations?
Database
BC115 Passwords enable users to
BC116 12. How many bytes do 4 Kilobytes represent?
get into the system
quickly
512
BC117 Back up of the data files will help to prevent
BC118 Which one of the following is the MOST common internet protocol?
loss of confidentiality
TCP/IP
BC119 The advantage of a PC network is that
BC120 The term A:\ refers to
access to the
internet is quicker
a file name
BC121 UPS stands for
universal port serial
BC122 The main problem associated with uninstalling software is that
You are conducting research for a Income Tax assignment. The raw
BC123 facts you collect are called
BC124 A flow chart is the
BC125 A voucher entry in Tally is done for
BC126 Passwords are applied to files in order to
BC127 Each of the following is an enabler of IT-business alignment except:
The basic systems model is used to describe virtually all information
BC128 systems and it consists of the following elements:
orphan files can be
left on the system
data.
Graphical
representation of
logic
Purchase, sales,
receipt, payments
etc.
assist in
maintenance
senior executive
support for IT.
BC130 A(n) __________ offers a solution package for an entire industry.
input.
The use of
computers to
design state-of-theart, high-quality
products.
specialist or
functional
BC131 File extensions are used in order to
name the file
BC132 Information systems controls include all of the following EXCEPT:
BC133 Hashing for disk files is called
Components of expert systems include: a) inference engine; b) user
BC134 interface; c) knowledge base; d) fuzzy logic
preventive controls.
external hashing
BC129 What is a computer-aided design system?
A: (a) , (b), (d)
BC135 Black box testing and white box testing are part of:
What is the term used to describe the point of interaction between a
BC136 computer and any other entity, such as a printer or human operator?
The advantages of CASE tools are: a) reusability; b) maintainability; c)
BC137 portability; d) flexibility
BC138 Which of the following is an acceptable way to shut down the computer?
Yesterday, in your music class you saved your compositions as MP3
files. Today, you cannot remember where you saved them. Which is the
BC139 best way to locate the files?
Components of an information system model are: a) applications
architecture; b) functional architecture; c) technology architecture; d)
BC140 information architecture
corrective controls
Component
(a), (c), (d)
Press the reset
button.
Create the files
again.
(a), (c), (d)
BC141 Benchmarks form part of:
Continuity controls include: a) record counts; b) date checks; c) label
BC142 checks; d) run-to-run totals
detective controls
BC143 Which is not part of help desk documentation:
BC144 Testing of individual modules is known as:
problem logging
unit testing
Design phase of CASE tools includes: a) data architecture; b) decision
BC145 architecture; c) interface architecture; d) presentation architecture
(b), (c), (d)
(a), (c), (d)
BC146 Which is part of installation testing:
benchmark testing
The computer operating system performs scheduling, resource
allocation, and data retrieval functions based on a set of instructions
BC147 provided by the:
Multiplexer.
Which of the following falls under multimedia data: a) text; b) images; c)
BC148 video; d) audio
(a) to (d)
Replacement
personal computers
Which of the following procedures should be included in the disaster
for user
BC149 recovery plan for an Information Technology department?
departments.
architectural
BC150 Designing relationships among components is part of:
design
BC151 Several Computers connected together is called:
BC152 Which network topology uses a Hub?
BC153 Which of the following topologies is used for Ethernet?
BC154 Application software are programs
Which type of file search method requires a computer first read all
BC155 locations preceding the desired one
Client-server
Star
Star
To maintain a
backup copy of are
written all the
information
Direct
Which of the following areas of responsibility are normally assigned to a
BC156 systems programmer in a computer system environment?
Which of the following is recommended when many searches for data
BC157 are required
It is unlikely that a magnetic tape containing several thousand blocked
records can be used on two machines of different architecture directly
BC158 because
Which component of the CPU has the most influence on its cost versus
BC159 performance
Which of the following terms applies to network used to connect
computers with other computers, peripherals and workstations that are
BC160 in fairly close proximity
BC161 Intelligent terminals differ from dumb terminals in that they
A computer is to be linked to 8 terminals using a single communication
link. To permit simultaneous terminal operations, communication path
BC162 will require which of the following
BC163 A modem is a device that
A LAN includes 20 PCs, each directly connected to the central shared
BC164 pool of disk drives and printers. This type of network is called a
A computer based system for sending, forwarding, receiving and
BC165 storing messages is called an
If a workstation contains a processor, monitor, screen manipulation
BC166 device, printer, storage and communication capabilities, it is said to be
Systems analysis
and applications
programming.
A sequential file on
a disk
Tapes can only be
read by the machine
on which they are
written
Data path part
Distributed systems
Can send data to a
computer and
receive data from a
computer
Mixer
Allows computer
signals to be send
over a telephone
line
Planetary network
Office Automation
BC167 Terminal hardware controls include
A dumb workstation
Time of day control
locks
BC168 RS-232 is a
Type of cable
BC169 What is a compiler?
A compiler does a
conversion line by
line as the program
is run
BC170 What are the stages in the compilation process?
BC171 Which of the following is not a data transmission coding scheme
Feasibility study,
system design, and
testing
CRC
BC172 What is the definition of an interpreter?
An interpreter does
the conversion line
by line as the
program is run
A device used in data communications to divide a transmission signal
BC173 into several sub-bands is known as a
Third generation languages such as COBOL, C, and FORTRAN are
BC174 referred to as
BC175 Serial Communication is used over long distance because it
Modem
High-level
languages
It is faster than
parallel
communication
BC176 In what areas is the COBOL programming language used?
Financial sector and
engineering
BC177 The primary function of a front-end processor is to
BC178 What is the first stage in program development?
Which of the following is not used for data transmission within a local
BC179 area network
Communicate with
the console operator
Specification and
design
Fiber Optics
BC180 What is System Analysis?
BC181 A device to device hardware communication link is called
The design of the
screen the user will
see and use to enter
or display data
A cache
BC182 What will a good software provider consider?
BC183 The topology of a network can be each of the following except
BC184 What is the 8-bit binary value of the decimal number 85?
The different types
of network to be
used
Star
10101010
BC185 Which is the most common data transmission error checking method
BC186 What is the decimal value of the binary number 1111?
Which of the following devices merges communication signals onto a
BC187 single line
BC188 What is the decimal value of the octal number 215?
Which tool is used to help an organization build and use business
BC189 intelligence?
Parity
15
Port
327
Data warehouse
BC190
BC191
BC192
BC193
BC194
Cache memory enhances
What is the decimal value of the hexadecimal number FF?
Numbers are stored and transmitted inside a computer in
What is the hexadecimal value of the decimal number 1476?
A byte corresponds to
BC200 A parity bit is
memory capacity
30
binary form
4C5
4 bits
Basic Coding
Description
1024 bits
10000
binary form
Mouse
used to indicate
uppercase letters
BC195
BC196
BC197
BC198
BC199
What does EBCDIC coding of numbers mean?
A Kb corresponds to
What is the binary sum of 01011 and 00101?
Information is stored and transmitted inside a computer in
Where would you find the letters QWERTY?
BC201
BC202
BC203
BC204
BC205
Because it squeaks
when moved
bits per second
Touch screen
BPS
Printing letters
How did the computer mouse get its name?
Clock speed is measured in
What are you most likely to use when playing a computer game?
CPU performance may be measured in
A digitising tablet can be used for?
In processing cheques which of the following I/O techniques have banks
BC206 traditionally used
BC207 Which of the following is a pointing device used for computer input?
BC208 A UPS
OCR
Touch screen
increased the
storage capacity of a
computer system
BC209 What does a light pen contain?
BC210 The capacity of a 3.5” floppy is around
What general term describes the physical equipment of a computer
BC211 system, such as its video screen, keyboard, and storage devices?
BC212 Where would you find the letters QUERTY?
BC213 What are you most likely to use when playing a computer game?
BC214 A digitising tablet can be used for?
BC215 Which of the following is a pointing device used for computer input?
Refillable ink
100K
BC216 What input device could tell you the price of a product
BC217 Where would you find a magnetic strip?
Mouse
Credit card
Writing on a hard
board
BC218 Hard copy is a term used to describe...?
What are the individual dots which make up a picture on the monitor
BC219 screen Called
BC220 A daisy wheel is a type of...?
BC221 What input device can be used for marking a multiple-choice test?
Mouse
BC222 Laptop computers use
CRT displays
BC223 QWERTY is used with reference to
screen layout
BC224 What input device could tell you the price of a bar of chocolate?
Mouse
BC225 A GUI is
BC226 Where would you find a magnetic strip?
BC227 Multiprogramming refers to
hardware
Credit card
having several
programs in RAM
at the same time
BC228 Multitasking refers to
having several
programs in RAM at
the same time
BC229 Multiprogramming is a prerequisite for
multitasking
BC230 UNIVAC Computer belongs to the
First - generation
computers.
BC231 Timesharing is the same as
BC232 Name the first Indian Super Computer?
multitasking
Vishwajeet
BC233 Disk fragmentation
is caused by wear
The technology which is used to check answer sheets of multiple-choice Bar code Reader
BC234 questions in civil services or similar examinations is: Technology
BC235 A compiler is
BC236 Which printer among the following is fastest
BC237 “Zipping” a file means
BC238 What does acronym VIRUS stands for
BC239 An impact printer creates characters by using...?
a fast interpreter
Drum Printer
encrypting it
Very important
reader user
sequence
Electrically charged
ink
mainframe
technology
10-6 sec
BC240 A client-server system is based on
BC241 A nanosecond is
A procedural control used to minimize the possibility of data or program
BC242 file destruction through operator error is the use of
Limit checks
_______ software enables users to send and receive data to/from
BC243 remote computers
application
BC244 A _____ is a running instance of an application
project
BC245 Splitting of CPU's time for different tasks _______ prevents time slicing multiprocessing
______ computers are used in large organizations for large scale jobs
BC246 which have large storage capacities
mainframes
_______ is responsible for all calculations and logical operations that
BC247 have to be performed on the data
control unit
BC248 ______ printer use laser light
band printer
______ software enhances the user to enter ,store, manipulate and print
BC249 any text
data management
______ software enables users to send and receive data to/from remote
BC250 computers
integrated software
BC251 _______ is the temporary storage place for deleted files
BC252 _____ is a collection of related fields
my computer
field
BC253 _____ language consists of strings of binary numbers
assembly language
______ symbol is used to represent processes like assigning a value to
BC254 a variable or adding a number
terminator symbol
BC255 _______ is an example for micro computer
PC-at
BC256 _________capability supports concurrent users doing different tasks
multiprocessing
The ______ do not have processing power of their own and has only a
screen, keyboard and the necessary hardware to communicate with the
BC257 host. For this reason, the terminals are referred as_______________
"dumb terminals"
BC258 A______is nothing but a PC with a network operating system
_____system is responsible for handling the screen and user I/O
BC259 processing
The______ handles data processing and disk access in a Client/Server
BC260 architecture
Both the DBMS and the application resides on the same component in a
BC261 ____system
When all the processing is done by the mainframe itself, the type of
BC262 processing is sometimes called as
BC263 DBMS models can be grouped under____ categories
wan
host
host
PC
server processing
four
file management
system
BC264 ______is the most advantageous database system
A new user initiates a new process of execution at the background,while
the user can continue his query process as usual in the foreground. This
BC265 situation is referred to as ______
multiprocessing
The process of data being automatically written to a duplicate database
BC266 is called______
repairing
BC267 Modem stands for __________ .
Multiple changes to the same record or a field are prevented by the
BC268 DBMS through______
BC269 _________allows an application to multitask within itself
Code/De-code
BC270 LAN stands for __________ .
BC271 New process of execution is referred to as______
fixes
multiprocessing
Linear area
networks
task
BC272 ISDN stands for _______.
BC273 _____________ is the Worlds largest computer network .
BC274 _______is/are a popular front end tool
Integrated system
dynamic networks.
Ethernet
visual basic
BC275 When LAN connected together ,it is called __________ .
MAN
BC276 TCP/IP stands for _________ .
BC277 Data is broken into small unit called __________ .
Transfer control
protocol/Internet
protocol
Cells
System modulation
BC278 SMTP stands for __________ .
transfer protocol
The __________ protocol is a network protocol to be built for the World
BC279 Wide Web .
Transfer Protocol
Aggregate transfer
BC280 ATM stands for __________ .
mode
The computer which can receive data from other computers on the
BC281 network and print it is _______
File server
BC282 The hardware and the software requirements together form the_____
platform
BC283 ATM, Asynchronous transfer mode is a __________ technology.
BC284 __________ is designed telephone system
MAN and WAN
ISDN
BC285 Expansion of ISDN is ________
BC286
BC287
BC288
BC289
Expansion of WBT is ______________
_________ connects LANs.
Collection of instruction is called a _____
Combination of alphabetic and numeric data is called _____ data
BC290 Computers can be classified based on ______,______and _______
BC291 _________ are used in large organizations for large scale jobs
BC292 _______ is responsible for feeding data into the computer
_______ is the capability of the o/s to run numerous applications
BC293 simultaneously
_______ involves conversion of raw data into some meaningful
BC294 information
_______ is responsible for obtaining the processed data from the
BC295 computer
_______ printers use light to produce the dots needed to form pages of
BC296 characters
BC297 Hardware components in a computer are _____,____,_____,______
_______ software are programs that are complex and can be
BC298 developed or purchased
_______ is a set of special instructions used to communicate effectively
BC299 with the computer
BC300 _______ converts a high level language into machine language
_______ translates assembly language program into machine language
BC301 instructions
Internal Services
Digital Network
Web based
Training
Bridges
procedure
alpha numeric
space occupied,
price, no. of users
allowed
mini computers
input
multiprocessing
interpreter
input
impact printers
operating system,
bootstrap, kernel,
shell
operating system
batch
processor
compiler
Op2
data that has been
transferred from
memory
System feasibility
report
VSAT
Identification
Number
Op3
the address of a
memory location
Op4
an instruction that
has been
transferred from
memory
Control totals for
one or more fields
Storing information
on the hard disk
End-of-file and endof-reel code
B
None of above
B
Voice answer back
Visual audio board None of above
C
Boundary protection File protection ring Limited access files
C
Pixies
None of above
B
Reel Number
Pointing device
Batch Total
None of above
D
A
Console Log
An inked ribbon
An ink pen
and print head
Use only
Require user
unremovable media passwords
Paper
Eraser
A drum
A ribbon
Data Dictionary
B
None of above
Make duplicate
copies of files
None of above
A cassette
C
Centralised function
for PC acquisition
A drum
A laser beam
Centralised function
for PC Disposition
A ribbon
An INK RIBBON
Distributed policies
or procedures
None of above
None of above
A
A
C
Size
Write
PAN drive
Random access
medium
20 GB
None of above
None of above
None of above
C
B
A
None of above
None of above
A
B
None of above
C
A floppy disk
Write
By magnet objects
Storage capacity
Read and Write
Floppy disk
A parallel access
medium
700MB
Magnetic tape
storage
Magnetic tape
storage
Read and Write
In a drawer
None of above
Not
None of above
A
B
C
RAM chips
ROM chips
Registers
CDROM chips
DRAM chips
Logic bus
None of above
None of above
None of above
B
B
A
Pixels
Identification
number
Storage device
Physical Security
A floppy disk
A
C
A
Registers
Control unit
None of above
B
1 bit
ROM chips
Random access
medium
Systems software
and application
software
8 bits
CACHE
A parallel access
medium
None of above
None of above
A selective access
medium
B
A
Business software
and games software None of the above
A
B
Personal computer Mainframe computer None of above
Jon Von Neumann
computers
None of above
Supercomputers
Second generation Hoover generation None of above
B
First generation
Fourth generation
None of above
C
Third generation
Third generation
Fifth generation
Fifth generation
None of above
None of above
C
B
Third generation
Fifth generation
None of above
Analysis, System
Programming,
Design, and
Design, and Testing Implementation
None of above
This involves
looking at a
Analysis is the
loading of programs system and finding
out how
that perform
information is
routines to control
peripheral devices being handled
None of above
Inputs, outputs,
file design
Maintenance,
hardware, and
reliability, and
upgradeability
None of above
software
To execute any
programs
To maintain security None of the above
Transferred from the
Copied from the disk Saved to the disk
disk
Users operate the
computer system
from a given date
The new system is
introduced and
users start operating
it
Log files and
temporary files
Users operate the
manual system
Users continue
operating the old
system
User Guide and
technical
documentation
B
A
A
A
C
B
D
A
None of above
B
None of above
A
None of above
C
To enable any
printer to be
connected to the
network
User guides cover
how to run the
system, enter data,
None of above
save, print, etc.
Network systems
and communication Database systems
services
and backup services None of the above
C
A
floppy disk
To help someone
who is applying for
employment
Hard disk
B
None of the above
B
Control Bus
MAD
Control Bus
A
B
D
8 bits
8 bits
Address bus
TED
Address bus
Data structures that
are part of the
kernel of an
operating system.
decimal form
represented 256
characters
16 bits
1000 kilobytes
230 bytes
32 I/O devices
used to detect
errors
32 Mb of RAM
is the first bit in a
byte
1024 bytes
a 32-bit bus or 32bit registers
is the last bit in a
byte
RAM
baud
memory access
time
DRAM
bytes
secondary storage
capacity
CROM
Hertz
secondary storage
access time
use more RAM than
RISC machines
Registers
Computer is
improperly shut
down
a serial interface
dot matrix printer
have medium clock
speeds
Variables
Data is not saved
before computer is
shut down
printer interface
ink-jet printer
stores more
information than
RAM
use variable size
instructions
Logic Bus
D
A
All of the above
a modem interface
laser printer.
D
B
D
is used for cache
memory
B
CD-ROM
To do a particular
task.
Auto bus
BAD
Auto bus
Operating system
routines that
execute in
supervisor mode.
ASCII code form
is non-volatile
Shells, compilers
and other useful
system programs.
alphanumeric form
represented 127
characters
32 bits
D
A
A
A
A
D
B
A
D
B
increases the
process speed
has more storage
capacity than an
ATM card
LCD displays
multitasking
the ability to run 2
or more programs
concurrently
Registers
provides backup
power in the event
none of the previous
of a power cut
is an access card
for a security
contains a
microprocessor
system
none of the
SSGA displays
previous
C
C
B
writing programs in none of the
multiple languages previous
A
writing programs in none of the
multiple languages previous
D
Variables
B
Logic Bus
magazines
CD-ROM
e-mail
to run more than
one program at the
an operating
system
none of the above
same time
none of the
multiprogramming
previous
multiuser
none of the
a form of ROM
a form of VRAM
previous
involves using
more than one
processor at the
same as
multiprogramming
multiuser
same time
use a virus
set up a password make a backup copy protection program
to read from or
write information
to a floppy disk
to print sheets of
paper
uses Java
103 sec
uses C++
1012 sec
a mouse
a frog
data that has been
transferred from
memory
the address of a
memory location
data to be
transferred to the
stack
the address of a
memory location
to display
information or
pictures on a screen
none of the
previous.
109 sec
a message pad
an instruction that
has been
transferred from
memory.
an instruction that
has been
transferred from
memory
D
C
C
D
D
B
B
D
D
B
C
A
an instruction that
has been fetched
from memory
an instruction that
has been executed
the address of the
next instruction to
be executed
D
a scroll bar
a light pen
a magic marker
A
Algorithm
Program
Data
B
Compiler
Parity Checking
search each file in
turn
Artificial Intelligence Parity Checker
Range checking
Validation
use the backup
facility
use find and replace
B
B
Program
System
Modem
B
use different
filenames on the
system
keep a record of
computer failures
backup to a secure
medium
D
Time sharing
Multiprogramming
Multiplexing
D
RAM
Floppy Disk
Magnetic Disk
B
Word Processor
Telephone modem Shareware
C
Word Processor
Telephone modem
Shareware
A
Hashed
Indexed
Random
C
ALU
CPU
B
Blocks and Sectors
Database,
character, record
Files and Tracks
Primary Storage
Schema and
subschema
File, record, field
Element, field, file
C
Maintenance
diagnostic program
Systems logs
Parity check
C
CD-ROM
MIDI interface
Serial interface
A
Pictures
Sound
Video
D
Drum
recording current
stock in a
presenting an order supermarket and
creating the plans
for stock to a
answering customer
for a building design. warehouse.
queries.
Dot matrix
Ink-jet
A
A
B
A
never updated
updated regularly
updated once a year
C
Spreadsheet
D
make efficient use
of time
1024
Graphics package
retain
confidentiality of
files
4096
simplify file
structures
8192
C
C
duplication of data
HTML
virus infection
IPX/SPX
Document
processor
loss of data
NetBEUI
the operating
printer can do 1000s system is easy to
use
files can be shared of pages a day
a subdirectory
the root directory
the hard drive
uninterruptable
up-line provider
service
uniform page source
power supply
the program
the system requires the system always
executable may not a network
requires a re-boot
allow it to be
administrator to
and defrag
uninstalled
uninstall it
afterwards
D
A
documents.
A
information.
text.
B
D
C
A
Rules writte in
Logical Steps in any
procedural language language
None of the above
A
To fill the log
register
None of the bove
A
allow encryption
C
None of the above
B
All of the above
D
speed up access
IT management
lacks leadership.
It is mandatory in
tally
prevent
unauthorised
access
IT understands the
business
output.
processing.
Software that
generates innovated
Using computers to designs and artistic
do architecture.
patterns.
None of the above
Application
enterprise
local
Service Provider
identify the file
ensure the filename
is not lost
identify the file
type
All of the above are
parts of IS
detective controls.
corrective controls. controls.
static hashing
dynamic hashing
extensible hashing
B: (a) to (d)
C: (a), (b), (c)
D: (b), (c), (d)
A
B
D
D
A
C
preventive controls
detective controls
general controls
C
Interface
Settings
Control
B
(b), (c), (d)
Turn the computer
off at the power
point.
(a) to (d)
Select the ‘Shut
Down’ option from
a menu.
(a), (b), (c)
Pull the power cord
from the back of the
computer.
C
C
Ask the person next Use the Find or
to you.
Search feature.
Put your hand up
and ask the teacher
C
(a), (b), (c)
organisational
controls
(a) to (d)
preventive
controls
(b), (c), (d)
C
corrective controls
C
(a), (b), (c)
(a) to (d)
program change
requests
thread testing
(b), (c), (d)
resolution
procedures
loop testing
C
(a), (b), (c)
D
parallel operations
(a) to (d)
system
walkthroughs
Peripheral
processors.
Concentrator.
Job control
language.
D
(b), (c), (d)
(a), (b), (c)
(a), (c), (d)
A
Identification of
critical
applications.
Physical security of Cross-training of
warehouse facilities. operating personnel.
B
interface design
procedural design
A
Client
Bus
Bus
Computer network Hub
Mesh
Ring
Ring
All of the above
C
A
D
To do a particular
job such as
editing, storing
information
To help someone
who is applying for
employment
To Store data in an
organised manner
B
Sequential
Binary
Indexed
B
call lights
data testing
(a), (b), (d)
specifications
matching
data design
C
A
B
Data
communications
hardware and
software.
A sequential file on
a tape
Parity errors will
result
Control Unit
Operating systems
and compilers.
A direct access file
on a disk
Information
formats commonly
vary between
architectures
Address calculation
part
Local Area network Wide area network
Computer
operations.
A direct access file
on a tape
C
C
Data record can
never be blocked
together
C
Input output channel
A
Protocol
B
Use the computer to
which they are
connected to
perform all
processing
operations
Are required with a
microprocessor
Generally require a which permits
some data
keyboard for data
entry and a CRT for processing such
display
as input validation
Modem
Multiplexor
Aids in back-up
procedures
Packs data in a disk Speeds up online
file
printing
A
Ring Network
Loop Network
D
Executor systems
Electronic mailing Instant post-office
C
An intelligent
workstation
Encryption
algorithms
A personal
computer
A mainframe PC
B
C
B
Time sharing
computer
Star Network
Terminal Standard
Communication
protocol
All of them
Device
interconnect
standard
A compiler
converts the whole
of a higher level
program code into
machine code in
one step
A compiler is a
general purpose
language providing
very efficient
execution
None of the above
Parity checks
D
C
D
Lexical analysis,
Implementation and CONVERSION, and
documentation
code generation
None of the above
Baudot
ASCII
EBCDIC
An interpreter is a
An interpreter is a
general purpose
representation of the language providing
system being
very efficient
designed
execution
None of the above
Demodulator
Middle-level
languages
Frequency division Time Division
Multiplexor
multiplexor
Low-level
None of the above
languages
It is less prone to
It is less error prone attenuation
Uses only one path
D
A
A
C
C
D
Accounting
Graphic design and systems,
education
commercial sector None of the above
C
Manage the paging
function in a virtual
environment
Relieve the main
CPU of repetitive
communication
tasks
Reduce competition
between the
input/output devices
C
System Analysis
Testing
None of the above
B
Telephone Lines
Common carrier
System Analysis
involves creating a
System Analysis
formal model of
defines the format
and type of data the the problem to be
program will use
None of the above
solved
A buffer
An online protocol
An interface
Testing to check
for errors before
the system is
Hardware, Software
and size of program. None of the above
introduced
Ring
Bus
Packet
1100101
1010101
None of the above
C
Retransmission
4
Cyclic Redundancy
64
Hash Count
None of the above
A
A
Modem
141
Multiplexor
97
Data management
systems
Acoustic coupler
None of the above
C
B
All of them
B
Coaxial Cable
Data Mining tools
C
B
B
B
C
memory access
time
255
ASCII code form
1B7
8 bits
Binary Coded
Decimal
1000 bytes
1112
ASCII code form
Keyboard
used to detect
errors
secondary storage
capacity
256
decimal form
5C4
16 bits
secondary storage
access time
None of the above
alphanumeric form
None of the above
32 bits
Bit Code Design
210 bits
1110
decimal form
Numeric Keypad
is the first bit in a
byte
None of the above
210 bytes
None of the above
alphanumeric form
None of the above
is the last bit in a
byte
D
A
A
A
A
Its moves like a
mouse
baud
Light pen
MIPS
Tracing diagrams
It has ears
bytes
Joystick
MHz
Reading bar codes
None of the above
Hertz
None of the above
VLSI
None of the above
D
D
C
B
B
MICR
Hard disk
barcode scanning
CD-ROM drive
voice recognition
None of the above
B
A
B
B
A
A
B
B
Pencil lead
1.44 Mb
provides backup
power in the event
none of the previous
of a power cut
Light sensitive
None of the above
elements
5 Mb
1 Gb
software
Keyboard
Light pen
Tracing Diagrams
Hard disk
output
Numeric Keypad
Joystick
Reading Bar Codes
Keyboard
input
Printer
Scanner
Digital Signatures
CD ROM Drive
A
B
C
B
A
Bar code reader
Mouse
Optical mark reader
Speakers
Storing information
on the hard disk
Keyboard
Printer
Back-up on a
Cartridge
B
A
Pickers
CD-ROM
B
A
Bar code reader
Pixies
Pointing device
Optical mark
reader
None of the above
C
LCD displays
SSGA displays
none of the previous
word processing
software
B
increases the
process speed
Printed output
Pixels
Storage device
mouse button layout keyboard layout
C
C
B
B
C
Bar code reader
Optical mark reader None of the above
B
language interpreter software interface
Speakers
Smart card
an operating system
None of the above
C
A
writing programs in
multiple languages
none of the previous
A
multitasking
The ability to run 2
or more programs writing programs in
multiple languages none of the previous
concurrently
To run more than
one program at the
an operating system same time
none of the above
B
C
Second - generation Third - generation
computers.
computers.
Fifth - generation
computers.
A
multiprogramming
Deep Blue
none of the previous
Arjun
A
C
none of the previous
C
Image Scanning
Technology
B
none of the previous
Thermal Printer
transmitting it
C
A
C
None of above
An inked ribbon
and print head
Unix operating
system
10-9 sec
B
slower than an
interpreter
Dot - Matrix Printer
decrypting it
Vital information
resource under
siege
Multi-user
Param
is due to bad disk
blocks
Magnetic Ink
Character
Recognition
Technology
converts a
program to
machine code
Desk - jet Printer
compressing it
Virtual information
reader & user
system
Thermal Paper
An ink pen
LAN technology
10-3 sec
WAN technology
10-12 sec
Control figures
External file labels Cross footing tests
C
system
model
operating system
pilot project
communication
process
D
D
multithreading
multiplexing
multitasking
D
super computers
arithmetic and
logic unit
micro computers
central processing
unit
none of the above
A
none of the above
B
caused by overuse
Optical Mark
Reader
Technology
D
B
D
drum printer
word processing
communication
software
recycle bin
file
non impact printer none of the above
electronic
spreadsheet
none of the above
C
idea processor
none of the above
B
Microsoft exchange none of the above
none of the above
record
constraints
multiplexing
Local array of
networks.
thread
Integrated
Integrated Symbolic Services Digital
Digital networks.
network.
ARPANET
Internet
power builder
SQL * plus
traps
none of the above
B
B
None of the above
client-server
B
C
None of the above.
None of the above.
all of the above
C
B
D
locks
multithreading
Local area
networks
process
D
WAN
Transfer
communication
protocol/Internet
protocol
Bits
Software Mail
transmission
protocol
Transmission
protocol
Asynchronous
transfer mode
GAN
Transmission
control
protocol/Internet
protocol
Packets
None of the above.
B
None of the above.
None of the above.
C
C
Simple Mail
transfer protocol
None of the above.
C
Hyper text
None of the above.
C
Area transfer mode None of the above.
B
Printer server
Receiver
None of the above.
B
configuration
package
system
A
LAN and WAN
ATM
LAN WAN and MAN
Intranet
B
A
Internal Services
Design Network
Web based
Technology
Routers
batch
alpha beta
LAN and MAN
Internet
Integrated
Services Digital
Network
Web based
Transport
Protocol
command
numerous alpha
None of the above.
Web based
Transaction
Repeaters
program
number and alpha
C
cost, performance
their ratio
microprocessors
output
control program,
interpreter,
monitor, program,
assembler, compiler keyboard, bus
application
windows 95
software
A
B
D
A
protocols
compiler
software's
assembler
procedures
coder
C
B
interpreter
assembler
processor
C
q_id
BC1
q_desc
ISDN stands for _______.
op1
op2
Integrated
system
dynamic
networks.
Integrated
Symbolic
Digital
networks.
op3
op4
Integrated
Services
Digital
None of
network. the above.
The computer which can receive data from other
BC10 computers on the network and print it is _______
The hardware and the software requirements together
BC11 form the_____
Printer
File server server
Receiver
configurati
package
platform on
None of
the above.
ATM, Asynchronous transfer mode is a __________
BC12 technology.
BC13 __________ is designed telephone system
MAN and LAN and LAN and
WAN
MAN
WAN
ATM
Internet
ISDN
LAN WAN
and MAN
Intranet
BC14 Expansion of ISDN is ________
Internal
Services
Digital
Network
BC15 Expansion of WBT is ______________
Web
based
Training
BC16 _________ connects LANs.
BC17 Collection of instruction is called a _____
Combination of alphabetic and numeric data is called
BC18 _____ data
Computers can be classified based on
BC19 ______,______and _______
BC2
Bridges
procedure
alpha
numeric
space
occupied,
price, no.
of users
allowed
_____________ is the Worlds largest computer network
.
Ethernet
_________ are used in large organizations for large
BC20 scale jobs
_______ is responsible for feeding data into the
BC21 computer
_______ is the capability of the o/s to run numerous
BC22 applications simultaneously
_______ involves conversion of raw data into some
BC23 meaningful information
_______ is responsible for obtaining the processed data
BC24 from the computer
Internal
Services
Design
Network
Web
based
Technolog
y
system
Integrated
Services
Digital
None of
the above.
Network
Web
based
Web based Transactio
Transport n
Routers
batch
Protocol
command
numerous
alpha beta alpha
Repeaters
program
number
and alpha
cost,
performan size,
performan
ce their
ratio
ce, cost
input,
output,
performan
ce ratios
Internet
None of
ARPANET the above.
mini
microproc
computers essors
PCs
mainfram
es
output
feed
write
input
multiproce multithrea multiplexin multitaski
ssing
ding
g
ng
interpreter compiler
input
_______ printers use light to produce the dots needed to impact
BC25 form pages of characters
printers
Hardware components in a computer are
BC26 _____,____,_____,______
_______ software are programs that are complex and
BC27 can be developed or purchased
_______ is a set of special instructions used to
BC28 communicate effectively with the computer
_______ converts a high level language into machine
BC29 language
BC3
_______is/are a popular front end tool
_______ translates assembly language program into
BC30 machine language instructions
_______ software enables users to send and receive
BC31 data to/from remote computers
control
program,
interpreter
,
assembler
, compiler
applicatio
operating n
system
software
operating
system,
bootstrap,
kernel,
shell
monitor,
program,
keyboard,
bus
batch
windows 95 interpreter
procedure
software's s
protocols
CPU,
memory,
input,
output
processor compiler assembler coder
all of the
visual
power
basic
builder
SQL * plus above
compiler interpreter assembler processor
applicatio
operating communi
n
system
system
cation
BC32 A _____ is a running instance of an application
Splitting of CPU's time for different tasks _______
BC33 prevents time slicing
project
model
pilot project process
multiproce multithrea multiplexin multitaski
ssing
ding
g
ng
______ computers are used in large organizations for
BC34 large scale jobs which have large storage capacities
mainfram super
micro
none of
computers computers the above
es
BC39
arithmeti central
c and
_______ is responsible for all calculations and logical
control
processing
operations that have to be performed on the data
unit
logic unit unit
non
impact
band
drum
______ printer use laser light
printer
printer
printer
word
data
electronic
______ software enhances the user to enter ,store,
managem processi spreadshee
manipulate and print any text
ent
t
ng
communi
______ software enables users to send and receive data integrated cation
idea
to/from remote computers
software software processor
recycle
my
Microsoft
_______ is the temporary storage place for deleted files computer bin
exchange
BC4
When LAN connected together ,it is called __________ . MAN
BC35
BC36
BC37
BC38
none of
the above
none of
the above
none of
the above
none of
the above
none of
the above
BC40 _____ is a collection of related fields
field
file
record
None of
the above.
none of
the above
BC41 _____ language consists of strings of binary numbers
______ symbol is used to represent processes like
BC42 assigning a value to a variable or adding a number
assembly
language
terminator
symbol
machine
language
processe
d symbol
high level
language
connector
symbol
none of
the above
input/outp
ut symbol
WAN
GAN
fazitsu
hp vectra vp200
series
system
BC43 _______ is an example for micro computer
PC-at
_________capability supports concurrent users doing
BC44 different tasks
multiproce multithrea multiplexin none of
ssing
ding
g
the above
The ______ do not have processing power of their own
"dumb
and has only a screen, keyboard and the necessary
hardware to communicate with the host. For this reason, terminals dumb
BC45 the terminals are referred as_______________
servers
"
BC46
BC47
BC48
BC49
BC5
BC50
BC51
BC52
BC53
A______is nothing but a PC with a network operating
system
_____system is responsible for handling the screen and
user I/O processing
The______ handles data processing and disk access in
a Client/Server architecture
Both the DBMS and the application resides on the same
component in a ____system
BC55 Modem stands for __________ .
Multiple changes to the same record or a field are
BC56 prevented by the DBMS through______
dummy
servers
wan
distributed
computing windows
system
NT
LAN
host
server
back end
front end
host
server
back end
distributed
computing
front end
centralize
d
LAN
Transfer
Transfer communic
control
ation
protocol/In protocol/In
ternet
ternet
TCP/IP stands for _________ .
protocol
protocol
host
server
When all the processing is done by the mainframe itself, processin processi
the type of processing is sometimes called as
g
ng
DBMS models can be grouped under____ categories
one
four
file
hierarchic
managem al
ent
database
______is the most advantageous database system
system
system
A new user initiates a new process of execution at the
background,while the user can continue his query
process as usual in the foreground. This situation is
multiproce multithre
referred to as ______
ssing
ading
The process of data being automatically written to a
BC54 duplicate database is called______
dummy
terminals
IBM-PC
PC
Transmiss
ion control
protocol/In
ternet
None of
the above.
protocol
data
dumb
processin
processing g
two
many
network
database
system
relational
database
system
multiplexin
g
disk
defragment
ation
none of
the above
constraints
multiplexin
g
Local array
of
networks.
traps
none of
the above
disk
redo
repairing logging
mirroring
Modulati
Code/De- on/Demo Module/De- None of
code
the above
dulation module
fixes
multiproce
BC57 _________allows an application to multitask within itself ssing
Linear
area
BC58 LAN stands for __________ .
networks
locks
multithre
ading
Local
area
networks
None of
the above
BC59 New process of execution is referred to as______
task
BC6
Cells
thread
clientserver
Packets
None of
the above.
Simple
Mail
transfer
protocol
None of
the above.
BC7
SMTP stands for __________ .
BC8
The __________ protocol is a network protocol to be
built for the World Wide Web .
Bits
Software
System
Mail
modulatio transmissi
n transfer on
protocol
protocol
Transmiss
Transfer ion
Protocol protocol
ATM stands for __________ .
Asynchro
Aggregate nous
Area
transfer transfer
transfer
mode
mode
mode
BC9
Data is broken into small unit called __________ .
process
None of
Hyper text the above.
None of
the above.
ans
C
B
A
B
A
C
A
B
D
A
C
B
D
A
D
D
D
C
D
B
C
B
D
C
D
D
D
A
B
C
B
B
B
B
C
B
B
B
D
A
D
D
C
A
C
B
A
D
B
D
B
B
B
B
C
C
C
C
B
q_id
q_desc
OS 01
Which of the following computer software is designed to direct and assist the execution of
application programs
OS 127
OS 131
OS 132
Formatting a disk results in all the data being...?
Which bus carries information between processors and peripherals?
Which bus controls the sequencing of read/write operations?
OS 139
OS 193
Which computers use single chip processors?
CPU performance may be measured in
OS 199
In processing cheques which of the following I/O techniques have banks traditionally used
OS 215
Disk fragmentation
OS 216
A compiler is
OS 217
An interpreter is
OS 219
“Zipping” a file means
OS 233
An assembly language program is translated to machine code by
OS 234
Which of the following is not part of the processor
OS 276
OS 277
If the Cancel Error Property of the CommonDialog Box is set to true then which of the
following statement is true:
__________ control defaults to displaying the files in the current directory:
A ____________ occurs any time a program writes more information into the temporary
space it has allocated in the memory.
Assessing a system requires certain common tools. Which of the following is NOT a tool
used to assess a system?
The ____________________ Web site has a utility that will tell you what software and
operating system a Web server is running.
When software vendors discover flaws in their software, they usually will write corrections
to their code, known as:
All ____________ have the option of blocking ports.
OS 278
Which of the following is NOT a characteristic of a firewall?
OS 236
OS 238
OS 271
OS 274
OS 275
OS 280
Before shutting a service on an individual machine, which of the following would you
always check?
OS 281
At a minimum, which of the following should be implemented under the protection phase?
OS 282
OS 283
Attacks on your system may be prevented or trapped through the use of:
Setting restrictions as to the number of unique passwords to use before a user can
recycle them is called a password:
OS 284
Which of the following is NOT a step to take in securing a workstation?
OS 286
To prevent a hacker from unauthorized access, what should you do with the administrator
account?
OS 287
OS 289
What should be done with old backup tapes and CDs?
Which of the following is NOT an example of malware?
OS 291
One step you can take to reduce the risk of being infected by a virus is to:
OS 292
Which of the following is NOT a sign that a virus has infected your system?
OS 293
OS 294
Which of the following is the safest way to protect yourself from e-mail viruses?
A ____________ attack causes too much information to be placed into temporary memory
space.
OS 295
____________ gathers user information with the user‟s knowledge.
OS 296
Which of the following is the most common function of spyware?
OS 299
Which of the following is NOT a virus-scanning technique?
OS 300
Which of the following would NOT be a way to protect your system from spyware?
OS 309
For which of the following positions would it be advisable to conduct an extensive
background check?
OS 329
OS 355
Which of the following would you use to open an existing file?
The ability to have multiple applications open at the same time is known as:
OS 356
OS 357
Which of the following can be changed using the Options command?
Which of the following leaves an application open but shrinks the window to a button on
the Windows taskbar?
OS 396
Which of the following actions would move a floating toolbar to dock it in a different place?
OS 397
To display a missing or needed toolbar, click the:
OS 399
Which of the following is NOT a true statement regarding password protection?
OS 495
The Linux operating systems is an example of:
OS 496
The Windows operating systems is:
OS 497
Application service providers offer:
OS 498
A(n) _________ offers on-demand software on an as-needed basis to its clients over the
web.
OS 502
_________ are systems used to interact with customers and run a business in real time.
OS 504
OS 505
The most common cause(s) of disaster is (are):
A _______ backup site is backup facility consisting of an empty warehouse with all
necessary connections for power and communication, but nothing else.
OS239
To destroy an object and free the memory space occupied by it, the keyword used is:
op1
op2
op3
Operating
system
Saved to the
disk
Address bus
Control bus
Super
computers
MHz
barcode
scanning
is due to bad
disk blocks
op4
Database
management
system
Application
Software
Deleted from
the disk
Data bus
Data bus
Personal
computers
BPS
Utility
Programs
Copied from
the disk
Auto bus
Address bus
Parallel
computers
MIPS
OCR
is caused by
wear
MICR
caused by
overuse
a fast
interpreter
converts a
slower than program to
none of the
an interpreter assembly code previous
faster than a
compiler
encrypting it
C
None of above A
None of above A
None of above C
None of above
VLSI
voice
recognition
none of the
previous
A
B
B
B
B
translates
and executes
programs
converts a
statement by program to
none of the
machine code previous
B
statement
compressing
decrypting it
transmitting it C
it
an assembler a compiler
the ALU
A runtime
error can
result if the
user clicks
the cancel
button
File List Box
memory
overflow
ans
the CU
an interpreter a linker
the power
None of the
above
cord
The program
executes
A compile time without any
error occurs
error
Dir List Box
Drive List Box
systems
overload
RAM overflow
You need to
carry out
conditional
compilation
Combo Box
buffer
overflow
A
C
A
A
D
Netcop
NetBrute
Netcraft
D
NetBIOS
www.nettools.c www.WhoIs.co www.netcraft.c www.netstat.co
om
m
om
m
C
code correct.
firewalls
patches.
switches
It can consist
of hardware,
software, or
both.
It hides your
network.
updates.
hubs
upgrades.
scanners
It is a barrier
between your
One of its
network and
techniques is the rest of the
packet filtering. Internet.
B
A
B
That any open Dependencies That you are
applications be on other
not on the
exited
Internet
services
IntrusionAntivirus
detection
software
software
Firewall
an intrusiona network
detection
antivirus
prevention
software.
system.
system.
cycle.
Make sure all
update and
security
patches are
applied.
renewal.
Install and
keep current
antivirus and
anti-spyware
programs.
Delete it and
change the
Delete it from built-in guest
the system and account to a
use the guest power user
account.
account.
Tapes can be
used over and Tapes and
over, and CDs CDs can be
should be kept thrown away in
forever.
the trash.
Trojan horse
Virus
place a router
between your
ISP and your add spyware to
system.
your system.
System acts
abnormal
Update
antivirus
software.
virus
A virus
That you also
shut down
associated
services
B
Router
C
a proxy filtering
system.
A
age.
history.
D
Limit user‟s
ability to
configure the
workstation.
Disable it and
create a
nondescript
user account
with
administrator
rights.
Block all
incoming
traffic on a
network.
D
Tapes should
be melted and
CDs broken.
IP spoofing
download
files from
reliable Web
sites.
Create another
administrator
account to
confuse the
hacker.
C
Give them to a
recycle shop. C
Spyware
C
hone your
programming
skills.
Problems
with your
wireless
Files are
Printing
missing
problems
mouse
Never open
an e-mail
attachment
unless you
Turn off the
Do not
auto-launch in know what it
is and who
propagate
your e-mail
hoax viruses. client.
sent it.
buffer
Trojan horse
spyware
overflow
A buffer
A Trojan horse Spyware
overflow
C
D
D
D
C
Obtain
usernames
Obtain system
Check for open and
IP addresses Obtain cookies ports
passwords
E-mail and
Backup file
attachment
Download
scanning
scanning
File scanning scanning
Use your
Do not open
browser‟s
attachments in Avoid “skins” Use
security
unknown eand “toolbars” encryption
settings
mails
download
software
Administrative
Network
assistant to the
Junior
president
Cook
accountant
administrator
The Open
The Save
The Standard The Formatting command on command on
toolbar
the Edit menu the File menu
toolbar
tiling.
cascading.
minimizing.
multitasking.
whether the
worksheet
prints in
the default file landscape or the number of the margins on
location of
portrait
windows you
the printed
orientation
have open
DOCUMENT
new files
D
D
D
D
A
A
A
shrinking
multitasking
minimizing
cascading
C
Click on any
border and
drag.
Click on any
corner and
drag.
Click on the
title bar and
drag.
You cannot
move a floating
toolbar.
C
right mouse
button
anywhere on
the Word
window,
choose the
Customize
command from
the contextsensitive
menu, and
check the box
for the missing
toolbar from
the Toolbars
tab dialog box.
left mouse
button
anywhere on
the Word
window,
choose the
Customize
command from
the contextsensitive
right mouse
left mouse
menu, and
button on any button on any check the box
visible toolbar, visible toolbar, for the missing
and click on
and click on
toolbar from
the missing
the missing
the Toolbars
toolbar.
toolbar.
tab dialog box. B
All
documents
are
automatically
saved with a The password
default
is casesensitive.
password.
nonprotective
public domain open source
software.
software.
nonprotective
public domain open source
software.
software.
on-demand
on-demand
computing.
software.
Once a
document is
protected by a
password, it
cannot be
opened without
that password.
protective
open source
software.
protective open
source
software.
utility
computing.
best-cost
provider
Web service
provider
software
provider
Operational
systems
Passwords can
be up to only
seven
characters
long.
A
proprietary
software
C
proprietary
software.
D
utility software. B
application
service
D
provider
Informational
systems
hardware
power outages. failures.
Structured
Office
query systems automation
All of the
floods.
above.
hot
cold
empty
dormant
B
Delete
Kill
Nothing
New
C
A
D
q_id
CA1
CA2
q_desc
Using generalized audit software packages can add a
lot of value _______
_______ is used for CAAT as database
op1
to an audit
department's
products & services
Oracle
CA8
Generalized audit software perform auditors to
undertake any past records and not concurrent auditing
Generalized audit software is a file whose capabilities
for verifying processing is logic
CAAT's are computer program and data that auditor
uses as part of the audit procedures to process data if
audit significance contained in an entity information
system
CAAT do not contains package programs, purpose
written program, utility programs or system
management programs
Embedded audit routines are sometimes built into an
entity's computer system to provide data for later user
by the auditor
SCARF involves embedding audit software modules
within an application system to provide continuous
monitoring
CA9
Concurrent use auditors as the member of the system
true
CA10
Regular cross system verification may minimize frauds
Computer security is frequently associated with
confidentiality, integrity and authentication
Data reserve engineering process metadata to
document system and abstract business rules and
relationship
true
CA3
CA4
CA5
CA6
CA7
CA11
CA12
CA13
True
True
True
yes
true
true
true
true
to determine the audit
objective
can bring the data
directly
CA16
The first step for developing CAAT is_________
Using the open database connectivity feature in ACL is
______________
Computer Assisted Audited Technique involves the use
of computers through "Black Box Approach"
True
White Box Approach necessary involves expert
knowledge on the part of Auditor
True
CA17
The transition from manual system to CIS environment
bring dramatic changes including ________________
CA14
CA15
CA18
CA19
CA20
change in the method
of recording accounting
transaction
documents driven
Auditing with computer necessarily supports the
approach
hardware and software
CAAT involves an Auditors' appreciation of __________ configuration
Widespread end use computing result in unlimited
errors creeping into system going to accept handling,
thereby increasing audit risks
true
CA21
CA22
CA23
For computerized auditing usage of sophisticated audit
software would be a necessity
true
the source of data
Important knowledge needed to begin planning the use available to the audit
of CAAT is _________
organization
The move towards paperless EDI would eliminate much
of the traditional audit trail, radically changing the nature
of audit evidence
true
CA25
CA26
CA27
Computer operation controls are designed to provide
________________
Systems development control, apart from others,
include authorization, approval, testing, implementation
and documentation of new systems software and
system software modification
A system could be _________
A system exhibits 'entropy'
CA28
CA29
Super computer are the largest and fastest and is very
suitable for commercial application including audit work true
Assembler language uses Mnemonic symbols
true
CA24
CA30
CA31
CA32
CA33
CA34
CA35
CA36
CA37
CA38
CA39
CA40
CA41
CA42
Operating systems are devised to optimize the machine
capabilities, the function include_______________
General purpose software provides a framework for
highly complex scientific operation
In batch processing, transactions are processed one
after another
The use of computer assisted audit techniques is not
gaining popularity not only ________________
On-line processing refers to grouping of transaction and
processing the same in one go from start to finish
Real time refers to the technique of updating files with
transaction data immediately after the occurrence of the
event to which it relates
In OLRT the CPU should process the capability of
program interruption
Time sharing system allow access to a CPU from
remote terminals
DSS is defined as a system that provides tools to
managers to assist them in solving structured problems
DSS has the following components
_________________
Master files contains current records for identification
and summarizing
Transaction files contain relatively permanent records
take product profile, customer profile, employee profile
etc
Master file configuration includes ____________
the of by all concerned
true
natural/man-made
true
scheduled jobs
true
true
with audit
departments
true
true
true
true
true
databases
true
true
reference files
CA43
CA44
CA45
CA46
CA47
CA48
CA49
CA50
CA51
CA52
CA53
CA54
CA55
CA56
CA57
CA58
CA59
CA60
CA61
CA62
CA63
CA64
CA65
______ is a file management software package that lets
users and programmers organize data into files and
then process those files
CAATS provide added value to the clients because
_______________
File volatility refers to the number of addition and
deletions to the file in a given period of time
File activity is the proportion of transaction file records
that are actually used and accessed in a given
processing run:
File interrogation refers to the _____ of information from
a file
One -to-one relationship means a single entity to a
single entity in a monogamous structure
filex
to have a complete
picture of a system
true
true
back-ups
true
RDBMS is structured to a series of 2 dimensional tables true
seriously affected
SADB stands for ____________
database
Controls are present over many aspects of the
computer system and its surrounding social
environment
true
In framed checking the data entry is checked against an
expected picture or format
true
Errors are correlated_________
at the year end
Field check is exclusive to a field
true
_________ law basically states that there is a specific
probability of the first digit of a no. being 1,2,3 etc
Check digit is a group of nos. added to a code for
determining the accuracy of other digits in the code
Hierarchical code means _________
The validation checks applied to a field depend on the
field's logical inter relationships with other fields in the
record
The contents of a field could determine _______ sign
for a ______ field
Batch is the process of ______ together _____ that
bear some type of relationship to one another
Hash totals means meaningless totals
With OLRT where interactive data entry is available, the
master file associated with a transaction may be
searched for confirming data
Controls are required for authorization to ensure data
integrity and detect possible breaches in security
Data from client application are not stored in the
organization's database through auditables events and
function
All input records in a batch are normally of different
types
Benfish
true
consecutive nos. or
alphabets to entities
TRUE
valid, numeric
grouping, transaction
true
true
true
true
true
CA68
IDEA stands for
_________________________________
A transaction file is sorted prior to the update of master
file
A sequence check on the transaction or master files by
an update program is not required
CA69
Whenever monetary transactions are processed against
master files, the update program should maintain a
correlation account to record such transaction that does
not have a matching master file record
true
CA66
CA67
CA70
CA71
CA72
CA73
CA74
CA75
CA76
CA77
CA78
CA79
CA80
CA81
CA82
CA83
CA84
CA85
CA86
Internal tables are stored tables from which certain
values are extracted for further processing and storing
For small to medium sized systems, individual modules
are coded and individually tested and then assembled to
be tested as a whole-the testing strategy is referred to
as ___________________
In systems testing, test involves_________________
Recording transactions in a controlled manner may
amount to loss of stored data
incremental design and
enlarge activity
true
true
true
e-brain
bottom up tests
yes
Audit software is used by the auditor to _________
read data on client's file
Core image comparison is a software used by the
auditor to compare _______ version of a program with a
secure ________ copy
executables, master
Database analyzer is a software which provides detailed
information concerning the operation of the database
true
system analysis
SAS stands for ______________
software
Embedded code is a software used by the auditor to
examine backup data
true
Embedded code performs wide variety of audit task
yes
Core image comparison is particularly useful where only
executable versions are distributed
true
Log analysis is a software used by auditor to detect
virus
true
On line testing techniques the auditor ______ data
either _______ or fictitious in order to see that a specific
program or sever edit test is doing its work
manipulates, real
Mapping software is used by the auditor to list unused
program instructions
true
Mapping software has very objectives
yes
Modeling is a variety of software which
________________
On line testing can be targeted for specific functions
carried out by programs
can be very powerful
analytical tool
yes
CA87
CA88
CA89
CA90
CA91
CA92
CA93
CA94
CA95
CA96
CA97
CA98
CA99
CA100
Program code analysis involves _____________
__________ is a software of CAAT
Snapshot is software which takes a picture of a file or
data or a transaction passing though the system
Base case system evaluation includes____________
While base testing forces on finding if there are any
defective execution policies in a program
Black box testing seeks to determine whether
application output is what it is supposed to be
In integrated test facility approach the auditor should
ensure that the impact of test transaction is
subsequently eliminated from the computer files
Black box testing is _______ based and white box
testing is _______ based
provides detailed
information of machine
uses
IDEA
true
fictitious data applied
against the client
program
true
true
true
specification,
program
identifying erroneous
code
Source code review means__________
In formula in flow hypothesis the auditor should expand
the extent of substantive tests to determine how the
defects may impact the attainment of the program
objectives
true
All material application oriented events that occur within
the boundary subsystem should be recorded in the
accounting audit trail
true
In examination of audit trail the following data
associated with an event may be ___________start and finish time
JCL means_________________
Audit should be periodically analyzed to detect any
control weakness of the system
job control language
yes
CA103
In an accounting audit trail, intrusion detection system
might monitor the amount of processor time consumed
by the user to detect unusual deviation from the amount
processor time requested by the user in the past
true
A sample size calculator program assists auditors in
determining RAND() function
true
package computer
p[program for
performing a variety
of data processing
Generalized audit software consists ___________
function
CA104
Specializes audit program may be___________
CA101
CA102
prepared by the auditor
CA109
Generalised audit software could be used by the
following in consistencies or significant fluctuations
Generalized audit software function
include____________
In the file reorganization merging capabilities are
needed in data from separate file is to be combined on
a separate work file
Auditors cannot use generalised audit software to
extract the data needed for audit purpose
Auditors can combine functional capabilities of
generalized audit software to accomplish the task of
__________________
CA110
CA111
Which of the following is not the feature of GAPs
Which is the example of CAATs
CA112
In audit procedures, test data is
CA113
Which of the following is not the use of CAATs
Which of the following are called explicitly by another
procedure?
CA105
CA106
CA107
CA108
CA114
true
file
access/organizations
true
true
examining the quality of
system process
Wide access to various
data base
ACL
A sample of
transactions
Tests of details of
transactions
Macros
op2
to add customers
ACL
op3
all the above
JCL
op4
none of these
none the above
ans
A
A
False
A
False
B
False
A
no
B
false
A
false
A
false
A
false
A
false
A
false
review and evaluate the to obtain a record
types of data
layout
can bring the data
indirectly
all the above
A
extract data from file
A
none of the above
A
False
B
False
A
use of accounting
codes
absence of audit trails
risk driven approach unique approach
processing options, file
data structure
checks and controls
false
all the above
D
none of the above
B
all the above
D
A
false
source of data for
material planing
A
all the above
false
providing access to
computer to all
organization personnel use of any programs
false
open/closed
false
conceptual/physical
none of these
A
none of the above
D
all of them
A
D
A
false
false
manage hardware &
software resources
A
A
A
enable multiple user
resource sharing
all the above
D
false
B
false
with production
departments
B
all the above
none of these
A
false
A
false
A
false
A
false
A
false
B
planning language
model base
all the above
B
false
false
table files
D
report files
none of the above
B
D
file-o-man
file manager
decentralized picture of
a system
all the above
filepet
C
none of the above
A
false
A
false
B
retrieval
deletion
addition
B
false
A
false
A
subject area database software and database safety and database
B
false
A
false
immediately
false
on quarterly basis
none of the above
B
B
A
Benford
Benjamin
none of the above
B
false
blocks of nos. to the
primary attribute of the
the entity
B
random placement of
component
none of the above
false
D
A
invalid, alphabetic
none of the above
all the above
A
regrouping, events
false
none of the above
all the above
A
A
false
A
false
A
false
B
false
B
interactive data
extraction and
analysis
interactive data
innumerable analysis
none of the above
B
false
A
false
A
false
B
false
A
bouncing ball
top-down tests
big-bang
hybrid tests
stub
all the above
C
D
B
no
provide information to
the audit
re-perform procedures
carried out by the
clients programs
all the above
D
deleted, hard
none of these
all the above
A
false
system advanced
software
A
all the above
none of the above
A
false
no
B
A
false
A
false
B
create, false
false
no
can enable the auditor
to execute provisions
on a number of
different bases
no
none of these
all the above
A
A
A
can provide the
auditors with useful
information with trend s
and patterns
all of the above
D
A
examination of source
code of a program
identifies program code with advice to
which may be there for following the logic of
fraudulent reason
none of the above
a program
ALC
ACLL
ACL
false
comparison of source
version of a
programmed
C
B
A
analyzing the picture of
a file or data
all the above
A
false
A
false
A
false
A
file, hardware
identifying ineffective
code
none of the above
all the above
identifying non-standard
code
all the above
A
D
false
A
false
authentication of
information support
job connectivity
language
A
resource requested
all the above
D
all the above
none of the above
A
no
A
false
A
false
B
mathematical concept
master list of
transactions
administered
questionnaire
A
prepared by the entity
prepared by an outside
programmer engaged
by the auditor
all the above
D
false
statistical/arithmetic
operation
A
stratification and
frequency analysis
all the above
D
false
B
false
B
carrying analytical
review
Can extract and
analyse data
IDEA
A utility software
programme
Analytical review
procedures
examining the quality of
data
Can aid in simple
selection
High End CAATs
A special purpose
written program
Compliance tests of
general EDP controls
Action Procedures
Event Procedures
all the above
Can define the audit
objectives
All of the above
D
None of the above
A
All of the above
D
General Procedures
D
D
D
Field0
CA114
Field1
Field2
In integrated test facility approach the auditor should ensure that the impact of test
transaction is subsequently eliminated from the computer files
TRUE
In olrt the cpu should posses the capability of program interrupt interrupts
TRUE
BOTTOM
UP
In system testing,test involves _______
TESTS
All input records in a batch are normally of different types
TRUE
In the planning phase gathering information and risk assessment will be done
TRUE
Information collection encompasses logging the selected auditable events
TRUE
Input controls are designed to ensure processing safety
TRUE
PARALLE
L
PROCES
Integrated test facility is a facility of ________
SING
Internal tables are stored tables from which certain values are extracted for further
processing and storing
TRUE
CA115
Log analysers are _______ required by the auditor
CA116
CA117
Log analyzers is ________
Log analyzer is a software used by auditor to detect virus
Mapping software is used by the auditor to list unused program instruction has
veryspecific objectives
CA107
CA108
CA109
CA11
CA110
CA111
CA112
CA113
CA118
CA119
CA12
CA120
CA121
HARDWA
RE
AUDIT
TOOL
TRUE
TRUE
REFERE
Master file configuration includes ______
NCE FILE
All material application -oriented events that occur within the boundary sub-system
should be recorded in the accounting audit trail
TRUE
Master file contains current records for identification and summarising
TRUE
Metadata approach is _______
APPROA
CH TO
THE
SYSTEM
DATA
ONLY
CA122
CAN BE
VERY
POWERF
UL
ANALYTI
CAL
TOOL
CA124
CA125
Modeling is a variety of software which _________
One-to-one relationship means a single entity to a single entity in a monogenus
structure
On-line processing refers to grouping of transaction processing the same in one
go from start to finish
On-line testing can be targeted for specific function carried out by programs
CA126
Operating systems are devised to optimise the machine capabilities-the function
include:
SCHEDU
LE JOBS
CA127
Parallel processing is a concept associated with _______ and ________
OS AND
RAM
CA128
Parallelsimulation is there to authenticate the _______ system
REEL
SYSTEM
CA129
Prevention,detection,investigation and reaction are the ______ of an auditor
CA13
Any audit enable software may include _______
CA130
CA131
Procedure driven approach of auditing is __________
Processing controls can be grouped into general controls
CA123
TRUE
TRUE
TRUE
FUNCTIO
N
COMPLE
TENESS
TRADITI
ONAL
APPROA
CH
TRUE
CA132
Program code analysis involves ______
PROVIDE
S
DETAILE
D
INFORMA
TION ON
MACHINE
USAGE
CA133
Programme code analysis is being implemented by the _________
COMPAN
Y
CA136
Public audit trail is an important control in system that use __________ for
authentication purposes
Rdbms is a structured into a series of 2-dimensional table
Real time refers to the technique of updating files with transaction data
immediately after the occurrence of the event to which it vrelates
CA137
Reasonableness checking is
TRUE
TYPE OF
RECORD
CHECK
CA138
CA139
CA14
CA140
Recording transactions in a controlled manner may amount to loss of stored data
Regular cross-system validation may minimise frauds
Application controls can be categorized into _______ types
Risk assessment is a phase of an audit
TRUE
TRUE
4
TRUE
CA141
Risk assessment is the phase of ______
Scarf involves embedding audit software modules within an application system to
provide continuous monitoring
Security audit can be done through oracle database
AUDIT
CA134
CA135
CA142
CA143
CA144
CA145
CA146
Security can be broken into ________ areas
Sign test is a type of field checks on processed data
Snapshot is a software which takes a "picture" of a file or data or a transaction
processing through the system
CA147
Snapshot is a technique of __________ which is a part of audit software
PUBLIC
KEY
TRUE
TRUE
TRUE
RISK
AVOIDAN
CE
TRUE
TRUE
AUDIT
ROUTINE
CA148
Source code review means _______
CA149
Specialised audit programs may be _______
CA15
Application controls grouped into
Super computer are the largest and fastest and is very suitablefor commercial
applicationincluding audit work
System development control, apart from others,include
authorisation,approval,testing,implementation and documentation of new systems
software and system software modification
System privilege can be checked by auditor
System security audit is an on site inspection ,which identifies potential
securityvulnerabilities within an organization
CA150
CA151
CA152
CA153
IDENTIFY
ING
ENORMO
US CODE
PREPAR
ED BY
THE
AUDITOR
TWO
GROUPS
TRUE
TRUE
TRUE
TRUE
CA154
Test data can be defined as __________
SAMPLE
OF DATA
USED
FOR THE
PURPOS
E OF
TESTING
THE
SYSTEM
SOFTWA
RE
CA155
Test data pack is ________
STREAM
OF DATA
CA156
The contents of a field could determine _______ sign for ______ field
The move towards paperless edi would eliminate much of the traditional audit
trail,radically changing the nature of audit evidence
The stream of data that are generated by these tools is called as the __________
The transition from manual system to cis environment bring dramatic changes
including
Ar=ir*cr*dr
The validation checks applied to a field depend on the fields logical
interrelationships with other fields in the record
There are ______ types of approaches of test data techniques
There are ______ types of control totals
There are _______ types of audits of the systems development process
There are ________ types of checks that can run when data is input through a
terminal
There are _____types of checks frequently used in validating the data
There are 13 system development phases while audit of the system development
processes
There are four type of audit risks
Top down tests,bottom up tests and hybrid tests are under the _______ category
Tracing helps to analyse the change caused by viruses
Assembler language uses mnemonic symbols
Transaction file contain relatively permanent records take product profile,customer
profile,employee profile etc.
