q_id AC1 AC2 AC3 AC4 AC5 AC6 AC7 AC8 AC9 AC1 0 AC1 1 AC1 2 AC1 3 AC1 4 AC1 5 AC1 6 AC1 7 AC1 8 AC1 9 AC2 0 AC2 1
AC2 2 AC2 3 AC2 4 AC2 5 AC2 6 AC2 7 AC2 8 AC2 9 AC3 0 AC3 1 AC3 2 AC3 3 AC3 4 AC3 5 AC3 6 AC3 7 AC3 8 AC3 9 AC4 0 AC4 1 AC4 2 AC4 3
AC4 4 AC4 5 AC4 6 AC4 7 AC4 8 AC4 9 AC5 0 AC5 1 AC5 2 AC5 3 AC5 4 AC5 5 AC5 6 AC5 7 AC5 8 AC5 9 AC6 0 AC6 1 AC6 2 AC6 3 AC6 4 AC6 5
AC6 6 AC6 7 AC6 8 AC6 9 AC7 0 AC7 1 AC7 2 AC7 3 AC7 4 AC7 5 AC7 6 AC7 7 AC7 8
q_desc The ------ key can be used to select an existing company from list of companies. Import and Export of data between Tally and other programs is possible only through ---------Program. The re-order point is the inventory quantity that trigger a stock replishment activity. 0 A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount of money that is owed. In tally,all masters have ________main options In tally,to create a new column in balance sheet press _______ In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger accounts into one line statements In tally, we can alter ledger details using either single or multiple modes but not alble to delete a ledger from multiple modes. In tally,a group company is marked with an ______________ The systems that work together to order,receive, and pay for replenishment of stock are -------------Tally allows to delete a ledger from --------- alteration mode. --------------------- is/are useful for management in the decision making. In tally,the group company must contain at least _____________ members To cancel a vourcher entry in Tally, short-cut key is ----------The accounting masters and inventory masters related to We press ------------- function key to display the age-wise analysis of Bills Receivable or Bills Payable report In Tally, we press ------------, to print report . In Tally, Types of Accounts and Types of Vouchers passed during the period, can be seen in ------------ report. In the Tally Software, the ------------ directory stores all data entered by the user. The Ledger Accounts are unique in Financial Accounting Packages
Customers can be permitted to enter their own data into the firm‟s computer using the firm‟s wide area network is an example of In Tally, we can customize the Vouchers as per our requirements The number of steps in Accounts Compilation are Each action/transaction of a firm is described by a ----------------. Tally is based on mercantile accounting system Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that summarised information is possible. Revenue Account also known as -------------- Account Method of Voucher Numbering is/are Accounts Receivable are displayed in To assemble a product from different items -------------- entry is used A --------- purchase orders data flow is directed to the purchasing system for use in closing out the outstanding purchase orders in the receiving system diagram. Tally provides at least --------- predefined voucher formats The value of the inventory is included in a ledger accounts as an asset on the balance sheet " The buyers can follow up with the suppliers to determine the reasons " is an example of ---------------From voucher entry mode , if we press __________ then we get payment voucher in tally Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged accounts member companies of the group. A ----------- is a primary document for recording all financial transactions. The field can have a value between ________________ in FA Package. The _______ file maintains data that describes the supplier past transaction with the firm in terms of material quality in AIS It is necessary to manipulate data to transform it into ----------------
In tally, to change the date of the voucher press ______ Tally can maintain budgets on ---------------The value of the inventory is included as an asset on the balance sheet In ratio analysis report of Tally FA packagewe we press ________________ function key to the display of bills receivable , bills payables report The accounts payable system is responsible for paying the suppliers for the ----------------What is the default financial year in Tally6.3 _________________ Tally encrypts and stores TALLY DATA at the data directory The Profit & Loss statement can be displayed in ---------------- format(s). Default ledger accounts in tally are ______ Default 'godown' name in tally is ____________ 'Tally vault' is a _________________ To create a sales voucher in tally , you have to press _______ A Group Company is ------------------------- given to the merged accounts of member companies of the group. In tally,"credit note" voucher type records entry for ________________ In tally you get currency symbol option from _______ menu ------------------ gives the balance for each day for the voucher type has been selected. For 'stock journal' entry we press ______________ in tally Tally provides the capability to the administrator/auditor to track changes in the areas is/are In tally, types of users are _______________ By pressing -------- key, a list of inventory reports can be displayed straightaway from the balace sheet report Projected approximation of income or expenses is called ______________ . "Administrator" type user is also called 'Auditor' of a company in Tally
You will get company information , if you press __________ from gateway of tally A constituent(member) company can be a member of more than one group. Default stock category in tally is ______ To create a log of the import activity in a file _____________ is located in the same directory as an executable program in tally In Tally,inventory valuation method option is available from _______ Tally audit feature is available in a company __________________ In tally, a group company can also be a constituent(member) of another group company Default number of groups in tally are ________ During voucher entry ------------- are used. User designated as --------------- can view audit list. Tally supports Importing of data from ---------------In an accounting information system, which of the following types of computer files most likely would be a master file? Which of the following is an advantage of a computer-based system for transaction processing over a manual system? A computer-based system:
op1 F1 Tally ODBC TRUE F3 Invoice Two Ctrl+C TRUE TRUE * ALT+F1 Tally IMP false ALT+F3 Bill Three Alt+C FALSE FALSE $
op2
op3 CTRL+F1 Tally INI
op4 None of the above None of the above
CTRL+F3 A or B Four Alt+Ctrl+C
None of the above None of the above Five None of the above
&
^ Puchasing, Receiving and Accounts payable Mone of the above All of the above One Ctrl+D All of the above F7 None of the above Journal Book None of the above
Puchasing and Accounts Accounts payable payable Puchasing and Receiving and Receiving Single Cash Flow Statements Two Alt+D Create Information F4 Alt+P Tally Audit Bin True Multiple Fund Flow Statements Three Alt+X Alter Information F5 Ctrl+P Statistics Data False A or B Ratio Analysis Four Ctrl+T Display Information F6 Shift+P Day Book Sub
Enterprise Data Interchange TRUE 2 data element FALSE Display stock valuation method Ledgers Personal Manual Balance Sheet Journal Filled 11 FALSE
Enterprise Data Information FALSE 3 data record TRUE Open Calculator Groups Nominal Automatic Profit & Loss Stock Journal Receipt 16 TRUE
Electronic Data Interchange.
All of the above
4 Field
5 All of the above
Change Period Journals Real None Journal Book Physical Stock Transfer Issue 18
None of the above None of the above None of the above All of the above All of the above Reversing Journal None of the above 21
management by management by objective exception F4 Main Location True Ledgers 0 to 9 Supplier Report F5 Primary False Reports 1 to 100 Suspense Output
electronic data analysis F6 Primary Cost Category
All of the above Alt+f5 All of the above
Vouchers 10 to 60 Order Information
None of the above None All of the above None of the above
F2 Net Transactions True F6 function key Sales 1-4-1995 to 31-3-1996 True
F4 Closing Balance False Alt + f6 function key Purchases 1-4-1996 to 31-3-1997 False
Ctrl+f2 A and B
Ctrl+f4 None of the above
F7 function key A or B 1-4-1997 to 31-31998
None of the above None of the above None of the above
Horizontal Balance sheet & profit & Vertical loss profit & loss and trial Profit & loss and trial balance balance Primary Security mechanism F5 a name Sales return Company creation Trial Balance F7 Changes in transactions or vouchers 2 F9 Balance sheet TRUE Main location Ledger a/c F7 an identity Purchase return Stock items units Daybook Alt + F7 Changes in Ledger Masters 3 F10 Profit & loss a/c FALSE
A or B
None of the above
Cash and profit & Cash and bank loss A or b Cost category F8 A and B a or b Regional setting Balance Sheet F10 Both A and B 4 F11 Budget None of the above None of the above F9 None of the above None of the above None of the above None of the above F11 None of the above 1 F12 None
F3 TRUE Main location Tally.imp Stock summary
Ctrl+F3 FALSE Primary Tally.ini Stock journal
Alt+F3
None of the above
Symbol A or b
None of them None None of the above None
Stock analysis In 'comp info -> By pressing F11 function During the creation of a security control' key option company TRUE 128 Ledger Accounts Administratorto another One company company created withon Tally Package Inventory subsidiary. Does not require as stringent a set of internal controls. FALSE 228 Groups Ownerprograms - a Other spreadsheet or a database file. Cash disbursements. Will produce a more accurate set of financial statements. 28 Sub-Groups Data Entry Both A and B Cash receipts. Will be more efficient at producing
16 B or C TallyVault None of the above Payroll transactions. to Eliminates the need reconcile control accounts and subsidiary ledgers.
ans A A A B C B B A A A D A D A B D C A B B A
C A C B B B B B B A B A B B B B C A C A A C
A C A A B B A C C B A D C A A B B C B A C A
C A B A A B A C A A C A C
Q_id
Q_desc
BC1 The memory address register is used to store BC2 Inefficient usage of excess computer equipment can be controlled by BC3 Which of the following is not the component of a CPU A trailer label is used on a magnetic tape file, it is the last record and BC4 summarises the file. The following is an information not found in the trailer label BC5 Hard copy is a term used to describe...? BC6 What do the abbreviations VAB stand for What control would prevent the accidental erasure of customer information BC7 from a magnetic tape What are the individual dots which make up a picture on the monitor screen BC8 called? BC9 BC1 0 BC1 1 BC1 2 BC1 3 BC1 4 BC1 5 BC1 6 BC1 7 BC1 8 BC1 9 BC2 0 BC2 1 BC2 2 BC2 3 BC2 4 BC2 5 Header label normally include all the following except the A daisy wheel is a type of...? Which approach or technique is a control usually associated with microcomputers An impact printer creates characters by using...? The best security control in a microcomputer environment is to What would you NOT use with a flatbed plotter? What do you need for an ink jet printer? The greatest control exposure in a microcomputer environment is the lack of What do you need for an ink jet printer? A laser printer does NOT use? The amount of data that a disk may contain is known as the disks...? You can ________ protect a floppy disk. Information on a hard disk is usually backed-up using a...? Magnetic tape is a...? Hard disks can have a storage capacity in the region of...? Which storage device has the largest capacity in Mb? Which storage device cannot be erased?
BC2 6 BC2 7 BC2 8 BC2 9 BC3 0 BC3 1 BC3 2 BC3 3 BC3 4 BC3 5 BC3 6 BC3 7 BC3 8 BC3 9 BC4 0 BC4 1 BC4 2 BC4 3 BC4 4 BC4 5 BC4 6 BC4 7 BC4 8 BC4 9 BC5 0 BC5 1
You can ________ protect a floppy disk Where should floppy disks be stored? The contents of these chips are lost when the computer is switched off? What are responsible for storing permanent data and instructions? Which parts of the computer perform arithmetic calculations? What are small high speed memory units used for storing temporary results? How many bits of information can each memory cell in a computer chip hold? What type of computer chips are said to be volatile? Magnetic tape is a...? Software can be divided into two areas: Travel agents use this computer system when reserving flights Which computers are used in the weather forecasting industry? Vacuum tube based electronic computers are...? Which generation of computer was developed from microchips? Which generation of computer uses more than one microprocessor? Which generation of computer developed using integrated circuits? Which generation of computer developed using solid state components? Name three steps involved in developing an information system How do you define analysis of an information system? What areas need to be considered in the SOFTWARE design process? What is the function of systems software? Formatting a disk results in all the data being...? What is Direct Implementation? What is parallel running? What documents are produced during the development of a system? What are User Guides are used for?
BC5 2 BC5 3 BC5 4 BC5 5 BC5 6 BC5 7 BC5 8 BC5 9 BC6 0 BC6 1 BC6 2 BC6 3 BC6 4 BC6 5 BC6 6 BC6 7 BC6 8 BC6 9 BC7 0 BC7 1 BC7 2 BC7 3 BC7 4 BC7 5 BC7 6 BC7 7
Systems software can be categorised into: Which storage device cannot be erased? Application software are programs that are written Which bus carries information between processors and peripherals? Convert the decimal number 2989 to Hexadecimal Which bus controls the sequencing of read/write operations? What are utilities? Numbers are stored and transmitted inside a computer in The original ASCII codes A Nibble corresponds to A gigabyte represents A 32-bit processor has A parity bit is he contents of these chips are lost when the computer is switched off? Clock speed is measured in Cache memory enhances CISC machines Which parts of the computer perform arithmetic calculations? Every data from the primary memory will be erased if An RS-232 interface is For print quality you would expect best results from ROM A UPS smart card Laptop computers use Multiprogramming refers to
BC7 8 BC7 9 BC8 0 BC8 1 BC8 2 BC8 3 BC8 4 BC8 5 BC8 6 BC8 7 BC8 8 BC8 9 BC9 0 BC9 1 BC9 2 BC9 3 BC9 4 BC9 5 BC9 6 BC9 7 BC9 8 BC9 9 BC1 00 BC1 01 BC1 02 BC1 03
Multitasking refers to What are small high speed memory units used for storing temporary results? A good way to exchange information that changes rapidly is through Multiprogramming is a prerequisite for Timesharing is the same as Virtual memory is Multiprocessing is To help keep sensitive computer-based information confidential, the user should What is the function of a disk drive? A 4GL is A nanosecond is What small, hand-held device is used to move the cursor to a specific location on the screen? The memory address register is used to store The memory data register is used to store The instruction register stores Which of the following is used to indicate the location on the computer monitor? A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate data. Which of the following translates a program written in high-level language into machine language for execution? Detecting errors in real memory is a function of To find where a file has been saved on disk, the user should A series of instructions telling the computer how to process data or files is defined as a To ensure that data is not lost if a computer system fails, the user should Having a single CPU alternatively process tasks entered from multiple terminals is called The place in the CPU where the data and programs are temporarily stored during processing is called the All are examples of computer software except Computer manufactures are now installing software programs permanently inside the computer. It is known as
BC1 04 BC1 05 BC1 06 BC1 07 BC1 08 BC1 09 BC1 10 BC1 11 BC1 12 BC1 13 BC1 14 BC1 15 BC1 16 BC1 17 BC1 18 BC1 19 BC1 20 BC1 21 BC1 22 BC1 23 BC1 24 BC1 25 BC1 26 BC1 27 BC1 28 BC1 29
Which of the following file organisation forms most efficiently allows access to a record The part of the computer system controlling data manipulation is called the For direct access storage devices the recording area is divided into The data hierarchy from the largest to the smallest is Which of the following hardware or software system controls provides a detailed record of all activities performed by a computer system Which one of the following parts of a computer is necessary to enable it to play music? An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes of sound and 1 minute of video. Which of the four Which one of the following printers is suitable for printing sprocket fed carbon copies? Multimedia software can be most productively used for To be effective a virus checker should be Which one of the following software applications would be the MOST appropriate for performing numerical and statistical calculations? Passwords enable users to 12. How many bytes do 4 Kilobytes represent? Back up of the data files will help to prevent Which one of the following is the MOST common internet protocol? The advantage of a PC network is that The term A:\ refers to UPS stands for The main problem associated with uninstalling software is that You are conducting research for a Income Tax assignment. The raw facts you collect are called A flow chart is the A voucher entry in Tally is done for Passwords are applied to files in order to Each of the following is an enabler of IT-business alignment except: The basic systems model is used to describe virtually all information systems and it consists of the following elements: What is a computer-aided design system?
BC1 30 BC1 31 BC1 32 BC1 33 BC1 34 BC1 35 BC1 36 BC1 37 BC1 38 BC1 39 BC1 40 BC1 41 BC1 42 BC1 43 BC1 44 BC1 45 BC1 46 BC1 47 BC1 48 BC1 49 BC1 50 BC1 51 BC1 52 BC1 53 BC1 54 BC1 55
A(n) __________ offers a solution package for an entire industry. File extensions are used in order to Information systems controls include all of the following EXCEPT: Hashing for disk files is called Components of expert systems include: a) inference engine; b) user interface; c) knowledge base; d) fuzzy logic Black box testing and white box testing are part of: What is the term used to describe the point of interaction between a computer and any other entity, such as a printer or human operator? The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility Which of the following is an acceptable way to shut down the computer? Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot remember where you saved them. Which is the best way to Components of an information system model are: a) applications architecture; b) functional architecture; c) technology architecture; d) information architecture Benchmarks form part of: Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals Which is not part of help desk documentation: Testing of individual modules is known as: Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface architecture; d) presentation architecture Which is part of installation testing: The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a set of instructions provided by the: Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio Which of the following procedures should be included in the disaster recovery plan for an Information Technology department? Designing relationships among components is part of: Several Computers connected together is called: Which network topology uses a Hub? Which of the following topologies is used for Ethernet? Application software are programs Which type of file search method requires a computer first read all locations preceding the desired one
BC1 56 BC1 57 BC1 58 BC1 59 BC1 60 BC1 61 BC1 62 BC1 63 BC1 64 BC1 65 BC1 66 BC1 67 BC1 68 BC1 69 BC1 70 BC1 71 BC1 72 BC1 73 BC1 74 BC1 75 BC1 76 BC1 77 BC1 78 BC1 79 BC1 80 BC1 81
Which of the following areas of responsibility are normally assigned to a systems programmer in a computer system environment? Which of the following is recommended when many searches for data are required It is unlikely that a magnetic tape containing several thousand blocked records can be used on two machines of different architecture directly because Which component of the CPU has the most influence on its cost versus performance Which of the following terms applies to network used to connect computers with other computers, peripherals and workstations that are in fairly close Intelligent terminals differ from dumb terminals in that they A computer is to be linked to 8 terminals using a single communication link. To permit simultaneous terminal operations, communication path will require which A modem is a device that A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and printers. This type of network is called a A computer based system for sending, forwarding, receiving and storing messages is called an If a workstation contains a processor, monitor, screen manipulation device, printer, storage and communication capabilities, it is said to be Terminal hardware controls include RS-232 is a What is a compiler? What are the stages in the compilation process? Which of the following is not a data transmission coding scheme What is the definition of an interpreter? A device used in data communications to divide a transmission signal into several sub-bands is known as a Third generation languages such as COBOL, C, and FORTRAN are referred to as Serial Communication is used over long distance because it In what areas is the COBOL programming language used? The primary function of a front-end processor is to What is the first stage in program development? Which of the following is not used for data transmission within a local area network What is System Analysis? A device to device hardware communication link is called
BC1 82 BC1 83 BC1 84 BC1 85 BC1 86 BC1 87 BC1 88 BC1 89 BC1 90 BC1 91 BC1 92 BC1 93 BC1 94 BC1 95 BC1 96 BC1 97 BC1 98 BC1 99 BC2 00 BC2 01 BC2 02 BC2 03 BC2 04 BC2 05 BC2 06 BC2 07
What will a good software provider consider? The topology of a network can be each of the following except What is the 8-bit binary value of the decimal number 85? Which is the most common data transmission error checking method What is the decimal value of the binary number 1111? Which of the following devices merges communication signals onto a single line What is the decimal value of the octal number 215? Which tool is used to help an organization build and use business intelligence? Cache memory enhances What is the decimal value of the hexadecimal number FF? Numbers are stored and transmitted inside a computer in What is the hexadecimal value of the decimal number 1476? A byte corresponds to What does EBCDIC coding of numbers mean? A Kb corresponds to What is the binary sum of 01011 and 00101? Information is stored and transmitted inside a computer in Where would you find the letters QWERTY? A parity bit is How did the computer mouse get its name? Clock speed is measured in What are you most likely to use when playing a computer game? CPU performance may be measured in A digitising tablet can be used for? In processing cheques which of the following I/O techniques have banks traditionally used Which of the following is a pointing device used for computer input?
BC2 08 BC2 09 BC2 10 BC2 11 BC2 12 BC2 13 BC2 14 BC2 15 BC2 16 BC2 17 BC2 18 BC2 19 BC2 20 BC2 21 BC2 22 BC2 23 BC2 24 BC2 25 BC2 26 BC2 27 BC2 28 BC2 29 BC2 30 BC2 31 BC2 32 BC2 33
A UPS What does a light pen contain? The capacity of a 3.5” floppy is around What general term describes the physical equipment of a computer system, such as its video screen, keyboard, and storage devices? Where would you find the letters QUERTY? What are you most likely to use when playing a computer game? A digitising tablet can be used for? Which of the following is a pointing device used for computer input? What input device could tell you the price of a product Where would you find a magnetic strip? Hard copy is a term used to describe...? What are the individual dots which make up a picture on the monitor screen Called A daisy wheel is a type of...? What input device can be used for marking a multiple-choice test? Laptop computers use QWERTY is used with reference to What input device could tell you the price of a bar of chocolate? A GUI is Where would you find a magnetic strip? Multiprogramming refers to Multitasking refers to Multiprogramming is a prerequisite for UNIVAC Computer belongs to the Timesharing is the same as Name the first Indian Super Computer? Disk fragmentation
BC2 34 BC2 35 BC2 36 BC2 37 BC2 38 BC2 39 BC2 40 BC2 41 BC2 42 BC2 43 BC2 44 BC2 45 BC2 46 BC2 47 BC2 48 BC2 49 BC2 50 BC2 51 BC2 52 BC2 53 BC2 54 BC2 55 BC2 56 BC2 57 BC2 58 BC2 59
The technology which is used to check answer sheets of multiple-choice questions in civil services or similar examinations is: A compiler is Which printer among the following is fastest “Zipping” a file means What does acronym VIRUS stands for An impact printer creates characters by using...? A client-server system is based on A nanosecond is A procedural control used to minimize the possibility of data or program file destruction through operator error is the use of _______ software enables users to send and receive data to/from remote computers A _____ is a running instance of an application Splitting of CPU's time for different tasks _______ prevents time slicing ______ computers are used in large organizations for large scale jobs which have large storage capacities _______ is responsible for all calculations and logical operations that have to be performed on the data ______ printer use laser light ______ software enhances the user to enter ,store, manipulate and print any text ______ software enables users to send and receive data to/from remote computers _______ is the temporary storage place for deleted files _____ is a collection of related fields _____ language consists of strings of binary numbers ______ symbol is used to represent processes like assigning a value to a variable or adding a number _______ is an example for micro computer _________capability supports concurrent users doing different tasks The ______ do not have processing power of their own and has only a screen, keyboard and the necessary hardware to communicate with the host. For this A______is nothing but a PC with a network operating system _____system is responsible for handling the screen and user I/O processing
BC2 60 BC2 61 BC2 62 BC2 63 BC2 64 BC2 65 BC2 66 BC2 67 BC2 68 BC2 69 BC2 70 BC2 71 BC2 72 BC2 73 BC2 74 BC2 75 BC2 76 BC2 77 BC2 78 BC2 79 BC2 80 BC2 81 BC2 82 BC2 83 BC2 84 BC2 85
The______ handles data processing and disk access in a Client/Server architecture Both the DBMS and the application resides on the same component in a ____system When all the processing is done by the mainframe itself, the type of processing is sometimes called as DBMS models can be grouped under____ categories ______is the most advantageous database system A new user initiates a new process of execution at the background,while the user can continue his query process as usual in the foreground. This situation The process of data being automatically written to a duplicate database is called______ Modem stands for __________ . Multiple changes to the same record or a field are prevented by the DBMS through______ _________allows an application to multitask within itself LAN stands for __________ . New process of execution is referred to as______ ISDN stands for _______. _____________ is the Worlds largest computer network . _______is/are a popular front end tool When LAN connected together ,it is called __________ . TCP/IP stands for _________ . Data is broken into small unit called __________ . SMTP stands for __________ . The __________ protocol is a network protocol to be built for the World Wide Web . ATM stands for __________ . The computer which can receive data from other computers on the network and print it is _______ The hardware and the software requirements together form the_____ ATM, Asynchronous transfer mode is a __________ technology. __________ is designed telephone system Expansion of ISDN is ________
BC2 86 BC2 87 BC2 88 BC2 89 BC2 90 BC2 91 BC2 92 BC2 93 BC2 94 BC2 95 BC2 96 BC2 97 BC2 98 BC2 99 BC3 00 BC3 01
Expansion of WBT is ______________ _________ connects LANs. Collection of instruction is called a _____ Combination of alphabetic and numeric data is called _____ data Computers can be classified based on ______,______and _______ _________ are used in large organizations for large scale jobs _______ is responsible for feeding data into the computer _______ is the capability of the o/s to run numerous applications simultaneously _______ involves conversion of raw data into some meaningful information _______ is responsible for obtaining the processed data from the computer _______ printers use light to produce the dots needed to form pages of characters Hardware components in a computer are _____,____,_____,______ _______ software are programs that are complex and can be developed or purchased _______ is a set of special instructions used to communicate effectively with the computer _______ converts a high level language into machine language _______ translates assembly language program into machine language instructions
Op1 data to be transferred to memory Contingency Planning NIC Card Record Count Writing on a hard board Voice activated broadcasting Validity check Coloured spots File Name Printer System Logs Electrically charged ink Restrict physical access A pen A cartridge Separation of duties A cartridge A print head Volume Read Magnetic tape Serial access medium 1.44MB A CD-ROM A CD-ROM
Op2 data that has been transferred from memory System feasibility report VSAT Identification Number Printed output Voice answer back Boundary protection Pixels Identification number Storage device Physical Security An ink pen Use only unremovable media Paper A drum Centralised function for PC acquisition A drum A laser beam Size Write PAN drive Random access medium 20 GB A floppy disk A floppy disk
Op3 the address of a memory location Capacity Planning RAM Control totals for one or more fields Storing information on the hard disk Visual audio board File protection ring Pixies Reel Number Pointing device Console Log An inked ribbon and print head Require user passwords Eraser A ribbon Centralised function for PC Disposition A ribbon An INK RIBBON Storage capacity Read and Write Floppy disk A parallel access medium 700MB Magnetic tape storage Magnetic tape storage
Read By a sunny window ROM chips RAM chips ALU CPUs 0 bits RAM chips Serial access medium Network software and security software Supercomputer Notebook computers First generation Second generation Second generation Second generation Second generation Specification, Design, and Testing Analysis translates program code of a high level language Only hardware and software To collect data Deleted from the disk Users operate the manual system and computer system The new system is introduced alongside the Instructions and technical documentation For technical support
Write By magnet objects RAM chips ROM chips Registers Registers 1 bit ROM chips Random access medium Systems software and application software Personal computer Supercomputers Second generation First generation Third generation Third generation Third generation Programming, Design, and Testing Analysis is the loading of programs that perform routines to Inputs, outputs, file design hardware, and software To execute any programs
Read and Write In a drawer CDROM chips DRAM chips Logic bus Control unit 8 bits CACHE A parallel access medium Business software and games software Mainframe computer Jon Von Neumann computers Hoover generation Fourth generation Fifth generation Fifth generation Fifth generation Analysis, System Design, and Implementation This involves looking at a system and finding out how information is being Maintenance, reliability, and upgradeability To maintain security
Copied from the disk Saved to the disk Users operate the computer Users operate the manual system system from a given date The new system is introduced and users start operating it Users continue operating the old system User Guide and technical Log files and temporary files documentation User guides cover how to run the To enable any printer to be connected to the network system, enter data, save, print, etc.