Transactions are not lost ,added,duplicated or improperly changed is called as
control over input
Validation checks is applied to a field depend on the field's logical
interrelationships with other fields in the records
Whenever monetary transaction are processed against master files,the update
program should maintain a correlation account to record such transaction that
does not have a matching master file record
White box testing focuses on finding if there are any defective execution paths in
a program
White box approach is program based
With olrt where interactive data entry is available ,the master file associated with a
transaction may be searched for confirming data
Audit around the computer is called
Audit risk cannot be viewed as a joint probability of inherent risk,control risk and
detection risk
TEST
DATA
CHANGE
IN THE
METHOD
OF
RECORDI
NG
ACCOUN
TING
TRANSA
CTION
TRUE
TRUE
ONE
2
THREE
FIVE
4
TRUE
TRUE
INTER
TABLE
TEST
TRUE
TRUE
TRUE
TRUE
TRUE
TRUE
TRUE
TRUE
TRUE
BLACK
BOX
APPROA
CH
TRUE
CA2
CA20
White box approach necessarily involves expert knowledge on the part of auditor
Audit software is a type of audit technique
TRUE
TRUE
CA21
CA22
Audit software is used by the auditor to ________
Audit software can be categorized under ______ heads
READ
DATA ON
CLIENT'S
FILES
2
CA23
CA24
Audit software can be divided into ________ categories
TWO
Audit through can be done using simulation
TRUE
Audit trail should be periodically analysed to detect any control weaknesses of the
system
TRUE
WHITE
BOX
APPROA
Audit with networking and database help is called _______
CH
Auditing is a form of attestation
TRUE
Auditor can also check default roles in oracle database software
TRUE
EXAMINE
THE THE
QUALITY
OF
SYSTEM
Auditor can combine functional capabilities of generalized audit software to
PROCES
accomplish the task of ________
S
CA25
CA26
CA27
CA28
CA29
CA33
_________ Is the file management software package that lets users and
programmers organise data into files and then process those files
Auditors can issue the sql commands to audit
Auditors can use profiles in their white-box approach of auditing
Auditors cannot use generalised audit software to extract the data needed for audit
purposes
Auditors has to take care of the fact to link between multiple databases with one
application
CA34
CA35
Base case system evaluation includes _______
Black box approach is specification based
CA3
CA30
CA31
CA32
FILE
TRUE
TRUE
TRUE
TRUE
FICTITIO
US DATA
APPLIED
AGAINST
THE
CLIENT
PROGRA
M
TRUE
CA36
CA37
CA38
CA39
CA4
CA40
CA41
CA42
CA43
CA44
CA45
CA46
CA47
CA48
CA49
CA5
CA50
CA51
Black box testing is ______ based and white box testing is _____ based
Black box testing seeks to determine whether application output is what it is
supposed to be
Caat do not contain package programs, purpose written programmes,utility
program or system management program
Caat's are computer program and data the auditor uses as part of audit
procedures to process data of audit significance contained in an entity's
information system
A sample size calculator program assists auditors in determining rand() function
Caat's are computer programs and data the auditor uses as a part of the audit
procedures
BOTH C
&D
TRUE
TRUE
TRUE
TRUE
TRUE
COMPUT
ER AIDED
SOFTWA
RE
EDITOR
Case-is ________
Check digit is a group of numbers added to a code for determining the accuracy of
other digits with code
TRUE
Check digit is a tool under field checks
TRUE
Check digit is a type of ___________
Codd's rule are being implemented on database
Computer assisted audit technique involves the use of computer through "black
box " approach
Computer operation controls are designed to provide ________
Computer security is frequently associated with confidentiality ,integrity and
authentication
Concurrent audit include auditors as members of s.d team
A sequence check on the transaction or master file by an update program is not
required
Concurrent audit is taking care of the ______ data that is being transacted
Confidentiality,integrity and availability are the major security attributes to the
auditor
FIELD
CHECKS
TRUE
TRUE
THE USE
OF
COMPUT
ERS BY
ALL
CONCER
NED
TRUE
TRUE
TRUE
PREVIOU
S DATA
TRUE
CA52
CA53
CA54
CA55
CA56
CA57
Control total is under batch checks
Controls are present over many aspects of the computer system and its
surrounding social environments
Controls are required for authorisation,to ensure data integration and to detect
possible breachesin security
Conventional data entry giving way to scanner,digitised image processors etc. For
auditing in cis environment
TRUE
TRUE
TRUE
TRUE
TYPE OF
NETWOR
K
TRUE
CA66
CA67
CA68
Core image comparison is a ________ used by the auditor
Core image comparison is a type of audit technique
Core image comparison is particularly useful where only executable versions are
distributed
TRUE
Critical review of the system of book-keeping,accountingand internal organizational
controls.
TRUE
NATURAL
/MAN
A system could be ________
MADE
Cryptographic techniques are the part of security audit
TRUE
Data communication and networking would introduce new audit risk
TRUE
Data from client application are not stored in the organisations database through
auditable events and functions
TRUE
Data integrity can be imposed on the database through dbms
TRUE
Data reverse engineering process metadata to document system and abstract
business rules and relationships
TRUE
Data security in audit techniques can be done through three ways
TRUE
Database analyser is a software which provides detailed information concerning
the operation of the database
TRUE
Databases are a key element in most business-related information systems
TRUE
Ddl,dml,dcl-statements can be exercised in rdbms
TRUE
CA69
CA7
Deterrenece meance _______
A system ehibit entropy
CA70
Dss has the following components
Dss is defined as a system that provides tools to managers to assist them in
solving structural problem
Embedded audit routines are sometimes built into an entity's computer system to
provide data for later use by the auditor
Embedded code is a software used by the auditor to examine backup
Embedded code performs a wide variety of audit tasks
CA58
CA59
CA6
CA60
CA61
CA62
CA63
CA64
CA65
CA71
CA72
CA73
CA74
CA75
CA76
CA77
CA78
Errors are corrected :_______
Event detection is an audit procedure
Event detection is the audit procedures
Examine the quality of data is not the task of generalized audit software
THREAT
TRUE
DATABAS
E
TRUE
TRUE
TRUE
TRUE
AT THE
YEAR
END
TRUE
TRUE
TRUE
CA79
CA8
CA80
Examine the quality of system processes is _________
A system means -totality
Field check is exclusive to a field
CA81
CA82
File access is a function of _________ software
File access will be the functional capabilities of generalized audit software
File activity is the proportion of transaction file records that are actually used or
accssed in a given processing run
CA83
CA84
CA85
CA86
CA87
CA88
CA89
CA9
CA90
CA91
File integration refers to the ________ of information from a file
File volatility refers to the number of additions and deletions to the file in a given
period of time
For computerised auditing,usage of sophisticated audit software would be a
necessity
For small to medium sized systems,individual modules are coded and individually
tested and then assembled to be tested as a whole.the testing strategy is referred
to as:
General purpose software provides a framework for highly complex scientific
operations
Generalised audit software could be used by the auditor for identifying
inconsistencies or significant fluctuations
A transaction file is sorted prior to the update of master file
Generalised audit software function include _______
Generalised audit software never allow several files to be read simultaneously
_______
AUDIT
TASK OF
THE
AUDITOR
TRUE
TRUE
GENERA
LIZED
AUDIT
TRUE
TRUE
BACKUP
S
TRUE
TRUE
C-BRAIN
TRUE
TRUE
TRUE
FILE
ACCESS/
ORGANIZ
ATION
TRUE
CA92
CA93
PACKAG
E
COMPUT
ER
PROGRA
M FOR
PERFOR
MING A
VARIETY
OF DATA
PROCES
SING
FUNCTIO
N
TRUE
CA95
CA96
Generalized audit software consists _______
Generalized audit software has infile capabilities for verifying processing logic
Generalized audit software has only limited capabilities for verifying processing
logic
TRUE
Generalized audit software permits auditors to undertake only expost auditing and
not concurrent auditing
TRUE
Generalized audit software provides the full set of arithmetic operators
TRUE
CA97
CA98
Hash total is a type of _________
Hash totals falls under control totals
CA94
CONTRO
L TOTAL
TRUE
Field3
FALSE
FALSE
TOP
DOWN
TESTS
FALSE
FALSE
FALSE
FALSE
Field4
Field5
Field6
A
A
HYBRID
TESTS
ALL THE
D
ABOVE
B
A
A
B
TEST
SOURCE DATA
APPROA NONE OF
CODE
REVIEW CH
THESE
C
FALSE
A
SOFTWA NETWOR NONE OF
K
THESE
B
RE
SOFTWA
RE USED
TO READ
AND
ANALYZE
RECORD
S OF
SOFTWA MACHINE MACHINE
RE
ACTIVITY ACTIVITY D
B
FALSE
FALSE
TABLE
FILES
FALSE
FALSE
APPROA
CH TO
THE
APPLICA
TION
DATA
ONLY
A
NONE OF
REPORT THE
FILE
D
ABOVE
A
B
IT IS
DATA
ABOUT
SOME
OTHER
DATA
ALL THE
ABOVE
C
CAN
ENABLE
THE
AUDITOR
TO
EXAMINE
PROVISI
ON ON A
NUMBER
OF
DIFFERE
NT
BASES
CAN
PROVIDE
THE
AUDITOR
WITH
USEFUL
INFORMA
TION ON
TRENDS
ALL THE
AND
PATTERN ABOVE
D
FALSE
A
FALSE
FALSE
B
A
MANAGE
HARDWA
RE AND
SOFTWA
RE
RESOUR
CES
ENABLE
MULTI
USER
RESOUR
CE
SHARING
OS AND
MICROP
ROCESS
OR
ALL THE
D
ABOVE
BOTH (A)
AND (B)
ROLE
ACCURA AVAILABI
CY
LITY
NONE OF
THESE
B
ALL THE
D
ABOVE
NONE OF
THE
ABOVE
C
DATABAS
REAL
BOTH (A) E
SYSTEM AND (B) SYSTEM B
OS AND
ROM
LATEST
NONE OF
APPROA BOTH (A) THE
CH
AND (B) ABOVE
A
B
FALSE
IDENTIFI
ES
PROGRA
M CODES
WHICH
MAY BE
THERE
FOR
FRAUDU
LENT
REASON
DATABAS
E
ADMINIS
TRATOR
PRIVATE
KEY
FALSE
EXAMINA
TION OF
SOURCE
CODE OF
A
PROGRA
M WITH A
VIEW TO
FOLLOWI
NG THE
LOGIC
OF A
NONE OF
PROGRA THE
ABOVE
C
M
AUDITOR
USING
COMPUT
AUDITOR ERS
D
DIGITAL
SIGNATU NONE OF
THESE
C
RE
A
FALSE
A
TYPE OF TYPE OF
RANGE
SIGN
NONE OF
CHECKS TEST
THESE
A
FALSE
FALSE
2
5
FALSE
AUDIT
THROUG
H
COMPUT ALL THE
ABOVE
ERS
FALSE
FALSE
3
B
A
D
A
NONE OF
THE
ABOVE
B
A
A
DETERR PREVEN ALL THE
ENCE
TION
D
ABOVE
FALSE
A
FALSE
AUDIT
TECHNIQ AUDITIN
UE
G
A
NONE OF
THESE
A
IDENTIFY
ING
INEFFEC
TIVE
CODE
IDENTIFY
ING NONSTANDA ALL THE
RD CODE ABOVE
D
PREPAR
ED BY AN
OUTSIDE
PROGRA
PREPAR MMER
ED BY
ENGAGE
THE
D BY THE
ENTITY AUDITOR
THREE
FOUR
GROUPS GROUPS
ALL THE
D
ABOVE
ALL THE
ABOVE
B
FALSE
A
FALSE
FALSE
A
A
FALSE
SAMPLE
OF DATA
USED
FOR
TESTING
THE
APPLICA
TION
PROGRA
MME
PROGAR ALL THE
ABOVE
MME
A
SAMPLE
OF DATA
USED
FOR THE
PURPOS
E OF
CHECKIN
G LOG
FILES
C
STREAM
OF DATA
THAT
ARE
GENERA
TED BY
TEST
DATA
TECHNIQ
UE
BOTH (A) NONE OF
AND (B) THESE
B
TOOLS
BOTH C
&D
VALID
NUMERIC B
FALSE
A
TEST
DATA
TEST
APPROA DATA
CH
PACK
USE OF
ACCOUN
TING
CODES
FALSE
NONE OF
THE
ABOVE
C
ABSENC
E OF
AUDIT
ALL THE
TRAIL
ABOVE
D
A
FALSE
TWO
4
FOUR
THREE
3
TWO
FOUR
5
ONE
A
B
B
A
THREE
2
FOUR
5
ONE
3
C
A
FALSE
FALSE
TABLE
SYSTEM LEVEL
TEST
TESTS
FALSE
FALSE
A
B
NONE OF
THESE
B
A
A
FALSE
B
FALSE
A
FALSE
A
FALSE
B
FALSE
FALSE
A
B
FALSE
A
WHITE
BOX
APPROA BOTH (A) NONE OF
CH
AND (B) THESE
A
FALSE
B
FALSE
FALSE
A
A
REPERF
ORM
PROCED
URES
CARRIED
PROVIDE OUT BY
INFORMA THE
TION TO CLIENT'S
THE
PROGRA ALL THE
AUDIT
MS
ABOVE
4
5
3
D
D
FOUR
FALSE
THREE
FALSE
BLACK
BOX
APPROA ALL THE
CH
ABOVE
FALSE
FALSE
CARRYIN
G
ANALYSI
NG
REVIEW
FILE-OMAN
FALSE
FALSE
NONE OF
THESE
C
A
A
NONE OF
THE
ABOVE
A
A
A
EXAMINI
NG THE
QUALITY ALL THE
OF DATA ABOVE
THE FILE
MANAGE
R
FILEPET
D
C
A
A
FALSE
B
FALSE
A
COMPARI
SON OF
SOURCE
VERSION
OF A
PROGRA
M
FALSE
ANALYSI
NG THE
PICTURE
OF A
FILE OR ALL THE
DATA
ABOVE
A
A
HARDWA SPECIFIC PROGRA
RE
ATION
M
A
FALSE
A
FALSE
B
FALSE
A
FALSE
B
FALSE
A
COMPUT
ER AIDED
SOFTWA
RE
EMBEDD
ED
FALSE
FALSE
COMPUT
ER AIDED
SOFTWA
RE
ENGINEE NONE OF
RING
THESE
C
B
A
RECORD BOTH (A) NONE OF
CHECKS AND (B) THESE
A
FALSE
B
FALSE
PROVIDI
NG
ACCESS
TO
COMPUT
ER TO
ALL
ORGANIZ
ATION
PERSON
EL
B
USE OF
ANY
NONE OF
PROGRA THE
MS
ABOVE
D
FALSE
FALSE
A
A
FALSE
A
ALL THE
ABOVE
CURREN NONE OF NONE OF
T DATA THESE
THESE
B
FALSE
A
FALSE
A
FALSE
A
FALSE
A
FALSE
A
TYPE OF TYPE OF
SOFTWA HARDWA NONE OF
RE
RE
THESE
B
FALSE
A
FALSE
A
FALSE
A
CONCEP
OPEN/CL TUAL/PH ALL THE
OSED
YSICAL
ABOVE
FALSE
FALSE
D
A
A
FALSE
FALSE
B
A
FALSE
FALSE
A
A
FALSE
FALSE
FALSE
A
A
A
BROADC
ASTING
FALSE
PLANNIN
G
LANGUA
GE
NETWOR NONE OF
K
THESE
A
A
MODEL
BASE
ALL THE
ABOVE
D
FALSE
B
FALSE
FALSE
FALSE
A
B
A
ON
QUARTE NONE OF
IMMEDIA RLY
THE
TELY
BASIS
ABOVE
FALSE
FALSE
FALSE
B
A
A
B
AUDIT
TASK OF
THE
AUDITOR
S USING
COMPUT
ERS
FALSE
FALSE
SPECIALI
ZED
AUDIT
FALSE
AUDIT
TASK OF
THE
GENERA
LIZED
AUDIT
SOFTWA ALL THE
RE
ABOVE
C
A
A
UTILITY
PROGRA NONE OF
M
THESE
A
A
FALSE
RETRIEV DELETIO ADDITIO
AL
N
N
B
FALSE
A
FALSE
A
BIG
BANG
STUB
B
BOUNCIN
G BALL
B
FALSE
B
FALSE
FALSE
A
A
STATISTI
CAL/ARIT
HMETICA
L
OPERATI
ON
FALSE
STRATIFI
CATION
AND
FREQUE
NCY
ANALYSE ALL THE
S
ABOVE
D
B
MATHEM
ATICAL
CONCEP
TS
FALSE
A
MASTER
LIST
TRANSA
CTION
ADMINIS
TERED
QUESTIO
NNAIRE A
A
FALSE
A
FALSE
FALSE
TRANSA
CTION
TYPE
FALSE
A
A
BATCH
SEQUEN
SERIAL
CE
NUMBER CHECK
A
A
q_id
DA1
DA2
DA3
DA4
DA5
DA6
DA7
DA8
DA9
DA10
q_desc
op1
Sequence Check is a --------------- level control check.
Analyse data over two or more periods is called ---------------------- analysis
We use Hash Total to identify ------------ within a series
where there is a definite relation between items
Analyse fields by arranging them into rows and columns is
called
Field
Horizonta
l
Duplicate
Value
Cross
Tabulate
--------------------- function searches for a value in the
leftmost column of a table and then returns a value in the
same row from a column that we specify in the table.
To import data from Access to Excel ,it is not possible to
link between Access and Excel sheet
The GAP detection options can be used to test for
completeness of data.
Exception testing can be used to identify ----------------items
Data validity test represents
Year end ledger, inventory files or transaction files can be
tested for cut-off , to ensure that the data has been
provided is for the correct audit period
In Range Check , the data may not be in proper sequence
but should be within a predetermined range
In ---------------- Check data entry follow a particular
sequence and also a predetermined range.
'Set mapping' Check control that follows a text-type
validation, we use ----------------- application for data
analysis.
Excel can import data from other databases for the data
analysis.
op2
Record
op3
Both
Vertical
A or B
Combined
Value
Gaps
Filter
Merge
RAND()
VLOOKU HLOOKU
P()
P()
TRUE
FALSE
TRUE
FALSE
Unusual Strange
A or B
exception compariso duplicates
testing
n of data testing
True
False
True
Limit
False
Sequenc
Range
e
Excel
Access
True
False
False
True
Valid
Signs
Transactio Limit
n type
Check
DA17
A System Auditor can uses CAAT tools to analyze data
In the case of the ---------- control, it is ensured that the
data in combination with other fields are reasonable as per
standard set by an organisation.
--------------- function searches for a value in the leftmost
column of a table and then returns a value in the same
row from a column that we specify in a table
DA18
Most of the tools use in Data Analysis depends on
DDE
DA11
DA12
DA13
DA14
DA15
DA16
Both
HLOOKU VLOOKU
P
A or B
P
OLE
ODBC
op4
None of
the above
None of
the Above
All of the
above
None of
the above
ans
A
A
C
A
None of
the above B
A
A
None of
the above C
All of the
D
above
A
A
Both B &
C
B
None of
the above B
A
B
Reasona
bleness D
None of
the above B
All of the
above
C
q_id
WO1
WO4
q_desc
_______ is a word processing that is a member of the office 2000 family
The feature that enables user to type anywhere in a document without pressing or
tab
The______ feature allows the user to copy and paste upto 12 items at the same
time in an application
______ and _____ key combination will extend the selection by one character on
the left and right
WO5
_____and_____ are improved layout in Word 2000
office clipboard
shift+end and
shift+home
web layout,
printlayout
WO6
The easiest way to create a document in word is
wizard
WO7
office assistant
WO8
In Office2000 environment the tool that makes work easier for us is_____
A short description of a tool bar button called the ______ is displayed when the
mouse pointer is allowed to stay for a second on the button
WO9
The _____ helps us to keep track of the margin of the page
WO10
WO11
The keys that are used to navigate between headers and footers are
Pick out the element from the following that dose not form the type of tabs for the
Word 2000
tab stop
up arrow keys
only
WO12
_______are blueprints or patterns for documents of a certain type
template
WO13
WO14
The______ is used for quickly setting paragraph indention using the mouse
Word art is text with
increase indent
special effect
WO15
WO16
AutoShapes in word can be created by accessing the _____
By default, a document consists of_____ section
drawing toolbar
1
WO17
The dialog box that is used to determine the documents margins is
________ is a box surrounding a page on all slides or a line that sets off a
paragraph on one or more slides
WO2
WO3
WO18
WO19
WO20
op1
Word 2000
click-n-type
Screen Tip
left
page setup
from the file
border
WO22
The key that is used to perform a task to select all t he text in the documents is
The key that is used to indent a paragraph is
The key that is used to change the font from the current positioned in a document
is
The key that is used to change the style of the document that is from that normal to
heading1 or heading1 to other document styles.
WO23
______ is the default view in Word used for typing Editing and Formatting the Text NORMAL
WO24
WO25
The short-cut-key that is used to indent a paragraph spacing in the documents is
The short-cut-key that is used to paste the selected text
ctrl+m
ctrl+v or ins
WO26
The short-cut-key that is used for paragraph spacing(1.5)
ctrl+2
WO21
ctrl+a
ctrl+a
CTRL+SHIFT+F
ctrl+shift+f
WO27
WO28
WO29
WO30
WO31
The box that separate text from the document and allows it to behave like an
independent object is known as
The object that is used to provide information like the title of the book, name of the
chapter, page number etc.
The object that helps us analyzing data statistically is known as
To highlight certain parts of a page to set it apart from the rest of the page we
make use of the following features
Text Box
Header and
Footer
Chart
Borders
clear
picture bullets
dialog box
WO34
To clear all the tabs in a document the option that is clicked from the tabs dialog
The dialog box that is used to incorporate picture bullets into our documents or
web pages is
The object that composes of set of tools which helps to create and work on
different shapes like rectangles, circles, flowcharts etc.
When word is opened a new document called_____ is displayed, where the user
starts typing the content right way
WO35
______ is an online dictionary maintained by word to obtain synonyms for words
thesaurus
WO36
The thesaurus is invoked by pressing_______
shift+f7
WO37
When a new table is created the insertion point flashes in the _____
first
WO38
By pressing the _____ key inserts a blank row after the last row in the table
WO39
The ______ option enables us to convert text into a table format
tab
convert text to
table
WO40
A table consists of ______ that contain text or graphics
The _______ option in word allows the user to automatically correct misspell words
as and when they are typed
______ is a facility that enables recording and replaying of a sequence of
keystroke
In Word Macros are written in _____
In Word 2000 the macro dialog box is activated with the help of ____ key
combination
________shows how a document would look like when published on the web or on
an intranet
row
______ is a software for sending and receiving e-mail messages
________is the coding system used to create web pages
The network that makes information easily accessible across various networks is
_______
email client
html
WO32
WO33
WO41
WO42
WO43
WO44
WO45
WO46
WO47
WO48
WO49
Which of the following statements are false with reference to the use of a header
row source for a mail merge
charts
doc1
AutoCorrect
Mail Merging
basic
shift+f8
web layout
view
internet
field name must
be listed in the
same order as
the
corresponding
information in
the data source
WO50
WO51
WO52
WO53
WO54
WO55
WO56
WO57
With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE
false
The alignment available for tabs does not include
Which of the following statements related to a Section Break are True
The user can set a spelling checker to skip the marked part of the next
New option under the file menu of word creates a new blank document that is
based on the normal templates
The user can split the screen only into two parts
The features that enables the user to type text graphics tables anywhere in the
document without pressing enter or tab
The user can modify the picture from the clip art
it is not possible
to change the
height of only
selected rows of
a table
left
A new section is
created in order
to change
properties like
number of
columns
true
true
true
drag & drop
true
WO58
With reference to auto correct which of the following statements are false
automatically
corrects
common typing,
spelling errors
WO59
WO60
With the reference to password protected documents which of the following
statements are false
The alignment available for tabs does not include
password can
not include
spaces
left
Which of the following statements are False
Drop Cap tool does not work for the contents in the table format
The user can split the screen only into two parts in MS-Word
a .ppt file can not
not be inserted
at specified
position in the
current
document
true
true
WO61
WO62
WO63
WO64
WO65
The special symbols that are inserted using "insert symbol" option of the word can
not be printed by the printer as they are not standard keyboard symbols
true
true
Master
Document
Print Layout
View
WO68
The "format columns" option allows to create columnar text up 12 columns only.
The document that makes the user to organize and maintain a long document,
such as multipart report or a book consisting of chapters
The view that enables us to view how objects will be positioned on the page when it
is printed
The mode that is initialized or toggled to if the user is in a position to overwrite the
text in the word
WO69
Veena is entering a paragraph in a word processing program. When the cursor
gets to the end of a line, what is the best way to get the cursor to the next line?
WO70
How are data organized in a spreadsheet?
press the return
key
layers and
planes
WO71
Which key moves the cursor to the beginning of the next line of text?
Veena typed the following sentence: "The girl was very beautiful." In which word
processing utility could she find a synonym for "beautiful"?
WO66
WO67
WO72
Insert Mode
tab
grammar
checker
send a public
message to
friends
interested in one
topic
WO77
Using an electronic bulletin board, Seema can do all of the following except which
one?
Aryan has created a ten-page story, but only wants to print the first two pages.
What printer command should he select?
What process should be used to recall a document saved previously?
Which is used to indent text within a document?
Desktop publishing is a more sophisticated form of which of the following types of
software?
WO78
What is a Word Processor used for?
To analyse
figures
WO79
What is a picture that is saved on a diskette and can be pasted into a document?
subscript
WO80
What is a Word Processor used for?
To analyse
figures
WO81
What basic tools would you find in the Edit menu of a word processor
Clear, replace
and select
WO73
WO74
WO75
WO76
WO82
What is a header in a document?
WO83
What hardware is essential for a word?
Print all
Enter
closing
database
Text at the
bottom of every
page
Mouse, printer
and processing
system
keyboard?
WO84
The user could take a picture from a magazine and insert it into the document by
using a
Browser
WO87
Clear, replace
What basic tools would you find in the Edit
and Toolbars
Assume you are creating a two-column newsletter. Which type size is the most
reasonable for the text in the columns?
6 point
Given the default left and right margins, and ½-inch spacing between columns, the
width of each column in a two-column document will be:
2½ inches.
WO88
Assume you have made all appropriate selections in the Columns dialog box in
Word, but cannot see any columns on the screen. What is the most likely cause?
You are not in
Print Layout
view.
WO89
While word processing, in which of the following situations would Tom use the
"Copy" command?
to store a file on
the hard drive
WO85
WO86
WO90
Data about a set
of similar things
WO92
What does a document contain?
Before submitting your work you want to find any words spelt incorrectly. Which of
the following would you use?
What command in a word-processing program can be used to change the word
„him‟ to „her‟, and also the word „he‟ to „she‟ in the given phrase? “On a cold and
still night, the only sound that could be heard was the owl that had ade its home in
the nest outs
WO93
What edit commands would you use to insert a paragraph from one document into Copy, then
another document, while still keeping the paragraph in the first document?
paste
WO91
WO94
WO95
Thesaurus
Paste
Which of the following statements would NOT be a reason for showing suggested
revisions in a Word document without changing the original document?
To give the
original author a
chance to accept
suggested
changes from
the person who
entered the
revisions
Which statement is NOT true regarding revisions made in a Word document?
A line appears
through text that
is to be deleted.
WO96
WO97
How are suggested changes entered for review on an initial Word document?
Through the Edit
menu by
choosing Track
Changes
command
Which of the following is TRUE about saving a document using the Versions
command?
The Versions
command will
allow you to save
multiple versions
of a document,
including any
changes that
may have been
made to that
document.
WO101
WO102
All versions are
What happens when you open a document that has been saved using the Versions opened
command?
automatically.
You have used the word „discover‟ four times in an English essay you have created
using a word processing program. You would like to find another word of similar
meaning to use instead of „discover‟. Which of the following would you use to do
this?
Dictionary
Word displays
a list of the
dates and times
When opening and working with multiple versions of a document, how can you tell each file was
which is the most recent version?
saved.
Various fields are added to a regular document to create a special document called
a form through the ____________ toolbar.
Fields
Which of the following types of fields CANNOT be inserted into a form?
Check boxes
WO103
Comments
cannot be
Which of the following is TRUE related to editing comments in a Word document? edited.
WO98
WO99
WO100
WO104
WO105
WO106
WO107
WO108
What is a header in a document?
In your English essay you notice that the paragraph at the bottom of page 1
continues on to page 2. You would like to make this paragraph start on page
2.What would be the best way to do this?
Tables in a document help you to easily arrange all of the following EXCEPT:
To identify a document, it is helpful to include the file name on each page as a
Which of the following tools will copy the formatting of selected text to other
places?
Text at the
bottom of every
page
Press tab.
text.
header/footer.
Copy button
WO109
WO110
What is the name of the process of determining the cause of errors in a macro?
Drop caps are added to a Word document using the ___________ menu.
Fault Finding
Insert
WO111
A reverse in a newsletter is:
WO112
A pull quote is best emphasized by:
a section of
white text on a
black
background.
setting it in
larger type or
font size.
Which of the following definitions is CORRECT?
The reverse
technique means
to add dark text
on a light
background.
WO113
WO116
Pertaining to newsletters, which of the following cannot be changed using the
Columns command dialog box?
As related to type size, how many points are there to the inch?
Assume you are working on a newsletter in which the masthead extends across
the top of the entire first page. The rest of the newsletter has two columns. What is
the minimum number of sections in the newsletter?
WO117
Which of the following is NOT correct with respect to page, column, and section
breaks?
Press Ctrl+Enter
to create a page
break.
WO118
Which of the following would be the most appropriate font for a newsletter
headline?
A serif font at 10
points
WO119
Which of the following is the default Word column width?
2 inches
WO114
WO115
The width of
each column
6
One
op2
Office 2000
ans
A
inbox assistant
op4
Back Office
none of the
drag & drop
above
none of the
select
above
ctr+end and
none of the
ctr+home
above
web layout, page none of the
layout
above
click from start
program,
MSWord from
none of the
the task menu
above
document
none of the
assistant
above
Tool Tip
Icon Tip
A
marginal stop
page up keys
only
ruler
home and end
keys only
Document Tip
none of the
above
up and down
arrow
center
decimal
D
model
dialogs/alerts
rotation
none of the
above
none of the
above
pictures
A
A
double click
cut
shift+left and
shift+right
normal layout,
web layout
templates
op3
Office 97
decrease indent both A and B
control tool box design wizard
A
A
B
A
A
A
B
D
B
C
A
control box
2
printer setup
from the file
menu
database
0
forms
11
print preview
from the file
shading
style box
none of the
above
none of the
above
Del
Del
ctrl+f
ctrl+f
ctrl+m
ctrl+m
CTRL+O
CTRL+SHIFT+S CTRL+SHIFT+P A
ctrl+o
ONLINE
LAYOUT
ctrl+shift+s
ctrl+2
ctrl+c or ins
ctrl+end
ctrl+x or ins
ctrl+5
ctrl+1
PAGELAYOUT
A
A
A
D
ctrl+shift+p
ONLINE
DOCUMENT
C
ctrl+home
ctrl+v or Del
none of the
above
B
A
A
B
Frame
AutoShape
A
Page Layout
Auto Shapes
Border
none of the
above
File
Screen Tips
WordArt
Shading
WordArt
Bullets
D
remove all
arrow bullet
dialog box
remove
circle bullet
dialog box
clear all
D
WordArt
AutoShapes
A
A
none dialog box A
files
default
new document document
document1
none of t he
hyphenation
mail merge
above
tools+spelling
thesaurus menu shift+f8
menu
last cell of the t
second
first row
able
none of the
end
enter
above
convert data to table auto format none of the
table
option
above
rows &
none of the
records
above
columns
none of the
AutoFormat
style gallery
above
none of the
Data Source
above
Macro
vj++
visual FoxPro
visual basic
C
shift+f7
online layout
view
alt+f5
none of the
above
A
hotmail
vb script
A
A
alt+f8
browser
micro soft
outlook express outlook
xml
sgml
intranet
the field
separators in a
header source
and the data
source can not
be set as
paragraph
arpanet
field names in
the header
source must
match any
merge fields
you've inserted
in the main
document
B
A
A
A
A
A
B
A
B
B
A
LAN
A
the number of
fields names in
the header
source must be
the same as the
number of data
fields in the data
source
B
auto format
option applies to
the entire table
and not only to
the selected
rows or columns
of a table
decimal
In order to type a
header from the
third page of the
document a
section break is
inserted after t
he third page
false
by default cell
height and
weight option
applies to all the
rows and
columns of a
table
justified
If a header is
inserted in the
second section
then the same
header is
applicable to the
first section
delete cells
option allows to
delete the entire
row or a column
or shift cells up
or shifts cells left C
top
A
A section is a
portion of a
document in
which certain
page formatting
option can be set D
A
false
false
click -n-type
false
prohibits the
user from
renaming an
auto correct
entry
password
protected
document can
be opened
without
password as
read only
justified
a document file
can be inserted
in the current
document at
specified
position
false
false
A
A
Double Click
none of the
above
automatically
corrects the
grammatically
errors
with t he caps
lock key
accidentally
turned on
reverses the
case of the
letters that were
capitalized
incorrectly and
then turns off the
caps lock
B
password are
not case
sensitive
hanging
password can be
upto 15
characters long B
top
A
a multiple
documents files
can be inserted
in the single
document
an .xls data can
not be inserted
at specified
position in the
current
document
B
A
B
A
A
B
false
false
A
Hyperlink
Child Document Document
Page Layout
Outline Layout
Type Over mode Remove
none of the
above
none of the
above
none of the
above
A
B
A
press the escape
press the tab key key
just keep typing D
rows and
lines and spaces height and width columns
D
backspace/
delete
shift
B
enter/return
spell checker
send pictures to
a friend
From ___ To
____
Copy
tabbing
graphing
Creating and
editing
documents
annotation
Creating and
editing
documents
thesaurus
outliner
C
send private
messages to a
friend
send a package
D
to a friend
Page setup
Retrieve
spacing
word
processing
Print preview
Save
sorting
B
C
B
spreadsheet
C
Storing
information
None of the
above
B
clip art
clipboard
C
Storing
information
Making
Calculations
B
Spelling,
grammar and
autocorrect
Cut, copy,
paste and clear
Text which
Numbers which appear at the
appear on every top of every
page
page
Keyboard,
Monitor,
Mouse, monitor keyboard and
mouse
and printer
Font, Paragraph,
Bullet and
Numbering
C
Designated area
on the document C
None of the
above
B
clip-art file
Spelling,
grammar and
autocorrect
microphone
10 point
15 point
2¾ inches.
3 inches.
You have not
inserted a
column section
break..
You have not
specified
continuous
section breaks.
digital scanner D
Cut, copy,
None of the
paste and clear above
to move a
section of text
from the original
to store a file on location to
a diskette
another location
C
25 point
B
impossible to
determine.
B
Word cannot
display columns
during editing;
you will see them
only when you
print the
document.
A
to leave an
original section
of text in place
while pasting a
copy elsewhere D
Spell Checker
A set of different
graphics
Grammar
Checker
None of the
above
Find and
Replace
Replace
Select all
AutoCorrect
B
Cut, then paste
Delete, then
paste
Insert, then
paste
A
Mainly text
To give the
original author a
chance to reject
suggested
changes from
the person who
entered the
revisions
To complicate
the revision
process and to
force the author
to spend more
time making
corrections
A vertical line
outside the left
margin signifies
A red underline a change has
appears beneath been made at
text that is to be that point in the
added.
document.
B
B
To allow multiple
people to work
on one
document in
collaboration
with one another C
Comments are
enclosed in a
text box at the
right of the
document.
D
Through the
Tools menu by
choosing Track
Changes
command
The Versions
command will
allow you to save
only one version
of a document,
including any
changes that
may have been
made to that
document.
The latest
version is
opened
automatically.
Both through the
Through tools on Tools menu and
the Reviewing
the Reviewing
toolbar
toolbar
D
The Versions
command will
allow you to save
only one version
of a document
without any
changes that
were just made
to the document.
The first and
second versions
are opened
automatically.
The Versions
command will
allow you to save
only two versions
of a document:
one version of
the original and
one version of
any changes
made to the
document.
A
The previous
version is
opened
automatically.
B
Grammar check Spell check
Word will show
The most recent the name of the
version will
person who
appear at the
saved each
bottom of the list. version.
Thesaurus
Tools
Toggle button
Insert
C
A drop-down list B
Forms
Text fields
Comments can
be edited or
deleted by right
clicking the
Comments
highlighted
cannot be
deleted.
text.
Text which
Numbers which appear at the
appear on every top of every
page
page
Word is not able
to tell the most
recent version of
a document.
A
Comments can
be edited or
deleted by left
clicking the
highlighted text.
C
None of the
above
C
Insert page
Copy and paste. break.
numbers.
forms.
D
C
find/search.
macro.
A
Format Painter This action is not
possible.
C
button
Bug Squashing
Tools
a section of text
where the first
letter of each
sentence is
lowercase and
the rest are
uppercase.
typing it all in
capital letters.
Error Injecting
Format
the guidelines
used to establish
where different
elements of the
newsletter will
go.
underlining the
text of the pull
quote.
A dropped cap is
a word that
A pull quote is a starts with a
quotation taken lowercase letter
from (pulled)
when it should
from another
have a capital
document.
letter.
The height of
each column
10
The number of
columns
12
D
C
an enlarged
capital letter at
the beginning of
a paragraph.
A
changing the
color.
A
A grid is a set of
horizontal and
vertical lines that
determine the
placement of
elements in a
newsletter or
other document. D
The tab spacing
within each
D
column
D
72
Four
Press
Press Enter to Shift+Enter to
create a section force a line
break.
break.
A sans serif
A sans serif font A serif font at 20 font at 45
at 10 points
points
points
It depends on
the left and
right margins,
and how many
columns are
3½ inches
4 inches
specified.
Two
Press
Ctrl+Shift+Enter
to create a
column break.
Three
Debugging
Edit
B
C
D
D
q_id
DB62
q_desc
op1
In MS-Access, while using form design view, for creating a command button for adding
a new record, we should select the _______ category from the command button
Record
wizard
Navigation
DB63
_______ form displays fields in a single horizontal row
DB64
DB65
The process of arranging the data in a meaningful order is known as ___________
______ are used to select only some particular records from the table or any other
database objects
DB66
DB67
DB68
In MS-Access, user may specify criteria for filter in form view using _________
___wildcard character represents any single character
Records cannot be sorted by a primary key
DB69
DB70
A control without a data source is known as ___________
Set of related option buttons, check boxes and toggle buttons is known as
_____________
filter
filter by
form
*
true
bound
control
button
group
DB71
The collection of related data and objects is called a ____________
database
DB72
Which of the following is control types ____________
DB73
In MS-Access, the function that gives the current date is _____________
bound
CURRDA
TE()
DB74
_____is a control that lists set of data
DB75
______is a form that summarize large amount of data
text box
pivot
table
DB76
______allows to create a filter by typing the value in a data sheet
data sheet
filter
DB77
Wizards for toolbox controls are called a __________
The wild card representation for any 5 letter word that starts with ram is
________________
Look up fields slow up data entry
____is an access object that displays un-editable data
_____option from the new object toolbar gives the easiest way of generating a report
______ represents data in a pictorial format
Changes of one table can be carried over to another related table
Hyperlinks are used to jump to any kind of information or data from a file
The memo field can have text upto_____ characters in length
In MS-Access, columnar layout can be used to view multiple records in a form
In MS-Access, alter command may be used in adding a primary key to a table
Update query is used to add records from one or more tables to the end of an existing
table
true
DB89
In ms-access, datasheet view is available in ___________
table
DB90
DB91
DB92
______are used to jump to any kind of information from a datasheet or a form
Home page will always be present as a first page of an application
Make table queries create a new table from the records of another table
table
true
true
DB93
In ms-access, to protect a database file from illegal access, we may set database
password. The option of setting database password is available in _______ menu
Insert
DB94
DB95
Foreign key is a field that uniquely identifies each record and accept no null values
Data definition queries are used to create or change database objects
DB96
DB97
DB98
DB99
The attributes of a composite key are known as ________
OLE object is a data type in access
Data displayed in forms cannot be edited
A sub form is used to display one to many relationship between tables
DB100
DB101
true
true
DB102
DB103
DB104
DB105
DB106
We can switch from datasheet view to form view by selecting view -> form view option
In MS-Access long integer is a datatype
In MS-Access, while designing a table for a particular field, the Required parameter is
set to yes. This validates the field as _______
Sorting is applied to select only some particular records
Filter by form can be created from a forms shortcut menu
Advanced filter uses a filter similar to the query design window to create a filter
? Wildcard character represents any number of characters
DB107
DB108
DB109
DB110
_________ of the following is/are a type of chart
A bound control is tied to a underlying query or table
A calculated control uses expression as a source of data
Text boxes cannot be bound controls
DB111
DB112
DB113
DB114
DB115
DB116
DB117
The default query invoked by ms-access is
A control can be bind to a record using row source property
List box is a control that offers a list of choices
If a table is joined to itself it is called a ________________
A picture box combines the activities of both a text box or a list box
Line is a tool box control
Text boxes can be part of a option group
DB118
DB119
DB120
DB121
DB122
_____ chart exists as a separate object
Filtering data is a way of arranging data in a meaning full order
Wild card characters are used for sorting records
Pivot tables are used to navigate to the other tables in a database
Reports are used to represent un-editable data
DB123
DB124
DB125
In MS -Access, the records in a table are sorted based on _________
Relationship is an association between _________
Summary options dialog box is used to summarize data
______ queries can be used to delete a group of records that meet some specific
records
Charts can convert numerical data in a easily understandable format
Embedded charts exist separately
pie
true
true
true
update
query
true
true
inner join
true
true
true
freestandi
ng
true
true
true
true
the first
field of the
table
forms
true
DB126
DB127
DB128
true
true
alternate
keys
true
true
true
null
true
true
true
true
delete
true
true
DB129
The chart which cannot exists as a separate entity are _______________
freestandi
ng
DB130
DB131
DB132
DB133
DB134
DB135
From ms - access, if we want to view the records stored in a table in ms - excel
worksheet, we need to
Page header is present at the beginning of each record
Detail section has a header and footer
A macro is performed only when the user initiates an event
The macro is selected from the action field of a macro sheet
A macro can be made to execute before the starting of a database
use
hyperlink
true
true
true
true
true
DB1
DB2
_________ data type is generally used for fields assigned as primary keys in a table
MS access objects can be published in the web
integer
true
DB3
DB4
In code-builder, got_focuse, click,dbl_click,enter are examples of _______
_______can be used to automate certain actions in response to events
actions
report
DB5
In the macro sheet the macro is selected in the _____field
macro
DB6
To build complex expressions_____is used
calculator
DB7
The three list boxes present at the bottom of the expression builder are called_____
action list
DB8
________option is selected from the view menu to create macros with conditions
conditions
DB9
DB10
DB11
_______report can be created with minimum user input
_______layout of a form displays one record at a time
The table or query name on which we are going to build our report is selected from the
____ dialogue box
DB12
DB13
______and_____are the two types of auto reports available
There are no wizards for creating a database in access
DB14
______option from the insert menu option is chosen to add an embedded chart
DB15
In ms-access, while using SQL, references constraint is used for creating _______
DB16
_______is used to create a mailing label
DB17
______header is present at the beginning of the report
DB18
______is present at the bottom of each page in a report
In SQL, having clause is used for _________
______field is added to the macro sheet when we select grouping option from the view
menu
condition
VB
______can be used to create toolbars
Modules
DB22
_______query is used to add records from one or more tables into an existing table
add
DB23
DB24
_______window is used to write VB code in access application
Values for other tables, queries are maintained in look up fields data type
report
true
DB25
Visual Basic language is a _____ tool
RAD
DB26
SysCmd
DB27
______ function is used to display a message box
Other ms-office applications can be accessed from ms-access using a concept called
________
DB28
OLE stands for_____
DB20
DB29
OLE
object
linking
and
embeddin
g
OLE
object
DB30
DB31
The application that supplies data in OLE is called an _________
If any change made on the object from the client side is reflected on the server then
the object is said to be _____
_______is the file format that works on internet
DB32
______ is used to convert any ms-access object into html format
form
wizard
DB33
_______ option in publish to web wizard produces a page that is static in nature
static file
DB34
DB35
_______query is used to create or change database objects in a current database
Currency fields express the amount in _________
DB36
_______is selected from the toolbar to add an OLE object
To display an OLE object in the form of an icon ____ option is selected from insert
object dialogue box
append
dollars
unbound
object
display as
icon
create
html
DB37
DB38
DB39
DB40
DB41
_______option from the file menu is selected to run 'publish to the web wizard'
_____page in an web application is used to navigate to the rest of the pages in the
application
______ is fired when an event is triggered is the concept based on a Visual Basic
language
Ms access is a ___________
linked
exe
startup
bullet
DBMS
data
group
DB42
A collection of data stored in different objects is known as a _________
DB43
DB44
A blank database can be created using __________
Text type data can be of _____ characters in ACCESS
DB45
DB46
______is a datatype that assigns values automatically
Tables cannot be imported from other databases
new
dialog box
255
automatic
number
true
DB47
If two tables having same values for the fields are joined it is called an ______
inner join
DB48
Duplication of records in a field won't be allowed if the fields are declared a________
DB49
Changes from a master table can be reflected on to the child table by selecting
_____option
DB50
To see more than one record at a time in a form we use _______
DB51
DB52
In SQL, delete command is used to remove _________
In MS-Access, filter excluding selection will display only those record(s) which meet the
criteria.
true
DB53
Properties of the fields are managed by _____ in Dynaset
property
field
DB54
______queries allows us to view data in row by column manner
crosstab
queries
DB55
The type of queries that can update or delete record(s) in a table(s) are called
__________
action
queries
DB56
DB57
Joining tables without any matching values in the fields is called ____________
Primary key uniquely identifies each record
inner join
true
DB58
DB59
Which of the following dialog box is/are used in the creation of form ________
_______ query wizards are used to generate summary calculations for a table
DB60
Properties of a form can be changed by selecting ______from view menu options
DB61
Forms that are included in other forms are called ______________
In MS-Access. While appending records, the source and the target table must have
similar structure and fields
We can add our own functions to the expression elements list box of the expression
builder
DB136
DB137
primary
key
cascade
delete
related
records
columnar
table or
tables
new form
dialog box
summary
change
properties
included
form
true
true
_______is the wildcard character which represents the presence of any number of
characters
Macros can be used to add a menu to a database object
_____ header is a unique feature of reports
Chart can either be a form or a report
Group header will be present at the design view of a report even if the report is not
grouped
We can change from the design view to the form view without being prompted for
saving the changes made
Charts can be produced without the wizard
Macros can be used to create user defined error messages
Between and Not Between is ______ type of operators
The default data type of VB is integer
Visual Basic is based on __________
_______is the name of the database object that displays data and can be used to edit
data
In access OLE objects cannot be linked
_____ section is present for each record in the report
DB152
DB153
DB154
A ________ sheet lists all the properties that pertain to the form or the controls
Textboxes can also be an example of unbound control
In MS-Access, we may design command buttons for navigating records
data
true
true
DB155
DB156
_______are forms that are included in other forms
_______ are used to represent our data in graphical format
sub forms
graphs
DB157
A field with a _______ uniquely identifies each record
number
DB158
Large amount of data can be summarized using ______ tables
pivot
DB159
_______ are employed to select only some particular records from a database object
filters
DB160
______ control need not have a data source
form
DB161
DB162
______ control combines the functionality of both a text box and a drop down list
MS access is a DBMS
DB163
A form can be bind to a record source using _____ property of the form
list box
true
form
name
DB164
______ forms displays field in single row
tabular
form
DB165
______ forms are usually used for tables with one to many relationship
sub forms
DB166
_______ control uses an expression as a source of control
calculated
DB167
_______ control is tied to field
calculated
DB168
_______is the form that can be created with minimum input from the user
sub form
report
true
group
DB169
______option from the tool menu is selected for setting relationships between tables
set
relation
DB170
______,______and_____are the buttons belonging to the options group
DB171
_________allows us to create a filter from a field short cut menu
option,
toggle and
command
buttons
filter by
form
DB172
DB173
________is a database object which displays data but cannot be used to edit data
What term applies to a collection of related records in a database?
form
clipboard
DB174
All of the following terms are related to computerized databases except which one?
search
What is a database?
A way to
analyse
and
manipulat
e
numerical
informatio
n
DB175
DB176
What does a record contain?
DB177
An RDBMS is a
Informatio
n about
certain
programs
remote
DBMS
DB178
Data Warehousing refers to
DB179
Unauthorised alteration of on-line records can be prevented by employing
storing
data
offline at a
separate
site
Key
verificatio
n
What is a database?
A way to
analyse
and
manipulat
e
numerical
informatio
n
DB180
DB181
DB182
DB183
DB184
What does a record contain?
Informatio
n about
certain
programs
What is a report?
Reports
allow
users to
extract
informatio
n as hard
copy
(printed
output)
What is the best way to analyse and change data
Extracting
and
analysing
data
What are some popular office orientated software applications?
Compilers
,
interpreter
s, editors
DB185
Which of the following constraints can be used to enforce the uniqueness of rows in a
table?
DB186
Which of the following commands is used to change the structure of table?
DB187
An RDBMS is a
DB188
DB189
Data Warehousing refers to
You are creating a client application that calls ActiveX DLLs. Which of the following
properties of the Err object provides the name of a component that sends an error
back to the client application?
DEFAULT
and NOT
NULL
constraint
s
CHANGE
TABLE
remote
DBMS
storing
data
offline at a
separate
site
Number
DB194
using a
This database holds personal information. The user can help to keep it confidential by password
the
If the database holds customer names and addresses, personalised letters can be
product
created automatically using
code
Application software suited to storing the survey information obtained in the table
A
would be
database
bookmark
The characters * and ? are sometimes used in search criteria as
s
Auto
Which of the following field types will generate the primary key automatically?
Primary
DB195
Referential integrity ensures that the:
records in
a dynaset
are
consistent
with the
underlying
tables.
DB196
Tables are related to one another through a:
DB197
A foreign key is:
DB198
You are creating a banking database to track customer loans. The bank will, of course,
have many customers, each of whom may take out one or more loans, while each loan One-tomay be associated with only one customer (there are no joint accounts). What is the re one
DB199
In a one-to-many relationship between Companies and Employees, which field is found EmployeeI
in both tables?
D
DB200
Which of the following ensures that records in related tables are consistent with one
another? For example, it ensures that you cannot add a record with an invalid foreign
key.
DB190
DB191
DB192
DB193
foreign
key.
the
primary
key of
both
related
tables.
The Tools
menu,
Relationsh
ip window
How would you delete a relationship between tables in the Relationships window?
Double
click the
Relationsh
ip line
In a Customers tables, what does a plus sign next to the CustomerID field mean?
That there
are
several
customers
associate
d with that
ID
DB203
What is required of the fields that join two tables?
They must
both be
numbers
DB204
Nothing,
Access
ignores
Assume a one-to-many relationship between the Customers table and the Loans table, the
with referential integrity in effect. What happens when you attempt to delete a
attempted
customer ID from the Customer table that still has entries in the Loans table?
command.
DB205
The
Which of the following is true when viewing a main form and its associated subform in subform is
the Form Design view?
not visible.
DB201
DB202
DB207
Which of the following relationships does not belong in a database based on a
professional sports league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the “many”
side of a one-to-many relationship?
DB208
You have created a one-to-many relationship with referential integrity between a
Customers table and a Loans table. From which table can you delete a record?
DB206
A one-tomany
relationshi
p between
teams and
players
#
Either
table at
any time
DB209
The correct order of the arguments for the MsgBox statement is:
DB210
The first statement in a procedure named CreateList is:
DB211
Which of the following is TRUE related to form fields?
prompt,
title bar
text, icon.
Dim
CreateList
.
A check
box
enables
the form
user to
choose
from one
of several
existing
entries.
A text field:
must be
set for
one word.
DB213
The purpose of a database is to:
help
people
keep track
of things.
DB214
A database stores:
data.
DB212
DB215
A database records:
facts.
A sales contact manager used by a salesperson is an example of _______________
singleuser
database
applicatio
n
A Customer Resource Management (CRM) system is an example of_________
singleuser
database
applicatio
n
DB218
The industry standard supported by all major DBMSs that allows tables to be joined
together is called __________.
Sequential
Query
Language
(SQL)
DB219
A program whose job is to create, process and administer databases is called the
_____
Database
Modeling
System
DB220
Microsoft Access may use which of the following DBMS engines?
Jet
DB221
DB223
Which of the following are basic components of an enterprise-class database system? The user
the
database
applicatio
n(s)
interact(s)
with the
In an enterprise-class database system ________ .
DBMS
creates
In an enterprise-class database system, the database application ___ .
queries
DB224
In an enterprise-class database system, reports are created by
____________________ .
DB216
DB217
DB222
the user
DB225
A database is considered "self-describing" because _______ .
DB226
In an enterprise-class database system, the database _________ .
all the
users'
data is in
one place
holds user
data
DB227
A database may contain _________________________ .
tables
DB228
A database designed using spreadsheets from the Sales department is a database
being designed _________________________ .
DB229
from
existing
data
from
existing
nonA database designed to implement requirements for a reporting application needed by database
the Sales department is a database being designed _______ .
data
DB230
A database designed to combine two databases used by the Sales department is a
database being designed _________________________ .
from
existing
data
DB231
Database professionals use ________________ as specific data sources for studies
and analyses.
data
marts
DB232
Database professionals use a set of principles called ________________ to guide and data
assess database design.
marts
DB233
A very popular development technique used by database professionals for database
design is known as _______________________ .
data
marts
DB234
A very popular development technique used by database professionals to adopt a
database design to new or changing requirement is known as _____ .
data
marts
DB235
The predecessor(s) of database processing was (were) __________ .
file
managers
In a relation __________________________ .
entities in
a column
vary as to
kind
DB236
DB237
An attribute is also known as a(n)
DB238
A combination of one or more columns used to identify particular rows in a is___ .
A combination of two or more columns used to identify particular rows in a relation
is________ .
DB239
DB240
.
table
record
record
DB243
record
composite
key
Insertion
anomaly
assess
the
existing
tables'
structure
When you are given a set of tables and asked to create a database to store their data, and
the first step is to ____ .
content
DB244
are
supplied
by several
wellestablishe
d
manufactu
rers
DB241
DB242
DB245
A determinant that determines all the other columns in a relation is______ .
When designing a database, one of the candidate keys in a relation is selected as the
_________ .
Normalization is a process used to deal with which of the following modification
anomalies?
Modern microcomputer personal DBMS products______.
They use
sophistica
ted
mathemati
cal
technique
s.
DB246
Which of the following are true about data mining applications?
We have obtained access to the company's operational data. We examine 50 records
for customers with phone numbers that should use the current area code of 345. Of
these 50 records, we find 10 that still use an older area code of 567. This is an
example
dirty data
DB247
We have obtained access to the company's operational data. We have been asked to
produce a report with an item by item analysis of sales, but the only sales figure
available is the total sale value for each order. This is example of_____
dirty data
DB248
DB249
A data warehouse database differs from an operational database because:
Which of the following objects is used to display a menu?
DB250
Which of the following objects are NOT found in an Access application?
data
warehous
e data are
not stored
in tables.
Form
Forms
and
reports
You are developing an Access application that you expect to upgrade periodically.
Which of the following statements is TRUE?
It will be
easier for
the user
to
upgrade it
if the
objects
and tables
are in one
database.
DB251
DB252
DB253
Which of the following statements regarding Access applications is NOT true?
Which of the following brings a copy of the table into the current database and does
not maintain a tie to the original table?
The Link
Tables
command
can be
used to
associate
the tables
in one
database
with the
objects in
another
database.
Import
DB254
What makes a database an application?
It contains
more than
one table
DB255
What is the Access tool that is used to create the user interface?
Menu
Wizard
The purpose of a data warehouse is to:
create
backups
for
mission
critical
corporate
data.
DB256
op2
op3
op4
ans
Record
Form
Operatio Operation None of
s
the above B
ns
one to
tabular
hierarchic many
al form
form
B
form
ordering
sorting
sorts
filter by
selection
$
false
unbound
control
option
group
pipes
filter by
menu
@
form
unbound
control
wizard
ram??
false
form
report
label
false
false
255
false
false
filter by
form
option
control
wizard
two of the
above
table
module
bitmap
25,000
false
query
C
gateways A
None of
the above A
D
?
B
data less data
control
control
B
controls
record
group
group
B
none of
collection the above A
all of the
controlled above
C
TODAY() DATE()
combo
box
list box
columnar tabular
form
form
filter by
input
querying
form
DAY()
C
static text B
main form A
none of
the above C
tool
wizard
C
none of
the above B
B
ledger
A
none of
the above A
report
A
A
A
D
64,000
B
A
B
all of the
D
above
not null
false
false
false
false
bar
false
false
false
select
query
false
false
outer join
false
false
false
embedde
d
false
false
false
false
the last
field of the
table
reports
false
insert
false
false
zero
both 1
and 2
delete
query
self join
stand
alone
C
A
B
A
none of
the above B
B
B
A
B
none of
the above C
A
A
B
append
query
B
B
A
table join C
B
A
B
sub chart D
B
B
B
A
primary none of
key field the above C
attributes entities
D
A
append
add
A
A
B
embedde stand
alone
d
use
datasheet
use import in forms
false
false
false
false
false
primary
number
number
false
procedure
events
s
form
chart
expressio
n
elements comments
code
builder
macro list
action
columnar
columnar
link report
sub chart B
use
export
auto
number
D
B
B
B
A
A
D
A
none of
the above B
macros
D
action
D
expressio
expressio n
n builder elements C
expressio
n
elements none of
list box
the above C
none of
insert
the above A
auto
embedde
report
d
C
datasheet justified
B
embedde
d report
new report D
stable and dynamic none of
unstable and static the above
false
insert
add chart chart
chart
alternate foreign
none of
key
key
the above
chart
mail
none of
wizard
wizard
the above
group
page
report
header
header
header
page
group
none of
footer
footer
the above
A
B
C
C
A
D
B
group
for
specifying
conditions
with group
by clause
macro
names
none of
the above C
none of
the above C
reports
forms
macros
append
macro
sheet
false
insert
for
updating
records
RAP
MsgBox
DDE
D
delete
B
none of
module
the above C
A
none of
RAID
the above A
none of
message the above B
none of
CME
the above A
on line
on line
execution editing
none of
the above A
OLE
communic
ator
C
OLE
OLE client server
embedde
d
connected edited
DLL
BMP
html
publish to
report
query
web
wizard
wizard
wizard
dynamic none of
static html file
the above
data
add
insert
definition
rupees
pesos
yen
bound
command
object
button
list box
create
display
link
icon
save as
none of
new
html
the above
none of
home
end
the above
none of
command procedure the above
RDBMS front end language
A
D
D
B
D
A
B
A
C
B
C
A
data
data
collection database storage
C
new blank
database
dialog box
64000
AutoNum
ber
false
new
database database
dialog box dialog box A
235
63500
A
automatic
number
field
B
B
explicit
none of
outer join join
the above A
no
candidate duplicate
not null
key
key
A
cascade cascade
change
update
change all
related
related
related
records
fields
records
C
both a and none of
tabular
b
the above B
query or record or none of
queries
records
the above C
false
field
property
B
Dynaset
field
properties properties B
row/colum select
n queries queries
change/de
row/colum lete
n queries queries
no match
self join
join
false
form
create
dialog box
sum
form
wizard
dialog
append
form
properties properties
sub form
update
queries
A
update
queries
A
outer join D
A
both 1 and
3
D
simple
D
new
properties B
new form child form B
false
A
false
A
#
false
detail
false
?
*
group
topic
D
A
C
A
false
B
false
false
false
list
false
A
B
A
C
B
range
logical
event structured procedura
query
l based
none of
language language the above C
form
false
record
property
false
false
child
forms
chart
primary
key
query
index
form
queries
sorts
bound
combo
box
false
unbound
button
record
source
data sheet
chart form form
tabular
columnar
form
form
bound
unbound
B
B
D
session
detail
both a and none of
b
the above B
A
A
none of
inner form the above A
labels
report
B
create
control
table
unbound
bound
tabular
auto form form
identifier B
none of
the above A
forms
A
none of
the above C
option
button
B
A
none of
the above C
none of
the above A
none of
the above A
none of
the above A
static
C
columnar
form
B
connect
relationshi none of
ps
the above C
option
button,
command list, check toggle
button,
and
button and
check and combo
check
list boxes boxes
boxes
D
filter by
filter by
filter by
report
record
input
D
report
file
macro
field
field
sort
names
An
organised
way of
A tool to storing
produce informatio
high
n about a
quality
set of
document similar
s
things
It contains
all the
data about
one
specific
item
relative
DBMS
A
document
which
contains
text
Relational
DBMS
table
layout
record
grab
B
B
D
A way of
maintainin
g a log
C
A
collection
of files
B
Reliable
DBMS
C
uses tape
as
opposed
to disk
C
Database
Computer access
matching controls
D
An
organised
way of
storing
A tool to informatio
produce n about a
high
set of
qualitydoc similar
None of
uments
things
the above C
backing
up data
regularly
Computer
sequence
checks
is related
to data
mining
It contains
all the
data about
one
specific
item
Reports
provide a
very
flexible
way of
creating
and
editing
document
s
A
document
which
contains None of
text
the above B
A tool
which
allows text
and
graphics
to be
placed in
document None of
s
the above A
Spreadsh
eets make
data easy Using
to analyse queries
Word
processor
s,
Network spreadshe
software, ets,
backup
databases
systems , DTP
None of
the above C
None of
the above C
FOREIGN
KEY
constraint
s
MODIFY
TABLE
relative
DBMS
PRIMARY
KEY and
UNIQUE
constraint
s
ALTER
TABLE
Relational
DBMS
backing
up data
regularly
uses tape
is related as
to data
opposed
mining
to disk
C
IDENTITY
columns C
UPDATE
TABLE
C
Reliable
DBMS
C
Descriptio Compone
n
nt
Source
D
keeping
the
keeping a original
backup
paper
copy
copy
the
primary
mail
key
merge
Graphics
browser
saving the
file with
different
filenames A
e-mail
C
e-mail
A
operators wildcards engines
AutoNum
Auto ID
ber
Auto Key
related
tables in a
database
are
consistent
with one
another.
forms in a
database
are
consistent
with the
underlying
tables or
queries.
C
C
reports
are
consistent
with the
underlying
tables or
queries.
B
query and
main form its
report and
and a
associate its related
subform. d dynaset. query.
A
not a
the
primary
primary
a field
key of
key of the from an
either
related
unrelated related
table.
table.
table.
B
One-tomany
Many-tomany
Many-toone
B
CompanyI Employee Company
D
LastName Address A
Referentia The join
l integrity line
The oneto-many
relationshi
p
B
Right-click
the
Relationsh
ip line,
then
select
Delete
from the
shortcut
menu
Select
Undo in
the
Relationsh
ips pulldown
menu
Click the
Delete
Relationsh
ips button
on the
toolbar
B
That
records
That
That there can be
some of are
added by
the data is records in clicking on
not
a related the plus
viewable table
sign
C
They
cannot be They must
They
AutoNum be the
cannot be ber data same data
text fields types
type
D
The
customer‟
s ID is
deleted
from the
Customer
s table,
The
and all the
customer‟ related
s ID is
loans are
deleted
deleted
from the from the
Customer Loans
s table.
table.
An error
message
is
displayed. D
The
subform is
an object
on the
The
form and
subform is The
can be
displayed subform is moved or
in
displayed sized like
Datasheet in Form
any other
view.
view.
object.
D
A one-tomany
relationshi
p between
teams and
coaches
A one-tomany
relationshi
p between
coaches
and teams
A many-tomany
relationshi
p between
players
and teams C
M
¥
*
C
Neither
table
C
The
Customer
s table
only when
there are
Loan
records
associate
d with that
customer
The
Loans
table at
any time
title bar
text,
prompt,
icon.
prompt,
title bar
icon, title
text, icon,
bar text.
prompt.
B
Sub
CreateList CreateList
.
.
Sub.
B
A text field
enables
the form
user to
choose
from one
of several
existing
entries.
must be
set for
multiple
words.
A dropdown list
enables
the user
to choose
from one
of several
existing
entries.
A dropdown list
enables
the user
to enter
text.
C
does not must be
have to be set for two
set.
words.
C
maintain
data on
create
different
tables of things in
store data rows and different
in tables. columns. tables.
A
relationshi
all of the
ps.
metadata. above
D
figures.
multiuser
database
applicatio
n
multiuser
database
applicatio
n
Structured
Question
Language
(SQL)
Database
Managem
ent
System
SQL
Server
informatio
n.
ecommerc
e
database
applicatio
n
ecommerc
e
database
applicatio
n
Structured
Query
Language
(SQL)
Data
Business
Model
System
a and b
D
a or b
A
None of
above
B
Relational
Question
Language
(RQL)
C
Relational
Model
Manager B
Oracle
a and b
The
database
The
managem
database ent
applicatio system
All of the
n
(DBMS)
above.
the DBMS
accesses
the
database
data
creates
form
None of
above
creates
reports
the
database
the
managem
database ent
applicatio system
n
(DBMS)
D
D
All of
above
A
b and c
D
the
database B
it reduces
data
duplicatio
n
holds
metadata
metadata
as a new
systems
developm
ent project
as a new
systems
developm
ent project
as a new
systems
developm
ent project
it contains
a
descriptio
n of its
own
structure
holds
indexes
stored
procedure
s
as a
redesign
of an
existing
database
as a
redesign
of an
existing
database
as a
redesign
of an
existing
database
normalizat data
ion
models
normalizat data
ion
models
All of the
above.
All of the
above.
C
D
All of the
above.
D
a and b
A
a and b
B
a and b
entityrelationshi
p data
modeling
entityrelationshi
p data
modeling
entityrelationshi
p data
modeling
C
normalizat data
ion
models
entityrelationshi
normalizat p data
data
ion
modeling migration
relational
hierarchic network
data
al models models
model
more than
the order the order one
of the
of the
column
columns rows is
can use
is
unimporta the same
important nt
name
tuple
foreign
key
candidate
key
surrogate
key
All of
above
C
field
field
primary
key
Update
anomaly
C
D
B
D
create
move the
design the one or
data into
database more new the new
structure tables
database A
were
essentially
killed off
by MS
Access
Their
report
delivery is
more
difficult
than
report
delivery
for
reporting
systems.
are not
have poor true
response DBMS
time
products
B
Nonintegr None of
ated data the above A
a "wrong
inconsiste nonintegra format"
nt data
ted data problem
B
a "wrong
inconsiste nonintegra format"
nt data
ted data problem
D
data
warehous
e
databases
do not
have
metadata.
Table
data
warehous
e data are
often
denormali
zed.
b and c
Report
Query
C
A
Queries
and tables Macros
Spreadsh
eets
D
It will be
easier for
the user
to
upgrade it
if the
objects
are in one
database
and the
tables in
another.
An
applicatio
n may
consist of
multiple
databases
, each
with
multiple
objects,
linked to
yet
another
database
containing
only
tables.
All objects
in an
applicatio
n,
including
the tables,
must
reside
within the
same
database.
Regardles
s of how
the
objects
and tables
are
stored,
the user
will have
to reenter
the data in
the tables
when the
applicatio
n is
upgraded. B
An
applicatio
n can be
created in
such a
way that it
objects
such as
forms and
reports
can be
changed
without
disturbing
the
existing
data.
C
Merge
Join
Link
It is
advisable
to put
each
object and
table into
a
separate
database.
A
It contains
a user
interface,
or
switchboa
rd
Interface
Build
Design
Menu
Wizard
put key
business
centralize informatio
the
n into the
managea hands or
bility of
more
data
decision
collection. makers.
It contains
tables,
reports,
queries,
and forms
It contains
macros
C
Switchboa
rd
Manager D
store all
corporate
transactio
n data in
one single
location. C
q_id
VB1
q_desc
Microsoft visual basic project file has _______ file extension.
VB2
VB3
In visual basic, _______ method is used to add an item in a combobox
In visual basic, _______ method is used to load picture during runtime in an image
control
VB4
In visual basic, to populate a drive list box with a directory list box __________
statement is used
In visual basic, to display a message in the run time _________ function is used
In visual basic, to populate a directory list box with a file list box ________ statement is
used
In visual basic, ________ is a property of a recordset object which counts the number of
rows in a recordsourse object
In visual basic, using a data control, a record can only be added from the last record.
Adding a new record is only possible using _______ method of a recordset object.
In visual basic, using a data control, a record is saved to a recordsource object using
_______ method of a recordset object.
In visual basic, using a data control, to navigate to the previous record ________
method of a recordset object is used.
In visual basic, when a record pointer reaches to the last record, _______ property of a
recordset object is automatically set to ______
In visual basic, the explorer view of a project is displayed in ___________
In visual basic, when a record pointer reaches to the first record, _______ property of a
recordset object is automatically set to ______
In visual basic, _______ is a method to convert a string into integer.
In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type
of shape should we get?
In visual basic, a timer event is only available in timer control.
In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any
object
VB19
In visual basic, _______ is a property of a textbox control to set a color of a text.
In visual basic, _______ property of a textbox control is set to _______ to underline a
text
VB20
In visual basic, _______ property of a textbox control is used to change the size of text.
VB21
In visual basic, the interval property of a timer control is given in ________
VB22
In visual basic, _______ property of listbox control counts the number of items in the list
VB23
In visual basic, the properties of various controls can be set using __________
In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a
messagebox function.
In visual basic, ________ is a function which displays a message and it also allows the
user to enter values in a form object
VB24
VB25
VB28
VB29
VB30
In visual basic, using a data control, ________ is a recordset type which allows to add a
new record and also to update existing record in a recordsourse object
In visual basic, while closing a form _______ event of a form object is triggered earlier to
terminate event.
In visual basic, to give a backcolor or to bring in a picture to a command button can only
be done if we set the style property to ______
In visual basic, a method RGB(255,0,0) will generate _______ color
In visual basic, a method RGB(255,255,255) will generate _______ color
VB31
In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.
VB32
In visual basic, if a user uses a function key F4 _________ becomes visible.
VB33
In visual basic, when a textbox control receives the focus ________ event is triggered.
VB34
VB35
In visual basic, a form is a ________ object.
Microsoft visual basic is a Rapid Application Development tool.
VB36
In visual basic, when a form object appears on the screen _________ event is triggered.
VB37
In visual basic, to display text on a label object _________ property is used
In visual basic, _______ object is used to access the database and also to manage the
data in the database.
In visual basic, when a checkbox control is checked _______ property is automatically
assigned with 1.
VB26
VB27
VB38
VB39
VB40
VB41
In visual basic, _______ keyword is used to declare a variable
What is the extension of the Visual Basic project file that stores the design of a user
control.
VB42
Which event of a text box would you use for validating the data entered by the user?
VB43
VB44
Which of the following statements forces inline error handling?
The _______ method resets the contents of bound controls to their original values when
the user clicks on the cancel button.
VB45
To deactivate the Form UnLoad event, you make the following change in the function
definiton:
VB46
How many root nodes can a TreeView control have?
VB47
A project group is a Project which:
VB48
Procedures declared in a _____ are local whereas procedures declared in a ______ are
available to the whole application.
VB49
VB50
How can you keep the user from exiting a form by clicking the Close button?
The _______ property enables Visual Basic to draw complete images in memory before
displaying them on the Screen.
VB51
You want to display the code and the description of an error. What would be the correct
syntax?
VB52
VB53
VB54
What is the purpose of the Image List Control?
Which method would you use to get a free or unused File identifier while opening any
file:
Which property procedure is used to retrieve the value of a property?
VB55
VB56
Which of the following can be shown to the user using the Common Dialog control in
VB?
Which of the following are not properties of Command Button:
VB57
Which events enable you to determine which key was pressed by the user?
VB58
In order to access a file in Non-textual format, you have to open file in:
VB63
Visual Basic displays information depending upon the current value of two properties of
the form, called:
Which of the following procedure types will execute when you assign a value to a
property of an object?
In order to overlap the controls (say a command button) during design time, we use the
„Send To Back‟ or „Bring To Front‟ option from the Edit menu. To change it dynamically
(i.e.during program execution) we need to change:
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual
Basic program.
VB64
The caption and the name properties of the command button:
VB65
You try to initialize a new Object variable with the following line but receive an error.
What could be the possible cause? Set MyVar = New Classname
VB66
Which of the following will perform a direct execution of a Command object?
VB59
VB60
VB61
VB62
VB67
The vb Critical symbol displays:
VB68
vbYesNo is an example of a(n):
VB69
VB70
The primary difference between the MsgBox statement and the InputBox function is the:
Which of the following is TRUE about a protected form (i.e., a form where the Protect
Form button on the Forms toolbar is toggled on and is assumed to remain in that
position)?
VB71
Which event is triggered when the user moves to another open form?
VB72
To deactivate the Form UnLoad event, you make the following change in the function
definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To
prevent the Form from closing, you will set the:
op1
op3
op2
op4
.frx
none of the
above
none of the
above
ans
.vbg
.vbp
.frm
add
additem
loaditem
load
loadpicture addpicture
Drive1.Drive=
Dir1.Path
messagebox(
)
Dir1.Path=Fil
e1.Path
openrecordse
t
none of the
above
B
none of the
above
C
File1.pattern=
Dir1.path
C
recordcount
count
C
update
append
addnew
additem
C
append
update
additem
addnew
B
movenext
moveprevious
movefirst
C
movelast,false
D
toolbox
eof,true
project
explorer
bof,false
value()
movelast
movelast,tru
e
form layout
window
movefirst,tru
e
int()
movefirst,false
number()
bof,true
val()
D
D
circle
true
rectangle
false
square
oval
D
A
true
false
eof,false
properties
window
B
B
B
D
A
fontcolor
color
forecolor
fontunderlin
underline,true e,true
textunderline,true
textsize
none of the
above
none of the
above
C
B
size
foresize
oneone- millionth hundredth of one-thousandth of a
of a second a second
second
D
fontsize
one-ten
thousandth of
a second
C
count
form layout
window
recordcount itemcount
prperties
project explorer
window
listcount
D
B
title
prompt
vbmsgboxstyle
toolbox
none of the
above
msgbox()
textbox
label
inputbox()
D
C
opensnapsh
opendynaset ot
dbopensnapshot
dbopendyna
D
set
load
activate
unload
initialze
C
standard
blue
red
opaque
red
green
transparent
green
blue
D
B
D
properties
window
form layout
window
toolbox
properties
window
form layout
window
toolbox
graphical
black
white
project
explorer
window
project
explorer
window
change
lostfocus
text
D
child
true
parent
false
container
gotfocus
none of the
above
load
unload
initialize
activate
none of the
above
none of the
above
D
C
D
A
C
A
text
name
opendatabas
e
dbengine
caption
enabled
visible
value
dime
dim
var
style
none of the
above
.ctx
.ctl
.ctr
.ocx
B
Validate
On Error
GoTo
linelabel
UpdateContr
ols
Cancel
parameter to
a non-zero
value
Validation
Check
Audit
A
On Error
GoTo Inline
On Error Stop
On Error
Resume Next D
1
Consists of
several
Programs
2
Consists of
several
Applications
openrecordset
PaintPicture Refresh
Resize
Cancel
UnloadMode
parameter to parameter to a non0
zero value
UnloadMode
parameter to
a zero value
None of the
above
Consists of
several
Projects
3
Consists of Various
Forms And Code
Modules
Form
window,
Project
standard or window, view Class module, code
code module code window module
None of the
above
C
B
B
A
A
D
D
A
Place code in
the Terminate
event
AutoRedraw
= True
Place code
in the
Unload
Place code in the
Deactivate event
event
AutoRedraw
= False
Refresh
None of the
above
GetFileNum GetFile
GetProperty
Get
GetBytes
Value
B
PaintPicture A
Msgbox
error.number
&
Msgbox
Msgbox
err.no &
err.number & Msgbox error.number error.descrip
err.text
err.text
& error.text
D
tion
To provide a
repository
for images
used by
To display
To help in
images to the creating a
To allow the editing of other
user
ToolBar
icons
D
controls
FreeFile
Retrieve
Common
messages
passed to
Windows
Caption
Open dialog
box
Visible
Click, KeyUp
Click and
and
KeyPress
KeyDown
Binary
Ascii Format Format
CurrentX
ScaleLeft
and
and
ScaleTop
CurrentY
Property
Property Get Assign
Background Caption
color property property
Min
Max
Shell
Are one and
the same
You do not
need to use
the Set
command
here
The Open
method
Substr
Can be
different at
times
You do not
have the
permission
to access
the class
The Exec
method
Windows explorer
Multi-Line
A
B
Input box
Font
KeyPress,
KeyUp and
KeyUp and KeyDown KeyDown
D
C
Input Mode
Output mode
B
ScaleHeight and
ScaleTop
x and y
A
Property Let
Property Set
C
ZOrder property
Value
AutoRedraw
property
CurrentVal
C
B
SetAttr
CStr
A
Are actually not
properties
None of the
above
B
MyVar has not been
declared
The ExecProcedure
method
None of the
above
None of the
above
D
C
D
A warning
query icon
A critical
message
icon
None of the
above
built-in
statement.
variable.
intrinsic constant. procedure.
MsgBox
statement can
be created
InputBox
MsgBox
with the
function
statement
macro
returns a
returns a
InputBox function can recorder,
value, while value, while be created with the
while the
the InputBox the MsgBox macro recorder, while InputBox
function does statement
the MsgBox
function
not.
statement cannot.
cannot.
does not.
Data cannot The form
A new check
Data can be
be entered
can be
box can be
into the form. modified.
added.
entered.
Unload
Cancel
parameter to
a non-zero
value
An exclamation icon
B
C
B
C
QueryUnload Deactivate
Terminate
C
Cancel
UnloadMode
parameter to parameter to a non0
zero value
UnloadMode
parameter to
a zero value
A
Q_desc
AC64
In an accounting information system, which of the following types of computer files most likely
would be a master file?
AC65
Which of the following is an advantage of a computer-based system for transaction processing
over a manual system? A computer-based system:
BC 113
Which of the following is not the component of a CPU
BC 114
A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The
following is an information not found in the trailer label
BC 114
Hard copy is a term used to describe...?
BC 115
What do the abbreviations VAB stand for
BC 116
What control would prevent the accidental erasure of customer information from a magnetic tape
BC 116
What are the individual dots which make up a picture on the monitor screen called?
BC 117
Header label normally include all the following except the
BC 117
A daisy wheel is a type of...?
BC 118
Which approach or technique is a control usually associated with microcomputers
BC 118
An impact printer creates characters by using...?
BC 119
The best security control in a microcomputer environment is to
BC 119
What would you NOT use with a flatbed plotter?
BC 12
What do you need for an ink jet printer?
BC 120
The greatest control exposure in a microcomputer environment is the lack of
BC 120
What do you need for an ink jet printer?
BC 121
A laser printer does NOT use?
BC 122
The amount of data that a disk may contain is known as the disks...?
BC 123
You can ________ protect a floppy disk.
BC 124
Information on a hard disk is usually backed-up using a...?
BC 125
Magnetic tape is a...?
BC 126
Hard disks can have a storage capacity in the region of...?
BC 128
Which storage device has the largest capacity in Mb?
BC 129
Which storage device cannot be erased?
BC 13
You can ________ protect a floppy disk
BC 130
Where should floppy disks be stored?
BC 133
The contents of these chips are lost when the computer is switched off?
BC 134
What are responsible for storing permanent data and instructions?
BC 135
Which parts of the computer perform arithmetic calculations?
BC 136
What are small high speed memory units used for storing temporary results?
BC 137
How many bits of information can each memory cell in a computer chip hold?
BC 138
What type of computer chips are said to be volatile?
BC 14
Magnetic tape is a...?
BC 14
Software can be divided into two areas:
BC 140
Travel agents use this computer system when reserving flights
BC 141
Which computers are used in the weather forecasting industry?
BC 142
Vacuum tube based electronic computers are...?
BC 143
Which generation of computer was developed from microchips?
BC 144
Which generation of computer uses more than one microprocessor?
BC 145
Which generation of computer developed using integrated circuits?
BC 146
Which generation of computer developed using solid state components?
BC 147
Name three steps involved in developing an information system
BC 148
How do you define analysis of an information system?
BC 149
What areas need to be considered in the SOFTWARE design process?
BC 15
What is the function of systems software?
BC 15
Formatting a disk results in all the data being...?
BC 151
What is Direct Implementation?
BC 152
What is parallel running?
BC 153
What documents are produced during the development of a system?
BC 154
What are User Guides are used for?
BC 16
Systems software can be categorised into:
BC 16
Which storage device cannot be erased?
BC 17
Application software are programs that are written
BC 17
BC 170
Which bus carries information between processors and peripherals?
Convert the decimal number 2989 to Hexadecimal
BC 18
Which bus controls the sequencing of read/write operations?
BC 183
What are utilities?
BC 184
Numbers are stored and transmitted inside a computer in
BC 185
BC 186
The original ASCII codes
A Nibble corresponds to
BC 187
A gigabyte represents
BC 188
A 32-bit processor has
BC 189
BC 19
A parity bit is
he contents of these chips are lost when the computer is switched off?
BC 190
Clock speed is measured in
BC 191
Cache memory enhances
BC 192
CISC machines
BC 20
Which parts of the computer perform arithmetic calculations?
BC 200
Every data from the primary memory will be erased if
BC 201
An RS-232 interface is
BC 202
For print quality you would expect best results from
BC 203
ROM
BC 204
A UPS
BC 206
smart card
BC 207
Laptop computers use
BC 208
Multiprogramming refers to
BC 209
Multitasking refers to
BC 21
What are small high speed memory units used for storing temporary results?
BC 21
A good way to exchange information that changes rapidly is through
BC 210
Multiprogramming is a prerequisite for
BC 211
Timesharing is the same as
BC 212
Virtual memory is
BC 213
Multiprocessing is
BC 22
To help keep sensitive computer-based information confidential, the user should
BC 22
What is the function of a disk drive?
BC 228
BC 229
A 4GL is
A nanosecond is
BC 23
What small, hand-held device is used to move the cursor to a specific location on the screen?
BC 230
The memory address register is used to store
BC 231
The memory data register is used to store
BC 232
The instruction register stores
BC 24
BC 25
Which of the following is used to indicate the location on the computer monitor?
A mathematical procedure that can be explicitly coded in a set of computer language instructions
that manipulate data.
BC 26
Which of the following translates a program written in high-level language into machine language
for execution?
BC 27
Detecting errors in real memory is a function of
BC 28
BC 28
To find where a file has been saved on disk, the user should
A series of instructions telling the computer how to process data or files is defined as a
BC 29
To ensure that data is not lost if a computer system fails, the user should
BC 29
BC 30
Having a single CPU alternatively process tasks entered from multiple terminals is called
The place in the CPU where the data and programs are temporarily stored during processing is
called the
BC 31
All are examples of computer software except
BC 32
Computer manufactures are now installing software programs permanently inside the computer.
It is known as
BC 32
Which of the following file organisation forms most efficiently allows access to a record
BC 33
The part of the computer system controlling data manipulation is called the
BC 34
For direct access storage devices the recording area is divided into
BC 35
The data hierarchy from the largest to the smallest is
BC 36
Which of the following hardware or software system controls provides a detailed record of all
activities performed by a computer system
BC 37
BC 37
Which one of the following parts of a computer is necessary to enable it to play music?
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15
minutes of sound and 1 minute of video. Which of the four different media listed takes up most
space on the CD-ROM?
BC 38
Which one of the following printers is suitable for printing sprocket fed carbon copies?
BC 38
Multimedia software can be most productively used for
BC 39
To be effective a virus checker should be
BC 40
Which one of the following software applications would be the MOST appropriate for performing
numerical and statistical calculations?
BC 41
BC 42
Passwords enable users to
12. How many bytes do 4 Kilobytes represent?
BC 43
BC 44
Back up of the data files will help to prevent
Which one of the following is the MOST common internet protocol?
BC 45
The advantage of a PC network is that
BC 46
The term A:\ refers to
BC 47
UPS stands for
BC 48
The main problem associated with uninstalling software is that
BC 48
You are conducting research for a Income Tax assignment. The raw facts you collect are called
BC 484
A flow chart is the
BC 485
A voucher entry in Tally is done for
BC 49
Passwords are applied to files in order to
BC 491
BC 492
Each of the following is an enabler of IT-business alignment except:
The basic systems model is used to describe virtually all information systems and it consists of
the following elements:
BC 494
What is a computer-aided design system?
BC 499
A(n) __________ offers a solution package for an entire industry.
BC 50
File extensions are used in order to
BC 506
Information systems controls include all of the following EXCEPT:
BC 51
BC 52
Hashing for disk files is called
Components of expert systems include: a) inference engine; b) user interface; c) knowledge
base; d) fuzzy logic
BC 53
Black box testing and white box testing are part of:
BC 53
What is the term used to describe the point of interaction between a computer and any other
entity, such as a printer or human operator?
BC 54
The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility
BC 54
Which of the following is an acceptable way to shut down the computer?
BC 555
Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best way to locate the files?
Components of an information system model are: a) applications architecture; b) functional
architecture; c) technology architecture; d) information architecture
BC 56
Benchmarks form part of:
BC 57
Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals
BC 58
Which is not part of help desk documentation:
BC 59
BC 60
Testing of individual modules is known as:
Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface
architecture; d) presentation architecture
BC 60
Which is part of installation testing:
BC 55
BC 60
The computer operating system performs scheduling, resource allocation, and data retrieval
functions based on a set of instructions provided by the:
BC 61
Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio
BC 61
Which of the following procedures should be included in the disaster recovery plan for an
Information Technology department?
BC 62
Designing relationships among components is part of:
BC 63
BC 64
Several Computers connected together is called:
Which network topology uses a Hub?
BC 65
Which of the following topologies is used for Ethernet?
BC 66
BC 67
Application software are programs
Which type of file search method requires a computer first read all locations preceding the
desired one
BC 67
Which of the following areas of responsibility are normally assigned to a systems programmer in
a computer system environment?
BC 68
Which of the following is recommended when many searches for data are required
BC 69
It is unlikely that a magnetic tape containing several thousand blocked records can be used on
two machines of different architecture directly because
BC 70
Which component of the CPU has the most influence on its cost versus performance
BC 71
Which of the following terms applies to network used to connect computers with other
computers, peripherals and workstations that are in fairly close proximity
BC 72
Intelligent terminals differ from dumb terminals in that they
BC 73
A computer is to be linked to 8 terminals using a single communication link. To permit
simultaneous terminal operations, communication path will require which of the following
BC 74
BC 75
A modem is a device that
A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and
printers. This type of network is called a
BC 76
A computer based system for sending, forwarding, receiving and storing messages is called an
BC 77
If a workstation contains a processor, monitor, screen manipulation device, printer, storage and
communication capabilities, it is said to be
BC 78
Terminal hardware controls include
BC 79
RS-232 is a
BC 79
What is a compiler?
BC 80
BC 80
What are the stages in the compilation process?
Which of the following is not a data transmission coding scheme
BC 81
What is the definition of an interpreter?
BC 81
A device used in data communications to divide a transmission signal into several sub-bands is
known as a
BC 82
Third generation languages such as COBOL, C, and FORTRAN are referred to as
BC 82
Serial Communication is used over long distance because it
BC 83
In what areas is the COBOL programming language used?
BC 83
The primary function of a front-end processor is to
BC 84
What is the first stage in program development?
BC 84
Which of the following is not used for data transmission within a local area network
BC 85
What is System Analysis?
BC 85
A device to device hardware communication link is called
BC 86
BC 86
What will a good software provider consider?
The topology of a network can be each of the following except
BC 87
What is the 8-bit binary value of the decimal number 85?
BC 87
Which is the most common data transmission error checking method
BC 88
What is the decimal value of the binary number 1111?
BC 88
Which of the following devices merges communication signals onto a single line
BC 89
What is the decimal value of the octal number 215?
BC 89
Which tool is used to help an organization build and use business intelligence?
BC 9
Cache memory enhances
BC 90
What is the decimal value of the hexadecimal number FF?
BC 90
Numbers are stored and transmitted inside a computer in
BC 91
BC 91
What is the hexadecimal value of the decimal number 1476?
A byte corresponds to
BC 92
What does EBCDIC coding of numbers mean?
BC 92
A Kb corresponds to
BC 93
What is the binary sum of 01011 and 00101?
BC 93
Information is stored and transmitted inside a computer in
BC 94
Where would you find the letters QWERTY?
BC 94
A parity bit is
BC 95
How did the computer mouse get its name?
BC 95
Clock speed is measured in
BC 96
BC 96
What are you most likely to use when playing a computer game?
CPU performance may be measured in
BC 97
A digitising tablet can be used for?
BC 97
In processing cheques which of the following I/O techniques have banks traditionally used
BC 98
Which of the following is a pointing device used for computer input?
BC 98
A UPS
BC 99
BC 99
What does a light pen contain?
The capacity of a 3.5” floppy is around
BC01
What general term describes the physical equipment of a computer system, such as its video
screen, keyboard, and storage devices?
BC02
Where would you find the letters QUERTY?
BC03
What are you most likely to use when playing a computer game?
BC04
A digitising tablet can be used for?
BC05
Which of the following is a pointing device used for computer input?
BC06
What input device could tell you the price of a product
BC07
Where would you find a magnetic strip?
BC08
Hard copy is a term used to describe...?
BC09
What are the individual dots which make up a picture on the monitor screen Called
BC10
A daisy wheel is a type of...?
BC100
What input device can be used for marking a multiple-choice test?
BC100
Laptop computers use
BC101
QWERTY is used with reference to
BC101
What input device could tell you the price of a bar of chocolate?
BC102
A GUI is
BC102
Where would you find a magnetic strip?
BC103
Multiprogramming refers to
BC104
Multitasking refers to
BC105
Multiprogramming is a prerequisite for
BC105
UNIVAC Computer belongs to the
BC106
Timesharing is the same as
BC106
Name the first Indian Super Computer?
BC107
Disk fragmentation
BC107
The technology which is used to check answer sheets of multiple-choice questions in civil
services or similar examinations is: -
BC108
A compiler is
BC108
Which printer among the following is fastest
BC109
“Zipping” a file means
BC109
What does acronym VIRUS stands for
BC11
An impact printer creates characters by using...?
BC110
BC111
A client-server system is based on
A nanosecond is
BC112
The memory address register is used to store
BC113
Inefficient usage of excess computer equipment can be controlled by
BC115
BS 319
A procedural control used to minimize the possibility of data or program file destruction through
operator error is the use of
A predefined computational task is referred to as a(n):
CA 486
Which of the following is not the feature of GAPs
CA 487
Which is the example of CAATs
CA 488
In audit procedures, test data is
CA 489
Which of the following is not the use of CAATs
CA 490
DB 01
Which of the following are called explicitly by another procedure?
What term applies to a collection of related records in a database?
DB 02
All of the following terms are related to computerized databases except which one?
DB 03
What is a database?
DB 04
What does a record contain?
DB 05
An RDBMS is a
DB 06
Data Warehousing refers to
DB 07
Unauthorised alteration of on-line records can be prevented by employing
DB 10
What is a database?
DB 11
What does a record contain?
DB 12
What is a report?
DB 13
What is the best way to analyse and change data
DB 18
What are some popular office orientated software applications?
DB 19
Which of the following constraints can be used to enforce the uniqueness of rows in a table?
DB 20
Which of the following commands is used to change the structure of table?
DB 226
An RDBMS is a
DB 227
DB 235
Data Warehousing refers to
You are creating a client application that calls ActiveX DLLs. Which of the following properties of
the Err object provides the name of a component that sends an error back to the client
application?
DB 24
This database holds personal information. The user can help to keep it confidential by
DB 26
If the database holds customer names and addresses, personalised letters can be created
automatically using
DB 27
Application software suited to storing the survey information obtained in the table would be
DB 30
The characters * and ? are sometimes used in search criteria as
DB 365
Which of the following field types will generate the primary key automatically?
DB 366
Referential integrity ensures that the:
DB 367
Tables are related to one another through a:
DB 368
DB 369
A foreign key is:
You are creating a banking database to track customer loans. The bank will, of course, have
many customers, each of whom may take out one or more loans, while each loan may be
associated with only one customer (there are no joint accounts). What is the re
DB 370
In a one-to-many relationship between Companies and Employees, which field is found in both
tables?
DB 371
Which of the following ensures that records in related tables are consistent with one another?
For example, it ensures that you cannot add a record with an invalid foreign key.
DB 372
How would you delete a relationship between tables in the Relationships window?
DB 373
In a Customers tables, what does a plus sign next to the CustomerID field mean?
DB 374
What is required of the fields that join two tables?
DB 375
Assume a one-to-many relationship between the Customers table and the Loans table, with
referential integrity in effect. What happens when you attempt to delete a customer ID from the
Customer table that still has entries in the Loans table?
DB 376
Which of the following is true when viewing a main form and its associated subform in the Form
Design view?
DB 377
DB 378
Which of the following relationships does not belong in a database based on a professional
sports league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the “many” side of a
one-to-many relationship?
DB 379
You have created a one-to-many relationship with referential integrity between a Customers table
and a Loans table. From which table can you delete a record?
DB 380
The correct order of the arguments for the MsgBox statement is:
DB 381
The first statement in a procedure named CreateList is:
DB 393
Which of the following is TRUE related to form fields?
DB 394
A text field:
DB 401
The purpose of a database is to:
DB 402
A database stores:
DB 403
A database records:
DB 404
A sales contact manager used by a salesperson is an example of _______________
DB 405
A Customer Resource Management (CRM) system is an example of_________
DB 407
The industry standard supported by all major DBMSs that allows tables to be joined together is
called __________.
DB 408
A program whose job is to create, process and administer databases is called the _____
DB 409
Microsoft Access may use which of the following DBMS engines?
DB 410
Which of the following are basic components of an enterprise-class database system?
DB 411
In an enterprise-class database system ________ .
DB 412
In an enterprise-class database system, the database application ___ .
DB 413
In an enterprise-class database system, reports are created by ____________________ .
DB 414
A database is considered "self-describing" because _______ .
DB 415
In an enterprise-class database system, the database _________ .
DB 416
A database may contain _________________________ .
DB 417
A database designed using spreadsheets from the Sales department is a database being
designed _________________________ .
DB 418
A database designed to implement requirements for a reporting application needed by the Sales
department is a database being designed _______ .
DB 419
A database designed to combine two databases used by the Sales department is a database
being designed _________________________ .
DB 420
Database professionals use ________________ as specific data sources for studies and
analyses.
DB 421
Database professionals use a set of principles called ________________ to guide and assess
database design.
DB 422
A very popular development technique used by database professionals for database design is
known as _______________________ .
DB 423
A very popular development technique used by database professionals to adopt a database
design to new or changing requirement is known as _____ .
DB 424
The predecessor(s) of database processing was (were) __________ .
DB 425
DB 426
DB 427
In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to identify particular rows in a is___ .
DB 428
A combination of two or more columns used to identify particular rows in a relation is________ .
DB 429
DB 430
A determinant that determines all the other columns in a relation is______ .
When designing a database, one of the candidate keys in a relation is selected as the
_________ .
DB 431
Normalization is a process used to deal with which of the following modification anomalies?
DB 432
When you are given a set of tables and asked to create a database to store their data, the first
step is to ____ .
DB 433
Modern microcomputer personal DBMS products______.
DB 434
DB 436
Which of the following are true about data mining applications?
We have obtained access to the company's operational data. We examine 50 records for
customers with phone numbers that should use the current area code of 345. Of these 50
records, we find 10 that still use an older area code of 567. This is an example
We have obtained access to the company's operational data. We have been asked to produce a
report with an item by item analysis of sales, but the only sales figure available is the total sale
value for each order. This is example of_____
DB 437
DB 463
A data warehouse database differs from an operational database because:
Which of the following objects is used to display a menu?
DB 464
Which of the following objects are NOT found in an Access application?
DB 435
DB 465
DB 466
You are developing an Access application that you expect to upgrade periodically. Which of the
following statements is TRUE?
DB 467
Which of the following statements regarding Access applications is NOT true?
Which of the following brings a copy of the table into the current database and does not maintain
a tie to the original table?
DB 469
What makes a database an application?
DB 470
What is the Access tool that is used to create the user interface?
DB 503
The purpose of a data warehouse is to:
DS 279
____________ is the art of protecting information by transforming it into an unreadable format.
DS 59
Which of the following activities would most likely detect computer-related fraud?
DS 62
A digital signature is used primarily to determine that a message is:
DS 63
What is a major disadvantage to using a private key to encrypt data?
DS 66
Which of the following risks can be minimized by requiring all employees accessing the
information system to use passwords?
EC 103
The most beneficial advantage of ERP system is
EC 301
What is the term that describes spying on one‟s business rivals to gain a competitive advantage?
EC 302
What would you NOT be looking for when spying on a competitor?
EC 406
An online drugstore such as Drugstore.com is an example of_______
EC 51
Which of the following is an example of unacceptable online „netiquette‟?
EC 58
Which of the following statements is correct concerning the security of messages in an electronic
data interchange (EDI) system?
EX 10
On an Excel sheet the active cell is indicated by…
Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of
cells A6, A7, and A8 are _____.
EX 11
If a cell shows ####### , it means that _____.
EX 12
EX 13
EX 14
Which is not an advantage of using computerized spreadsheets?
The gym teacher has a new program to calculate physical fitness in terms of weight and
exercise. The use inputs different weights or amounts of exercise to determine the related
physical fitness. This "What if" program is most likely which of the followin
The difference between the highest and the lowest values.
EX 15
Spreadsheets can be used for...
EX 1
EX 2
To select a column the easiest method is to …
EX 3
EX 320
If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as
EX 321
All of the following are considered constants EXCEPT:
EX 322
EX 323
Which of the following may NOT be included in a formula?
Which of the following is NOT a valid mathematical operator in Excel?
EX 324
Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?
EX 325
Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?
EX 326
How can you tell which cell in a worksheet is the active cell?
EX 327
How can you change the active cell?
EX 328
Which of the following would you use to change the font size of a cell in Excel?
EX 330
EX 331
EX 332
The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________ menu.
In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the
date and time a file was last modified.
EX 333
Which of the following commands will automatically adjust cell references in formulas?
EX 334
Which of the following commands will remove cells, rows, or columns from a worksheet?
EX 335
Which of the following options is NOT controlled through the Page Setup command?
EX 336
Which command enables you to change the margins for a printed worksheet?
EX 337
EX 338
All commands are carried out on a rectangular groups of cells known as a:
Which of the following is a valid cell range?
EX 339
In a copy operation, the cell(s) you are copying from is called the:
EX 340
In a copy operation, the cell(s) you are copying to is called the:
EX 341
EX 342
EX 343
EX 345
Which of the following commands is needed to duplicate the contents of a cell in another?
A cell reference that does not change during a copy operation is known as
Which of the following is considered an absolute cell reference?
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4,
what will be the contents of cell E4?
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to
cell E4, what will be the contents of cell E4?
EX 346
Which of the following commands is needed to transfer the contents of one cell range to
another?
EX 344
EX 347
The F4 key is used to:
EX 352
Which of the following quickly copies the formatting of a selected cell to other cells?
EX 353
Which of the following will insert a hyperlink into an Excel worksheet?
EX 354
Conditional formatting applies formatting to a cell based on:
EX 358
If you enter a date into a cell, Excel stores the date as:
EX 361
You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened
that worksheet again on August 31. What will be displayed in cell E17 on August 31?
EX 362
The number of days between two cells containing dates can be calculated by:
EX 363
The function key that is used to quickly edit the contents of a cell is:
EX 364
What will be stored in a cell if 3/4 is entered in it?
EX 384
EX 42
A user‟s response to the InputBox function can be stored in:
The cell reference for a range of cells that starts in cell B1 and goes over to column G and down
to row 10 is _____.
The teacher has a spreadsheet showing all Year 10 students and their marks in one
Mathematics test. To find the student with the highest mark, which of the following functions
should be used?
EX 43
Which chart type best shows proportions of a whole?
EX 462
Which of the following is TRUE regarding chart types?
EX 5
To select several cells or ranges that are not touching each other, you would _____ while
selecting.
EX 4
EX 57
Your Institute teachers have set an assignment on „Studies‟. You are required to use a
spreadsheet to record all that you study on each day for four weeks. You decide to show each
week‟s data with an accompanying graph. What is the best way of doing this
What would be the best method to quickly copy the formula from the active cell to each cell
below it?
EX 6
To arrange rows in alphabetical order based on column A, you need to use the command _____.
EX 6
What can you NOT do with a spreadsheet?
EX 7
To print just part of a sheet, you would select what you want to print and _____ .
EX 52
EX 7
EX 8
Spreadsheets can be used for...
The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in
B2 is _____.
EX 8
Which of the functions is not valid for performing addition
EX 9
The default orientation for the printed page is _____.
EX9.
Which is not a valid cell address?
IN 01
IN 05
Which of the following best describes uploading information?
A characteristic of a communication channel that is the amount of information that can be
passed through it in a given amount of time, expressed in bits per second.
The act of searching through storage to locate information without necessarily knowing of the
existence of the information being sought.
The principles, means and methods for rendering information unintelligible and for restoring
encrypted information to intelligible form.
A long string of seemingly random bits used with cryptographic algorithms to create or verify
digital signatures and encrypt an decrypt messages and conversations.
IN 06
Protected/private character string used to authenticate an identity or to authorize access to data.
IN 07
The successful act of bypassing security mechanisms of the system.
IN 08
A set of rules and formats, semantic and syntactic, that permits entities to exchange information.
IN 09
IN 10
An attempt to get access to a system by posing to be an authorised person.
An action or event that might prejudice security.
IN 104
According to information Technology Act, 2000, To investigate contraventions the controller of
certifying authority shall exercise the like powers to that of
IN 11
Malicious software.
IN 110
None the person who is known as father of Internet
IN 111
This website is the biggest bookstore on the earth.
IN 112
When we talk of Data Transmission modes, then ATM stands for
IN 12
A sequence of bits or characters that identifies the destination and the source of a transmission.
IN 02
IN 03
IN 04
IN 13
The means of communicating between networks
IN 14
A group of computers and other devices dispersed over a relatively limited area and connected
by communication links that enable a device to interact with any other on the network.
IN 15
The term HTTP stands for
IN 155
A NIC is considered as
IN 156
A hub is a device that can connect
IN 157
Which of the following is true concerning the function of a switch?
IN 158
What do routers connect?
IN 159
What does a router route?
IN 16
IN 160
Software which prevents external access to a system is termed
If four computers are connected to a hub and then to the internet, how many IP addresses are
required for these 5 devices?
IN 161
Which of the following in an OSI layer
IN 162
When creating a network from just two PCs, what kind of cable would be used to connect them?
IN 163
An IP address is a
IN 164
To construct a simple LAN of 4 computers, you would connect them with ______connect them
IN 165
What happens to data that is ruined before reaching to receiver
IN 166
Bluetooth is
IN 167
Which is not one of the recognized IEEE sub layers?
IN 168
IN 169
The most preferred number system to represent a IP address is
A MAC address is of
IN 17
Protocol is
IN 172
A ............... is a LAN-based computer with software that acts as a controlling device for
controlling access to at least part, if not all, of a local area network and its available resources.
IN 173
IN 174
What is the biggest disadvantage of the Ring topology?
The .............. of the network concerns how network devices are physically (or optically)
interconnected.
IN 175
The principal topologies used with LANs are:
IN 176
What are the various types of bus architecture?
IN 177
What are the various types of ring architecture?
In a ................., each workstation attaches to a common backplane via its own physical cable
that terminates at the hub
IN 178
IN 179
IN 18
IN 180
In a ............... , each work station is directly connected to a common communications channel
Which one of the following is NOT a network topology?
In a .............. , the cable system forms a loop with workstations attached at various intervals
around the loop
IN 181
The Media Access Control (MAC) is a sub layer of the:
IN 182
IN 194
IN 195
What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in
IN 196
WAN speeds are
IN 197
Accessing the Internet from a typical home PC requires the use of
IN 198
To use the Internet, you
IN 20
The worldwide web server uses the following standard interface to act as the middleware:
IN 205
An NIC
IN 21
Accessing the Internet from a typical home PC requires the use of
IN 214
The most widely used network operating system on PC LANs is
IN 218
JPEG and MPEG
IN 22
To use the Internet you
IN 220
A multiplexer is a form of
IN 221
An ISP
IN 222
FTP is
IN 223
Telnet
IN 224
A firewall is
IN 225
A proxy server is
IN 23
A search engine is
IN 23
To look for information about interest areas on the internet, the user should use a
IN 24
An ISP
IN 25
FTP is
IN 26
Telnet
IN 267
Which of the following is a true statement about the OSI model layers?
IN 268
IN 269
Which of the following is NOT true about the Internet?
The traditional intent and impact of this common type of attack is to prevent or impair the
legitimate use of network resources.
IN 27
A firewall is
IN 270
IN 272
IN 273
Which of the following is NOT an example of a DoS attack that is popular among hackers?
A ____________ attack is when a hacker sends a continuous flow of packets to a system.
One defense option on a large network is to configure a ____________ to disallow any external
traffic.
IN 28
A proxy server is
IN 285
Which of the following would be performed on a network server and not normally on individual
workstations?
IN 288
What can be said about the safety of the Internet?
IN 29
To secure communication network against wire-tapping the most effective control is
IN 290
One way that a virus CANNOT spread throughout a network is:
IN 297
Which of the following is NOT a means of monitoring employee use of company technology?
IN 298
IN 30
____________ would be used by parents to monitor their children on their home system.
The formal rules and parameters which are established to permit a microcomputer to
communicate with the mainframe computer as though it was a terminal of the mainframe are
called
IN 304
The two most common tools used to help with extracting information are:
IN 306
Which of the following would NOT be considered an example of cyber terrorism?
IN 307
Which of the following would be a form of cyber terrorism?
IN 308
Which of the following is a likely target of a cyber terrorist that would cause considerable loss of
life?
IN 31
An organisation is upgrading its telecommunication lines. Which is the least important objective
while upgradation
IN 31
A company posts a price list of its products on its website. The advantage to the customer is that
the company can
IN 310
Which of the following is an easy-to-use service to get information on someone?
IN 312
IN 313
Which of the following pieces of information would NOT be found online?
Which of the following is the most common danger on the Internet?
IN 314
IN 315
The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain
sensitive information is called _________________.
IN 316
IN 317
Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to block:
IN 318
What is the best means of protection from cyber stalking?
IN 32
Which of the following is not an appropriate control over telecommunications software
IN 33
IN 33
Encryption techniques can be implemented in Hardware-Software
Which protocol would be used to download a free anti-virus program from the Internet?
IN 34
The major advantage of the checksum program is when it
IN 348
Which of the following is a Web browser?
IN 349
A Web page is another name for -----------
IN 35
Domain names must contain a description of the type of organisation that the domain represents.
A very common abbreviation used include:
IN 350
IN 351
A standard language for creating and formatting Web documents is:
The Web page format in which all elements of a Web page are saved as one file is called:
IN 359
Which of the following requires an Internet connection?
IN 36
Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his
computer how would he do this?
IN 360
IN 45
IN 47
Which of the following is used to update a Web query?
You download from the internet, a screensaver, a ten-second sound file and a ten-second music
video clip. You also add a hyperlink. Which of the media elements has the greatest effect on the
file size?
When saving a photograph for use on a website, which format should you choose?
IN 49
While researching the Direct taxes assignment, you find a useful website. What is the most
efficient way to access the site at a later time?
IN 493
A system that uses the Internet for business-to-business interaction is called a(n):
IN 50
IN 501
A block of text automatically added to the end of an outgoing email is called
_________ refers to the use of Internet technologies for placing telephone calls.
IN 68
Most client/server applications operate on a three-tiered architecture consisting of which of the
following layers?
IN 69
Which do you NOT need to connect to the Internet?
IN 70
What does FTP stand for?
IN 71
What is the purpose of DNS?
IN 72.
Which of the following is NOT a properly formatted IP address?
IN 73.
Which of the following is a properly formatted email address?
IN 74.
The Internet is controlled by whom?
IN 75.
What does IRC stand for?
IN 76
If you do not pick up your email for a week...?
IN 77
What does HTML stand for?
IN 78
What is a disadvantage of joining a mailing list?
OS 01
Which of the following computer software is designed to direct and assist the execution of
application programs
OS 127
Formatting a disk results in all the data being...?
OS 131
Which bus carries information between processors and peripherals?
OS 132
Which bus controls the sequencing of read/write operations?
OS 139
OS 193
Which computers use single chip processors?
CPU performance may be measured in
OS 199
In processing cheques which of the following I/O techniques have banks traditionally used
OS 215
Disk fragmentation
OS 216
A compiler is
OS 217
An interpreter is
OS 219
“Zipping” a file means
OS 233
An assembly language program is translated to machine code by
OS 234
Which of the following is not part of the processor
OS 236
If the Cancel Error Property of the CommonDialog Box is set to true then which of the following
statement is true:
OS 238
OS 271
OS 274
OS 275
OS 276
OS 277
__________ control defaults to displaying the files in the current directory:
A ____________ occurs any time a program writes more information into the temporary space it
has allocated in the memory.
Assessing a system requires certain common tools. Which of the following is NOT a tool used to
assess a system?
The ____________________ Web site has a utility that will tell you what software and operating
system a Web server is running.
When software vendors discover flaws in their software, they usually will write corrections to their
code, known as:
All ____________ have the option of blocking ports.
OS 278
Which of the following is NOT a characteristic of a firewall?
OS 280
Before shutting a service on an individual machine, which of the following would you always
check?
OS 281
At a minimum, which of the following should be implemented under the protection phase?
OS 282
OS 283
Attacks on your system may be prevented or trapped through the use of:
Setting restrictions as to the number of unique passwords to use before a user can recycle them
is called a password:
OS 284
Which of the following is NOT a step to take in securing a workstation?
OS 286
To prevent a hacker from unauthorized access, what should you do with the administrator
account?
OS 287
What should be done with old backup tapes and CDs?
OS 289
Which of the following is NOT an example of malware?
OS 291
One step you can take to reduce the risk of being infected by a virus is to:
OS 292
Which of the following is NOT a sign that a virus has infected your system?
OS 293
OS 294
Which of the following is the safest way to protect yourself from e-mail viruses?
A ____________ attack causes too much information to be placed into temporary memory
space.
OS 295
____________ gathers user information with the user‟s knowledge.
OS 296
Which of the following is the most common function of spyware?
OS 299
Which of the following is NOT a virus-scanning technique?
OS 300
Which of the following would NOT be a way to protect your system from spyware?
OS 309
For which of the following positions would it be advisable to conduct an extensive background
check?
OS 329
Which of the following would you use to open an existing file?
OS 355
The ability to have multiple applications open at the same time is known as:
OS 356
OS 357
Which of the following can be changed using the Options command?
Which of the following leaves an application open but shrinks the window to a button on the
Windows taskbar?
OS 396
Which of the following actions would move a floating toolbar to dock it in a different place?
OS 397
To display a missing or needed toolbar, click the:
OS 399
Which of the following is NOT a true statement regarding password protection?
OS 495
The Linux operating systems is an example of:
OS 496
The Windows operating systems is:
OS 497
Application service providers offer:
OS 498
A(n) _________ offers on-demand software on an as-needed basis to its clients over the web.
OS 502
_________ are systems used to interact with customers and run a business in real time.
OS 504
OS 505
OS239
The most common cause(s) of disaster is (are):
A _______ backup site is backup facility consisting of an empty warehouse with all necessary
connections for power and communication, but nothing else.
To destroy an object and free the memory space occupied by it, the keyword used is:
PP 44
An example of the components of a multimedia presentation could include
PP 442
Which of the following formatting elements can be applied to a PowerPoint diagram using the
AutoFormat tool?
PP 443
Which of the following formatting elements can be applied to a PowerPoint diagram using the
Format AutoShape command?
PP 444
What happens when you double click a blank graph placeholder in a PowerPoint presentation?
PP 445
The legend in a Microsoft Graph chart is:
PP 446
Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the
best chart type if you want to emphasize the total sales of each region?
PP 447
Which of the following actions will enable you to insert a graph into a PowerPoint presentation?
PP 448
If you are editing a slide containing a Microsoft Graph, how do you display the underlying
datasheet?
PP 449
How do you deselect a chart that has been placed onto a PowerPoint slide after you have
finished creating the chart?
PP 450
What happens when you click the Datasheet button on the Microsoft Graph toolbar?
PP 451
What happens if you single click a chart that is not currently active?
PP 452
What happens if you double click a chart that is not currently active?
PP 453
Using custom animation effects, you can build:
PP 454
Which of the following animation effects can be added to a slide?
PP 455
PP 456
Which of the following animations effects can be added to a slide?
Which keyboard key is used to select more than one picture on a slide?
PP 457
Custom animation can be used to affect ONLY:
PP 458
Which of the following best describes the information that appears on the advanced timeline?
PP 459
Which of the following objects can contain custom animation effects?
PP 46
What type of program allows an object within an image to be edited without affecting other
objects?
PP 460
Which of the following animation effects can be added to a slide?
PP 461
PP 500
Which of the following is TRUE regarding the Datasheet?
Graphical software tools that provide complex analysis of stored data are:
PP438
PP439
Which of the following statements is TRUE regarding PowerPoint diagrams?
Which keyboard key combination is used to undo the previous command(s)?
VB 237
VB 240
What is the extension of the Visual Basic project file that stores the design of a user control.
Which event of a text box would you use for validating the data entered by the user?
VB 241
VB 242
Which of the following statements forces inline error handling?
The _______ method resets the contents of bound controls to their original values when the user
clicks on the cancel button.
VB 243
To deactivate the Form UnLoad event, you make the following change in the function definiton:
VB 243
To deactivate the Form UnLoad event, you make the following change in the function
definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the
Form from closing, you will set the:
VB 244
How many root nodes can a TreeView control have?
VB 245
A project group is a Project which:
VB 246
Procedures declared in a _____ are local whereas procedures declared in a ______ are
available to the whole application.
VB 247
How can you keep the user from exiting a form by clicking the Close button?
VB 248
The _______ property enables Visual Basic to draw complete images in memory before
displaying them on the Screen.
VB 249
You want to display the code and the description of an error. What would be the correct syntax?
VB 250
What is the purpose of the Image List Control?
VB 251
Which method would you use to get a free or unused File identifier while opening any file:
VB 252
Which property procedure is used to retrieve the value of a property?
VB 253
VB 255
Which of the following can be shown to the user using the Common Dialog control in VB?
Which of the following are not properties of Command Button:
VB 256
Which events enable you to determine which key was pressed by the user?
VB 257
In order to access a file in Non-textual format, you have to open file in:
VB 258
VB 259
VB 260
VB 261
Visual Basic displays information depending upon the current value of two properties of the form,
called:
Which of the following procedure types will execute when you assign a value to a property of an
object?
In order to overlap the controls (say a command button) during design time, we use the „Send To
Back‟ or „Bring To Front‟ option from the Edit menu. To change it dynamically (i.e.during program
execution) we need to change:
VB 262
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic
program.
VB 263
The caption and the name properties of the command button:
VB 264
You try to initialize a new Object variable with the following line but receive an error. What could
be the possible cause? Set MyVar = New Classname
VB 265
Which of the following will perform a direct execution of a Command object?
VB 266
The vb Critical symbol displays:
VB 382
vbYesNo is an example of a(n):
VB 383
The primary difference between the MsgBox statement and the InputBox function is the:
VB 395
Which of the following is TRUE about a protected form (i.e., a form where the Protect Form
button on the Forms toolbar is toggled on and is assumed to remain in that position)?
VB254
Which event is triggered when the user moves to another open form?
WO 01
Veena is entering a paragraph in a word processing program. When the cursor gets to the end of
a line, what is the best way to get the cursor to the next line?
WO 02
How are data organized in a spreadsheet?
WO 03
WO 04
Which key moves the cursor to the beginning of the next line of text?
Veena typed the following sentence: "The girl was very beautiful." In which word processing utility
could she find a synonym for "beautiful"?
WO 05
Using an electronic bulletin board, Seema can do all of the following except which one?
WO 06
WO 07
WO 08
Aryan has created a ten-page story, but only wants to print the first two pages. What printer
command should he select?
What process should be used to recall a document saved previously?
Which is used to indent text within a document?
WO 09
Desktop publishing is a more sophisticated form of which of the following types of software?
WO 1
What is a Word Processor used for?
WO 10
What is a picture that is saved on a diskette and can be pasted into a document?
WO 11
What is a Word Processor used for?
WO 12
What basic tools would you find in the Edit menu of a word processor
WO 13
What is a header in a document?
WO 2
What hardware is essential for a word?
WO 25
The user could take a picture from a magazine and insert it into the document by using a
WO 3
WO 32
What basic tools would you find in the Edit
What command in a word-processing program can be used to change the word „him‟ to „her‟,
and also the word „he‟ to „she‟ in the given phrase? “On a cold and still night, the only sound that
could be heard was the owl that had ade its home in the nest outs
WO 34
What edit commands would you use to insert a paragraph from one document into another
document, while still keeping the paragraph in the first document?
WO 385
Which of the following statements would NOT be a reason for showing suggested revisions in a
Word document without changing the original document?
WO 386
Which statement is NOT true regarding revisions made in a Word document?
WO 387
How are suggested changes entered for review on an initial Word document?
WO 388
Which of the following is TRUE about saving a document using the Versions command?
WO 389
What happens when you open a document that has been saved using the Versions command?
You have used the word „discover‟ four times in an English essay you have created using a word
processing program. You would like to find another word of similar meaning to use instead of
„discover‟. Which of the following would you use to do this?
WO 39
WO 391
When opening and working with multiple versions of a document, how can you tell which is the
most recent version?
Various fields are added to a regular document to create a special document called a form
through the ____________ toolbar.
WO 392
Which of the following types of fields CANNOT be inserted into a form?
WO 390
WO 398
Which of the following is TRUE related to editing comments in a Word document?
WO 4
What is a header in a document?
WO 40
WO 400
In your English essay you notice that the paragraph at the bottom of page 1 continues on to page
2. You would like to make this paragraph start on page 2.What would be the best way to do this?
Tables in a document help you to easily arrange all of the following EXCEPT:
WO 41
To identify a document, it is helpful to include the file name on each page as a
WO 440
Which of the following tools will copy the formatting of selected text to other places?
WO 468
WO 471
What is the name of the process of determining the cause of errors in a macro?
Drop caps are added to a Word document using the ___________ menu.
WO 472
A reverse in a newsletter is:
WO 473
A pull quote is best emphasized by:
WO 474
Which of the following definitions is CORRECT?
WO 477
Pertaining to newsletters, which of the following cannot be changed using the Columns
command dialog box?
As related to type size, how many points are there to the inch?
Assume you are working on a newsletter in which the masthead extends across the top of the
entire first page. The rest of the newsletter has two columns. What is the minimum number of
sections in the newsletter?
WO 478
Which of the following is NOT correct with respect to page, column, and section breaks?
WO 479
Which of the following would be the most appropriate font for a newsletter headline?
WO 480
Which of the following is the default Word column width?
Assume you are creating a two-column newsletter. Which type size is the most reasonable for
the text in the columns?
WO 475
WO 476
WO 481
WO 482
Given the default left and right margins, and ½-inch spacing between columns, the width of each
column in a two-column document will be:
WO 483
Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot
see any columns on the screen. What is the most likely cause?
WO 484
While word processing, in which of the following situations would Tom use the "Copy"
command?
WO 5
WO 56
What does a document contain?
Before submitting your work you want to find any words spelt incorrectly. Which of the following
would you use?
Op4
Ans
Payroll
transactio
ns.
A
Eliminates
Will
the need
produce a Will be
to
Does not more
more
reconcile
require as accurate efficient at control
stringent a set of
producing accounts
set of
financial financial and
internal
statement statement subsidiary
controls. s.
s.
ledgers.
C
NIC Card VSAT
RAM
Control
totals for
Identificati one or
Record
on
more
Count
Number
fields
Storing
Writing on
informatio
a hard
Printed
n on the
board
output
hard disk
Voice
activated Voice
Visual
broadcasti answer
audio
ng
back
board
File
Validity
Boundary protection
check
protection ring
Coloured
spots
Pixels
Pixies
Identificati
on
Reel
File Name number
Number
Storage
Pointing
Printer
device
device
AGP Card B
System
Logs
Data
Dictionary B
Physical
Security
Console
Log
Electricall
y charged An ink
ink
pen
Restrict
physical
access
An inked
ribbon and
print head
Require
Use only user
unremova password
ble media s
A pen
Paper
Eraser
End-of-file
and endof-reel
code
B
None of
above
None of
above
Limited
access
files
None of
above
Batch
Total
None of
above
None of
above
Make
duplicate
copies of
files
None of
above
B
C
C
B
D
A
C
A
C
A
cartridge
A drum
Read
Magnetic
tape
Serial
access
medium
1.44MB
A CDROM
A CDROM
Read
By a
sunny
window
ROM
chips
RAM
chips
ALU
CPUs
0 bits
RAM
chips
Serial
access
medium
Centralise
d function
for PC
Dispositio
n
A cassette A
Distribute
d policies
or
procedure
s
None of
A ribbon above
An INK
None of
RIBBON above
Storage
None of
Size
capacity above
Read and None of
Write
Write
above
Floppy
None of
PAN drive disk
above
Random A parallel
access
access
None of
medium
medium
above
None of
20 GB
700MB
above
Magnetic
A floppy tape
None of
disk
storage
above
Magnetic
A floppy tape
None of
disk
storage
above
Read and
Write
Write
Not
By
magnet
In a
None of
objects
drawer
above
RAM
CDROM None of
chips
chips
above
ROM
DRAM
None of
chips
chips
above
None of
Registers Logic bus above
Control
None of
Registers unit
above
None of
1 bit
8 bits
above
ROM
None of
chips
CACHE
above
A
Random A parallel selective
access
access
access
medium
medium
medium
Centralise
d function
Separatio for PC
n of duties acquisition
A
cartridge A drum
A print
A laser
head
beam
Volume
A ribbon
A
A
C
C
B
A
A
B
C
A
B
C
B
B
A
B
B
A
A
Network
software
and
security
software
Systems
software
and
applicatio
n software
Business
software
and
games
software
Mainfram
Supercom Personal e
puter
computer computer
None of
the above B
None of
above
B
Jon Von
Notebook Supercom Neumann None of
computers puters
computers above
B
First
Second
Hoover
None of
generation generation generation above
A
Second
First
Fourth
None of
generation generation generation above
C
Second
Third
Fifth
None of
generation generation generation above
C
Second
Third
Fifth
None of
generation generation generation above
B
Second
Third
Fifth
generation generation generation
Analysis,
Specificati Programm System
on,
ing,
Design,
Design,
Design,
and
and
and
Implement
Testing
Testing
ation
Analysis is This
Analysis the
involves
translates loading of looking at
program programs a system
code of a that
and
high level perform
finding out
language routines to how
to
control
informatio
machine peripheral n is being
code
devices
handled
Inputs,
outputs,
Only
file design
hardware hardware,
and
and
software software
None of
above
A
None of
above
A
None of
above
C
Maintenan
ce,
reliability,
and
upgradea None of
bility
above
B
To
execute
To collect any
data
programs
Deleted
Copied
from the from the
disk
disk
To
maintain
security
Saved to
the disk
None of
the above D
Transferre
d from the
disk
A
Users
operate
the
manual
system
and
computer
system at
the same
time
Users
operate
the
computer
system
from a
given date
Users
operate
the
manual
system
None of
above
B
The new
system is
introduced
alongside
the
existing
system
The new
system is
introduced
and users
start
operating
it
Users
continue
operating
the old
None of
system
above
A
Instruction
s and
technical
document
ation
Log files
and
temporary
files
User
Guide and
technical
document
ation
User
guides
cover how
To enable to run the
any printer system,
to be
enter
For
connected data,
technical to the
save,
support
network
print, etc.
Network
Operating systems Database
systems and
systems
and
communic and
system
ation
backup
services services services
Magnetic
tape
storage
CD-ROM floppy disk
None of
above
C
None of
above
C
None of
the above A
Hard disk B
To
maintain a
backup
copy of all
the
To do a
informatio particular
n
task.
Data bus
FDDI
Auto bus
BAD
Data bus
Auto bus
Peripheral
s that are
connected
to a
computer.
binary
form
Operating
system
routines
that
execute in
supervisor
mode.
ASCII
code form
To help
someone
who is
applying
for
employme
nt
Address
bus
TED
Address
bus
Data
structures
that are
part of the
kernel of
an
operating
system.
decimal
form
8 bits
8 bits
represent
ed 256
characters
16 bits
were 7
bits
4 bits
More than
1000
mega
bytes
32
registers
used to
indicate
uppercase
letters
ROM
bits per
second
memory
capacity
have
fewer
instruction
s than
RISC
machines
1000
kilobytes
None of
the above
Control
Bus
MAD
Control
Bus
B
A
B
D
Shells,
compilers
and other
useful
system
programs. D
alphanum
eric form A
represent
ed 127
characters A
32 bits
A
32 I/O
devices
1024
230 bytes bytes
A
a 32-bit
bus or 3232 Mb of bit
RAM
registers D
used to
detect
errors
RAM
is the first
bit in a
byte
DRAM
baud
bytes
is the last
bit in a
byte
B
CROM
A
memory
access
time
Hertz
D
secondary
secondary storage
storage
access
capacity time
B
use more
RAM than
RISC
machines
have
medium
clock
speeds
use
variable
size
instruction
s
D
ALU
Power is
switched
off
a parallel
interface
Registers Variables
Data is
not saved
Computer before
is
computer
improperly is shut
shut down down
a serial
printer
interface interface
dot matrix ink-jet
line printer printer
printer
stores
more
is faster
informatio
to access is nonn than
than RAM volatile
RAM
increased
the
provides
storage
backup
capacity increases power in
of a
the
the event
computer process
of a power
system
speed
cut
has more
storage
is a form capacity
of ATM
than an
card
ATM card
CRT
displays
LCD
displays
Logic Bus A
All of the
above
D
a modem
interface B
laser
printer.
D
is used
for cache
memory B
none of
the
previous
C
is an
access
contains
card for a a
security
microproc
system
essor
C
none of
SSGA
the
displays
previous B
having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous
A
having
several
softwares
running at
the same
time
D
ALU
the ability
to run 2 or
more
programs
concurren
tly
writing
programs none of
in multiple the
languages previous
Registers Variables Logic Bus B
magazine
brochures s
CD-ROM e-mail
D
to run
more than
one
an
program
multitaski operating at the
none of
ng
system
same time the above C
none of
multitaski multiprogr
the
ng
amming
multiuser previous C
related to
none of
virtual
a form of a form of the
reality
ROM
VRAM
previous D
same as same as
multitaski multiprogr
ng
amming multiuser
save the
file
make a
set up a
backup
password copy
to read
from or
write
informatio to print
n to a
sheets of
floppy disk paper
involves
using
more than
one
processor
at the
same time D
use a
virus
protection
program B
to display
informatio
n or
to
pictures
calculate
on a
numbers
screen
none of
Uses
uses
the
Cobol
Java
uses C++ previous.
106 sec
103 sec
1012 sec 109 sec
a
message
a keypad a mouse a frog
pad
an
instruction
data that
that has
data to be has been the
been
transferre transferre address of transferre
d to
d from
a memory d from
memory memory location
memory.