Operating systems and system services Magnetic tape storage To maintain a backup copy of all the information Data bus FDDI
Network systems and communication services CD-ROM To do a particular task. Auto bus BAD
Database systems and backup services floppy disk To help someone who is applying for employment Address bus TED Address bus Data structures that are part of the kernel of an operating system. decimal form represented 256 characters 16 bits 230 bytes 32 Mb of RAM is the first bit in a byte DRAM bytes secondary storage capacity have medium clock speeds
Data bus Auto bus Peripherals that are connected Operating system routines that to a computer. execute in supervisor mode. binary form were 7 bits 4 bits More than 1000 mega bytes 32 registers used to indicate uppercase letters ROM bits per second memory capacity have fewer instructions than RISC machines ALU Power is switched off a parallel interface line printer ASCII code form 8 bits 8 bits 1000 kilobytes 32 I/O devices used to detect errors RAM baud memory access time use more RAM than RISC machines Registers
Variables Data is not saved before computer is Computer is improperly shut down shut down a serial interface dot matrix printer printer interface ink-jet printer stores more information than RAM provides backup power in the event of a power cut is an access card for a security system SSGA displays writing programs in multiple languages
is faster to access than RAM is non-volatile increased the storage capacity of a computer system increases the process speed has more storage capacity than is a form of ATM card an ATM card CRT displays having several programs in RAM at the same time LCD displays multitasking
having several softwares running at the same time ALU brochures multitasking multitasking related to virtual reality same as multitasking save the file to calculate numbers Uses Cobol 106 sec a keypad data to be transferred to memory data to be transferred to or from memory an instruction that has been decoded a cursor Formula Assembler Memory protection use the directory search tools Network save copies of the file with the same name on the system Multiprocessing ROM Firmware Firmware
the ability to run 2 or more programs concurrently Registers magazines an operating system multiprogramming a form of ROM same as multiprogramming set up a password to read from or write information to a floppy disk uses Java 103 sec a mouse data that has been transferred from memory data to be transferred to the stack an instruction that has been fetched from memory a scroll bar Algorithm Compiler Parity Checking search each file in turn Program use different filenames on the system Time sharing RAM Word Processor Word Processor
writing programs in multiple languages Variables CD-ROM to run more than one program at the same time multiuser a form of VRAM multiuser make a backup copy to print sheets of paper uses C++ 1012 sec a frog the address of a memory location the address of a memory location an instruction that has been executed a light pen Program Artificial Intelligence Range checking use the backup facility System keep a record of computer failures Multiprogramming Floppy Disk Telephone modem Telephone modem
Sequential Operating System Tracks and Sectors Character, field, database Valid character check Sound card. Text
Hashed ALU Blocks and Sectors Database, character, record Maintenance diagnostic program CD-ROM Pictures
Indexed CPU Files and Tracks File, record, field Systems logs MIDI interface Sound Ink-jet presenting an order for stock to a warehouse. updated regularly Graphics package retain confidentiality of files 4096 virus infection IPX/SPX printer can do 1000s of pages a day the root directory uninterruptable power supply the system requires a network administrator to uninstall it information. Logical Steps in any language It is mandatory in tally prevent unauthorised access IT understands the business processing. Software that generates innovated designs and artistic patterns.
Laser Dot matrix viewing an encyclopaedia CD- creating the plans for a building design. ROM. replaced regularly Database get into the system quickly 512 loss of confidentiality TCP/IP never updated Document processor make efficient use of time 1024 duplication of data HTML
access to the internet is quicker files can be shared a file name universal port serial orphan files can be left on the system data. Graphical representation of logic Purchase, sales, receipt, payments etc. assist in maintenance a subdirectory up-line provider service the program executable may not allow it to be uninstalled documents. Rules writte in procedural language To fill the log register
speed up access IT management lacks senior executive support for IT. leadership. input. output. The use of computers to Using computers to do design state-of-the-art, high- architecture.
specialist or functional name the file preventive controls. external hashing A: (a) , (b), (d) corrective controls Component (a), (c), (d) Press the reset button. Create the files again. (a), (c), (d) detective controls (a), (c), (d) problem logging unit testing (b), (c), (d) benchmark testing Multiplexer. (a) to (d) Replacement personal computers for user architectural design Client-server Star Star To maintain a backup copy of are written all the information Direct
Application Service Provider ensure the filename is not lost detective controls. static hashing B: (a) to (d) preventive controls Interface (b), (c), (d) Turn the computer off at the power point. Ask the person next to you. (a), (b), (c) organisational controls (a), (b), (c) call lights data testing (a), (b), (d) specifications matching Peripheral processors. (b), (c), (d) Identification of critical applications. interface design Client Bus Bus To do a particular job such as editing, storing information Sequential
enterprise identify the file corrective controls. dynamic hashing C: (a), (b), (c) detective controls Settings (a) to (d) Select the ‘Shut Down’ option from a menu. Use the Find or Search feature. (a) to (d) preventive controls (a) to (d) program change requests thread testing (a), (b), (c) parallel operations Concentrator. (a), (b), (c) Physical security of warehouse facilities. procedural design Computer network Mesh Ring To help someone who is applying for employment Binary
Systems analysis and applications programming. A sequential file on a disk Tapes can only be read by the machine on which they are Data path part Distributed systems Can send data to a computer and receive data from a
Data communications hardware and software. A sequential file on a tape Parity errors will result Control Unit Local Area network Use the computer to which they are connected to perform all
Operating systems and compilers. A direct access file on a disk Information formats commonly vary between architectures Address calculation part Wide area network Generally require a keyboard for data entry and a CRT for display Multiplexor Packs data in a disk file Loop Network Electronic mailing A personal computer Parity checks Communication protocol A compiler is a general purpose language providing very efficient Lexical analysis, CONVERSION, and code generation
Mixer Modem Allows computer signals to be send over a telephone line Aids in back-up procedures Planetary network Office Automation A dumb workstation Time of day control locks Type of cable A compiler does a conversion line by line as the program is Feasibility study, system design, and testing Ring Network Executor systems An intelligent workstation Encryption algorithms Terminal Standard A compiler converts the whole of a higher level program code Implementation and documentation
Baudot ASCII CRC An interpreter does the An interpreter is a representation An interpreter is a general purpose language providing very efficient conversion line by line as the of the system being designed Modem High-level languages It is faster than parallel communication Financial sector and engineering Communicate with the console operator Specification and design Fiber Optics The design of the screen the user will see and use to enter A cache Demodulator Middle-level languages It is less error prone Graphic design and education Manage the paging function in a virtual environment System Analysis Coaxial Cable System Analysis defines the format and type of data the An interface Frequency division multiplexor Low-level languages It is less prone to attenuation Accounting systems, commercial sector Relieve the main CPU of repetitive communication tasks Testing Common carrier System Analysis involves creating a formal model of the problem to be A buffer
The different types of network to be used Star 10101010 Parity 15 Port 327 Data warehouse memory capacity 30 binary form 4C5 4 bits Basic Coding Description 1024 bits 10000 binary form Mouse used to indicate uppercase letters Because it squeaks when moved bits per second Touch screen BPS Printing letters OCR Touch screen
Testing to check for errors Hardware, Software and size of before the system is introduced program. Packet 1100101 Retransmission 4 Modem 141 Data Mining tools memory access time 255 ASCII code form 1B7 8 bits Binary Coded Decimal 1000 bytes 1112 ASCII code form Keyboard used to detect errors Its moves like a mouse baud Light pen MIPS Tracing diagrams MICR Hard disk Ring 1010101 Cyclic Redundancy 64 Multiplexor 97 Data management systems secondary storage capacity 256 decimal form 5C4 16 bits Bit Code Design 210 bits 1110 decimal form Numeric Keypad is the first bit in a byte It has ears bytes Joystick MHz Reading bar codes barcode scanning CD-ROM drive
increased the storage capacity of a computer system increases the process speed Refillable ink 100K hardware Mouse Touch screen Printing letters Touch screen Mouse Credit card Writing on a hard board Coloured spots Printer Mouse CRT displays screen layout Mouse hardware Credit card having several programs in RAM at the same time having several programs in RAM at the same time multitasking Pencil lead 1.44 Mb software Keyboard Light pen Tracing Diagrams Hard disk Bar code reader Mouse Printed output Pixels Storage device Bar code reader LCD displays mouse button layout Bar code reader language interpreter Speakers multitasking The ability to run 2 or more programs concurrently an operating system
provides backup power in the event of a power cut Light sensitive elements 5 Mb output Numeric Keypad Joystick Reading Bar Codes Keyboard Optical mark reader Speakers Storing information on the hard disk Pixies Pointing device Optical mark reader SSGA displays keyboard layout Optical mark reader software interface Smart card writing programs in multiple languages writing programs in multiple languages To run more than one program at the same time Third - generation computers. Multi-user Param is due to bad disk blocks
First - generation computers. Second - generation computers. multitasking Vishwajeet is caused by wear multiprogramming Deep Blue caused by overuse
Bar code Reader Technology a fast interpreter Drum Printer encrypting it Very important reader user sequence Electrically charged ink mainframe technology 10-6 sec Limit checks application project multiprocessing mainframes control unit band printer data management integrated software my computer field assembly language terminator symbol PC-at multiprocessing "dumb terminals" wan host
Optical Mark Reader Technology slower than an interpreter Dot - Matrix Printer decrypting it Vital information resource under siege Thermal Paper LAN technology 10-3 sec Control figures system model multithreading super computers arithmetic and logic unit drum printer word processing communication software recycle bin file machine language processed symbol hp vectra system multithreading dumb servers distributed computing system server
Magnetic Ink Character Recognition Technology converts a program to machine code Desk - jet Printer compressing it Virtual information reader & user system An ink pen WAN technology 10-12 sec External file labels operating system pilot project multiplexing micro computers central processing unit non impact printer electronic spreadsheet idea processor Microsoft exchange record high level language connector symbol fazitsu vp200 series multiplexing dummy terminals windows NT back end
host PC server processing four file management system multiprocessing repairing Code/De-code fixes multiprocessing Linear area networks task Integrated system dynamic networks. Ethernet visual basic MAN Transfer control protocol/Internet protocol Cells System modulation transfer protocol Transfer Protocol Aggregate transfer mode File server platform MAN and WAN ISDN Internal Services Digital Network
server LAN host processing one hierarchical database system multithreading redo logging Modulation/Demodulation locks multithreading Local area networks process Integrated Symbolic Digital networks. Internet power builder WAN Transfer communication protocol/Internet protocol Bits Software Mail transmission protocol Transmission protocol Asynchronous transfer mode Printer server configuration LAN and WAN ATM
back end distributed computing dumb processing two network database system multiplexing disk defragmentation Module/De-module constraints multiplexing Local array of networks. thread Integrated Services Digital network. ARPANET SQL * plus GAN Transmission control protocol/Internet protocol Packets Simple Mail transfer protocol Hyper text Area transfer mode Receiver package LAN and MAN Internet
Internal Services Design Network Integrated Services Digital Network
Web based Training Bridges procedure alpha numeric space occupied, price, no. of users allowed mini computers input multiprocessing interpreter input impact printers operating system, bootstrap, kernel, shell operating system batch processor compiler
Web based Technology Routers batch alpha beta cost, performance their ratio microprocessors output multithreading compiler processor drum printers control program, interpreter, assembler, compiler application software protocols compiler interpreter
Web based Transport Protocol command numerous alpha size, performance, cost PCs feed multiplexing converter ram non-impact desktop printers monitor, program, keyboard, bus windows 95 software's assembler assembler
Op4 an instruction that has been Exception reporting AGP Card End-of-file and endof-reel code None of above None of above Limited access files None of above Batch Total None of above Data Dictionary None of above Make duplicate copies of files None of above A cassette Distributed policies or procedures None of above None of above None of above None of above None of above None of above None of above None of above None of above
Ans C C B B B C C B D A B C A C A A A C C B A A B C A
Not None of above None of above None of above None of above None of above None of above None of above A selective access medium None of the above None of above None of above None of above None of above None of above None of above None of above None of above None of above None of above None of the above Transferred from the disk None of above None of above None of above None of above
B C B B A B B A A B B B A C C B A A C B D A B A C C
None of the above Hard disk None of the above Control Bus MAD Control Bus Shells, compilers and other useful alphanumeric form represented 127 characters 32 bits 1024 bytes a 32-bit bus or 32bit registers is the last bit in a byte CROM Hertz secondary storage access time use variable size instructions Logic Bus All of the above a modem interface laser printer. is used for cache memory none of the previous contains a microprocessor none of the previous none of the previous
A B B A B D D A A A A D B A D B D A D B D B C C B A
none of the previous Logic Bus e-mail none of the above none of the previous none of the previous involves using more than one use a virus protection program to display information or none of the previous. 109 sec a message pad an instruction that has been an instruction that has been the address of the next instruction to a magic marker Data Parity Checker Validation use find and replace Modem backup to a secure medium Multiplexing Magnetic Disk Shareware Shareware
D B D C C D D B B D D B C A D A B B B A B D D B C A
Random Primary Storage Schema and subschema Element, field, file Parity check Serial interface Video Drum recording current stock in a updated once a year Spreadsheet simplify file structures 8192 loss of data NetBEUI the operating system is easy to the hard drive uniform page source the system always requires a re-boot text. None of the above None of the bove allow encryption None of the above All of the above None of the above
C B A C C A D B A C D C C D A B D C A A A A C B D A
local identify the file type All of the above are parts of IS extensible hashing D: (b), (c), (d) general controls Control (a), (b), (c) Pull the power cord from the back of the Put your hand up and ask the teacher (b), (c), (d) corrective controls (b), (c), (d) resolution procedures loop testing (a) to (d) system walkthroughs Job control language. (a), (c), (d) Cross-training of operating personnel. data design Hub Ring All of the above To Store data in an organised manner Indexed
B D D A C C B C C C C C C C A D B D A B A C A D B B
Computer operations. A direct access file on a tape Data record can never be blocked Input output channel Protocol Are required with a microprocessor Time sharing computer Speeds up online printing Star Network Instant post-office A mainframe PC All of them Device interconnect None of the above None of the above EBCDIC None of the above Time Division Multiplexor None of the above Uses only one path None of the above Reduce competition between the None of the above Telephone Lines None of the above An online protocol
C C C A B D C A D C B C D B D A A C C D C C B C C B
None of the above Bus None of the above Hash Count None of the above Acoustic coupler None of the above All of them secondary storage access time None of the above alphanumeric form None of the above 32 bits None of the above 210 bytes None of the above alphanumeric form None of the above is the last bit in a byte None of the above Hertz None of the above VLSI None of the above voice recognition None of the above
B B C A A C B B B B A A B D A A A A B D D C B B B A
none of the previous None of the above 1 Gb input Printer Scanner Digital Signatures CD ROM Drive Keyboard Printer Back-up on a Cartridge Pickers CD-ROM None of the above none of the previous word processing software None of the above an operating system None of the above none of the previous none of the previous none of the above Fifth - generation computers. none of the previous Arjun none of the previous
C C B A B C B A B A B B A C B C B C A A B C A A C C
Image Scanning Technology none of the previous Thermal Printer transmitting it None of above An inked ribbon and print head Unix operating system 10-9 sec Cross footing tests communication process multitasking none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above input/output symbol IBM-PC none of the above dummy servers LAN front end
B C A C B D B D C D D D A B C B B B C B B B D A D D
front end centralized data processing many relational database system none of the above disk mirroring None of the above traps none of the above None of the above client-server None of the above. None of the above. all of the above None of the above. None of the above. None of the above. None of the above. None of the above. None of the above. None of the above. system LAN WAN and MAN Intranet None of the above.
C A B A D B D B B B B C C B D B C C C C B B A B A C
Web based Transaction Repeaters program number and alpha input, output, performance ratios mainframes write multitasking process output thermal printers CPU, memory, input, output interpreter procedures coder processor
A B D A C D A D D D C D B C B C
q_id BC1 BC1 0 BC1 1 BC1 2 BC1 3 BC1 4 BC1 5 BC1 6 BC1 7 BC1 8 BC1 9 BC2 BC2 0 BC2 1 BC2 2 BC2 3 BC2 4 BC2 5 BC2 6 BC2 7 BC2 8 BC2 9 BC3 BC3 0 BC3 1
q_desc ISDN stands for _______. The computer which can receive data from other computers on the network and print it is _______ The hardware and the software requirements together form the_____
op1 Integrated system dynamic networks. File server platform
ATM, Asynchronous transfer mode is a __________ technology. MAN and WAN __________ is designed telephone system Expansion of ISDN is ________ Expansion of WBT is ______________ _________ connects LANs. Collection of instruction is called a _____ ISDN Internal Services Digital Network Web based Training Bridges procedure
Combination of alphabetic and numeric data is called _____ data alpha numeric Computers can be classified based on ______,______and space occupied, price, no. of _______ users allowed _____________ is the Worlds largest computer network . _________ are used in large organizations for large scale jobs _______ is responsible for feeding data into the computer _______ is the capability of the o/s to run numerous applications simultaneously _______ involves conversion of raw data into some meaningful information _______ is responsible for obtaining the processed data from the computer _______ printers use light to produce the dots needed to form pages of characters Hardware components in a computer are _____,____,_____,______ _______ software are programs that are complex and can be developed or purchased _______ is a set of special instructions used to communicate effectively with the computer _______ converts a high level language into machine language _______is/are a popular front end tool _______ translates assembly language program into machine language instructions _______ software enables users to send and receive data to/from remote computers Ethernet mini computers input multiprocessing interpreter input impact printers operating system, bootstrap, kernel, shell operating system batch processor visual basic compiler application
BC3 2 BC3 3 BC3 4 BC3 5 BC3 6 BC3 7 BC3 8 BC3 9 BC4 BC4 0 BC4 1 BC4 2 BC4 3 BC4 4 BC4 5 BC4 6 BC4 7 BC4 8 BC4 9 BC5 BC5 0 BC5 1 BC5 2 BC5 3 BC5 4 BC5 5
A _____ is a running instance of an application Splitting of CPU's time for different tasks _______ prevents time slicing ______ computers are used in large organizations for large scale jobs which have large storage capacities _______ is responsible for all calculations and logical operations that have to be performed on the data
project multiprocessing mainframes control unit
______ printer use laser light band printer ______ software enhances the user to enter ,store, manipulate and print any text data management ______ software enables users to send and receive data to/from remote computers integrated software _______ is the temporary storage place for deleted files When LAN connected together ,it is called __________ . _____ is a collection of related fields _____ language consists of strings of binary numbers ______ symbol is used to represent processes like assigning a value to a variable or adding a number _______ is an example for micro computer _________capability supports concurrent users doing different tasks The ______ do not have processing power of their own and has only a screen, keyboard and the necessary hardware to A______is nothing but a PC with a network operating system _____system is responsible for handling the screen and user I/O processing The______ handles data processing and disk access in a Client/Server architecture Both the DBMS and the application resides on the same component in a ____system my computer MAN field assembly language terminator symbol PC-at multiprocessing "dumb terminals" wan host host PC Transfer control protocol/Internet protocol
TCP/IP stands for _________ . When all the processing is done by the mainframe itself, the type of processing is sometimes called as server processing DBMS models can be grouped under____ categories ______is the most advantageous database system A new user initiates a new process of execution at the background,while the user can continue his query process as The process of data being automatically written to a duplicate database is called______ Modem stands for __________ . four
file management system multiprocessing repairing Code/De-code
BC5 6 BC5 7 BC5 8 BC5 9
Multiple changes to the same record or a field are prevented by the DBMS through______ _________allows an application to multitask within itself LAN stands for __________ . New process of execution is referred to as______
fixes multiprocessing Linear area networks task Cells System modulation transfer protocol
BC6 Data is broken into small unit called __________ .
BC7 SMTP stands for __________ . The __________ protocol is a network protocol to be built for the BC8 World Wide Web . Transfer Protocol BC9 ATM stands for __________ .
Aggregate transfer mode
op2 Integrated Symbolic Digital networks. Printer server configuration LAN and WAN ATM Internal Services Design Network Web based Technology Routers batch alpha beta
op3 Integrated Services Digital network. Receiver package LAN and MAN Internet Integrated Services Digital Network Web based Transport Protocol command numerous alpha
op4 None of the above. None of the above. system LAN WAN and MAN Intranet None of the above. Web based Transaction Repeaters program number and alpha input, output, performance ratios None of the above. mainframes write multitasking process output thermal printers CPU, memory, input, output interpreter procedures coder all of the above processor communication
ans C B A B A C A B D A C B D A D D D C D B C B D C D
cost, performance their ratio size, performance, cost Internet microprocessors output multithreading compiler processor ARPANET PCs feed multiplexing converter
ram non-impact desktop drum printers printers control program, interpreter, monitor, program, assembler, compiler keyboard, bus application software protocols compiler power builder interpreter system windows 95 software's assembler SQL * plus assembler operating system
model multithreading super computers arithmetic and logic unit drum printer word processing communication software recycle bin WAN file machine language processed symbol hp vectra system multithreading dumb servers distributed computing system server server LAN Transfer communication protocol/Internet protocol host processing one
pilot project multiplexing micro computers central processing unit non impact printer electronic spreadsheet idea processor Microsoft exchange GAN record high level language connector symbol fazitsu vp200 series multiplexing dummy terminals windows NT back end back end
process multitasking none of the above none of the above none of the above none of the above none of the above none of the above None of the above. none of the above none of the above input/output symbol IBM-PC none of the above dummy servers LAN front end front end
D D A B C B B B B C B B B D A D D C A C B A D B D B
distributed computing centralized Transmission control protocol/Internet protocol None of the above. dumb processing two data processing many relational database system none of the above disk mirroring None of the above
hierarchical database system network database system multithreading redo logging multiplexing disk defragmentation
Modulation/Demodulation Module/De-module
locks multithreading Local area networks process Bits Software Mail transmission protocol Transmission protocol Asynchronous transfer mode
constraints multiplexing Local array of networks. thread Packets Simple Mail transfer protocol Hyper text Area transfer mode
traps none of the above None of the above client-server None of the above. None of the above. None of the above. None of the above.
B B B C C C C B
q_id OS 01 OS 127 OS 131 OS 132 OS 139 OS 193 OS 199 OS 215 OS 216 OS 217 OS 219 OS 233 OS 234 OS 236 OS 238 OS 271 OS 274 OS 275 OS 276 OS 277 OS 278 OS 280 OS 281 OS 282 OS 283
q_desc Which of the following computer software is designed to direct and assist the execution of application programs Formatting a disk results in all the data being...? Which bus carries information between processors and peripherals? Which bus controls the sequencing of read/write operations? Which computers use single chip processors? CPU performance may be measured in In processing cheques which of the following I/O techniques have banks traditionally used Disk fragmentation A compiler is An interpreter is “Zipping” a file means An assembly language program is translated to machine code by Which of the following is not part of the processor If the Cancel Error Property of the CommonDialog Box is set to true then which of the following statement is true: __________ control defaults to displaying the files in the current directory: A ____________ occurs any time a program writes more information into the temporary space it has allocated in the memory. Assessing a system requires certain common tools. Which of the following is NOT a tool used to assess a system? The ____________________ Web site has a utility that will tell you what software and operating system a Web server is running. When software vendors discover flaws in their software, they usually will write corrections to their code, known as: All ____________ have the option of blocking ports. Which of the following is NOT a characteristic of a firewall? Before shutting a service on an individual machine, which of the following would you always check? At a minimum, which of the following should be implemented under the protection phase? Attacks on your system may be prevented or trapped through the use of: Setting restrictions as to the number of unique passwords to use before a user can recycle them is called a password:
OS 284 OS 286 OS 287 OS 289 OS 291 OS 292 OS 293 OS 294 OS 295 OS 296 OS 299 OS 300 OS 309 OS 329 OS 355 OS 356 OS 357 OS 396 OS 397 OS 399 OS 495 OS 496 OS 497 OS 498 OS 502 OS 504
Which of the following is NOT a step to take in securing a workstation? To prevent a hacker from unauthorized access, what should you do with the administrator account? What should be done with old backup tapes and CDs? Which of the following is NOT an example of malware? One step you can take to reduce the risk of being infected by a virus is to: Which of the following is NOT a sign that a virus has infected your system? Which of the following is the safest way to protect yourself from e-mail viruses? A ____________ attack causes too much information to be placed into temporary memory space. ____________ gathers user information with the user‟s knowledge. Which of the following is the most common function of spyware? Which of the following is NOT a virus-scanning technique? Which of the following would NOT be a way to protect your system from spyware? For which of the following positions would it be advisable to conduct an extensive background check? Which of the following would you use to open an existing file? The ability to have multiple applications open at the same time is known as: Which of the following can be changed using the Options command? Which of the following leaves an application open but shrinks the window to a button on the Windows taskbar? Which of the following actions would move a floating toolbar to dock it in a different place? To display a missing or needed toolbar, click the: Which of the following is NOT a true statement regarding password protection? The Linux operating systems is an example of: The Windows operating systems is: Application service providers offer: A(n) _________ offers on-demand software on an as-needed basis to its clients over the web. _________ are systems used to interact with customers and run a business in real time. The most common cause(s) of disaster is (are):
OS 505 OS239
A _______ backup site is backup facility consisting of an empty warehouse with all necessary connections for power and communication, but nothing else. To destroy an object and free the memory space occupied by it, the keyword used is:
op1 Application Software Deleted from the disk Data bus Data bus Personal computers BPS OCR is caused by wear a fast interpreter faster than a compiler encrypting it an assembler the ALU A runtime error can result if the user clicks File List Box memory overflow Netcop www.nettools.com code correct. firewalls It can consist of hardware, software, or both. That any open applications be exited Antivirus software an intrusion-detection system. cycle.
op2 Utility Programs Copied from the disk Auto bus Address bus Parallel computers MIPS MICR caused by overuse slower than an interpreter translates and executes programs decrypting it a compiler the CU A compile time error occurs Dir List Box systems overload NetBrute www.WhoIs.com patches. switches
op3 Operating system Saved to the disk Address bus Control bus Super computers MHz barcode scanning is due to bad disk blocks converts a program to assembly code converts a program to machine code compressing it an interpreter the power cord The program executes without any error Drive List Box RAM overflow Netcraft www.netcraft.com updates.
op4 Database management system None of above None of above None of above None of above VLSI voice recognition none of the previous none of the previous none of the previous transmitting it a linker None of the above You need to carry out conditional compilation Combo Box buffer overflow NetBIOS www.netstat.com upgrades. scanners It is a barrier between your network and the That you also shut down associated Router a proxy filtering system. history.
hubs One of its techniques is It hides your network. packet filtering. Dependencies on That you are not on the Internet other services Intrusion-detection software Firewall a network prevention antivirus software. system. renewal. age.
Make sure all update and security patches are Delete it from the system and use the guest Tapes can be used over and over, and CDs should
Install and keep current antivirus and antiDelete it and change the built-in guest account to Tapes and CDs can be thrown away in the
Limit user‟s ability to configure the Disable it and create a nondescript user Tapes should be melted and CDs IP spoofing download files from reliable Web sites.
Block all incoming traffic on a network. Create another administrator account Give them to a recycle shop.