B
D
D
B
C
an
instruction
data to be
that has
transferre data to be the
been
d to or
transferre address of transferre
from
d to the
a memory d from
memory stack
location
memory A
an
instruction
the
an
that has
an
address of
instruction been
instruction the next
that has
fetched
that has
instruction
been
from
been
to be
decoded memory executed executed D
a scroll
a magic
a cursor bar
a light pen marker
A
Formula
Algorithm Program
Artificial
Assemble
Intelligenc
r
Compiler e
Memory Parity
Range
protection Checking checking
use the
directory search
use the
search
each file backup
tools
in turn
facility
Network Program System
save
copies of
the file
with the
use
same
different keep a
name on filenames record of
the
on the
computer
system
system
failures
Multiproce Time
Multiprogr
ssing
sharing
amming
Floppy
ROM
RAM
Disk
Data
B
Parity
Checker
B
Validation B
use find
and
replace
Modem
A
B
backup to
a secure
medium
D
Multiplexin
g
D
Magnetic
Disk
B
Word
Telephon Sharewar
Firmware Processor e modem e
C
Word
Telephon Sharewar
Firmware Processor e modem e
A
Sequential Hashed
Operating
System
ALU
Indexed
CPU
Random
Primary
Storage
C
B
Tracks
and
Sectors
Blocks
and
Sectors
Files and
Tracks
Character, Database, File,
field,
character, record,
database record
field
Schema
and
subschem
a
A
Element,
field, file
C
Valid
character
check
Sound
card.
Maintenan
ce
diagnostic Systems
program logs
MIDI
CD-ROM interface
Parity
check
Serial
interface
Text
Pictures
Sound
Video
D
Laser
Dot matrix Ink-jet
Drum
B
C
A
viewing an
encyclopa
edia CDROM.
creating
the plans
for a
building
design.
replaced
regularly
never
updated
recording
current
presenting stock in a
an order supermar
for stock ket and
to a
answering
warehous customer
e.
queries.
A
updated
updated once a
regularly year
C
Document
processor
make
efficient
use of
time
1024
Graphics
package
retain
confidenti
ality of
files
4096
Database
get into
the
system
quickly
512
loss of
confidenti
ality
TCP/IP
duplicatio virus
n of data infection
HTML
IPX/SPX
printer
access to
can do
the
1000s of
internet is files can pages a
quicker
be shared day
a
a file
subdirecto the root
name
ry
directory
Spreadsh
eet
D
simplify
file
structures C
8192
C
loss of
data
D
NetBEUI A
the
operating
system is
easy to
use
B
the hard
drive
D
up-line
universal provider
port serial service
uninterrup
table
uniform
power
page
supply
source
the
program
executabl
orphan
e may not
files can allow it to
be left on be
the
uninstalle
system
d
the
system
requires a
network
administra
tor to
uninstall it
data.
Graphical
represent
ation of
logic
Purchase,
sales,
receipt,
payments
etc.
C
the
system
always
requires a
re-boot
and
defrag
afterwards A
document informatio
s.
n.
text.
A
Rules
writte in
procedura
l language
Logical
Steps in
any
None of
language the above A
To fill the
log
register
It is
mandatory None of
in tally
the bove
assist in
maintenan speed up
ce
access
IT
senior
managem
executive ent lacks
support
leadership
for IT.
.
A
prevent
unauthoris allow
ed access encryption C
IT
understan
ds the
business
processin
g.
None of
the above B
All of the
above
D
input.
output.
The use
of
computers
to design
state-ofthe-art,
highquality
products.
specialist
or
functional
Software
that
generates
Using
innovated
computers designs
to do
and
architectur artistic
None of
e.
patterns. the above A
Applicatio
n Service
Provider enterprise local
B
ensure
the
name the filename identify
file
is not lost the file
identify
the file
type
All of the
above are
preventive detective corrective parts of IS
controls. controls. controls. controls.
external
static
dynamic extensible
hashing
hashing
hashing
hashing
A: (a) ,
B: (a) to
C: (a), (b), D: (b), (c),
(b), (d)
(d)
(c)
(d)
corrective preventive detective general
controls
controls
controls
controls
Compone
nt
Interface Settings
(a), (c),
(b), (c),
(d)
(d)
(a) to (d)
Turn the
computer
Press the off at the
reset
power
button.
point.
Ask the
Create the person
files
next to
again.
you.
(a), (c),
(a), (b),
(d)
(c)
organisati
detective onal
controls
controls
(a), (c),
(a), (b),
(d)
(c)
Select the
„Shut
Down‟
option
from a
menu.
Use the
Find or
Search
feature.
(a) to (d)
Control
(a), (b),
(c)
D
D
A
C
C
B
C
Pull the
power
cord from
the back
of the
computer. C
Put your
hand up
and ask
the
teacher
C
(b), (c),
(d)
C
preventive corrective
controls
controls
C
(b), (c),
(a) to (d) (d)
C
program resolution
problem
change
procedure
logging
call lights requests s
C
unit
data
thread
loop
testing
testing
testing
testing
A
(b), (c),
(a), (b),
(a), (b),
(d)
(d)
(c)
(a) to (d) D
specificati
system
benchmar ons
parallel
walkthrou
k testing matching operations ghs
B
Peripheral
Multiplexe processor Concentra
r.
s.
tor.
(b), (c),
(a), (b),
(a) to (d) (d)
(c)
Replacem
ent
personal Identificati
computers on of
Physical
for user
critical
security of
departme applicatio warehous
nts.
ns.
e facilities.
architectur interface procedura
al design design
l design
ClientComputer
server
Client
network
Star
Bus
Mesh
Job
control
language. D
(a), (c),
(d)
A
Crosstraining of
operating
personnel. B
data
design
A
Star
Bus
Ring
Hub
Ring
All of the
above
To
maintain a
backup
copy of
are written
all the
informatio
n
To do a
particular
job such
as editing,
storing
informatio
n
To help
someone
who is
applying
for
employme
nt
To Store
data in an
organised
manner
B
Direct
Systems
analysis
and
applicatio
ns
programm
ing.
A
sequential
file on a
disk
Tapes can
only be
read by
the
machine
on which
they are
written
Sequential Binary
Data
communic
ations
hardware
and
software.
A
sequential
file on a
tape
Indexed
C
A
D
B
Operating
systems Computer
and
operations
compilers. .
C
A direct
A direct
access file access file
on a disk on a tape C
Informatio
n formats
commonly
vary
Parity
between
errors will architectur
result
es
Data
record
can never
be
blocked
together C
Data path Control
part
Unit
Local
Distribute Area
d systems network
Can send
data to a
computer
and
receive
data from
a
computer
Mixer
Allows
computer
signals to
be send
over a
telephone
line
Planetary
network
Office
Automatio
n
A
Wide area
network
Protocol
B
Use the
computer
to which
they are
connected
to perform
all
processin
g
operations
Generally
require a
keyboard
for data
entry and
a CRT for
display
Modem
Multiplexo
r
Are
required
with a
microproc
essor
which
permits
some data
processin
g such as
input
validation D
Time
sharing
computer C
Aids in
back-up
procedure
s
Ring
Network
Packs
data in a
disk file
Loop
Network
Speeds
up online
printing
Star
Network
Executor
systems
An
A dumb
intelligent
workstatio workstatio
n
n
Time of
day
control
Encryption
locks
algorithms
Type of
cable
Address Input
calculation output
part
channel
Terminal
Standard
A
D
Electronic Instant
mailing
post-office C
A
A
personal mainfram
computer e PC
B
Parity
checks
All of
them
C
Device
Communi interconne
cation
ct
protocol
standard D
A
compiler
converts
the whole
A
of a
compiler higher
does a
level
conversio program
n line by code into
line as the machine
program code in
is run
one step
Feasibility
study,
system
design,
and
testing
CRC
Implement
ation and
document
ation
Baudot
An
interpreter
does the
conversio
n line by
line as the
program
is run
An
interpreter
is a
represent
ation of
the
system
being
designed
Modem
Demodula
tor
High-level
languages
It is faster
than
parallel
communic
ation
A
compiler
is a
general
purpose
language
providing
very
efficient
None of
execution the above B
Lexical
analysis,
CONVER
SION, and
code
generation
ASCII
An
interpreter
is a
general
purpose
language
providing
very
efficient
execution
Frequency
division
multiplexo
r
None of
the above D
EBCDIC A
None of
the above A
Time
Division
Multiplexo
r
C
Middlelevel
Low-level None of
languages languages the above C
It is less
It is less prone to
error
attenuatio
prone
n
Accountin
Financial Graphic
g
sector and design
systems,
engineerin and
commerci
g
education al sector
Uses only
one path D
None of
the above C
Manage
Communi the paging
cate with function in
the
a virtual
console
environme
operator nt
Specificati
on and
System
design
Analysis
Fiber
Coaxial
Optics
Cable
Relieve
the main
CPU of
repetitive
communic
ation
tasks
Testing
Common
carrier
System
The
System
Analysis
design of Analysis involves
the screen defines
creating a
the user the format formal
will see
and type model of
and use to of data
the
enter or
the
problem
display
program to be
data
will use
solved
An
A cache interface A buffer
The
different
types of
network to
be used
Star
Testing to
check for
errors
before the
system is
introduced
Packet
Reduce
competitio
n between
the
input/outp
ut devices C
None of
the above B
Telephon
e Lines
C
None of
the above C
An online
protocol
B
Hardware,
Software
and size
of
None of
program. the above
Ring
Bus
None of
10101010 1100101 1010101 the above
Cyclic
Retransmi Redundan Hash
Parity
ssion
cy
Count
None of
15
4
64
the above
Multiplexo Acoustic
Port
Modem
r
coupler
None of
327
141
97
the above
Data
Data
Data
managem
warehous Mining
ent
All of
e
tools
systems them
secondary
memory secondary storage
memory access
storage
access
capacity time
capacity time
B
B
C
A
A
C
B
B
B
5C4
16 bits
None of
the above
alphanum
eric form
None of
the above
32 bits
Bit Code
Design
None of
the above D
210 bits
210 bytes
None of
the above
alphanum
eric form
None of
the above
30
binary
form
255
256
ASCII
decimal
code form form
4C5
4 bits
Basic
Coding
Descriptio
n
1B7
8 bits
1024 bits
10000
binary
form
Binary
Coded
Decimal
1000
bytes
1112
1110
ASCII
decimal
code form form
Numeric
Keyboard Keypad
Mouse
used to
indicate
used to
uppercase detect
letters
errors
Because it
squeaks
when
moved
bits per
second
Touch
screen
BPS
Printing
letters
OCR
Touch
screen
increased
the
storage
capacity
of a
computer
system
B
A
A
B
A
A
A
A
is the first is the last
bit in a
bit in a
byte
byte
B
Its moves
like a
None of
mouse
It has ears the above D
baud
bytes
Hertz
None of
Light pen Joystick
the above
MIPS
MHz
VLSI
Tracing
Reading None of
diagrams bar codes the above
voice
barcode recognitio
MICR
scanning n
CD-ROM None of
Hard disk drive
the above
provides
backup
increases power in
the
the event
process
of a power
speed
cut
Light
Refillable Pencil
sensitive
ink
lead
elements
100K
1.44 Mb 5 Mb
Scanner C
Digital
Signature
s
B
CD ROM
Hard disk Keyboard Drive
A
Optical
Bar code mark
reader
reader
Keyboard B
Mouse
Writing on
a hard
Printed
board
output
Coloured
spots
Pixels
Storage
Printer
device
Speakers
Storing
informatio
n on the
hard disk
Printer
Pickers
Mouse
Bar code
reader
Pixies
Pointing
device
Optical
mark
reader
CRT
displays
LCD
displays
SSGA
displays
screen
layout
mouse
button
layout
Mouse
Bar code
reader
keyboard
layout
Optical
mark
reader
language software
hardware interpreter interface
Credit
Smart
card
Speakers card
A
Back-up
on a
Cartridge B
B
CD-ROM A
None of
the above
none of
the
previous B
word
processin
g software C
None of
the above B
an
operating
system
C
None of
the above A
having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous
A
having
several
programs
in RAM at
the same
time
The ability
to run 2 or
more
programs
concurren
tly
writing
programs none of
in multiple the
languages previous
B
To run
more than
one
an
program
multitaski operating at the
none of
ng
system
same time the above C
First generation
computers
.
Fifth generation
computers
.
A
none of
multitaski multiprogr
the
ng
amming Multi-user previous A
Vishwajee
t
Deep Blue Param
Arjun
C
is due to none of
is caused caused by bad disk the
by wear
overuse
blocks
previous C
Magnetic
Ink
Optical
Character
Bar code Mark
Recognitio Image
Reader
Reader
n
Scanning
Technolog Technolog Technolog Technolog
y
y
y
y
B
a fast
interpreter
Drum
Printer
encrypting
it
Very
important
reader
user
sequence
Second generation
computers
.
Third generation
computers
.
converts a
program
slower
to
none of
than an
machine the
interpreter code
previous
Dot Matrix
Desk - jet Thermal
Printer
Printer
Printer
decrypting compressi transmittin
it
ng it
g it
Vital
informatio Virtual
n
informatio
resource n reader &
under
user
None of
siege
system
above
C
A
C
B
Electricall
y charged
ink
mainfram
e
technolog
y
10-6 sec
data to be
transferre
d to
memory
Contingen
cy
Planning
Limit
checks
array.
Wide
access to
various
data base
ACL
A sample
of
transactio
ns
Tests of
details of
transactio
ns
Macros
clipboard
search
Thermal
Paper
An ink
pen
LAN
technolog
y
10-3 sec
WAN
technolog
y
10-12 sec
An inked
ribbon and
print head D
Unix
operating
system
B
10-9 sec D
an
instruction
data that
that has
has been the
been
transferre address of transferre
d from
a memory d from
memory location
memory C
System
feasibility Capacity Exception
report
Planning reporting C
Cross
Control
External footing
figures
file labels tests
C
constant. function. formula. C
Can
extract
Can
and
Can aid in define the
analyse
simple
audit
data
selection objectives D
High End All of the
IDEA
CAATs
above
D
A utility
A special
software purpose
programm written
None of
e
program the above A
Complian
Analytical ce tests of
review
general
procedure EDP
All of the
s
controls
above
D
Action
Event
General
Procedure Procedure Procedure
s
s
s
D
file
field
layout
B
field
record
sort
names
grab
D
A way to
analyse
and
manipulat
e
numerical
informatio
n
An
organised
way of
A tool to storing
produce informatio
high
n about a
quality
set of
A way of
document similar
maintainin
s
things
g a log
C
It contains
all the
Informatio data about
n about
one
certain
specific
programs item
remote
relative
DBMS
DBMS
storing
data
offline at a
separate
site
Key
verificatio
n
A
document
which
contains
text
Relational
DBMS
A
collection
of files
B
Reliable
DBMS
C
uses tape
as
opposed
to disk
C
Database
Computer access
matching controls
D
An
A way to
organised
analyse
way of
and
storing
manipulat A tool to informatio
e
produce n about a
numerical high
set of
informatio qualitydoc similar
None of
n
uments
things
the above C
backing
up data
regularly
Computer
sequence
checks
It contains
all the
Informatio data about
n about
one
certain
specific
programs item
is related
to data
mining
A
document
which
contains None of
text
the above B
Reports
allow
users to
extract
informatio
n as hard
copy
(printed
output)
Reports
provide a
very
flexible
way of
creating
and
editing
document
s
A tool
which
allows text
and
graphics
to be
placed in
document None of
s
the above A
Extracting
and
analysing
data
Spreadsh
eets make
data easy Using
to analyse queries
Word
processor
s,
Compilers Network spreadshe
,
software, ets,
interpreter backup
databases
s, editors systems , DTP
DEFAULT
and NOT
NULL
constraint
s
CHANGE
TABLE
remote
DBMS
FOREIGN
KEY
constraint
s
MODIFY
TABLE
relative
DBMS
storing
data
offline at a backing
separate up data
site
regularly
PRIMARY
KEY and
UNIQUE
constraint
s
ALTER
TABLE
Relational
DBMS
None of
the above C
None of
the above C
IDENTITY
columns C
UPDATE
TABLE
C
Reliable
DBMS
C
uses tape
is related as
to data
opposed
mining
to disk
C
Descriptio Compone
n
nt
Source
D
keeping
the
saving the
keeping a original
file with
using a
backup
paper
different
password copy
copy
filenames A
the
the
product
primary
mail
code
key
merge
e-mail
C
A
database Graphics browser
e-mail
A
Number
bookmark
s
operators wildcards engines
Auto
AutoNum
Primary
Auto ID
ber
Auto Key
forms in a
database
are
consistent
with the
underlying
tables or
queries.
C
C
records in
a dynaset
are
consistent
with the
underlying
tables.
related
tables in a
database
are
consistent
with one
another.
foreign
key.
the
primary
key of
both
related
tables.
query and
main form its
report and
and a
associate its related
subform. d dynaset. query.
A
not a
the
primary
primary
a field
key of
key of the from an
either
related
unrelated related
table.
table.
table.
B
One-toone
One-tomany
Many-tomany
reports
are
consistent
with the
underlying
tables or
queries.
B
Many-toone
B
EmployeeI CompanyI Employee Company
D
D
LastName Address A
The Tools
menu,
Relationsh Referentia The join
ip window l integrity line
Right-click
the
Relationsh
ip line,
Select
then
Undo in
select
the
Double
Delete
Relationsh
click the from the ips pullRelationsh shortcut
down
ip line
menu
menu
The oneto-many
relationshi
p
B
Click the
Delete
Relationsh
ips button
on the
toolbar
B
That there
are
several
customers
associate
d with that
ID
That
records
That
That there can be
some of are
added by
the data is records in clicking on
not
a related the plus
viewable table
sign
C
They
cannot be They must
They must They
AutoNum be the
both be
cannot be ber data same data
numbers text fields types
type
D
The
customer‟
s ID is
deleted
from the
Customer
s table,
The
and all the
Nothing, customer‟ related
Access
s ID is
loans are
ignores
deleted
deleted
the
from the from the
attempted Customer Loans
command. s table.
table.
An error
message
is
displayed. D
The
subform is
an object
on the
The
form and
subform is The
can be
displayed subform is moved or
The
in
displayed sized like
subform is Datasheet in Form
any other
not visible. view.
view.
object.
D
A one-tomany
relationshi
p between
teams and
players
A one-tomany
relationshi
p between
teams and
coaches
A one-tomany
relationshi
p between
coaches
and teams
A many-tomany
relationshi
p between
players
and teams C
#
M
¥
*
C
Either
table at
any time
prompt,
title bar
text, icon.
Dim
CreateList
.
A check
box
enables
the form
user to
choose
from one
of several
existing
entries.
The
Customer
s table
only when
there are
Loan
records
associate
d with that
customer
The
Loans
table at
any time
title bar
text,
prompt,
icon.
Neither
table
C
prompt,
title bar
icon, title
text, icon,
bar text.
prompt.
B
Sub
CreateList CreateList
.
.
Sub.
B
A text field
enables
the form
user to
choose
from one
of several
existing
entries.
must be
must be set for
set for
multiple
one word. words.
help
people
keep track store data
of things. in tables.
relationshi
data.
ps.
facts.
figures.
singleuser
database
applicatio
n
multiuser
database
applicatio
n
A dropdown list
enables
the user
to choose
from one
of several
existing
entries.
A dropdown list
enables
the user
to enter
text.
C
does not must be
have to be set for two
set.
words.
C
maintain
data on
create
different
tables of things in
rows and different
columns. tables.
A
all of the
metadata. above
D
informatio
n.
a and b
D
ecommerc
e
database
applicatio
n
a or b
A
singleuser
database
applicatio
n
ecommerc
multiuser e
database database
applicatio applicatio None of
n
n
above
Sequential
Query
Language
(SQL)
Structured
Question
Language
(SQL)
Database
Database Managem
Modeling ent
System
System
SQL
Jet
Server
The user
the
database
applicatio
n(s)
interact(s)
with the
DBMS
creates
queries
the user
Structured
Query
Language
(SQL)
Data
Business
Model
System
Relational
Question
Language
(RQL)
C
Relational
Model
Manager B
Oracle
a and b
The
database
The
managem
database ent
applicatio system
All of the
n
(DBMS)
above.
the DBMS
accesses
the
database
data
creates
form
None of
above
creates
reports
the
database
the
managem
database ent
applicatio system
n
(DBMS)
all the
users'
data is in
one place
holds user
data
it reduces
data
duplicatio
n
holds
metadata
tables
metadata
it contains
a
descriptio
n of its
own
structure
holds
indexes
stored
procedure
s
B
D
D
All of
above
A
b and c
D
the
database B
All of the
above.
All of the
above.
All of the
above.
C
D
D
from
existing
data
from
existing
nondatabase
data
as a new
systems
developm
ent project
as a new
systems
developm
ent project
from
existing
data
as a new
systems
developm
ent project
data
marts
normalizat
ion
data
marts
normalizat
ion
data
marts
normalizat
ion
data
marts
normalizat
ion
file
hierarchic
managers al models
entities in
a column
vary as to
kind
table
record
the order
of the
columns
is
important
relation
field
record
field
record
composite
key
Insertion
anomaly
field
primary
key
Update
anomaly
as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
p data
data
modeling migration
relational
network
data
models
model
more than
the order one
of the
column
rows is
can use
unimporta the same
nt
name
row
field
key
tuple
composite foreign
key
key
foreign
candidate
key
key
foreign
surrogate
key
key
Deletion All of
anomaly above
A
B
C
A
B
D
D
A
C
D
C
C
D
B
D
assess
the
existing
tables'
structure
and
content
are
supplied
by several
wellestablishe
d
manufactu
rers
They use
sophistica
ted
mathemati
cal
technique
s.
create
move the
design the one or
data into
database more new the new
structure tables
database A
were
essentially
killed off
by MS
Access
Their
report
delivery is
more
difficult
than
report
delivery
for
reporting
systems.
are not
have poor true
response DBMS
time
products
B
Nonintegr None of
ated data the above A
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem B
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem D
data
warehous
data
e
warehous databases
e data are do not
not stored have
in tables. metadata.
Form
Table
Forms
and
Queries
reports
and tables
data
warehous
e data are
often
denormali
zed.
b and c
Report
Query
Macros
C
A
Spreadsh
eets
D
The Link
Tables
command
can be
used to
associate
the tables
in one
database
with the
objects in
another
database.
It will be
easier for
the user
to
upgrade it
if the
objects
are in one
database
and the
tables in
another.
An
applicatio
n may
consist of
multiple
databases
, each
with
multiple
objects,
linked to
yet
another
database
containing
only
tables.
Import
Link
It will be
easier for
the user
to
upgrade it
if the
objects
and tables
are in one
database.
It contains
tables,
It contains reports,
more than queries,
one table and forms
Menu
Wizard
Build
Menu
All objects
in an
applicatio
n,
including
the tables,
must
reside
within the
same
database.
Regardles
s of how
the
objects
and tables
are
stored,
the user
will have
to reenter
the data in
the tables
when the
applicatio
n is
upgraded. B
An
applicatio
n can be
created in
such a
way that it
objects
such as
forms and
reports
can be
changed
without
disturbing
the
existing
data.
C
Merge
Join
It contains
a user
interface,
or
switchboa
rd
Interface
Design
Wizard
It contains
macros
C
Switchboa
rd
Manager D
It is
advisable
to put
each
object and
table into
a
separate
database.
A
create
backups
for
mission
critical
corporate
data.
Decryptio
n
Using
data
encryption
.
Unaltered
in
transmissi
on.
put key
business
centralize informatio
the
n into the
managea hands or
bility of
more
data
decision
collection. makers.
Cipher
Encryption
Conductin
g fraudawarenes
s training.
Received
by the
intended
recipient.
The
private
Both
The
key is
sender
private
used by
and
key
the
receiver
cannot be sender for
must have broken
encryption
the private into
but not by
key before fragments the
this
and
receiver
encryption distributed for
method
to the
decryption
will work. receiver. .
Collision.
Error
checking
Performin
g validity
checks.
Not
intercepte
d en
route.
Failure of
server
Data entry duplicatin
errors.
g function.
Low cost
Data
of
Integration operation
Competiti
ve
Corporate Industrial
espionage espionage espionage
Contact
numbers
A list of
of the
competitor managem Research
‟s clients ent group data
store all
corporate
transactio
n data in
one single
location.
Cryptogra
phy
Reviewing
the
systemsaccess
log.
Sent to
the
correct
address.
The
private
key is
used by
the
receiver
for
decryption
but not by
the
sender for
encryption
.
C
C
D
A
A
Firewall
vulnerabili
ty.
D
Quality
managem
ent
B
Economic
espionage C
A
competitor
‟s new
project
B
singleuser
database
applicatio
n
multi-user
database
applicatio
n
Keeping
Replying messages
promptly short
ecommerc
e
database
applicatio
n
Including
the
Subject
None of
above
Using all
capital
letters
Security at
the
transactio
n phase in
EDI
systems is
not
necessary
because
problems
at that
level will
be
identified
by the
service
provider. C
C
D
Removabl
e drives
that can
be locked
up at night
provide
adequate
security
when the
confidenti
ality of
data is the
primary
risk.
A dark
wide
border
Message
authentica
tion in EDI
systems
performs
the same
function
as
segregatio
n of duties
in other
informatio
n
systems.
Encryption
performed
by a
physically
secure
hardware
device is
more
secure
than
encryption
performed
by
software.
A dotted
border
A blinking
No border border
A
8,16,32
2,4,2
the row is
too short
to show
the
number at
the
current
font size
2,2,2
the
column is
too narrow
to show all
the digits
of the
number
flexibility
speed of of moving
calculation entries
either b or
c
C
cost of
initial setup
D
graphical
Address
Writing
letters
database
Gap
Drawing
pictures
spreadshe
et
D
Rows
A
Document
filing
A
your
formula
has a
syntax
error
ability to
generate
tables
word
processin
g
Range
Producing
graphs
6,8,10
D
drag from
the top
cell in the
doublecolumn to
click any the last
cell in the cell in the
column
column
CTRL +
ENTER
ENTER
array.
function.
(201)555100
1212.
Cell
reference
s
Functions
^
/
B5*B6
C3/D4
E12
6
It is
surrounde
d by a
heavy
It is
border.
blinking.
click the
column
heading
click the
column
label
C
TAB
constant.
INSERT
formula.
A
B
Tom
#VALUE! McKenzie. C
Numeric Text
constants constants
*
\
It is
impossibl
e to
determine
D4^2
.
SUM(H9: G7*SUM(
H11)
H9:H11)
C
B
The
phrase
“active
It is
cell”
displayed appears in
in reverse the Status
video.
bar.
A
By either
clicking in
a different
cell or
By using using the
the arrow arrow
By clicking keys to
keys to
in a
move to a move to a
different different different
cell
cell
cell
The
Standard
toolbar
D
D
By typing
the
reference
of the cell
you want
to move to
in the
formula
bar
C
The Font
The Cell Size
Format
command
The
command on the
Formattin on the
Tools
g toolbar Edit menu menu.
B
the New
command
on the File
menu.
File
the Save
command
on the File
menu.
Edit
Preview
Details
Insert
Delete
Clear
Orientatio
n (portrait
or
landscape
)
Delete
Headers
and
footers
Page
Setup
the Save
As
command
on the File
menu.
View
the File
Type
command
on the File
menu.
C
Window A
List
Properties B
Both
Insert and
Delete
Clear
C
Both Clear
and
Delete
Remove B
Fonts
Margins
C
View
Edit
B
range.
D12, G25
destinatio
n range.
destinatio
n range.
group.
D12:G25
B
C
The
Duplicate
command
absolute
B4
The Copy
command
relative
$B4
The Paste
command
mixed
B$4
cell group.
D
source
range.
source
range.
Both the
Copy and
Paste
command
s
constant
$B$4
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
B
#DIV/0!
#DIV/0!
#DIV/0!
Options
worksheet
.
6
copy
range.
paste
range.
clipboard.
clipboard.
D
B
D
A
D
#DIV/0!
C
Both the
Cut and
Paste
The Move The Cut
The Paste command
command command command s
D
the Fill
Handle
cycle
through
absolute,
relative,
and mixed
cell
reference
edit cells. s.
the
the
Format
Formattin
Painter
g toolbar
cycle
through
open
applicatio
ns.
C
Condition
al
formatting B
Select the
Insert
Hyperlink
command
from the
File menu.
Click the
Insert
Hyperlink
button on
the
Standard
toolbar.
Doubleclick a cell
and click
the Insert
Hyperlink
command. B
copy and
paste
cells.
whether
the cell
has a
formula or
a value in the cell
it.
address.
Right-click
a cell and
click the
Edit
Hyperlink
command.
whether
the cell
has an
absolute
or a
relative
cell
reference.
the value
in the cell D
text with
either a
two-digit
or fourdigit year,
text with a text with a
depending
two-digit four-digit
on the
year.
year.
an integer. format.
C
It is
impossibl
e to
determine
from the
29/03/200 informatio
Jul-30
Aug-31
8
n given.
B
subtractin
g the
subtractin adding the
earlier
adding the g the later later date
date from earlier
date from to the
the later date to the the earlier earlier
one.
later one. one.
one.
A
the F4
the F2
the Esc
the F1
key.
key.
key.
key.
B
a cell on a
worksheet
a
.
a variable. constant.
Either 3/4
or .75,
depending
on the cell
formatting C
either a
cell on a
worksheet
or a
variable. D
B1-G10
B1.G10
B1;G10
B1:G10
D
AVERAG
E
COUNT
MAX
SUM
C
Line
Pie
Scatter
C
Once a
column
chart is
chosen it
cannot be
changed
to a bar
chart.
Once a
pie chart
has been
chosen it
cannot be
changed
to line
chart.
Once a
line chart
has been
chosen it
can be
changed
to a pie
chart.
D
hold down hold down
the CTRL the SHIFT
key
key
Create
four
Use
separate
tables
files
hold down
the ALT
key
Transfer
informatio
n to a
database
hold down
CTRL +
SHIFT
A
03-Apr
Combinati
on
Once a
bar chart
is chosen
it cannot
be
changed
to a
column
chart.
0.75
Paste
Fill Down
Tools |
Sort
Analyse
data
Data |
Sort
Calculate
data
click the
Print
button
press the
PRINT
SCREEN
key
March 4
of the
current
year
Use
multiple
sheets
Paste
Fill Right Special
none of
Edit | Data the
| Sort
choices
Create
None of
forms
the above
select
Print
select
selection Print
on Page selection
Setup |
in the
Sheet
Print
and then dialog and
print
then print
D
B
B
C
D
producing
graphs
(D4+C2)*
B2
0
writing
letters
D4+C2*B
2
=A3SUM:
B3SUM:C
3SUM
drawing
pictures
None of
the above A
=(B2*(D4+
#VALUE! C2)
C
portrait
REF!
whatever
was last
landscape used
AD213
ZA1
None of
the above B
sending
storing
storing
informatio data on
data on a n to a host the hard
disk drive computer drive
vertical
A
None of
the above C
receiving
informatio
n from a
host
computer B
Bandwidth Speed
Channel
A
Retrieve
Message
Digest
C
Formula
A
A0
Size
Find
Save
Browse
Photograp Digital
Cryptogra
hy
Signature phy
Hash
Key
Lock
Function
User-id
Password Name
Address
Penetratio
Cryptogra Password
n
Retrieval phy
Cracker
Regulatio
Acts
ns
Address Protocols
Unauthori
Spoofing Imposting sing
Approving
Loss
Threat
Exposure Hacking
Sales Income tax
tax
authorities authorities
Pirated
Utility
software
Tim
Berner
Lee
Hoffman
Etrade.co Amazon
m
.com
Automate
d Tailor
Any Time
Machine Money
Regulatio
Acts
ns
C
B
A
D
A
B
Police
Judge of a officer of
civil court IPS rank. B
Virus
Cracker
C
Charles
Bubbage
Howard
Aiken
A
Dell .com Msn .com B
Asynchron
ous
Transmiss None of
ion mode above
Address
C
Protocols C
Router
Gateway
Port
Pin
B
LAN
hyper
terminal
tracing
program
National
Informatic
s Center
Only
Computer
s
WAN
CAN
PAN
A
hypertext
tracing
program
Network
Interface
card
hypertext
transfer
protocol
New
Informatio
n Card
hypertext
tracing
protocol
C
Can not
Only
computers printers
Combines
connectivit
y of a hub
with the
Concentra traffic
tes
regulation
connectivit of a
y
bridge
Bridges
and
Two or
Repeaters more
.
networks
None of
the above B
None of
the above D
Switches
data from
incoming
ports to
outgoing All of
ports.
Above
B
RG7U
Bridges
Hubs and
and Hubs nodes
None of
frames
Packets the above
virus
gateway router
checker
None of
Two
Four
the above
Data-Link Network All of the
Layer
Layer
above
Coaxial
Twisted
cable
Fiber
pair
Physical
address
Logical
address
A cable
Hub
Data
return to
the
sender
It continue
on to
target
device
It gets
with
destroyed corrupt
None of
bit by bit. data
the above B
bits
firewall
One
Physical
Layer
B
C
A
C
D
B
A memory None of
address
the above B
None of
Router
the above B
Wireless
technolog
y
Physical
Layer
Wired
Technolog
y
Data Link
Layer
Ultra violet
technolog
y
Network
Layer
Binary
48 Bits
ASCII
48 Bytes
Octal
48 KB
software
that
facilitates
connectio
n to the
internet
a list of
rules for
transferrin
g data
over a
network
a gateway
calling
software program
that allows for
file
internet
copying
bridging
B
None of
the above
All of the
above
None of
the above
48 MB
Network
Novell PC Client
Server
PC
If the hub If the hub
goes
goes
down, it
down, it
If one
brings
brings
node goes down all down all
down, it
of the
of the
brings
nodes on nodes on
There isn't down the that
all of the
one
entire ring section
rings
Physiolog
Both A
None of
y
Topology and B
the above
All of
Bus
Star
Ring
above
Both A
Linear
Parallel
and B
None
Both A
Parallel
Circular
Linear
and B
A
D
A
A
C
B
B
D
A
B
Ring
Bus
Star
Mesh
C
Ring
Star
Bus
Bus
Star
Linear
Mesh
Ring
B
C
Ring
Network
Layer
Bus
Star
Transport Physical
Layer
Layer
Mesh
A
Data Link
Layer
D
Ethernet,
token ring,
DecNET
bps
bps
Ethernet,
token ring,
FDDI
kbps
Kbps
Ethernet,
token ring,
ARCnet
B
mips
B
Mips
C
Ethernet,
DecNET,
FDDI
mbps
Mbps
depend on
the
transmissi
on
medium
Windows
a modem 95
usually
higher
than LAN
speeds
CD-ROM
drive
measured
in bytes
per
second
must use
the World
Wide Web
key
gateway
interface
must use
electronic
mail
uniform
resource
locator
must have
a LAN
account
common
gateway
interface
used to
browse
the Web
is a
protocol
for the
transfer of
files
is part of between
Netscape computers D
limited by
modem
speeds
C
Netscape B
All of the
above
A
applicatio
n protocol
interface C
connects
interfaces a
a Novell used to
a modem computer
Interface control a to a
to a
Controller printer
computer network
D
CD-ROM
Windows
drive
a modem package Netscape B
Novell
Windows None of
Linux
Netware NT
the above C
have to
do with
compressi have to
on of
do with
none of
graphics Web
the
the
and video pages
Internet
previous A
use
appropriat
e
must use must use must have communic
the World electronic a LAN
ations
Wide Web mail
account
software A
none of
the
Printer
modem
bridge
previous D
provides
access to
is a CPU
the
is a CPU functional make of
Internet
register
unit
processor A
used to
send
email
used to
send
email
uses
wireless
communic
ation
is part of None of
medium
Netscape the above D
used to
protect a
computer
room from
fires and
floods
a backup
server
a screen none of
a form of saver
the
virus
program previous
an email a poor file
server
server
none
IR system
for the
hardware Internet
browser
none of
the
previous
search
CD-ROM clip-art file engine
D
D
C
scanner
provides
access to
the
is a CPU
Internet
register
is a CPU
functional make of
unit
processor A
used to
send
email
is a
protocol
for the
transfer of
files
is part of between
Netscape computers D
used to
browse
the Web
D
is a
protocol
used to
uses
that allows
send
telephone is part of for remote
email
lines
Netscape login
D
Any layer
Any layer can
can
communic Any layer
The layers communic ate only
can
cannot
ate
with the
communic
communic directly
layer
ate only
ate with
with any directly
with the
one
other
above or layer
another. layer.
below it. above it. C
It is made
up of
many
networks
connected
into
transmissi
on lines
It is one
called
large
backbone
network. s.
Password System
cracking intrusion
used to
protect a
computer
room from
fires and a form of
floods
virus
Flood a
Web
server
with
IP flood
requests
hack
packet
firewall
router
a backup an email
server
server
Apply
security
patches
It works
the same
way as a
local
network.
Denial of
Service
Individual
computers
can
connect to
it using an
ISP.
A
Port
sniffing
C
a screen
saver
program
none of
the
previous
Virus that
initiates a
ping flood UDP flood A
flood
traffic
C
switch
hub
B
a poor file none of
server
the above D
Update
Backup
Limit
virus
data on a logging on
definitions daily basis access
C
Only large
namerecogniza
ble sites
are safe.
Use of
Use of
logical
Use of
password access
identifiers s
methods
All sites
are safe
and
reliable.
by
attaching
to an email.
D
There are
safe and
unsafe
sites.
through
an FTP
port.
ActiveXenabled
sites are
safe.
B
Use of
encryption
methods D
by
scanning
the
by
computer
attaching for a
itself to a connectio
document. n.
B
Phone
A Trojan
horse
E-mail
Web
traffic
Applicatio
n updates D
Adware
A worm
Spyware
Modems
cookies
and
Trojan
horses.
Protocols
Trojan
horses
and key
loggers.
Multiplexo
rs
LAN
key
cookies
loggers
and key
and
loggers.
worms.
An attack
on a
system for
personal
gain
An attack
with the
purpose
of gaining
publicity
Disruption
in
Economic communic
damage ation
Crashing
the stock Shutdown
market, as of military
in the
security
1930s
systems
D
B
C
Changing
the
Giving out content of
disinforma a Web
tion
page
D
Disruption All of the
in supply above are
lines
correct.
D
Shutdown
Contamin of nuclear
ating
plant
water
safety
systems systems D
To obtain
an
accurate
inventory
of network
related
To
equipment
To carry To
improve
and parts
more
improve
system
and
network
network
response network
capacity services time
nodes
D
limit
stop its
update its
access to competitor prices as
set its
computer s seeing soon as
prices
owners
their
they are
very high only
prices
changed D
Yahoo
USA
People
People
People
Lycos
Search
Search
Search
Search
B
Name of Date of
Personal Criminal
your bank birth
assets
records
A
Virus
Fraud
Adware
Spyware B
buy
stocks.
Shill
bidding
Internet
stalking.
pop-ups.
Use a
fake email
address.
invest
without
risk.
make
large
amounts
of money
by parking
purchase funds in
off-shore their bank
property. account. D
Phishing
cyber
stalking.
cookies.
Siphoning
virtual
stalking.
spam.
Never use Use a
your real proxy
identity.
server.
Message
Physical sequence
Security number
Encryption controls
checking
I only
irc
II only
ftp
Internet
Explorer
Use antispyware
software.
Logical
access
controls
Neither I
Both I & II or II
www
telnet
Adds
more
Verifies
Increases
bytes to
integrity of boot up
programs files
time
HTML
Hoaxing
Web
stalking.
viruses.
Microsoft
Excel
round trip
HTML
HTML
document. document.
.con is
.com is
.co in
used for
used for used for companie
company company s
Web
query.
the World
Wide Web
round trip Consortiu
HTML.
m
HTML.
XML.
HTML.
DHTML.
B
B
B
B
B
C
C
Misleads
a program
recompilat
ion
B
both
HTML and
Internet
Explorer B
Web
browser.
B
None of
the above A
one way
HTML.
MHTML
C
D
using
Internet
Explorer
to view a
Web page
that is
stored on
the hard
drive on
your
computer
Click on
the Back
arrow until
the
desired
site is
found
clicking a
hyperlink
that
reference
sa
updating document
the values that is
that are
stored in
obtained the floppy
through a drive on
Web
your
query
computer
Click on
„Go to‟ or
„Search‟ in
the
browser
viewing an
Excel
worksheet
that you
have
saved as
a Web
page.
B
Go to the
History
page and
look for
the site
Go to the
Bookmark
s or
Favorites
page
C
the
the
the Insert the
External
Refresh
Hyperlink Update
Data
command command command command A
Screensa
Hyperlink ver
Sound
BMP
GIF
JPEG
Add it to
Write it
„Favourite
Save it to down on a s‟ or
a floppy
piece of
„Bookmar
disk.
paper.
ks‟.
privileged
extranet. intranet. network.
an
attachmen a
t.
signature. a footer.
VoIP
IPT
IPP
Desktop Desktop Desktop
client,
client,
server,
applicatio software, applicatio
n, and
and
n, and
database. hardware. database.
Telephon
Modem
CD-ROM e line
File
File
Transmiss File
Transfer ion
Transfer
Program Protocol Protocol
Video
TIFF
Cut and
paste it to
a word
processor
document.
network
topology
an
encryption
.
PoIP
Desktop
server,
software,
and
hardware.
None of
the above
C
C
C
A
B
A
A
B
None of
the above B
So
computers
can be
reference
d by a
name
193.1.2.3
paul .trigg
@
domain.
org. uk
So IP
addresses
can be
shorter
45.1.1.1
So email
is
delivered
faster
143.215.1
2.19
None of
the above A
None of
the above D
paul.trigg
@domain. paul.doma None of
org.uk
in.uk
the above B
Scientists
The US
in
governme Switzerlan
None of
nt
d
No-one
the above C
It will be
deleted
Hyper
Textual
Mark-up
Lingo
Internet
Remote
Conversat None of
ions
the above A
A letter
It will be will be
waiting for sent to
you to
you in the None of
collect it post
the above A
Hyperlink Hyper
Text
Text MarkMarking
up
None of
Language Language the above C
Receiving
messages
automatic
ally from
anyone in
the group
People
discussing
a topic of High
interest
volumes
globally
of email
Internet
Relay
Chat
Internation
al Relay of
Character
s
None of
the above C
Database
Applicatio
managem
n
Utility
Operating ent
Software Programs system
system
C
Deleted
Copied
from the from the Saved to None of
disk
disk
the disk
above
A
Address None of
Data bus Auto bus bus
above
A
Address Control
None of
Data bus bus
bus
above
C
Personal Parallel
Super
None of
computers computers computers above
BPS
MIPS
MHz
VLSI
A
B
OCR
MICR
caused
is caused by
by wear
overuse
barcode
scanning
is due to
bad disk
blocks
voice
recognitio
n
B
none of
the
previous B
converts
a program
slower
to
none of
a fast
than an
assembly the
interpreter interpreter code
previous
faster
than a
compiler
translates
and
executes
programs
statement
by
statement
converts
a program
to
none of
machine the
code
previous
B
B
encrypting decrypting compressi transmittin
it
it
ng it
g it
C
an
a
assembler compiler
an
interpreter a linker
the power None of
the ALU the CU
cord
the above
A runtime
You need
error can
to carry
result if
The
out
the user
program conditiona
clicks the A compile executes l
cancel
time error without
compilatio
button
occurs
any error n
File List
Dir List
Drive List Combo
Box
Box
Box
Box
memory systems RAM
buffer
overflow overload overflow overflow
Netcop
www.netto
ols.com
code
correct.
firewalls
A
C
A
A
D
NetBrute Netcraft
NetBIOS D
www.Who www.netcr www.netst
Is.com
aft.com
at.com
C
patches.
switches
updates.
hubs
upgrades. B
scanners A
It can
consist of
hardware, It hides
software, your
or both.
network.
It is a
barrier
between
One of its your
technique network
s is
and the
packet
rest of the
filtering.
Internet. B
That any
open
applicatio
ns be
exited
That you
are not on
the
Internet
That you
also shut
down
associate
d services B
Firewall
Router
Dependen
cies on
other
services
Intrusiondetection
software
Antivirus
software
an
intrusiondetection antivirus
system.
software.
C
a network a proxy
prevention filtering
system.
system.
A
D
cycle.
renewal.
age.
history.
Make sure
all update
and
security
patches
are
applied.
Install and
keep
current
antivirus
and antispyware
programs.
Limit
user‟s
ability to
configure
the
workstatio
n.
Block all
incoming
traffic on a
network. D
Delete it
and
change
Delete it the built-in
from the guest
system
account to
and use
a power
the guest user
account. account.
Tapes can
be used
over and Tapes
over, and and CDs
CDs
can be
should be thrown
kept
away in
forever.
the trash.
Trojan
horse
Virus
Disable it
and
create a
nondescri
pt user
account
with
administra
tor rights.
Create
another
administra
tor
account to
confuse
the
hacker.
C
Tapes
should be
melted
and CDs
broken.
IP
spoofing
Give them
to a
recycle
shop.
C
Spyware
C
place a
router
between
your ISP
and your
system.
download
files from
reliable
hone your
Web
programm
sites.
ing skills.
Problems
System
with your
acts
Files are Printing
wireless
abnormal missing
problems mouse
Never
open an email
Turn off
attachmen
the auto- t unless
Do not
launch in you know
Update
propagate your ewhat it is
antivirus hoax
mail
and who
software. viruses.
client.
sent it.
Trojan
buffer
virus
horse
spyware overflow
A Trojan
A buffer
A virus
horse
Spyware overflow
Obtain
username
Obtain
Check for s and
system IP Obtain
open
password
addresses cookies
ports
s
add
spyware
to your
system.
E-mail
and
attachmen Download File
t scanning scanning scanning
Do not
open
Avoid
Use your attachmen “skins”
browser‟s ts in
and
security
unknown “toolbars”
settings
e-mails
download
Administr
ative
assistant
Junior
to the
accountan
president Cook
t
The
Standard
toolbar
multitaski
ng.
Backup
file
scanning
C
D
D
D
C
D
D
Use
encryption
software D
Network
administra
tor
D
The Open The Save
The
command command
Formattin on the
on the File
g toolbar Edit menu menu
A
cascading minimizin
tiling.
.
g.
A
whether
the
worksheet
the default prints in
file
landscape
location of or portrait
new files orientation
multitaski
shrinking ng
the
number of
windows
you have
open
minimizin
g
Click on
any
Click on
border
any corner
and drag. and drag.
Click on
the title
bar and
drag.
right
mouse
button
anywhere
on the
Word
window,
choose
the
Customiz
e
command
from the
contextsensitive
menu,
and check
the box
for the
missing
toolbar
from the
Toolbars
tab dialog
box.
the
margins
on the
printed
DOCUME
NT
A
cascading C
You
cannot
move a
floating
toolbar.
C
left mouse
button
anywhere
on the
Word
window,
choose
the
Customiz
e
command
from the
contextsensitive
menu,
right
and check
mouse
left mouse the box
button on button on for the
any visible any visible missing
toolbar,
toolbar,
toolbar
and click and click from the
on the
on the
Toolbars
missing
missing
tab dialog
toolbar.
toolbar.
box.
B
All
document
s are
automatic
ally saved
with a
default
password.
public
domain
software.
The
password
is casesensitive.
nonprotec
tive open
source
software.
nonprotec
tive open
source
software.
public
domain
software.
ondemand oncomputing demand
.
software.
Once a
document
is
protected
by a
password,
it cannot
be opened
without
that
password.
protective
open
source
software.
protective
open
source
software.
utility
computing
.
Web
best-cost software service
provider provider provider
Operation Informatio Structured
al
nal
query
systems systems systems
power
hardware
outages. failures.
floods.
hot
Delete
empty
Nothing
the Line
color
the Font
and the
text
alignment
proprietar
y software C
proprietar
y
software. D
utility
software.
applicatio
n service
provider
Office
automatio
n
All of the
above.
B
D
A
D
dormant B
New
C
text,
text,
CD-ROM, hypertext,
text,
hypertext digital
Power
graphics and
camera
Point,
and email Power
and
video and
address. Point.
sound.
sound.
D
the Line
style
cold
Kill
Password
s can be
up to only
seven
characters
long.
A
Line style,
Line color,
text font,
and text
alignment D
Fill color,
Line color,
Line
and Line
Fill color Line color thickness thickness D
A popup
box
prompts Microsoft
Excel is
you for an Graph is
started so existing
started so The graph
that you
Excel
that you
placehold
can create chart to
can create er is
a chart.
insert.
a graph. deleted.
C
taken
from the
first
column or
row of
data in the
datasheet,
always
depending
always
taken
on
taken
from the whether
from the first
the data
first row of column of series are
data in the data in the in rows or entered by
datasheet. datasheet. columns. the user. C
Side-byside
Stacked
column
column
Pie chart Line chart B
Click the
Insert
Pull down Chart
the Insert button on
menu and the
select
Standard
Chart.
toolbar.
Pull down
the Insert
menu and
select the
appropriat
e Object.
Pull down
the Insert
menu and
select
Chart,
click the
Insert
Chart
button on
the
Standard
toolbar, or
pull down
the Insert
menu and
select the
appropriat
e Object. D
Click the
chart
object,
then click
It
the View
automatic Datasheet
ally
button on
displays in the
Slide
Standard
view.
toolbar.
Single
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
linked to
the
PowerPoi
nt
presentati
on.
Double
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
embedde
d in the
PowerPoi
nt
presentati
on.
You
cannot
display
Pull down the
the Edit
underlying
menu,
datasheet
then
once the
select
slide is
Object.
finished. B
Change to
Click
Slide
outside
Sorter
the chart. view.
C
The
datasheet
window is
The
toggled
datasheet from
is saved closed to
as a
open (or
separate from open
file.
to closed). D
The
applicatio
n that
The chart
The chart created
is
The chart is doubled the chart
selected. is deleted. in size.
is started. A
The chart
The chart Microsoft
is
The chart is doubled Graph will
selected. is deleted. in size.
restart.
D
a slide
one bullet
item at a
time, build
bullet
items a
letter at a
time, and
build
a slide
bullet
bullet
bullet
one bullet items one items one items a
item at a letter at a word at a word at a
time.
time.
time.
time.
D
Subtle,
Moderate,
Subtle
Moderate Exciting
or Exciting D
Neither
enter nor
Both enter exit;
and exit, neither fly
Fly in from and fly in in from
Enter and top or
from top top nor
exit
bottom
or bottom bottom
C
Enter
Shift
Alt
Ctrl
B
the way
objects
appear on
a slide.
what
objects do
after they
appear on
a slide.
the way
objects
exit a
slide.
Custom
animation
can be
used to
affect the
way
objects
appear on
a slide, to
what
objects do
after they
appear on
a slide,
and to the
way
objects
exit a
slide.
D
The
advanced
timeline
shows the
sequence
in which
objects
The
The
will
advanced advanced appear on
timeline
timeline
the slide
shows the shows the and the
sequence duration duration
in which of the
of the
objects
effect
effect
will
applied to applied to
appear on each
each
the slide. object.
object.
Clips
Organizati
on charts Text
Paint
program
Draw
program
Fly in
From top
Once data
is entered
it cannot
be
changed.
OLTP.
You can
change
the
appearan
ce of a
whole
diagram,
but not
individual
shapes of
a
diagram.
[Enter+A]
Filtering
program
Dissolve
in
Data
cannot be
Once data entered
is entered into
it can be Datasheet
changed. .
OLAP.
OLST.
You can
change
both the You
appearan cannot
ce of a
change
whole
the style
diagram of the
and the
connectin
individual g lines in
shapes of an
a
Organizati
diagram. on chart.
[Shift+Z] [Alt+Z]
The
advanced
timeline
shows
neither the
sequence
in which
objects
will
appear on
the slide,
nor the
duration
of the
effect
applied to
each
object.
C
Clips,
organizati
on charts,
and text
D
Animation
program A
Fly in,
From top,
and
Dissolve
in
D
There is
no such
thing as a
Datasheet
.
B
OLIP.
B
You
cannot
change
the color
of the
boxes in
an
Organizati
on chart. B
[Ctrl+Z]
D
.ctx
Validate
On Error
GoTo
linelabel
UpdateCo
ntrols
.ctl
Validation
On Error
GoTo
Inline
PaintPictu
re
B
A
On Error
Stop
.ocx
Audit
On Error
Resume
Next
Refresh
Resize
A
Cancel
parameter Cancel
to a non- parameter
zero value to 0
UnloadMo
de
parameter
to a nonzero value
UnloadMo
de
parameter
to a zero
value
A
Cancel
parameter Cancel
to a non- parameter
zero value to 0
UnloadMo
de
parameter
to a nonzero value
1
3
UnloadMo
de
parameter
to a zero
value
A
None of
the above D
2
Consists
Consists of several
of several Applicatio
Programs ns
Form
window, Project
standard window,
or code
view code
module
window
Place
Place
code in
code in
the
the
Terminate Unload
event
event
AutoRedr
AutoRedr aw =
aw = True False
Msgbox
err.no &
err.text
.ctr
Check
D
Consists
of Various
Forms
Consists
And Code of several
Modules Projects D
Class
module,
code
module
Place
code in
the
Deactivate
event
None of
the above A
None of
the above B
PaintPictu
Refresh
re
A
Msgbox
Msgbox
error.num
Msgbox
error.num ber &
err.numbe ber &
error.desc
r & err.text error.text ription
D
To
provide a
repository
for images
To display To help in To allow used by
images to creating a the editing other
the user ToolBar
of icons
controls
D
GetFileNu
FreeFile m
GetFile
GetBytes A
GetProper
Retrieve Get
ty
Value
B
Common
messages
passed to Open
Windows
Windows dialog box explorer
Caption
Visible
Multi-Line
Click,
KeyUp
KeyUp
Click and and
and
KeyPress KeyDown KeyDown
Ascii
Binary
Input
Format
Format
Mode
CurrentX ScaleLeft ScaleHeig
and
and
ht and
CurrentY ScaleTop ScaleTop
Property Property Property
Get
Assign
Let
Backgrou
nd color
Caption
ZOrder
property property property
Input box
Font
KeyPress,
KeyUp
and
KeyDown
Output
mode
D
C
x and y
Property
Set
AutoRedr
aw
property
CurrentVa
l
A
D
B
C
C
Min
Max
Value
Shell
Substr
SetAttr
CStr
A
Are
actually
not
None of
properties the above B
Are one
and the
same
Can be
different
at times
You do
You do
not have
not need the
to use the permissio
Set
n to
command access
here
the class
MyVar
has not
been
declared
The
ExecProc
The Open The Exec edure
method
method
method
B
None of
the above C
None of
the above D
A critical An
A warning message exclamati None of
query icon icon
on icon
the above
built-in
intrinsic
procedure
statement. variable. constant. .
InputBox MsgBox
function
statement
can be
can be
MsgBox InputBox created
created
statement function
with the
with the
returns a returns a macro
macro
value,
value,
recorder, recorder,
while the while the while the while the
InputBox MsgBox MsgBox InputBox
function
statement statement function
does not. does not. cannot.
cannot.
Data
cannot be
A new
entered
The form Data can check box
into the
can be
be
can be
form.
modified. entered. added.
QueryUnl
Unload
oad
Deactivate Terminate
press the
press the press the escape
just keep
return key tab key
key
typing
layers and lines and
planes
spaces
enter/retu
tab
rn
grammar spell
checker
checker
send a
public
message
to friends
interested send
in one
pictures to
topic
a friend
Print all
Enter
closing
From ___
To ____
Copy
tabbing
database graphing
B
C
B
C
C
D
height and
width
backspac
e/ delete
thesauru
s
rows and
columns
D
shift
B
outliner
C
send
private
messages
to a friend
send a
package
to a
friend
D
Page
setup
Retrieve
spacing
word
processin
g
Print
preview
Save
sorting
B
C
B
spreadsh
C
eet
To
analyse
figures
subscript
To
analyse
figures
Creating
and
editing
Storing
documen informatio None of
n
the above B
ts
annotation
Creating
and
editing
documen
ts
clip art
clipboard
C
Storing
Making
informatio Calculatio
n
ns
B
Font,
Spelling,
Paragraph
grammar Cut,
, Bullet
copy,
Clear,
and
and
replace
autocorre paste and Numberin
and select ct
g
C
clear
Text
Text at
Numbers which
appear at
the
which
bottom of appear on the top of
every
every
every
page
page
page
Mouse,
printer
and
processin
g system
keyboard?
Browser
Clear,
replace
and
Toolbars
Paste
Copy,
then
paste
Keyboard
, Mouse,
monitor
and
printer
Monitor,
keyboard
and
mouse
microphon
clip-art file e
Spelling,
grammar Cut,
copy,
and
autocorre paste and
ct
clear
Designate
d area on
the
document C
None of
the above B
digital
scanner D
None of
the above C
AutoCorre
ct
B
Replace
Select all
Cut, then
paste
Delete,
Insert,
then paste then paste A
To
complicat
e the
revision
process
and to
force the
author to
spend
more
time
making
correctio
ns
To allow
multiple
people to
work on
one
document
in
collaborati
on with
one
another
C
A vertical
line
outside
the left
margin
A red
signifies a
A line
underline change
appears appears has been
through
beneath made at
text that is text that is that point
to be
to be
in the
deleted.
added.
document.
Comment
s are
enclosed
in a text
box at
the right
of the
documen
D
t.
To give
the
original
author a
chance to
accept
suggested
changes
from the
person
who
entered
the
revisions
Through
the Edit
menu by
choosing
Track
Changes
command
To give
the
original
author a
chance to
reject
suggested
changes
from the
person
who
entered
the
revisions
Through
the Tools
menu by
choosing
Track
Changes
command
Both
through
Through the Tools
menu
tools on
and the
the
Reviewing Reviewin
toolbar
g toolbar D
The
Versions
comman
d will
allow you
to save
multiple
versions
of a
documen
t,
including
any
changes
that may
have
been
made to
that
documen
t.
The
Versions
command
will allow
you to
save only
one
version of
a
document,
including
any
changes
that may
have been
made to
that
document.
The
Versions
command
will allow
you to
save only
one
version of
a
document
without
any
changes
that were
just made
to the
document.
The first
and
All
second
versions The latest versions
version is are
are
opened
opened
opened
automatic automati automatic
ally.
ally.
cally.
Dictionar Grammar Spell
check
check
y
Word
displays
a list of
the dates
and times
each file
was
saved.
The most
recent
version
will
appear at
the
bottom of
the list.
Fields
Check
boxes
Tools
Toggle
button
Word will
show the
name of
the
person
who
saved
each
version.
The
Versions
command
will allow
you to
save only
two
versions
of a
document:
one
version of
the
original
and one
version of
any
changes
made to
the
document. A
The
previous
version is
opened
automatic
ally.
B
Thesauru
s
A
Word is
not able to
tell the
most
recent
version of
a
document. A
Insert
A dropText fields down list
Forms
C
B
Comment
s can be
edited or
deleted
by right
Comment clicking
Comment s cannot the
highlight
s cannot be
be edited. deleted.
ed text.
Comment
s can be
edited or
deleted by
left
clicking
the
highlighte
d text.
C
Text
Text at
Numbers which
appear at
the
which
bottom of appear on the top of
every
every
every
None of
page
page
the above
page
Insert
Press
Copy and page
Press tab. Return.
paste.
break.
text.
graphics. forms.
numbers.
header/fo bibliograp find/searc
hy.
h.
macro.
oter.
This
Format
action is
Painter
Copy
Paste
not
button
button
possible.
button
Fault
Finding
Insert
Bug
Squashing
Tools
a section
of text
where the
first letter
of each
sentence
a section is
of white lowercase
text on a and the
black
rest are
backgrou uppercase
.
nd.
setting it
in larger typing it all
type or
in capital
font size. letters.
Error
Injecting
Format
the
guidelines
used to
establish
where
different
elements
of the
newsletter
will go.
underlinin
g the text
of the pull
quote.
C
D
C
A
C
Debuggin
D
g
Edit
C
an
enlarged
capital
letter at
the
beginning
of a
paragraph
.
A
changing
the color. A
The
number of
columns
12
A grid is
a set of
horizonta
l and
vertical
lines that
determin
e the
placemen
t of
elements
in a
newslette
r or other
documen
D
t.
The tab
spacing
within
each
D
column
D
72
Three
Four
A dropped
cap is a
word that
The
A pull
starts with
reverse
quote is a a
technique quotation lowercase
means to taken
letter
add dark from
when it
text on a (pulled)
should
light
from
have a
backgroun another
capital
d.
document. letter.
The width
of each
column
6
The
height of
each
column
10
One
Two
Press
Press
Ctrl+Shift+
Ctrl+Enter Enter to
to create create a
a page
column
break.
break.
A sans
A serif
serif font
font at 10 at 10
points
points
B
Press
Enter to
create a
section
break.
Press
Shift+Ente
r to force
a line
break.
C
A sans
serif font
A serif
font at 20 at 45
points
D
points
2 inches
3½ inches 4 inches
6 point
10 point
15 point
It
depends
on the
left and
right
margins,
and how
many
columns
are
specified. D
25 point
B
2½
inches.
You are
not in
Print
Layout
view.
2¾
inches.
You have
not
inserted a
column
section
break..
3 inches.
You have
not
specified
continuou
s section
breaks.
to move a
section of
text from
the
original
to store a to store a location to
file on the file on a
another
hard drive diskette
location
Data
about a
set of
A set of
Mainly
similar
different
things
graphics
text
Thesauru Spell
Grammar
s
Checker Checker
impossibl
e to
determine
.
B
Word
cannot
display
columns
during
editing;
you will
see them
only when
you print
the
document. A
to leave
an
original
section
of text in
place
while
pasting a
copy
elsewher
D
e
q_desc
The ------ key can be used to select an existing company from list of companies.
Import and Export of data between Tally and other programs is possible only through ---------Program.
The re-order point is the inventory quantity that trigger a stock replishment activity.
A created company's detail can be modified through keys
A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount
of money that is owed.
In tally,all masters have ________main options
In tally,to create a new column in balance sheet press _______
In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger
accounts into one line statements
In tally, we can alter ledger details using either single or multiple modes but not alble to delete a
ledger from multiple modes.
In tally,a group company is marked with an ______________
The systems that work together to order,receive, and pay for replenishment of stock are --------------Tally allows to delete a ledger from --------- alteration mode.
--------------------- is/are useful for management in the decision making.
In tally,the group company must contain at least _____________ members
To cancel a vourcher entry in Tally, short-cut key is -----------
The accounting masters and inventory masters related to
We press ------------- function key to display the age-wise analysis of Bills Receivable or Bills Payable
report
In Tally, we press ------------, to print report .
In Tally, Types of Accounts and Types of Vouchers passed during the period, can be seen in ------------report.
In the Tally Software, the ------------ directory stores all data entered by the user.
The Ledger Accounts are unique in Financial Accounting Packages
Customers can be permitted to enter their own data into the firm‟s computer using the firm‟s wide area
network is an example of
In Tally, we can customize the Vouchers as per our requirements
The number of steps in Accounts Compilation are
Each action/transaction of a firm is described by a ----------------.
Tally is based on mercantile accounting system
Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that summarised information is
possible.
Revenue Account also known as -------------- Account
Method of Voucher Numbering is/are
Accounts Receivable are displayed in
To assemble a product from different items -------------- entry is used
A --------- purchase orders data flow is directed to the purchasing system for use in closing out the
outstanding purchase orders in the receiving system diagram.
Tally provides at least --------- predefined voucher formats
The value of the inventory is included in a ledger accounts as an asset on the balance sheet
" The buyers can follow up with the suppliers to determine the reasons " is an example of ----------------From voucher entry mode , if we press __________ then we get payment voucher in tally
Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged accounts member companies
of the group.
A ----------- is a primary document for recording all financial transactions.
The field can have a value between ________________ in FA Package.
The _______ file maintains data that describes the supplier past transaction with the firm in terms of
material quality in AIS
It is necessary to manipulate data to transform it into ---------------In tally, to change the date of the voucher press ______
Tally can maintain budgets on ---------------The value of the inventory is included as an asset on the balance sheet
In ratio analysis report of Tally FA packagewe we press ________________ function key to the display
of bills receivable , bills payables report
The accounts payable system is responsible for paying the suppliers for the -----------------
What is the default financial year in Tally6.3 _________________
Tally encrypts and stores TALLY DATA at the data directory
The Profit & Loss statement can be displayed in ---------------- format(s).