Trojan horse Virus place a router between add spyware to your your ISP and your system. system. System acts abnormal Files are missing Do not propagate hoax Update antivirus software. viruses. virus A virus Obtain system IP addresses E-mail and attachment scanning Use your browser‟s security settings Administrative assistant to the president The Standard toolbar multitasking. the default file location of new files shrinking Click on any border and drag. right mouse button anywhere on the Word All documents are automatically saved public domain software. public domain software. on-demand computing. best-cost provider Operational systems power outages. Trojan horse A Trojan horse Obtain cookies
Spyware hone your programming skills. Problems with your Printing problems wireless mouse Turn off the auto-launch Never open an e-mail in your e-mail client. attachment unless spyware Spyware Check for open ports buffer overflow A buffer overflow Obtain usernames and passwords
Download scanning File scanning Do not open Avoid “skins” and attachments in unknown “toolbars” download Cook The Formatting toolbar tiling. whether the worksheet prints in landscape or multitasking Click on any corner and drag. right mouse button on any visible toolbar, and The password is casesensitive. nonprotective open source software. nonprotective open source software. on-demand software. software provider Informational systems hardware failures.
Backup file scanning Use encryption software Network Junior accountant administrator The Open command on The Save command the Edit menu on the File menu cascading. the number of windows you have open minimizing Click on the title bar and drag. left mouse button on any visible toolbar, and click Once a document is protected by a protective open source software. protective open source software. utility computing. Web service provider Structured query systems floods. minimizing. the margins on the printed DOCUMENT cascading You cannot move a floating toolbar. left mouse button anywhere on the Word Passwords can be up to only seven proprietary software proprietary software. utility software. application service provider Office automation All of the above.
hot Delete
cold Kill
empty Nothing
dormant New
ans C A A C A B B B B B C A C A A D D C B A B B C A D
D C C C C D D D C D D D D A A A C C B A C D B D A D
B C
q_id CA1 CA2 CA3 CA4 CA5 CA6 CA7 CA8 CA9 CA10 CA11 CA12 CA13 CA14 CA15 CA16 CA17 CA18 CA19 CA20 CA21 CA22 CA23 CA24 CA25
q_desc Using generalized audit software packages can add a lot of value _______ _______ is used for CAAT as database Generalized audit software perform auditors to undertake any past records and not concurrent auditing Generalized audit software is a file whose capabilities for verifying processing is logic CAAT's are computer program and data that auditor uses as part of the audit procedures to process data if CAAT do not contains package programs, purpose written program, utility programs or system Embedded audit routines are sometimes built into an entity's computer system to provide data for later user SCARF involves embedding audit software modules within an application system to provide continuous Concurrent use auditors as the member of the system Regular cross system verification may minimize frauds Computer security is frequently associated with confidentiality, integrity and authentication Data reserve engineering process metadata to document system and abstract business rules and The first step for developing CAAT is_________ Using the open database connectivity feature in ACL is ______________ Computer Assisted Audited Technique involves the use of computers through "Black Box Approach" White Box Approach necessary involves expert knowledge on the part of Auditor The transition from manual system to CIS environment bring dramatic changes including ________________
op1 to an audit department's Oracle True True True yes true true true true true true to determine the audit objective can bring the data directly True
True change in the method of recording accounting documents driven Auditing with computer necessarily supports the approach hardware and software CAAT involves an Auditors' appreciation of __________ configuration Widespread end use computing result in unlimited errors creeping into system going to accept handling, true For computerized auditing usage of sophisticated audit software would be a necessity true Important knowledge needed to begin planning the use the source of data of CAAT is _________ available to the audit The move towards paperless EDI would eliminate much of the traditional audit trail, radically changing the nature true Computer operation controls are designed to provide ________________ the of by all concerned Systems development control, apart from others, include authorization, approval, testing, implementation true
CA26 CA27 CA28 CA29 CA30 CA31 CA32 CA33 CA34 CA35 CA36 CA37 CA38 CA39 CA40 CA41 CA42 CA43 CA44 CA45 CA46 CA47 CA48 CA49 CA50 CA51
A system could be _________
natural/man-made
A system exhibits 'entropy' true Super computer are the largest and fastest and is very suitable for commercial application including audit work true Assembler language uses Mnemonic symbols Operating systems are devised to optimize the machine capabilities, the function include_______________ General purpose software provides a framework for highly complex scientific operation In batch processing, transactions are processed one after another The use of computer assisted audit techniques is not gaining popularity not only ________________ On-line processing refers to grouping of transaction and processing the same in one go from start to finish Real time refers to the technique of updating files with transaction data immediately after the occurrence of the In OLRT the CPU should process the capability of program interruption Time sharing system allow access to a CPU from remote terminals DSS is defined as a system that provides tools to managers to assist them in solving structured problems DSS has the following components _________________ Master files contains current records for identification and summarizing Transaction files contain relatively permanent records take product profile, customer profile, employee profile Master file configuration includes ____________ ______ is a file management software package that lets users and programmers organize data into files and CAATS provide added value to the clients because _______________ File volatility refers to the number of addition and deletions to the file in a given period of time File activity is the proportion of transaction file records that are actually used and accessed in a given File interrogation refers to the _____ of information from a file One -to-one relationship means a single entity to a single entity in a monogamous structure true scheduled jobs true true with audit departments true true true true true databases true true reference files filex to have a complete picture of a system true true back-ups true
RDBMS is structured to a series of 2 dimensional tables true seriously affected SADB stands for ____________ database Controls are present over many aspects of the computer system and its surrounding social true
CA52 CA53 CA54 CA55 CA56 CA57 CA58 CA59 CA60 CA61 CA62 CA63 CA64 CA65 CA66 CA67 CA68 CA69 CA70 CA71 CA72 CA73 CA74 CA75 CA76 CA77
In framed checking the data entry is checked against an expected picture or format true Errors are correlated_________ Field check is exclusive to a field _________ law basically states that there is a specific probability of the first digit of a no. being 1,2,3 etc Check digit is a group of nos. added to a code for determining the accuracy of other digits in the code Hierarchical code means _________ The validation checks applied to a field depend on the field's logical inter relationships with other fields in the The contents of a field could determine _______ sign for a ______ field Batch is the process of ______ together _____ that bear some type of relationship to one another Hash totals means meaningless totals With OLRT where interactive data entry is available, the master file associated with a transaction may be Controls are required for authorization to ensure data integrity and detect possible breaches in security Data from client application are not stored in the organization's database through auditables events and All input records in a batch are normally of different types IDEA stands for _________________________________ A transaction file is sorted prior to the update of master file A sequence check on the transaction or master files by an update program is not required Whenever monetary transactions are processed against master files, the update program should maintain a Internal tables are stored tables from which certain values are extracted for further processing and storing For small to medium sized systems, individual modules are coded and individually tested and then assembled to In systems testing, test involves_________________ Recording transactions in a controlled manner may amount to loss of stored data at the year end true Benfish true consecutive nos. or alphabets to entities TRUE valid, numeric grouping, transaction true true true true true incremental design and enlarge activity true true true true e-brain bottom up tests yes
Audit software is used by the auditor to _________ read data on client's file Core image comparison is a software used by the auditor to compare _______ version of a program with a executables, master Database analyzer is a software which provides detailed information concerning the operation of the database true system analysis SAS stands for ______________ software
CA78 CA79 CA80 CA81 CA82 CA83 CA84 CA85 CA86 CA87 CA88 CA89 CA90 CA91 CA92 CA93 CA94 CA95 CA96 CA97 CA98 CA99 CA100 CA101 CA102 CA103
Embedded code is a software used by the auditor to examine backup data Embedded code performs wide variety of audit task Core image comparison is particularly useful where only executable versions are distributed Log analysis is a software used by auditor to detect virus On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a specific Mapping software is used by the auditor to list unused program instructions Mapping software has very objectives Modeling is a variety of software which ________________ On line testing can be targeted for specific functions carried out by programs Program code analysis involves _____________ __________ is a software of CAAT Snapshot is software which takes a picture of a file or data or a transaction passing though the system Base case system evaluation includes____________ While base testing forces on finding if there are any defective execution policies in a program Black box testing seeks to determine whether application output is what it is supposed to be In integrated test facility approach the auditor should ensure that the impact of test transaction is Black box testing is _______ based and white box testing is _______ based
true yes true true manipulates, real true yes can be very powerful analytical tool yes provides detailed information of machine IDEA true fictitious data applied against the client true true true specification, program identifying erroneous code
Source code review means__________ In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine how the true All material application oriented events that occur within the boundary subsystem should be recorded in the true In examination of audit trail the following data associated with an event may be ___________start and finish time JCL means_________________ Audit should be periodically analyzed to detect any control weakness of the system In an accounting audit trail, intrusion detection system might monitor the amount of processor time consumed A sample size calculator program assists auditors in determining RAND() function Generalized audit software consists ___________
job control language yes true true package computer p[program for
CA104 CA105 CA106 CA107 CA108 CA109 CA110 CA111 CA112 CA113 CA114
Specializes audit program may be___________ Generalised audit software could be used by the following in consistencies or significant fluctuations Generalized audit software function include____________ In the file reorganization merging capabilities are needed in data from separate file is to be combined on Auditors cannot use generalised audit software to extract the data needed for audit purpose Auditors can combine functional capabilities of generalized audit software to accomplish the task of Which of the following is not the feature of GAPs Which is the example of CAATs In audit procedures, test data is Which of the following is not the use of CAATs Which of the following are called explicitly by another procedure?
prepared by the auditor true file access/organizations true true examining the quality of system process Wide access to various data base ACL A sample of transactions Tests of details of transactions Macros
op2 to add customers ACL False False False no false false false false false
op3 all the above JCL
op4 none of these none the above
ans A A A B A B A A A A A A
false review and evaluate the to obtain a record types of data layout can bring the data indirectly all the above False False use of accounting codes
extract data from file none of the above
A A B A
absence of audit trails
all the above none of the above all the above
D B D A A
risk driven approach unique approach processing options, file data structure checks and controls false false source of data for material planing false providing access to computer to all false
all the above
none of these
A A
use of any programs
none of the above
D A
open/closed false false false manage hardware & software resources false false with production departments false false false false false planning language false false table files
conceptual/physical
all of them
D A A A
enable multiple user resource sharing
all the above
D B B
all the above
none of these
A A A A A B
model base
all the above
D B B
report files
none of the above filepet none of the above
D C A A B
file-o-man file manager decentralized picture of a system all the above false false retrieval false false deletion
addition
B A A B A
subject area database software and database safety and database false
false immediately false Benford false blocks of nos. to the primary attribute of the false invalid, alphabetic regrouping, events false false false false false interactive data extraction and false false false false bouncing ball top-down tests no provide information to the audit deleted, hard false system advanced software big-bang hybrid tests stub all the above none of the above none of the above all the above all the above Benjamin none of the above on quarterly basis none of the above
B B A B B random placement of component none of the above D A A A A A A B B interactive data innumerable analysis none of the above B A A B A C D B re-perform procedures carried out by the none of these all the above all the above D A A all the above none of the above A
false no false false create, false false no can enable the auditor to execute provisions none of these all the above
B A A B A A A can provide the auditors with useful all of the above D A C B A analyzing the picture of a file or data all the above A A A A none of the above all the above identifying non-standard code all the above A D A A resource requested all the above all the above none of the above D A A A B master list of transactions administered questionnaire A
no identifies program code examination of source which may be there for code of a program none of the above ACL false comparison of source version of a false false false file, hardware identifying ineffective code false false authentication of information support job connectivity language no false false mathematical concept ALC ACLL
prepared by the entity false statistical/arithmetic operation false false carrying analytical review Can extract and analyse data IDEA A utility software programme Analytical review procedures Action Procedures
prepared by an outside programmer engaged all the above
D A
stratification and frequency analysis
all the above
D B B
examining the quality of data all the above Can define the audit Can aid in simple selection objectives High End CAATs A special purpose written program Compliance tests of general EDP controls Event Procedures All of the above None of the above All of the above General Procedures
D D D A D D
Field0 CA107 CA108 CA109 CA11 CA110 CA111 CA112 CA113 CA114 CA115 CA116 CA117 CA118 CA119 CA12 CA120 CA121 CA122 CA123 CA124 CA125 CA126 CA127 CA128 CA129
Field1 In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently eliminated from the computer files In olrt the cpu should posses the capability of program interrupt interrupts In system testing,test involves _______ All input records in a batch are normally of different types In the planning phase gathering information and risk assessment will be done Information collection encompasses logging the selected auditable events Input controls are designed to ensure processing safety Integrated test facility is a facility of ________ Internal tables are stored tables from which certain values are extracted for further processing and storing Log analysers are _______ required by the auditor Log analyzers is ________ Log analyzer is a software used by auditor to detect virus Mapping software is used by the auditor to list unused program instruction has veryspecific objectives Master file configuration includes ______ All material application -oriented events that occur within the boundary sub-system should be recorded in the accounting audit trail Master file contains current records for identification and summarising Metadata approach is _______ Modeling is a variety of software which _________ One-to-one relationship means a single entity to a single entity in a monogenus structure On-line processing refers to grouping of transaction processing the same in one go from start to finish On-line testing can be targeted for specific function carried out by programs Operating systems are devised to optimise the machine capabilities-the function include: Parallel processing is a concept associated with _______ and ________ Parallelsimulation is there to authenticate the _______ system Prevention,detection,investigation and reaction are the ______ of an auditor
CA13 CA130 CA131 CA132 CA133 CA134 CA135 CA136 CA137 CA138 CA139 CA14 CA140 CA141 CA142 CA143 CA144 CA145 CA146 CA147 CA148 CA149 CA15 CA150 CA151 CA152
Any audit enable software may include _______ Procedure driven approach of auditing is __________ Processing controls can be grouped into general controls Program code analysis involves ______ Programme code analysis is being implemented by the _________ Public audit trail is an important control in system that use __________ for authentication purposes Rdbms is a structured into a series of 2-dimensional table Real time refers to the technique of updating files with transaction data immediately after the occurrence of the event to which it vrelates Reasonableness checking is Recording transactions in a controlled manner may amount to loss of stored data Regular cross-system validation may minimise frauds Application controls can be categorized into _______ types Risk assessment is a phase of an audit Risk assessment is the phase of ______ Scarf involves embedding audit software modules within an application system to provide continuous monitoring Security audit can be done through oracle database Security can be broken into ________ areas Sign test is a type of field checks on processed data Snapshot is a software which takes a "picture" of a file or data or a transaction processing through the system Snapshot is a technique of __________ which is a part of audit software Source code review means _______ Specialised audit programs may be _______ Application controls grouped into Super computer are the largest and fastest and is very suitablefor commercial applicationincluding audit work System development control, apart from others,include authorisation,approval,testing,implementation and documentation of new systems System privilege can be checked by auditor
CA153 CA154 CA155 CA156 CA157 CA158 CA159 CA16 CA160 CA161 CA162 CA163 CA164 CA165 CA166 CA167 CA168 CA169 CA17 CA170 CA171 CA172 CA173 CA174 CA175 CA176
System security audit is an on site inspection ,which identifies potential securityvulnerabilities within an organization Test data can be defined as __________ Test data pack is ________ The contents of a field could determine _______ sign for ______ field The move towards paperless edi would eliminate much of the traditional audit trail,radically changing the nature of audit evidence The stream of data that are generated by these tools is called as the __________ The transition from manual system to cis environment bring dramatic changes including Ar=ir*cr*dr The validation checks applied to a field depend on the fields logical interrelationships with other fields in the record There are ______ types of approaches of test data techniques There are ______ types of control totals There are _______ types of audits of the systems development process There are ________ types of checks that can run when data is input through a terminal There are _____types of checks frequently used in validating the data There are 13 system development phases while audit of the system development processes There are four type of audit risks Top down tests,bottom up tests and hybrid tests are under the _______ category Tracing helps to analyse the change caused by viruses Assembler language uses mnemonic symbols Transaction file contain relatively permanent records take product profile,customer profile,employee profile etc. Transactions are not lost ,added,duplicated or improperly changed is called as control over input Validation checks is applied to a field depend on the field's logical interrelationships with other fields in the records Whenever monetary transaction are processed against master files,the update program should maintain a correlation account to record such transaction that White box testing focuses on finding if there are any defective execution paths in a program White box approach is program based With olrt where interactive data entry is available ,the master file associated with a transaction may be searched for confirming data
CA18 CA19 CA2 CA20 CA21 CA22 CA23 CA24 CA25 CA26 CA27 CA28 CA29 CA3 CA30 CA31 CA32 CA33 CA34 CA35 CA36 CA37 CA38 CA39 CA4 CA40
Audit around the computer is called Audit risk cannot be viewed as a joint probability of inherent risk,control risk and detection risk White box approach necessarily involves expert knowledge on the part of auditor Audit software is a type of audit technique Audit software is used by the auditor to ________ Audit software can be categorized under ______ heads Audit software can be divided into ________ categories Audit through can be done using simulation Audit trail should be periodically analysed to detect any control weaknesses of the system Audit with networking and database help is called _______ Auditing is a form of attestation Auditor can also check default roles in oracle database software Auditor can combine functional capabilities of generalized audit software to accomplish the task of ________ _________ Is the file management software package that lets users and programmers organise data into files and then process those files Auditors can issue the sql commands to audit Auditors can use profiles in their white-box approach of auditing Auditors cannot use generalised audit software to extract the data needed for audit purposes Auditors has to take care of the fact to link between multiple databases with one application Base case system evaluation includes _______ Black box approach is specification based Black box testing is ______ based and white box testing is _____ based Black box testing seeks to determine whether application output is what it is supposed to be Caat do not contain package programs, purpose written programmes,utility program or system management program Caat's are computer program and data the auditor uses as part of audit procedures to process data of audit significance contained in an entity's A sample size calculator program assists auditors in determining rand() function Caat's are computer programs and data the auditor uses as a part of the audit procedures
CA41 CA42 CA43 CA44 CA45 CA46 CA47 CA48 CA49 CA5 CA50 CA51 CA52 CA53 CA54 CA55 CA56 CA57 CA58 CA59 CA6 CA60 CA61 CA62 CA63 CA64
Case-is ________ Check digit is a group of numbers added to a code for determining the accuracy of other digits with code Check digit is a tool under field checks Check digit is a type of ___________ Codd's rule are being implemented on database Computer assisted audit technique involves the use of computer through "black box " approach Computer operation controls are designed to provide ________ Computer security is frequently associated with confidentiality ,integrity and authentication Concurrent audit include auditors as members of s.d team A sequence check on the transaction or master file by an update program is not required Concurrent audit is taking care of the ______ data that is being transacted Confidentiality,integrity and availability are the major security attributes to the auditor Control total is under batch checks Controls are present over many aspects of the computer system and its surrounding social environments Controls are required for authorisation,to ensure data integration and to detect possible breachesin security Conventional data entry giving way to scanner,digitised image processors etc. For auditing in cis environment Core image comparison is a ________ used by the auditor Core image comparison is a type of audit technique Core image comparison is particularly useful where only executable versions are distributed Critical review of the system of book-keeping,accountingand internal organizational controls. A system could be ________ Cryptographic techniques are the part of security audit Data communication and networking would introduce new audit risk Data from client application are not stored in the organisations database through auditable events and functions Data integrity can be imposed on the database through dbms Data reverse engineering process metadata to document system and abstract business rules and relationships
CA65 CA66 CA67 CA68 CA69 CA7 CA70 CA71 CA72 CA73 CA74 CA75 CA76 CA77 CA78 CA79 CA8 CA80 CA81 CA82 CA83 CA84 CA85 CA86 CA87 CA88
Data security in audit techniques can be done through three ways Database analyser is a software which provides detailed information concerning the operation of the database Databases are a key element in most business-related information systems Ddl,dml,dcl-statements can be exercised in rdbms Deterrenece meance _______ A system ehibit entropy Dss has the following components Dss is defined as a system that provides tools to managers to assist them in solving structural problem Embedded audit routines are sometimes built into an entity's computer system to provide data for later use by the auditor Embedded code is a software used by the auditor to examine backup Embedded code performs a wide variety of audit tasks Errors are corrected :_______ Event detection is an audit procedure Event detection is the audit procedures Examine the quality of data is not the task of generalized audit software Examine the quality of system processes is _________ A system means -totality Field check is exclusive to a field File access is a function of _________ software File access will be the functional capabilities of generalized audit software File activity is the proportion of transaction file records that are actually used or accssed in a given processing run File integration refers to the ________ of information from a file File volatility refers to the number of additions and deletions to the file in a given period of time For computerised auditing,usage of sophisticated audit software would be a necessity For small to medium sized systems,individual modules are coded and individually tested and then assembled to be tested as a whole.the testing strategy is referred General purpose software provides a framework for highly complex scientific operations
CA89 CA9 CA90 CA91 CA92 CA93 CA94 CA95 CA96 CA97 CA98
Generalised audit software could be used by the auditor for identifying inconsistencies or significant fluctuations A transaction file is sorted prior to the update of master file Generalised audit software function include _______ Generalised audit software never allow several files to be read simultaneously _______ Generalized audit software consists _______ Generalized audit software has infile capabilities for verifying processing logic Generalized audit software has only limited capabilities for verifying processing logic Generalized audit software permits auditors to undertake only expost auditing and not concurrent auditing Generalized audit software provides the full set of arithmetic operators Hash total is a type of _________ Hash totals falls under control totals
Field2 TRUE TRUE BOTTOM UP TESTS TRUE TRUE TRUE TRUE PARALLEL PROCESSING TRUE HARDWARE AUDIT TOOL TRUE TRUE REFERENCE FILE TRUE TRUE APPROACH TO THE SYSTEM DATA ONLY CAN BE VERY POWERFUL ANALYTICAL TOOL TRUE TRUE TRUE SCHEDULE JOBS OS AND RAM REEL SYSTEM FUNCTION FALSE FALSE
Field3
Field4
TOP DOWN TESTS FALSE FALSE FALSE FALSE SOURCE CODE REVIEW FALSE SOFTWARE SOFTWARE FALSE FALSE TABLE FILES FALSE FALSE APPROACH TO THE APPLICATION DATA CAN ENABLE THE AUDITOR TO EXAMINE FALSE FALSE FALSE MANAGE HARDWARE AND SOFTWARE OS AND ROM REAL SYSTEM ROLE
HYBRID TESTS
TEST DATA APPROACH
NETWORK MACHINE ACTIVITY
REPORT FILE
IT IS DATA ABOUT SOME OTHER DATA CAN PROVIDE THE AUDITOR WITH USEFUL
ENABLE MULTI USER RESOURCE SHARING OS AND MICROPROCESSOR BOTH (A) AND (B) BOTH (A) AND (B)
COMPLETENESS TRADITIONAL APPROACH
ACCURACY LATEST APPROACH
AVAILABILITY BOTH (A) AND (B)
TRUE FALSE PROVIDES DETAILED IDENTIFIES PROGRAM EXAMINATION OF INFORMATION ON MACHINE CODES WHICH MAY BE SOURCE CODE OF A DATABASE COMPANY ADMINISTRATOR AUDITOR PUBLIC KEY TRUE TRUE TYPE OF RECORD CHECK TRUE TRUE 4 TRUE AUDIT TRUE TRUE RISK AVOIDANCE TRUE TRUE AUDIT ROUTINE IDENTIFYING ENORMOUS CODE PRIVATE KEY FALSE FALSE TYPE OF RANGE CHECKS FALSE FALSE 2 FALSE AUDIT THROUGH COMPUTERS FALSE FALSE DETERRENCE FALSE FALSE AUDITING IDENTIFYING NONSTANDARD CODE PREPARED BY AN OUTSIDE PROGRAMMER FOUR GROUPS PREVENTION 5 DIGITAL SIGNATURE
TYPE OF SIGN TEST
ALL THE ABOVE
AUDIT TECHNIQUE IDENTIFYING INEFFECTIVE CODE PREPARED BY THE PREPARED BY THE AUDITOR ENTITY TWO GROUPS TRUE TRUE TRUE THREE GROUPS FALSE FALSE FALSE
TRUE FALSE SAMPLE OF DATA USED FOR SAMPLE OF DATA THE PURPOSE OF TESTING USED FOR THE STREAM OF DATA STREAM OF DATA THAT ARE INVALID TRUE BOTH C & D FALSE
SAMPLE OF DATA USED FOR TESTING THE BOTH (A) AND (B) VALID
TEST DATA TEST DATA APPROACH TEST DATA PACK CHANGE IN THE METHOD OF USE OF ACCOUNTING ABSENCE OF AUDIT RECORDING ACCOUNTING CODES TRAIL TRUE TRUE ONE 2 THREE FIVE 4 TRUE TRUE INTER TABLE TEST TRUE TRUE TRUE TRUE TRUE TRUE TRUE TRUE TRUE FALSE FALSE TWO 4 FOUR THREE 2 FALSE FALSE SYSTEM TEST FALSE FALSE FALSE FALSE FALSE FALSE FALSE FALSE FALSE TABLE LEVEL TESTS THREE 3 TWO FOUR 5
BLACK BOX APPROACH TRUE TRUE TRUE READ DATA ON CLIENT'S FILES 2 TWO TRUE TRUE WHITE BOX APPROACH TRUE
WHITE BOX APPROACH FALSE FALSE
BOTH (A) AND (B)
FALSE PROVIDE REPERFORM INFORMATION TO THE PROCEDURES CARRIED 4 FOUR FALSE FALSE BLACK BOX APPROACH FALSE 5 THREE
ALL THE ABOVE
TRUE FALSE EXAMINE THE THE QUALITY CARRYING ANALYSING EXAMINING THE QUALITY OF SYSTEM PROCESS REVIEW OF DATA FILE TRUE TRUE TRUE TRUE FICTITIOUS DATA APPLIED AGAINST THE CLIENT TRUE BOTH C & D TRUE TRUE TRUE TRUE TRUE FILE-O-MAN FALSE FALSE FALSE FALSE COMPARISON OF SOURCE VERSION OF FALSE HARDWARE FALSE FALSE FALSE FALSE FALSE SPECIFICATION THE FILE MANAGER
ANALYSING THE PICTURE OF A FILE OR
COMPUTER AIDED SOFTWARE EDITOR TRUE TRUE FIELD CHECKS TRUE
COMPUTER AIDED SOFTWARE FALSE FALSE RECORD CHECKS FALSE
COMPUTER AIDED SOFTWARE
BOTH (A) AND (B)
TRUE FALSE THE USE OF COMPUTERS BY PROVIDING ACCESS ALL CONCERNED TO COMPUTER TO ALL USE OF ANY PROGRAMS TRUE TRUE TRUE PREVIOUS DATA TRUE TRUE TRUE TRUE TRUE TYPE OF NETWORK TRUE TRUE TRUE NATURAL/MAN MADE TRUE TRUE TRUE TRUE TRUE FALSE FALSE FALSE CURRENT DATA FALSE FALSE FALSE FALSE FALSE TYPE OF SOFTWARE FALSE FALSE FALSE OPEN/CLOSED FALSE FALSE FALSE FALSE FALSE CONCEPTUAL/PHYSICAL TYPE OF HARDWARE ALL THE ABOVE NONE OF THESE
TRUE TRUE TRUE TRUE THREAT TRUE DATABASE TRUE TRUE TRUE TRUE AT THE YEAR END TRUE TRUE TRUE AUDIT TASK OF THE AUDITOR TRUE TRUE GENERALIZED AUDIT TRUE TRUE BACKUPS TRUE TRUE C-BRAIN TRUE
FALSE FALSE FALSE FALSE BROADCASTING FALSE PLANNING LANGUAGE MODEL BASE FALSE FALSE FALSE FALSE IMMEDIATELY FALSE FALSE FALSE AUDIT TASK OF THE AUDITORS USING FALSE FALSE SPECIALIZED AUDIT FALSE FALSE RETRIEVAL FALSE FALSE BIG BANG FALSE STUB DELETION UTILITY PROGRAM ON QUARTERLY BASIS NETWORK
AUDIT TASK OF THE GENERALIZED AUDIT
TRUE TRUE FILE ACCESS/ORGANIZATION TRUE PACKAGE COMPUTER PROGRAM FOR TRUE TRUE TRUE TRUE CONTROL TOTAL TRUE
FALSE FALSE STATISTICAL/ARITHME STRATIFICATION AND TICAL OPERATION FREQUENCY ANALYSES FALSE MATHEMATICAL CONCEPTS FALSE FALSE FALSE FALSE TRANSACTION TYPE FALSE BATCH SERIAL NUMBER
A MASTER LIST TRANSACTION
Field5
Field6 A A
ALL THE ABOVE
D B A A B
NONE OF THESE
C A
NONE OF THESE SOFTWARE USED TO READ AND ANALYZE RECORDS OF MACHINE
B D B A
NONE OF THE ABOVE
D A B
ALL THE ABOVE ALL THE ABOVE
C D A B A
ALL THE ABOVE NONE OF THE ABOVE DATABASE SYSTEM NONE OF THESE
D C B B
ALL THE ABOVE NONE OF THE ABOVE
D A B
NONE OF THE ABOVE AUDITOR USING COMPUTERS NONE OF THESE
C D C A A
NONE OF THESE
A B A
3
D A
NONE OF THE ABOVE
B A A
ALL THE ABOVE
D A A
NONE OF THESE ALL THE ABOVE ALL THE ABOVE ALL THE ABOVE
A D D B A A A
A ALL THE ABOVE NONE OF THESE NUMERIC C B B A NONE OF THE ABOVE ALL THE ABOVE C D A A FOUR 5 ONE ONE 3 B B A C A A B NONE OF THESE B A A B A A B A B A
NONE OF THESE
A B A A
ALL THE ABOVE 3 NONE OF THESE
D D C A A
NONE OF THE ABOVE
A A A
ALL THE ABOVE FILEPET
D C A A B A
ALL THE ABOVE
A A
PROGRAM
A A B A B A
NONE OF THESE
C B A
NONE OF THESE
A B B
NONE OF THE ABOVE
D A A A
NONE OF THESE
B A A A A A
NONE OF THESE
B A A A
ALL THE ABOVE
D A A B A A
A A A A NONE OF THESE A A ALL THE ABOVE D B A B A NONE OF THE ABOVE B A A B ALL THE ABOVE C A A NONE OF THESE A A B ADDITION B A A BOUNCING BALL B B
A A ALL THE ABOVE D B ADMINISTERED QUESTIONNAIRE A A A A A SEQUENCE CHECK A A
q_id DA1 DA2 DA3 DA4 DA5 DA6 DA7 DA8 DA9 DA10 DA11 DA12 DA13 DA14 DA15 DA16 DA17 DA18
q_desc Sequence Check is a --------------- level control check. Analyse data over two or more periods is called ----------------------- analysis We use Hash Total to identify ------------ within a series where there is a definite relation between items Analyse fields by arranging them into rows and columns is called --------------------- function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in the table. To import data from Access to Excel ,it is not possible to link between Access and Excel sheet The GAP detection options can be used to test for completeness of data. Exception testing can be used to identify ----------------- items Data validity test represents Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that the data has been provided is for the correct audit period In Range Check , the data may not be in proper sequence but should be within a predetermined range In ---------------- Check data entry follow a particular sequence and also a predetermined range. 'Set mapping' Check control that follows a text-type validation, we use ----------------- application for data analysis. Excel can import data from other databases for the data analysis. A System Auditor can uses CAAT tools to analyze data In the case of the ---------- control, it is ensured that the data in combination with other fields are reasonable as per standard set by an organisation. --------------- function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in a table Most of the tools use in Data Analysis depends on
op1 Field Horizontal Duplicate Value Cross Tabulate RAND() TRUE TRUE Unusual exception testing True True Limit Excel True False Valid Signs HLOOKUP DDE Record
op2 Both A or B Gaps Merge
op3
op4 None of the above None of the Above All of the above None of the above None of the above A A C A B A A
ans
Vertical Combined Value Filter VLOOKUP() FALSE FALSE Strange comparison of data False False Sequence Access False True Transaction type VLOOKUP OLE
HLOOKUP()
A or B duplicates testing
None of the above All of the above
C D A A
Range Both
Both B & C None of the above
B B A B
Limit Check A or B ODBC
Reasonableness None of the above All of the above
D B C
q_id WO1 WO2 WO3 WO4 WO5
q_desc _______ is a word processing that is a member of the office 2000 family The feature that enables user to type anywhere in a document without pressing or tab The______ feature allows the user to copy and paste upto 12 items at the same time in an application ______ and _____ key combination will extend the selection by one character on the left and right _____and_____ are improved layout in Word 2000
op1 Word 2000 click-n-type office clipboard shift+end and shift+home web layout, printlayout
WO6 WO7 WO8 WO9 WO10 WO11 WO12 WO13 WO14 WO15 WO16
The easiest way to create a document in word is In Office2000 environment the tool that makes work easier for us is_____ A short description of a tool bar button called the ______ is displayed when the mouse pointer is allowed to stay for a second on the button The _____ helps us to keep track of the margin of the page The keys that are used to navigate between headers and footers are Pick out the element from the following that dose not form the type of tabs for the Word 2000 _______are blueprints or patterns for documents of a certain type The______ is used for quickly setting paragraph indention using the mouse Word art is text with AutoShapes in word can be created by accessing the _____ By default, a document consists of_____ section
wizard office assistant Screen Tip tab stop up arrow keys only left template increase indent special effect drawing toolbar 1 page setup from the file border ctrl+a ctrl+a CTRL+SHIFT+F ctrl+shift+f
WO17 WO18 WO19 WO20 WO21 WO22 WO23 WO24 WO25 WO26
The dialog box that is used to determine the documents margins is ________ is a box surrounding a page on all slides or a line that sets off a paragraph on one or more slides The key that is used to perform a task to select all t he text in the documents is The key that is used to indent a paragraph is The key that is used to change the font from the current positioned in a document is The key that is used to change the style of the document that is from that normal to heading1 or heading1 to other document styles.