Default ledger accounts in tally are ______
Default 'godown' name in tally is ____________
'Tally vault' is a _________________
To create a sales voucher in tally , you have to press _______
A Group Company is ------------------------- given to the merged accounts of member companies of the
group.
In tally,"credit note" voucher type records entry for ________________
In tally you get currency symbol option from _______ menu
------------------ gives the balance for each day for the voucher type has been selected.
For 'stock journal' entry we press ______________ in tally
Tally provides the capability to the administrator/auditor to track changes in the areas is/are
In tally, types of users are _______________
By pressing -------- key, a list of inventory reports can be displayed straightaway from the balace sheet
report
Projected approximation of income or expenses is called ______________ .
"Administrator" type user is also called 'Auditor' of a company in Tally
You will get company information , if you press __________ from gateway of tally
A constituent(member) company can be a member of more than one group.
Default stock category in tally is ______
To create a log of the import activity in a file _____________ is located in the same directory as an
executable program in tally
In Tally,inventory valuation method option is available from _______
Tally audit feature is available in a company __________________
In tally, a group company can also be a constituent(member) of another group company
Default number of groups in tally are ________
During voucher entry ------------- are used.
User designated as --------------- can view audit list.
Tally supports Importing of data from ---------------In an accounting information system, which of the following types of computer files most likely would
be a master file?
Which of the following is an advantage of a computer-based system for transaction processing over a
manual system? A computer-based system:
The memory address register is used to store
Inefficient usage of excess computer equipment can be controlled by
Which of the following is not the component of a CPU
A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The
following is an information not found in the trailer label
Hard copy is a term used to describe...?
What do the abbreviations VAB stand for
What control would prevent the accidental erasure of customer information from a magnetic tape
What are the individual dots which make up a picture on the monitor screen called?
Header label normally include all the following except the
A daisy wheel is a type of...?
Which approach or technique is a control usually associated with microcomputers
An impact printer creates characters by using...?
The best security control in a microcomputer environment is to
What would you NOT use with a flatbed plotter?
What do you need for an ink jet printer?
The greatest control exposure in a microcomputer environment is the lack of
What do you need for an ink jet printer?
A laser printer does NOT use?
The amount of data that a disk may contain is known as the disks...?
You can ________ protect a floppy disk.
Information on a hard disk is usually backed-up using a...?
Using generalized audit software packages can add a lot of value _______
_______ is used for CAAT as database
Generalized audit software perform auditors to undertake any past records and not concurrent auditing
Generalized audit software is a file whose capabilities for verifying processing is logic
Magnetic tape is a...?
Hard disks can have a storage capacity in the region of...?
Which storage device has the largest capacity in Mb?
Which storage device cannot be erased?
You can ________ protect a floppy disk
Where should floppy disks be stored?
The contents of these chips are lost when the computer is switched off?
What are responsible for storing permanent data and instructions?
Which parts of the computer perform arithmetic calculations?
What are small high speed memory units used for storing temporary results?
How many bits of information can each memory cell in a computer chip hold?
What type of computer chips are said to be volatile?
Magnetic tape is a...?
Software can be divided into two areas:
Travel agents use this computer system when reserving flights
Which computers are used in the weather forecasting industry?
Vacuum tube based electronic computers are...?
Which generation of computer was developed from microchips?
Which generation of computer uses more than one microprocessor?
Which generation of computer developed using integrated circuits?
Which generation of computer developed using solid state components?
Name three steps involved in developing an information system
CAAT's are computer program and data that auditor uses as part of the audit procedures to process
data if audit significance contained in an entity information system
CAAT do not contains package programs, purpose written program, utility programs or system
management programs
Embedded audit routines are sometimes built into an entity's computer system to provide data for later
user by the auditor
SCARF involves embedding audit software modules within an application system to provide
continuous monitoring
Concurrent use auditors as the member of the system
Regular cross system verification may minimize frauds
Computer security is frequently associated with confidentiality, integrity and authentication
Data reserve engineering process metadata to document system and abstract business rules and
relationship
The first step for developing CAAT is_________
Using the open database connectivity feature in ACL is ______________
Computer Assisted Audited Technique involves the use of computers through "Black Box Approach"
White Box Approach necessary involves expert knowledge on the part of Auditor
The transition from manual system to CIS environment bring dramatic changes including
________________
Auditing with computer necessarily supports the
CAAT involves an Auditors' appreciation of __________
Widespread end use computing result in unlimited errors creeping into system going to accept
handling, thereby increasing audit risks
For computerized auditing usage of sophisticated audit software would be a necessity
Important knowledge needed to begin planning the use of CAAT is _________
The move towards paperless EDI would eliminate much of the traditional audit trail, radically changing
the nature of audit evidence
Computer operation controls are designed to provide ________________
Systems development control, apart from others, include authorization, approval, testing,
implementation and documentation of new systems software and system software modification
A system could be _________
A system exhibits 'entropy'
Super computer are the largest and fastest and is very suitable for commercial application including
audit work
Assembler language uses Mnemonic symbols
Operating systems are devised to optimize the machine capabilities, the function
include_______________
General purpose software provides a framework for highly complex scientific operation
In batch processing, transactions are processed one after another
The use of computer assisted audit techniques is not gaining popularity not only ________________
On-line processing refers to grouping of transaction and processing the same in one go from start to
finish
Real time refers to the technique of updating files with transaction data immediately after the
occurrence of the event to which it relates
In OLRT the CPU should process the capability of program interruption
Time sharing system allow access to a CPU from remote terminals
DSS is defined as a system that provides tools to managers to assist them in solving structured
problems
DSS has the following components _________________
Master files contains current records for identification and summarizing
Transaction files contain relatively permanent records take product profile, customer profile, employee
profile etc
Master file configuration includes ____________
______ is a file management software package that lets users and programmers organize data into
files and then process those files
CAATS provide added value to the clients because _______________
File volatility refers to the number of addition and deletions to the file in a given period of time
File activity is the proportion of transaction file records that are actually used and accessed in a given
processing run:
File interrogation refers to the _____ of information from a file
One -to-one relationship means a single entity to a single entity in a monogamous structure
RDBMS is structured to a series of 2 dimensional tables
SADB stands for ____________
Controls are present over many aspects of the computer system and its surrounding social
environment
In framed checking the data entry is checked against an expected picture or format
Errors are correlated_________
Field check is exclusive to a field
_________ law basically states that there is a specific probability of the first digit of a no. being 1,2,3
etc
Check digit is a group of nos. added to a code for determining the accuracy of other digits in the code
Hierarchical code means _________
The validation checks applied to a field depend on the field's logical inter relationships with other fields
in the record
The contents of a field could determine _______ sign for a ______ field
Batch is the process of ______ together _____ that bear some type of relationship to one another
Hash totals means meaningless totals
With OLRT where interactive data entry is available, the master file associated with a transaction may
be searched for confirming data
Controls are required for authorization to ensure data integrity and detect possible breaches in security
Data from client application are not stored in the organization's database through auditables events
and function
All input records in a batch are normally of different types
IDEA stands for _________________________________
A transaction file is sorted prior to the update of master file
A sequence check on the transaction or master files by an update program is not required
Whenever monetary transactions are processed against master files, the update program should
maintain a correlation account to record such transaction that does not have a matching master file
record
Internal tables are stored tables from which certain values are extracted for further processing and
storing
For small to medium sized systems, individual modules are coded and individually tested and then
assembled to be tested as a whole-the testing strategy is referred to as ___________________
In systems testing, test involves_________________
Recording transactions in a controlled manner may amount to loss of stored data
Audit software is used by the auditor to _________
Core image comparison is a software used by the auditor to compare _______ version of a program
with a secure ________ copy
Database analyzer is a software which provides detailed information concerning the operation of the
database
SAS stands for ______________
Embedded code is a software used by the auditor to examine backup data
Embedded code performs wide variety of audit task
Core image comparison is particularly useful where only executable versions are distributed
Log analysis is a software used by auditor to detect virus
On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a
specific program or sever edit test is doing its work
Mapping software is used by the auditor to list unused program instructions
Mapping software has very objectives
Modeling is a variety of software which ________________
On line testing can be targeted for specific functions carried out by programs
Program code analysis involves _____________
__________ is a software of CAAT
Snapshot is software which takes a picture of a file or data or a transaction passing though the system
Base case system evaluation includes____________
While base testing forces on finding if there are any defective execution policies in a program
Black box testing seeks to determine whether application output is what it is supposed to be
In integrated test facility approach the auditor should ensure that the impact of test transaction is
subsequently eliminated from the computer files
Black box testing is _______ based and white box testing is _______ based
Source code review means__________
In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine
how the defects may impact the attainment of the program objectives
All material application oriented events that occur within the boundary subsystem should be recorded
in the accounting audit trail
In examination of audit trail the following data associated with an event may be ___________-
JCL means_________________
Audit should be periodically analyzed to detect any control weakness of the system
In an accounting audit trail, intrusion detection system might monitor the amount of processor time
consumed by the user to detect unusual deviation from the amount processor time requested by the
user in the past
A sample size calculator program assists auditors in determining RAND() function
Generalized audit software consists ___________
Specializes audit program may be___________
Generalised audit software could be used by the following in consistencies or significant fluctuations
Generalized audit software function include____________
In the file reorganization merging capabilities are needed in data from separate file is to be combined
on a separate work file
Auditors cannot use generalised audit software to extract the data needed for audit purpose
Auditors can combine functional capabilities of generalized audit software to accomplish the task of
__________________
Which of the following is not the feature of GAPs
Which is the example of CAATs
In audit procedures, test data is
Which of the following is not the use of CAATs
Which of the following are called explicitly by another procedure?
_________ data type is generally used for fields assigned as primary keys in a table
MS access objects can be published in the web
In code-builder, got_focuse, click,dbl_click,enter are examples of _______
_______can be used to automate certain actions in response to events
In the macro sheet the macro is selected in the _____field
To build complex expressions_____is used
The three list boxes present at the bottom of the expression builder are called_____
________option is selected from the view menu to create macros with conditions
_______report can be created with minimum user input
_______layout of a form displays one record at a time
The table or query name on which we are going to build our report is selected from the ____ dialogue
box
______and_____are the two types of auto reports available
There are no wizards for creating a database in access
______option from the insert menu option is chosen to add an embedded chart
In ms-access, while using SQL, references constraint is used for creating _______
_______is used to create a mailing label
______header is present at the beginning of the report
______is present at the bottom of each page in a report
In SQL, having clause is used for _________
______field is added to the macro sheet when we select grouping option from the view menu
______can be used to create toolbars
_______query is used to add records from one or more tables into an existing table
_______window is used to write VB code in access application
Values for other tables, queries are maintained in look up fields data type
Visual Basic language is a _____ tool
______ function is used to display a message box
Other ms-office applications can be accessed from ms-access using a concept called ________
OLE stands for_____
The application that supplies data in OLE is called an _________
If any change made on the object from the client side is reflected on the server then the object is said
to be _____
_______is the file format that works on internet
______ is used to convert any ms-access object into html format
_______ option in publish to web wizard produces a page that is static in nature
_______query is used to create or change database objects in a current database
Currency fields express the amount in _________
_______is selected from the toolbar to add an OLE object
To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box
_______option from the file menu is selected to run 'publish to the web wizard'
_____page in an web application is used to navigate to the rest of the pages in the application
______ is fired when an event is triggered is the concept based on a Visual Basic language
Ms access is a ___________
A collection of data stored in different objects is known as a _________
A blank database can be created using __________
Text type data can be of _____ characters in ACCESS
______is a datatype that assigns values automatically
Tables cannot be imported from other databases
If two tables having same values for the fields are joined it is called an ______
Duplication of records in a field won't be allowed if the fields are declared a________
Changes from a master table can be reflected on to the child table by selecting _____option
To see more than one record at a time in a form we use _______
In SQL, delete command is used to remove _________
In MS-Access, filter excluding selection will display only those record(s) which meet the criteria.
Properties of the fields are managed by _____ in Dynaset
______queries allows us to view data in row by column manner
The type of queries that can update or delete record(s) in a table(s) are called __________
Joining tables without any matching values in the fields is called ____________
Primary key uniquely identifies each record
Which of the following dialog box is/are used in the creation of form ________
_______ query wizards are used to generate summary calculations for a table
Properties of a form can be changed by selecting ______from view menu options
Forms that are included in other forms are called ______________
In MS-Access, while using form design view, for creating a command button for adding a new record,
we should select the _______ category from the command button wizard
_______ form displays fields in a single horizontal row
The process of arranging the data in a meaningful order is known as ___________
______ are used to select only some particular records from the table or any other database objects
In MS-Access, user may specify criteria for filter in form view using _________
___wildcard character represents any single character
Records cannot be sorted by a primary key
A control without a data source is known as ___________
Set of related option buttons, check boxes and toggle buttons is known as _____________
The collection of related data and objects is called a ____________
Which of the following is control types ____________
In MS-Access, the function that gives the current date is _____________
_____is a control that lists set of data
______is a form that summarize large amount of data
______allows to create a filter by typing the value in a data sheet
Wizards for toolbox controls are called a __________
The wild card representation for any 5 letter word that starts with ram is ________________
Look up fields slow up data entry
____is an access object that displays un-editable data
_____option from the new object toolbar gives the easiest way of generating a report
______ represents data in a pictorial format
Changes of one table can be carried over to another related table
Hyperlinks are used to jump to any kind of information or data from a file
The memo field can have text upto_____ characters in length
In MS-Access, columnar layout can be used to view multiple records in a form
In MS-Access, alter command may be used in adding a primary key to a table
Update query is used to add records from one or more tables to the end of an existing table
In ms-access, datasheet view is available in ___________
______are used to jump to any kind of information from a datasheet or a form
Home page will always be present as a first page of an application
Make table queries create a new table from the records of another table
In ms-access, to protect a database file from illegal access, we may set database password. The
option of setting database password is available in _______ menu
Foreign key is a field that uniquely identifies each record and accept no null values
Data definition queries are used to create or change database objects
The attributes of a composite key are known as ________
OLE object is a data type in access
Data displayed in forms cannot be edited
A sub form is used to display one to many relationship between tables
We can switch from datasheet view to form view by selecting view -> form view option
In MS-Access long integer is a datatype
In MS-Access, while designing a table for a particular field, the Required parameter is set to yes. This
validates the field as _______
Sorting is applied to select only some particular records
Filter by form can be created from a forms shortcut menu
Advanced filter uses a filter similar to the query design window to create a filter
? Wildcard character represents any number of characters
_________ of the following is/are a type of chart
A bound control is tied to a underlying query or table
A calculated control uses expression as a source of data
Text boxes cannot be bound controls
The default query invoked by ms-access is
A control can be bind to a record using row source property
List box is a control that offers a list of choices
If a table is joined to itself it is called a ________________
A picture box combines the activities of both a text box or a list box
Line is a tool box control
Text boxes can be part of a option group
_____ chart exists as a separate object
Filtering data is a way of arranging data in a meaning full order
Wild card characters are used for sorting records
Pivot tables are used to navigate to the other tables in a database
Reports are used to represent un-editable data
In MS -Access, the records in a table are sorted based on _________
Relationship is an association between _________
Summary options dialog box is used to summarize data
______ queries can be used to delete a group of records that meet some specific records
Charts can convert numerical data in a easily understandable format
Embedded charts exist separately
The chart which cannot exists as a separate entity are _______________
From ms - access, if we want to view the records stored in a table in ms - excel worksheet, we need
to
Page header is present at the beginning of each record
Detail section has a header and footer
A macro is performed only when the user initiates an event
The macro is selected from the action field of a macro sheet
A macro can be made to execute before the starting of a database
In MS-Access. While appending records, the source and the target table must have similar structure
and fields
We can add our own functions to the expression elements list box of the expression builder
_______is the wildcard character which represents the presence of any number of characters
Macros can be used to add a menu to a database object
_____ header is a unique feature of reports
Chart can either be a form or a report
Group header will be present at the design view of a report even if the report is not grouped
We can change from the design view to the form view without being prompted for saving the changes
made
Charts can be produced without the wizard
Macros can be used to create user defined error messages
Between and Not Between is ______ type of operators
The default data type of VB is integer
Visual Basic is based on __________
_______is the name of the database object that displays data and can be used to edit data
In access OLE objects cannot be linked
_____ section is present for each record in the report
A ________ sheet lists all the properties that pertain to the form or the controls
Textboxes can also be an example of unbound control
In MS-Access, we may design command buttons for navigating records
_______are forms that are included in other forms
_______ are used to represent our data in graphical format
A field with a _______ uniquely identifies each record
Large amount of data can be summarized using ______ tables
_______ are employed to select only some particular records from a database object
______ control need not have a data source
______ control combines the functionality of both a text box and a drop down list
MS access is a DBMS
A form can be bind to a record source using _____ property of the form
______ forms displays field in single row
______ forms are usually used for tables with one to many relationship
_______ control uses an expression as a source of control
_______ control is tied to field
_______is the form that can be created with minimum input from the user
______option from the tool menu is selected for setting relationships between tables
______,______and_____are the buttons belonging to the options group
_________allows us to create a filter from a field short cut menu
________is a database object which displays data but cannot be used to edit data
What term applies to a collection of related records in a database?
All of the following terms are related to computerized databases except which one?
What is a database?
What does a record contain?
An RDBMS is a
Data Warehousing refers to
Unauthorised alteration of on-line records can be prevented by employing
What is a database?
What does a record contain?
What is a report?
What is the best way to analyse and change data
What are some popular office orientated software applications?
Which of the following constraints can be used to enforce the uniqueness of rows in a table?
Which of the following commands is used to change the structure of table?
An RDBMS is a
Data Warehousing refers to
You are creating a client application that calls ActiveX DLLs. Which of the following properties of the
Err object provides the name of a component that sends an error back to the client application?
This database holds personal information. The user can help to keep it confidential by
If the database holds customer names and addresses, personalised letters can be created
automatically using
Application software suited to storing the survey information obtained in the table would be
The characters * and ? are sometimes used in search criteria as
Which of the following field types will generate the primary key automatically?
Referential integrity ensures that the:
Tables are related to one another through a:
A foreign key is:
You are creating a banking database to track customer loans. The bank will, of course, have many
customers, each of whom may take out one or more loans, while each loan may be associated with
only one customer (there are no joint accounts). What is the re
In a one-to-many relationship between Companies and Employees, which field is found in both tables?
Which of the following ensures that records in related tables are consistent with one another? For
example, it ensures that you cannot add a record with an invalid foreign key.
How would you delete a relationship between tables in the Relationships window?
In a Customers tables, what does a plus sign next to the CustomerID field mean?
What is required of the fields that join two tables?
Assume a one-to-many relationship between the Customers table and the Loans table, with referential
integrity in effect. What happens when you attempt to delete a customer ID from the Customer table
that still has entries in the Loans table?
Which of the following is true when viewing a main form and its associated subform in the Form
Design view?
Which of the following relationships does not belong in a database based on a professional sports
league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the “many” side of a one-tomany relationship?
You have created a one-to-many relationship with referential integrity between a Customers table and
a Loans table. From which table can you delete a record?
The correct order of the arguments for the MsgBox statement is:
The first statement in a procedure named CreateList is:
Which of the following is TRUE related to form fields?
A text field:
The purpose of a database is to:
A database stores:
A database records:
A sales contact manager used by a salesperson is an example of _______________
A Customer Resource Management (CRM) system is an example of_________
The industry standard supported by all major DBMSs that allows tables to be joined together is called
__________.
A program whose job is to create, process and administer databases is called the _____
Microsoft Access may use which of the following DBMS engines?
Which of the following are basic components of an enterprise-class database system?
In an enterprise-class database system ________ .
In an enterprise-class database system, the database application ___ .
In an enterprise-class database system, reports are created by ____________________ .
A database is considered "self-describing" because _______ .
In an enterprise-class database system, the database _________ .
A database may contain _________________________ .
A database designed using spreadsheets from the Sales department is a database being designed
_________________________ .
A database designed to implement requirements for a reporting application needed by the Sales
department is a database being designed _______ .
A database designed to combine two databases used by the Sales department is a database being
designed _________________________ .
Database professionals use ________________ as specific data sources for studies and analyses.
Database professionals use a set of principles called ________________ to guide and assess
database design.
A very popular development technique used by database professionals for database design is known
as _______________________ .
A very popular development technique used by database professionals to adopt a database design to
new or changing requirement is known as _____ .
The predecessor(s) of database processing was (were) __________ .
In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to identify particular rows in a is___ .
A combination of two or more columns used to identify particular rows in a relation is________ .
A determinant that determines all the other columns in a relation is______ .
When designing a database, one of the candidate keys in a relation is selected as the _________ .
Normalization is a process used to deal with which of the following modification anomalies?
When you are given a set of tables and asked to create a database to store their data, the first step is
to ____ .
Modern microcomputer personal DBMS products______.
Which of the following are true about data mining applications?
We have obtained access to the company's operational data. We examine 50 records for customers
with phone numbers that should use the current area code of 345. Of these 50 records, we find 10
that still use an older area code of 567. This is an example
We have obtained access to the company's operational data. We have been asked to produce a
report with an item by item analysis of sales, but the only sales figure available is the total sale value
for each order. This is example of_____
A data warehouse database differs from an operational database because:
Which of the following objects is used to display a menu?
Which of the following objects are NOT found in an Access application?
You are developing an Access application that you expect to upgrade periodically. Which of the
following statements is TRUE?
Which of the following statements regarding Access applications is NOT true?
Which of the following brings a copy of the table into the current database and does not maintain a tie
to the original table?
What makes a database an application?
What is the Access tool that is used to create the user interface?
The purpose of a data warehouse is to:
___________ means the result of applying to specific information certain specific technical processes.
__________ is an algorithm which creates a digital representation or "fingerprint" in the form of a
"hash result".
__________ is of standard length which is usually much smaller than the message but nevertheless
substantially unique to it.
Digital Signature involves two processes. They are ___________ and __________.
The Costs of Digital Signature consists mainly of the following
CA stands for ________________
A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key
A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the Private
Key, Serial number of the digital certificate
______________ enable web servers to operate in a secure mode.
______________ are used by individuals when they exchange messages with other users or online
services.
______________ are on-line databases of certificates and other information available for retrieval and
use in verifying digital signatures.
Signing Writings serve the following general purposes______,_______,_______ and _______
The most widely accepted format for Digital Certificate is defined by the CCITT X.509
A certificate may prove to be unreliable, such as in situations where the subscriber misrepresents his
identity to the certification authority
CRL stands for
The prospective signer identified in the digital certificate holds the_________ and is called the
___________
In EDI interface, the translation service receives _________ as incoming files from the communication
service
The EDI standardisation for International Trade and Commerce is introduced by __________
In EDI, the transmission files are composed of different sets of external format files which are grouped
into multiple sets under the name of ________
The ________________ are pre-paid credit cards that include an embedded cards
________________ are another form of credit payment that lets customers use digital online cheques
to pay Web merchants directly
In Active advertisement, there are two types of models. They are _____ and ________
The network based technology is/are ____________
Decryption is a process employed for scrambling of plain text for web based transactions
Asymmetric cryptosystem is based on __________ and ____________
Value Added Network is an example of _________
The advertising strategies emerging in the on-line world are ____________
The _________ model use direct mail, spot television or cable television, in active based
advertisement.
The ________ is a form of mail that is not targeted to a specific audience
The __________ model refers to information that is placed at a point where it will be noticed by
customers in the course of other activities and does not require active search
The most beneficial advantage of ERP system is
What is the term that describes spying on one‟s business rivals to gain a competitive advantage?
What would you NOT be looking for when spying on a competitor?
An online drugstore such as Drugstore.com is an example of_______
Which of the following is an example of unacceptable online „netiquette‟?
Which of the following statements is correct concerning the security of messages in an electronic data
interchange (EDI) system?
The wizard that is used to import text files is_________________
The alphabet indicating the column followed by the row number is known an__________
Which of the following files could not be opened in excel _______________
In excel, the dates that are stored as sequential numbers known as ________________The command to display the current date in a cell is _________________
In excel, absolute references are represented by a ________ before the column and row addresses
The ________ can be used to select the function and assemble the arguments correctly
Specific parts of information required by functions to perform certain tasks are called as___________
Which of the following do not belong to the formula category in excel environment__________
The function that in used to join cell values together in a single cell ________
The function that is used to count all the values that meet specific criteria _________
The wizard that is used to create and edit charts _______________
The function that is used to calculate the payment for specific loan terms ____________
The function that is used to add together all values that meet specific criteria is known as
____________
The __________ option present in the file menu options is used to specify major facts of the page to
be printed
The command that is used to apply a format automatically __________
The ____________ makes the information in a worksheet meaningful and easy to understand
A particular part of a work sheet can be printed by setting the _________
The process of finding or selecting information is known as ____________
The option that is used to cancel the filter process for a specific column and display all the records is
________
The URL for encyclopedia Britannica is_________
_______ maps IP addresses with the domain names of the sites
Internet can be defined as _______
The most important service of the ______ is to manage traffic control
_________is a program that displays information about a host connected to the net
_______ is a program or a tool that helps in locating a file anywhere on the net
URL stands for ____________
IN an URL the word before the color refers to _______
A ______ always begins with a slash
Prodigy is run by IBM and ______
The World Wide Web is referred to shortly as the _______
Gopher and WAIS enables the user to ______
______ is the program used to run CompuServe's regular services
Navigating through the menu of gopher is called moving around _______
The directories that come with built-in engines are yahoo,lycos and ______
To use the finger command,SLIP users must run a programme called______
The web maps are called _______
Directories consists of _______ levels
The _____ level gives the broadcast overview of the net
The huge list of keywords from important items is called ______
The two types of search in veronica are _____ and ______
_______ searches by keywords
Mosaic displays links in color whereas _____ does not display links in color
______ supports one button publish
SPY MOSAIC is distributed by_______
______ is a program that helps us to log on to other networks
HTTP is the acronym for __________
______is used to transfer and copy files over the internet
_____ is a program that helps us to log on to other networks
TCP/IP stands for ________________
Archie servers can be accessed in_______ different ways in internet
_______is the computer on the internet that translates between the internet domain names and the
internet numeric address
TIA stands for_____ in internet
Service indicates the name of the ________ used to access data, present on the other end of the link.
HTTP stands for______
________ is used to link pages in the world wide web
FAQ stands for ______
The internet adapter is a programme that makes our connection act like a _____or a ____ account
The step involved in Communicating between the web clients and servers is ______________
WSIRC stands for______
Two of the important browsers are_____ and_____
Lynx is a _______ programme that works with terminals
The huge list of keywords from important items is called an_____
VERONICA is an acronym for _______________
The first freenet is created at the_____ and is called______
________ are defined as ways of communication amongst networks
______and_____ are web searching features
WINWAIS has two source lists namely____ and______
________ is also called as WAIS manager
HTML stands for_____
The system of interlinked documents is known as_______
The small programmes that create animation,multimedia,real-time games and multi user games are
called______
The information displayed on the web page includes______,_____ and_____
The web pages that represent online home of their author are called______
GNN stands for______
_____ is the most popular internet service
The online service offered by navigator gold 2.0 are _______ and_____
_______ is a program or a tool that helps us find a file anywhere on the net
The databases to enable keyword search using Lycos are a2z,_______
______ is a large worldwide bulletin board service network
BABEL consists a glossary of _____
Dictionaries,encyclopaedias,government and other references are found in ______
Yahoo,lycos,excite and webcrawlers are _____
GIF is the acronym for ____________
JPEG is the acronym for ___________
The Web aids users to explore the ________
The three most popular mailer are_____,_____ and______
The World Wide Web consists of _________
In Microsoft Internet Explorer, the color of the text can be specified using _________ attribute of the
font tag.
The interface that provides effective communication between the web browsers and servers is
_________
CGI is the _________ between web browsers and servers
CGI programs are invoked based on the information provided by the _________
A CGI program is usually called after a request made by the _________
URL stands for ________
A hyperlink can be on ___________
HTML was derived from _________
SGML is a _________
PINE stands for _____________
The application that confirms whether a document is compliant to its DTD is _________
Web is a collection of ___________
IETF stands for ________
The two major browsers used to surf the Internet are ________,_______
Special characters allow browsers to display _________________
The keyword for providing links within or across documents is____________
Stringing pages together using hypertext technology helps view pages _______________
The initial web pages present in a web site is the ________ page.
The image format supported by most browsers is________________.
The components of a URL are ___________
The mail we send has a mailing address and most of them correspond to_____,_____ and
Which of the following is not supported by internet explorer _______________
CGI stands for ____________
Host name indicates the domain name of the web ________
The internet is also called as _______________
The internet is similar to _________________
The net drivers______ from one place to another
The net provides interesting services like______,______ and______
The windows internet software available are______,_______,________ and______
________ is the ancestors of the internet
DARPA stands for _______________________________________________
The uuencode files start with a _______
DARPA is broken into ________ and _______
NSFNET is the united states provides service to _____ and_____
HTML stands for ______________________________________
The first international IP network connections were established in 1973 with _____ and_____
A_____ is a set of computers interconnected by transmission paths to exchange information in
internet
A computer that provides a service usable by other computers is called______
A_______ is the representation of physical connectivity of the computers in internet
DTE stands for ____________________
The basic function of the ______ is transmitting the bits over a channel
The point to point channel network is also called as _____ and_____
Accessing files using FTP servers is called_____
The three most commonly used networks are______,______ and______
________ is in between LAN and WAN
_____ can be owed by multiple organisation
Data is transmitted in the form of_____ signals
DTD stands for __________
Modem stands for __________________
______ is the process of the digital signals being converted into a form suitable for analog
transmission
________ and______ are two basic ways of getting connected to the internet
SLIP stands for ________________
PPP stands for _____
Which of the following best describes uploading information?
A characteristic of a communication channel that is the amount of information that can be passed
through it in a given amount of time, expressed in bits per second.
The act of searching through storage to locate information without necessarily knowing of the
existence of the information being sought.
A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named
in the certificate is called the ____________
The Relying Party can use the ___________ listed in the certificate to verify that the digital signature
was created with the corresponding _________
Digital Signatures are used for a variety of Electronic Transactions like ________________________
To associate with a key pair with a prospective signer, a Certification Authority issues Digital
Certificate
Digital Signatures, if properly implemented and utilized offer promising solutions to the problems of
Imposters, Message Integrity, __________ and _____________
In, Digital Signature, _____________ perform the "ceremonial" function of alerting the signer to the
fact that the signer is consummating a transaction with legal consequences
A Digital Signature must have the following attributes ________________ and _____________
"Hash Function" is used in both creating and verifying Digital Signature
___________ provides assurance of the origin or delivery of data in order to protect the sender
against false denial by the recipient that the data has been received, or to protect the recipient against
false denial by the sender that the data was sent.
___________ serves the ceremonial and approval functions of a signature and establishes the sense
of having legally consummated a transaction.
________ is a branch of applied mathematics concerns itself with transforming messages into
seemingly unintelligible forms and back again.
The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily termed as
_________, and ____________
_______ is known only to the signer and is used to create the digital signature.
_______ is ordinarily more widely known and is used by a relying party to verify the digital signature.
____________ is the art of protecting information by transforming it into an unreadable format.
Which of the following activities would most likely detect computer-related fraud?
A digital signature is used primarily to determine that a message is:
What is a major disadvantage to using a private key to encrypt data?
Which of the following risks can be minimized by requiring all employees accessing the information
system to use passwords?
The acronym for B2B is ___________
The _____________ model is the least intrusive model but requires active search on the part of the
customer
__________ is / are a form of advertisement where people relate their experience with products and
services
The _________ are software agents who communicate with the business merchants on behalf of the
customers
The Pre-purchase preparation phase includes _______________ for a set of products
The _________ phase includes customer service and support to address customer complaints ,
product returns and products defects
The ________ allow companies to bypass the need for costly printed catalogs
A ________________ is a basket on the Net that is used to place the items that are being purchased
EDIFACT is an abbreviation of ________
The __________ allows for protocol conversion and communicates with the bank using the banks
private network or the Internet
In Ecommerce, data extraction, transforming the data into transmittable form, transmitting the data
and downloading the data are the operations employed in _________
The _________ commerce assists in integrating the customers and suppliers of the company directly
into the organisation
E-cash means______________________
E-commerce is a tool that addresses the desire of firms to cut services cost and improving the quality
of goods. It is a definition of e-commerce from _________
The small denomination digital tokens are called _________
The ____________ is the process of encoding information to prevent it from being read by
unauthorized parties
There are _________ types of data tables
The tables that allows the user to change or rearrange the data, summarize the data and evaluate the
data using changing points of view is known as
The wizard that is used to suggest hints for doing a task
In a chart Y-axis is known as_________
In a chart X-axis is known as_______________
_________ is a set of tables that describe each of the data series
________ is used to differentiate one data series from another
The chart that contains only one data series is _________
The chart that holds the column chart is _________
The chart that display two or more data series on a surface is _________
The chart that is used to display discrete data
_________ are not allowed in a macro name
Which of the following tool cannot be used to view the excel web page_______
The wizard that used to build an interactive table from data existing on sheets
The chart that is used for displaying stock market information
In excel, the subtotal command also generates grand total after the last group subtotal_________
In advanced filter , the criteria occupying multiple columns but more than one row, is considered as an
________ criteria.
The stacked bar graphs can be represented in __________
A pie chart can represent only one data series at a time
The ______ generates a summarized report in tabular form in an interactive manner
Which one of the following statements related to stock chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100% literacy in the state.
Which one of the following will be the best tool that should be used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won
in totality to obtain majority to form the government. Which one of the following will be the tool that will
help the team ?
Which one of the following will be the tool that provides a way to view and compare the results of all
the different variations together on the worksheet ?
A ___________ is an excel file where the user stores his data
Spreadsheets are useful for _______________
Which one of the following is NOT the component of the pivot table ?
Excel allows upto ______ levels of sorting
Filtering rearranges a list to display the required records
The stacked bar graphs can be represented in _____________
The ______ generates a summarised report in tabular form in an interactive manner
Which one of the following statements related to stacked bar chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100% literacy in the state.
Which one of the following will be the best tool that should be used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won
in totality to obtain majority to form the government. Which one of the following will be the tool that will
help the team ?
Which following function is used in subtotal option ?______________
A workbook consists of many ________
Which two of the following statements related to pivot table are TRUE ?
Which one of the following is NOT a What-if analysis tool ?
The _________ wizard separates contents in a cell into different cells
A spreadsheet is a grid of rows and columns and is called as a ________
Pick out the window that is not a form of excel ___________
On an Excel sheet the active cell is indicated by…
Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of cells
A6, A7, and A8 are _____.
If a cell shows ####### , it means that _____.
Which is not an advantage of using computerized spreadsheets?
The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. The
use inputs different weights or amounts of exercise to determine the related physical fitness. This
"What if" program is most likely which of the followin
The difference between the highest and the lowest values.
Spreadsheets can be used for...
To select a column the easiest method is to …
If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as
All of the following are considered constants EXCEPT:
Which of the following may NOT be included in a formula?
Which of the following is NOT a valid mathematical operator in Excel?
Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?
Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?
How can you tell which cell in a worksheet is the active cell?
How can you change the active cell?
Which of the following would you use to change the font size of a cell in Excel?
The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________ menu.
In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the date
and time a file was last modified.
Which of the following commands will automatically adjust cell references in formulas?
Which of the following commands will remove cells, rows, or columns from a worksheet?
Which of the following options is NOT controlled through the Page Setup command?
Which command enables you to change the margins for a printed worksheet?
All commands are carried out on a rectangular groups of cells known as a:
Which of the following is a valid cell range?
In a copy operation, the cell(s) you are copying from is called the:
In a copy operation, the cell(s) you are copying to is called the:
Which of the following commands is needed to duplicate the contents of a cell in another?
A cell reference that does not change during a copy operation is known as
Which of the following is considered an absolute cell reference?
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what
will be the contents of cell E4?
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to cell E4,
what will be the contents of cell E4?
Which of the following commands is needed to transfer the contents of one cell range to another?
The F4 key is used to:
Which of the following quickly copies the formatting of a selected cell to other cells?
Which of the following will insert a hyperlink into an Excel worksheet?
Conditional formatting applies formatting to a cell based on:
If you enter a date into a cell, Excel stores the date as:
You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened that
worksheet again on August 31. What will be displayed in cell E17 on August 31?
The number of days between two cells containing dates can be calculated by:
The function key that is used to quickly edit the contents of a cell is:
What will be stored in a cell if 3/4 is entered in it?
A user‟s response to the InputBox function can be stored in:
The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to
row 10 is _____.
The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test.
To find the student with the highest mark, which of the following functions should be used?
Which chart type best shows proportions of a whole?
Which of the following is TRUE regarding chart types?
To select several cells or ranges that are not touching each other, you would _____ while selecting.
Your Institute teachers have set an assignment on „Studies‟. You are required to use a spreadsheet to
record all that you study on each day for four weeks. You decide to show each week‟s data with an
accompanying graph. What is the best way of doing this
What would be the best method to quickly copy the formula from the active cell to each cell below it?
To arrange rows in alphabetical order based on column A, you need to use the command _____.
What can you NOT do with a spreadsheet?
To print just part of a sheet, you would select what you want to print and _____ .
Spreadsheets can be used for...
The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is
_____.
Which of the functions is not valid for performing addition
The default orientation for the printed page is _____.
Which is not a valid cell address?
The World Wide Web was devised by _________
The useful URL schemes are_____ and______
The other ways of getting connected to the net are_____
BBS stands for______
USENET is a BBS on ____ scale
WINSOCKS is expanded as______
IETF Level 2 HTML DTD supports graphical browsers like _______
The space used by Netscape to store the retrieved page is called______
The principles, means and methods for rendering information unintelligible and for restoring encrypted
information to intelligible form.
A long string of seemingly random bits used with cryptographic algorithms to create or verify digital
signatures and encrypt an decrypt messages and conversations.
Protected/private character string used to authenticate an identity or to authorize access to data.
The successful act of bypassing security mechanisms of the system.
A set of rules and formats, semantic and syntactic, that permits entities to exchange information.
An attempt to get access to a system by posing to be an authorised person.
An action or event that might prejudice security.
According to information Technology Act, 2000, To investigate contraventions the controller of
certifying authority shall exercise the like powers to that of
Malicious software.
None the person who is known as father of Internet
This website is the biggest bookstore on the earth.
When we talk of Data Transmission modes, then ATM stands for
A sequence of bits or characters that identifies the destination and the source of a transmission.
The means of communicating between networks
A group of computers and other devices dispersed over a relatively limited area and connected by
communication links that enable a device to interact with any other on the network.
The term HTTP stands for
A NIC is considered as
A hub is a device that can connect
Which of the following is true concerning the function of a switch?
What do routers connect?
What does a router route?
Software which prevents external access to a system is termed
If four computers are connected to a hub and then to the internet, how many IP addresses are
required for these 5 devices?
Which of the following in an OSI layer
When creating a network from just two PCs, what kind of cable would be used to connect them?
An IP address is a
To construct a simple LAN of 4 computers, you would connect them with ______connect them
What happens to data that is ruined before reaching to receiver
Bluetooth is
Which is not one of the recognized IEEE sub layers?
The most preferred number system to represent a IP address is
A MAC address is of
Protocol is
A ............... is a LAN-based computer with software that acts as a controlling device for controlling
access to at least part, if not all, of a local area network and its available resources.
What is the biggest disadvantage of the Ring topology?
The .............. of the network concerns how network devices are physically (or optically)
interconnected.
The principal topologies used with LANs are:
What are the various types of bus architecture?
What are the various types of ring architecture?
In a ................., each workstation attaches to a common backplane via its own physical cable that
terminates at the hub
In a ............... , each work station is directly connected to a common communications channel
Which one of the following is NOT a network topology?
In a .............. , the cable system forms a loop with workstations attached at various intervals around
the loop
The Media Access Control (MAC) is a sub layer of the:
What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in
WAN speeds are
Accessing the Internet from a typical home PC requires the use of
To use the Internet, you
The worldwide web server uses the following standard interface to act as the middleware:
An NIC
Accessing the Internet from a typical home PC requires the use of
The most widely used network operating system on PC LANs is
JPEG and MPEG
To use the Internet you
A multiplexer is a form of
An ISP
FTP is
Telnet
A firewall is
A proxy server is
A search engine is
To look for information about interest areas on the internet, the user should use a
An ISP
FTP is
Telnet
Which of the following is a true statement about the OSI model layers?
Which of the following is NOT true about the Internet?
The traditional intent and impact of this common type of attack is to prevent or impair the legitimate
use of network resources.
A firewall is
Which of the following is NOT an example of a DoS attack that is popular among hackers?
A ____________ attack is when a hacker sends a continuous flow of packets to a system.
One defense option on a large network is to configure a ____________ to disallow any external traffic.
A proxy server is
Which of the following would be performed on a network server and not normally on individual
workstations?
What can be said about the safety of the Internet?
To secure communication network against wire-tapping the most effective control is
One way that a virus CANNOT spread throughout a network is:
Which of the following is NOT a means of monitoring employee use of company technology?
____________ would be used by parents to monitor their children on their home system.
The formal rules and parameters which are established to permit a microcomputer to communicate
with the mainframe computer as though it was a terminal of the mainframe are called
The two most common tools used to help with extracting information are:
Which of the following would NOT be considered an example of cyber terrorism?
Which of the following would be a form of cyber terrorism?
Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life?
An organisation is upgrading its telecommunication lines. Which is the least important objective while
upgradation
A company posts a price list of its products on its website. The advantage to the customer is that the
company can
Which of the following is an easy-to-use service to get information on someone?
Which of the following pieces of information would NOT be found online?
Which of the following is the most common danger on the Internet?
The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive
information is called _________________.
Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to block:
What is the best means of protection from cyber stalking?
Which of the following is not an appropriate control over telecommunications software
Encryption techniques can be implemented in Hardware-Software
Which protocol would be used to download a free anti-virus program from the Internet?
The major advantage of the checksum program is when it
Which of the following is a Web browser?
A Web page is another name for -----------
Domain names must contain a description of the type of organisation that the domain represents. A
very common abbreviation used include:
A standard language for creating and formatting Web documents is:
The Web page format in which all elements of a Web page are saved as one file is called:
Which of the following requires an Internet connection?
Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer
how would he do this?
Which of the following is used to update a Web query?
You download from the internet, a screensaver, a ten-second sound file and a ten-second music video
clip. You also add a hyperlink. Which of the media elements has the greatest effect on the file size?
When saving a photograph for use on a website, which format should you choose?
While researching the Direct taxes assignment, you find a useful website. What is the most efficient
way to access the site at a later time?
A system that uses the Internet for business-to-business interaction is called a(n):
A block of text automatically added to the end of an outgoing email is called
_________ refers to the use of Internet technologies for placing telephone calls.
Most client/server applications operate on a three-tiered architecture consisting of which of the
following layers?
Which do you NOT need to connect to the Internet?
What does FTP stand for?
What is the purpose of DNS?
Which of the following is NOT a properly formatted IP address?
Which of the following is a properly formatted email address?
The Internet is controlled by whom?
What does IRC stand for?
If you do not pick up your email for a week...?
What does HTML stand for?
What is a disadvantage of joining a mailing list?
In Powerpoint2000 ,the built-in professional design elements are
Selection handles are the 8 small ___________ that appear around the object, when an object is
selected
The _______ is an invisible matrix of vertical and horizontal lines that covers the entire slide
workspace
_______ are drop-down menus that appear when the right mouse button is clicked on the screen
element
________ and ______ have the ability to add a lot of visual impact into the PowerPoint presentation
_______ is a motion picture or any animation file
In visual basic, when a record pointer reaches to the last record, _______ property of a recordset
object is automatically set to ______
In visual basic, the explorer view of a project is displayed in ___________
In visual basic, when a record pointer reaches to the first record, _______ property of a recordset
object is automatically set to ______
In visual basic, _______ is a method to convert a string into integer.
In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type of shape
should we get?
In visual basic, a timer event is only available in timer control.
In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any object
In visual basic, _______ is a property of a textbox control to set a color of a text.
In visual basic, _______ property of a textbox control is set to _______ to underline a text
In visual basic, _______ property of a textbox control is used to change the size of text.
In visual basic, the interval property of a timer control is given in ________
In visual basic, _______ property of listbox control counts the number of items in the list
In visual basic, the properties of various controls can be set using __________
In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a messagebox
function.
In visual basic, ________ is a function which displays a message and it also allows the user to enter
values in a form object
In visual basic, using a data control, ________ is a recordset type which allows to add a new record
and also to update existing record in a recordsourse object
In visual basic, while closing a form _______ event of a form object is triggered earlier to terminate
event.
In visual basic, to give a backcolor or to bring in a picture to a command button can only be done if we
set the style property to ______
In visual basic, a method RGB(255,0,0) will generate _______ color
In visual basic, a method RGB(255,255,255) will generate _______ color
In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.
In visual basic, if a user uses a function key F4 _________ becomes visible.
In visual basic, when a textbox control receives the focus ________ event is triggered.
In visual basic, a form is a ________ object.
Microsoft visual basic is a Rapid Application Development tool.
In visual basic, when a form object appears on the screen _________ event is triggered.
In visual basic, to display text on a label object _________ property is used
In visual basic, _______ object is used to access the database and also to manage the data in the
database.
In visual basic, when a checkbox control is checked _______ property is automatically assigned with
1.
In visual basic, _______ keyword is used to declare a variable
What is the extension of the Visual Basic project file that stores the design of a user control.
Which event of a text box would you use for validating the data entered by the user?
Which of the following statements forces inline error handling?
The _______ method resets the contents of bound controls to their original values when the user
clicks on the cancel button.
To deactivate the Form UnLoad event, you make the following change in the function definiton:
How many root nodes can a TreeView control have?
A project group is a Project which:
Procedures declared in a _____ are local whereas procedures declared in a ______ are available to
the whole application.
How can you keep the user from exiting a form by clicking the Close button?
The _______ property enables Visual Basic to draw complete images in memory before displaying
them on the Screen.
You want to display the code and the description of an error. What would be the correct syntax?
What is the purpose of the Image List Control?
Which method would you use to get a free or unused File identifier while opening any file:
Which property procedure is used to retrieve the value of a property?
Which of the following can be shown to the user using the Common Dialog control in VB?
Which of the following are not properties of Command Button:
Which events enable you to determine which key was pressed by the user?
In order to access a file in Non-textual format, you have to open file in:
Visual Basic displays information depending upon the current value of two properties of the form,
called:
Which of the following procedure types will execute when you assign a value to a property of an
object?
In order to overlap the controls (say a command button) during design time, we use the „Send To
Back‟ or „Bring To Front‟ option from the Edit menu. To change it dynamically (i.e.during program
execution) we need to change:
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program.
The caption and the name properties of the command button:
You try to initialize a new Object variable with the following line but receive an error. What could be the
possible cause? Set MyVar = New Classname
Which of the following will perform a direct execution of a Command object?
The vb Critical symbol displays:
vbYesNo is an example of a(n):
The primary difference between the MsgBox statement and the InputBox function is the:
Which of the following is TRUE about a protected form (i.e., a form where the Protect Form button on
the Forms toolbar is toggled on and is assumed to remain in that position)?
Which event is triggered when the user moves to another open form?
The user can use ______ to remove the undesirable part of the image
The power presentation has a _____ for a set of compatible colors
The set three colors used for graphs and for secondary slide items is called as
There are ______ types of charts available in PowerPoint
_______ charts are useful while showing variations over a period of time
_______ are the individual pages of a presentation
A PIE Chart is a ____ diagram that depicts the relationship between a whole and its parts
Each individual piece of data in a series is called a/an
PowerPoint launches an OLE-compatible application called
When the user double-clicks on an organization chart object in PowerPoint
The _____ are used for selecting, editing and viewing objects in the chart
Manager box tool in organizational chart window is
The custom drawing tools are _______ by default
Click on the box tool ______ to draw three boxes
There are ____ default fields available in all boxes of the organizational chart
The _____ tool is used in the same way as we use a pen to draw a table
A/An _______ consists of smaller printed version of the slides
The size of the object can be changed using the ______ tool
_______ is the process through which the slides in the current presentation are included in another
presentation or application
________ can be used to create charts as well as worksheets
PowerPoint can import text files that have been saved in ______ format
PowerPoint outlines can have _____ outline levels
When a file is saved with _____ extension, the graphics and text are also saved along with the slide
The hidden slide is
____ effect is used to introduce a slide during a slide show
A _____ is a special effect that determines how the objects appear on the slide
The notes page is formatted based on the
Pick the odd man out of the following
When a new presentation is opened ,powerpoint creates slides that have a width of _____ and a
height of ______ with the landscape orientation
The default orientation for notes ,handouts and outlines is ____ orientation
Build effect is also called as ______
Graphics for web pages are automatically stored in ____ format
A _______ is used to jump to any slide in the presentation
The ______ language has been incorporated into PowerPoint
In PowerPoint _____ is a series of commands that are executed in sequence
The macro will be activated
Developers can easily add ____ to PowerPoint 2000 by using the programming interface
______ determines the order in which order in which the slides will be displayed during the show
_______ is used to organize and develop the contents of a presentation
If we save the presentation file as a metafile, it can be opened using
With reference to autocontent wizard for creating a new presentation, which of the following
statements are not true
Which of the following statement is not TRUE
With reference to changing the order of slides, which of the following statement is not true
Which of the following definitions are not true
Which of the following statements are not true
Which of the following definitions are not true
The options available in the common task toolbar does not include
With reference to chart, which of the following statements are not true
The format of the text entered in a title, subtitle, or bulleted-list object is determined by the format
settings in a special slide called -------PowerPoint provides a _________ that searches the entire presentation i.e., all the text objects in all
the slides, outlines, notes and handouts for spelling errors
PowerPoint's drawing toolbar contains _______ drawing tools
Click _______ on the rectangle drawing tools enables us to draw multiple rectangles
An example of the components of a multimedia presentation could include
Which of the following formatting elements can be applied to a PowerPoint diagram using the
AutoFormat tool?
Which of the following formatting elements can be applied to a PowerPoint diagram using the Format
AutoShape command?
What happens when you double click a blank graph placeholder in a PowerPoint presentation?
The legend in a Microsoft Graph chart is:
Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best
chart type if you want to emphasize the total sales of each region?
Which of the following actions will enable you to insert a graph into a PowerPoint presentation?
If you are editing a slide containing a Microsoft Graph, how do you display the underlying datasheet?
How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished
creating the chart?
What happens when you click the Datasheet button on the Microsoft Graph toolbar?
What happens if you single click a chart that is not currently active?
What happens if you double click a chart that is not currently active?
Using custom animation effects, you can build:
Which of the following animation effects can be added to a slide?
Which of the following animations effects can be added to a slide?
Which keyboard key is used to select more than one picture on a slide?
Custom animation can be used to affect ONLY:
Which of the following best describes the information that appears on the advanced timeline?
Which of the following objects can contain custom animation effects?
What type of program allows an object within an image to be edited without affecting other objects?
Which of the following animation effects can be added to a slide?
Which of the following is TRUE regarding the Datasheet?
Graphical software tools that provide complex analysis of stored data are:
Which of the following statements is TRUE regarding PowerPoint diagrams?
Which keyboard key combination is used to undo the previous command(s)?
Microsoft visual basic project file has _______ file extension.
In visual basic, _______ method is used to add an item in a combobox
In visual basic, _______ method is used to load picture during runtime in an image control
In visual basic, to populate a drive list box with a directory list box __________ statement is used
In visual basic, to display a message in the run time _________ function is used
In visual basic, to populate a directory list box with a file list box ________ statement is used
In visual basic, ________ is a property of a recordset object which counts the number of rows in a
recordsourse object
In visual basic, using a data control, a record can only be added from the last record. Adding a new
record is only possible using _______ method of a recordset object.
In visual basic, using a data control, a record is saved to a recordsource object using _______ method
of a recordset object.
In visual basic, using a data control, to navigate to the previous record ________ method of a
recordset object is used.
To deactivate the Form UnLoad event, you make the following change in the function definiton:Private
Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the Form from closing, you
will set the:
_______ is a word processing that is a member of the office 2000 family
The feature that enables user to type anywhere in a document without pressing or tab
The______ feature allows the user to copy and paste upto 12 items at the same time in an application
______ and _____ key combination will extend the selection by one character on the left and right
_____and_____ are improved layout in Word 2000
The easiest way to create a document in word is
In Office2000 environment the tool that makes work easier for us is_____
A short description of a tool bar button called the ______ is displayed when the mouse pointer is
allowed to stay for a second on the button
The _____ helps us to keep track of the margin of the page
The keys that are used to navigate between headers and footers are
Pick out the element from the following that dose not form the type of tabs for the Word 2000
_______are blueprints or patterns for documents of a certain type
The______ is used for quickly setting paragraph indention using the mouse
Word art is text with
AutoShapes in word can be created by accessing the _____
By default, a document consists of_____ section
The dialog box that is used to determine the documents margins is
________ is a box surrounding a page on all slides or a line that sets off a paragraph on one or more
slides
The key that is used to perform a task to select all t he text in the documents is
The key that is used to indent a paragraph is
The key that is used to change the font from the current positioned in a document is
The key that is used to change the style of the document that is from that normal to heading1 or
heading1 to other document styles.
'Set mapping' Check control that follows a text-type validation, we use ----------------- application for
data analysis.
Excel can import data from other databases for the data analysis.
A System Auditor can uses CAAT tools to analyze data
In the case of the ---------- control, it is ensured that the data in combination with other fields are
reasonable as per standard set by an organisation.
--------------- function searches for a value in the leftmost column of a table and then returns a value in
the same row from a column that we specify in a table
Most of the tools use in Data Analysis depends on
How do you define analysis of an information system?
What areas need to be considered in the SOFTWARE design process?
What is the function of systems software?
Formatting a disk results in all the data being...?
What is Direct Implementation?
What is parallel running?
What documents are produced during the development of a system?
What are User Guides are used for?
Systems software can be categorised into:
Which storage device cannot be erased?
Application software are programs that are written
Which bus carries information between processors and peripherals?
Convert the decimal number 2989 to Hexadecimal
Which bus controls the sequencing of read/write operations?
What are utilities?
Numbers are stored and transmitted inside a computer in
The original ASCII codes
A Nibble corresponds to
A gigabyte represents
A 32-bit processor has
A parity bit is
he contents of these chips are lost when the computer is switched off?
Clock speed is measured in
Cache memory enhances
CISC machines
Which parts of the computer perform arithmetic calculations?
Every data from the primary memory will be erased if
An RS-232 interface is
For print quality you would expect best results from
ROM
A UPS
smart card
Laptop computers use
Multiprogramming refers to
Multitasking refers to
What are small high speed memory units used for storing temporary results?
A good way to exchange information that changes rapidly is through
Multiprogramming is a prerequisite for
Timesharing is the same as
______ is the default view in Word used for typing Editing and Formatting the Text
The short-cut-key that is used to indent a paragraph spacing in the documents is
The short-cut-key that is used to paste the selected text
The short-cut-key that is used for paragraph spacing(1.5)
The box that separate text from the document and allows it to behave like an independent object is
known as
The object that is used to provide information like the title of the book, name of the chapter, page
number etc.
The object that helps us analyzing data statistically is known as
To highlight certain parts of a page to set it apart from the rest of the page we make use of the
following features
To clear all the tabs in a document the option that is clicked from the tabs dialog
The dialog box that is used to incorporate picture bullets into our documents or web pages is
The object that composes of set of tools which helps to create and work on different shapes like
rectangles, circles, flowcharts etc.
When word is opened a new document called_____ is displayed, where the user starts typing the
content right way
______ is an online dictionary maintained by word to obtain synonyms for words
The thesaurus is invoked by pressing_______
When a new table is created the insertion point flashes in the _____
By pressing the _____ key inserts a blank row after the last row in the table
The ______ option enables us to convert text into a table format
A table consists of ______ that contain text or graphics
The _______ option in word allows the user to automatically correct misspell words as and when they
are typed
______ is a facility that enables recording and replaying of a sequence of keystroke
In Word Macros are written in _____
In Word 2000 the macro dialog box is activated with the help of ____ key combination
________shows how a document would look like when published on the web or on an intranet
______ is a software for sending and receiving e-mail messages
________is the coding system used to create web pages
The network that makes information easily accessible across various networks is _______
Which of the following statements are false with reference to the use of a header row source for a mail
merge
With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false
The alignment available for tabs does not include
Which of the following statements related to a Section Break are True
The user can set a spelling checker to skip the marked part of the next
New option under the file menu of word creates a new blank document that is based on the normal
templates
The user can split the screen only into two parts
The features that enables the user to type text graphics tables anywhere in the document without
pressing enter or tab
The user can modify the picture from the clip art
With reference to auto correct which of the following statements are false
With the reference to password protected documents which of the following statements are false
The alignment available for tabs does not include
Which of the following statements are False
Drop Cap tool does not work for the contents in the table format
The user can split the screen only into two parts in MS-Word
The special symbols that are inserted using "insert symbol" option of the word can not be printed by
the printer as they are not standard keyboard symbols
The "format columns" option allows to create columnar text up 12 columns only.
The document that makes the user to organize and maintain a long document, such as multipart
report or a book consisting of chapters
The view that enables us to view how objects will be positioned on the page when it is printed
The mode that is initialized or toggled to if the user is in a position to overwrite the text in the word
Veena is entering a paragraph in a word processing program. When the cursor gets to the end of a
line, what is the best way to get the cursor to the next line?
How are data organized in a spreadsheet?
Which key moves the cursor to the beginning of the next line of text?
Veena typed the following sentence: "The girl was very beautiful." In which word processing utility
could she find a synonym for "beautiful"?
Using an electronic bulletin board, Seema can do all of the following except which one?
Aryan has created a ten-page story, but only wants to print the first two pages. What printer command
should he select?
What process should be used to recall a document saved previously?
Which is used to indent text within a document?
Desktop publishing is a more sophisticated form of which of the following types of software?
What is a Word Processor used for?
What is a picture that is saved on a diskette and can be pasted into a document?
What is a Word Processor used for?
What basic tools would you find in the Edit menu of a word processor
What is a header in a document?
What hardware is essential for a word?
The user could take a picture from a magazine and insert it into the document by using a
What basic tools would you find in the Edit
Assume you are creating a two-column newsletter. Which type size is the most reasonable for the text
in the columns?
Given the default left and right margins, and ½-inch spacing between columns, the width of each
column in a two-column document will be:
Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot see
any columns on the screen. What is the most likely cause?
While word processing, in which of the following situations would Tom use the "Copy" command?
What does a document contain?
Before submitting your work you want to find any words spelt incorrectly. Which of the following would
you use?
What command in a word-processing program can be used to change the word „him‟ to „her‟, and also
the word „he‟ to „she‟ in the given phrase? “On a cold and still night, the only sound that could be heard
was the owl that had ade its home in the nest outs
What edit commands would you use to insert a paragraph from one document into another document,
while still keeping the paragraph in the first document?
Which of the following statements would NOT be a reason for showing suggested revisions in a Word
document without changing the original document?
Which statement is NOT true regarding revisions made in a Word document?
How are suggested changes entered for review on an initial Word document?
Which of the following is TRUE about saving a document using the Versions command?
What happens when you open a document that has been saved using the Versions command?
You have used the word „discover‟ four times in an English essay you have created using a word
processing program. You would like to find another word of similar meaning to use instead of
„discover‟. Which of the following would you use to do this?
When opening and working with multiple versions of a document, how can you tell which is the most
recent version?
Various fields are added to a regular document to create a special document called a form through the
____________ toolbar.
Which of the following types of fields CANNOT be inserted into a form?
Which of the following is TRUE related to editing comments in a Word document?
What is a header in a document?
In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2.
You would like to make this paragraph start on page 2.What would be the best way to do this?
Tables in a document help you to easily arrange all of the following EXCEPT:
To identify a document, it is helpful to include the file name on each page as a
Which of the following tools will copy the formatting of selected text to other places?
What is the name of the process of determining the cause of errors in a macro?
Drop caps are added to a Word document using the ___________ menu.
A reverse in a newsletter is:
A pull quote is best emphasized by:
Which of the following definitions is CORRECT?
Pertaining to newsletters, which of the following cannot be changed using the Columns command
dialog box?
As related to type size, how many points are there to the inch?
Assume you are working on a newsletter in which the masthead extends across the top of the entire
first page. The rest of the newsletter has two columns. What is the minimum number of sections in the
newsletter?
Which of the following is NOT correct with respect to page, column, and section breaks?
Which of the following would be the most appropriate font for a newsletter headline?
Which of the following is the default Word column width?
Sequence Check is a --------------- level control check.
Analyse data over two or more periods is called ----------------------- analysis
We use Hash Total to identify ------------ within a series where there is a definite relation between
items
Analyse fields by arranging them into rows and columns is called
--------------------- function searches for a value in the leftmost column of a table and then returns a
value in the same row from a column that we specify in the table.
To import data from Access to Excel ,it is not possible to link between Access and Excel sheet
The GAP detection options can be used to test for completeness of data.
Exception testing can be used to identify ----------------- items
Data validity test represents
Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that the data
has been provided is for the correct audit period
In Range Check , the data may not be in proper sequence but should be within a predetermined range
In ---------------- Check data entry follow a particular sequence and also a predetermined range.
Virtual memory is
Multiprocessing is
To help keep sensitive computer-based information confidential, the user should
What is the function of a disk drive?
A 4GL is
A nanosecond is
What small, hand-held device is used to move the cursor to a specific location on the screen?
The memory address register is used to store
The memory data register is used to store
The instruction register stores
Which of the following is used to indicate the location on the computer monitor?
A mathematical procedure that can be explicitly coded in a set of computer language instructions that
manipulate data.
Which of the following translates a program written in high-level language into machine language for
execution?
Detecting errors in real memory is a function of
To find where a file has been saved on disk, the user should
A series of instructions telling the computer how to process data or files is defined as a
To ensure that data is not lost if a computer system fails, the user should
Having a single CPU alternatively process tasks entered from multiple terminals is called
The place in the CPU where the data and programs are temporarily stored during processing is called
the
All are examples of computer software except
Computer manufactures are now installing software programs permanently inside the computer. It is
known as
Which of the following file organisation forms most efficiently allows access to a record
The part of the computer system controlling data manipulation is called the
For direct access storage devices the recording area is divided into
The data hierarchy from the largest to the smallest is
Which of the following hardware or software system controls provides a detailed record of all activities
performed by a computer system
Which one of the following parts of a computer is necessary to enable it to play music?
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes
of sound and 1 minute of video. Which of the four different media listed takes up most space on the
CD-ROM?
Which one of the following printers is suitable for printing sprocket fed carbon copies?
Multimedia software can be most productively used for
To be effective a virus checker should be
Which one of the following software applications would be the MOST appropriate for performing
numerical and statistical calculations?
Passwords enable users to
How many bytes do 4 Kilobytes represent?
Back up of the data files will help to prevent
Which one of the following is the MOST common internet protocol?
The advantage of a PC network is that
The term A:\ refers to
UPS stands for
The main problem associated with uninstalling software is that
You are conducting research for a Income Tax assignment. The raw facts you collect are called
A flow chart is the
A voucher entry in Tally is done for
Passwords are applied to files in order to
Each of the following is an enabler of IT-business alignment except:
The basic systems model is used to describe virtually all information systems and it consists of the
following elements:
What is a computer-aided design system?
A(n) __________ offers a solution package for an entire industry.
File extensions are used in order to
Information systems controls include all of the following EXCEPT:
Hashing for disk files is called
Components of expert systems include: a) inference engine; b) user interface; c) knowledge base; d)
fuzzy logic
Black box testing and white box testing are part of:
What is the term used to describe the point of interaction between a computer and any other entity,
such as a printer or human operator?
The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility
Which of the following is an acceptable way to shut down the computer?
Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best way to locate the files?