______ is the default view in Word used for typing Editing and Formatting the Text NORMAL The short-cut-key that is used to indent a paragraph spacing in the documents is The short-cut-key that is used to paste the selected text The short-cut-key that is used for paragraph spacing(1.5) ctrl+m ctrl+v or ins ctrl+2
WO27 WO28 WO29 WO30 WO31 WO32 WO33 WO34 WO35 WO36 WO37 WO38 WO39 WO40 WO41 WO42 WO43 WO44 WO45 WO46 WO47 WO48
The box that separate text from the document and allows it to behave like an independent object is known as The object that is used to provide information like the title of the book, name of the chapter, page number etc. The object that helps us analyzing data statistically is known as To highlight certain parts of a page to set it apart from the rest of the page we make use of the following features To clear all the tabs in a document the option that is clicked from the tabs dialog The dialog box that is used to incorporate picture bullets into our documents or web pages is The object that composes of set of tools which helps to create and work on different shapes like rectangles, circles, flowcharts etc. When word is opened a new document called_____ is displayed, where the user starts typing the content right way ______ is an online dictionary maintained by word to obtain synonyms for words The thesaurus is invoked by pressing_______ When a new table is created the insertion point flashes in the _____ By pressing the _____ key inserts a blank row after the last row in the table The ______ option enables us to convert text into a table format A table consists of ______ that contain text or graphics The _______ option in word allows the user to automatically correct misspell words as and when they are typed ______ is a facility that enables recording and replaying of a sequence of keystroke In Word Macros are written in _____ In Word 2000 the macro dialog box is activated with the help of ____ key combination ________shows how a document would look like when published on the web or on an intranet ______ is a software for sending and receiving e-mail messages ________is the coding system used to create web pages The network that makes information easily accessible across various networks is _______
Text Box Header and Footer Chart Borders clear picture bullets dialog box charts doc1 thesaurus shift+f7 first tab convert text to table row AutoCorrect Mail Merging basic shift+f8 web layout view email client html internet field name must be listed in the same order as the corresponding information in the data source
WO49
Which of the following statements are false with reference to the use of a header row source for a mail merge
WO50 WO51
With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false The alignment available for tabs does not include
it is not possible to change the height of only selected rows of a table left A new section is created in order to change properties like number of columns true true true drag & drop true
WO52 WO53 WO54 WO55 WO56 WO57
Which of the following statements related to a Section Break are True The user can set a spelling checker to skip the marked part of the next New option under the file menu of word creates a new blank document that is based on the normal templates The user can split the screen only into two parts The features that enables the user to type text graphics tables anywhere in the document without pressing enter or tab The user can modify the picture from the clip art
WO58
With reference to auto correct which of the following statements are false
automatically corrects common typing, spelling errors
WO59 WO60
With the reference to password protected documents which of the following statements are false The alignment available for tabs does not include
password can not include spaces left a .ppt file can not not be inserted at specified position in the current document true true
WO61 WO62 WO63
Which of the following statements are False Drop Cap tool does not work for the contents in the table format The user can split the screen only into two parts in MS-Word
WO64 WO65 WO66 WO67 WO68
The special symbols that are inserted using "insert symbol" option of the word can not be printed by the printer as they are not standard keyboard symbols true The "format columns" option allows to create columnar text up 12 columns only. The document that makes the user to organize and maintain a long document, such as multipart report or a book consisting of chapters The view that enables us to view how objects will be positioned on the page when it is printed The mode that is initialized or toggled to if the user is in a position to overwrite the text in the word Veena is entering a paragraph in a word processing program. When the cursor gets to the end of a line, what is the best way to get the cursor to the next line? How are data organized in a spreadsheet? Which key moves the cursor to the beginning of the next line of text? Veena typed the following sentence: "The girl was very beautiful." In which word processing utility could she find a synonym for "beautiful"? true Master Document Print Layout View Insert Mode press the return key layers and planes tab grammar checker send a public message to friends interested in one topic Print all Enter closing database To analyse figures subscript To analyse figures
WO69 WO70 WO71 WO72
WO73 WO74 WO75 WO76 WO77
Using an electronic bulletin board, Seema can do all of the following except which one? Aryan has created a ten-page story, but only wants to print the first two pages. What printer command should he select? What process should be used to recall a document saved previously? Which is used to indent text within a document? Desktop publishing is a more sophisticated form of which of the following types of software?
WO78 WO79
What is a Word Processor used for? What is a picture that is saved on a diskette and can be pasted into a document?
WO80
What is a Word Processor used for?
WO81
What basic tools would you find in the Edit menu of a word processor
Clear, replace and select Text at the bottom of every page Mouse, printer and processing system keyboard?
WO82
What is a header in a document?
WO83
What hardware is essential for a word?
WO84
The user could take a picture from a magazine and insert it into the document by using a
Browser
WO85 WO86 WO87
Clear, replace What basic tools would you find in the Edit and Toolbars Assume you are creating a two-column newsletter. Which type size is the most reasonable for the text in the columns? 6 point Given the default left and right margins, and ½-inch spacing between columns, the width of each column in a two-column document will be: 2½ inches.
WO88
Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot see any columns on the screen. What is the most likely cause?
You are not in Print Layout view.
WO89
While word processing, in which of the following situations would Tom use the "Copy" command?
to store a file on the hard drive Data about a set of similar things Thesaurus
WO90 WO91
WO92
What does a document contain? Before submitting your work you want to find any words spelt incorrectly. Which of the following would you use? What command in a word-processing program can be used to change the word „him‟ to „her‟, and also the word „he‟ to „she‟ in the given phrase? “On a cold and still night, the only sound that could be heard was the owl that had ade its home in the nest outs
Paste
WO93
What edit commands would you use to insert a paragraph from one document into Copy, then another document, while still keeping the paragraph in the first document? paste To give the original author a chance to accept suggested changes from the person who entered the revisions
WO94
Which of the following statements would NOT be a reason for showing suggested revisions in a Word document without changing the original document?
WO95
Which statement is NOT true regarding revisions made in a Word document?
A line appears through text that is to be deleted.
WO96
How are suggested changes entered for review on an initial Word document?
Through the Edit menu by choosing Track Changes command
WO97
Which of the following is TRUE about saving a document using the Versions command?
The Versions command will allow you to save multiple versions of a document, including any changes that may have been made to that document.
WO98
WO99
WO100 WO101 WO102
All versions are What happens when you open a document that has been saved using the Versions opened command? automatically. You have used the word „discover‟ four times in an English essay you have created using a word processing program. You would like to find another word of similar meaning to use instead of „discover‟. Which of the following would you use to do this? Dictionary Word displays a list of the dates and times When opening and working with multiple versions of a document, how can you tell each file was which is the most recent version? saved. Various fields are added to a regular document to create a special document called a form through the ____________ toolbar. Fields Which of the following types of fields CANNOT be inserted into a form? Check boxes
WO103
Comments cannot be Which of the following is TRUE related to editing comments in a Word document? edited. Text at the bottom of every page
WO104
WO105 WO106 WO107 WO108
What is a header in a document? In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2. You would like to make this paragraph start on page 2.What would be the best way to do this? Tables in a document help you to easily arrange all of the following EXCEPT: To identify a document, it is helpful to include the file name on each page as a Which of the following tools will copy the formatting of selected text to other places?
Press tab. text. header/footer. Copy button
WO109 WO110
What is the name of the process of determining the cause of errors in a macro? Drop caps are added to a Word document using the ___________ menu.
Fault Finding Insert
WO111
A reverse in a newsletter is:
WO112
A pull quote is best emphasized by:
a section of white text on a black background. setting it in larger type or font size.
WO113
Which of the following definitions is CORRECT? Pertaining to newsletters, which of the following cannot be changed using the Columns command dialog box? As related to type size, how many points are there to the inch? Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. The rest of the newsletter has two columns. What is the minimum number of sections in the newsletter?
The reverse technique means to add dark text on a light background. The width of each column 6
WO114 WO115
WO116
One Press Ctrl+Enter to create a page break. A serif font at 10 points
WO117
Which of the following is NOT correct with respect to page, column, and section breaks? Which of the following would be the most appropriate font for a newsletter headline?
WO118
WO119
Which of the following is the default Word column width?
2 inches
op2 Office 2000 double click cut shift+left and shift+right normal layout, web layout
op3 Office 97
templates inbox assistant Tool Tip marginal stop page up keys only center model
op4 Back Office none of the drag & drop above none of the select above ctr+end and none of the ctr+home above web layout, page none of the layout above click from start program, MSWord from none of the the task menu above document none of the assistant above Icon Tip ruler home and end keys only decimal dialogs/alerts Document Tip none of the above up and down arrow rotation none of the above none of the above pictures forms 11 none of the above none of the above ctrl+m ctrl+m
ans A A A B A
A A A B D D B C A A A
decrease indent both A and B control tool box design wizard control box 2 printer setup from the file menu shading Del Del CTRL+O ctrl+o ONLINE LAYOUT ctrl+2 ctrl+c or ins ctrl+5 database 0 print preview from the file style box ctrl+f ctrl+f
A A A D
CTRL+SHIFT+S CTRL+SHIFT+P A ctrl+shift+s PAGELAYOUT ctrl+end ctrl+x or ins ctrl+1 ctrl+shift+p ONLINE DOCUMENT ctrl+home ctrl+v or Del none of the above C A B A B
Frame Screen Tips WordArt Shading remove all arrow bullet dialog box WordArt
AutoShape Page Layout Auto Shapes WordArt remove circle bullet dialog box AutoShapes
Border none of the above File Bullets clear all
A A A D D
none dialog box A C B A A A A A B A B B A A A A
files default new document document document1 none of t he hyphenation mail merge above tools+spelling thesaurus menu shift+f8 menu last cell of the t second first row able none of the end enter above convert data to table auto format none of the table option above rows & none of the records above columns none of the AutoFormat style gallery above none of the Data Source above Macro vj++ visual FoxPro visual basic shift+f7 online layout view alt+f8 alt+f5 none of the above hotmail vb script
browser micro soft outlook express outlook xml sgml intranet the field separators in a header source and the data source can not be set as paragraph arpanet field names in the header source must match any merge fields you've inserted in the main document
LAN A the number of fields names in the header source must be the same as the number of data fields in the data source B
auto format option applies to the entire table and not only to the selected rows or columns of a table decimal In order to type a header from the third page of the document a section break is inserted after t he third page false false false click -n-type false
by default cell height and weight option applies to all the rows and columns of a table justified If a header is inserted in the second section then the same header is applicable to the first section
delete cells option allows to delete the entire row or a column or shift cells up or shifts cells left C top A A section is a portion of a document in which certain page formatting option can be set D A A A
Double Click
none of the above
B A
prohibits the user from renaming an auto correct entry password protected document can be opened without password as read only justified a document file can be inserted in the current document at specified position false false
automatically corrects the grammatically errors
with t he caps lock key accidentally turned on reverses the case of the letters that were capitalized incorrectly and then turns off the caps lock B
password are not case sensitive hanging
password can be upto 15 characters long B top A an .xls data can not be inserted at specified position in the current document
a multiple documents files can be inserted in the single document
B A A
false false Hyperlink Child Document Document Page Layout Outline Layout none of the above none of the above none of the above
B A A B A
Type Over mode Remove
press the escape press the tab key key just keep typing D rows and lines and spaces height and width columns D backspace/ delete shift B enter/return spell checker thesaurus outliner C
send pictures to a friend From ___ To ____ Copy tabbing graphing Creating and editing documents annotation Creating and editing documents Spelling, grammar and autocorrect
send private messages to a friend Page setup Retrieve spacing word processing Storing information clip art Storing information
send a package D to a friend Print preview Save sorting spreadsheet None of the above clipboard Making Calculations B C B C
B C
B
Cut, copy, paste and clear Text which Numbers which appear at the appear on every top of every page page Keyboard, Monitor, Mouse, monitor keyboard and mouse and printer
Font, Paragraph, Bullet and Numbering C
Designated area on the document C
None of the above
B
clip-art file Spelling, grammar and autocorrect 10 point 2¾ inches.
microphone
digital scanner D
Cut, copy, None of the paste and clear above 15 point 3 inches.
C
You have not inserted a column section break..
You have not specified continuous section breaks.
25 point B impossible to determine. B Word cannot display columns during editing; you will see them only when you print the document. A to leave an original section of text in place while pasting a copy elsewhere D None of the above Find and Replace
to move a section of text from the original to store a file on location to a diskette another location A set of different graphics Grammar Checker
Mainly text Spell Checker
B B
Replace
Select all Delete, then paste
AutoCorrect Insert, then paste
B
Cut, then paste To give the original author a chance to reject suggested changes from the person who entered the revisions
A
To complicate the revision process and to force the author to spend more time making corrections A vertical line outside the left margin signifies A red underline a change has appears beneath been made at text that is to be that point in the added. document.
To allow multiple people to work on one document in collaboration with one another C
Comments are enclosed in a text box at the right of the document.
D
Through the Tools menu by choosing Track Changes command
Both through the Through tools on Tools menu and the Reviewing the Reviewing toolbar toolbar D The Versions command will allow you to save only two versions of a document: one version of the original and one version of any changes made to the document. A The previous version is opened automatically. B
The Versions command will allow you to save only one version of a document, including any changes that may have been made to that document. The latest version is opened automatically.
The Versions command will allow you to save only one version of a document without any changes that were just made to the document. The first and second versions are opened automatically.
Grammar check Spell check Word will show The most recent the name of the version will person who appear at the saved each bottom of the list. version. Tools Toggle button Forms Text fields
Thesaurus
A
Word is not able to tell the most recent version of a document. A Insert C A drop-down list B
Comments can be edited or deleted by right clicking the Comments highlighted cannot be deleted. text. Text which Numbers which appear at the appear on every top of every page page
Comments can be edited or deleted by left clicking the highlighted text.
C
None of the above
C
Press Return. graphics. bibliography. Paste button
Insert page Copy and paste. break. numbers. forms.
D C
find/search. macro. A Format Painter This action is not possible. C button
Bug Squashing Tools a section of text where the first letter of each sentence is lowercase and the rest are uppercase. typing it all in capital letters.
Error Injecting Format the guidelines used to establish where different elements of the newsletter will go. underlining the text of the pull quote.
Debugging Edit
D C
an enlarged capital letter at the beginning of a paragraph. A changing the color.
A
A dropped cap is a word that A pull quote is a starts with a quotation taken lowercase letter from (pulled) when it should from another have a capital document. letter. The height of each column 10 The number of columns 12
A grid is a set of horizontal and vertical lines that determine the placement of elements in a newsletter or other document. D The tab spacing within each D column D 72
Four Press Press Enter to Shift+Enter to create a section force a line break. break. A sans serif A sans serif font A serif font at 20 font at 45 at 10 points points points It depends on the left and right margins, and how many columns are 3½ inches 4 inches specified. Two Press Ctrl+Shift+Enter to create a column break.
Three
B
C
D
D
q_id
DB62
q_desc op1 In MS-Access, while using form design view, for creating a command button for adding a new record, we should select the _______ category from the command button Record wizard Navigation columnar form filtering filter filter by form * true bound control button group database bound CURRDA TE() text box pivot table data sheet filter button wizard ram* true report autorepor t chart true true 60,000 true true
DB63 DB64 DB65 DB66 DB67 DB68 DB69 DB70 DB71 DB72 DB73 DB74 DB75
_______ form displays fields in a single horizontal row The process of arranging the data in a meaningful order is known as ___________ ______ are used to select only some particular records from the table or any other database objects In MS-Access, user may specify criteria for filter in form view using _________ ___wildcard character represents any single character Records cannot be sorted by a primary key A control without a data source is known as ___________ Set of related option buttons, check boxes and toggle buttons is known as _____________ The collection of related data and objects is called a ____________ Which of the following is control types ____________ In MS-Access, the function that gives the current date is _____________ _____is a control that lists set of data ______is a form that summarize large amount of data
DB76
______allows to create a filter by typing the value in a data sheet
DB77 DB78 DB79 DB80 DB81 DB82 DB83 DB84 DB85 DB86 DB87 DB88 DB89
Wizards for toolbox controls are called a __________ The wild card representation for any 5 letter word that starts with ram is ________________ Look up fields slow up data entry ____is an access object that displays un-editable data
_____option from the new object toolbar gives the easiest way of generating a report ______ represents data in a pictorial format Changes of one table can be carried over to another related table Hyperlinks are used to jump to any kind of information or data from a file The memo field can have text upto_____ characters in length In MS-Access, columnar layout can be used to view multiple records in a form In MS-Access, alter command may be used in adding a primary key to a table Update query is used to add records from one or more tables to the end of an existing table true In ms-access, datasheet view is available in ___________
table
DB90 DB91 DB92
______are used to jump to any kind of information from a datasheet or a form Home page will always be present as a first page of an application Make table queries create a new table from the records of another table In ms-access, to protect a database file from illegal access, we may set database password. The option of setting database password is available in _______ menu Foreign key is a field that uniquely identifies each record and accept no null values Data definition queries are used to create or change database objects The attributes of a composite key are known as ________ OLE object is a data type in access Data displayed in forms cannot be edited A sub form is used to display one to many relationship between tables We can switch from datasheet view to form view by selecting view -> form view option In MS-Access long integer is a datatype In MS-Access, while designing a table for a particular field, the Required parameter is set to yes. This validates the field as _______ Sorting is applied to select only some particular records Filter by form can be created from a forms shortcut menu Advanced filter uses a filter similar to the query design window to create a filter ? Wildcard character represents any number of characters _________ of the following is/are a type of chart A bound control is tied to a underlying query or table A calculated control uses expression as a source of data Text boxes cannot be bound controls The default query invoked by ms-access is A control can be bind to a record using row source property List box is a control that offers a list of choices If a table is joined to itself it is called a ________________ A picture box combines the activities of both a text box or a list box Line is a tool box control Text boxes can be part of a option group _____ chart exists as a separate object Filtering data is a way of arranging data in a meaning full order Wild card characters are used for sorting records Pivot tables are used to navigate to the other tables in a database Reports are used to represent un-editable data
table true true
DB93 DB94 DB95 DB96 DB97 DB98 DB99 DB100 DB101 DB102 DB103 DB104 DB105 DB106 DB107 DB108 DB109 DB110 DB111 DB112 DB113 DB114 DB115 DB116 DB117 DB118 DB119 DB120 DB121 DB122
Insert true true alternate keys true true true true true null true true true true pie true true true update query true true inner join true true true freestandi ng true true true true the first field of the table forms true delete true true
DB123 DB124 DB125 DB126 DB127 DB128
In MS -Access, the records in a table are sorted based on _________ Relationship is an association between _________ Summary options dialog box is used to summarize data ______ queries can be used to delete a group of records that meet some specific records Charts can convert numerical data in a easily understandable format Embedded charts exist separately
DB129
The chart which cannot exists as a separate entity are _______________ From ms - access, if we want to view the records stored in a table in ms - excel worksheet, we need to Page header is present at the beginning of each record Detail section has a header and footer A macro is performed only when the user initiates an event The macro is selected from the action field of a macro sheet A macro can be made to execute before the starting of a database _________ data type is generally used for fields assigned as primary keys in a table MS access objects can be published in the web In code-builder, got_focuse, click,dbl_click,enter are examples of _______ _______can be used to automate certain actions in response to events
freestandi ng use hyperlink true true true true true integer true actions report
DB130 DB131 DB132 DB133 DB134 DB135 DB1 DB2 DB3 DB4
DB5
In the macro sheet the macro is selected in the _____field
macro
DB6
To build complex expressions_____is used
calculator
DB7 DB8 DB9 DB10 DB11
The three list boxes present at the bottom of the expression builder are called_____ ________option is selected from the view menu to create macros with conditions _______report can be created with minimum user input _______layout of a form displays one record at a time The table or query name on which we are going to build our report is selected from the ____ dialogue box
action list conditions tabular tabular create report columnar and tabular true create fields primary key label wizard start header report footer
DB12 DB13 DB14 DB15 DB16 DB17 DB18
______and_____are the two types of auto reports available There are no wizards for creating a database in access ______option from the insert menu option is chosen to add an embedded chart In ms-access, while using SQL, references constraint is used for creating _______ _______is used to create a mailing label ______header is present at the beginning of the report ______is present at the bottom of each page in a report
DB19 DB20 DB21 DB22 DB23 DB24 DB25 DB26 DB27
In SQL, having clause is used for _________ ______field is added to the macro sheet when we select grouping option from the view menu condition VB ______can be used to create toolbars Modules _______query is used to add records from one or more tables into an existing table _______window is used to write VB code in access application Values for other tables, queries are maintained in look up fields data type Visual Basic language is a _____ tool ______ function is used to display a message box Other ms-office applications can be accessed from ms-access using a concept called ________ add report true RAD SysCmd OLE object linking and embeddin g OLE object linked exe form wizard static file append dollars unbound object display as icon create html startup bullet DBMS
for ordering records
DB28
OLE stands for_____
DB29 DB30 DB31
The application that supplies data in OLE is called an _________ If any change made on the object from the client side is reflected on the server then the object is said to be _____ _______is the file format that works on internet
DB32 DB33 DB34 DB35 DB36 DB37 DB38 DB39 DB40 DB41
______ is used to convert any ms-access object into html format _______ option in publish to web wizard produces a page that is static in nature _______query is used to create or change database objects in a current database Currency fields express the amount in _________ _______is selected from the toolbar to add an OLE object To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box _______option from the file menu is selected to run 'publish to the web wizard' _____page in an web application is used to navigate to the rest of the pages in the application ______ is fired when an event is triggered is the concept based on a Visual Basic language Ms access is a ___________
DB42
A collection of data stored in different objects is known as a _________
data group
DB43 DB44 DB45 DB46 DB47
A blank database can be created using __________ Text type data can be of _____ characters in ACCESS ______is a datatype that assigns values automatically Tables cannot be imported from other databases If two tables having same values for the fields are joined it is called an ______
new dialog box 255 automatic number true inner join primary key cascade delete related records columnar table or tables
DB48
Duplication of records in a field won't be allowed if the fields are declared a________
DB49 DB50 DB51 DB52
Changes from a master table can be reflected on to the child table by selecting _____option To see more than one record at a time in a form we use _______
In SQL, delete command is used to remove _________ In MS-Access, filter excluding selection will display only those record(s) which meet the criteria. true
DB53
Properties of the fields are managed by _____ in Dynaset
property field crosstab queries action queries inner join true
DB54
______queries allows us to view data in row by column manner The type of queries that can update or delete record(s) in a table(s) are called __________ Joining tables without any matching values in the fields is called ____________ Primary key uniquely identifies each record
DB55 DB56 DB57
DB58 DB59 DB60 DB61 DB136 DB137
Which of the following dialog box is/are used in the creation of form ________ _______ query wizards are used to generate summary calculations for a table Properties of a form can be changed by selecting ______from view menu options Forms that are included in other forms are called ______________ In MS-Access. While appending records, the source and the target table must have similar structure and fields We can add our own functions to the expression elements list box of the expression builder
new form dialog box summary change properties included form true true
DB138 DB139 DB140 DB141 DB142 DB143 DB144 DB145 DB146 DB147
_______is the wildcard character which represents the presence of any number of characters Macros can be used to add a menu to a database object _____ header is a unique feature of reports Chart can either be a form or a report Group header will be present at the design view of a report even if the report is not grouped We can change from the design view to the form view without being prompted for saving the changes made Charts can be produced without the wizard Macros can be used to create user defined error messages Between and Not Between is ______ type of operators The default data type of VB is integer
& true page true true true true true relational true
DB148 DB149 DB150 DB151 DB152 DB153 DB154 DB155 DB156 DB157 DB158 DB159 DB160 DB161 DB162 DB163
Visual Basic is based on __________ _______is the name of the database object that displays data and can be used to edit data In access OLE objects cannot be linked _____ section is present for each record in the report A ________ sheet lists all the properties that pertain to the form or the controls Textboxes can also be an example of unbound control In MS-Access, we may design command buttons for navigating records _______are forms that are included in other forms _______ are used to represent our data in graphical format A field with a _______ uniquely identifies each record Large amount of data can be summarized using ______ tables _______ are employed to select only some particular records from a database object ______ control need not have a data source ______ control combines the functionality of both a text box and a drop down list MS access is a DBMS A form can be bind to a record source using _____ property of the form
action language report true group data true true sub forms graphs number pivot filters form list box true form name tabular form sub forms calculated calculated sub form
DB164 DB165 DB166 DB167 DB168
______ forms displays field in single row ______ forms are usually used for tables with one to many relationship _______ control uses an expression as a source of control _______ control is tied to field _______is the form that can be created with minimum input from the user
DB169
______option from the tool menu is selected for setting relationships between tables
set relation
DB170 DB171 DB172 DB173 DB174
______,______and_____are the buttons belonging to the options group _________allows us to create a filter from a field short cut menu ________is a database object which displays data but cannot be used to edit data What term applies to a collection of related records in a database? All of the following terms are related to computerized databases except which one?
option, toggle and command buttons filter by form form clipboard search A way to analyse and manipulat e numerical informatio n
DB175
What is a database?
DB176 DB177
What does a record contain? An RDBMS is a
Informatio n about certain programs remote DBMS storing data offline at a separate site Key verificatio n A way to analyse and manipulat e numerical informatio n
DB178
Data Warehousing refers to
DB179
Unauthorised alteration of on-line records can be prevented by employing
DB180
What is a database?
DB181
What does a record contain?
Informatio n about certain programs Reports allow users to extract informatio n as hard copy (printed output)
DB182
What is a report?
DB183
What is the best way to analyse and change data
Extracting and analysing data
DB184
What are some popular office orientated software applications?
Compilers , interpreter s, editors DEFAULT and NOT NULL constraint s CHANGE TABLE remote DBMS storing data offline at a separate site
DB185 DB186 DB187
Which of the following constraints can be used to enforce the uniqueness of rows in a table? Which of the following commands is used to change the structure of table? An RDBMS is a
DB188
DB189
Data Warehousing refers to You are creating a client application that calls ActiveX DLLs. Which of the following properties of the Err object provides the name of a component that sends an error back to the client application?
Number
DB190
DB191 DB192 DB193 DB194
using a This database holds personal information. The user can help to keep it confidential by password the If the database holds customer names and addresses, personalised letters can be product created automatically using code Application software suited to storing the survey information obtained in the table A would be database bookmark The characters * and ? are sometimes used in search criteria as s Auto Which of the following field types will generate the primary key automatically? Primary
DB195
Referential integrity ensures that the:
records in a dynaset are consistent with the underlying tables.
DB196
Tables are related to one another through a:
DB197
A foreign key is:
foreign key. the primary key of both related tables.
DB198
You are creating a banking database to track customer loans. The bank will, of course, have many customers, each of whom may take out one or more loans, while each loan One-tomay be associated with only one customer (there are no joint accounts). What is the re one In a one-to-many relationship between Companies and Employees, which field is found EmployeeI in both tables? D The Tools menu, Relationsh ip window
DB199
DB200
Which of the following ensures that records in related tables are consistent with one another? For example, it ensures that you cannot add a record with an invalid foreign key.
DB201
How would you delete a relationship between tables in the Relationships window?
Double click the Relationsh ip line That there are several customers associate d with that ID
DB202
In a Customers tables, what does a plus sign next to the CustomerID field mean?
DB203
What is required of the fields that join two tables?
They must both be numbers
DB204
Nothing, Access ignores Assume a one-to-many relationship between the Customers table and the Loans table, the with referential integrity in effect. What happens when you attempt to delete a attempted customer ID from the Customer table that still has entries in the Loans table? command.
DB205
The Which of the following is true when viewing a main form and its associated subform in subform is the Form Design view? not visible.
DB206 DB207
Which of the following relationships does not belong in a database based on a professional sports league such as football or basketball? Which symbol is used at the end of the join line in a related table to signify the “many” side of a one-to-many relationship?
A one-tomany relationshi p between teams and players #
DB208
You have created a one-to-many relationship with referential integrity between a Customers table and a Loans table. From which table can you delete a record?
Either table at any time prompt, title bar text, icon. Dim CreateList . A check box enables the form user to choose from one of several existing entries. must be set for one word.
DB209
The correct order of the arguments for the MsgBox statement is:
DB210
The first statement in a procedure named CreateList is:
DB211
Which of the following is TRUE related to form fields?
DB212
A text field:
DB213 DB214
The purpose of a database is to: A database stores:
help people keep track of things. data.
DB215
A database records:
facts. singleuser database applicatio n singleuser database applicatio n Sequential Query Language (SQL) Database Modeling System Jet
DB216
A sales contact manager used by a salesperson is an example of _______________
DB217
A Customer Resource Management (CRM) system is an example of_________
DB218
The industry standard supported by all major DBMSs that allows tables to be joined together is called __________.
DB219 DB220
A program whose job is to create, process and administer databases is called the _____ Microsoft Access may use which of the following DBMS engines?
DB221
DB222 DB223
Which of the following are basic components of an enterprise-class database system? The user the database applicatio n(s) interact(s) with the In an enterprise-class database system ________ . DBMS creates In an enterprise-class database system, the database application ___ . queries
DB224
In an enterprise-class database system, reports are created by ____________________ .
the user
DB225 DB226
A database is considered "self-describing" because _______ . In an enterprise-class database system, the database _________ .
all the users' data is in one place holds user data
DB227
A database may contain _________________________ .
tables
DB228
DB229
from existing data from existing nonA database designed to implement requirements for a reporting application needed by database the Sales department is a database being designed _______ . data A database designed using spreadsheets from the Sales department is a database being designed _________________________ .
DB230
A database designed to combine two databases used by the Sales department is a database being designed _________________________ .
from existing data
DB231
Database professionals use ________________ as specific data sources for studies and analyses.
data marts
DB232
Database professionals use a set of principles called ________________ to guide and data assess database design. marts
DB233
A very popular development technique used by database professionals for database design is known as _______________________ .
data marts
DB234
A very popular development technique used by database professionals to adopt a database design to new or changing requirement is known as _____ .
data marts file managers
DB235
The predecessor(s) of database processing was (were) __________ .
DB236
In a relation __________________________ .
entities in a column vary as to kind
DB237 DB238 DB239 DB240 DB241 DB242
An attribute is also known as a(n)
.
table record record
A combination of one or more columns used to identify particular rows in a is___ . A combination of two or more columns used to identify particular rows in a relation is________ . A determinant that determines all the other columns in a relation is______ . When designing a database, one of the candidate keys in a relation is selected as the _________ . Normalization is a process used to deal with which of the following modification anomalies?
DB243
record composite key Insertion anomaly assess the existing tables' structure When you are given a set of tables and asked to create a database to store their data, and the first step is to ____ . content are supplied by several wellestablishe d manufactu rers
DB244
Modern microcomputer personal DBMS products______.
DB245
DB246
Which of the following are true about data mining applications? We have obtained access to the company's operational data. We examine 50 records for customers with phone numbers that should use the current area code of 345. Of these 50 records, we find 10 that still use an older area code of 567. This is an example dirty data We have obtained access to the company's operational data. We have been asked to produce a report with an item by item analysis of sales, but the only sales figure available is the total sale value for each order. This is example of_____ dirty data
They use sophistica ted mathemati cal technique s.
DB247
DB248 DB249
A data warehouse database differs from an operational database because: Which of the following objects is used to display a menu?
DB250
Which of the following objects are NOT found in an Access application?
data warehous e data are not stored in tables. Form Forms and reports
DB251
You are developing an Access application that you expect to upgrade periodically. Which of the following statements is TRUE?
It will be easier for the user to upgrade it if the objects and tables are in one database.
DB252 DB253
Which of the following statements regarding Access applications is NOT true? Which of the following brings a copy of the table into the current database and does not maintain a tie to the original table?
The Link Tables command can be used to associate the tables in one database with the objects in another database. Import
DB254
What makes a database an application?
It contains more than one table Menu Wizard create backups for mission critical corporate data.
DB255
What is the Access tool that is used to create the user interface?
DB256
The purpose of a data warehouse is to:
op2 op3 op4 ans Record Form Operatio Operation None of s the above B ns one to tabular hierarchic many al form form B form ordering sorts filter by selection $ false unbound control option group form unbound sorting pipes filter by menu @ querying C
gateways A None of the above A D ? B data less data control control B controls record group group B none of collection the above A all of the controlled above C DAY() C
TODAY() DATE() combo box list box columnar tabular form form filter by input control wizard ram?? false form report label false false 255 false false false query form filter by form option control wizard two of the above table module bitmap
static text B main form A none of the above C tool wizard C none of the above B B ledger A none of the above A report A A A D 64,000 B A B all of the D above
25,000
form false false
report
hyperlink D A A none of the above C B A C A B A A B
Records
Tools
false false composite candidate primary keys key keys false false false false false not null false false false false bar false false false select query false false outer join false false false embedde d false false false false the last field of the table reports false insert false false zero
both 1 and 2
delete query
self join
none of the above B B B A B none of the above C A A B append query B B A table join C B A B sub chart D B B B A
stand alone
primary none of key field the above C attributes entities D A append add A A B
embedde stand alone d use datasheet use import in forms false false false false false primary number number false procedure events s form chart expressio n elements comments code builder
sub chart B use export
D B B B A A D A
auto number
none of the above B macros D
macro list action columnar columnar link report
action D expressio expressio n n builder elements C expressio n elements none of list box the above C none of insert the above A auto embedde report d C datasheet justified B embedde d report new report D
stable and dynamic none of unstable and static the above false insert add chart chart chart alternate foreign none of key key the above chart mail none of wizard wizard the above group page report header header header page group none of footer footer the above
A B C C A D B
for updating records group reports append macro sheet false RAP MsgBox DDE
for specifying conditions with group by clause macro names forms insert
none of the above C none of the above C macros D
delete B none of module the above C A none of RAID the above A none of message the above B none of CME the above A
on line on line execution editing
OLE OLE client server embedde d connected edited DLL BMP html publish to report query web wizard wizard wizard dynamic none of static html file the above data add insert definition rupees pesos yen bound command object button list box create display link icon save as none of new html the above none of home end the above none of command procedure the above RDBMS front end language
none of the above A OLE communic ator C A D
D B D A B A C B C A
data data collection database storage
C
new blank database dialog box 64000 AutoNum ber false
new database database dialog box dialog box A 235 63500 A automatic number field B B explicit none of outer join join the above A no candidate duplicate not null key key A cascade cascade change update change all related related related records fields records C both a and none of tabular b the above B query or record or none of queries records the above C false field property B Dynaset field properties properties B update queries update queries
row/colum select n queries queries change/de row/colum lete n queries queries no match self join join false form create dialog box sum form wizard dialog append form properties properties sub form false false
A
A
outer join D A
both 1 and 3 D simple D new properties B
new form child form B A A
# false detail false false false false false list false
? group
* topic
D A C A B A B A C B
range
logical
event structured procedura query l based none of language language the above C form false record property false false child forms chart primary key create queries bound combo box false control query table B B D
session detail both a and none of b the above B A A none of inner form the above A labels report B index form sorts unbound button record source identifier B none of the above A
forms A none of the above C option button B A none of the above C none of the above A none of the above A none of the above A static C columnar form B
data sheet chart form form tabular columnar form form bound unbound unbound
bound tabular auto form form
connect
relationshi none of ps the above C
option button, command list, check toggle button, and button and check and combo check list boxes boxes boxes D filter by filter by filter by report record input D report file macro field field sort names An organised way of A tool to storing produce informatio high n about a quality set of document similar s things It contains all the data about one specific item relative DBMS table layout record grab B B D
A way of maintainin g a log C
A document which contains text Relational DBMS
A collection of files B Reliable DBMS C
uses tape as opposed to disk C Database Computer access matching controls D An organised way of storing A tool to informatio produce n about a high set of qualitydoc similar None of uments things the above C backing up data regularly Computer sequence checks is related to data mining
It contains all the data about one specific item Reports provide a very flexible way of creating and editing document s
A document which contains None of text the above B A tool which allows text and graphics to be placed in document None of s the above A
Spreadsh eets make data easy Using to analyse queries Word processor s, Network spreadshe software, ets, backup databases systems , DTP PRIMARY KEY and UNIQUE constraint s ALTER TABLE Relational DBMS
None of the above C
None of the above C
FOREIGN KEY constraint s MODIFY TABLE relative DBMS
IDENTITY columns C UPDATE TABLE C Reliable DBMS C
backing up data regularly
uses tape is related as to data opposed mining to disk C
Descriptio Compone n nt Source
D
keeping the keeping a original backup paper copy copy the primary mail key merge Graphics browser
saving the file with different filenames A
e-mail e-mail
C A C C
operators wildcards engines AutoNum Auto ID ber Auto Key forms in a database are consistent with the underlying tables or queries.
related tables in a database are consistent with one another.
reports are consistent with the underlying tables or queries. B
query and main form its report and and a associate its related subform. d dynaset. query. A not a the primary primary a field key of key of the from an either related unrelated related table. table. table. B
One-tomany
Many-tomany
Many-toone
B
CompanyI Employee Company D LastName Address A The oneto-many relationshi p B
Referentia The join l integrity line
Right-click the Relationsh ip line, then select Delete from the shortcut menu
Select Undo in the Relationsh ips pulldown menu
Click the Delete Relationsh ips button on the toolbar B
That records That That there can be some of are added by the data is records in clicking on not a related the plus viewable table sign C They cannot be They must They AutoNum be the cannot be ber data same data text fields types type D The customer‟ s ID is deleted from the Customer s table, The and all the customer‟ related s ID is loans are deleted deleted from the from the Customer Loans s table. table.
An error message is displayed. D
The subform is an object on the The form and subform is The can be displayed subform is moved or in displayed sized like Datasheet in Form any other view. view. object. D
A one-tomany relationshi p between teams and coaches M
A one-tomany relationshi p between coaches and teams ¥
A many-tomany relationshi p between players and teams C * C
The Customer s table only when there are Loan records associate d with that customer
prompt, title bar icon, title text, icon, bar text. prompt. B Sub CreateList CreateList . . Sub. B A text field enables the form user to choose from one of several existing entries. must be set for multiple words. A dropdown list enables the user to choose from one of several existing entries.
The Loans table at any time title bar text, prompt, icon.
Neither table
C
A dropdown list enables the user to enter text.
C
does not must be have to be set for two set. words. C maintain data on create different tables of things in store data rows and different in tables. columns. tables. A relationshi all of the ps. metadata. above D
figures.
multiuser database applicatio n
multiuser database applicatio n Structured Question Language (SQL) Database Managem ent System SQL Server
informatio n. ecommerc e database applicatio n ecommerc e database applicatio n Structured Query Language (SQL) Data Business Model System
a and b
D
a or b
A
None of above
B
Relational Question Language (RQL) C Relational Model Manager B D
Oracle a and b The database The managem database ent applicatio system All of the n (DBMS) above.
D
the DBMS accesses the database data creates form
None of above creates reports the database the managem database ent applicatio system n (DBMS)
All of above b and c
A D
the database B
it reduces data duplicatio n holds metadata
metadata as a new systems developm ent project as a new systems developm ent project as a new systems developm ent project
it contains a descriptio n of its own structure holds indexes stored procedure s as a redesign of an existing database as a redesign of an existing database as a redesign of an existing database
All of the above. All of the above. All of the above.
C D
D
a and b
A
a and b
B
normalizat data ion models
normalizat data ion models
normalizat data ion models entityrelationshi normalizat p data data ion modeling migration relational hierarchic network data al models models model more than the order the order one of the of the column columns rows is can use is unimporta the same important nt name
a and b entityrelationshi p data modeling entityrelationshi p data modeling entityrelationshi p data modeling
C
A
B
D
D
A
C
relation field field field primary key Update anomaly
row key composite key foreign key foreign key Deletion anomaly
field tuple foreign key candidate key surrogate key All of above
D C C D B D
create move the design the one or data into database more new the new structure tables database A
were essentially killed off by MS Access Their report delivery is more difficult than report delivery for reporting systems.
are not have poor true response DBMS time products
B
Nonintegr None of ated data the above A
a "wrong inconsiste nonintegra format" nt data ted data problem a "wrong inconsiste nonintegra format" nt data ted data problem
B
D
data warehous e databases do not have metadata. Table
data warehous e data are often denormali zed. b and c Report Query
C A
Queries and tables Macros
Spreadsh eets D Regardles s of how the objects and tables are stored, the user will have to reenter the data in the tables when the applicatio n is upgraded. B An applicatio n can be created in such a way that it objects such as forms and reports can be changed without disturbing the existing data. C Join A
It will be easier for the user to upgrade it if the objects are in one database and the tables in another. An applicatio n may consist of multiple databases , each with multiple objects, linked to yet another database containing only tables. Link
It is advisable to put each object and table into a separate database.
All objects in an applicatio n, including the tables, must reside within the same database. Merge
It contains a user interface, or switchboa rd Interface Build Design Menu Wizard put key business centralize informatio the n into the managea hands or bility of more data decision collection. makers. It contains tables, reports, queries, and forms
It contains macros C Switchboa rd Manager D
store all corporate transactio n data in one single location. C
q_id VB1 VB2 VB3
q_desc Microsoft visual basic project file has _______ file extension. In visual basic, _______ method is used to add an item in a combobox In visual basic, _______ method is used to load picture during runtime in an image control In visual basic, to populate a drive list box with a directory list box __________ statement is used In visual basic, to display a message in the run time _________ function is used In visual basic, to populate a directory list box with a file list box ________ statement is used In visual basic, ________ is a property of a recordset object which counts the number of rows in a recordsourse object In visual basic, using a data control, a record can only be added from the last record. Adding a new record is only possible using _______ method of a recordset object. In visual basic, using a data control, a record is saved to a recordsource object using _______ method of a recordset object. In visual basic, using a data control, to navigate to the previous record ________ method of a recordset object is used. In visual basic, when a record pointer reaches to the last record, _______ property of a recordset object is automatically set to ______ In visual basic, the explorer view of a project is displayed in ___________ In visual basic, when a record pointer reaches to the first record, _______ property of a recordset object is automatically set to ______ In visual basic, _______ is a method to convert a string into integer. In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type of shape should we get? In visual basic, a timer event is only available in timer control. In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any object In visual basic, _______ is a property of a textbox control to set a color of a text. In visual basic, _______ property of a textbox control is set to _______ to underline a text In visual basic, _______ property of a textbox control is used to change the size of text. In visual basic, the interval property of a timer control is given in ________ In visual basic, _______ property of listbox control counts the number of items in the list In visual basic, the properties of various controls can be set using __________ In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a messagebox function. In visual basic, ________ is a function which displays a message and it also allows the user to enter values in a form object
VB4 VB5 VB6 VB7
VB8 VB9 VB10 VB11 VB12 VB13 VB14 VB15 VB16 VB17 VB18 VB19 VB20 VB21 VB22 VB23 VB24 VB25
VB26 VB27 VB28 VB29 VB30
In visual basic, using a data control, ________ is a recordset type which allows to add a new record and also to update existing record in a recordsourse object In visual basic, while closing a form _______ event of a form object is triggered earlier to terminate event. In visual basic, to give a backcolor or to bring in a picture to a command button can only be done if we set the style property to ______ In visual basic, a method RGB(255,0,0) will generate _______ color In visual basic, a method RGB(255,255,255) will generate _______ color
VB31
In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.
VB32 VB33 VB34 VB35 VB36 VB37 VB38 VB39 VB40 VB41 VB42
In visual basic, if a user uses a function key F4 _________ becomes visible. In visual basic, when a textbox control receives the focus ________ event is triggered. In visual basic, a form is a ________ object. Microsoft visual basic is a Rapid Application Development tool. In visual basic, when a form object appears on the screen _________ event is triggered. In visual basic, to display text on a label object _________ property is used In visual basic, _______ object is used to access the database and also to manage the data in the database. In visual basic, when a checkbox control is checked _______ property is automatically assigned with 1. In visual basic, _______ keyword is used to declare a variable What is the extension of the Visual Basic project file that stores the design of a user control. Which event of a text box would you use for validating the data entered by the user?
VB43 VB44
Which of the following statements forces inline error handling? The _______ method resets the contents of bound controls to their original values when the user clicks on the cancel button.
VB45 VB46
To deactivate the Form UnLoad event, you make the following change in the function definiton: How many root nodes can a TreeView control have?
VB47
A project group is a Project which:
VB48
Procedures declared in a _____ are local whereas procedures declared in a ______ are available to the whole application.
VB49 VB50
How can you keep the user from exiting a form by clicking the Close button? The _______ property enables Visual Basic to draw complete images in memory before displaying them on the Screen.
VB51
You want to display the code and the description of an error. What would be the correct syntax?
VB52 VB53 VB54
What is the purpose of the Image List Control? Which method would you use to get a free or unused File identifier while opening any file: Which property procedure is used to retrieve the value of a property?
VB55 VB56
Which of the following can be shown to the user using the Common Dialog control in VB? Which of the following are not properties of Command Button:
VB57 VB58
Which events enable you to determine which key was pressed by the user? In order to access a file in Non-textual format, you have to open file in: Visual Basic displays information depending upon the current value of two properties of the form, called: Which of the following procedure types will execute when you assign a value to a property of an object? In order to overlap the controls (say a command button) during design time, we use the „Send To Back‟ or „Bring To Front‟ option from the Edit menu. To change it dynamically (i.e.during program execution) we need to change: Which property of the ProgressBar determines how much of the bar is filled? The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program.
VB59 VB60
VB61 VB62 VB63
VB64
The caption and the name properties of the command button:
VB65 VB66
You try to initialize a new Object variable with the following line but receive an error. What could be the possible cause? Set MyVar = New Classname Which of the following will perform a direct execution of a Command object?