Components of an information system model are: a) applications architecture; b) functional
architecture; c) technology architecture; d) information architecture
Benchmarks form part of:
Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals
Which is not part of help desk documentation:
Testing of individual modules is known as:
Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface
architecture; d) presentation architecture
Which is part of installation testing:
The computer operating system performs scheduling, resource allocation, and data retrieval functions
based on a set of instructions provided by the:
Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio
Which of the following procedures should be included in the disaster recovery plan for an Information
Technology department?
Designing relationships among components is part of:
Several Computers connected together is called:
Which network topology uses a Hub?
Which of the following topologies is used for Ethernet?
Application software are programs
Which type of file search method requires a computer first read all locations preceding the desired
one
Which of the following areas of responsibility are normally assigned to a systems programmer in a
computer system environment?
Which of the following is recommended when many searches for data are required
It is unlikely that a magnetic tape containing several thousand blocked records can be used on two
machines of different architecture directly because
Which component of the CPU has the most influence on its cost versus performance
Which of the following terms applies to network used to connect computers with other computers,
peripherals and workstations that are in fairly close proximity
Intelligent terminals differ from dumb terminals in that they
A computer is to be linked to 8 terminals using a single communication link. To permit simultaneous
terminal operations, communication path will require which of the following
A modem is a device that
A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and printers.
This type of network is called a
A computer based system for sending, forwarding, receiving and storing messages is called an
If a workstation contains a processor, monitor, screen manipulation device, printer, storage and
communication capabilities, it is said to be
Terminal hardware controls include
RS-232 is a
What is a compiler?
What are the stages in the compilation process?
Which of the following is not a data transmission coding scheme
What is the definition of an interpreter?
A device used in data communications to divide a transmission signal into several sub-bands is known
as a
Third generation languages such as COBOL, C, and FORTRAN are referred to as
Serial Communication is used over long distance because it
In what areas is the COBOL programming language used?
The primary function of a front-end processor is to
What is the first stage in program development?
Which of the following is not used for data transmission within a local area network
What is System Analysis?
A device to device hardware communication link is called
What will a good software provider consider?
The topology of a network can be each of the following except
What is the 8-bit binary value of the decimal number 85?
Which is the most common data transmission error checking method
What is the decimal value of the binary number 1111?
Which of the following devices merges communication signals onto a single line
What is the decimal value of the octal number 215?
Which tool is used to help an organization build and use business intelligence?
Cache memory enhances
What is the decimal value of the hexadecimal number FF?
Numbers are stored and transmitted inside a computer in
What is the hexadecimal value of the decimal number 1476?
A byte corresponds to
What does EBCDIC coding of numbers mean?
A Kb corresponds to
What is the binary sum of 01011 and 00101?
Information is stored and transmitted inside a computer in
Where would you find the letters QWERTY?
A parity bit is
How did the computer mouse get its name?
Clock speed is measured in
What are you most likely to use when playing a computer game?
CPU performance may be measured in
A digitising tablet can be used for?
In processing cheques which of the following I/O techniques have banks traditionally used
Which of the following is a pointing device used for computer input?
A UPS
What does a light pen contain?
The capacity of a 3.5” floppy is around
What general term describes the physical equipment of a computer system, such as its video screen,
keyboard, and storage devices?
Where would you find the letters QUERTY?
What are you most likely to use when playing a computer game?
A digitising tablet can be used for?
Which of the following is a pointing device used for computer input?
What input device could tell you the price of a product
Where would you find a magnetic strip?
Hard copy is a term used to describe...?
What are the individual dots which make up a picture on the monitor screen Called
A daisy wheel is a type of...?
What input device can be used for marking a multiple-choice test?
Laptop computers use
QWERTY is used with reference to
What input device could tell you the price of a bar of chocolate?
A GUI is
Where would you find a magnetic strip?
Multiprogramming refers to
Multitasking refers to
Multiprogramming is a prerequisite for
UNIVAC Computer belongs to the
Timesharing is the same as
Name the first Indian Super Computer?
Disk fragmentation
The technology which is used to check answer sheets of multiple-choice questions in civil services or
similar examinations is: -
A compiler is
Which printer among the following is fastest
“Zipping” a file means
What does acronym VIRUS stands for
An impact printer creates characters by using...?
A client-server system is based on
A nanosecond is
A procedural control used to minimize the possibility of data or program file destruction through
operator error is the use of
_______ software enables users to send and receive data to/from remote computers
A _____ is a running instance of an application
Splitting of CPU's time for different tasks _______ prevents time slicing
______ computers are used in large organizations for large scale jobs which have large storage
capacities
_______ is responsible for all calculations and logical operations that have to be performed on the
data
______ printer use laser light
______ software enhances the user to enter ,store, manipulate and print any text
______ software enables users to send and receive data to/from remote computers
_______ is the temporary storage place for deleted files
_____ is a collection of related fields
_____ language consists of strings of binary numbers
______ symbol is used to represent processes like assigning a value to a variable or adding a number
_______ is an example for micro computer
_________capability supports concurrent users doing different tasks
The ______ do not have processing power of their own and has only a screen, keyboard and the
necessary hardware to communicate with the host. For this reason, the terminals are referred
as_______________
A______is nothing but a PC with a network operating system
_____system is responsible for handling the screen and user I/O processing
The______ handles data processing and disk access in a Client/Server architecture
Both the DBMS and the application resides on the same component in a ____system
When all the processing is done by the mainframe itself, the type of processing is sometimes called as
DBMS models can be grouped under____ categories
______is the most advantageous database system
A new user initiates a new process of execution at the background,while the user can continue his
query process as usual in the foreground. This situation is referred to as ______
The process of data being automatically written to a duplicate database is called______
Modem stands for __________ .
Multiple changes to the same record or a field are prevented by the DBMS through______
_________allows an application to multitask within itself
LAN stands for __________ .
New process of execution is referred to as______
ISDN stands for _______.
_____________ is the Worlds largest computer network .
_______is/are a popular front end tool
When LAN connected together ,it is called __________ .
TCP/IP stands for _________ .
Data is broken into small unit called __________ .
SMTP stands for __________ .
The __________ protocol is a network protocol to be built for the World Wide Web .
ATM stands for __________ .
The computer which can receive data from other computers on the network and print it is _______
The hardware and the software requirements together form the_____
ATM, Asynchronous transfer mode is a __________ technology.
__________ is designed telephone system
Expansion of ISDN is ________
Expansion of WBT is ______________
_________ connects LANs.
Collection of instruction is called a _____
Combination of alphabetic and numeric data is called _____ data
Computers can be classified based on ______,______and _______
_________ are used in large organizations for large scale jobs
_______ is responsible for feeding data into the computer
_______ is the capability of the o/s to run numerous applications simultaneously
_______ involves conversion of raw data into some meaningful information
_______ is responsible for obtaining the processed data from the computer
_______ printers use light to produce the dots needed to form pages of characters
Hardware components in a computer are _____,____,_____,______
_______ software are programs that are complex and can be developed or purchased
_______ is a set of special instructions used to communicate effectively with the computer
_______ converts a high level language into machine language
_______ translates assembly language program into machine language instructions
op1
Ctrl+C
op4
ans
None of
ALT+F1 CTRL+F1 the above A
None of
Tally IMP Tally INI the above A
false
A
None of
ALT+F3 CTRL+F3 the above B
None of
Bill
A or B
the above C
Three
Four
Five
B
None of
Alt+C
Alt+Ctrl+C the above B
TRUE
FALSE
TRUE
*
FALSE
$
&
Cash Flow
Statement
s
Two
Alt+D
Create
Informatio
n
Fund Flow
Statement
s
Three
Alt+X
Alter
Informatio
n
Ratio
Analysis
Four
Ctrl+T
Display
Informatio
n
F4
F5
F6
Alt+P
Ctrl+P
F1
Tally
ODBC
TRUE
F3
Invoice
Two
op2
op3
A
A
^
A
Puchasing
,
Puchasing
Accounts Receiving
and
Puchasing payable
and
Accounts and
and
Accounts
payable
Receiving Receiving payable
D
Mone of
Single
Multiple
A or B
the above A
Tally Audit Statistics
Bin
True
Enterprise
Data
Interchan
ge
TRUE
2
data
element
Data
False
Enterprise
Data Informatio
n
FALSE
3
data
record
All of the
above
One
Ctrl+D
D
A
B
All of the
above
D
F7
None of
Shift+P
the above
Journal
Day Book Book
None of
Sub
the above
Electronic
Data
Interchan All of the
ge.
above
4
Field
5
All of the
above
C
A
B
B
A
C
A
C
B
FALSE
Display
stock
valuation
method
TRUE
Ledgers
Groups
Journals
Personal
Nominal
Real
Manual
Balance
Sheet
Journal
Automatic None
Profit &
Journal
Loss
Book
Physical
Stock
Stock
Journal
Transfer
Filled
11
FALSE
managem
ent by
objective
F4
Receipt
16
TRUE
managem
ent by
exception
F5
Main
Location
Primary
True
False
Ledgers
0 to 9
Reports
1 to 100
Supplier
Report
F2
Net
Transactio
ns
True
F6
function
key
Sales
1-4-1995
to 31-31996
True
B
Open
Change
Calculator Period
Issue
18
electronic
data
analysis
F6
Primary
Cost
Category
None of
the above
None of
the above
None of
the above
All of the
above
All of the
above
Horizontal Vertical
B
B
D
A
Reversing
Journal
B
None of
the above A
21
B
B
All of the
above
Alt+f5
B
B
All of the
above
C
A
None of
Vouchers the above
10 to 60 None
All of the
Suspense Order
above
Informatio None of
Output
n
the above
F4
Ctrl+f2
Ctrl+f4
Closing
Balance
False
Alt + f6
function
key
Purchase
s
1-4-1996
to 31-31997
False
B
A and B
F7
function
key
A or B
1-4-1997
to 31-31998
A or B
C
A
A
C
A
None of
the above C
A
None of
the above A
None of
the above B
None of
the above B
A
None of
the above C
Balance
sheet &
profit &
loss profit
& loss and
trial
balance
Profit &
loss and
trial
balance
Main
location
Primary
Security
mechanis Ledger
m
a/c
F5
F7
Cash and
profit &
Cash and
loss
bank
C
None of
A or b
the above B
a or b
None of
the above
F9
None of
the above
None of
the above
Regional
setting
Balance
Sheet
F10
None of
the above A
None of
the above B
F11
B
Both A
and B
4
None of
the above C
1
B
F10
Profit &
loss a/c
FALSE
F11
F12
A
Budget
None
C
A
F3
TRUE
Main
location
Ctrl+F3
FALSE
Alt+F3
Primary
Symbol
Tally.imp
Stock
summary
By
pressing
F11
function
key
TRUE
128
Ledger
Accounts
Tally.ini
Stock
journal
a name
Sales
return
Cost
category
F8
an identity
Purchase
return
Stock
Company items
creation
units
Trial
Balance Daybook
F7
Alt + F7
Changes
in
transactio Changes
ns or
in Ledger
vouchers Masters
2
3
A and B
F9
Balance
sheet
TRUE
A or b
Stock
analysis
In 'comp
During the info ->
creation of security
a
control'
company option
FALSE
228
28
SubGroups
Groups
A
D
C
A
None of
the above C
A
None of
them
B
None
A
None of
the above A
None
16
B
A
C
B or C
A
Administr
ator
Owner
One
company
to another
company
created
withon
Tally
Package
Inventory
subsidiary
.
Other
programs a
spreadshe
et or a
database Both A
file.
and B
Cash
disbursem Cash
ents.
receipts.
Will
produce a
Does not more
require as accurate
stringent a set of
set of
financial
internal
statement
controls. s.
data to be
transferre
d to
memory
Contingen
cy
Planning
Data Entry TallyVault A
data that
has been
transferre
d from
memory
System
feasibility
report
NIC Card VSAT
the
address of
a memory
location
None of
the above
Payroll
transactio
ns.
Eliminates
the need
to
reconcile
control
accounts
and
subsidiary
ledgers.
an
instruction
that has
been
transferre
d from
memory
Capacity
Planning
Exception
reporting C
Will be
more
efficient at
producing
financial
statement
s.
RAM
Control
totals for
Identificati one or
Record
on
more
Count
Number
fields
Storing
Writing on
informatio
a hard
Printed
n on the
board
output
hard disk
Voice
activated Voice
Visual
broadcasti answer
audio
ng
back
board
File
Validity
Boundary protection
check
protection ring
C
A
C
C
AGP Card B
End-of-file
and endof-reel
code
B
None of
above
None of
above
Limited
access
files
B
C
C
Coloured
spots
Pixels
Identificati
on
File Name number
Storage
Printer
device
Pixies
None of
above
Reel
Number
Pointing
device
Batch
Total
None of
above
System
Logs
Console
Log
Data
Dictionary B
Physical
Security
Electricall
y charged An ink
ink
pen
Restrict
physical
access
A pen
A
cartridge
An inked
ribbon and
print head
Require
Use only user
unremova password
ble media s
Read
Magnetic
tape
D
A
Paper
Eraser
None of
above
Make
duplicate
copies of
files
None of
above
A drum
A ribbon
A cassette A
Distribute
d policies
or
procedure
s
None of
A ribbon above
An INK
None of
RIBBON above
Storage
None of
Size
capacity above
Read and None of
Write
Write
above
Floppy
None of
PAN drive disk
above
Centralise
d function
Separatio for PC
n of duties acquisition
A
cartridge A drum
A print
A laser
head
beam
Volume
B
Centralise
d function
for PC
Dispositio
n
to an audit
departme
nt's
products to add
all the
& services customers above
Oracle
ACL
True
True
False
False
JCL
none of
these
none the
above
C
A
C
A
A
C
C
B
A
A
A
A
B
Serial
access
medium
Random
access
medium
1.44MB
20 GB
A CDROM
A floppy
disk
A CDROM
A floppy
disk
Read
By a
sunny
window
ROM
chips
RAM
chips
Write
By
magnet
objects
RAM
chips
ROM
chips
A parallel
access
None of
medium
above
None of
700MB
above
Magnetic
tape
None of
storage
above
Magnetic
tape
None of
storage
above
Read and
Write
Not
Serial
access
medium
None of
above
None of
above
None of
above
None of
Registers Logic bus above
Control
None of
Registers unit
above
None of
1 bit
8 bits
above
ROM
None of
chips
CACHE
above
A
Random A parallel selective
access
access
access
medium
medium
medium
Network
software
and
security
software
Systems
software
and
applicatio
n software
ALU
CPUs
0 bits
RAM
chips
In a
drawer
CDROM
chips
DRAM
chips
Business
software
and
games
software
Mainfram
Supercom Personal e
puter
computer computer
A
B
C
A
B
C
B
B
A
B
B
A
A
None of
the above B
None of
above
B
Jon Von
Notebook Supercom Neumann None of
computers puters
computers above
B
First
Second
Hoover
None of
generation generation generation above
A
Second
First
Fourth
None of
generation generation generation above
C
Second
Third
Fifth
None of
generation generation generation above
C
Second
Third
Fifth
None of
generation generation generation above
B
Second
Third
Fifth
generation generation generation
Analysis,
Specificati Programm System
on,
ing,
Design,
Design,
Design,
and
and
and
Implement
Testing
Testing
ation
None of
above
A
None of
above
A
True
False
A
yes
no
B
true
false
A
true
true
true
true
false
false
false
false
A
A
A
A
true
false
review
to
and
determine evaluate
the audit the types
objective of data
can bring can bring
the data the data
directly
indirectly
True
True
change in
the
method of
recording
accountin
g
transactio
n
document
s driven
approach
A
to obtain a extract
record
data from
layout
file
A
all the
above
none of
the above A
False
False
use of
absence
accountin of audit
g codes
trails
B
A
all the
above
D
risk driven unique
none of
approach approach the above B
hardware
and
software
configurati
on
processin
g options, checks
file data
and
structure controls
true
true
false
false
the source
of data
available
to the
audit
organizati
on
source of
data for
material
all the
planing
above
all the
above
D
A
A
none of
these
A
true
false
A
providing
access to
computer
to all
the of by organizati
all
on
use of any none of
concerned personnel programs the above D
true
false
A
natural/m open/clos conceptua
an-made ed
l/physical all of them D
true
false
A
true
true
with
with audit production
departme departme all the
nts
nts
above
all the
above
none of
these
D
B
B
A
true
false
A
true
true
true
false
false
false
A
A
A
true
false
planning model
databases language base
true
false
true
false
reference
files
table files report files
file
filex
file-o-man manager
to have a decentrali
complete zed
picture of picture of all the
a system a system above
true
false
true
back-ups
true
true
seriously
affected
database
false
retrieval
false
false
subject
area
database
true
true
false
false
deletion
B
all the
above
D
B
B
none of
the above D
filepet
C
none of
the above A
A
addition
B
B
A
A
software
and
safety and
database database B
A
B
on
at the year immediate quarterly
end
ly
basis
true
false
none of
the above B
A
none of
Benjamin the above B
Benfish
Benford
true
false
consecuti
ve nos. or
alphabets
to entities
blocks of
nos. to the
primary
attribute
of the the
entity
true
false
A
valid,
numeric
grouping,
transactio
n
true
invalid,
none of
all the
alphabetic the above above
A
regroupin none of
all the
g, events the above above
false
A
A
B
random
placement
of
componen none of
t
the above D
true
false
A
true
false
A
true
true
increment
al design
and
enlarge
activity
true
true
false
false
interactive
data
extraction
and
analysis
false
false
B
B
true
false
B
true
false
A
e-brain
bottom up
tests
yes
bouncing
ball
big-bang
top-down hybrid
tests
tests
no
interactive
data
innumera
ble
none of
analysis
the above B
A
A
stub
all the
above
C
D
B
re-perform
procedure
provide
s carried
read data informatio out by the
on client's n to the
clients
all the
file
audit
programs above
D
executabl deleted,
es, master hard
A
true
system
analysis
software
true
yes
true
true
manipulat
es, real
true
yes
false
system
advanced
software
false
no
false
false
create,
false
false
no
none of
these
all the
above
A
all the
above
none of
these
none of
the above A
B
A
A
B
all the
above
A
A
A
can
enable the
auditor to
execute
can be
provisions
very
on a
powerful number of
analytical different
tool
bases
yes
no
can
provide
the
auditors
with useful
informatio
n with
trend s
and
all of the
patterns above
D
A
examinati
on of
source
identifies code of a
program program
provides code
with
detailed
which may advice to
informatio be there following
n of
for
the logic
machine fraudulent of a
none of
uses
reason
program the above C
IDEA
ACL
ALC
ACLL
B
true
fictitious
data
applied
against
the client
program
true
true
false
compariso
n of
source
version of
a
programm
ed
false
false
A
analyzing
the picture
of a file or all the
data
above
true
false
specificati
on,
file,
none of
program hardware the above
identifying
identifying identifying nonerroneous ineffective standard
code
code
code
true
true
A
A
A
A
all the
above
A
all the
above
D
false
false
authentica
tion of
start and informatio resource all the
finish time n support requested above
A
A
D
job
connectivit
job control y
all the
language language above
yes
no
true
true
none of
the above A
A
false
false
A
B
package
computer
p[program
for
performin
g a variety
master list administer
of data
mathemati of
ed
processin cal
transactio questionn
g function concept
ns
aire
A
prepared
by an
outside
programm
er
prepared prepared engaged
by the
by the
by the
all the
auditor
entity
auditor
above
D
true
file
access/or
ganization
s
false
A
stratificati
statistical/ on and
arithmetic frequency all the
operation analysis
above
D
true
true
false
false
B
B
examining
the quality carrying
of system analytical
process
review
Can
Wide
extract
access to and
various
analyse
data base data
examining
the quality all the
of data
above
Can aid in
simple
selection
High End
ACL
IDEA
CAATs
A sample A utility
A special
of
software purpose
transactio programm written
ns
e
program
D
Can
define the
audit
objectives D
All of the
above
D
None of
the above A
Tests of
details of
transactio
ns
Macros
Analytical
review
procedure
s
Action
Procedure
s
integer
true
number
false
actions
report
Complian
ce tests of
general
EDP
controls
Event
Procedure
s
primary
number
All of the
above
D
General
Procedure
s
D
auto
number
D
A
procedure none of
s
the above B
chart
macros
D
events
form
expressio
n
macro
elements comments action
expressio
code
expressio n
calculator builder
n builder elements
expressio
n
elements none of
action list macro list list box
the above
none of
conditions action
insert
the above
auto
embedde
tabular
columnar report
d
tabular
columnar datasheet justified
create
embedde
report
link report d report
new report
columnar
and
stable and dynamic none of
tabular
unstable and static the above
true
false
create
insert
fields
add chart chart
chart
primary
alternate foreign
none of
key
key
key
the above
label
chart
mail
none of
wizard
wizard
wizard
the above
start
group
page
report
header
header
header
header
report
page
group
none of
footer
footer
footer
the above
for
ordering
records
for
updating
records
D
C
C
A
C
B
D
A
B
C
C
A
D
B
for
specifying
conditions
with group none of
by clause the above C
condition
VB
Modules
add
group
report
true
reports
append
macro
sheet
false
RAD
RAP
SysCmd
MsgBox
macro
names
forms
insert
macros
D
delete
B
none of
module
the above C
A
none of
RAID
the above A
none of
message the above B
none of
CME
the above A
OLE
DDE
object
linking
and
embeddin on line
on line
g
execution editing
OLE
object
none of
the above C
none of
the above A
OLE
communic
ator
C
OLE
OLE client server
embedde
linked
d
connected edited
exe
DLL
BMP
html
publish to
form
report
query
web
wizard
wizard
wizard
wizard
dynamic none of
static file static html file
the above
data
append
add
insert
definition
dollars
rupees
pesos
yen
unbound bound
command
object
object
button
list box
display as
create
icon
display
link
icon
create
save as
none of
html
new
html
the above
none of
startup
home
end
the above
none of
bullet
command procedure the above
DBMS
RDBMS front end language
data
data
data
group
collection database storage
A
D
D
B
D
A
B
A
C
B
C
A
C
new blank new
new
database database database
dialog box dialog box dialog box dialog box A
255
64000
235
63500
A
automatic AutoNum
number
ber
number
true
false
explicit
inner join outer join join
primary
key
cascade
delete
related
records
not null
cascade
change
related
records
columnar tabular
table or
query or
tables
queries
automatic
field
B
B
none of
the above A
no
candidate duplicate
key
key
A
cascade
update
change all
related
related
fields
records
C
both a and none of
b
the above B
record or none of
records
the above C
true
false
property
field
field
property
crosstab
queries
row/colum select
n queries queries
change/de
row/colum lete
n queries queries
no match
self join
join
false
action
queries
inner join
true
new form
dialog box
summary
change
properties
included
form
Dynaset
field
properties properties B
form
create
dialog box
sum
form
wizard
dialog
append
form
properties properties
sub form
Record
Record
Operation
Navigation s
columnar tabular
form
form
filtering
ordering
filter
filter by
form
*
true
B
sorts
filter by
selection
$
false
update
queries
A
update
queries
A
outer join D
A
both 1 and
3
D
simple
D
new
properties B
new form child form
Form
Operation None of
s
the above
one to
hierarchic many
al form
form
sorting
querying
pipes
filter by
menu
@
B
B
B
C
gateways A
None of
the above A
?
D
B
bound
control
button
group
unbound
control
option
group
database form
data less
control
controls
group
data
control
record
group
none of
collection the above
all of the
controlled above
bound
unbound
CURRDA
TE()
TODAY() DATE()
combo
text box
list box
box
columnar tabular
pivot table form
form
data sheet filter by
filter
input
button
wizard
control
wizard
filter by
form
option
control
wizard
two of the
above
DAY()
B
B
A
C
C
static text B
main form A
none of
the above C
tool
wizard
C
none of
ram*
ram??
the above B
true
false
B
report
form
table
ledger
A
none of
autoreport report
module
the above A
chart
label
bitmap
report
A
true
false
A
true
false
A
60,000
255
25,000
64,000
D
true
false
B
true
false
A
true
false
B
all of the
table
query
form
above
D
table
form
report
hyperlink D
true
false
A
true
false
A
none of
Insert
Records Tools
the above C
true
false
B
true
false
A
alternate composite candidate primary
keys
keys
keys
key
C
true
false
A
true
false
B
true
false
A
true
false
A
true
false
B
none of
null
not null
zero
the above B
true
false
B
true
true
true
false
false
false
pie
true
true
true
update
query
true
true
inner join
true
true
true
freestandi
ng
true
true
true
true
the first
field of the
table
forms
true
delete
true
true
freestandi
ng
bar
false
false
false
select
query
false
false
outer join
false
false
false
embedde
d
false
false
false
false
the last
field of the
table
reports
false
insert
false
false
embedde
d
B
A
B
both 1 and none of
2
the above C
A
A
B
delete
append
query
query
B
B
A
self join
table join C
B
A
B
stand
alone
sub chart D
B
B
B
A
use
hyperlink
true
true
true
true
true
primary
none of
key field the above C
attributes entities
D
A
append
add
A
A
B
stand
alone
sub chart B
use
datasheet
use import in forms use export D
false
B
false
B
false
B
false
A
false
A
true
true
&
true
page
true
true
false
false
#
false
detail
false
false
true
true
true
false
false
false
?
*
group
topic
A
A
D
A
C
A
B
A
B
A
relational
true
list
false
structured
action
query
language language
report
form
true
false
group
record
data
true
true
property
false
false
child
sub forms forms
graphs
chart
primary
number
key
range
index
button
identifier
none of
the above
forms
none of
the above
option
button
record
source
none of
the above C
create
queries
form
sorts
form
bound
combo
box
false
unbound
control
tabular
form
data sheet
chart form form
tabular
columnar
sub forms form
form
calculated bound
calculated unbound
sub form
set
relation
C
B
event procedura
l based
none of
language the above C
query
table
B
B
session
detail
D
both a and none of
b
the above B
A
A
none of
inner form the above A
labels
report
B
pivot
filters
list box
true
form
name
logical
unbound
bound
tabular
auto form form
relationshi
connect
ps
B
A
A
C
B
A
none of
the above A
none of
the above A
none of
the above A
static
C
columnar
form
B
none of
the above C
option
button,
option,
command list, check toggle
toggle and button,
and
button and
command check and combo
check
buttons
list boxes boxes
boxes
filter by
filter by
filter by
filter by
form
report
record
input
form
report
macro
table
clipboard file
field
layout
D
D
B
B
field
names
An
A way to
organised
analyse
way of
and
A tool to storing
manipulat produce informatio
e
high
n about a
numerical quality
set of
informatio document similar
n
s
things
search
sort
It contains
all the
Informatio data about
n about
one
certain
specific
programs item
remote
relative
DBMS
DBMS
storing
data
offline at a
separate
site
Key
verificatio
n
A
document
which
contains
text
Relational
DBMS
record
grab
D
A way of
maintainin
g a log
C
A
collection
of files
B
Reliable
DBMS
C
uses tape
as
opposed
to disk
C
Database
Computer access
matching controls
D
An
A way to
organised
analyse
way of
and
storing
manipulat A tool to informatio
e
produce n about a
numerical high
set of
informatio qualitydoc similar
None of
n
uments
things
the above C
backing
up data
regularly
Computer
sequence
checks
It contains
all the
Informatio data about
n about
one
certain
specific
programs item
is related
to data
mining
A
document
which
contains None of
text
the above B
Reports
allow
users to
extract
informatio
n as hard
copy
(printed
output)
Reports
provide a
very
flexible
way of
creating
and
editing
document
s
A tool
which
allows text
and
graphics
to be
placed in
document None of
s
the above A
Extracting
and
analysing
data
Spreadsh
eets make
data easy Using
to analyse queries
Word
processor
s,
Compilers Network spreadshe
,
software, ets,
interpreter backup
databases
s, editors systems , DTP
DEFAULT
and NOT
NULL
constraint
s
CHANGE
TABLE
remote
DBMS
FOREIGN
KEY
constraint
s
MODIFY
TABLE
relative
DBMS
storing
data
offline at a backing
separate up data
site
regularly
PRIMARY
KEY and
UNIQUE
constraint
s
ALTER
TABLE
Relational
DBMS
None of
the above C
None of
the above C
IDENTITY
columns C
UPDATE
TABLE
C
Reliable
DBMS
C
uses tape
is related as
to data
opposed
mining
to disk
C
Descriptio Compone
n
nt
Source
D
keeping
the
saving the
keeping a original
file with
using a
backup
paper
different
password copy
copy
filenames A
the
the
product
primary
mail
code
key
merge
e-mail
C
A
database Graphics browser
e-mail
A
Number
bookmark
s
operators wildcards engines
Auto
AutoNum
Primary
Auto ID
ber
Auto Key
forms in a
database
are
consistent
with the
underlying
tables or
queries.
C
C
records in
a dynaset
are
consistent
with the
underlying
tables.
related
tables in a
database
are
consistent
with one
another.
foreign
key.
the
primary
key of
both
related
tables.
query and
main form its
report and
and a
associate its related
subform. d dynaset. query.
A
not a
the
primary
primary
a field
key of
key of the from an
either
related
unrelated related
table.
table.
table.
B
One-toone
One-tomany
Many-tomany
reports
are
consistent
with the
underlying
tables or
queries.
B
Many-toone
B
EmployeeI CompanyI Employee Company
D
D
LastName Address A
The Tools
menu,
Relationsh Referentia The join
ip window l integrity line
Right-click
the
Relationsh
ip line,
Select
then
Undo in
select
the
Double
Delete
Relationsh
click the from the ips pullRelationsh shortcut
down
ip line
menu
menu
The oneto-many
relationshi
p
B
Click the
Delete
Relationsh
ips button
on the
toolbar
B
That there
are
several
customers
associate
d with that
ID
That
records
That
That there can be
some of are
added by
the data is records in clicking on
not
a related the plus
viewable table
sign
C
They
cannot be They must
They must They
AutoNum be the
both be
cannot be ber data same data
numbers text fields types
type
D
The
customer‟
s ID is
deleted
from the
Customer
s table,
The
and all the
Nothing, customer‟ related
Access
s ID is
loans are
ignores
deleted
deleted
the
from the from the
attempted Customer Loans
command. s table.
table.
An error
message
is
displayed. D
The
subform is
an object
on the
The
form and
subform is The
can be
displayed subform is moved or
The
in
displayed sized like
subform is Datasheet in Form
any other
not visible. view.
view.
object.
D
A one-tomany
relationshi
p between
teams and
players
A one-tomany
relationshi
p between
teams and
coaches
A one-tomany
relationshi
p between
coaches
and teams
A many-tomany
relationshi
p between
players
and teams C
#
M
¥
*
C
Either
table at
any time
prompt,
title bar
text, icon.
Dim
CreateList
.
A check
box
enables
the form
user to
choose
from one
of several
existing
entries.
The
Customer
s table
only when
there are
Loan
records
associate
d with that
customer
The
Loans
table at
any time
title bar
text,
prompt,
icon.
Neither
table
C
prompt,
title bar
icon, title
text, icon,
bar text.
prompt.
B
Sub
CreateList CreateList
.
.
Sub.
B
A text field
enables
the form
user to
choose
from one
of several
existing
entries.
must be
must be set for
set for
multiple
one word. words.
help
people
keep track store data
of things. in tables.
relationshi
data.
ps.
facts.
figures.
singleuser
database
applicatio
n
multiuser
database
applicatio
n
A dropdown list
enables
the user
to choose
from one
of several
existing
entries.
A dropdown list
enables
the user
to enter
text.
C
does not must be
have to be set for two
set.
words.
C
maintain
data on
create
different
tables of things in
rows and different
columns. tables.
A
all of the
metadata. above
D
informatio
n.
a and b
D
ecommerc
e
database
applicatio
n
a or b
A
singleuser
database
applicatio
n
ecommerc
multiuser e
database database
applicatio applicatio None of
n
n
above
Sequential
Query
Language
(SQL)
Structured
Question
Language
(SQL)
Database
Database Managem
Modeling ent
System
System
SQL
Jet
Server
The user
the
database
applicatio
n(s)
interact(s)
with the
DBMS
creates
queries
the user
Structured
Query
Language
(SQL)
Data
Business
Model
System
Relational
Question
Language
(RQL)
C
Relational
Model
Manager B
Oracle
a and b
The
database
The
managem
database ent
applicatio system
All of the
n
(DBMS)
above.
the DBMS
accesses
the
database
data
creates
form
None of
above
creates
reports
the
database
the
managem
database ent
applicatio system
n
(DBMS)
all the
users'
data is in
one place
holds user
data
it reduces
data
duplicatio
n
holds
metadata
tables
metadata
it contains
a
descriptio
n of its
own
structure
holds
indexes
stored
procedure
s
B
D
D
All of
above
A
b and c
D
the
database B
All of the
above.
All of the
above.
All of the
above.
C
D
D
from
existing
data
from
existing
nondatabase
data
as a new
systems
developm
ent project
as a new
systems
developm
ent project
from
existing
data
as a new
systems
developm
ent project
data
marts
normalizat
ion
data
marts
normalizat
ion
data
marts
normalizat
ion
data
marts
normalizat
ion
file
hierarchic
managers al models
entities in
a column
vary as to
kind
table
record
the order
of the
columns
is
important
relation
field
record
field
record
composite
key
Insertion
anomaly
field
primary
key
Update
anomaly
as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
as a
redesign
of an
existing
database a and b
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
data
p data
models
modeling
entityrelationshi
p data
data
modeling migration
relational
network
data
models
model
more than
the order one
of the
column
rows is
can use
unimporta the same
nt
name
row
field
key
tuple
composite foreign
key
key
foreign
candidate
key
key
foreign
surrogate
key
key
Deletion All of
anomaly above
A
B
C
A
B
D
D
A
C
D
C
C
D
B
D
assess
the
existing
tables'
structure
and
content
are
supplied
by several
wellestablishe
d
manufactu
rers
They use
sophistica
ted
mathemati
cal
technique
s.
create
move the
design the one or
data into
database more new the new
structure tables
database A
were
essentially
killed off
by MS
Access
Their
report
delivery is
more
difficult
than
report
delivery
for
reporting
systems.
are not
have poor true
response DBMS
time
products
B
Nonintegr None of
ated data the above A
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem B
a "wrong
inconsiste nonintegra format"
dirty data nt data
ted data problem D
data
warehous
data
e
warehous databases
e data are do not
not stored have
in tables. metadata.
Form
Table
Forms
and
Queries
reports
and tables
data
warehous
e data are
often
denormali
zed.
b and c
Report
Query
Macros
C
A
Spreadsh
eets
D
The Link
Tables
command
can be
used to
associate
the tables
in one
database
with the
objects in
another
database.
It will be
easier for
the user
to
upgrade it
if the
objects
are in one
database
and the
tables in
another.
An
applicatio
n may
consist of
multiple
databases
, each
with
multiple
objects,
linked to
yet
another
database
containing
only
tables.
Import
Link
It will be
easier for
the user
to
upgrade it
if the
objects
and tables
are in one
database.
It contains
tables,
It contains reports,
more than queries,
one table and forms
Menu
Wizard
Build
Menu
All objects
in an
applicatio
n,
including
the tables,
must
reside
within the
same
database.
Regardles
s of how
the
objects
and tables
are
stored,
the user
will have
to reenter
the data in
the tables
when the
applicatio
n is
upgraded. B
An
applicatio
n can be
created in
such a
way that it
objects
such as
forms and
reports
can be
changed
without
disturbing
the
existing
data.
C
Merge
Join
It contains
a user
interface,
or
switchboa
rd
Interface
Design
Wizard
It contains
macros
C
Switchboa
rd
Manager D
It is
advisable
to put
each
object and
table into
a
separate
database.
A
create
backups
for
mission
critical
corporate
data.
put key
business
centralize informatio
the
n into the
managea hands or
bility of
more
data
decision
collection. makers.
Digital
Sign
Digital
Digital
None of
Certificate Signature the above C
Hash
Function
Hash
Function
Digital
Signature
Hash
Value
Digital
Digital
Signature
Signature Verificatio
creation
n
Institution
al
Overhead
and
Subscribe
r Relying
Party Cost
Certificati
on
Authority
store all
corporate
transactio
n data in
one single
location. C
Digital
Certificate
Hash
Result
Private
Key
A
Either B or
C
D
Both A
and B
Either A or
B
C
Subscribe Institution
r Relying al
None of
Party Cost Overhead the above A
Certified
Authority
Certificate None of
Authority the above A
True
False
A
True
False
B
Personal
Server
Developer Digital
Certificate Certificate Certificate
Personal
Server
Developer Digital
Certificate Certificate certificate
None of
the above A
None of
the above C
Private
Repositori
none of
Certificate es
Public Key the above B
Evidence,
Ceremony
,
Efficiency Approval,
Evidence,
and
Efficiency
Ceremony Approval, logistics, and
, Approval Evidence Evidence Logistics D
True
False
A
True
False
A
Certificate
Revocatio
n List
Private
Key,
Subscribe
r
Internal
Format
File
Certificate certificate None Of
Resource Revocatio The
List
n Letter
Above
A
Public
key,
Recipient
External
Format
File
UN/EBCD
ANSI
IC
interchang
batch files e sets
Smart
Embedde
Card
d cards
Digital
Cash
Private
None Of
Key,
The
Recipient Above
Transmiss None of
ion File
the above
UN/EDIFA
UNESCO CT
functional
functions groups
None of
SET
the above
Smart
Cards
A
C
D
D
A
Electronic
E-cash
cheques D
Online
Catalog
Online
and
Billboards Catalog
Broadcast Customer
and Junk and
and Junk Endorsem
Mail
Billboards Mail
ents
C
All of the
EDI
E-mail
EFT
above
D
True
False
B
Primary
Public Key
Login_Id Key and Public Key and
and
Private
and
Private
Password Key
Password Key
D
Satellite
Global
Private
Area
None of
Network Network Network the above B
Active or
push
Passive or Glow sign
based
pull-based or
advertisin advertisin hoarding All of the
g
g
strategies above
D
Broadcast Junk mail Billboard
DirectE-mail
Bulk-mail mail
Endorsem
Catalog
ent
Billboard
Low cost
Error
Data
of
checking Integration operation
Competiti
ve
Corporate Industrial
espionage espionage espionage
Contact
numbers
A list of
of the
competitor managem Research
‟s clients ent group data
esinglecommerc
user
multi-user e
database database database
applicatio applicatio applicatio
n
n
n
Keeping Including
Replying messages the
promptly short
Subject
Removabl
e drives
that can
be locked
up at night
provide
adequate
security
when the
confidenti
ality of
data is the
primary
risk.
Message
authentica
tion in EDI
systems
performs
the same
function
as
segregatio
n of duties
in other
informatio
n
systems.
convert
text to
text import columns
wizard
wizard
cell
row
reference reference
Encryption
performed
by a
physically
secure
hardware
device is
more
secure
than
encryption
performed
by
software.
Endorsem
ents
A
Junk mail D
Broadcast C
Quality
managem
ent
B
Economic
espionage C
A
competitor
‟s new
project
B
None of
above
Using all
capital
letters
C
D
Security at
the
transactio
n phase in
EDI
systems is
not
necessary
because
problems
at that
level will
be
identified
by the
service
provider. C
function
tip wizard wizard
A
column
none of
reference the above A
text files
serial
values
Lotus 1-23
domain
values
quattropro
or xbase
files
range
values
=currentd
ate()
class files
reference
values
none of
=today() =date()
the above
none of
dollar sign ' = ' sign # sign
the above
function
none of
AutoSum AutoFill
wizard
the above
argument parameter none of
variables s
s
the above
text
logical
numeric Boolean
concatena
none of
te
pmt
merge
the above
countif
vlookup
pmt
count
convert
text to
pivot table chart
columns
wizard
wizard
wizard
tip wizard
none of
sumif
pmt
countif
the above
D
average sum
sumif
countif
page
none of
setup
print area print
the above
autoforma
none of
t
AutoFill
the above
none of
bordering formatting shading
the above
page
print
setup
print area print
preview
none of
filtering
searching sorting
the above
C
D
A
A
C
B
D
A
A
B
B
A
A
B
B
A
all option blanks
all blanks none
A
www.ency www.eb.c www.ency none of
.in
om
brit.com
the above B
none of
URL
DNS
FTP
the above B
internal
network
applicatio
n layer
finger
service
network of
network
transport
layer
ping
service
FTP
TELNET
intermedia
te network
physical
layer
none of
the above
session
layer
none of
ftp service the above
none of
ARCHIE the above
B
D
A
C
uniform
research
locator
uniform
resource
locator
name of
host
the
computer resource
unlimited
restore
locator
message scheme
none of
scheme
the above
command none of
line
the above
general
sears
electric
browser
editor
Delphi
net
Microsoft
web
read the
Usenet
news
browser
CompuSe
rve
internet
spy
dialer
mosaic
gophersp
gophering ace
Alta vista
finger
server
list
no
middle
hotlist
none of
the above A
C
C
C
B
search for none of
database the above C
wincim or
maccim
cyberspac
e
none of
the above
none of
the above
none of
open text excite
the above
web
none of
ftp server server
the above
none of
directories image list the above
maximum
of five
one
many
middle
lower
top
and lower
directory index
glossary
directory index
menu
item
search,ind search,me search,ite search,ind
ex search nu search m search ex search
all the
infoseek excite
lycos
above
all the
netshark cello
lynx
above
navigator
lynx
mosaic
Lycos
gold 2.0
CompuSe
Microsoft internet
IBM
rve
finger
Usenet
service
ftp
telnet
Higher
text
Hyper text Hyper text Hyper text
transfer
transmissi transfer
transfer
protocol
on port
protocol
port
none of
iccp
ftp
uucp
the above
C
C
B
A
C
B
D
C
C
D
C
C
D
D
C
C
none of
telnet
the above
transfer
transmissi communic
transfer
on control ation
control
protocol/in protocol/in
protocol/in ternet
ternet
none of
ternet
protocol
protocol
the above
none of
one
two
three
the above
domain
name
web
none of
ftp servers servers
servers
the above
the
the
internet
the
internet
administra internet
none of
adapter
tion
access
the above
organizati
browser
protocol
site
on
hotlink
higher
text
hyper text type
transfer
transfer
transfer
none of
protocol
protocol
protocol
the above
universal uniform
uniform
resource resource resource name of
locator
locator
label
the above
frequent frequently frantically
asked
asked
asked
none of
query
question question the above
none of
SLIP,PPP TCP,IP
IP,UDP
the above
connectio
n
response request
close
world
wide
search for
search for windows informatio
informatio sockets
n and
n and
internets research none of
research relay chat council
the above
netscape,i mosaic,go none of
lynx,minx e
pher
the above
world wide
web
world wide
none of
server
web client interface the above
none of
glossary index
hotwords the above
yahoo
ftp
C
B
C
B
A
B
B
B
B
A
A
B
B
B
B
very easy
and
rodent
oriented
net wide
index to
computeri
zed
archives
university
of
berkeley,b
erkeley
freenet
very
organised
network
integration
and
communic
ation
applicatio
n
university
of
cleveland,
cleveland
freenet
IP
address
waisman
hyper
higher text transfer
medium
markup
language language
verificatio
n on
network
integration
and
communic none of
ation
the above A
university
of
California none of
net
the above B
none of
dns
the above A
telnet and
ftp
wais,wins
ocks
winsock
hot links
hyper text
markup
language
books
hyper text marks
images
applets
none of
the above A
none of
the above B
none of
the above B
none of
the above C
none of
the above B
none of
animation the above B
graphics,v programm animation,
ideos,audi s,images,t scripts,ex none of
o
ext
ecutables the above
home
welcome none of
first page page
page
the above
global
global
grand
network
networks network
none of
news
navigator news
the above
yahoo
electronic search
none of
service
mail
engines
the above
Netscape
page
email and starter
net
site,netsc
conferenc ape page yahoo and none of
e
wizard
altavista the above
newsgrou
p
telnet
ftp
archive
Lycos
point
all the
none of
catalog
review
above
the above
A
B
B
B
B
D
D
apple link
computer
related
abbreviati
ons and
acronym
bitnet
Delphi
fidonet
biographic
al
informatio bookstore none the
n
s
above
A
D
encyclope on-line
more
dia
reference informatio
Britannica works
n
galenet
A
search
engines
web
directories database channel
B
Graphical
interpreter
formatting
Joint
Pictures
Expert
Group
Graphical
interchang
e Format
Jumbled
pictures
expert
graph
document
s
C
Graphical
interface
format
Joint
pictures
expert
graph
mails
net
yahoo,info
eudora,ne
seek,altav netscape,i tscape
ista
e,lynx
and pine
network
informatio web
connectio
n
pages
ns
BACKGR
OUND
COLOR
FCOLOR
Communi
Communi
cation
Common cation
gateway graphical graphical
interface Interface interface
Communi
Network Interface cation
Current
web page Browser Client
Browser/u
ser
Server
Web
Unknown Uniform
resonance resource
language locator
United
relay
limited
Graphical
Interface
format
B
Joint
pictures
experimen
tal group A
browsers
none of
the above C
mails
B
FONTCO
LOR
B
Common
Gateway
Interface D
Connectio
n
B
None of
the above B
Channel
None of
the above
neither
image
text or
text nor
text only only
image
image
SQL
PLSQL
SGML
CGI
alphalang betalangu metalangu none of
uage
age
age
the above
A
B
C
C
C
palm is
not
eatable
palm is
not elm
SGML
SGML
Preproces
Processor sor
web sites images
Internation
al
Engineeri
Internet
ng
equipment trainers
training
and
faculty
faculty
pancake
is not
edible
SGML
Parser
applets
Internet
Engineeri
ng Task
Force
MS
MS
Internet
Internet
Netscape Explorer
Explorer Navigator and
and
and
Netscape
Mosaic
Mosaic
Navigator
data from
a
text
database symbols
hyperlink hypertext hotword
in
in userin random sequential defined
order
order
order
first
.bmp and
.gif
Service,
hostname
and
directory
path
start
home
.bmp and .gif and
.jpeg
.jpeg
service,ho service,po
stname,po rt and
rt,directory- directory
path
path
mailing
lists,mail
mail
mail
server
servers,m vendors,m robots
ail clients ail
and
and
identificati gateways
alternate on and
to other
services password services
<center>
<font
size=n>
<hr
size=n>
none of
the above B
SGML
Composer C
document
s
A
None of
the above C
None of
the above C
video
hotlink
C
B
none of
the above B
none of
the above C
.wmf and
.bmp
C
service,ho
stname
and port B
none of
the above C
<l1
type=shap
e>
D
communic
ation
generated
informatio
n
Server
arpanet
common
gateway
interface
Client
classified
general
instruction none of
s
the above B
Browser User
A
none of
intranet
the above B
LAN
the net
peer-topeer
connectivit
y
wan
data
parcel
packets
none of
the above B
none of
the above A
scripting,p news,coo email,file
arsing and king and retrived,int none of
compiling fine arts
ernet tools the above
mosaic,go
nt,window pher,eudo communic
s95,ie,win ra,trumpn ator,ie,lyn all of the
zip
et
x,winsock above
ARPANE none of
dnet
arpanet
T
the above
defensive dedicated defensive
administra and
advanced
tive rank registered research
administra projects
projects
tion
administra administra none of
network
tion
tion net
the above
none of
start
begin
first
the above
milnet,sm
aller
mailnet,in intranet,ex none of
arpanet
et
tranet
the above
C
B
B
C
B
A
education,
research
Higher
text
manipulati
on
language
united
states and
UK
music and cooking
none of
dance
and dining the above A
Hotlink
text
markup
language
Hyper text
markup
Language D
server
client
standalone
none of
the above B
none of
the above C
none of
the above C
client
Hyper
transfer
meta
language
united
england,n states &
orway
Russia
network
servers
network
topology
network
redirector none of
s
the above B
data
terminal
equipment
physical
layer
data
target
equipment
network
layer
packet
switching,
store and
forward
network
anonymou
file access s ftp
PAN,NAN, KAN,RAN,
AAN
VAN
smart
network
and dumb
network
file
transfer
LAN,WAN
,MAN
network
card
detailed
transactio
n
explanatio
n
applicatio
n layer
point to
point
network
and
broadcast
channel
network
none of
the above B
none of
the above B
none of
the above
none of
the above
none of
the above
none of t
VAN
MAN
TAN
he above
none of
LAN
MAN
WAN
the above
none of
analog
digital
non-digital the above
Define
Document
Data type type of
type
Document
definition data
definition type data
Modulatio Manipulat
Moralize/d n/demodul e/demanip none of
emoralize ation
ulate
the above
Modulatio Manipulati none of
Mapping n
on
the above
Satellite
link and
digital
signals
Standard
long
internet
protocol
Prime
prolonged
protocol
Dedicated
access
and dial
up access
Stream
line
internet
protocol
Point to
point
protocol
B
B
C
B
C
B
C
B
B
Cable and none of
wires
the above B
Serial line
protocol
Pillar to
pillar
protocol
sending
storing
storing
informatio data on
data on a n to a host the hard
disk drive computer drive
none of
the above C
none of
the above B
receiving
informatio
n from a
host
computer B
Bandwidth Speed
Size
Channel
Find
Save
Recipient Relying
Party
Party
Private
Public Key Key
Browse
Either A or
B
Both A
and B
Retrieve C
Neither A
nor B
B
Both B
and A
C
E-mail
Electronic Electronic
Commerc Fund
All The
e
Transfers Above
Not False
Closed
System,F
ormal
Legal
requireme
nts
Not True
Signer
Authentica
tion
Not True
Nonrepudi
ation
Service
Affirmativ
e Act
Cryptogra
phy
Private
Key
Private
Key
Private
Key
Decryptio
n
Document
Authentica Both A
tion
and B
Not False
A
D
A
Formal
Legal
Requirem
ents,
Open
System
D
Formal
Legal
Requirem Open
ents
System
Signer
Affirmativ
authentica None of
e Act
Efficiency tion
the above A
Using
data
encryption
.
Unaltered
in
transmissi
on.
Digital
Digital
signature certificate
Either A or
Efficiency B
Private
Public Key Key
Both A
Public Key and B
Both A
Public Key and B
Both A
Public Key and B
Cipher
Encryption
Performin
g validity
checks.
Not
intercepte
d en
route.
Conductin
g fraudawarenes
s training.
Received
by the
intended
recipient.
Neither A
nor B
C
B
Private
Key
Neither A
nor B.
None of
the above
Either A or
B
Either A or
B
Either A or
B
Cryptogra
phy
Reviewing
the
systemsaccess
log.
Sent to
the
correct
address.
A
A
A
C
A
B
C
D
A
The
private
Both
The
key is
sender
private
used by
and
key
the
receiver
cannot be sender for
must have broken
encryption
the private into
but not by
key before fragments the
this
and
receiver
encryption distributed for
method
to the
decryption
will work. receiver. .
Failure of
server
Data entry duplicatin
Collision. errors.
g function.
Business- Business- BackendtototoBusiness Backend Business
On-line
Endorsem
Billboard Catalog
ents
Customer
Endorsem
ents
Billboard Catalog
Intermedi
aries
portals
.COM
Order
Search
Placemen
and
t
Service
discovery
PrePost
Purchase purchase
purchase consumm preparatio
interaction ation
n
Endorsem
Billboard
ent model
model of Online
of
marketing catalog
marketing
Online
Shopping
Catalog
cart
Billboard
EDI For
Administr EDI For
EDI For
ation,
Administr Administr
Commerc ation,
ation,
e and
Consumer Commerc
Transactio and
e and
n
Transport Transport
EDI
Compiler
TCP/IP
The
private
key is
used by
the
receiver
for
decryption
but not by
the
sender for
encryption
.
A
Firewall
vulnerabili
ty.
D
BusinesstoBillboard A
Broadcast B
Broadcast A
Domains
A
None of
the above C
Search
and
discovery A
None of
the above B
Pulling
cart
B
None of
the above C
EFT
Gateway
Assemble
Interpreter r
EDI
D
D
BusinesstoBusiness
Emergenc
y Cash
Communi
cation
Perspectiv
e
BusinesstoConsumer
Electronic
Cash
Business
Process
Perspectiv
e
Micro
Transactio
Microcash ns
Decryptio
n
SSL
1
2
filtered
data table table
pivot table
wizard
series or
rank
series or
rank
series or
rank
series or
rank
column
chart
column
chart
column
chart
column
chart
chart
wizard
category
category
category
category
bar chart
bar chart
bar chart
bar chart
Consumer- CustomertotoBusiness Company B
Euro
Endorsed
Cash
Cash
B
Service
Perspectiv None of
e
the above C
TT(Tiny
token)
E-token
A
Subscripti
Encryption on
C
3
4
B
index
table
pivot table D
convert
text to
columns
wizard
tip wizard D
data
legend
marker
A
data
legend
marker
B
data
legend
marker
C
data
legend
marker
D
surface
pie chart chart
C
surface
pie chart chart
B
surface
pie chart chart
D
surface
pie chart chart
A
wild card
spaces
characters symbols
internet
excel97
explorer Netscape
convert
text to
pivot table chart
columns
wizard
wizard
wizard
stock
line chart bar chart chart
true
false
none of
the above A
word 2000 A
tip wizard A
pie chart
C
A
and
3dimension
s
true
Data
table
or
4Multidimension dimension
s
s
false
B
Pivot table
B
It is often
used to
display
share
It is also
market
called as
prices
high-low- It shows over a
close
trends
period of
chart
over time time
Scenario
Pivot table manager Solver
A
A
It is also
used for
indicating
fluctuation
s in
temperatu
re
changes B
Data
table.
C
Scenario
Goal seek manager
Data
Pivot table table.
A
Data
Goal seek Pivot table Solver
table.
D
Workshee Spreadsh none of
Workbook t
eet
the above A
Performin
g
calculation
s.
Performin
g
database
operations
Performin
g text
formatting
.
Source
Column
table
field
Row field. name.
two
three
N
true
false
34Multidimension dimension dimension
s
s
s
Data table Pivot table
All of the
above
D
Pivot table
item.
C
B
B
A
B
It is useful
when
several
componen
ts are
changing
and the
user is
It displays interested
the data in the sum
series one of the
on top of componen
the other. ts.
Pivot
Scenario
table.
manager
Scenario
Goal seek manager
Standard
Count.
deviation
databases records
It is a tool
for
summarizi
ng and
analyzing
the data
records in
an
interactive
manner.
Goal
seek.
text import
wizard
worksheet
applicatio
n window
A dark
wide
border
It is a tool
that
provides a
way to
view and
compare
the results
of all the
different
variations
together
on the
worksheet
Scenario
manager
convert
text to
columns
wizard
It can be
represent
ed in 3dimension
s
Solver
Data table C
Pivot table Data table A
SumIf
tables
A
worksheet
s
D
It
summariz
es the
data by
using
analytical
functions.
solver
A
Pivot
table
function
tip wizard wizard
workbook tables
document modal
window
window
A dotted
border
B
D
B
database A
C
A blinking
No border border
A
8,16,32
your
formula
has a
syntax
error
ability to
generate
tables
word
processin
g
Range
Producing
graphs
2,4,2
the row is
too short
to show
the
number at
the
current
font size
2,2,2
the
column is
too narrow
to show all
the digits
of the
number
flexibility
speed of of moving
calculation entries
6,8,10
D
either b or
c
C
cost of
initial setup
D
graphical
Address
Writing
letters
drag from
the top
cell in the
doublecolumn to
click any the last
cell in the cell in the
column
column
CTRL +
ENTER
ENTER
array.
function.
database
Gap
Drawing
pictures
spreadshe
et
D
Rows
A
Document
filing
A
click the
column
heading
click the
column
label
C
TAB
constant.
INSERT
formula.
A
B
(201)555100
1212.
Cell
reference
s
Functions
^
/
Tom
#VALUE! McKenzie. C
B5*B6
C3/D4
E12
6
It is
surrounde
d by a
heavy
It is
border.
blinking.
Numeric Text
constants constants
*
\
It is
impossibl
e to
determine
D4^2
.
SUM(H9: G7*SUM(
H11)
H9:H11)
D
D
C
B
The
phrase
“active
It is
cell”
displayed appears in
in reverse the Status
video.
bar.
A
By either
clicking in
a different
cell or
By using using the
the arrow arrow
By clicking keys to
keys to
in a
move to a move to a
different different different
cell
cell
cell
The
Standard
toolbar
By typing
the
reference
of the cell
you want
to move to
in the
formula
bar
C
The Font
The Cell Size
Format
command
The
command on the
Formattin on the
Tools
g toolbar Edit menu menu.
B
the New
command
on the File
menu.
File
the Save
command
on the File
menu.
Edit
Preview
Details
Insert
Delete
Clear
Orientatio
n (portrait
or
landscape
)
Delete
Options
worksheet
.
6
copy
range.
paste
range.
Headers
and
footers
Page
Setup
range.
D12, G25
destinatio
n range.
destinatio
n range.
the Save
As
command
on the File
menu.
View
the File
Type
command
on the File
menu.
C
Window A
List
Properties B
Both
Insert and
Delete
Clear
C
Both Clear
and
Delete
Remove B
Fonts
Margins
C
View
Edit
B
group.
D12:G25
cell group.
D
source
range.
source
range.
Both the
Copy and
Paste
command
s
constant
B
C
clipboard.
clipboard.
The
Duplicate The Copy The Paste
command command command
absolute relative
mixed
D
B
D
A
B4
$B4
B$4
$B$4
D
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
B
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
C
Both the
Cut and
Paste
The Move The Cut
The Paste command
command command command s
D
the Fill
Handle
cycle
through
absolute,
relative,
and mixed
cell
reference
edit cells. s.
the
the
Format
Formattin
Painter
g toolbar
cycle
through
open
applicatio
ns.
C
Condition
al
formatting B
Select the
Insert
Hyperlink
command
from the
File menu.
Click the
Insert
Hyperlink
button on
the
Standard
toolbar.
Doubleclick a cell
and click
the Insert
Hyperlink
command. B
copy and
paste
cells.
whether
the cell
has a
formula or
a value in the cell
it.
address.
Right-click
a cell and
click the
Edit
Hyperlink
command.
whether
the cell
has an
absolute
or a
relative
cell
reference.
the value
in the cell D
text with
either a
two-digit
or fourdigit year,
text with a text with a
depending
two-digit four-digit
on the
year.
year.
an integer. format.
C
Jul-30
subtractin
g the
earlier
date from
the later
one.
the F4
key.
Aug-31
It is
impossibl
e to
determine
from the
29/03/200 informatio
8
n given.
B
adding the
earlier
date to the
later one.
the F2
key.
subtractin
g the later
date from
the earlier
one.
the Esc
key.
0.75
March 4
of the
current
year
adding the
later date
to the
earlier
one.
A
the F1
key.
B
a cell on a
worksheet
a
.
a variable. constant.
Either 3/4
or .75,
depending
on the cell
formatting C
either a
cell on a
worksheet
or a
variable. D
B1-G10
B1.G10
B1;G10
B1:G10
D
AVERAG
E
COUNT
MAX
SUM
C
Line
Pie
Scatter
C
Once a
column
chart is
chosen it
cannot be
changed
to a bar
chart.
Once a
pie chart
has been
chosen it
cannot be
changed
to line
chart.
Once a
line chart
has been
chosen it
can be
changed
to a pie
chart.
D
hold down hold down
the CTRL the SHIFT
key
key
Create
four
Use
separate
tables
files
hold down
the ALT
key
Transfer
informatio
n to a
database
hold down
CTRL +
SHIFT
A
03-Apr
Combinati
on
Once a
bar chart
is chosen
it cannot
be
changed
to a
column
chart.
Use
multiple
sheets
D
Paste
Special
B
none of
Edit | Data the
| Sort
choices
B
Create
None of
forms
the above C
select
Print
select
selection Print
on Page selection
Setup |
in the
Sheet
Print
and then dialog and
print
then print D
drawing
None of
pictures
the above A
=(B2*(D4+
#VALUE! C2)
C
Paste
Fill Down Fill Right
Tools |
Sort
Analyse
data
Data |
Sort
Calculate
data
portrait
press the
PRINT
SCREEN
key
writing
letters
D4+C2*B
2
=A3SUM:
B3SUM:C
3SUM
REF!
whatever
was last
landscape used
AD213
CERN
ZA1
ECRN
click the
Print
button
producing
graphs
(D4+C2)*
B2
0
A0
CARN
newsgrou
ps and
yahoo and mailto and search
infoseek files
engines
applicatio
bulletin
n
boards,m servers,pr
news
ails call
oxy
groups,ya and
servers
hoo and wireless and web
infoseek system
servers
bulletin
board
system
None of
the above B
vertical
A
None of
the above C
NET
A
none of
the above B
none of
the above B
business bulletin
broadcasti broadcasti none of
ng system ng system the above
none of
small
large
very small the above
windows windows windows none of
socks
sockets
stocks
the above
Mosaic
Yahoo
PINE
Lynx
none of
buffer
cache
built-in
the above
Photograp Digital
Cryptogra Message
hy
Signature phy
Digest
A
B
B
A
B
C
Key
Lock
Hash
Function
Formula
User-id
Password Name
Address
Penetratio
Cryptogra Password
n
Retrieval phy
Cracker
Regulatio
Acts
ns
Address Protocols
Unauthori
Spoofing Imposting sing
Approving
Loss
Threat
Exposure Hacking
Sales Income tax
tax
authorities authorities
Pirated
Utility
software
Tim
Berner
Lee
Hoffman
Etrade.co Amazon
m
.com
Automate
d Tailor
Any Time
Machine Money
Regulatio
Acts
ns
Router
Gateway
LAN
hyper
terminal
tracing
program
National
Informatic
s Center
Only
Computer
s
A
B
A
D
A
B
Police
Judge of a officer of
civil court IPS rank. B
Virus
Cracker
C
Charles
Bubbage
Howard
Aiken
A
Dell .com Msn .com B
Asynchron
ous
Transmiss None of
ion mode above
C
Address
Port
Protocols C
Pin
B
WAN
CAN
PAN
hypertext
tracing
program
Network
Interface
card
hypertext
transfer
protocol
New
Informatio
n Card
hypertext
tracing
protocol
C
Can not
Only
computers printers
Combines
connectivit
y of a hub
with the
Concentra traffic
tes
regulation
connectivit of a
y
bridge
A
None of
the above B
None of
the above D
Switches
data from
incoming
ports to
outgoing All of
ports.