VB67 VB68
The vb Critical symbol displays: vbYesNo is an example of a(n):
VB69
VB70 VB71
The primary difference between the MsgBox statement and the InputBox function is the: Which of the following is TRUE about a protected form (i.e., a form where the Protect Form button on the Forms toolbar is toggled on and is assumed to remain in that position)? Which event is triggered when the user moves to another open form? To deactivate the Form UnLoad event, you make the following change in the function definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the Form from closing, you will set the:
VB72
op1 .vbg add load Drive1.Drive= Dir1.Path messagebox( ) Dir1.Path=Fil e1.Path openrecordse t .vbp
op2 .frm loaditem
op3
additem
loadpicture addpicture Dir1.Path = File1.Path = Drive1.Drive Dir1.Path message() Dir1.Path = Drive1.Drive opendatabas e msgbox() File1.Path = Dir1.Path recordcount
op4 .frx none of the above none of the above
ans B B B
none of the above B none of the above C File1.pattern= Dir1.path C count C
update append movenext eof,false properties window bof,false value() circle true true fontcolor
append update movelast movelast,tru e form layout window movefirst,tru e int() rectangle false false
addnew additem moveprevious movelast,false toolbox movefirst,false number() square
additem addnew movefirst eof,true project explorer bof,true val() oval
C B C D D D D D A A
color forecolor fontunderlin underline,true e,true textunderline,true textsize size foresize oneone- millionth hundredth of one-thousandth of a of a second a second second count form layout window title msgbox() recordcount itemcount prperties project explorer window prompt textbox vbmsgboxstyle label
none of the above none of the above
C B
D fontsize one-ten thousandth of a second C listcount toolbox none of the above inputbox() D B C D
opensnapsh opendynaset ot dbopensnapshot load standard blue red properties window properties window change child true load activate opaque red green form layout window form layout window lostfocus parent false unload unload transparent green blue
dbopendyna D set initialze graphical black white project explorer window project explorer window gotfocus none of the above C D B D
toolbox
D
toolbox text container
A D C A D C B C B B A
initialize caption openrecordset value var .ctr Check
text name opendatabas e dbengine enabled dime .ctx Validate On Error GoTo linelabel UpdateContr ols Cancel parameter to a non-zero value 1 Consists of several Programs visible dim .ctl Validation On Error GoTo Inline
activate none of the above none of the above style none of the above .ocx Audit
On Error Stop
On Error Resume Next D Resize UnloadMode parameter to a zero value None of the above Consists of several Projects A
PaintPicture Refresh Cancel UnloadMode parameter to parameter to a non0 zero value 2 Consists of several Applications 3 Consists of Various Forms And Code Modules
A D
D
Form window, Project standard or window, view Class module, code code module code window module
None of the above
A
Place code in the Terminate event AutoRedraw = True
PaintPicture A Msgbox error.number & Msgbox Msgbox err.no & err.number & Msgbox error.number error.descrip err.text err.text & error.text D tion To provide a repository for images used by To display To help in images to the creating a To allow the editing of other user ToolBar icons D controls FreeFile Retrieve Common messages passed to Windows Caption GetFileNum GetFile GetProperty Get GetBytes Value A B
Place code in the Unload Place code in the Deactivate event event AutoRedraw = False Refresh
None of the above
B
Open dialog box Visible Click, KeyUp Click and and KeyPress KeyDown Binary Ascii Format Format CurrentX ScaleLeft and and ScaleTop CurrentY Property Property Get Assign Background Caption color property property Min Max Shell Are one and the same You do not need to use the Set command here The Open method Substr Can be different at times You do not have the permission to access the class The Exec method
Windows explorer Multi-Line
Input box Font KeyPress, KeyUp and KeyUp and KeyDown KeyDown Input Mode ScaleHeight and ScaleTop Property Let Output mode
D C
D B
x and y Property Set AutoRedraw property CurrentVal CStr None of the above
A C
ZOrder property Value SetAttr Are actually not properties
C B A
B
MyVar has not been declared The ExecProcedure method
None of the above None of the above
C D
A warning query icon
None of the above built-in statement. variable. intrinsic constant. procedure. MsgBox statement can be created InputBox MsgBox with the function statement macro returns a returns a InputBox function can recorder, value, while value, while be created with the while the the InputBox the MsgBox macro recorder, while InputBox function does statement the MsgBox function not. statement cannot. cannot. does not. Data cannot The form A new check Data can be be entered can be box can be into the form. modified. added. entered. An exclamation icon Unload Cancel parameter to a non-zero value QueryUnload Deactivate Cancel UnloadMode parameter to parameter to a non0 zero value Terminate UnloadMode parameter to a zero value
A critical message icon
B C
B
C C
A
AC64
Q_desc In an accounting information system, which of the following types of computer files most likely would be a master file?
AC65 BC 113 BC 114 BC 114 BC 115 BC 116 BC 116 BC 117 BC 117 BC 118 BC 118 BC 119 BC 119 BC 12 BC 120 BC 120 BC 121 BC 122 BC 123 BC 124 BC 125 BC 126 BC 128 BC 129 BC 13 BC 130 BC 133 BC 134 BC 135 BC 136 BC 137 BC 138 BC 14
Which of the following is an advantage of a computer-based system for transaction processing over a manual system? A computer-based system: Which of the following is not the component of a CPU A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The following is an information not found in the trailer label Hard copy is a term used to describe...? What do the abbreviations VAB stand for What control would prevent the accidental erasure of customer information from a magnetic tape What are the individual dots which make up a picture on the monitor screen called? Header label normally include all the following except the A daisy wheel is a type of...? Which approach or technique is a control usually associated with microcomputers An impact printer creates characters by using...? The best security control in a microcomputer environment is to What would you NOT use with a flatbed plotter? What do you need for an ink jet printer? The greatest control exposure in a microcomputer environment is the lack of What do you need for an ink jet printer? A laser printer does NOT use? The amount of data that a disk may contain is known as the disks...? You can ________ protect a floppy disk. Information on a hard disk is usually backed-up using a...? Magnetic tape is a...? Hard disks can have a storage capacity in the region of...? Which storage device has the largest capacity in Mb? Which storage device cannot be erased? You can ________ protect a floppy disk Where should floppy disks be stored? The contents of these chips are lost when the computer is switched off? What are responsible for storing permanent data and instructions? Which parts of the computer perform arithmetic calculations? What are small high speed memory units used for storing temporary results? How many bits of information can each memory cell in a computer chip hold? What type of computer chips are said to be volatile? Magnetic tape is a...?
BC 14
Software can be divided into two areas:
BC 140 BC 141 BC 142 BC 143 BC 144 BC 145 BC 146
Travel agents use this computer system when reserving flights Which computers are used in the weather forecasting industry? Vacuum tube based electronic computers are...? Which generation of computer was developed from microchips? Which generation of computer uses more than one microprocessor? Which generation of computer developed using integrated circuits? Which generation of computer developed using solid state components?
BC 147
Name three steps involved in developing an information system
BC 148
How do you define analysis of an information system?
BC 149 BC 15 BC 15
What areas need to be considered in the SOFTWARE design process? What is the function of systems software? Formatting a disk results in all the data being...?
BC 151
What is Direct Implementation?
BC 152
What is parallel running?
BC 153
What documents are produced during the development of a system?
BC 154
What are User Guides are used for?
BC 16 BC 16
Systems software can be categorised into: Which storage device cannot be erased?
BC 17
Application software are programs that are written
BC 17 BC 170 BC 18
Which bus carries information between processors and peripherals? Convert the decimal number 2989 to Hexadecimal Which bus controls the sequencing of read/write operations?
BC 183 BC 184 BC 185 BC 186 BC 187 BC 188 BC 189 BC 19 BC 190 BC 191
What are utilities? Numbers are stored and transmitted inside a computer in The original ASCII codes A Nibble corresponds to A gigabyte represents A 32-bit processor has A parity bit is he contents of these chips are lost when the computer is switched off? Clock speed is measured in Cache memory enhances
BC 192 BC 20
CISC machines Which parts of the computer perform arithmetic calculations?
BC 200 BC 201 BC 202 BC 203
Every data from the primary memory will be erased if An RS-232 interface is For print quality you would expect best results from ROM
BC 204
A UPS
BC 206 BC 207
smart card Laptop computers use
BC 208
Multiprogramming refers to
BC 209 BC 21 BC 21
Multitasking refers to What are small high speed memory units used for storing temporary results? A good way to exchange information that changes rapidly is through
BC 210 BC 211
Multiprogramming is a prerequisite for Timesharing is the same as
BC 212
Virtual memory is
BC 213 BC 22
Multiprocessing is To help keep sensitive computer-based information confidential, the user should
BC 22 BC 228 BC 229 BC 23
What is the function of a disk drive? A 4GL is A nanosecond is What small, hand-held device is used to move the cursor to a specific location on the screen?
BC 230
The memory address register is used to store
BC 231
The memory data register is used to store
BC 232 BC 24 BC 25 BC 26 BC 27 BC 28 BC 28
The instruction register stores Which of the following is used to indicate the location on the computer monitor? A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate data. Which of the following translates a program written in high-level language into machine language for execution? Detecting errors in real memory is a function of To find where a file has been saved on disk, the user should A series of instructions telling the computer how to process data or files is defined as a
BC 29 BC 29 BC 30 BC 31 BC 32 BC 32 BC 33 BC 34 BC 35 BC 36 BC 37
To ensure that data is not lost if a computer system fails, the user should Having a single CPU alternatively process tasks entered from multiple terminals is called The place in the CPU where the data and programs are temporarily stored during processing is called the All are examples of computer software except Computer manufactures are now installing software programs permanently inside the computer. It is known as Which of the following file organisation forms most efficiently allows access to a record The part of the computer system controlling data manipulation is called the For direct access storage devices the recording area is divided into The data hierarchy from the largest to the smallest is Which of the following hardware or software system controls provides a detailed record of all activities performed by a computer system Which one of the following parts of a computer is necessary to enable it to play music?
BC 37 BC 38
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes of sound and 1 minute of video. Which of the four different media listed takes up most space on the CD-ROM? Which one of the following printers is suitable for printing sprocket fed carbon copies?
BC 38 BC 39 BC 40 BC 41 BC 42 BC 43 BC 44 BC 45 BC 46 BC 47
Multimedia software can be most productively used for To be effective a virus checker should be Which one of the following software applications would be the MOST appropriate for performing numerical and statistical calculations? Passwords enable users to 12. How many bytes do 4 Kilobytes represent? Back up of the data files will help to prevent Which one of the following is the MOST common internet protocol? The advantage of a PC network is that The term A:\ refers to UPS stands for
BC 48 BC 48
The main problem associated with uninstalling software is that You are conducting research for a Income Tax assignment. The raw facts you collect are called
BC 484
A flow chart is the
BC 485 BC 49 BC 491 BC 492
A voucher entry in Tally is done for Passwords are applied to files in order to Each of the following is an enabler of IT-business alignment except: The basic systems model is used to describe virtually all information systems and it consists of the following elements:
BC 494 BC 499 BC 50 BC 506 BC 51
What is a computer-aided design system? A(n) __________ offers a solution package for an entire industry. File extensions are used in order to Information systems controls include all of the following EXCEPT: Hashing for disk files is called
BC 52 BC 53 BC 53 BC 54
Components of expert systems include: a) inference engine; b) user interface; c) knowledge base; d) fuzzy logic Black box testing and white box testing are part of: What is the term used to describe the point of interaction between a computer and any other entity, such as a printer or human operator? The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility
BC 54 BC 55 BC 555 BC 56 BC 57 BC 58 BC 59 BC 60 BC 60 BC 60 BC 61
Which of the following is an acceptable way to shut down the computer? Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot remember where you saved them. Which is the best way to locate the files? Components of an information system model are: a) applications architecture; b) functional architecture; c) technology architecture; d) information architecture Benchmarks form part of: Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals Which is not part of help desk documentation: Testing of individual modules is known as: Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface architecture; d) presentation architecture Which is part of installation testing: The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a set of instructions provided by the: Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio
BC 61 BC 62 BC 63 BC 64 BC 65
Which of the following procedures should be included in the disaster recovery plan for an Information Technology department? Designing relationships among components is part of: Several Computers connected together is called: Which network topology uses a Hub? Which of the following topologies is used for Ethernet?
BC 66 BC 67
Application software are programs Which type of file search method requires a computer first read all locations preceding the desired one Which of the following areas of responsibility are normally assigned to a systems programmer in a computer system environment? Which of the following is recommended when many searches for data are required
BC 67 BC 68
BC 69
It is unlikely that a magnetic tape containing several thousand blocked records can be used on two machines of different architecture directly because
BC 70 BC 71
Which component of the CPU has the most influence on its cost versus performance Which of the following terms applies to network used to connect computers with other computers, peripherals and workstations that are in fairly close proximity
BC 72 BC 73
Intelligent terminals differ from dumb terminals in that they A computer is to be linked to 8 terminals using a single communication link. To permit simultaneous terminal operations, communication path will require which of the following
BC 74 BC 75 BC 76 BC 77 BC 78 BC 79
A modem is a device that A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and printers. This type of network is called a A computer based system for sending, forwarding, receiving and storing messages is called an If a workstation contains a processor, monitor, screen manipulation device, printer, storage and communication capabilities, it is said to be Terminal hardware controls include RS-232 is a
BC 79
What is a compiler?
BC 80 BC 80
What are the stages in the compilation process? Which of the following is not a data transmission coding scheme
BC 81 BC 81 BC 82
What is the definition of an interpreter? A device used in data communications to divide a transmission signal into several sub-bands is known as a Third generation languages such as COBOL, C, and FORTRAN are referred to as
BC 82 BC 83
Serial Communication is used over long distance because it In what areas is the COBOL programming language used?
BC 83
The primary function of a front-end processor is to
BC 84 BC 84
What is the first stage in program development? Which of the following is not used for data transmission within a local area network
BC 85 BC 85
What is System Analysis? A device to device hardware communication link is called
BC 86 BC 86 BC 87 BC 87 BC 88 BC 88 BC 89 BC 89 BC 9 BC 90 BC 90 BC 91 BC 91 BC 92 BC 92 BC 93 BC 93 BC 94 BC 94
What will a good software provider consider? The topology of a network can be each of the following except What is the 8-bit binary value of the decimal number 85? Which is the most common data transmission error checking method What is the decimal value of the binary number 1111? Which of the following devices merges communication signals onto a single line What is the decimal value of the octal number 215? Which tool is used to help an organization build and use business intelligence? Cache memory enhances What is the decimal value of the hexadecimal number FF? Numbers are stored and transmitted inside a computer in What is the hexadecimal value of the decimal number 1476? A byte corresponds to What does EBCDIC coding of numbers mean? A Kb corresponds to What is the binary sum of 01011 and 00101? Information is stored and transmitted inside a computer in Where would you find the letters QWERTY? A parity bit is
BC 95 BC 95 BC 96 BC 96 BC 97 BC 97 BC 98
How did the computer mouse get its name? Clock speed is measured in What are you most likely to use when playing a computer game? CPU performance may be measured in A digitising tablet can be used for? In processing cheques which of the following I/O techniques have banks traditionally used Which of the following is a pointing device used for computer input?
BC 98 BC 99 BC 99 BC01
A UPS What does a light pen contain? The capacity of a 3.5” floppy is around What general term describes the physical equipment of a computer system, such as its video screen, keyboard, and storage devices?
BC02 BC03 BC04 BC05 BC06 BC07 BC08 BC09 BC10 BC100 BC100 BC101 BC101 BC102 BC102
Where would you find the letters QUERTY? What are you most likely to use when playing a computer game? A digitising tablet can be used for? Which of the following is a pointing device used for computer input? What input device could tell you the price of a product Where would you find a magnetic strip? Hard copy is a term used to describe...? What are the individual dots which make up a picture on the monitor screen Called A daisy wheel is a type of...? What input device can be used for marking a multiple-choice test? Laptop computers use QWERTY is used with reference to What input device could tell you the price of a bar of chocolate? A GUI is Where would you find a magnetic strip?
BC103
Multiprogramming refers to
BC104
Multitasking refers to
BC105 BC105 BC106 BC106 BC107
Multiprogramming is a prerequisite for UNIVAC Computer belongs to the Timesharing is the same as Name the first Indian Super Computer? Disk fragmentation The technology which is used to check answer sheets of multiple-choice questions in civil services or similar examinations is: A compiler is Which printer among the following is fastest “Zipping” a file means
BC107 BC108 BC108 BC109
BC109 BC11 BC110 BC111
What does acronym VIRUS stands for An impact printer creates characters by using...? A client-server system is based on A nanosecond is
BC112 BC113
The memory address register is used to store Inefficient usage of excess computer equipment can be controlled by
BC115 BS 319 CA 486 CA 487 CA 488 CA 489 CA 490 DB 01 DB 02
A procedural control used to minimize the possibility of data or program file destruction through operator error is the use of A predefined computational task is referred to as a(n): Which of the following is not the feature of GAPs Which is the example of CAATs In audit procedures, test data is Which of the following is not the use of CAATs Which of the following are called explicitly by another procedure? What term applies to a collection of related records in a database? All of the following terms are related to computerized databases except which one?
DB 03 DB 04 DB 05 DB 06 DB 07
What is a database? What does a record contain? An RDBMS is a Data Warehousing refers to Unauthorised alteration of on-line records can be prevented by employing
DB 10 DB 11
What is a database? What does a record contain?
DB 12 DB 13
What is a report? What is the best way to analyse and change data
DB 18
What are some popular office orientated software applications?
DB 19 DB 20 DB 226
Which of the following constraints can be used to enforce the uniqueness of rows in a table? Which of the following commands is used to change the structure of table? An RDBMS is a
DB 227
DB 235
Data Warehousing refers to You are creating a client application that calls ActiveX DLLs. Which of the following properties of the Err object provides the name of a component that sends an error back to the client application?
DB 24 DB 26 DB 27 DB 30 DB 365
This database holds personal information. The user can help to keep it confidential by If the database holds customer names and addresses, personalised letters can be created automatically using Application software suited to storing the survey information obtained in the table would be The characters * and ? are sometimes used in search criteria as Which of the following field types will generate the primary key automatically?
DB 366 DB 367
Referential integrity ensures that the: Tables are related to one another through a:
DB 368
DB 369 DB 370
A foreign key is: You are creating a banking database to track customer loans. The bank will, of course, have many customers, each of whom may take out one or more loans, while each loan may be associated with only one customer (there are no joint accounts). What is the re In a one-to-many relationship between Companies and Employees, which field is found in both tables? Which of the following ensures that records in related tables are consistent with one another? For example, it ensures that you cannot add a record with an invalid foreign key.
DB 371
DB 372
How would you delete a relationship between tables in the Relationships window?
DB 373
In a Customers tables, what does a plus sign next to the CustomerID field mean?
DB 374
What is required of the fields that join two tables?
DB 375
Assume a one-to-many relationship between the Customers table and the Loans table, with referential integrity in effect. What happens when you attempt to delete a customer ID from the Customer table that still has entries in the Loans table?
DB 376
Which of the following is true when viewing a main form and its associated subform in the Form Design view?
DB 377
Which of the following relationships does not belong in a database based on a professional sports league such as football or basketball?
DB 378
Which symbol is used at the end of the join line in a related table to signify the “many” side of a one-to-many relationship?
DB 379 DB 380 DB 381
You have created a one-to-many relationship with referential integrity between a Customers table and a Loans table. From which table can you delete a record? The correct order of the arguments for the MsgBox statement is: The first statement in a procedure named CreateList is:
DB 393 DB 394
Which of the following is TRUE related to form fields? A text field:
DB 401 DB 402 DB 403
The purpose of a database is to: A database stores: A database records:
DB 404
A sales contact manager used by a salesperson is an example of _______________
DB 405 DB 407 DB 408 DB 409
A Customer Resource Management (CRM) system is an example of_________ The industry standard supported by all major DBMSs that allows tables to be joined together is called __________. A program whose job is to create, process and administer databases is called the _____ Microsoft Access may use which of the following DBMS engines?
DB 410
Which of the following are basic components of an enterprise-class database system?
DB 411 DB 412
In an enterprise-class database system ________ . In an enterprise-class database system, the database application ___ .
DB 413
In an enterprise-class database system, reports are created by ____________________ .
DB 414 DB 415 DB 416 DB 417
A database is considered "self-describing" because _______ . In an enterprise-class database system, the database _________ . A database may contain _________________________ . A database designed using spreadsheets from the Sales department is a database being designed _________________________ .
DB 418 DB 419 DB 420 DB 421 DB 422 DB 423 DB 424
A database designed to implement requirements for a reporting application needed by the Sales department is a database being designed _______ . A database designed to combine two databases used by the Sales department is a database being designed _________________________ . Database professionals use ________________ as specific data sources for studies and analyses. Database professionals use a set of principles called ________________ to guide and assess database design. A very popular development technique used by database professionals for database design is known as _______________________ . A very popular development technique used by database professionals to adopt a database design to new or changing requirement is known as _____ . The predecessor(s) of database processing was (were) __________ .
DB 425 DB 426 DB 427 DB 428 DB 429 DB 430 DB 431
In a relation __________________________ . An attribute is also known as a(n) . A combination of one or more columns used to identify particular rows in a is___ . A combination of two or more columns used to identify particular rows in a relation is________ . A determinant that determines all the other columns in a relation is______ . When designing a database, one of the candidate keys in a relation is selected as the _________ . Normalization is a process used to deal with which of the following modification anomalies?
DB 432
When you are given a set of tables and asked to create a database to store their data, the first step is to ____ .
DB 433
Modern microcomputer personal DBMS products______.
DB 434
DB 435
DB 436
Which of the following are true about data mining applications? We have obtained access to the company's operational data. We examine 50 records for customers with phone numbers that should use the current area code of 345. Of these 50 records, we find 10 that still use an older area code of 567. This is an example We have obtained access to the company's operational data. We have been asked to produce a report with an item by item analysis of sales, but the only sales figure available is the total sale value for each order. This is example of_____
DB 437 DB 463 DB 464
A data warehouse database differs from an operational database because: Which of the following objects is used to display a menu? Which of the following objects are NOT found in an Access application?
DB 465
You are developing an Access application that you expect to upgrade periodically. Which of the following statements is TRUE?
DB 466 DB 467
Which of the following statements regarding Access applications is NOT true? Which of the following brings a copy of the table into the current database and does not maintain a tie to the original table?
DB 469 DB 470
What makes a database an application? What is the Access tool that is used to create the user interface?
DB 503 DS 279 DS 59 DS 62
The purpose of a data warehouse is to: ____________ is the art of protecting information by transforming it into an unreadable format. Which of the following activities would most likely detect computer-related fraud? A digital signature is used primarily to determine that a message is:
DS 63 DS 66 EC 103 EC 301
What is a major disadvantage to using a private key to encrypt data? Which of the following risks can be minimized by requiring all employees accessing the information system to use passwords? The most beneficial advantage of ERP system is What is the term that describes spying on one‟s business rivals to gain a competitive advantage?
EC 302
What would you NOT be looking for when spying on a competitor?
EC 406 EC 51
An online drugstore such as Drugstore.com is an example of_______ Which of the following is an example of unacceptable online „netiquette‟?
EC 58 EX 1 EX 10
Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system? On an Excel sheet the active cell is indicated by… Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of cells A6, A7, and A8 are _____.
EX 11 EX 12
If a cell shows ####### , it means that _____. Which is not an advantage of using computerized spreadsheets? The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. The use inputs different weights or amounts of exercise to determine the related physical fitness. This "What if" program is most likely which of the followin The difference between the highest and the lowest values. Spreadsheets can be used for...
EX 13 EX 14 EX 15
EX 2 EX 3 EX 320 EX 321 EX 322 EX 323 EX 324 EX 325
To select a column the easiest method is to … If you press _____, the cell accepts your typing as its contents. The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as All of the following are considered constants EXCEPT: Which of the following may NOT be included in a formula? Which of the following is NOT a valid mathematical operator in Excel? Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first? Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?
EX 326
How can you tell which cell in a worksheet is the active cell?
EX 327
How can you change the active cell?
EX 328
Which of the following would you use to change the font size of a cell in Excel?
EX 330 EX 331 EX 332 EX 333 EX 334
The command that will save the current workbook with a different file type is: The command that will print an Excel workbook is found on the ____________ menu. In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the date and time a file was last modified. Which of the following commands will automatically adjust cell references in formulas? Which of the following commands will remove cells, rows, or columns from a worksheet?
EX 335 EX 336 EX 337 EX 338 EX 339 EX 340 EX 341 EX 342 EX 343 EX 344 EX 345 EX 346
Which of the following options is NOT controlled through the Page Setup command? Which command enables you to change the margins for a printed worksheet? All commands are carried out on a rectangular groups of cells known as a: Which of the following is a valid cell range? In a copy operation, the cell(s) you are copying from is called the: In a copy operation, the cell(s) you are copying to is called the: Which of the following commands is needed to duplicate the contents of a cell in another? A cell reference that does not change during a copy operation is known as Which of the following is considered an absolute cell reference? Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Which of the following commands is needed to transfer the contents of one cell range to another?
EX 347 EX 352
The F4 key is used to: Which of the following quickly copies the formatting of a selected cell to other cells?
EX 353
Which of the following will insert a hyperlink into an Excel worksheet?
EX 354
Conditional formatting applies formatting to a cell based on:
EX 358
If you enter a date into a cell, Excel stores the date as: You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened that worksheet again on August 31. What will be displayed in cell E17 on August 31?
EX 361
EX 362 EX 363
The number of days between two cells containing dates can be calculated by: The function key that is used to quickly edit the contents of a cell is:
EX 364
What will be stored in a cell if 3/4 is entered in it?
EX 384 EX 4
EX 42 EX 43
A user‟s response to the InputBox function can be stored in: The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is _____. The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test. To find the student with the highest mark, which of the following functions should be used? Which chart type best shows proportions of a whole?
EX 462 EX 5
EX 52 EX 57 EX 6 EX 6
Which of the following is TRUE regarding chart types? To select several cells or ranges that are not touching each other, you would _____ while selecting. Your Institute teachers have set an assignment on „Studies‟. You are required to use a spreadsheet to record all that you study on each day for four weeks. You decide to show each week‟s data with an accompanying graph. What is the best way of doing this What would be the best method to quickly copy the formula from the active cell to each cell below it? To arrange rows in alphabetical order based on column A, you need to use the command _____. What can you NOT do with a spreadsheet?
EX 7 EX 7 EX 8 EX 8 EX 9 EX9. IN 01 IN 02 IN 03 IN 04 IN 05 IN 06 IN 07 IN 08 IN 09 IN 10 IN 104 IN 11 IN 110 IN 111 IN 112 IN 12
To print just part of a sheet, you would select what you want to print and _____ . Spreadsheets can be used for... The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is _____. Which of the functions is not valid for performing addition The default orientation for the printed page is _____. Which is not a valid cell address? Which of the following best describes uploading information? A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time, expressed in bits per second. The act of searching through storage to locate information without necessarily knowing of the existence of the information being sought. The principles, means and methods for rendering information unintelligible and for restoring encrypted information to intelligible form. A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt an decrypt messages and conversations. Protected/private character string used to authenticate an identity or to authorize access to data. The successful act of bypassing security mechanisms of the system. A set of rules and formats, semantic and syntactic, that permits entities to exchange information. An attempt to get access to a system by posing to be an authorised person. An action or event that might prejudice security. According to information Technology Act, 2000, To investigate contraventions the controller of certifying authority shall exercise the like powers to that of Malicious software. None the person who is known as father of Internet This website is the biggest bookstore on the earth. When we talk of Data Transmission modes, then ATM stands for A sequence of bits or characters that identifies the destination and the source of a transmission.
IN 13
The means of communicating between networks A group of computers and other devices dispersed over a relatively limited area and connected by communication links that enable a device to interact with any other on the network. The term HTTP stands for A NIC is considered as A hub is a device that can connect
IN 14 IN 15 IN 155 IN 156
IN 157 IN 158 IN 159 IN 16 IN 160 IN 161 IN 162 IN 163 IN 164
Which of the following is true concerning the function of a switch? What do routers connect? What does a router route? Software which prevents external access to a system is termed If four computers are connected to a hub and then to the internet, how many IP addresses are required for these 5 devices? Which of the following in an OSI layer When creating a network from just two PCs, what kind of cable would be used to connect them? An IP address is a To construct a simple LAN of 4 computers, you would connect them with ______connect them
IN 165 IN 166 IN 167 IN 168 IN 169
What happens to data that is ruined before reaching to receiver Bluetooth is Which is not one of the recognized IEEE sub layers? The most preferred number system to represent a IP address is A MAC address is of
IN 17
Protocol is A ............... is a LAN-based computer with software that acts as a controlling device for controlling access to at least part, if not all, of a local area network and its available resources.
IN 172
IN 173 IN 174 IN 175 IN 176 IN 177 IN 178 IN 179
What is the biggest disadvantage of the Ring topology? The .............. of the network concerns how network devices are physically (or optically) interconnected. The principal topologies used with LANs are: What are the various types of bus architecture? What are the various types of ring architecture? In a ................., each workstation attaches to a common backplane via its own physical cable that terminates at the hub In a ............... , each work station is directly connected to a common communications channel
IN 18 IN 180 IN 181 IN 182 IN 194 IN 195 IN 196 IN 197 IN 198 IN 20
Which one of the following is NOT a network topology? In a .............. , the cable system forms a loop with workstations attached at various intervals around the loop The Media Access Control (MAC) is a sub layer of the: What are the most common LAN technologies used in networking today? Modem speeds are measured in LAN speeds are measured in WAN speeds are Accessing the Internet from a typical home PC requires the use of To use the Internet, you The worldwide web server uses the following standard interface to act as the middleware:
IN 205 IN 21 IN 214
An NIC Accessing the Internet from a typical home PC requires the use of The most widely used network operating system on PC LANs is
IN 218
JPEG and MPEG
IN 22 IN 220 IN 221
To use the Internet you A multiplexer is a form of An ISP
IN 222 IN 223
FTP is Telnet
IN 224 IN 225 IN 23 IN 23 IN 24
A firewall is A proxy server is A search engine is To look for information about interest areas on the internet, the user should use a An ISP
IN 25
FTP is
IN 26
Telnet
IN 267
Which of the following is a true statement about the OSI model layers?
IN 268 IN 269
Which of the following is NOT true about the Internet? The traditional intent and impact of this common type of attack is to prevent or impair the legitimate use of network resources.
IN 27 IN 270 IN 272 IN 273 IN 28 IN 285
A firewall is Which of the following is NOT an example of a DoS attack that is popular among hackers? A ____________ attack is when a hacker sends a continuous flow of packets to a system. One defense option on a large network is to configure a ____________ to disallow any external traffic. A proxy server is Which of the following would be performed on a network server and not normally on individual workstations?
IN 288 IN 29
What can be said about the safety of the Internet? To secure communication network against wire-tapping the most effective control is
IN 290 IN 297 IN 298
One way that a virus CANNOT spread throughout a network is: Which of the following is NOT a means of monitoring employee use of company technology? ____________ would be used by parents to monitor their children on their home system. The formal rules and parameters which are established to permit a microcomputer to communicate with the mainframe computer as though it was a terminal of the mainframe are called The two most common tools used to help with extracting information are:
IN 30 IN 304
IN 306 IN 307
Which of the following would NOT be considered an example of cyber terrorism? Which of the following would be a form of cyber terrorism? Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life?
IN 308
IN 31
An organisation is upgrading its telecommunication lines. Which is the least important objective while upgradation
IN 31 IN 310 IN 312 IN 313
A company posts a price list of its products on its website. The advantage to the customer is that the company can Which of the following is an easy-to-use service to get information on someone? Which of the following pieces of information would NOT be found online? Which of the following is the most common danger on the Internet?
IN 314 IN 315 IN 316 IN 317 IN 318 IN 32 IN 33 IN 33 IN 34 IN 348 IN 349 IN 35 IN 350 IN 351
The famous Nigerian Fraud scam offered victims the opportunity to: The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called _________________. Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called: Setting your privacy settings in Internet Explorer to medium is one way to block: What is the best means of protection from cyber stalking? Which of the following is not an appropriate control over telecommunications software Encryption techniques can be implemented in Hardware-Software Which protocol would be used to download a free anti-virus program from the Internet? The major advantage of the checksum program is when it Which of the following is a Web browser? A Web page is another name for ----------Domain names must contain a description of the type of organisation that the domain represents. A very common abbreviation used include: A standard language for creating and formatting Web documents is: The Web page format in which all elements of a Web page are saved as one file is called:
IN 359
Which of the following requires an Internet connection?
IN 36 IN 360
Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer how would he do this? Which of the following is used to update a Web query? You download from the internet, a screensaver, a ten-second sound file and a ten-second music video clip. You also add a hyperlink. Which of the media elements has the greatest effect on the file size? When saving a photograph for use on a website, which format should you choose? While researching the Direct taxes assignment, you find a useful website. What is the most efficient way to access the site at a later time? A system that uses the Internet for business-to-business interaction is called a(n):
IN 45 IN 47
IN 49 IN 493
IN 50 IN 501
A block of text automatically added to the end of an outgoing email is called _________ refers to the use of Internet technologies for placing telephone calls. Most client/server applications operate on a three-tiered architecture consisting of which of the following layers? Which do you NOT need to connect to the Internet? What does FTP stand for?
IN 68 IN 69 IN 70
IN 71 IN 72. IN 73. IN 74. IN 75. IN 76 IN 77
What is the purpose of DNS? Which of the following is NOT a properly formatted IP address? Which of the following is a properly formatted email address? The Internet is controlled by whom? What does IRC stand for? If you do not pick up your email for a week...? What does HTML stand for?
IN 78 OS 01 OS 127 OS 131 OS 132 OS 139 OS 193 OS 199 OS 215 OS 216
What is a disadvantage of joining a mailing list? Which of the following computer software is designed to direct and assist the execution of application programs Formatting a disk results in all the data being...? Which bus carries information between processors and peripherals? Which bus controls the sequencing of read/write operations? Which computers use single chip processors? CPU performance may be measured in In processing cheques which of the following I/O techniques have banks traditionally used Disk fragmentation A compiler is
OS 217 OS 219 OS 233 OS 234
An interpreter is “Zipping” a file means An assembly language program is translated to machine code by Which of the following is not part of the processor
OS 236 OS 238
If the Cancel Error Property of the CommonDialog Box is set to true then which of the following statement is true: __________ control defaults to displaying the files in the current directory:
OS 271 OS 274 OS 275 OS 276 OS 277
A ____________ occurs any time a program writes more information into the temporary space it has allocated in the memory. Assessing a system requires certain common tools. Which of the following is NOT a tool used to assess a system? The ____________________ Web site has a utility that will tell you what software and operating system a Web server is running. When software vendors discover flaws in their software, they usually will write corrections to their code, known as: All ____________ have the option of blocking ports.
OS 278
Which of the following is NOT a characteristic of a firewall? Before shutting a service on an individual machine, which of the following would you always check? At a minimum, which of the following should be implemented under the protection phase? Attacks on your system may be prevented or trapped through the use of: Setting restrictions as to the number of unique passwords to use before a user can recycle them is called a password:
OS 280 OS 281 OS 282 OS 283
OS 284
Which of the following is NOT a step to take in securing a workstation?
OS 286
To prevent a hacker from unauthorized access, what should you do with the administrator account?
OS 287 OS 289
What should be done with old backup tapes and CDs? Which of the following is NOT an example of malware?
OS 291 OS 292
One step you can take to reduce the risk of being infected by a virus is to: Which of the following is NOT a sign that a virus has infected your system?
OS 293 OS 294 OS 295 OS 296
Which of the following is the safest way to protect yourself from e-mail viruses? A ____________ attack causes too much information to be placed into temporary memory space. ____________ gathers user information with the user‟s knowledge. Which of the following is the most common function of spyware?
OS 299
Which of the following is NOT a virus-scanning technique?
OS 300
Which of the following would NOT be a way to protect your system from spyware? For which of the following positions would it be advisable to conduct an extensive background check? Which of the following would you use to open an existing file? The ability to have multiple applications open at the same time is known as:
OS 309 OS 329 OS 355
OS 356 OS 357 OS 396
Which of the following can be changed using the Options command? Which of the following leaves an application open but shrinks the window to a button on the Windows taskbar? Which of the following actions would move a floating toolbar to dock it in a different place?
OS 397
To display a missing or needed toolbar, click the:
OS 399 OS 495 OS 496 OS 497 OS 498 OS 502 OS 504 OS 505 OS239
Which of the following is NOT a true statement regarding password protection? The Linux operating systems is an example of: The Windows operating systems is: Application service providers offer: A(n) _________ offers on-demand software on an as-needed basis to its clients over the web. _________ are systems used to interact with customers and run a business in real time. The most common cause(s) of disaster is (are): A _______ backup site is backup facility consisting of an empty warehouse with all necessary connections for power and communication, but nothing else. To destroy an object and free the memory space occupied by it, the keyword used is:
PP 44
An example of the components of a multimedia presentation could include
PP 442 PP 443
Which of the following formatting elements can be applied to a PowerPoint diagram using the AutoFormat tool? Which of the following formatting elements can be applied to a PowerPoint diagram using the Format AutoShape command?
PP 444
What happens when you double click a blank graph placeholder in a PowerPoint presentation?
PP 445 PP 446
The legend in a Microsoft Graph chart is: Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best chart type if you want to emphasize the total sales of each region?
PP 447
Which of the following actions will enable you to insert a graph into a PowerPoint presentation?
PP 448 PP 449
If you are editing a slide containing a Microsoft Graph, how do you display the underlying datasheet? How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished creating the chart?
PP 450
What happens when you click the Datasheet button on the Microsoft Graph toolbar?
PP 451 PP 452
What happens if you single click a chart that is not currently active? What happens if you double click a chart that is not currently active?
PP 453 PP 454
Using custom animation effects, you can build: Which of the following animation effects can be added to a slide?
PP 455 PP 456
Which of the following animations effects can be added to a slide? Which keyboard key is used to select more than one picture on a slide?
PP 457
Custom animation can be used to affect ONLY:
PP 458 PP 459 PP 46 PP 460
Which of the following best describes the information that appears on the advanced timeline? Which of the following objects can contain custom animation effects? What type of program allows an object within an image to be edited without affecting other objects? Which of the following animation effects can be added to a slide?
PP 461 PP 500
Which of the following is TRUE regarding the Datasheet? Graphical software tools that provide complex analysis of stored data are:
PP438 PP439 VB 237 VB 240 VB 241 VB 242
Which of the following statements is TRUE regarding PowerPoint diagrams? Which keyboard key combination is used to undo the previous command(s)? What is the extension of the Visual Basic project file that stores the design of a user control. Which event of a text box would you use for validating the data entered by the user? Which of the following statements forces inline error handling? The _______ method resets the contents of bound controls to their original values when the user clicks on the cancel button.
VB 243
VB 243 VB 244
To deactivate the Form UnLoad event, you make the following change in the function definiton: To deactivate the Form UnLoad event, you make the following change in the function definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as Integer) To prevent the Form from closing, you will set the: How many root nodes can a TreeView control have?
VB 245
A project group is a Project which: Procedures declared in a _____ are local whereas procedures declared in a ______ are available to the whole application. How can you keep the user from exiting a form by clicking the Close button? The _______ property enables Visual Basic to draw complete images in memory before displaying them on the Screen. You want to display the code and the description of an error. What would be the correct syntax?
VB 246 VB 247 VB 248 VB 249
VB 250 VB 251 VB 252
What is the purpose of the Image List Control? Which method would you use to get a free or unused File identifier while opening any file: Which property procedure is used to retrieve the value of a property?
VB 253 VB 255 VB 256 VB 257 VB 258 VB 259
Which of the following can be shown to the user using the Common Dialog control in VB? Which of the following are not properties of Command Button: Which events enable you to determine which key was pressed by the user? In order to access a file in Non-textual format, you have to open file in: Visual Basic displays information depending upon the current value of two properties of the form, called: Which of the following procedure types will execute when you assign a value to a property of an object? In order to overlap the controls (say a command button) during design time, we use the „Send To Back‟ or „Bring To Front‟ option from the Edit menu. To change it dynamically (i.e.during program execution) we need to change: Which property of the ProgressBar determines how much of the bar is filled? The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program. The caption and the name properties of the command button: You try to initialize a new Object variable with the following line but receive an error. What could be the possible cause? Set MyVar = New Classname Which of the following will perform a direct execution of a Command object? The vb Critical symbol displays: vbYesNo is an example of a(n):
VB 260 VB 261 VB 262 VB 263
VB 264 VB 265 VB 266 VB 382
VB 383
The primary difference between the MsgBox statement and the InputBox function is the:
VB 395 VB254 WO 01 WO 02 WO 03 WO 04
Which of the following is TRUE about a protected form (i.e., a form where the Protect Form button on the Forms toolbar is toggled on and is assumed to remain in that position)? Which event is triggered when the user moves to another open form? Veena is entering a paragraph in a word processing program. When the cursor gets to the end of a line, what is the best way to get the cursor to the next line? How are data organized in a spreadsheet? Which key moves the cursor to the beginning of the next line of text? Veena typed the following sentence: "The girl was very beautiful." In which word processing utility could she find a synonym for "beautiful"?
WO 05 WO 06 WO 07 WO 08 WO 09 WO 1 WO 10 WO 11 WO 12
Using an electronic bulletin board, Seema can do all of the following except which one? Aryan has created a ten-page story, but only wants to print the first two pages. What printer command should he select? What process should be used to recall a document saved previously? Which is used to indent text within a document? Desktop publishing is a more sophisticated form of which of the following types of software? What is a Word Processor used for? What is a picture that is saved on a diskette and can be pasted into a document? What is a Word Processor used for? What basic tools would you find in the Edit menu of a word processor
WO 13
What is a header in a document?
WO 2 WO 25 WO 3
What hardware is essential for a word? The user could take a picture from a magazine and insert it into the document by using a What basic tools would you find in the Edit What command in a word-processing program can be used to change the word „him‟ to „her‟, and also the word „he‟ to „she‟ in the given phrase? “On a cold and still night, the only sound that could be heard was the owl that had ade its home in the nest outs What edit commands would you use to insert a paragraph from one document into another document, while still keeping the paragraph in the first document?
WO 32 WO 34
WO 385
Which of the following statements would NOT be a reason for showing suggested revisions in a Word document without changing the original document?
WO 386
Which statement is NOT true regarding revisions made in a Word document?
WO 387
How are suggested changes entered for review on an initial Word document?
WO 388
Which of the following is TRUE about saving a document using the Versions command?
WO 389
WO 39
What happens when you open a document that has been saved using the Versions command? You have used the word „discover‟ four times in an English essay you have created using a word processing program. You would like to find another word of similar meaning to use instead of „discover‟. Which of the following would you use to do this?
WO 390 WO 391 WO 392
When opening and working with multiple versions of a document, how can you tell which is the most recent version? Various fields are added to a regular document to create a special document called a form through the ____________ toolbar. Which of the following types of fields CANNOT be inserted into a form?
WO 398
Which of the following is TRUE related to editing comments in a Word document?
WO 4
What is a header in a document? In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2. You would like to make this paragraph start on page 2.What would be the best way to do this? Tables in a document help you to easily arrange all of the following EXCEPT: To identify a document, it is helpful to include the file name on each page as a Which of the following tools will copy the formatting of selected text to other places? What is the name of the process of determining the cause of errors in a macro? Drop caps are added to a Word document using the ___________ menu.
WO 40 WO 400 WO 41 WO 440 WO 468 WO 471
WO 472
A reverse in a newsletter is:
WO 473
A pull quote is best emphasized by:
WO 474 WO 475 WO 476
WO 477
Which of the following definitions is CORRECT? Pertaining to newsletters, which of the following cannot be changed using the Columns command dialog box? As related to type size, how many points are there to the inch? Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. The rest of the newsletter has two columns. What is the minimum number of sections in the newsletter?
WO 478 WO 479
Which of the following is NOT correct with respect to page, column, and section breaks? Which of the following would be the most appropriate font for a newsletter headline?
WO 480 WO 481 WO 482
Which of the following is the default Word column width? Assume you are creating a two-column newsletter. Which type size is the most reasonable for the text in the columns? Given the default left and right margins, and ½-inch spacing between columns, the width of each column in a two-column document will be:
WO 483
Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot see any columns on the screen. What is the most likely cause?
WO 484 WO 5 WO 56
While word processing, in which of the following situations would Tom use the "Copy" command? What does a document contain? Before submitting your work you want to find any words spelt incorrectly. Which of the following would you use?
Op1 Inventory subsidiary. Does not require as stringent a set of internal controls. NIC Card Record Count Writing on a hard board Voice activated broadcasting Validity check Coloured spots File Name Printer System Logs Electrically charged ink Restrict physical access A pen A cartridge Separation of duties A cartridge A print head Volume Read Magnetic tape Serial access medium 1.44MB A CD-ROM A CD-ROM Read By a sunny window ROM chips RAM chips ALU CPUs 0 bits RAM chips Serial access medium Network software and security software
Op2 Cash disbursements. Will produce a more accurate set of financial statements. VSAT Identification Number Printed output Voice answer back Boundary protection Pixels Identification number Storage device Physical Security An ink pen Use only unremovable media Paper A drum Centralised function for PC acquisition A drum A laser beam Size Write PAN drive
Op3 Cash receipts.
Op4 A
Ans
Payroll transactions. Eliminates the need to Will be more efficient at reconcile control producing financial accounts and statements. subsidiary ledgers. RAM AGP Card Control totals for one or End-of-file and end-ofmore fields reel code Storing information on the hard disk None of above Visual audio board File protection ring Pixies Reel Number Pointing device Console Log An inked ribbon and print head None of above Limited access files None of above Batch Total None of above Data Dictionary
C B B B C C B D A B C A C A A A C C B A A B C A B C B B A B B A A
None of above Make duplicate copies Require user passwords of files Eraser None of above A ribbon A cassette Centralised function for Distributed policies or PC Disposition procedures A ribbon None of above An INK RIBBON None of above Storage capacity None of above Read and Write None of above Floppy disk None of above A parallel access Random access medium medium None of above 20 GB 700MB None of above A floppy disk Magnetic tape storage None of above A floppy disk Magnetic tape storage None of above Write Read and Write Not By magnet objects RAM chips ROM chips Registers Registers 1 bit ROM chips In a drawer CDROM chips DRAM chips Logic bus Control unit 8 bits CACHE A parallel access Random access medium medium Systems software and application software Business software and games software None of above None of above None of above None of above None of above None of above None of above A selective access medium
None of the above
B
Supercomputer Notebook computers First generation
Personal computer Supercomputers Second generation
Mainframe computer Jon Von Neumann computers Hoover generation Fourth generation Fifth generation Fifth generation Fifth generation Analysis, System Design, and Implementation
None of above None of above None of above None of above None of above None of above None of above
B B A C C B A
Second generation First generation Second generation Third generation Second generation Third generation Second generation Third generation Specification, Design, and Programming, Design, Testing and Testing
None of above
A
Analysis translates program code of a high level language to machine code
Analysis is the loading of programs that perform routines to control peripheral devices Inputs, outputs, file Only hardware and design hardware, and software software To collect data Deleted from the disk Users operate the manual system and computer system at the same time The new system is introduced alongside the existing system Instructions and technical documentation
This involves looking at a system and finding out how information is being handled None of above Maintenance, reliability, and upgradeability None of above None of the above Transferred from the disk
C
B D A
To execute any programs To maintain security Copied from the disk Saved to the disk
Users operate the computer system from a given date
Users operate the manual system
None of above
B
The new system is introduced and users start Users continue operating it operating the old system None of above Log files and temporary files To enable any printer to be connected to the network Network systems and communication services CD-ROM User Guide and technical documentation None of above User guides cover how to run the system, enter data, save, print, etc. None of above Database systems and backup services floppy disk
A
C
For technical support Operating systems and system services Magnetic tape storage To maintain a backup copy of all the information
C
None of the above Hard disk
A B
To do a particular task.
To help someone who is applying for employment None of the above
B
Data bus FDDI Data bus Peripherals that are connected to a computer. binary form were 7 bits 4 bits More than 1000 mega bytes 32 registers used to indicate uppercase letters ROM bits per second memory capacity have fewer instructions than RISC machines ALU Power is switched off a parallel interface line printer is faster to access than RAM
Auto bus BAD Auto bus Operating system routines that execute in supervisor mode. ASCII code form 8 bits 8 bits 1000 kilobytes 32 I/O devices used to detect errors RAM baud memory access time
Address bus TED Address bus Data structures that are part of the kernel of an operating system. decimal form represented 256 characters 16 bits 230 bytes 32 Mb of RAM is the first bit in a byte DRAM bytes secondary storage capacity
Control Bus MAD Control Bus Shells, compilers and other useful system programs. alphanumeric form represented 127 characters 32 bits 1024 bytes a 32-bit bus or 32-bit registers is the last bit in a byte CROM Hertz secondary storage access time use variable size instructions Logic Bus
A B D
D A A A A D B A D B
use more RAM than RISC have medium clock machines speeds Registers Variables Computer is improperly shut down a serial interface dot matrix printer is non-volatile Data is not saved before computer is shut down printer interface ink-jet printer stores more information than RAM
D A
All of the above a modem interface laser printer. is used for cache memory
D B D B
increased the storage capacity of increases the process a computer system speed has more storage is a form of ATM capacity than an ATM card card CRT displays LCD displays having several programs in RAM at the same time multitasking having several the ability to run 2 or softwares running more programs at the same time concurrently ALU Registers brochures magazines
provides backup power in the event of a power cut none of the previous is an access card for a contains a security system microprocessor SSGA displays none of the previous writing programs in multiple languages writing programs in multiple languages Variables CD-ROM to run more than one program at the same time multiuser
C
C B
none of the previous
A
none of the previous Logic Bus e-mail
D B D
multitasking multitasking
an operating system multiprogramming
none of the above none of the previous
C C
related to virtual reality same as multitasking save the file to calculate numbers Uses Cobol 106 sec a keypad data to be transferred to memory data to be transferred to or from memory
a form of ROM same as multiprogramming set up a password to read from or write information to a floppy disk uses Java 103 sec a mouse
a form of VRAM
multiuser make a backup copy
none of the previous D involves using more than one processor at the same time D use a virus protection program B to display information or pictures on a screen B none of the previous. D 109 sec D a message pad an instruction that has been transferred from memory. an instruction that has been transferred from memory the address of the next instruction to be executed a magic marker Data Parity Checker Validation use find and replace Modem B
to print sheets of paper uses C++ 1012 sec a frog
data that has been the address of a transferred from memory memory location the address of a memory location an instruction that has been executed a light pen Program Artificial Intelligence Range checking use the backup facility System
C
data to be transferred to the stack an instruction that has an instruction that been fetched from has been decoded memory a cursor a scroll bar Formula Assembler Memory protection use the directory search tools Network save copies of the file with the same name on the system Multiprocessing ROM Firmware Firmware Sequential Operating System Tracks and Sectors Character, field, database Valid character check Sound card. Algorithm Compiler Parity Checking search each file in turn Program
A
D A B B B A B
use different filenames on keep a record of the system computer failures Time sharing Multiprogramming RAM Word Processor Word Processor Hashed ALU Blocks and Sectors Database, character, record Maintenance diagnostic program CD-ROM Floppy Disk Telephone modem Telephone modem Indexed CPU Files and Tracks File, record, field Systems logs MIDI interface
backup to a secure medium Multiplexing Magnetic Disk Shareware Shareware Random Primary Storage Schema and subschema Element, field, file Parity check Serial interface
D D B C A C B A C C A
Text Laser
Pictures Dot matrix
Sound Ink-jet
Video Drum
D B
viewing an encyclopaedia CD- creating the plans for a ROM. building design. replaced regularly never updated Database get into the system quickly 512 loss of confidentiality TCP/IP access to the internet is quicker a file name Document processor
presenting an order for stock to a warehouse. updated regularly
recording current stock in a supermarket and answering customer queries. A updated once a year C Spreadsheet simplify file structures 8192 loss of data NetBEUI the operating system is easy to use the hard drive D C C D A B D
Graphics package retain confidentiality of make efficient use of time files 1024 4096 duplication of data HTML files can be shared a subdirectory virus infection IPX/SPX printer can do 1000s of pages a day the root directory uninterruptable power supply the system requires a network administrator to uninstall it information.
universal port serial up-line provider service the program executable orphan files can be may not allow it to be left on the system uninstalled data. Graphical representation of logic Purchase, sales, receipt, payments etc. assist in maintenance senior executive support for IT. input. The use of computers to design state-of-theart, high-quality products. specialist or functional name the file documents.
uniform page source C the system always requires a re-boot and defrag afterwards A text. A
Rules writte in procedural Logical Steps in any language language
None of the above
A
To fill the log register speed up access IT management lacks leadership. output.
It is mandatory in tally prevent unauthorised access IT understands the business processing.
None of the bove allow encryption None of the above All of the above
A C B D
Using computers to do architecture. Application Service Provider ensure the filename is not lost
Software that generates innovated designs and artistic patterns. None of the above enterprise identify the file corrective controls. dynamic hashing local identify the file type All of the above are parts of IS controls. extensible hashing
A B D D A
preventive controls. detective controls. external hashing static hashing
A: (a) , (b), (d) B: (a) to (d) corrective controls preventive controls Component (a), (c), (d) Press the reset button. Create the files again. (a), (c), (d) detective controls (a), (c), (d) problem logging unit testing (b), (c), (d) Interface (b), (c), (d) Turn the computer off at the power point. Ask the person next to you. (a), (b), (c) organisational controls (a), (b), (c) call lights data testing (a), (b), (d)
C: (a), (b), (c) detective controls Settings (a) to (d)
D: (b), (c), (d) general controls Control
C C B C
(a), (b), (c) Pull the power cord Select the „Shut Down‟ from the back of the option from a menu. computer. Use the Find or Search Put your hand up and feature. ask the teacher (a) to (d) preventive controls (a) to (d) program change requests thread testing (a), (b), (c) parallel operations Concentrator. (a), (b), (c) (b), (c), (d) corrective controls (b), (c), (d) resolution procedures loop testing (a) to (d) system walkthroughs Job control language. (a), (c), (d)
C C C C C C A D B D A
benchmark testing specifications matching Multiplexer. (a) to (d) Replacement personal computers for user departments. architectural design Client-server Star Star To maintain a backup copy of are written all the information Direct Systems analysis and applications programming. A sequential file on a disk Tapes can only be read by the machine on which they are written Peripheral processors. (b), (c), (d)
Identification of critical applications. interface design Client Bus Bus To do a particular job such as editing, storing information Sequential Data communications hardware and software.