Above
B
Bridges
and
Two or
Repeaters more
.
networks
B
bits
C
RG7U
Bridges
Hubs and
and Hubs nodes
None of
frames
Packets the above
virus
gateway router
checker
None of
Two
Four
the above
Data-Link Network All of the
Layer
Layer
above
Coaxial
Twisted
cable
Fiber
pair
Physical
address
Logical
address
A cable
Hub
Data
return to
the
sender
It continue
on to
target
device
It gets
with
destroyed corrupt
None of
bit by bit. data
the above B
Wireless
technolog
y
Physical
Layer
Wired
Technolog
y
Data Link
Layer
Ultra violet
technolog
y
Network
Layer
Binary
48 Bits
ASCII
48 Bytes
Octal
48 KB
software
that
facilitates
connectio
n to the
internet
a list of
rules for
transferrin
g data
over a
network
a gateway
calling
software program
that allows for
file
internet
copying
bridging
B
Network
Server
PC
C
firewall
One
Physical
Layer
Novell PC Client
A
C
D
B
A memory None of
address
the above B
None of
Router
the above B
None of
the above
All of the
above
None of
the above
48 MB
A
D
A
A
If the hub
goes
down, it
If one
brings
node goes down all
down, it
of the
brings
nodes on
There isn't down the that
one
entire ring section
Physiolog
Both A
y
Topology and B
If the hub
goes
down, it
brings
down all
of the
nodes on
all of the
rings
B
None of
the above B
All of
above
D
Bus
Star
Linear
Parallel
Ring
Both A
and B
Parallel
Circular
Ring
Ring
Star
Bus
Bus
Bus
Ring
Network
Layer
Bus
Star
Transport Physical
Layer
Layer
Mesh
A
Data Link
Layer
D
Ethernet,
token ring,
DecNET
bps
bps
Ethernet,
token ring,
FDDI
kbps
Kbps
Ethernet,
token ring,
ARCnet
B
mips
B
Mips
C
A
Linear
None
Both A
and B
Star
Star
Linear
Mesh
Mesh
Ring
C
B
C
Ethernet,
DecNET,
FDDI
mbps
Mbps
depend on
usually
measured the
higher
in bytes
transmissi
than LAN per
on
speeds
second
medium
CD-ROM
Windows
drive
a modem 95
must use
the World
Wide Web
key
gateway
interface
must use
electronic
mail
uniform
resource
locator
must have
a LAN
account
common
gateway
interface
B
limited by
modem
speeds
C
Netscape B
All of the
above
A
applicatio
n protocol
interface C
connects
interfaces a
a Novell used to
a modem computer
Interface control a to a
to a
Controller printer
computer network
D
CD-ROM
Windows
drive
a modem package Netscape B
Linux
have to
do with
compressi
on of
graphics
and video
Novell
Netware
Windows None of
NT
the above C
have to
do with
Web
pages
the
Internet
none of
the
previous A
use
appropriat
e
must use must use must have communic
the World electronic a LAN
ations
Wide Web mail
account
software A
none of
the
Printer
modem
bridge
previous D
provides
access to
is a CPU
the
is a CPU functional make of
Internet
register
unit
processor A
used to
send
email
is a
protocol
for the
transfer of
files
is part of between
Netscape computers D
used to
send
email
used to
browse
the Web
uses
wireless
communic
ation
is part of None of
medium
Netscape the above D
used to
protect a
computer
room from
fires and
floods
a backup
server
a screen none of
a form of saver
the
virus
program previous
an email a poor file
server
server
none
none of
the
previous
search
CD-ROM clip-art file engine
D
D
IR system
for the
hardware Internet
browser
C
scanner
D
provides
access to
the
is a CPU
Internet
register
is a CPU
functional make of
unit
processor A
used to
send
email
is a
protocol
for the
transfer of
files
is part of between
Netscape computers D
used to
browse
the Web
is a
protocol
used to
uses
that allows
send
telephone is part of for remote
email
lines
Netscape login
D
Any layer
Any layer can
can
communic Any layer
The layers communic ate only
can
cannot
ate
with the
communic
communic directly
layer
ate only
ate with
with any directly
with the
one
other
above or layer
another. layer.
below it. above it. C
It is made
up of
many
networks
connected
into
Individual
transmissi It works
computers
on lines
the same can
It is one
called
way as a connect to
large
backbone local
it using an
network. s.
network. ISP.
A
Password System
Denial of Port
cracking intrusion Service
sniffing
C
used to
protect a
computer
room from
fires and a form of
floods
virus
Flood a
Web
server
with
IP flood
requests
a screen
saver
program
none of
the
previous
D
Virus that
initiates a
ping flood UDP flood A
hack
packet
firewall
router
a backup an email
server
server
Apply
security
patches
flood
C
switch
hub
B
a poor file none of
server
the above D
Update
Backup
Limit
virus
data on a logging on
definitions daily basis access
C
Only large
namerecogniza
ble sites
are safe.
Use of
Use of
logical
Use of
password access
identifiers s
methods
All sites
are safe
and
reliable.
traffic
There are
safe and
unsafe
sites.
ActiveXenabled
sites are
safe.
B
Phone
A Trojan
horse
E-mail
Use of
encryption
methods D
by
scanning
the
by
computer
attaching for a
itself to a connectio
document. n.
B
Web
Applicatio
traffic
n updates D
Adware
A worm
Modems
cookies
and
Trojan
horses.
Protocols
Trojan
horses
and key
loggers.
Multiplexo
rs
LAN
key
cookies
loggers
and key
and
loggers.
worms.
by
attaching
to an email.
An attack
on a
system for
personal
gain
through
an FTP
port.
An attack
with the
purpose
of gaining
publicity
Disruption
in
Economic communic
damage ation
Crashing
the stock Shutdown
market, as of military
in the
security
1930s
systems
Spyware
D
B
C
Changing
the
Giving out content of
disinforma a Web
tion
page
D
Disruption All of the
in supply above are
lines
correct.
D
Shutdown
Contamin of nuclear
ating
plant
water
safety
systems systems D
To obtain
an
accurate
inventory
of network
related
To
equipment
To carry To
improve
and parts
more
improve
system
and
network
network
response network
capacity services time
nodes
D
limit
stop its
update its
access to competitor prices as
set its
computer s seeing soon as
prices
owners
their
they are
very high only
prices
changed D
Yahoo
USA
People
People
People
Lycos
Search
Search
Search
Search
B
Name of Date of
Personal Criminal
your bank birth
assets
records
A
Virus
Fraud
Adware
Spyware B
buy
stocks.
Shill
bidding
Internet
stalking.
pop-ups.
Use a
fake email
address.
invest
without
risk.
make
large
amounts
of money
by parking
purchase funds in
off-shore their bank
property. account. D
Phishing
cyber
stalking.
cookies.
Siphoning
virtual
stalking.
spam.
Never use Use a
your real proxy
identity.
server.
Message
Physical sequence
Security number
Encryption controls
checking
I only
irc
II only
ftp
Hoaxing
Web
stalking.
viruses.
Use antispyware
software.
Logical
access
controls
Neither I
Both I & II or II
www
telnet
B
B
B
B
B
C
C
Adds
more
Verifies
Increases
bytes to
integrity of boot up
programs files
time
HTML
Internet
Explorer
Microsoft
Excel
round trip
HTML
HTML
document. document.
.con is
.com is
.co in
used for
used for used for companie
company company s
Web
query.
the World
Wide Web
round trip Consortiu
HTML.
m
HTML.
XML.
HTML.
DHTML.
clicking a
using
hyperlink
Internet
that
Explorer
reference
to view a
sa
Web page updating document
that is
the values that is
stored on that are
stored in
the hard obtained the floppy
drive on
through a drive on
your
Web
your
computer query
computer
Click on
the Back
arrow until Click on
Go to the
the
„Go to‟ or History
desired
„Search‟ in page and
site is
the
look for
found
browser
the site
Misleads
a program
recompilat
ion
B
both
HTML and
Internet
Explorer B
Web
browser.
B
None of
the above A
one way
HTML.
MHTML
C
D
viewing an
Excel
worksheet
that you
have
saved as
a Web
page.
B
Go to the
Bookmark
s or
Favorites
page
C
the
the
the Insert the
External
Refresh
Hyperlink Update
Data
command command command command A
Screensa
Hyperlink ver
Sound
BMP
GIF
JPEG
Video
TIFF
C
C
Cut and
paste it to
a word
processor
document.
network
extranet. intranet.
topology
an
an
attachmen a
encryption
t.
signature. a footer. .
VoIP
IPT
IPP
PoIP
Desktop Desktop Desktop Desktop
client,
client,
server,
server,
applicatio software, applicatio software,
n, and
and
n, and
and
database. hardware. database. hardware.
Telephon None of
Modem
CD-ROM e line
the above
File
File
Transmiss File
Transfer ion
Transfer None of
Program Protocol Protocol the above
So
computers
can be
So IP
So email
reference addresses is
d by a
can be
delivered None of
name
shorter
faster
the above
143.215.1 None of
193.1.2.3 45.1.1.1 2.19
the above
paul .trigg
@
paul.trigg
domain.
@domain. paul.doma None of
org. uk
org.uk
in.uk
the above
Scientists
The US
in
governme Switzerlan
None of
nt
d
No-one
the above
Write it
Save it to down on a
a floppy
piece of
disk.
paper.
Internet
Relay
Chat
It will be
deleted
Internation
al Relay of
Character
s
Add it to
„Favourite
s‟ or
„Bookmar
ks‟.
privileged
network.
Internet
Remote
Conversat
ions
A letter
It will be will be
waiting for sent to
you to
you in the
collect it post
C
A
B
A
A
B
B
A
D
B
C
None of
the above A
None of
the above A
Hyper
Textual
Mark-up
Lingo
Receiving
messages
automatic
ally from
anyone in
the group
Hyperlink
Text
Marking
Language
Hyper
Text Markup
None of
Language the above C
clipart &
auto
shapes
People
discussing
a topic of
interest
globally
autolayout
s and
presentati
on
templates
circles
points
squares
icons
C
square
image
short cut
menus
grid
auto
shapes
guide
all the
above
C
tool bars
High
volumes
of email
None of
the above C
slide view
& outline none of
view
the above B
slide show
clip gallery & view
fonts &
& word art show
images
none the
above
all the
wave file media clip .video file above
movelast,t movelast,f
eof,false rue
alse
eof,true
form
properties layout
project
window
window
toolbox
explorer
movefirst,t movefirst,f
bof,false rue
alse
bof,true
value()
int()
number() val()
circle
true
true
rectangle square
false
false
fontcolor
underline,t
rue
textsize
onemillionth
of a
second
color
fontunderli
ne,true
size
onehundredth
of a
second
recordcou
nt
count
forecolor
textunderli
ne,true
foresize
onethousandt
h of a
second
oval
none of
the above
none of
the above
fontsize
one-ten
thousandt
h of a
second
itemcount listcount
B
A
B
D
D
D
D
D
A
A
C
B
D
C
D
form
layout
window
prperties
window
title
prompt
project
explorer toolbox
B
vbmsgbox none of
style
the above C
msgbox() textbox
label
inputbox() D
opendyna opensnap dbopensn dbopendy
set
shot
apshot
naset
D
load
activate
standard
blue
red
opaque
red
green
form
properties layout
window
window
form
properties layout
window
window
change
lostfocus
unload
transpare
nt
green
blue
initialze
graphical
black
white
project
explorer
toolbox
window
project
explorer
toolbox
window
text
gotfocus
none of
container the above
child
true
load
parent
false
unload
enabled
visible
value
dime
.ctx
Validate
On Error
GoTo
linelabel
UpdateCo
ntrols
dim
.ctl
Validation
On Error
GoTo
Inline
PaintPictu
re
var
.ctr
Check
initialize
C
D
B
D
D
A
D
C
A
D
activate
none of
text
name
caption
the above C
opendatab
openrecor none of
ase
dbengine dset
the above B
C
On Error
Stop
style
none of
the above
.ocx
Audit
On Error
Resume
Next
Refresh
Resize
A
Cancel
parameter Cancel
to a non- parameter
zero value to 0
UnloadMo
de
parameter
to a nonzero value
1
3
UnloadMo
de
parameter
to a zero
value
A
None of
the above D
2
B
B
A
D
Consists
Consists of several
of several Applicatio
Programs ns
Form
window, Project
standard window,
or code
view code
module
window
Place
Place
code in
code in
the
the
Terminate Unload
event
event
AutoRedr
AutoRedr aw =
aw = True False
Msgbox
err.no &
err.text
Consists
of Various
Forms
Consists
And Code of several
Modules Projects D
Class
module,
code
module
Place
code in
the
Deactivate
event
None of
the above A
None of
the above B
PaintPictu
Refresh
re
A
Msgbox
Msgbox
error.num
Msgbox
error.num ber &
err.numbe ber &
error.desc
r & err.text error.text ription
D
To
provide a
repository
for images
To display To help in To allow used by
images to creating a the editing other
the user ToolBar
of icons
controls
D
GetFileNu
FreeFile m
GetFile
GetBytes A
GetProper
Retrieve Get
ty
Value
B
Common
messages
passed to Open
Windows
Windows dialog box explorer
Caption
Visible
Multi-Line
Click,
KeyUp
KeyUp
Click and and
and
KeyPress KeyDown KeyDown
Ascii
Binary
Input
Format
Format
Mode
CurrentX ScaleLeft ScaleHeig
and
and
ht and
CurrentY ScaleTop ScaleTop
Input box
Font
KeyPress,
KeyUp
and
KeyDown
Output
mode
D
C
x and y
A
D
B
Property
Get
Backgrou
nd color
property
Property
Assign
Property
Let
Caption
property
ZOrder
property
Min
Max
Value
Shell
Substr
SetAttr
CStr
A
Are
actually
not
None of
properties the above B
Are one
and the
same
Can be
different
at times
You do
You do
not have
not need the
to use the permissio
Set
n to
command access
here
the class
MyVar
has not
been
declared
The
ExecProc
The Open The Exec edure
method
method
method
A critical An
A warning message exclamati
query icon icon
on icon
Property
Set
C
AutoRedr
aw
property C
CurrentVa
l
B
None of
the above C
None of
the above D
None of
the above B
built-in
intrinsic
procedure
statement. variable. constant. .
C
InputBox MsgBox
function
statement
can be
can be
MsgBox InputBox created
created
statement function
with the
with the
returns a returns a macro
macro
value,
value,
recorder, recorder,
while the while the while the while the
InputBox MsgBox MsgBox InputBox
function
statement statement function
does not. does not. cannot.
cannot.
B
Data
cannot be
A new
entered
The form Data can check box
into the
can be
be
can be
form.
modified. entered. added.
C
QueryUnl
Unload
oad
Deactivate Terminate C
scribble
clipping
cropping cutting
drawing
tool
tool
tool
tool
A
color
palette
ascent
10
column
images
color
guide
primary
tricolor
color
color
scheme
palette
scheme
28
18
36
bar
pie
linear
slide
images
sorter
and text
slides
views
all the
radar
doughnut above
data point data
stream
color box
color
scheme
circular
entity
Microsoft
organizati
on chart clip art
C
A
C
A
C
A
B
auto
shapes
the chart
window
the
the chart opens
organizati is made
displaying
on chart is available a chart
expanded for editing template
general
custom
purpose drawing
box tools tools
tools
track
changes
used to
create a
used to
manager
mange
accessed box for an
organizati only by
existing
onal chart manager box
not
available
in the tool
turned on turned off bar
used to
store the
other tools
of the
organizati
onal chart C
none of
the above C
standard
drawing
tools
C
available
in the tool
bar
any of the
once
twice
thrice
above
two
four
five
eight
standard all the
native tool draw tool tool
above
autolayout handlayou
none of
s
ts
slide view these
reduce/enl
none of
zoom
arge
preview
the above
importing exporting copying
Microsoft auto
excel
shapes
clip art
.rtf(rich
.ppt(Powe text
.doc(docu
rPoint)
format)
ment)
A
B
C
B
B
B
B
moving
B
drawing
tools
A
.html(hype
rtext
format)
B
nine
.rtf(rich
text
format)
only one six
.wmf(wind
ows
.txt(plain
metafile) text)
not
displayed
during the
slide show
DTS(digit
al track
sound)
displayed
only
during the
slide show
3D(3
dimension
)
build
notes
master
transition
slide
master
twelve
.doc(docu
ment)
B
displayed
only in
outline
none of
view
the above A
both a and
b
transition
slide show view show
master
master
slide
notes
slide
outline
sorter
view
slide view view show view
15
10
7.5
inches,10 inches,7.5 inches,5 none the
inches
inches
inches
above
none of
portrait
landscape a or b
the above
animation view show transition
gif
jpeg
during
slide
transition
spell
checkers
custom
slide show show
notes
slide pane pane
internet
explorer
when the
slide show
is run
header
files
both a and
b
properties
pane
D
A
A
C
B
A
b or c
A
none of
the above D
all the
above
D
png
action
hyperlink hypertext button
visual
basic for Microsoft
applicatio visual
all the
visual c++ n
interdev
above
macro
batch file templates add-ins
while
creating a
.exe file
virus
checkers
C
none of
the above
all the
above
none of
the above
outline
pane
B
A
C
A
B
D
paint shop paint shop power
pro
pro
point 2000 D
PowerPoi
nt creates
a sample
presentati
on to
which
user can
add words
and
pictures
it is the
quickest
way to
create a
presentati
on
contains
sample
presentati
ons for a
variety of
topics
user can
insert
user can picture to
user can insert only the
insert
premaster
objects
drawn, pre- slide
like clip- colored
which gets
arts,
graphic
reflected
pictures
images
in all the
stored in a reflected slides
separate in a clip
using that
files to the arts to the master
slides
slides
slide
in notes
in outline in slide
pages
view, drag sorter
view, drag
the slide view, drag the slide
icon to a the slide icon to a
new
to a new new
location
location
location
the slide
that holds
the
formatted
placehold
ers for the
design
titles,
templates
main text
is the
and any
template
backgroun transition whose
d items
means
format
that user applying and color
wants to special
scheme
appear on effects to user
the slides the
applies to
is called a crossover a
master
between presentati
templates the slides on
provides
suggested
content
and
design
D
user can
insert
picture to
the title
slide
which gets
reflected
in all the
slides
using that
title slide B
I slide
view, drag
the slide
icon to a
new
location
C
the slide
that holds
the
formatted
placehold
ers for the
title and
sub-title
for the
presentati
on is
called a
title
template D
with notes
pages
view user
can
prepare
speaker
notes and
handouts
the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
template
slide
layout
in outline
view, user
can see
the
miniatures
of all
slides in a
presentati
on,
complete
with text
and
graphics
user
should
select the
slide view
to add the
text to the
slide
the slides
can be
reordered
in the
outline
view
B
the slide
that holds
the
formatted
placehold
ers for the
title and
subtitle for
the
presentati
on is
called a
title
template D
set up
customize new slide show
B
design
template
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on
by default,
doughnut
data to be chart is
graphed displayed
resides in based on
a
the data in
datasheet the
window
datasheet
the
master
the slide
slide
master
office
spell
assistant checker
10
12
once
twice
data is
plotted in
a chart
window
the
header
slide
grammar
checker
102
three
user can
add data
labels and
gridlines
to the
chart
B
the format
slide
none of
the above
22
four times
B
B
B
B
text,
text,
hypertext
graphics and
and email Power
address. Point.
CD-ROM,
digital
camera
and
sound.
text,
hypertext,
Power
Point,
video and
sound.
D
the Line
style
the Font
and the
text
alignment
Line style,
Line color,
text font,
and text
alignment D
the Line
color
Fill color,
Line color,
Line
and Line
Fill color Line color thickness thickness D
A popup
box
prompts Microsoft
Excel is
you for an Graph is
started so existing
started so The graph
that you
Excel
that you
placehold
can create chart to
can create er is
a chart.
insert.
a graph. deleted.
C
taken
from the
first
column or
row of
data in the
datasheet,
always
depending
always
taken
on
taken
from the whether
from the first
the data
first row of column of series are
data in the data in the in rows or entered by
datasheet. datasheet. columns. the user. C
Side-byside
Stacked
column
column
Pie chart Line chart B
It
automatic
ally
displays in
Slide
view.
Click the
Insert
Chart
button on
the
Standard
toolbar.
Click the
chart
object,
then click
the View
Datasheet
button on
the
Standard
toolbar.
Single
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
linked to
the
PowerPoi
nt
presentati
on.
Double
click the
chart.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
embedde
d in the
PowerPoi
nt
presentati
on.
Pull down
the Insert
menu and
select
Chart.
Pull down
the Insert
menu and
select the
appropriat
e Object.
Pull down
the Insert
menu and
select
Chart,
click the
Insert
Chart
button on
the
Standard
toolbar, or
pull down
the Insert
menu and
select the
appropriat
e Object. D
You
cannot
display
Pull down the
the Edit
underlying
menu,
datasheet
then
once the
select
slide is
Object.
finished. B
Change to
Click
Slide
outside
Sorter
the chart. view.
C
The
datasheet
window is
The
toggled
datasheet from
is saved closed to
as a
open (or
separate from open
file.
to closed). D
The
applicatio
n that
The chart
The chart created
is
The chart is doubled the chart
selected. is deleted. in size.
is started. A
The chart
The chart Microsoft
is
The chart is doubled Graph will
selected. is deleted. in size.
restart.
D
a slide
one bullet
item at a
time, build
bullet
items a
letter at a
time, and
build
a slide
bullet
bullet
bullet
one bullet items one items one items a
item at a letter at a word at a word at a
time.
time.
time.
time.
D
Subtle,
Moderate,
Subtle
Moderate Exciting
or Exciting D
Neither
enter nor
Both enter exit;
and exit, neither fly
Fly in from and fly in in from
Enter and top or
from top top nor
exit
bottom
or bottom bottom
C
Enter
Shift
Alt
Ctrl
B
the way
objects
appear on
a slide.
what
objects do
after they
appear on
a slide.
the way
objects
exit a
slide.
The
advanced
timeline
shows the
sequence
in which
objects
The
The
will
advanced advanced appear on
timeline
timeline
the slide
shows the shows the and the
sequence duration duration
in which of the
of the
objects
effect
effect
will
applied to applied to
appear on each
each
the slide. object.
object.
Clips
Organizati
on charts Text
Paint
program
Draw
program
Filtering
program
From top
Dissolve
in
Fly in
Custom
animation
can be
used to
affect the
way
objects
appear on
a slide, to
what
objects do
after they
appear on
a slide,
and to the
way
objects
exit a
slide.
D
The
advanced
timeline
shows
neither the
sequence
in which
objects
will
appear on
the slide,
nor the
duration
of the
effect
applied to
each
object.
C
Clips,
organizati
on charts,
and text
D
Animation
program A
Fly in,
From top,
and
Dissolve
in
D
Once data
is entered
it cannot
be
changed.
OLTP.
You can
change
the
appearan
ce of a
whole
diagram,
but not
individual
shapes of
a
diagram.
[Enter+A]
.vbg
Data
cannot be
Once data entered
is entered into
it can be Datasheet
changed. .
OLAP.
OLST.
You can
change
both the You
appearan cannot
ce of a
change
whole
the style
diagram of the
and the
connectin
individual g lines in
shapes of an
a
Organizati
diagram. on chart.
[Shift+Z] [Alt+Z]
.vbp
.frm
There is
no such
thing as a
Datasheet
.
B
OLIP.
B
Dir1.Path
=File1.Pat
h
openrecor
dset
You
cannot
change
the color
of the
boxes in
an
Organizati
on chart.
[Ctrl+Z]
.frx
none of
additem
loaditem the above
loadpictur
none of
e
addpicture the above
Dir1.Path
=
File1.Path
Drive1.Dri =
none of
ve
Dir1.Path the above
message(
none of
)
msgbox() the above
Dir1.Path
=
File1.Path File1.patte
Drive1.Dri =
rn=Dir1.pa
ve
Dir1.Path th
opendatab recordcou
ase
nt
count
update
append
addnew
append
update
additem
addnew
B
moveprevi
ous
movefirst C
add
load
Drive1.Dri
ve=Dir1.P
ath
messageb
ox()
movenext movelast
Cancel
parameter
to a nonzero value
Word
2000
UnloadMo
de
Cancel
parameter
parameter to a nonto 0
zero value
Office
2000
Office 97
additem
B
D
B
B
B
B
C
C
C
C
UnloadMo
de
parameter
to a zero
value
A
Back
Office
A
click-ntype
office
clipboard
shift+end
and
shift+hom
e
double
click
drag &
drop
cut
select
shift+left
and
shift+right
normal
web
layout,
layout,
web
printlayout layout
ctr+end
and
ctr+home
web
layout,
page
layout
click from
start
program,
MSWord
from the
templates task menu
inbox
document
assistant assistant
none of
the above A
none of
the above A
none of
the above B
none of
the above A
none of
wizard
the above
office
none of
assistant
the above
Screen
Document
Tip
Tool Tip Icon Tip
Tip
marginal
none of
tab stop
stop
ruler
the above
home and up and
up arrow page up end keys down
keys only keys only only
arrow
left
center
decimal
rotation
dialogs/al none of
template model
erts
the above
increase decrease both A
none of
indent
indent
and B
the above
special
control
design
effect
tool box
wizard
pictures
drawing
control
toolbar
box
database forms
1
2
0
11
page
printer
print
setup
setup
preview
from the from the from the
none of
file
file menu file
the above
none of
border
shading
style box the above
ctrl+a
Del
ctrl+f
ctrl+m
ctrl+a
Del
ctrl+f
ctrl+m
CTRL+SH
CTRL+SH CTRL+SH
IFT+F
CTRL+O IFT+S
IFT+P
ctrl+shift+ ctrl+shift+
ctrl+shift+f ctrl+o
s
p
None of
Excel
Access
Both
the above
A
A
A
B
D
D
B
C
A
A
A
A
A
A
D
A
C
B
True
False
Valid
Signs
HLOOKU
P
False
True
Transactio Limit
n type
Check
VLOOKU
P
A or B
DDE
OLE
Analysis is
the
loading of
programs
that
perform
routines to
control
peripheral
devices
ODBC
This
involves
looking at
a system
and
finding out
how
informatio
n is being None of
handled
above
C
Inputs,
outputs,
Only
file design
hardware hardware,
and
and
software software
To
execute
To collect any
data
programs
Deleted
Copied
from the from the
disk
disk
Maintenan
ce,
reliability,
and
upgradea None of
bility
above
B
Analysis
translates
program
code of a
high level
language
to
machine
code
To
maintain
security
A
B
Reasonab
leness
D
None of
the above B
All of the
above
C
Saved to
the disk
None of
the above D
Transferre
d from the
disk
A
Users
operate
the
manual
system
and
computer
system at
the same
time
Users
operate
the
computer
system
from a
given date
Users
operate
the
manual
system
None of
above
B
The new
system is
introduced
alongside
the
existing
system
The new
system is
introduced
and users
start
operating
it
Users
continue
operating
the old
None of
system
above
A
Instruction
s and
technical
document
ation
User
Guide and
technical
document
ation
User
guides
cover how
To enable to run the
any printer system,
to be
enter
For
connected data,
technical to the
save,
support
network
print, etc.
Network
Operating systems Database
systems and
systems
and
communic and
system
ation
backup
services services services
Magnetic
tape
storage
CD-ROM floppy disk
To
To help
maintain a
someone
backup
who is
copy of all
applying
the
To do a
for
informatio particular employme
n
task.
nt
Address
Data bus Auto bus bus
FDDI
BAD
TED
Address
Data bus Auto bus bus
Data
Operating structures
system
that are
Peripheral routines
part of the
s that are that
kernel of
connected execute in an
to a
supervisor operating
computer. mode.
system.
binary
ASCII
decimal
form
code form form
were 7
bits
4 bits
Log files
and
temporary
files
8 bits
8 bits
represent
ed 256
characters
16 bits
None of
above
C
None of
above
C
None of
the above A
Hard disk B
None of
the above
Control
Bus
MAD
Control
Bus
B
A
B
D
Shells,
compilers
and other
useful
system
programs. D
alphanum
eric form A
represent
ed 127
characters A
32 bits
A
More than
1000
mega
1000
bytes
kilobytes
32
registers
used to
indicate
uppercase
letters
ROM
bits per
second
memory
capacity
have
fewer
instruction
s than
RISC
machines
ALU
Power is
switched
off
a parallel
interface
32 I/O
devices
1024
230 bytes bytes
A
a 32-bit
bus or 3232 Mb of bit
RAM
registers D
used to
detect
errors
RAM
is the first
bit in a
byte
DRAM
baud
bytes
is the last
bit in a
byte
B
CROM
A
memory
access
time
Hertz
D
secondary
secondary storage
storage
access
capacity time
B
use more
RAM than
RISC
machines
have
medium
clock
speeds
Registers Variables
Data is
not saved
Computer before
is
computer
improperly is shut
shut down down
a serial
printer
interface interface
dot matrix ink-jet
line printer printer
printer
stores
more
is faster
informatio
to access is nonn than
than RAM volatile
RAM
increased
the
provides
storage
backup
capacity increases power in
of a
the
the event
computer process
of a power
system
speed
cut
use
variable
size
instruction
s
D
Logic Bus A
All of the
above
D
a modem
interface B
laser
printer.
D
is used
for cache
memory B
none of
the
previous
C
has more
storage
is a form capacity
of ATM
than an
card
ATM card
CRT
displays
LCD
displays
is an
access
contains
card for a a
security
microproc
system
essor
C
none of
SSGA
the
displays
previous B
having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous
A
having
several
softwares
running at
the same
time
D
the ability
to run 2 or
more
programs
concurren
tly
writing
programs none of
in multiple the
languages previous
ALU
Registers Variables Logic Bus B
magazine
brochures s
CD-ROM e-mail
D
to run
more than
one
an
program
multitaski operating at the
none of
ng
system
same time the above C
none of
multitaski multiprogr
the
ng
amming
multiuser previous C
ONLINE
ONLINE PAGELAY DOCUME
NORMAL LAYOUT OUT
NT
A
ctrl+m
ctrl+v or
ins
ctrl+2
ctrl+c or
ins
ctrl+end
ctrl+x or
ins
ctrl+home B
ctrl+v or
Del
A
none of
the above B
ctrl+2
ctrl+5
Text Box
Header
and
Footer
Frame
ctrl+1
AutoShap
e
Border
Screen
Tips
Page
Layout
A
none of
the above A
Chart
WordArt
Auto
Shapes
File
A
Borders
Shading
WordArt
Bullets
D
clear
remove all remove
clear all
D
picture
arrow
circle
bullets
bullet
bullet
dialog box dialog box dialog box
AutoShap
charts
WordArt es
document new
doc1
1
document
hyphenati mail
thesaurus on
merge
shift+f7
thesaurus
menu
shift+f8
first
second
tab
convert
text to
table
end
convert
data to
table
rows &
row
columns
AutoCorre AutoForm
ct
at
Mail
Merging Macro
visual
basic
basic
shift+f8
shift+f7
web
online
layout
layout
view
view
email
outlook
client
express
html
xml
internet
intranet
first row
none
dialog box A
files
C
default
document B
none of t
he above A
tools+spel
ling menu A
last cell of
the t able A
none of
the above A
enter
table auto
format
none of
option
the above
none of
records
the above
style
none of
gallery
the above
Data
none of
Source
the above
visual
vj++
FoxPro
alt+f8
alt+f5
browser
micro soft
outlook
sgml
arpanet
A
B
A
B
B
A
none of
the above A
hotmail
vb script
LAN
A
A
A
field
field name
names in
must be the field
the
listed in
separator header
the same s in a
source
order as header
must
the
source
match any
correspon and the
merge
ding
data
fields
informatio source
you've
n in the
can not be inserted in
data
set as
the main
source
paragraph document
auto
format
option
by default
applies to cell height
it is not
the entire and
possible table and weight
to change not only to option
the height the
applies to
of only
selected all the
selected rows or
rows and
rows of a columns columns
table
of a table of a table
left
decimal
justified
the
number of
fields
names in
the
header
source
must be
the same
as the
number of
data fields
in the data
source
B
delete
cells
option
allows to
delete the
entire row
or a
column or
shift cells
up or
shifts cells
left
C
top
A
A new
section is
created in
order to
change
properties
like
number of
columns
true
In order to
type a
header
from the
third page
of the
document
a section
break is
inserted
after t he
third page
false
A section
is a
portion of
a
document
in which
certain
page
formatting
option can
be set
D
A
true
true
drag &
drop
true
false
false
click -ntype
false
If a
header is
inserted in
the
second
section
then the
same
header is
applicable
to the first
section
A
A
Double
Click
none of
the above B
A
with t he
caps lock
key
accidentall
y turned
on
reverses
the case
of the
letters that
automatic prohibits
were
ally
the user automatic capitalized
corrects
from
ally
incorrectly
common renaming corrects
and then
typing,
an auto
the
turns off
spelling
correct
grammatic the caps
errors
entry
ally errors lock
B
password
protected
document
can be
opened
password
password without
password can be
can not
password are not
upto 15
include
as read
case
characters
spaces
only
sensitive long
B
left
justified
hanging
top
A
a .ppt file
can not
not be
inserted at
specified
position in
the
current
document
true
true
a
document
file can be
inserted in
the
current
document
at
specified
position
false
false
true
true
false
false
Master
Document
Print
Layout
View
Child
Hyperlink none of
Document Document the above A
Page
Layout
a multiple
document
s files can
be
inserted in
the single
document
an .xls
data can
not be
inserted at
specified
position in
the
current
document B
A
A
B
A
Outline
Layout
none of
the above B
Insert
Mode
Type Over
mode
Remove
press the
press the press the escape
return key tab key
key
layers and lines and
planes
spaces
enter/retur
tab
n
grammar spell
checker
checker
send a
public
message
to friends
interested send
in one
pictures to
topic
a friend
From ___
Print all
To ____
Enter
Copy
closing
tabbing
none of
the above A
just keep
typing
height and rows and
width
columns
backspac
e/ delete shift
thesaurus outliner
send
private
messages
to a friend
Page
setup
Retrieve
spacing
word
processin
g
send a
package
to a friend
Print
preview
Save
sorting
D
D
B
C
D
B
C
B
spreadshe
database graphing
et
C
Creating
and
To
editing
Storing
analyse
document informatio None of
figures
s
n
the above B
subscript
To
analyse
figures
annotation
Creating
and
editing
document
s
clip art
clipboard
C
Storing
Making
informatio Calculatio
n
ns
B
Font,
Spelling,
Paragraph
grammar
, Bullet
Clear,
and
Cut, copy, and
replace
autocorre paste and Numberin
and select ct
clear
g
C
Text
Text at
Numbers which
the
which
appear at Designate
bottom of appear on the top of d area on
every
every
every
the
page
page
page
document C
Mouse,
printer
and
processin
g system
keyboard?
Keyboard,
Mouse,
monitor
and
printer
Clear,
replace
and
Toolbars
Monitor,
keyboard
and
mouse
microphon
clip-art file e
Spelling,
grammar
and
Cut, copy,
autocorre paste and
ct
clear
6 point
10 point
15 point
2½
inches.
2¾
inches.
3 inches.
You are
not in
Print
Layout
view.
Word
cannot
display
columns
during
editing;
You have You have you will
not
not
see them
inserted a specified only when
column
continuou you print
section
s section the
break..
breaks.
document. A
Browser
to move a
section of
text from
the
original
to store a to store a location to
file on the file on a
another
hard drive diskette
location
Data
about a
set of
A set of
similar
Mainly
different
things
text
graphics
Thesauru Spell
Grammar
s
Checker Checker
None of
the above B
digital
scanner
D
None of
the above C
25 point
B
impossibl
e to
determine
.
B
to leave
an original
section of
text in
place
while
pasting a
copy
elsewhere D
None of
the above B
Find and
Replace B
Paste
Replace
Select all
AutoCorre
ct
B
Copy,
Cut, then
then paste paste
Delete,
Insert,
then paste then paste A
To give
the
original
author a
chance to
accept
suggested
changes
from the
person
who
entered
the
revisions
To
complicat
e the
revision
process
and to
force the
author to
spend
more time
making
correction
s
To allow
multiple
people to
work on
one
document
in
collaborati
on with
one
another
C
A vertical
line
outside
the left
margin
A red
signifies a
A line
underline change
appears appears has been
through
beneath made at
text that is text that is that point
to be
to be
in the
deleted.
added.
document.
Through Through
the Edit
the Tools
menu by menu by Through
choosing choosing tools on
Track
Track
the
Changes Changes Reviewing
command command toolbar
Comment
s are
enclosed
in a text
box at the
right of
the
document. D
Both
through
the Tools
menu and
the
Reviewing
toolbar
D
To give
the
original
author a
chance to
reject
suggested
changes
from the
person
who
entered
the
revisions
The
Versions
command
will allow
you to
save
multiple
versions
of a
document,
including
any
changes
that may
have been
made to
that
document.
The
Versions
command
will allow
you to
save only
one
version of
a
document,
including
any
changes
that may
have been
made to
that
document.
The
Versions
command
will allow
you to
save only
one
version of
a
document
without
any
changes
that were
just made
to the
document.
The first
and
All
second
versions The latest versions
are
version is are
opened
opened
opened
automatic automatic automatic
ally.
ally.
ally.
Grammar Spell
Dictionary check
check
Word will
Word
The most show the
displays a recent
name of
list of the version
the
dates and will
person
times
appear at who
each file the
saved
was
bottom of each
saved.
the list.
version.
Fields
Check
boxes
Tools
Toggle
button
Forms
The
Versions
command
will allow
you to
save only
two
versions
of a
document:
one
version of
the
original
and one
version of
any
changes
made to
the
document. A
The
previous
version is
opened
automatic
ally.
B
Thesauru
s
A
Word is
not able to
tell the
most
recent
version of
a
document. A
Insert
A dropText fields down list
C
B
Comment
s can be
edited or
deleted by
right
Comment clicking
Comment s cannot the
s cannot be
highlighte
be edited. deleted.
d text.
Text
Text at
Numbers which
the
which
appear at
bottom of appear on the top of
every
every
every
page
page
page
Comment
s can be
edited or
deleted by
left
clicking
the
highlighte
d text.
C
Fault
Finding
Insert
Debuggin
g
D
Edit
C
None of
the above C
Insert
Press
Copy and page
Press tab. Return.
paste.
break.
D
text.
graphics. forms.
numbers. C
header/fo bibliograp find/searc
oter.
hy.
h.
macro.
A
This
Format
action is
Copy
Paste
Painter
not
button
button
button
possible. C
Bug
Squashing
Tools
a section
of text
where the
first letter
of each
sentence
a section is
of white
lowercase
text on a and the
black
rest are
backgroun uppercase
d.
.
setting it
in larger typing it all
type or
in capital
font size. letters.
Error
Injecting
Format
the
guidelines
used to
establish
where
different
elements
of the
newsletter
will go.
underlinin
g the text
of the pull
quote.
an
enlarged
capital
letter at
the
beginning
of a
paragraph
.
A
changing
the color. A
The
The width height of
of each
each
column
column
6
10
The
number of
columns
12
A grid is a
set of
horizontal
and
vertical
lines that
determine
the
placement
of
elements
in a
newsletter
or other
document. D
The tab
spacing
within
each
column
D
72
D
One
Three
Four
A dropped
cap is a
word that
The
A pull
starts with
reverse
quote is a a
technique quotation lowercase
means to taken
letter
add dark from
when it
text on a (pulled)
should
light
from
have a
backgroun another
capital
d.
document. letter.
Two
Press
Press
Ctrl+Shift+
Ctrl+Enter Enter to
to create create a
a page
column
break.
break.
A sans
A serif
serif font
font at 10 at 10
points
points
B
Press
Enter to
create a
section
break.
Press
Shift+Ente
r to force
a line
break.
C
A sans
A serif
serif font
font at 20 at 45
points
points
D
2 inches
3½ inches 4 inches
Field
Record
Both
Horizontal Vertical
A or B
Duplicate Combined
Value
Value
Gaps
It depends
on the left
and right
margins,
and how
many
columns
are
specified.
None of
the above
None of
the Above
All of the
above
D
A
A
C
Cross
Tabulate
RAND()
None of
Filter
Merge
the above A
VLOOKU HLOOKU None of
P()
P()
the above B
TRUE
TRUE
FALSE
FALSE
A
A
None of
Unusual Strange
A or B
the above C
exception compariso duplicates All of the
testing
n of data testing
above
D
True
False
A
True
False
A
Both B &
Limit
Sequence Range
C
related to
none of
virtual
a form of a form of the
reality
ROM
VRAM
previous
same as same as
multitaski multiprogr
ng
amming multiuser
B
D
involves
using
more than
one
processor
at the
same time D
use a
virus
protection
program B
save the
file
make a
set up a
backup
password copy
to
calculate
numbers
to read
from or
write
informatio to print
n to a
sheets of
floppy disk paper
B
Uses
Cobol
106 sec
uses
Java
103 sec
D
D
a keypad
a mouse
to display
informatio
n or
pictures
on a
screen
none of
the
uses C++ previous.
1012 sec 109 sec
a
message
a frog
pad
B
data to be
transferre
d to
memory
data that
has been the
transferre address of
d from
a memory
memory location
data to be
transferre
d to or
from
memory
the
address of
a memory
location
data to be
transferre
d to the
stack
an
instruction
an
that has
instruction been
that has
fetched
been
from
decoded memory
a scroll
a cursor bar
Formula
an
instruction
that has
been
transferre
d from
memory. C
an
instruction
that has
been
transferre
d from
memory A
the
address of
the next
instruction
to be
executed D
a magic
a light pen marker
A
an
instruction
that has
been
executed
Algorithm Program
Artificial
Assemble
Intelligenc
r
Compiler e
Memory Parity
Range
protection Checking checking
use the
directory search
use the
search
each file backup
tools
in turn
facility
Network Program System
save
copies of
the file
with the
use
same
different keep a
name on filenames record of
the
on the
computer
system
system
failures
Multiproce Time
Multiprogr
ssing
sharing
amming
Floppy
ROM
RAM
Disk
Data
B
Parity
Checker
B
Validation B
use find
and
replace
Modem
A
B
backup to
a secure
medium
D
Multiplexin
g
D
Magnetic
Disk
B
Word
Telephon Sharewar
Firmware Processor e modem e
C
Word
Telephon Sharewar
Firmware Processor e modem e
A
Sequential Hashed
Operating
System
ALU
Tracks
and
Sectors
Blocks
and
Sectors
Indexed
CPU
Files and
Tracks
Character, Database, File,
field,
character, record,
database record
field
Random C
Primary
Storage
B
Schema
and
subschem
a
A
Element,
field, file
C
Valid
character
check
Sound
card.
Maintenan
ce
diagnostic Systems
program logs
MIDI
CD-ROM interface
Parity
check
Serial
interface
Text
Pictures
Sound
Video
D
Laser
Dot matrix Ink-jet
Drum
B
C
A
viewing an
encyclopa
edia CDROM.
creating
the plans
for a
building
design.
replaced
regularly
never
updated
recording
current
presenting stock in a
an order supermar
for stock ket and
to a
answering
warehous customer
e.
queries.
A
updated
updated once a
regularly year
C
Document
processor
make
efficient
use of
time
1024
Graphics
package
retain
confidenti
ality of
files
4096
Database
get into
the
system
quickly
512
loss of
confidenti
ality
TCP/IP
duplicatio virus
n of data infection
HTML
IPX/SPX
Spreadsh
eet
D
simplify
file
structures C
8192
C
loss of
data
NetBEUI
D
A
printer
can do
1000s of
pages a
day
the
operating
system is
easy to
use
B
the hard
drive
D
up-line
universal provider
port serial service
the root
directory
uninterrup
table
power
supply
uniform
page
source
C
the
program
executabl
orphan
e may not
files can allow it to
be left on be
the
uninstalle
system
d
the
system
requires a
network
administra
tor to
uninstall it
access to
the
internet is files can
quicker
be shared
a
a file
subdirecto
name
ry
data.
Graphical
represent
ation of
logic
Purchase,
sales,
receipt,
payments
etc.
document informatio
s.
n.
text.
A
Rules
writte in
procedura
l language
Logical
Steps in
any
None of
language the above A
To fill the
log
register
It is
mandatory None of
in tally
the bove
assist in
maintenan speed up
ce
access
IT
senior
managem
executive ent lacks
support
leadership
for IT.
.
input.
the
system
always
requires a
re-boot
and
defrag
afterwards A
output.
A
prevent
unauthoris allow
ed access encryption C
IT
understan
ds the
business
processin
g.
None of
the above B
All of the
above
D
The use
of
computers
to design
state-ofthe-art,
highquality
products.
specialist
or
functional
Software
that
generates
Using
innovated
computers designs
to do
and
architectur artistic
None of
e.
patterns. the above A
Applicatio
n Service
Provider enterprise local
B
ensure
the
identify
name the filename identify
the file
file
is not lost the file
type
D
All of the
above are
preventive detective corrective parts of IS
controls. controls. controls. controls.
external
static
dynamic extensible
hashing
hashing
hashing
hashing
A: (a) ,
B: (a) to
C: (a), (b), D: (b), (c),
(b), (d)
(d)
(c)
(d)
corrective preventive detective general
controls
controls
controls
controls
Compone
nt
Interface Settings
(a), (c),
(b), (c),
(d)
(d)
(a) to (d)
Turn the
computer
Press the off at the
reset
power
button.
point.
Ask the
person
next to
you.
(a), (b),
(c)
organisati
onal
controls
(a), (b),
(c)
Select the
„Shut
Down‟
option
from a
menu.
Use the
Find or
Search
feature.
(a) to (d)
Control
(a), (b),
(c)
D
A
C
C
B
C
Pull the
power
cord from
the back
of the
computer. C
Put your
hand up
and ask
the
teacher
C
(b), (c),
(d)
C
preventive corrective
controls
controls
C
(b), (c),
(a) to (d) (d)
C
program
change
call lights requests
data
thread
testing
testing
(a), (b),
(a), (b),
(d)
(c)
specificati
benchmar ons
parallel
k testing matching operations
resolution
procedure
s
C
loop
testing
A
Peripheral
Multiplexe processor Concentra
r.
s.
tor.
(b), (c),
(a), (b),
(a) to (d) (d)
(c)
Replacem
ent
personal Identificati
computers on of
Physical
for user
critical
security of
departme applicatio warehous
nts.
ns.
e facilities.
architectur interface procedura
al design design
l design
ClientComputer
server
Client
network
Star
Bus
Mesh
Job
control
language. D
(a), (c),
(d)
A
problem
logging
unit
testing
(b), (c),
(d)
(a) to (d) D
system
walkthrou
ghs
B
Crosstraining of
operating
personnel. B
data
design
A
Star
Bus
Ring
Hub
Ring
All of the
above
To
maintain a
backup
copy of
are written
all the
informatio
n
To do a
particular
job such
as editing,
storing
informatio
n
To help
someone
who is
applying
for
employme
nt
To Store
data in an
organised
manner
B
Direct
Systems
analysis
and
applicatio
ns
programm
ing.
A
sequential
file on a
disk
Sequential Binary
Data
communic
ations
hardware
and
software.
A
sequential
file on a
tape
Indexed
C
A
D
B
Operating
systems Computer
and
operations
compilers. .
C
A direct
A direct
access file access file
on a disk on a tape C
Tapes can
only be
Informatio
read by
n formats
the
commonly
machine
vary
on which Parity
between
they are errors will architectur
written
result
es
Address
Data path Control
calculation
part
Unit
part
Local
Distribute Area
Wide area
d systems network
network
Can send
data to a
computer
and
receive
data from
a
computer
Mixer
Allows
computer
signals to
be send
over a
telephone
line
Planetary
network
Office
Automatio
n
Data
record
can never
be
blocked
together C
Input
output
channel
A
Protocol
B
Use the
computer
to which
they are
connected
to perform
all
processin
g
operations
Generally
require a
keyboard
for data
entry and
a CRT for
display
Modem
Multiplexo
r
Are
required
with a
microproc
essor
which
permits
some data
processin
g such as
input
validation D
Time
sharing
computer C
Aids in
back-up
procedure
s
Ring
Network
Packs
data in a
disk file
Loop
Network
Speeds
up online
printing
Star
Network
Executor
systems
An
A dumb
intelligent
workstatio workstatio
n
n
Time of
day
control
Encryption
locks
algorithms
A
D
Electronic Instant
mailing
post-office C
A
A
personal mainfram
computer e PC
B
Parity
checks
All of
them
C
Type of
cable
Terminal
Standard
A
compiler
converts
the whole
A
of a
compiler higher
does a
level
conversio program
n line by code into
line as the machine
program code in
is run
one step
Feasibility
study,
system
design,
and
testing
CRC
Implement
ation and
document
ation
Baudot
An
interpreter
does the
conversio
n line by
line as the
program
is run
An
interpreter
is a
represent
ation of
the
system
being
designed
Modem
Demodula
tor
Device
Communi interconne
cation
ct
protocol
standard D
A
compiler
is a
general
purpose
language
providing
very
efficient
None of
execution the above B
Lexical
analysis,
CONVER
SION, and
code
generation
ASCII
An
interpreter
is a
general
purpose
language
providing
very
efficient
execution
Frequency
division
multiplexo
r
None of
the above D
EBCDIC A
None of
the above A
Time
Division
Multiplexo
r
C
MiddleHigh-level level
Low-level None of
languages languages languages the above C
It is faster
than
It is less
parallel
It is less prone to
communic error
attenuatio Uses only
ation
prone
n
one path D
Accountin
Financial Graphic
g
sector and design
systems,
engineerin and
commerci None of
g
education al sector the above C
Manage
Communi the paging
cate with function in
the
a virtual
console
environme
operator nt
Specificati
on and
System
design
Analysis
Fiber
Coaxial
Optics
Cable
Relieve
the main
CPU of
repetitive
communic
ation
tasks
Testing
Common
carrier
System
The
System
Analysis
design of Analysis involves
the screen defines
creating a
the user the format formal
will see
and type model of
and use to of data
the
enter or
the
problem
display
program to be
data
will use
solved
An
A cache interface A buffer
The
different
types of
network to
be used
Star
Testing to
check for
errors
before the
system is
introduced
Packet
Reduce
competitio
n between
the
input/outp
ut devices C
None of
the above B
Telephon
e Lines
C
None of
the above C
An online
protocol
B
Hardware,
Software
and size
of
None of
program. the above
Ring
Bus
None of
10101010 1100101 1010101 the above
Cyclic
Retransmi Redundan Hash
Parity
ssion
cy
Count
None of
15
4
64
the above
Multiplexo Acoustic
Port
Modem
r
coupler
None of
327
141
97
the above
Data
Data
Data
managem
warehous Mining
ent
All of
e
tools
systems them
secondary
memory secondary storage
memory access
storage
access
capacity time
capacity time
B
B
C
A
A
C
B
B
B
5C4
16 bits
None of
the above
alphanum
eric form
None of
the above
32 bits
Bit Code
Design
None of
the above D
210 bits
210 bytes
None of
the above
alphanum
eric form
None of
the above
30
binary
form
255
256
ASCII
decimal
code form form
4C5
4 bits
Basic
Coding
Descriptio
n
1B7
8 bits
1024 bits
10000
binary
form
Binary
Coded
Decimal
1000
bytes
1112
1110
ASCII
decimal
code form form
Numeric
Keyboard Keypad
Mouse
used to
indicate
used to
uppercase detect
letters
errors
Because it
squeaks
when
moved
bits per
second
Touch
screen
BPS
Printing
letters
OCR
Touch
screen
increased
the
storage
capacity
of a
computer
system
B
A
A
B
A
A
A
A
is the first is the last
bit in a
bit in a
byte
byte
B
Its moves
like a
None of
mouse
It has ears the above D
baud
bytes
Hertz
None of
Light pen Joystick
the above
MIPS
MHz
VLSI
Tracing
Reading None of
diagrams bar codes the above
voice
barcode recognitio
MICR
scanning n
CD-ROM None of
Hard disk drive
the above
provides
backup
increases power in
the
the event
process
of a power
speed
cut
Light
Refillable Pencil
sensitive
ink
lead
elements
100K
1.44 Mb 5 Mb
Scanner C
Digital
Signature
s
B
CD ROM
Hard disk Keyboard Drive
A
Optical
Bar code mark
reader
reader
Keyboard B
Mouse
Writing on
a hard
Printed
board
output
Coloured
spots
Pixels
Storage
Printer
device
Speakers
Storing
informatio
n on the
hard disk
Printer
Pickers
Mouse
Bar code
reader
Pixies
Pointing
device
Optical
mark
reader
CRT
displays
LCD
displays
SSGA
displays
screen
layout
mouse
button
layout
Mouse
Bar code
reader
keyboard
layout
Optical
mark
reader
language software
hardware interpreter interface
Credit
Smart
card
Speakers card
A
Back-up
on a
Cartridge B
B
CD-ROM A
None of
the above
none of
the
previous B
word
processin
g software C
None of
the above B
an
operating
system
C
None of
the above A
having
several
programs
writing
in RAM at
programs none of
the same multitaski in multiple the
time
ng
languages previous
A
having
several
programs
in RAM at
the same
time
The ability
to run 2 or
more
programs
concurren
tly
writing
programs none of
in multiple the
languages previous
B
To run
more than
one
an
program
multitaski operating at the
none of
ng
system
same time the above C
First generation
computers
.
Fifth generation
computers
.
A
none of
multitaski multiprogr
the
ng
amming Multi-user previous A
Vishwajee
t
Deep Blue Param
Arjun
C
is due to none of
is caused caused by bad disk the
by wear
overuse
blocks
previous C
Magnetic
Ink
Optical
Character
Bar code Mark
Recognitio Image
Reader
Reader
n
Scanning
Technolog Technolog Technolog Technolog
y
y
y
y
B
a fast
interpreter
Drum
Printer
encrypting
it
Very
important
reader
user
sequence
Second generation
computers
.
Third generation
computers
.
converts a
program
slower
to
none of
than an
machine the
interpreter code
previous
Dot Matrix
Desk - jet Thermal
Printer
Printer
Printer
decrypting compressi transmittin
it
ng it
g it
Vital
informatio Virtual
n
informatio
resource n reader &
under
user
None of
siege
system
above
C
A
C
B
Electricall
y charged
ink
mainfram
e
technolog
y
10-6 sec
Thermal
Paper
An ink
pen
LAN
technolog
y
10-3 sec
WAN
technolog
y
10-12 sec
An inked
ribbon and
print head D
Unix
operating
system
10-9 sec
Cross
Limit
Control
External footing
checks
figures
file labels tests
applicatio
operating communic
n
system
system
ation
pilot
project
model
project
process
multiproce multithrea multiplexi multitaski
ssing
ding
ng
ng
mainfram super
es
computers
arithmetic
control
and logic
unit
unit
micro
computers
central
processin
g unit
non
band
drum
impact
printer
printer
printer
data
word
electronic
managem processin spreadshe
ent
g
et
communic
integrated ation
idea
software software processor
my
recycle
Microsoft
computer bin
exchange
D
D
D
none of
the above B
none of
the above C
none of
the above B
hp vectra
PC-at
system
multiproce multithrea
ssing
ding
"dumb
dumb
terminals" servers
dummy
terminals
file
machine
language
processed
symbol
C
none of
the above A
none of
the above
none of
the above
none of
record
the above
high level none of
language the above
connector input/outp
symbol
ut symbol
fazitsu
vp200
series
IBM-PC
multiplexi none of
ng
the above
field
assembly
language
terminator
symbol
B
D
dummy
servers
B
B
C
B
B
B
D
A
wan
host
host
distributed
computing
system
server
server
PC
server
processin
g
four
file
managem
ent
system
multiproce
ssing
LAN
host
processin
g
one
hierarchic
al
database
system
multithrea
ding
windows
NT
back end
back end
LAN
front end
front end
distributed
computing
dumb
processin
g
two
centralize
d
A
data
processin
g
B
many
A
network
database
system
multiplexi
ng
disk
defragme
ntation
relational
database
system
D
none of
the above B
redo
disk
logging
mirroring
Modulatio
Code/De- n/Demodu Module/D None of
code
lation
e-module the above
constraint
fixes
locks
s
traps
multiproce multithrea multiplexi none of
ssing
ding
ng
the above
Linear
Local
area
Local area array of
None of
networks networks networks. the above
clienttask
process
thread
server
Integrated Integrated Integrated
system
Symbolic Services
dynamic Digital
Digital
None of
networks. networks. network. the above.
repairing
D
D
C
D
B
B
B
B
C
C
Ethernet
visual
basic
Internet
power
builder
ARPANE
T
SQL *
plus
None of
the above. B
all of the
above
D
MAN
WAN
GAN
None of
the above. B
Transfer
control
protocol/In
ternet
protocol
Transfer
communic
ation
protocol/In
ternet
protocol
Cells
Bits
Software
System
Mail
modulatio transmissi
n transfer on
protocol
protocol
Transmiss
Transfer ion
Protocol protocol
Transmiss
ion control
protocol/In
ternet
None of
protocol
the above. C
Packets
None of
the above. C
Simple
Mail
transfer
protocol
None of
the above. C
None of
Hyper text the above. C
Asynchron
Aggregate ous
Area
transfer
transfer
transfer
mode
mode
mode
None of
the above. B
Printer
File server server
Receiver
configurati
platform on
package
None of
the above. B
MAN and
WAN
ISDN
Internal
Services
Digital
Network
LAN and
MAN
Internet
Integrated
Services
Digital
Network
LAN WAN
and MAN B
Intranet
A
Routers
batch
Protocol
command
numerous
alpha beta alpha
Repeaters B
program D
number
and alpha A
cost,
performan size,
ce their
performan
ratio
ce, cost
input,
output,
performan
ce ratios C
Web
based
Training
Bridges
procedure
alpha
numeric
space
occupied,
price, no.
of users
allowed
LAN and
WAN
ATM
Internal
Services
Design
Network
Web
based
Technolog
y
system
A
None of
the above. C
Web
Web
based
based
Transactio
Transport n
A
mini
microproc
computers essors
PCs
mainfram
es
D
input
output
feed
write
A
multiproce multithrea multiplexi multitaski
ssing
ding
ng
ng
D
interpreter compiler converter process
input
processor ram
output
nonimpact
impact
drum
desktop
thermal
printers
printers
printers
printers
operating
system,
bootstrap,
kernel,
shell
control
program,
interpreter
,
assembler
, compiler
monitor,
program,
keyboard,
bus
CPU,
memory,
input,
output
D
D
C
D
operating applicatio windows
system
n software 95
batch
protocols
processor compiler
compiler
interpreter B
procedure
software's s
C
assembler coder
B
interpreter assembler processor C
q_id
PP1
q_desc
op1
clipart &
auto
shapes
PP4
In Powerpoint2000 ,the built-in professional design elements are
Selection handles are the 8 small ___________ that appear around the object, when
an object is selected
circles
The _______ is an invisible matrix of vertical and horizontal lines that covers the entire
slide workspace
square
_______ are drop-down menus that appear when the right mouse button is clicked on
the screen element
tool bars
PP5
clip
________ and ______ have the ability to add a lot of visual impact into the PowerPoint gallery &
presentation
word art
PP6
_______ is a motion picture or any animation file
PP7
The user can use ______ to remove the undesirable part of the image
PP8
The power presentation has a _____ for a set of compatible colors
clipping
tool
color
palette
PP9
PP10
PP11
The set three colors used for graphs and for secondary slide items is called as
There are ______ types of charts available in PowerPoint
_______ charts are useful while showing variations over a period of time
ascent
10
column
PP12
images
PP13
_______ are the individual pages of a presentation
A PIE Chart is a ____ diagram that depicts the relationship between a whole and its
parts
PP14
Each individual piece of data in a series is called a/an
entity
PowerPoint launches an OLE-compatible application called
Microsoft
organizat
ion chart
PP16
When the user double-clicks on an organization chart object in PowerPoint
the
organizati
on chart is
expanded
PP17
The _____ are used for selecting, editing and viewing objects in the chart
box tools
PP2
PP3
PP15
wave file
circular
PP18
Manager box tool in organizational chart window is
used to
mange
organizati
onal chart
PP19
The custom drawing tools are _______ by default
turned on
PP20
PP21
Click on the box tool ______ to draw three boxes
There are ____ default fields available in all boxes of the organizational chart
once
two
PP22
The _____ tool is used in the same way as we use a pen to draw a table
PP23
A/An _______ consists of smaller printed version of the slides
native tool
autolayout
s
PP24
PP25
The size of the object can be changed using the ______ tool
_______ is the process through which the slides in the current presentation are
included in another presentation or application
PP26
________ can be used to create charts as well as worksheets
PP27
PP28
PowerPoint can import text files that have been saved in ______ format
PowerPoint outlines can have _____ outline levels
zoom
importing
Microsoft
excel
PP31
.ppt(Powe
rPoint)
nine
.rtf(rich
When a file is saved with _____ extension, the graphics and text are also saved along text
with the slide
format)
not
displayed
during
the slide
The hidden slide is
show
DTS(digit
al track
____ effect is used to introduce a slide during a slide show
sound)
PP32
A _____ is a special effect that determines how the objects appear on the slide
PP33
The notes page is formatted based on the
PP34
Pick the odd man out of the following
PP35
When a new presentation is opened ,powerpoint creates slides that have a width of
_____ and a height of ______ with the landscape orientation
outline
view
15
inches,10
inches
PP36
The default orientation for notes ,handouts and outlines is ____ orientation
portrait
PP29
PP30
build
notes
master
PP37
Build effect is also called as ______
animatio
n
PP38
Graphics for web pages are automatically stored in ____ format
gif
PP39
A _______ is used to jump to any slide in the presentation
hyperlink
PP40
PP41
The ______ language has been incorporated into PowerPoint
In PowerPoint _____ is a series of commands that are executed in sequence
visual c++
macro
PP42
while
creating a
.exe file
virus
checkers
PP44
The macro will be activated
Developers can easily add ____ to PowerPoint 2000 by using the programming
interface
______ determines the order in which order in which the slides will be displayed during
the show
slide show
PP45
_______ is used to organize and develop the contents of a presentation
slide pane
PP46
If we save the presentation file as a metafile, it can be opened using
internet
explorer
With reference to autocontent wizard for creating a new presentation, which of the
following statements are not true
PowerPoi
nt creates
a sample
presentati
on to
which
user can
add words
and
pictures
Which of the following statement is not TRUE
user can
insert
objects
like cliparts,
pictures
stored in a
separate
files to the
slides
PP43
PP47
PP48
PP49
With reference to changing the order of slides, which of the following statement is not
true
PP50
Which of the following definitions are not true
in outline
view, drag
the slide
icon to a
new
location
the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
templates
Which of the following statements are not true
with notes
pages
view user
can
prepare
speaker
notes and
handouts
PP51
PP52
Which of the following definitions are not true
PP53
The options available in the common task toolbar does not include
the slide
that holds
the
formatted
placehold
ers for the
titles,
main text
and any
backgroun
d items
that user
wants to
appear on
the slides
is called a
master
template
slide
layout
PP56
PP57
data to be
graphed
resides in
a
datasheet
With reference to chart, which of the following statements are not true
window
the
The format of the text entered in a title, subtitle, or bulleted-list object is determined by master
the format settings in a special slide called -------slide
PowerPoint provides a _________ that searches the entire presentation i.e., all the
office
text objects in all the slides, outlines, notes and handouts for spelling errors
assistant
PowerPoint's drawing toolbar contains _______ drawing tools
10
PP58
Click _______ on the rectangle drawing tools enables us to draw multiple rectangles
once
An example of the components of a multimedia presentation could include
text,
graphics
and email
address.
PP54
PP55
PP59
PP60
Which of the following formatting elements can be applied to a PowerPoint diagram
using the AutoFormat tool?
the Line
style
PP61
Which of the following formatting elements can be applied to a PowerPoint diagram
using the Format AutoShape command?
Fill color
What happens when you double click a blank graph placeholder in a PowerPoint
presentation?
Excel is
started so
that you
can create
a chart.
PP62
PP63
PP64
always
taken
from the
first row of
data in the
The legend in a Microsoft Graph chart is:
datasheet.
Side-bySuppose you are creating a Microsoft Graph of quarterly sales by region. Which would side
be the best chart type if you want to emphasize the total sales of each region?
column
Which of the following actions will enable you to insert a graph into a PowerPoint
presentation?
Pull down
the Insert
menu and
select
Chart.
PP66
If you are editing a slide containing a Microsoft Graph, how do you display the
underlying datasheet?
It
automatic
ally
displays in
Slide
view.
PP67
How do you deselect a chart that has been placed onto a PowerPoint slide after you
have finished creating the chart?
Single
click the
chart.
PP65
What happens when you click the Datasheet button on the Microsoft Graph toolbar?
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
linked to
the
PowerPoi
nt
presentati
on.
What happens if you single click a chart that is not currently active?
The chart
is
selected.
What happens if you double click a chart that is not currently active?
The chart
is
selected.
PP71
Using custom animation effects, you can build:
a slide
one bullet
item at a
time.
PP72
Which of the following animation effects can be added to a slide?
Subtle
PP68
PP69
PP70
PP73
PP74
PP75
PP76
Which of the following animations effects can be added to a slide?
Which keyboard key is used to select more than one picture on a slide?
Enter and
exit
Enter
Custom animation can be used to affect ONLY:
the way
objects
appear on
a slide.
Which of the following best describes the information that appears on the advanced
timeline?
The
advanced
timeline
shows the
sequence
in which
objects
will
appear on
the slide.
PP77
Which of the following objects can contain custom animation effects?
Clips
PP78
What type of program allows an object within an image to be edited without affecting
other objects?
Paint
program
PP79
Which of the following animation effects can be added to a slide?
Fly in
PP80
PP81
Which of the following is TRUE regarding the Datasheet?
Graphical software tools that provide complex analysis of stored data are:
PP82
PP83
Which of the following statements is TRUE regarding PowerPoint diagrams?
Which keyboard key combination is used to undo the previous command(s)?
Once data
is entered
it cannot
be
changed.
OLTP.
You can
change
the
appearan
ce of a
whole
diagram,
but not
individual
shapes of
a
diagram.
[Enter+A]
op2
op3
op4
ans
autolayo
uts and
presentat slide view
ion
& outline none of
the above B
templates view
points
squares
image
grid
short cut auto
shapes
menus
icons
C
guide
all the
above
C
slide show
& view
fonts &
show
images
media
.video file
clip
cropping
tool
color box
tricolor
scheme
28
bar
images
and text
radar
data
point
none the
above
all the
above
scribble
cutting
drawing
tool
tool
color
color
scheme guide
primary
color
color
palette
scheme
36
18
pie
linear
slide
sorter
views
slides
all the
doughnut above
data
auto
shapes
the chart
window
the chart opens
displayin
is made
available g a chart
for editing template
custom
general
purpose drawing
tools
tools
clip art
B
A
B
A
C
A
C
A
C
A
stream
B
track
changes
A
none of
the above C
standard
drawing
tools
C
used to
create a
manager
box for
accessed an
existing
only by
manager box
not
available
in the tool
turned off bar
used to
store the
other tools
of the
organizati
onal chart C
available
in the tool
bar
any of the
twice
above
thrice
five
eight
four
standard all the
above
draw tool tool
handlayo
none of
slide
view
these
uts
reduce/e
none of
preview
the above
nlarge
C
B
B
B
B
exporting
auto
shapes
.rtf(rich
text
format)
only one
.wmf(win
dows
metafile)
copying
displayed
only
during the
slide show
3D(3
dimension
)
displayed
only in
outline
none of
view
the above A
transition
slide
master
moving
drawing
clip art
tools
.html(hype
.doc(docu rtext
ment)
format)
twelve
six
B
.txt(plain
text)
B
A
B
C
.doc(docu
ment)
B
both a and
b
transition D
slide show view show
master
master
slide
notes
slide
view
sorter
slide view show
view
10
7.5
inches,7. inches,5 none the
above
5 inches inches
none of
landscape a or b
the above
A
A
C
B
A
view show transition
jpeg
png
action
hypertext button
visual
basic for Microsoft
applicatio visual
interdev
n
batch file templates
when the
slide
during
show is
slide
transition run
spell
header
checkers files
custom
both a and
b
show
notes
properties
pane
pane
b or c
A
none of
the above D
all the
D
above
all the
above
add-ins
none of
the above
all the
above
none of
the above
outline
pane
power
paint shop paint shop point
pro
pro
2000
B
A
C
A
B
D
D
it is the
quickest
way to
create a
presentati
on
contains
sample
presentati
ons for a
variety of
topics
provides
suggeste
d content
and
D
design
user can
insert
only predrawn,
precolored
graphic
images
reflected
in a clip
arts to
the slides
user can
insert
picture to
the
master
slide
which gets
reflected
in all the
slides
using that
master
slide
user can
insert
picture to
the title
slide
which gets
reflected
in all the
slides
using that
title slide B
in notes
pages
in slide
view,
sorter
view, drag drag the
the slide slide icon
to a new to a new
location
location
I slide
view, drag
the slide
icon to a
new
location
C
design
templates
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on
the slide
that
holds the
formatted
placehold
ers for
the title
and subtitle for
the
presentat
ion is
called a
title
template D
in outline
view, user
can see
the
miniatures
of all
slides in a
presentati
on,
complete
with text
and
graphics
the slides
can be
reordered
in the
outline
view
B
user
should
select the
slide view
to add the
text to the
slide
design
template
is the
template
transition whose
means
format
applying and color
special
scheme
effects to user
the
applies to
crossover a
between presentati
the slides on
customiz
new slide
e
the slide
that holds
the
formatted
placehold
ers for the
title and
subtitle for
the
presentati
on is
called a
title
template D
set up
show
B
by
default,
doughnut
chart is
displayed
based on
the data
in the
datasheet
user can
add data
labels and
gridlines
to the
chart
B
the slide
master
spell
checker
12
data is
plotted in
a chart
window
the
header
slide
grammar
checker
102
twice
three
the format
slide
B
none of
the above B
22
B
four times B
text,
text,
CD-ROM, hypertext
, Power
hypertext digital
Point,
and
camera
video and
Power
and
Point.
sound.
D
sound.
the Line
color
Line
style,
Line
color,
the Font text font,
and text
and the
alignmen
text
alignment t
D
Fill color,
Line
color,
and Line
Line
Line color thickness thickness D
A popup
Microsoft
box
prompts Graph is
you for an started
so that
existing
The graph
you can placehold
Excel
create a er is
chart to
insert.
deleted.
C
graph.
taken
from the
first
column or
row of
data in the
datasheet,
always
depending
taken
on
from the whether
first
the data
column of series are
data in the in rows or entered by
datasheet. columns. the user. C
Stacked
column
Pie chart
Line chart B
Click the
Insert
Chart
button on
the
Standard
toolbar.
Click the
chart
object,
then click
the View
Datashee
t button
on the
Standard
toolbar.
Double
click the
chart.
Pull down
the Insert
menu and
select the
appropriat
e Object.
Pull
down the
Insert
menu
and
select
Chart,
click the
Insert
Chart
button on
the
Standard
toolbar,
or pull
down the
Insert
menu
and
select the
appropria
te Object. D
You
cannot
display
Pull down the
the Edit
underlying
menu,
datasheet
then
once the
select
slide is
Object.
finished. B
Change to
Click
Slide
outside
Sorter
C
the chart. view.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that
should be
embedde
d in the
PowerPoi
nt
presentati
on.
The
datasheet
window
is
toggled
from
The
datasheet closed to
is saved open (or
from
as a
separate open to
file.
closed). D
The chart
The chart is doubled
is deleted. in size.
The chart
The chart is doubled
is deleted. in size.
The
applicatio
n that
created
the chart
is started. A
Microsoft
Graph
will
D
restart.
a slide
one
bullet
item at a
time,
build
bullet
items a
letter at a
time, and
build
bullet
bullet
bullet
items one items one items a
letter at a word at a word at a
time.
time.
D
time.
Subtle,
Moderate
, or
Moderate Exciting
Exciting D
Both
enter and
exit, and
Fly in from fly in
from top
top or
bottom
or bottom
Alt
Shift
Neither
enter nor
exit;
neither fly
in from
top nor
bottom
C
Ctrl
B
Custom
what
objects do
after they
appear on
a slide.
animatio
n can be
used to
affect the
way
objects
appear
on a
slide, to
what
objects
do after
they
appear
on a
slide, and
to the
way
objects
exit a
D
slide.
the way
objects
exit a
slide.
The
advanced
timeline
shows
the
sequence
in which
objects
will
appear
The
advanced on the
slide and
timeline
shows the the
duration duration
of the
of the
effect
effect
applied to applied
to each
each
object.
object.
The
advanced
timeline
shows
neither the
sequence
in which
objects
will
appear on
the slide,
nor the
duration
of the
effect
applied to
each
object.
C
Organizati
on charts Text
Draw
program
Filtering
program
Dissolve
in
Data
Once
cannot be
data is
entered
entered it into
can be
Datasheet
changed. .
OLST.
OLAP.
You can
change
both the You
appearan cannot
ce of a
change
whole
the style
diagram of the
and the
connectin
individual g lines in
shapes of an
a
Organizati
diagram. on chart.
[Shift+Z] [Alt+Z]
From top
Clips,
organizat
ion
charts,
and text D
Animation
program A
Fly in,
From top,
and
Dissolve
D
in
There is
no such
thing as a
Datasheet
.
B
OLIP.
B
You
cannot
change
the color
of the
boxes in
an
Organizati
on chart. B
[Ctrl+Z] D
q_id
q_desc
IN90
The two major browsers used to surf the Internet are ________,_______
IN91
IN93
IN94
IN95
Special characters allow browsers to display _________________
The keyword for providing links within or across documents
is____________
Stringing pages together using hypertext technology helps view pages
_______________
The initial web pages present in a web site is the ________ page.
The image format supported by most browsers is________________.
IN96
The components of a URL are ___________
IN92
op1
MS Internet
Explorer and
Mosaic
text
hyperlink
in random order
first
.bmp and .gif
Service, hostname
and directory path
mail servers,mail
clients and
alternate services
IN98
The mail we send has a mailing address and most of them correspond
to_____,_____ and
Which of the following is not supported by internet explorer
_______________
IN99
IN100
IN101
CGI stands for ____________
Host name indicates the domain name of the web ________
The internet is also called as _______________
<center>
communication
generated
information
Server
arpanet
IN102
IN103
IN1
The internet is similar to _________________
The net drivers______ from one place to another
The World Wide Web was devised by _________
LAN
data
CERN
IN2
The useful URL schemes are_____ and______
yahoo and infoseek
IN3
The other ways of getting connected to the net are_____
news groups,yahoo
and infoseek
IN4
IN5
IN6
IN7
BBS stands for______
USENET is a BBS on ____ scale
WINSOCKS is expanded as______
IETF Level 2 HTML DTD supports graphical browsers like _______
bulletin board
system
small
windows socks
Mosaic
IN8
IN9
IN10
The space used by Netscape to store the retrieved page is called______
The URL for encyclopedia Britannica is_________
_______ maps IP addresses with the domain names of the sites
buffer
www.ency.in
URL
IN11
IN12
Internet can be defined as _______
The most important service of the ______ is to manage traffic control
internal network
application layer
IN97
IN15
_________is a program that displays information about a host connected to
the net
finger service
_______ is a program or a tool that helps in locating a file anywhere on the
net
FTP
uniform research
URL stands for ____________
locator
IN16
IN17
IN18
IN19
IN an URL the word before the color refers to _______
A ______ always begins with a slash
Prodigy is run by IBM and ______
The World Wide Web is referred to shortly as the _______
host computer
message
Delphi
net
IN20
Gopher and WAIS enables the user to ______
IN21
______ is the program used to run CompuServe's regular services
browser
CompuServe
internet dialer
IN22
Navigating through the menu of gopher is called moving around _______
gophering
IN23
Alta vista
IN24
IN25
The directories that come with built-in engines are yahoo,lycos and ______
To use the finger command,SLIP users must run a programme
called______
The web maps are called _______
IN26
IN27
IN28
Directories consists of _______ levels
The _____ level gives the broadcast overview of the net
The huge list of keywords from important items is called ______
IN29
IN30
The two types of search in veronica are _____ and ______
_______ searches by keywords
no
middle
hotlist
directory
search,index
search
infoseek
IN31
IN32
IN33
IN34
Mosaic displays links in color whereas _____ does not display links in color
______ supports one button publish
SPY MOSAIC is distributed by_______
______ is a program that helps us to log on to other networks
IN35
IN36
IN37
HTTP is the acronym for __________
______is used to transfer and copy files over the internet
_____ is a program that helps us to log on to other networks
IN13
IN14
IN38
IN39
IN40
IN41
IN42
IN43
finger server
list
netshark
lynx
Microsoft
Usenet
Higher text transfer
protocol
iccp
yahoo
transfer control
TCP/IP stands for ________________
protocol/internet
Archie servers can be accessed in_______ different ways in internet
one
_______is the computer on the internet that translates between the internet
domain names and the internet numeric address
ftp servers
the internet
TIA stands for_____ in internet
adapter
Service indicates the name of the ________ used to access data, present
on the other end of the link.
browser
hotlink text transfer
HTTP stands for______
protocol
universal resource
locator
frequent asked
query
IN44
________ is used to link pages in the world wide web
IN45
FAQ stands for ______
The internet adapter is a programme that makes our connection act like a
_____or a ____ account
SLIP,PPP
The step involved in Communicating between the web clients and servers is
______________
connection
wide search for
information and
WSIRC stands for______
research
Two of the important browsers are_____ and_____
lynx,minx
world wide web
Lynx is a _______ programme that works with terminals
server
The huge list of keywords from important items is called an_____
glossary
very easy and
rodent oriented
net wide index to
computerized
VERONICA is an acronym for _______________
archives
university of
berkeley,berkeley
The first freenet is created at the_____ and is called______
freenet
________ are defined as ways of communication amongst networks
protocols
search
engines,directorie
______and_____ are web searching features
s
WINWAIS has two source lists namely____ and______
allsrc,winsocks
________ is also called as WAIS manager
allsrc
IN46
IN47
IN48
IN49
IN50
IN51
IN52
IN53
IN54
IN55
IN56
IN57
IN58
IN59
IN60
IN61
IN62
HTML stands for_____
The system of interlinked documents is known as_______
The small programmes that create animation,multimedia,real-time games
and multi user games are called______
The information displayed on the web page includes______,_____
and_____
higher text medium
language
hot links
images
graphics,videos,a
udio
IN63
IN64
The web pages that represent online home of their author are called______ first page
global network
GNN stands for______
news
_____ is the most popular internet service
yahoo service
IN65
The online service offered by navigator gold 2.0 are _______ and_____
email and net
conference
IN66
_______ is a program or a tool that helps us find a file anywhere on the net
newsgroup
IN67
IN68
The databases to enable keyword search using Lycos are a2z,_______
______ is a large worldwide bulletin board service network
Lycos catalog
apple link
IN69
computer related
abbreviations and
acronym
encyclopedia
Britannica
search engines
Graphical
interpreter
formatting
IN70
IN71
BABEL consists a glossary of _____
Dictionaries,encyclopaedias,government and other references are found in
______
Yahoo,lycos,excite and webcrawlers are _____
IN72
GIF is the acronym for ____________
IN73
IN74
JPEG is the acronym for ___________
The Web aids users to explore the ________
IN75
The three most popular mailer are_____,_____ and______
IN76
The World Wide Web consists of _________
In Microsoft Internet Explorer, the color of the text can be specified using
_________ attribute of the font tag.
information
Communication
gateway interface
Network
IN80
The interface that provides effective communication between the web
browsers and servers is _________
CGI is the _________ between web browsers and servers
CGI programs are invoked based on the information provided by the
_________
IN81
A CGI program is usually called after a request made by the _________
IN82
URL stands for ________
Browser/user
Unknown
resonance
language
IN83
IN84
IN85
A hyperlink can be on ___________
HTML was derived from _________
SGML is a _________
text only
SQL
alphalanguage
IN86
IN87
IN88
PINE stands for _____________
palm is not eatable
The application that confirms whether a document is compliant to its DTD is
_________
SGML Processor
Web is a collection of ___________
web sites
IN89
IETF stands for ________
Internet equipment
training faculty
IN104
The net provides interesting services like______,______ and______
The windows internet software available are______,_______,________
and______
________ is the ancestors of the internet
scripting,parsing
and compiling
nt,windows95,ie,wi
nzip
dnet
IN77
IN78
IN79
IN105
IN106
Joint Pictures
Expert Group
mails
yahoo,infoseek,alta
vista
BACKGROUND
Current web page
IN115
defensive
administrative rank
DARPA stands for
administration
_______________________________________________
network
The uuencode files start with a _______
start
milnet,smaller
DARPA is broken into ________ and _______
arpanet
education,researc
NSFNET is the united states provides service to _____ and_____
h
Higher text
manipulation
HTML stands for ______________________________________
language
The first international IP network connections were established in 1973 with united states and
_____ and_____
UK
A_____ is a set of computers interconnected by transmission paths to
exchange information in internet
server
A computer that provides a service usable by other computers is
called______
client
A_______ is the representation of physical connectivity of the computers in
internet
network card
IN116
IN117
DTE stands for ____________________
The basic function of the ______ is transmitting the bits over a channel
IN118
IN119
The point to point channel network is also called as _____ and_____
Accessing files using FTP servers is called_____
detailed transaction
explanation
application layer
point to point
network and
broadcast channel
network
file access
IN120
IN121
IN122
IN123
The three most commonly used networks are______,______ and______
________ is in between LAN and WAN
_____ can be owed by multiple organisation
Data is transmitted in the form of_____ signals
PAN,NAN,AAN
VAN
LAN
analog
IN124
DTD stands for __________
IN125
IN126
Modem stands for __________________
______ is the process of the digital signals being converted into a form
suitable for analog transmission
Data type definition
Moralize/demoraliz
e
IN127
________ and______ are two basic ways of getting connected to the
internet
IN128
SLIP stands for ________________
IN129
PPP stands for _____
Satellite link and
digital signals
Standard long
internet protocol
Prime prolonged
protocol
Which of the following best describes uploading information?
storing data on a
disk drive
IN107
IN108
IN109
IN110
IN111
IN112
IN113
IN114
IN130
Mapping
IN131
IN132
IN133
IN134
IN135
IN136
IN137
IN138
IN139
IN140
IN141
IN142
IN143
IN144
A characteristic of a communication channel that is the amount of
information that can be passed through it in a given amount of time,
expressed in bits per second.
The act of searching through storage to locate information without
necessarily knowing of the existence of the information being sought.
The principles, means and methods for rendering information unintelligible
and for restoring encrypted information to intelligible form.
A long string of seemingly random bits used with cryptographic algorithms to
create or verify digital signatures and encrypt an decrypt messages and
conversations.
Protected/private character string used to authenticate an identity or to
authorize access to data.
The successful act of bypassing security mechanisms of the system.
A set of rules and formats, semantic and syntactic, that permits entities to
exchange information.
An attempt to get access to a system by posing to be an authorised person.
An action or event that might prejudice security.
According to information Technology Act, 2000, To investigate
contraventions the controller of certifying authority shall exercise the like
powers to that of
Malicious software.
None the person who is known as father of Internet
This website is the biggest bookstore on the earth.
Bandwidth
Find
Photography
Key
User-id
Penetration
Acts
Spoofing
Loss
Sales - tax
authorities
Utility
Tim Berner Lee
Etrade.com
Automated Tailor
Machine
IN147
When we talk of Data Transmission modes, then ATM stands for
A sequence of bits or characters that identifies the destination and the
source of a transmission.
The means of communicating between networks
A group of computers and other devices dispersed over a relatively limited
area and connected by communication links that enable a device to interact
with any other on the network.
IN148
The term HTTP stands for
IN149
A NIC is considered as
LAN
hyper terminal
tracing program
National
Informatics Center
IN150
A hub is a device that can connect
Only Computers
IN151
Which of the following is true concerning the function of a switch?
IN152
IN153
IN154
What do routers connect?
What does a router route?
Software which prevents external access to a system is termed
If four computers are connected to a hub and then to the internet, how many
IP addresses are required for these 5 devices?
One
Which of the following in an OSI layer
Physical Layer
IN145
IN146
IN155
IN156
Acts
Router
Concentrates
connectivity
Bridges and
Repeaters.
bits
firewall
IN157
IN158
When creating a network from just two PCs, what kind of cable would be
used to connect them?
IN159
An IP address is a
To construct a simple LAN of 4 computers, you would connect them with
______connect them
IN160
What happens to data that is ruined before reaching to receiver
IN161
IN162
IN163
IN164
Bluetooth is
Which is not one of the recognized IEEE sub layers?
The most preferred number system to represent a IP address is
A MAC address is of
IN165
Protocol is
A ............... is a LAN-based computer with software that acts as a
controlling device for controlling access to at least part, if not all, of a local
area network and its available resources.
IN166
IN167
RG7U
Physical address
A cable
Data return to the
sender
Wireless
technology
Physical Layer
Binary
48 Bits
software that
facilitates
connection to the
internet
Novell PC
IN175
IN176
What is the biggest disadvantage of the Ring topology?
The .............. of the network concerns how network devices are physically
(or optically) interconnected.
The principal topologies used with LANs are:
What are the various types of bus architecture?
What are the various types of ring architecture?
In a ................., each workstation attaches to a common backplane via its
own physical cable that terminates at the hub
In a ............... , each work station is directly connected to a common
communications channel
Which one of the following is NOT a network topology?
In a .............. , the cable system forms a loop with workstations attached at
various intervals around the loop
The Media Access Control (MAC) is a sub layer of the:
IN177
IN178
IN179
What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in
Ring
Network Layer
Ethernet, token
ring, DecNET
bps
bps
IN180
IN181
WAN speeds are
Accessing the Internet from a typical home PC requires the use of
usually higher than
LAN speeds
CD-ROM drive
IN182
To use the Internet, you
must use the
World Wide Web
IN168
IN169
IN170
IN171
IN172
IN173
IN174
There isn't one
Physiology
Bus
Linear
Parallel
Ring
Ring
Star
IN183
The worldwide web server uses the following standard interface to act as
the middleware:
IN184
IN185
IN186
An NIC
Accessing the Internet from a typical home PC requires the use of
The most widely used network operating system on PC LANs is
IN187
JPEG and MPEG
a Novell Interface
Controller
CD-ROM drive
Linux
have to do with
compression of
graphics and
video
IN188
To use the Internet you
must use the
World Wide Web
IN189
A multiplexer is a form of
IN190
An ISP
Printer
provides access
to the Internet
IN191
FTP is
used to send
email
IN192
Telnet
IN193
IN194
A firewall is
A proxy server is
IN195
IN197
A search engine is
hardware
To look for information about interest areas on the internet, the user should
use a
scanner
provides access
An ISP
to the Internet
IN198
FTP is
used to send email
IN199
Telnet
used to send email
Which of the following is a true statement about the OSI model layers?
The layers cannot
communicate with
one another.
IN196
IN200
key gateway
interface
used to send
email
used to protect a
computer room
from fires and
floods
a backup server
IN201
IN202
IN203
IN204
IN205
IN206
IN207
It is one large
Which of the following is NOT true about the Internet?
network.
The traditional intent and impact of this common type of attack is to prevent
or impair the legitimate use of network resources.
Password cracking
used to protect a
computer room
from fires and
A firewall is
floods
Which of the following is NOT an example of a DoS attack that is popular
among hackers?
A ____________ attack is when a hacker sends a continuous flow of
packets to a system.
One defense option on a large network is to configure a ____________ to
disallow any external traffic.
IP flood
hack
firewall
IN208
A proxy server is
Which of the following would be performed on a network server and not
normally on individual workstations?
a backup server
Apply security
patches
IN209
What can be said about the safety of the Internet?
All sites are safe
and reliable.
IN210
To secure communication network against wire-tapping the most effective
control is
Use of identifiers
IN211
IN214
One way that a virus CANNOT spread throughout a network is:
Which of the following is NOT a means of monitoring employee use of
company technology?
____________ would be used by parents to monitor their children on their
home system.
The formal rules and parameters which are established to permit a
microcomputer to communicate with the mainframe computer as though it
was a terminal of the mainframe are called
IN215
The two most common tools used to help with extracting information are:
IN216
Which of the following would NOT be considered an example of cyber
terrorism?
IN217
Which of the following would be a form of cyber terrorism?
IN218
Which of the following is a likely target of a cyber terrorist that would cause
considerable loss of life?
IN212
IN213
by attaching to an
e-mail.
Phone
A Trojan horse
Modems
cookies and Trojan
horses.
An attack on a
system for
personal gain
Economic damage
Crashing the stock
market, as in the
1930s
IN219
IN220
IN221
IN222
IN223
IN224
An organisation is upgrading its telecommunication lines. Which is the least To carry more
important objective while upgradation
network capacity
A company posts a price list of its products on its website. The advantage to set its prices very
the customer is that the company can
high
Which of the following is an easy-to-use service to get information on
someone?
People Search
Name of your
Which of the following pieces of information would NOT be found online?
bank
Which of the following is the most common danger on the Internet?
Virus
IN227
The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in
order to obtain sensitive information is called _________________.
Using the Internet to pursue, harass, or contact another in an unsolicited
fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to
block:
IN228
What is the best means of protection from cyber stalking?
IN225
IN226
buy stocks.
Shill bidding
Internet stalking.
pop-ups.
Use a fake e-mail
address.
IN231
Which of the following is not an appropriate control over
telecommunications software
Encryption techniques can be implemented in Hardware-Software
Which protocol would be used to download a free anti-virus program from
the Internet?
IN232
The major advantage of the checksum program is when it
Adds more bytes to
programs
IN233
Which of the following is a Web browser?
HTML
IN234
A Web page is another name for ----------Domain names must contain a description of the type of organisation that
the domain represents. A very common abbreviation used include:
Web query.
.com is used for
company
A standard language for creating and formatting Web documents is:
The Web page format in which all elements of a Web page are saved as
one file is called:
round trip HTML.
IN229
IN230
IN235
IN236
IN237
Encryption
I only
irc
XML.
IN238
IN239
IN240
IN241
IN242
IN243
IN244
IN245
IN246
IN247
IN248
IN249
using Internet
Explorer to view a
Web page that is
stored on the hard
drive on your
Which of the following requires an Internet connection?
computer
Click on the Back
arrow until the
Mr Rao wants to find a website that he briefly browsed over yesterday. After desired site is
turning on his computer how would he do this?
found
the Refresh
Which of the following is used to update a Web query?
command
You download from the internet, a screensaver, a ten-second sound file and
a ten-second music video clip. You also add a hyperlink. Which of the media
elements has the greatest effect on the file size?
Hyperlink
When saving a photograph for use on a website, which format should you
choose?
BMP
While researching the Direct taxes assignment, you find a useful website.
Save it to a floppy
What is the most efficient way to access the site at a later time?
disk.
A system that uses the Internet for business-to-business interaction is called
a(n):
extranet.
A block of text automatically added to the end of an outgoing email is called an attachment.
_________ refers to the use of Internet technologies for placing telephone
calls.
VoIP
Desktop client,
application, and
Most client/server applications operate on a three-tiered architecture
consisting of which of the following layers?
database.
Which do you NOT need to connect to the Internet?
Modem
File Transfer
What does FTP stand for?
Program
So computers
can be referenced
by a name
IN250
What is the purpose of DNS?
IN251
Which of the following is NOT a properly formatted IP address?
IN252
Which of the following is a properly formatted email address?
IN253
The Internet is controlled by whom?
193.1.2.3
paul .trigg @
domain. org. uk
The US
government
IN254
What does IRC stand for?
Internet Relay
Chat
IN255
If you do not pick up your email for a week...?
It will be deleted
IN256
What does HTML stand for?
IN257
What is a disadvantage of joining a mailing list?
Hyper Textual
Mark-up Lingo
Receiving
messages
automatically from
anyone in the
group
op2
op3
MS Internet
Explorer and
Netscape
Navigator
None of the above C
symbols
video
C
hotword
in user-defined
order
home
.gif and .jpeg
hotlink
B
none of the above
none of the above
.wmf and .bmp
B
C
C
service,port and
directory path
service,hostname
and port
B
mail vendors,mail
identification and
password
mailing lists,mail
server robots and
gateways to other
none of the above
services
C
<font size=n>
<hr size=n>
<l1 type=shape>
D
common gateway
interface
Client
the net
peer-to-peer
connectivity
parcel
ECRN
classified general
instructions
Browser
intranet
none of the above
User
none of the above
B
A
B
none of the above
none of the above
NET
B
A
A
none of the above
B
none of the above
B
none of the above
none of the above
none of the above
Lynx
A
B
B
A
none of the above
none of the above
none of the above
B
B
B
none of the above
session layer
B
D
Netscape
Navigator and
Mosaic
data from a
database
hypertext
in sequential
order
start
.bmp and .jpeg
service,hostname
,port,directorypath
wan
packets
CARN
newsgroups and
search engines
mailto and files
bulletin
application
boards,mails call servers,proxy
and wireless
servers and web
servers
system
business
bulletin
broadcasting
broadcasting
system
system
very small
large
windows sockets windows stocks
Yahoo
PINE
cache
www.eb.com
DNS
network of
network
transport layer
TELNET
uniform resource
locator
name of the
resource
scheme
Microsoft
web
read the Usenet
news
ARCHIE
unlimited restore
locator
none of the above
C
none of the above
B
none of the above
none of the above
general electric
editor
C
C
C
B
none of the above
C
spy mosaic
scheme
command line
sears
browser
search for
database
wincim or
maccim
none of the above
C
gopherspace
cyberspace
none of the above
C
open text
excite
none of the above
B
ftp server
directories
web server
image list
none of the above
none of the above
A
C
maximum of five
lower
directory
one
top
index
many
middle and lower
glossary
B
D
C
index search,menu menu search,item item search,index
search
search
search
excite
lycos
all the above
C
D
cello
mosaic
internet
finger service
Hyper text
transmission port
ftp
ftp
transmission
control
protocol/internet
protocol
two
domain name
servers
the internet
administration
lynx
Lycos
IBM
ftp
Hyper text
transfer protocol
uucp
telnet
transfer
communication
protocol/internet
protocol
three
all the above
navigator gold 2.0
CompuServe
telnet
Hyper text transfer
port
none of the above
none of the above
C
C
D
D
none of the above
none of the above
B
C
web servers
none of the above
B
the internet access none of the above
A
protocol
hyper text
transfer protocol
site
organization
higher type transfer
protocol
none of the above
response
windows sockets
internets relay
chat
netscape,ie
world wide web
client
index
very organised
network integration
and
communication
application
university of
cleveland,clevela
nd freenet
IP address
request
world search for
information and
research council
mosaic,gopher
close
A
none of the above
none of the above
B
B
interface
hotwords
none of the above
none of the above
B
B
verification on
network integration
and
communication
none of the above
A
university of
California net
dns
none of the above
none of the above
B
A
ftp and finger
wais,allsrc
waisman
telnet and ftp
wais,winsocks
winsock
none of the above
none of the above
none of the above
A
B
B
none of the above
none of the above
C
B
animation
none of the above
applets
programms,images animation,scripts,e
,text
xecutables
none of the above
B
hyper transfer
hyper text markup
markup language language
books marks
hyper text
home page
global networks
navigator
electronic mail
Netscape page
starter
site,netscape
page wizard
welcome page
grand network
news
search engines
A
none of the above
B
none of the above
none of the above
B
B
yahoo and altavista none of the above
B
telnet
ftp
archive
D
point review
bitnet
all the above
Delphi
none of the above D
fidonet
A
biographical
information
on-line reference
works
web directories
Graphical
interchange
Format
Jumbled pictures
expert graph
documents
bookstores
none the above
D
more information
database
galenet
channel
A
B
Graphical interface Graphical Interface
format
format
B
Joint pictures
experimental group A
browsers
C
web pages
Joint pictures
expert graph
net
eudora,netscape
and pine
network
connections
COLOR
FCOLOR
netscape,ie,lynx
none of the above
C
mails
B
FONTCOLOR
B
Common
Common graphical Communication
Interface
graphical interface Gateway Interface D
Communication
Connection
B
Interface
Browser
Client
None of the above B
Server
Web
Channel
Uniform resource
United relay limited None of the above
locator
neither text nor
image only
image
text or image
PLSQL
CGI
SGML
betalanguage
none of the above
metalanguage
pancake is not
edible
none of the above
palm is not elm
SGML
Preprocessor
SGML Composer
SGML Parser
images
applets
documents
Internet
International
Engineering Task
Engineering
trainers and faculty Force
email,file
news,cooking and retrived,internet
fine arts
tools
mosaic,gopher,eu communicator,ie,ly
nx,winsock
dora,trumpnet
ARPANET
arpanet
A
B
C
C
C
B
C
A
None of the above C
none of the above
C
all of the above
none of the above
B
B
defensive
advanced
research projects
dedicated and
registered projects administration
administration
none of the above
net
first
none of the above
begin
C
B
mailnet,inet
intranet,extranet
none of the above
A
music and dance
cooking and dining none of the above
A
Hotlink text markup Hyper transfer
language
meta language
united states &
england,norway Russia
Hyper text
markup Language D
none of the above
B
client
network
none of the above
C
stand-alone
servers
none of the above
C
network topology network redirectors none of the above
B
data terminal
equipment
physical layer
packet
switching,store
and forward
network
anonymous ftp
data target
equipment
network layer
none of the above
none of the above
B
B
smart network and
dumb network
none of the above
file transfer
none of the above
B
B
KAN,RAN,VAN
MAN
MAN
digital
none of the above
none of t he above
none of the above
none of the above
Document type
data
C
B
C
B
none of the above
B
Manipulation
none of the above
B
Cable and wires
Serial line
protocol
Pillar to pillar
protocol
none of the above
B
none of the above
C
LAN,WAN,MAN
TAN
WAN
non-digital
Document type
Define type of data definition
Modulation/demo Manipulate/demani
pulate
dulation
Modulation
Dedicated access
and dial up
access
Stream line internet
protocol
Point to point
protocol
sending
information to a
host computer
C
none of the above B
receiving
storing data on the information from a
hard drive
host computer
B
Speed
Size
Channel
A
Save
Browse
Retrieve
C
Digital Signature
Cryptography
Message Digest
C
Lock
Hash Function
Formula
A
Password
Retrieval
Name
Cryptography
Address
B
Password Cracker A
Regulations
Address
Protocols
D
Imposting
Threat
Unauthorising
Exposure
Approving
Hacking
A
B
Income - tax
authorities
Pirated software
Hoffman
Amazon .com
Police officer of
IPS rank.
Cracker
Howard Aiken
Msn .com
B
C
A
B
Any Time Money
Judge of a civil
court
Virus
Charles Bubbage
Dell .com
Asynchronous
Transmission
mode
None of above
C
Regulations
Gateway
Address
Port
Protocols
Pin
C
B
WAN
hypertext tracing
program
Network Interface
card
CAN
hypertext transfer
protocol
New Information
Card
PAN
hypertext tracing
protocol
A
Can not computers
Combines
connectivity of a
hub with the
traffic regulation
of a bridge
Two or more
networks
frames
gateway
Only printers
Bridges and Hubs
Packets
router
Hubs and nodes
B
None of the above C
virus checker
A
Two
Data-Link Layer
Four
Network Layer
None of the above C
D
All of the above
C
None of the above B
None of the
D
above
Switches data from
incoming ports to
outgoing ports.
All of Above
B
Coaxial cable
Fiber
Twisted pair
B
Logical address
A memory address None of the above B
Router
It continue on to
It gets destroyed target device with
corrupt data
bit by bit.
Ultra violet
Wired Technology technology
Data Link Layer
Network Layer
ASCII
Octal
48 Bytes
48 KB
None of the above B
None of the above
All of the above
None of the above
48 MB
A
D
A
A
a list of rules for
transferring data
over a network
software that
allows file copying
a gateway calling
program for
internet bridging
B
If one node goes
down, it brings
down the entire
ring
Server
If the hub goes
down, it brings
down all of the
nodes on that
section
Network PC
C
If the hub goes
down, it brings
down all of the
nodes on all of the
rings
B
Topology
Star
Parallel
Circular
Both A and B
Ring
Both A and B
Linear
None of the above
All of above
None
Both A and B
B
D
A
B
Bus
Star
Mesh
C
Bus
Bus
Star
Linear
Mesh
Ring
B
C
Mesh
Data Link Layer
Ethernet, token
ring, ARCnet
mips
Mips
A
D
Hub
Client
Bus
Transport Layer
Ethernet, token
ring, FDDI
kbps
Kbps
Star
Physical Layer
Ethernet, DecNET,
FDDI
mbps
Mbps
depend on the
measured in bytes transmission
per second
medium
Windows 95
a modem
must use electronic must have a LAN
mail
account
None of the above B
B
B
C
limited by modem
speeds
Netscape
C
B
All of the above
A
used to control a
printer
a modem
Novell Netware
common gateway
interface
interfaces a
modem to a
computer
Windows package
Windows NT
have to do with
Web pages
the Internet
uniform resource
locator
must use electronic must have a LAN
mail
account
modem
application protocol
interface
connects a
computer to a
network
Netscape
None of the above
none of the
previous
use appropriate
communications
software
none of the
previous
is a CPU register
bridge
is a CPU
functional unit
used to browse
the Web
uses wireless
communication
medium
None of the
is part of Netscape above
a form of virus
an email server
IR system for the
Internet
D
B
C
A
A
D
make of processor A
is a protocol for
the transfer of
files between
is part of Netscape computers
D
a screen saver
program
a poor file server
browser
CD-ROM
none of the
previous
none
none of the
previous
clip-art file
search engine
is a CPU functional
is a CPU register unit
make of processor
is a protocol for
the transfer of
files between
used to browse the
Web
is part of Netscape computers
is a protocol that
allows for remote
uses telephone
lines
is part of Netscape login
Any layer can
communicate
directly with any
other layer.
C
Any layer can
communicate
only with the
layer directly
above or below it.
D
D
D
C
D
A
D
D
Any layer can
communicate only
with the layer
above it.
C
It is made up of
many networks
connected into
transmission lines
called backbones.
It works the same
way as a local
network.
System intrusion
Denial of Service Port sniffing
C
a screen saver
program
none of the
previous
D
Virus that initiates
a ping flood
UDP flood
A
packet
flood
traffic
C
router
switch
hub
B
a form of virus
Flood a Web
server with
requests
an email server
Update virus
definitions
a poor file server
Backup data on a
daily basis
Only large nameThere are safe
recognizable sites
and unsafe sites. are safe.
Individual
computers can
connect to it using
an ISP.
A
none of the above D
Limit logging on
access
C
ActiveX-enabled
sites are safe.
B
Use of passwords
Use of logical
access methods
through an FTP
port.
by attaching itself
to a document.
E-mail
Web traffic
Use of encryption
D
methods
by scanning the
computer for a
connection.
B
Application
D
updates
Adware
A worm
Spyware
D
Protocols
Trojan horses and
key loggers.
An attack with the
purpose of gaining
publicity
Disruption in
communication
Shutdown of
military security
systems
Multiplexors
cookies and key
loggers.
LAN
key loggers and
worms.
Changing the
content of a Web
page
All of the above
are correct.
Shutdown of
nuclear plant
safety systems
B
Giving out
disinformation
Disruption in
supply lines
Contaminating
water systems
C
D
D
D
To improve
network services
limit access to
computer owners
only
Yahoo People
Search
To obtain an
accurate
inventory of
network related
equipment and
To improve system parts and network
response time
D
nodes
update its prices
stop its competitors as soon as they
seeing their prices are changed
D
USA People
Search
Lycos Search
B
Date of birth
Fraud
Personal assets
Adware
Criminal records
Spyware
A
B
make large
amounts of
money by parking
purchase off-shore funds in their
invest without risk. property.
D
bank account.
Phishing
Siphoning
Hoaxing
B
cyber stalking.
virtual stalking.
Web stalking.
B
viruses.
Use anti-spyware
Use a proxy server. software.
Message
Physical Security sequence number Logical access
checking
controls
controls
II only
Neither I or II
Both I & II
B
ftp
www
C
Verifies integrity
of files
Increases boot up
time
telnet
Misleads a
program
recompilation
both HTML and
Internet Explorer
Web browser.
B
cookies.
Never use your
real identity.
spam.
Microsoft Excel
round trip HTML
HTML document. document.
.co in used for
.con is used for
company
companies
the World Wide
Web Consortium
HTML.
Internet Explorer
HTML.
DHTML.
B
B
C
B
B
None of the above A
one way HTML.
C
MHTML
D
clicking a hyperlink
that references a
updating the
document that is
values that are
stored in the floppy
obtained through drive on your
computer
a Web query
Click on „Go to‟ or
„Search‟ in the
browser
viewing an Excel
worksheet that you
have saved as a
Web page.
B
Go to the History Go to the
page and look for Bookmarks or
Favorites page
the site
C
the Insert Hyperlink the Update
command
command
the External Data
command
A
Screensaver
Sound
Video
C
GIF
JPEG
TIFF
C
Add it to
Write it down on a ‘Favourites’ or
piece of paper.
‘Bookmarks’.
Cut and paste it to
a word processor
document.
C
intranet.
privileged network. network topology
A
a signature.
a footer.
an encryption.
B
IPT
Desktop client,
software, and
hardware.
CD-ROM
File Transmission
Protocol
IPP
Desktop server,
application, and
database.
Telephone line
File Transfer
Protocol
PoIP
A
Desktop server,
software, and
hardware.
A
None of the above B
So IP addresses
can be shorter
So email is
delivered faster
45.1.1.1
143.215.12.19
paul.trigg@domai
paul.domain.uk
n.org.uk
Scientists in
Switzerland
No-one
International Relay Internet Remote
of Characters
Conversations
None of the above B
None of the above A
None of the
D
above
None of the above B
None of the above C
None of the above A
It will be waiting for A letter will be sent
you to collect it
to you in the post None of the above A
Hyper Text MarkHyperlink Text
Marking Language up Language
None of the above C
People discussing
a topic of interest High volumes of
globally
email
None of the above C
q_id
q_desc
op1
EX1
The wizard that is used to import text files is_________________
text
import
wizard
EX2
The alphabet indicating the column followed by the row number is known
an__________
cell
reference
Which of the following files could not be opened in excel _______________
In excel, the dates that are stored as sequential numbers known as
________________-
text files
serial
values
The command to display the current date in a cell is _________________
In excel, absolute references are represented by a ________ before the column
and row addresses
The ________ can be used to select the function and assemble the arguments
correctly
Specific parts of information required by functions to perform certain tasks are
called as___________
Which of the following do not belong to the formula category in excel
environment__________
The function that in used to join cell values together in a single cell ________
The function that is used to count all the values that meet specific criteria
_________
The wizard that is used to create and edit charts _______________
The function that is used to calculate the payment for specific loan terms
____________
The function that is used to add together all values that meet specific criteria is
known as ____________
The __________ option present in the file menu options is used to specify major
facts of the page to be printed
AutoSum
variables
text
concaten
ate
countif
pivot table
wizard
sumif
average
page
setup
autoform
at
The command that is used to apply a format automatically __________
The ____________ makes the information in a worksheet meaningful and easy to
understand
bordering
page
A particular part of a work sheet can be printed by setting the _________
setup
The process of finding or selecting information is known as ____________
The option that is used to cancel the filter process for a specific column and
display all the records is ________
There are _________ types of data tables
The tables that allows the user to change or rearrange the data, summarize the
data and evaluate the data using changing points of view is known as
filtering
all option
1
data table
EX23
The wizard that is used to suggest hints for doing a task
EX24
In a chart Y-axis is known as_________
EX25
In a chart X-axis is known as_______________
EX26
_________ is a set of tables that describe each of the data series
EX27
________ is used to differentiate one data series from another
EX28
The chart that contains only one data series is _________
EX29
The chart that holds the column chart is _________
EX30
The chart that display two or more data series on a surface is _________
EX31
The chart that is used to display discrete data
pivot table
wizard
series or
rank
series or
rank
series or
rank
series or
rank
column
chart
column
chart
column
chart
column
chart
EX32
_________ are not allowed in a macro name
spaces
EX33
Which of the following tool cannot be used to view the excel web page_______
excel97
EX34
The wizard that used to build an interactive table from data existing on sheets
pivot
table
wizard
EX35
The chart that is used for displaying stock market information
line chart
In excel, the subtotal command also generates grand total after the last group
subtotal_________
true
In advanced filter , the criteria occupying multiple columns but more than one row,
is considered as an ________ criteria.
and
3dimensio
The stacked bar graphs can be represented in __________
ns
A pie chart can represent only one data series at a time
true
The ______ generates a summarized report in tabular form in an interactive
Data
manner
table
EX36
EX37
EX38
EX39
EX40
EX41
Which one of the following statements related to stock chart is NOT TRUE ?
It is also
called as
high-lowclose
chart
EX44
The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should be
used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC
party needs to won in totality to obtain majority to form the government. Which
one of the following will be the tool that will help the team ?
Which one of the following will be the tool that provides a way to view and
compare the results of all the different variations together on the worksheet ?
EX45
A ___________ is an excel file where the user stores his data
Goal seek
Workboo
k
EX46
Spreadsheets are useful for _______________
Performin
g
calculation
s.
EX47
EX48
EX49
Which one of the following is NOT the component of the pivot table ?
Excel allows upto ______ levels of sorting
Filtering rearranges a list to display the required records
EX50
The stacked bar graphs can be represented in _____________
The ______ generates a summarised report in tabular form in an interactive
manner
EX42
EX43
EX51
Pivot table
Goal
seek
Column
field
two
true
3dimensio
ns
Data table
EX54
It displays
the data
series one
Which one of the following statements related to stacked bar chart is NOT TRUE on top of
?
the other.
The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should be Pivot
used to work out the plan ?
table.
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC
Goal
party needs to won in totality to obtain majority to form the government. Which
one of the following will be the tool that will help the team ?
seek
EX55
Which following function is used in subtotal option ?______________
Count.
EX56
A workbook consists of many ________
databases
EX52
EX53
EX57
Which two of the following statements related to pivot table are TRUE ?
EX58
Which one of the following is NOT a What-if analysis tool ?
EX59
The _________ wizard separates contents in a cell into different cells
EX60
A spreadsheet is a grid of rows and columns and is called as a ________
EX61
Pick out the window that is not a form of excel ___________
EX62
On an Excel sheet the active cell is indicated by…
Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8.
The contents of cells A6, A7, and A8 are _____.
EX63
EX64
If a cell shows ####### , it means that _____.
EX65
EX66
EX67
Which is not an advantage of using computerized spreadsheets?
The gym teacher has a new program to calculate physical fitness in terms of
weight and exercise. The use inputs different weights or amounts of exercise to
determine the related physical fitness. This "What if" program is most likely which
of the followin
The difference between the highest and the lowest values.
EX68
Spreadsheets can be used for...
It is a tool
for
summariz
ing and
analyzing
the data
records
in an
interactiv
e
manner.
Goal
seek.
text import
wizard
workshee
t
applicatio
n window
A dark
wide
border
8,16,32
your
formula
has a
syntax
error
ability to
generate
tables
word
processin
g
Range
Producin
g graphs
doubleclick any
cell in the
column
EX69
To select a column the easiest method is to …
EX70
ENTER
EX71
If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known
as
EX72
All of the following are considered constants EXCEPT:
EX73
EX74
Which of the following may NOT be included in a formula?
Which of the following is NOT a valid mathematical operator in Excel?
100
Cell
reference
s
^
EX75
Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?
B5*B6
EX76
Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?
E12
How can you tell which cell in a worksheet is the active cell?
It is
surround
ed by a
heavy
border.
How can you change the active cell?
By clicking
in a
different
cell
Which of the following would you use to change the font size of a cell in Excel?
The
Standard
toolbar
EX77
EX78
EX79
array.
EX80
the New
command
on the File
menu.
EX82
The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________
menu.
File
In the Save As and Open dialog boxes, the ___________ view shows the file size
as well as the date and time a file was last modified.
Preview
EX83
Which of the following commands will automatically adjust cell references in
formulas?
EX84
Which of the following commands will remove cells, rows, or columns from a
worksheet?
EX85
Which of the following options is NOT controlled through the Page Setup
command?
EX86
Which command enables you to change the margins for a printed worksheet?
EX87
EX88
All commands are carried out on a rectangular groups of cells known as a:
Which of the following is a valid cell range?
EX89
In a copy operation, the cell(s) you are copying from is called the:
Options
worksheet
.
6
copy
range.
EX90
In a copy operation, the cell(s) you are copying to is called the:
paste
range.
EX81
EX95
Which of the following commands is needed to duplicate the contents of a cell in
another?
A cell reference that does not change during a copy operation is known as
Which of the following is considered an absolute cell reference?
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are
copied to cell E4, what will be the contents of cell E4?
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3
are copied to cell E4, what will be the contents of cell E4?
EX96
Which of the following commands is needed to transfer the contents of one cell
range to another?
EX91
EX92
EX93
EX94
Insert
Clear
Orientatio
n (portrait
or
landscape
)
The
Duplicate
command
absolute
B4
#DIV/0!
#DIV/0!
The Move
command
EX97
The F4 key is used to:
copy and
paste
cells.
EX98
Which of the following quickly copies the formatting of a selected cell to other
cells?
the Fill
Handle
Which of the following will insert a hyperlink into an Excel worksheet?
Select the
Insert
Hyperlink
command
from the
File menu.
Conditional formatting applies formatting to a cell based on:
whether
the cell
has a
formula or
a value in
it.
EX101
If you enter a date into a cell, Excel stores the date as:
text with a
two-digit
year.
EX102
You created a worksheet on July 30 and entered the =Today() function in cell
E17. You opened that worksheet again on August 31. What will be displayed in
cell E17 on August 31?
Jul-30
The number of days between two cells containing dates can be calculated by:
subtracti
ng the
earlier
date from
the later
one.
EX99
EX100
EX103
EX104
The function key that is used to quickly edit the contents of a cell is:
the F4
key.
EX105
What will be stored in a cell if 3/4 is entered in it?
03-Apr
a cell on a
worksheet
.
EX108
A user‟s response to the InputBox function can be stored in:
The cell reference for a range of cells that starts in cell B1 and goes over to
column G and down to row 10 is _____.
The teacher has a spreadsheet showing all Year 10 students and their marks in
one Mathematics test. To find the student with the highest mark, which of the
following functions should be used?
EX109
Which chart type best shows proportions of a whole?
Combinati
on
Which of the following is TRUE regarding chart types?
Once a
bar chart
is chosen
it cannot
be
changed
to a
column
chart.
EX106
EX107
EX110
EX113
To select several cells or ranges that are not touching each other, you would
_____ while selecting.
Your Institute teachers have set an assignment on „Studies‟. You are required to
use a spreadsheet to record all that you study on each day for four weeks. You
decide to show each week‟s data with an accompanying graph. What is the best
way of doing this
What would be the best method to quickly copy the formula from the active cell to
each cell below it?
EX114
To arrange rows in alphabetical order based on column A, you need to use the
command _____.
EX115
What can you NOT do with a spreadsheet?
EX111
EX112
B1-G10
AVERAG
E
hold
down the
CTRL key
Use
tables
Paste
Tools |
Sort
Analyse
data
EX116
To print just part of a sheet, you would select what you want to print and _____ .
EX117
EX118
Spreadsheets can be used for...
The formula that will add the value of cell D4 to the value of C2 and then multiply
by the value in B2 is _____.
click the
Print
button
producin
g graphs
(D4+C2)*
B2
EX119
Which of the functions is not valid for performing addition
0
EX120
The default orientation for the printed page is _____.
portrait
EX121
Which is not a valid cell address?
AD213
op2
convert
text to
columns
wizard
op3
op4
function
tip wizard wizard
ans
A
row
column
none of
reference reference the above A
quattropro
or xbase
files
range
values
=currentd
ate()
class
files
reference
values
none of
=date()
the above
none of
' = ' sign # sign
the above
function none of
AutoFill
the above
wizard
argument parameter none of
s
the above
s
Lotus 1-23
domain
values
logical
numeric
pmt
merge
vlookup
chart
wizard
pmt
convert
text to
columns
wizard
pmt
countif
sum
sumif
all blanks
3
index
table
D
A
A
C
B
Boolean D
none of
the above A
count
A
tip wizard B
none of
the above B
countif
C
none of
the above A
print area print
none of
AutoFill
the above
formattin
none of
shading
the above
g
print
preview
print area print
none of
searching sorting
the above
blanks
2
filtered
table
D
none
4
pivot
table
A
B
B
A
A
B
D
chart
wizard
convert
text to
columns
wizard
tip wizard
data
category legend
marker
data
marker
category legend
data
category legend
marker
data
category legend
marker
surface
bar chart pie chart chart
surface
bar chart pie chart chart
surface
bar chart pie chart chart
surface
bar chart pie chart chart
wild card
characters symbols
internet
explorer Netscape
convert
text to
chart
columns
wizard
wizard
stock
bar chart chart
D
A
B
C
D
C
B
D
A
none of
the above A
word 2000 A
tip wizard A
pie chart
C
false
A
or
4Multidimension dimension
s
s
false
Pivot
table
It is often
used to
display
share
market
prices
It shows over a
trends
period of
over time time
B
A
A
B
It is also
used for
indicating
fluctuation
s in
temperatu
re
changes B
Scenario
manager
Solver
Data
table.
C
Scenario
manager
Data
Pivot table table.
A
Data
Pivot table Solver
D
table.
Workshee Spreadsh none of
t
eet
the above A
Performin
g
database
operations
Performin
g text
formatting
.
Source
table
Row field. name.
N
three
false
4Multidimension dimension
s
s
Pivot
table
It is
useful
when
several
compone
nts are
changing
and the
user is
intereste
d in the
sum of
the
compone
nts.
It can be
represent
ed in 3dimension
s
Scenario
manager
Solver
Scenario
manager
Standard
deviation
records
All of the
D
above
Pivot table
item.
C
B
B
A
B
B
Data table C
Pivot table Data table A
SumIf
tables
A
workshee
D
ts
It is a tool
that
provides a
way to
view and
compare
the results
of all the
different
variations
together
on the
worksheet
Scenario
manager
convert
text to
columns
wizard
It
summariz
es the
data by
using
analytical
functions.
solver
A
Pivot
table
function
tip wizard wizard
workbook tables
document modal
window
window
D
B
database A
C
A dotted
border
A blinking
No border border
A
2,4,2
2,2,2
6,8,10
D
the
column is
too
narrow to
show all
the digits
of the
number
flexibility
speed of of moving
calculation entries
either b or
c
C
cost of
initial setD
up
graphical
Address
Writing
letters
spreadsh
D
eet
Rows
A
Document
filing
A
the row is
too short
to show
the
number at
the
current
font size
database
Gap
Drawing
pictures
drag from
the top
cell in the
column to
the last
cell in the
column
CTRL +
ENTER
click the
column
heading
click the
column
label
C
TAB
INSERT
A
formula.
B
function. constant.
(201)555Tom
1212.
#VALUE! McKenzie.
Text
Numeric constant
Functions constants s
/
*
\
It is
impossibl
e to
determine
C3/D4
.
D4^2
SUM(H9: G7*SUM(
H11)
H9:H11)
6
It is
blinking.
C
D
D
C
B
The
phrase
“active
It is
cell”
displayed appears in
in reverse the Status
video.
bar.
A
By either
clicking
in a
different
cell or
By using using the
the arrow arrow
keys to
keys to
move to a move to a
different different
cell
cell
By typing
the
reference
of the cell
you want
to move to
in the
formula
bar
C
The Font
The Cell Size
Format
command
The
command on the
Formattin on the
Tools
B
g toolbar Edit menu menu.
the Save
As
the Save comman
command d on the
on the File File
menu.
menu.
the File
Type
command
on the File
menu.
C
Edit
View
Window
Details
List
Properties B
Both
Insert
and
Clear
C
Delete
Both Clear
and
Delete
Remove B
Delete
Delete
Headers
and
footers
Page
Setup
A
Fonts
Margins
C
View
Edit
B
group.
range.
D12, G25 D12:G25
destinatio
n range. clipboard.
cell group. B
D
C
source
D
range.
destinati
source
on range. clipboard. range.
B
Both the
Copy and
Paste
The Copy The Paste comman
command command ds
D
relative
mixed
constant A
$B4
B$4
D
$B$4
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
B
#DIV/0!
C
Both the
Cut and
Paste
The Cut
The Paste comman
command command ds
D
cycle
through
absolute,
relative,
and
mixed
cell
reference
edit cells. s.
the
the
Format
Formattin
g toolbar
Painter
cycle
through
open
applicatio
ns.
C
Condition
al
formatting B
Click the
Insert
Hyperlink
button on
the
Standard
toolbar.
Doubleclick a cell
and click
the Insert
Hyperlink
command. B
the cell
address.
Right-click
a cell and
click the
Edit
Hyperlink
command.
whether
the cell
has an
absolute
or a
relative
cell
reference.
adding the
earlier
date to the
later one.
subtractin
g the later
date from
the earlier
one.
adding the
later date
to the
earlier
one.
A
the value
in the cell D
text with
either a
two-digit
or fourdigit year,
text with a
depending
four-digit an
on the
year.
C
integer. format.
It is
impossibl
e to
determine
from the
29/03/200 informatio
8
n given.
B
Aug-31
the F2
key.
the Esc
key.
0.75
March 4
of the
current
year
the F1
key.
B
a
a variable. constant.
Either 3/4
or .75,
depending
on the cell
formatting C
either a
cell on a
workshee
t or a
variable. D
B1.G10
B1;G10
B1:G10
D
COUNT
MAX
SUM
C
Line
Pie
Scatter
C
Once a
column
chart is
chosen it
cannot be
changed
to a bar
chart.
Once a
pie chart
has been
chosen it
cannot be
changed
to line
chart.
Once a
line chart
has been
chosen it
can be
changed
to a pie
D
chart.
hold down
the SHIFT
key
Create
four
separate
files
hold down
the ALT
key
Transfer
informatio
n to a
database
hold down
CTRL +
SHIFT
A
Use
multiple
sheets
Paste
Fill Down Fill Right Special
none of
Data |
Edit | Data the
| Sort
choices
Sort
Calculate Create
None of
data
the above
forms
D
B
B
C
select
Print
selection
on Page
press the Setup |
PRINT
Sheet
SCREEN and then
key
print
writing
drawing
letters
pictures
D4+C2*B
2
#VALUE!
=A3SUM:
B3SUM:C
REF!
3SUM
whatever
was last
landscape used
ZA1
A0
select
Print
selection
in the
Print
dialog
and then
D
print
None of
the above A
=(B2*(D4+
C2)
C
None of
the above B
vertical
A
None of
the above C
q_id
EC1
q_desc
EC8
The acronym for B2B is ___________
The _____________ model is the least intrusive model but
requires active search on the part of the customer
__________ is / are a form of advertisement where people relate
their experience with products and services
The _________ are software agents who communicate with the
business merchants on behalf of the customers
The Pre-purchase preparation phase includes _______________
for a set of products
The _________ phase includes customer service and support to
address customer complaints , product returns and products
defects
The ________ allow companies to bypass the need for costly
printed catalogs
A ________________ is a basket on the Net that is used to place
the items that are being purchased
EC9
EDIFACT is an abbreviation of ________
EC2
EC3
EC4
EC5
EC6
EC7
EC10
EC11
EC12
EC13
EC14
EC15
EC16
EC17
EC18
EC19
EC20
EC21
op1
Business-toBusiness
Billboard
Customer
Endorsements
Intermediaries
Order Placement
Post purchase
interaction
Billboard model of
marketing
Online Catalog
EDI For
Administration,
Commerce and
Transaction
The __________ allows for protocol conversion and communicates
with the bank using the banks private network or the Internet
EDI
In Ecommerce, data extraction, transforming the data into
transmittable form, transmitting the data and downloading the data
are the operations employed in _________
Compiler
The _________ commerce assists in integrating the customers
and suppliers of the company directly into the organisation
E-cash means______________________
E-commerce is a tool that addresses the desire of firms to cut
services cost and improving the quality of goods. It is a definition of
e-commerce from _________
The small denomination digital tokens are called _________
The ____________ is the process of encoding information to
prevent it from being read by unauthorized parties
In EDI interface, the translation service receives _________ as
incoming files from the communication service
The EDI standardisation for International Trade and Commerce is
introduced by __________
In EDI, the transmission files are composed of different sets of
external format files which are grouped into multiple sets under the
name of ________
The ________________ are pre-paid credit cards that include an
embedded cards
________________ are another form of credit payment that lets
customers use digital online cheques to pay Web merchants
directly
Business-to-Business
Emergency Cash
Communication
Perspective
Microcash
Decryption
Internal Format File
ANSI
batch files
Smart Card
E-cash
In Active advertisement, there are two types of models. They are
_____ and ________
The network based technology is/are ____________
Decryption is a process employed for scrambling of plain text for
web based transactions
Asymmetric cryptosystem is based on __________ and
____________
Billboards and Junk
Mail
EDI
Value Added Network is an example of _________
The advertising strategies emerging in the on-line world are
____________
The _________ model use direct mail, spot television or cable
television, in active based advertisement.
The ________ is a form of mail that is not targeted to a specific
audience
The __________ model refers to information that is placed at a
point where it will be noticed by customers in the course of other
activities and does not require active search
Global Network
Active or push based
advertising
EC32
The most beneficial advantage of ERP system is
What is the term that describes spying on one‟s business rivals to
gain a competitive advantage?
Error checking
Competitive
espionage
EC33
A list of competitor‟s
What would you NOT be looking for when spying on a competitor? clients
EC22
EC23
EC24
EC25
EC26
EC27
EC28
EC29
EC30
EC31
EC34
EC35
EC36
An online drugstore such as Drugstore.com is an example
of_______
Which of the following is an example of unacceptable online
„netiquette‟?
Which of the following statements is correct concerning the
security of messages in an electronic data interchange (EDI)
system?
True
Login_Id and
Password
Broadcast
E-mail
Catalog
single-user database
application
Replying promptly
Removable drives
that can be locked up
at night provide
adequate security
when the
confidentiality of data
is the primary risk.
op2
op3
op4
ans
Business-to-Backend Backend-to-Business Business- to-Billboard A
On-line Catalog
Endorsements
Broadcast
B
Billboard
Catalog
Broadcast
A
portals
.COM
Search and
discovery
Domains
A
None of the above
C
Service
Purchase
consummation
Online catalog
Pre-purchase
preparation
Endorsement model
of marketing
Shopping cart
EDI For
Administration,
Consumer and
Transport
Search and discovery A
None of the above
B
Billboard
EDI For
Administration,
Commerce and
Transport
Pulling cart
B
None of the above
C
TCP/IP
EFT
Gateway
D
Interpreter
Assembler
EDI
D
Business-toConsumer
Electronic Cash
Consumer-toBusiness
Euro Cash
Customer-toCompany
Endorsed Cash
B
B
Business Process
Perspective
Micro Transactions
Service Perspective None of the above
TT(Tiny token)
E-token
SSL
Encryption
Subscription
C
External Format File
Transmission File
None of the above
C
UN/EBCDIC
UNESCO
UN/EDIFACT
D
interchange sets
functions
functional groups
D
Embedded cards
SET
None of the above
A
Digital Cash
Smart Cards
Electronic cheques
D
C
A
Online Catalog and
Billboards
E-mail
Online Catalog and
Broadcast and Junk Customer
Endorsements
Mail
EFT
All of the above
False
Primary Key and
Private Key
Public Key and
Password
C
D
B
Public Key and
Private Key
D
Satellite Area Network None of the above
Private Network
Passive or pull-based Glow sign or hoarding
advertising
strategies
All of the above
Contact numbers of
the management
Research data
group
B
A competitor‟s new
project
D
e-commerce
C
database application None of above
Using all capital
Including the Subject letters
D
Encryption
performed by a
Message
Security at the
authentication in EDI physically secure
transaction phase in
systems performs the hardware device is EDI systems is not
more secure than
same function as
necessary because
segregation of duties encryption
problems at that level
performed by
in other information
will be identified by
systems.
the service provider. C
software.
multi-user database
application
Keeping messages
short
q_id
DS3
q_desc
___________ means the result of applying to specific information certain
specific technical processes.
__________ is an algorithm which creates a digital representation or
"fingerprint" in the form of a "hash result".
__________ is of standard length which is usually much smaller than the
message but nevertheless substantially unique to it.
DS4
Digital Signature involves two processes. They are ___________ and
__________.
DS5
The Costs of Digital Signature consists mainly of the following
DS6
DS8
CA stands for ________________
A Digital Certificate is issued by a Certification Authority and is signed with the
CA's Private Key
A Digital Certificate does contain Owner's Public Key, Owner's name,
Expiration date of the Private Key, Serial number of the digital certificate
DS9
______________ enable web servers to operate in a secure mode.
True
Server
Certificate
______________ are used by individuals when they exchange messages with
other users or online services.
______________ are on-line databases of certificates and other information
available for retrieval and use in verifying digital signatures.
Server
Certificate
Private
Certificate
DS1
DS2
DS7
DS10
DS11
DS12
DS13
DS14
Signing Writings serve the following general
purposes______,_______,_______ and _______
The most widely accepted format for Digital Certificate is defined by the CCITT
X.509
A certificate may prove to be unreliable, such as in situations where the
subscriber misrepresents his identity to the certification authority
op1
Digital Sign
Hash Function
Hash Function
Digital Signature
creation
Institutional
Overhead and
Subscriber
Relying Party
Cost
Certification
Authority
True
Evidence,
Ceremony,
Approval
True
True
DS16
CRL stands for
The prospective signer identified in the digital certificate holds the_________
and is called the ___________