Physical security of warehouse facilities. procedural design Computer network Mesh Ring
Cross-training of operating personnel. data design Hub Ring All of the above
B A C A D
To help someone who is To Store data in an applying for employment organised manner Binary Indexed
B B
Operating systems and compilers. Computer operations. C A direct access file on a A direct access file on A sequential file on a tape disk a tape C Information formats commonly vary between Data record can never architectures be blocked together C
Parity errors will result
Data path part Distributed systems
Control Unit Local Area network
Address calculation part Input output channel Wide area network
A
Protocol B Are required with a Can send data to a Use the computer to microprocessor which computer and which they are connected Generally require a permits some data receive data from a to perform all processing keyboard for data entry processing such as computer operations and a CRT for display input validation D Time sharing Mixer Modem Multiplexor computer C Allows computer signals to be send over a telephone Aids in back-up Speeds up online line procedures Packs data in a disk file printing A Planetary network Ring Network Loop Network Star Network Instant post-office A mainframe PC D C B C D
Office Automation Executor systems Electronic mailing A dumb workstation An intelligent workstation A personal computer Time of day control locks Encryption algorithms Parity checks Type of cable A compiler does a conversion line by line as the program is run Feasibility study, system design, and testing CRC Terminal Standard A compiler converts the whole of a higher level program code into machine code in one step Implementation and documentation Baudot
All of them Device interconnect Communication protocol standard A compiler is a general purpose language providing very efficient execution Lexical analysis, CONVERSION, and code generation ASCII
None of the above
B
None of the above EBCDIC
D A
An interpreter does the conversion line An interpreter is a by line as the representation of the program is run system being designed Modem High-level languages It is faster than parallel communication Financial sector and engineering Communicate with the console operator Demodulator Middle-level languages
An interpreter is a general purpose language providing very efficient execution None of the above Frequency division Time Division multiplexor Multiplexor Low-level languages It is less prone to attenuation Accounting systems, commercial sector Relieve the main CPU of repetitive communication tasks None of the above
A C C
It is less error prone Graphic design and education Manage the paging function in a virtual environment
Uses only one path None of the above Reduce competition between the input/output devices
D C
C
Specification and design Fiber Optics The design of the screen the user will see and use to enter or display data A cache The different types of network to be used Star 10101010 Parity 15 Port 327 Data warehouse memory capacity 30 binary form 4C5 4 bits Basic Coding Description 1024 bits 10000 binary form Mouse used to indicate uppercase letters Because it squeaks when moved bits per second Touch screen BPS Printing letters OCR Touch screen
System Analysis Coaxial Cable
Testing Common carrier System Analysis involves creating a formal model of the problem to be solved A buffer Hardware, Software and size of program. Ring 1010101 Cyclic Redundancy 64 Multiplexor 97 Data management systems secondary storage capacity 256 decimal form 5C4 16 bits Bit Code Design 210 bits 1110 decimal form Numeric Keypad is the first bit in a byte
None of the above Telephone Lines
B C
System Analysis defines the format and type of data the program will use An interface Testing to check for errors before the system is introduced Packet 1100101 Retransmission 4 Modem 141 Data Mining tools memory access time 255 ASCII code form 1B7 8 bits Binary Coded Decimal 1000 bytes 1112 ASCII code form Keyboard used to detect errors
None of the above An online protocol
C B
None of the above Bus None of the above Hash Count None of the above Acoustic coupler None of the above All of them secondary storage access time None of the above alphanumeric form None of the above 32 bits None of the above 210 bytes None of the above alphanumeric form None of the above is the last bit in a byte
B B C A A C B B B B A A B D A A A A B
Its moves like a mouse baud Light pen MIPS Tracing diagrams MICR Hard disk
It has ears bytes Joystick MHz Reading bar codes barcode scanning CD-ROM drive
None of the above Hertz None of the above VLSI None of the above voice recognition None of the above
D D C B B B A
increased the storage capacity of increases the process a computer system speed Refillable ink 100K hardware Pencil lead 1.44 Mb software
provides backup power in the event of a power cut none of the previous Light sensitive elements None of the above 5 Mb 1 Gb output input
C C B A
Mouse Touch screen Printing letters Touch screen Mouse Credit card Writing on a hard board Coloured spots Printer Mouse CRT displays screen layout Mouse hardware Credit card having several programs in RAM at the same time having several programs in RAM at the same time
Keyboard Light pen Tracing Diagrams Hard disk Bar code reader Mouse Printed output Pixels Storage device Bar code reader LCD displays mouse button layout Bar code reader language interpreter Speakers
Numeric Keypad Joystick Reading Bar Codes Keyboard Optical mark reader Speakers Storing information on the hard disk Pixies Pointing device Optical mark reader SSGA displays keyboard layout Optical mark reader software interface Smart card writing programs in multiple languages writing programs in multiple languages To run more than one program at the same time Third - generation computers. Multi-user Param is due to bad disk blocks
Printer Scanner Digital Signatures CD ROM Drive Keyboard Printer Back-up on a Cartridge Pickers CD-ROM None of the above none of the previous word processing software None of the above an operating system None of the above
B C B A B A B B A B C B C A
multitasking The ability to run 2 or more programs concurrently
none of the previous
A
none of the previous
B
multitasking First - generation computers. multitasking Vishwajeet is caused by wear Bar code Reader Technology a fast interpreter Drum Printer encrypting it Very important reader user sequence Electrically charged ink mainframe technology 10-6 sec data to be transferred to memory Contingency Planning
an operating system Second - generation computers. multiprogramming Deep Blue caused by overuse Optical Mark Reader Technology
none of the above Fifth - generation computers. none of the previous Arjun none of the previous Image Scanning Technology none of the previous Thermal Printer transmitting it
C A A C C
Magnetic Ink Character Recognition Technology converts a program to slower than an interpreter machine code Dot - Matrix Printer Desk - jet Printer decrypting it compressing it Vital information resource Virtual information under siege reader & user system Thermal Paper LAN technology 10-3 sec An ink pen WAN technology 10-12 sec
B C A C
None of above An inked ribbon and print head
B D
data that has been the address of a transferred from memory memory location System feasibility report Capacity Planning
Unix operating system B 10-9 sec D an instruction that has been transferred from memory C Exception reporting C
Limit checks array. Wide access to various data base ACL A sample of transactions Tests of details of transactions Macros clipboard search A way to analyse and manipulate numerical information Information about certain programs remote DBMS storing data offline at a separate site Key verification A way to analyse and manipulate numerical information Information about certain programs Reports allow users to extract information as hard copy (printed output) Extracting and analysing data
Control figures constant. Can extract and analyse data IDEA A utility software programme Analytical review procedures Action Procedures file sort
A tool to produce high quality documents It contains all the data about one specific item relative DBMS
A collection of files Reliable DBMS uses tape as opposed backing up data regularly is related to data mining to disk Computer sequence Database access checks Computer matching controls An organised way of storing information A tool to produce high about a set of similar qualitydocuments things None of the above It contains all the data A document which about one specific item contains text None of the above
External file labels function. Can aid in simple selection High End CAATs A special purpose written program Compliance tests of general EDP controls Event Procedures field field names An organised way of storing information about a set of similar things A document which contains text Relational DBMS
Cross footing tests formula. Can define the audit objectives All of the above None of the above All of the above General Procedures layout record grab
C C D D A D D B D
A way of maintaining a log C B C C D
C B
Using queries Word processors, Compilers, Network software, backup spreadsheets, interpreters, editors systems databases, DTP DEFAULT and NOT NULL FOREIGN KEY PRIMARY KEY and constraints constraints UNIQUE constraints CHANGE TABLE MODIFY TABLE ALTER TABLE remote DBMS relative DBMS Relational DBMS
Reports provide a very flexible way of creating and editing documents Spreadsheets make data easy to analyse
A tool which allows text and graphics to be placed in documents None of the above None of the above
A C
None of the above
C
IDENTITY columns UPDATE TABLE Reliable DBMS
C C C
storing data offline uses tape as opposed at a separate site backing up data regularly is related to data mining to disk C
Number
Description
Component
Source
D
using a password the product code A database bookmarks Auto Primary
keeping a backup copy the primary key Graphics operators Auto ID
keeping the original paper copy mail merge browser wildcards AutoNumber
saving the file with different filenames e-mail e-mail engines Auto Key
A C A C C
records in a dynaset are related tables in a consistent with the database are consistent underlying tables. with one another. foreign key.
forms in a database are consistent with the underlying tables or queries. query and its associated main form and a subform. dynaset.
reports are consistent with the underlying tables or queries. B report and its related query. A
the primary key of the primary key of the both related tables. related table.
a field from an unrelated not a primary key of table. either related table.
B
One-to-one EmployeeID The Tools menu, Relationship window
One-to-many CompanyID
Many-to-many EmployeeLastName
Many-to-one CompanyAddress The one-to-many relationship
B A
Double click the Relationship line That there are several customers associated with That some of the data is that ID not viewable
Referential integrity Right-click the Relationship line, then select Delete from the shortcut menu
The join line
B
Select Undo in the Click the Delete Relationships pull-down Relationships button menu on the toolbar That records can be added by clicking on the plus sign They must be the same data type
B
That there are records in a related table
C
They must both be They cannot be numbers They cannot be text fields AutoNumber data types The customer‟s ID is deleted from the Nothing, Access Customers table, and all ignores the The customer‟s ID is the related loans are attempted deleted from the deleted from the Loans command. Customers table. table.
D
An error message is displayed.
D
The subform is an object on the form and The subform is not The subform is displayed The subform is can be moved or sized visible. in Datasheet view. displayed in Form view. like any other object. D A one-to-many relationship A one-to-many A one-to-many A many-to-many between teams relationship between relationship between relationship between and players teams and coaches coaches and teams players and teams C
#
M
¥
*
C
The Customers table only when there are Loan Either table at any records associated with The Loans table at any time that customer time prompt, title bar title bar text, prompt, text, icon. prompt, icon, title bar text. icon. Dim CreateList. Sub CreateList. CreateList. A check box enables the form user to choose from one of several existing entries. must be set for one word. help people keep track of things. data. facts. single-user database application single-user database application Sequential Query Language (SQL) Database Modeling System Jet
Neither table title bar text, icon, prompt. Sub.
C B B
A text field enables the form user to choose from one of several existing entries. must be set for multiple words.
store data in tables. relationships. figures. multiuser database application multiuser database application Structured Question Language (SQL) Database Management System SQL Server
A drop-down list enables the user to A drop-down list choose from one of enables the user to several existing entries. enter text. must be set for two does not have to be set. words. maintain data on create tables of rows different things in and columns. different tables. metadata. all of the above information. a and b e-commerce database application
C C
A D D
a or b
A
The user the database application(s) interact(s) with the the DBMS accesses the DBMS database data creates queries creates form
e-commerce database application Structured Query Language (SQL) Data Business Model System Oracle The database management system The database application (DBMS)
None of above Relational Question Language (RQL) Relational Model Manager a and b
B C B D
All of the above.
D
the user all the users' data is in one place holds user data tables from existing data
the database application
None of above creates reports the database management system (DBMS) it contains a description of its own structure holds indexes stored procedures as a redesign of an existing database
All of above b and c
A D
the database
B
it reduces data duplication holds metadata metadata as a new systems development project
All of the above. All of the above. All of the above. a and b
C D D A
from existing nondatabase data from existing data data marts data marts data marts data marts file managers entities in a column vary as to kind table record record record composite key Insertion anomaly assess the existing tables' structure and content are supplied by several wellestablished manufacturers They use sophisticated mathematical techniques.
as a new systems development project as a new systems development project normalization normalization normalization normalization hierarchical models the order of the columns is important relation field field field primary key Update anomaly
as a redesign of an existing database as a redesign of an existing database data models data models data models entity-relationship data modeling network models the order of the rows is unimportant row key composite key foreign key foreign key Deletion anomaly
a and b a and b entity-relationship data modeling entity-relationship data modeling entity-relationship data modeling data migration relational data model more than one column can use the same name field tuple foreign key candidate key surrogate key All of above
B C A B D D A
C D C C D B D
design the database structure
create one or more new move the data into the tables new database A
were essentially killed off have poor response by MS Access time Their report delivery is more difficult than report delivery for reporting systems. Nonintegrated data
are not true DBMS products
B
None of the above a "wrong format" problem a "wrong format" problem
A
dirty data
inconsistent data
nonintegrated data
B
dirty data data warehouse data are not stored in tables. Form Forms and reports
inconsistent data data warehouse databases do not have metadata. Table Queries and tables
nonintegrated data
D
data warehouse data are often denormalized. b and c Report Query Macros Spreadsheets
C A D
It will be easier for the user to upgrade it if the objects and tables are in one database. The Link Tables command can be used to associate the tables in one database with the objects in another database. Import It contains more than one table Menu Wizard
It will be easier for the user to upgrade it if the objects are in one database and the tables in another.
It is advisable to put each object and table into a separate database.
Regardless of how the objects and tables are stored, the user will have to reenter the data in the tables when the application is upgraded. B An application can be created in such a way that it objects such as forms and reports can be changed without disturbing the existing data. C Join A
An application may consist of multiple databases, each with multiple objects, linked to yet another database containing only tables. Link
All objects in an application, including the tables, must reside within the same database.
Merge It contains a user It contains tables, reports, interface, or queries, and forms switchboard Build Menu Interface Design Wizard put key business information into the hands or more decision makers.
It contains macros
C
Switchboard Manager D store all corporate transaction data in one single location. C Cryptography C Reviewing the systemsaccess log. D Sent to the correct address. A The private key is used by the receiver for decryption but not by the sender for encryption. Firewall vulnerability. Quality management Economic espionage A competitor‟s new project
create backups for centralize the mission critical manageability of data corporate data. collection. Decryption Using data encryption. Unaltered in transmission. Both sender and receiver must have the private key before this encryption method will work. Collision. Error checking Competitive espionage A list of competitor‟s clients single-user database application Replying promptly Cipher Performing validity checks.
Encryption Conducting fraudawareness training. Received by the Not intercepted en route. intended recipient.
The private key cannot be broken into fragments and distributed to the receiver. Data entry errors. Data Integration Corporate espionage Contact numbers of the management group multi-user database application
The private key is used by the sender for encryption but not by the receiver for decryption. Failure of server duplicating function. Low cost of operation Industrial espionage
A D B C
Research data e-commerce database application
B
None of above
C
Keeping messages short Including the Subject
Using all capital letters D
Removable drives that can be locked up at night provide adequate security when the confidentiality of data is the primary risk.
Message authentication in EDI systems performs the same function as segregation of duties in other information systems.
Encryption performed by a physically secure hardware device is more secure than encryption performed by software. No border 2,2,2 the column is too narrow to show all the digits of the number flexibility of moving entries
Security at the transaction phase in EDI systems is not necessary because problems at that level will be identified by the service provider. C A blinking border 6,8,10 A D
A dark wide border A dotted border 8,16,32 2,4,2 the row is too short to your formula has a show the number at the syntax error current font size ability to generate tables speed of calculation
either b or c cost of initial set-up
C D
word processing Range Producing graphs double-click any cell in the column ENTER array. 100 Cell references ^
click the column label INSERT formula. Tom McKenzie. Text constants \ It is impossible to B5*B6 C3/D4 D4^2 determine. E12 6 SUM(H9:H11) G7*SUM(H9:H11) The phrase “active It is surrounded by It is displayed in reverse cell” appears in the a heavy border. It is blinking. video. Status bar. By either clicking in a By typing the reference different cell or using of the cell you want to By clicking in a By using the arrow keys the arrow keys to move move to in the formula different cell to move to a different cell to a different cell bar The Cell Format The Font Size The Standard command on the Edit command on the Tools toolbar The Formatting toolbar menu menu. the File Type the New command the Save command on the Save As command command on the File on the File menu. the File menu. on the File menu. menu. File Edit View Window Preview Insert Clear Details Delete Delete List Both Insert and Delete Both Clear and Delete Properties Clear Remove
graphical Address Writing letters drag from the top cell in the column to the last cell in the column CTRL + ENTER function. (201)555-1212. Functions /
database Gap Drawing pictures click the column heading TAB constant. #VALUE! Numeric constants *
spreadsheet Rows Document filing
D A A
C A B C D D C B
A
C
B
C A B C B
Orientation (portrait or landscape) Options worksheet. 6 copy range. paste range. The Duplicate command absolute B4 #DIV/0! #DIV/0! The Move command copy and paste cells. the Fill Handle Select the Insert Hyperlink command from the File menu. whether the cell has a formula or a value in it.
Headers and footers Page Setup range. D12, G25 destination range. destination range. The Copy command relative $B4 #DIV/0! #DIV/0! The Cut command
Fonts View group. D12:G25 clipboard. clipboard. The Paste command mixed B$4 #DIV/0! #DIV/0! The Paste command cycle through absolute, relative, and mixed cell references. the Formatting toolbar
Margins Edit cell group. D source range. source range. Both the Copy and Paste commands constant $B$4 #DIV/0! #DIV/0! Both the Cut and Paste commands
C B B C D B D A D B C D
edit cells. the Format Painter
cycle through open applications. C Conditional formatting B Double-click a cell and click the Insert Hyperlink command. B
Click the Insert Hyperlink Right-click a cell and button on the Standard click the Edit Hyperlink toolbar. command. whether the cell has an absolute or a relative the cell address. cell reference.
text with a two-digit year. text with a four-digit year. an integer.
Jul-30 subtracting the earlier date from the later one. the F4 key.
Aug-31
29/03/2008 subtracting the later adding the earlier date to date from the earlier the later one. one. the F2 key. the Esc key. March 4 of the current year
the value in the cell D text with either a twodigit or four-digit year, depending on the format. C It is impossible to determine from the information given. B adding the later date to the earlier one. the F1 key. Either 3/4 or .75, depending on the cell formatting either a cell on a worksheet or a variable. B1:G10
A B
03-Apr a cell on a worksheet. B1-G10
0.75
C
a variable. B1.G10
a constant. B1;G10
D D
AVERAGE Combination
COUNT Line
MAX Pie
SUM Scatter
C C
Once a bar chart is chosen it cannot be changed to a column chart. hold down the CTRL key
Once a column chart is chosen it cannot be changed to a bar chart.
Once a pie chart has been chosen it cannot be changed to line chart.
hold down the SHIFT key hold down the ALT key Transfer information to Create four separate files a database Fill Down Data | Sort Calculate data press the PRINT SCREEN key writing letters D4+C2*B2 Fill Right Edit | Data | Sort Create forms select Print selection on Page Setup | Sheet and then print drawing pictures #VALUE!
Once a line chart has been chosen it can be changed to a pie chart. D hold down CTRL + SHIFT A
Use tables Paste Tools | Sort Analyse data click the Print button producing graphs (D4+C2)*B2 0 portrait AD213 storing data on a disk drive Bandwidth Find Photography Key User-id Penetration Acts Spoofing Loss Sales - tax authorities Utility Tim Berner Lee Etrade.com Automated Tailor Machine Acts
Use multiple sheets Paste Special none of the choices None of the above select Print selection in the Print dialog and then print None of the above =(B2*(D4+C2) None of the above vertical None of the above receiving information from a host computer Channel Retrieve Message Digest Formula Address Password Cracker Protocols Approving Hacking Police officer of IPS rank. Cracker Howard Aiken Msn .com None of above Protocols
D B B C
D A C B A C B A C C A B A D A B B C A B C C
=A3SUM:B3SUM:C3SUM REF! landscape ZA1 sending information to a host computer Speed Save Digital Signature Lock Password Retrieval Regulations Imposting Threat Income - tax authorities Pirated software Hoffman Amazon .com Any Time Money Regulations whatever was last used A0 storing data on the hard drive Size Browse Cryptography Hash Function Name Cryptography Address Unauthorising Exposure Judge of a civil court Virus Charles Bubbage Dell .com Asynchronous Transmission mode Address
Router
Gateway
Port
Pin
B
LAN hyper terminal tracing program National Informatics Center Only Computers Concentrates connectivity Bridges and Repeaters. bits firewall One Physical Layer RG7U Physical address A cable Data return to the sender Wireless technology Physical Layer Binary 48 Bits software that facilitates connection to the internet
WAN
CAN hypertext transfer hypertext tracing program protocol Network Interface card Can not computers Combines connectivity of a hub with the traffic regulation of a bridge Two or more networks frames gateway Two Data-Link Layer Coaxial cable Logical address Hub New Information Card Only printers Switches data from incoming ports to outgoing ports. Bridges and Hubs Packets router Four Network Layer Fiber A memory address Router
PAN hypertext tracing protocol None of the above None of the above
A C B D
All of Above Hubs and nodes None of the above virus checker None of the above All of the above Twisted pair None of the above None of the above
B B C A C D B B B
It continue on to target It gets destroyed bit by bit. device with corrupt data None of the above Wired Technology Data Link Layer ASCII 48 Bytes a list of rules for transferring data over a network Ultra violet technology Network Layer Octal 48 KB None of the above All of the above None of the above 48 MB
B A D A A
a gateway calling software that allows file program for internet copying bridging
B
Novell PC
Client
There isn't one Physiology Bus Linear Parallel Ring Ring
Network PC C If the hub goes down, If one node goes down, it If the hub goes down, it it brings down all of the brings down the entire brings down all of the nodes on all of the ring nodes on that section rings B Topology Star Parallel Circular Bus Bus Both A and B Ring Both A and B Linear Star Star None of the above All of above None Both A and B Mesh Mesh B D A B C B
Server
Star Ring Network Layer Ethernet, token ring, DecNET bps bps usually higher than LAN speeds CD-ROM drive must use the World Wide Web key gateway interface
Bus Bus Transport Layer Ethernet, token ring, FDDI kbps Kbps measured in bytes per second a modem must use electronic mail uniform resource locator
Linear Star Physical Layer Ethernet, DecNET, FDDI mbps Mbps depend on the transmission medium Windows 95 must have a LAN account common gateway interface interfaces a modem to a computer Windows package Windows NT
Ring Mesh Data Link Layer Ethernet, token ring, ARCnet mips Mips limited by modem speeds Netscape All of the above application protocol interface connects a computer to a network Netscape None of the above
C A D B B C C B A C
a Novell Interface Controller used to control a printer CD-ROM drive a modem Linux Novell Netware have to do with compression of have to do with Web graphics and video pages must use the World Wide Web must use electronic mail Printer modem provides access to the Internet is a CPU register used to send email used to send email used to protect a computer room from fires and floods a backup server
D B C
the Internet must have a LAN account bridge
none of the previous use appropriate communications software none of the previous
A
A D A
used to browse the Web uses wireless communication medium
is a CPU functional unit make of processor is a protocol for the transfer of files is part of Netscape between computers is part of Netscape None of the above
D D
a form of virus an email server
a screen saver program none of the previous a poor file server none
D D C D A
hardware IR system for the Internet browser none of the previous scanner CD-ROM clip-art file search engine provides access to the Internet is a CPU register is a CPU functional unit make of processor is a protocol for the transfer of files used to send email used to browse the Web is part of Netscape between computers
D
used to send email uses telephone lines
is part of Netscape
is a protocol that allows for remote login D
The layers cannot communicate with one another.
It is one large network.
Any layer can communicate directly with any other layer. It is made up of many networks connected into transmission lines called backbones.
Any layer can communicate only with the layer directly above or below it.
Any layer can communicate only with the layer above it. C Individual computers can connect to it using an ISP. A Port sniffing C
It works the same way as a local network. Denial of Service
Password cracking System intrusion used to protect a computer room from fires and floods a form of virus Flood a Web server with IP flood requests hack packet firewall a backup server Apply security patches All sites are safe and reliable. Use of identifiers by attaching to an e-mail. Phone A Trojan horse router an email server Update virus definitions There are safe and unsafe sites. Use of passwords
a screen saver program none of the previous Virus that initiates a ping flood UDP flood flood traffic switch a poor file server Backup data on a daily basis Only large namerecognizable sites are safe. Use of logical access methods by attaching itself to a document. Web traffic A worm hub none of the above Limit logging on access ActiveX-enabled sites are safe. Use of encryption methods by scanning the computer for a connection. Application updates Spyware
D A C B D C
B D
through an FTP port. E-mail Adware
B D D
Modems cookies and Trojan horses. An attack on a system for personal gain
Protocols Trojan horses and key loggers. An attack with the purpose of gaining publicity Disruption in Economic damage communication Crashing the stock market, as in the Shutdown of military 1930s security systems
Multiplexors cookies and key loggers. Giving out disinformation Disruption in supply lines Contaminating water systems
LAN key loggers and worms. Changing the content of a Web page All of the above are correct.
B C
D D
To carry more network capacity
To improve network services
To improve system response time
Shutdown of nuclear plant safety systems D To obtain an accurate inventory of network related equipment and parts and network nodes D
set its prices very high People Search
limit access to computer owners only Yahoo People Search
stop its competitors seeing their prices USA People Search Personal assets Adware
update its prices as soon as they are changed Lycos Search
D B
Name of your bank Date of birth Virus Fraud
buy stocks. Shill bidding Internet stalking. pop-ups. Use a fake e-mail address.
invest without risk. Phishing cyber stalking. cookies. Never use your real identity.
purchase off-shore property. Siphoning virtual stalking. spam.
Criminal records A Spyware B make large amounts of money by parking funds in their bank account. D Hoaxing Web stalking. viruses. Use anti-spyware software. Logical access controls Neither I or II telnet Misleads a program recompilation both HTML and Internet Explorer Web browser. None of the above one way HTML. MHTML B B B B B C C B B B A C D
Encryption I only irc Adds more bytes to programs Verifies integrity of files HTML Web query. .com is used for company round trip HTML. XML. using Internet Explorer to view a Web page that is stored on the hard drive on your computer Click on the Back arrow until the desired site is found the Refresh command Internet Explorer HTML document.
Use a proxy server. Message sequence Physical Security controls number checking II only Both I & II ftp www Increases boot up time Microsoft Excel round trip HTML document. .con is used for companies HTML. DHTML. clicking a hyperlink that references a document that is stored in the floppy drive on your computer
.co in used for company the World Wide Web Consortium HTML.
updating the values that are obtained through a Web query
viewing an Excel worksheet that you have saved as a Web page. B
Click on „Go to‟ or „Search‟ in the browser the Insert Hyperlink command
Go to the History page and look for the site the Update command
Go to the Bookmarks or Favorites page the External Data command
C A
Hyperlink BMP
Screensaver GIF
Sound JPEG
Save it to a floppy Write it down on a piece Add it to „Favourites‟ or disk. of paper. „Bookmarks‟. extranet. intranet. privileged network.
Video TIFF Cut and paste it to a word processor document. network topology
C C
C A
an attachment. VoIP Desktop client, application, and database. Modem File Transfer Program So computers can be referenced by a name 193.1.2.3 paul .trigg @ domain. org. uk The US government
a signature. IPT Desktop client, software, and hardware. CD-ROM File Transmission Protocol So IP addresses can be shorter 45.1.1.1
a footer. IPP Desktop server, application, and database. Telephone line File Transfer Protocol So email is delivered faster 143.215.12.19
an encryption. PoIP Desktop server, software, and hardware. None of the above None of the above
B A
A B B
None of the above None of the above None of the above None of the above None of the above None of the above None of the above
A D B C A A C
[email protected] paul.domain.uk No-one Internet Remote Conversations A letter will be sent to you in the post Hyper Text Mark-up Language
Scientists in Switzerland International Relay of Internet Relay Chat Characters It will be waiting for you to It will be deleted collect it Hyper Textual Hyperlink Text Marking Mark-up Lingo Language Receiving messages automatically from anyone in the People discussing a topic group of interest globally Application Software Utility Programs Deleted from the disk Copied from the disk Data bus Auto bus Data bus Address bus Personal computers Parallel computers BPS MIPS OCR MICR
High volumes of email Operating system Saved to the disk Address bus Control bus
None of the above Database management system None of above None of above None of above None of above VLSI voice recognition none of the previous none of the previous
C C A A C A B B B B
Super computers MHz barcode scanning is due to bad disk is caused by wear caused by overuse blocks converts a program to a fast interpreter slower than an interpreter assembly code translates and executes faster than a programs statement by converts a program to compiler statement machine code encrypting it decrypting it compressing it an assembler a compiler an interpreter the ALU the CU the power cord A runtime error can result if the user clicks the cancel A compile time error The program executes button occurs without any error File List Box Dir List Box Drive List Box
none of the previous transmitting it a linker None of the above
B C A C
You need to carry out conditional compilation A Combo Box A
memory overflow Netcop
systems overload NetBrute
RAM overflow Netcraft www.netcraft.com updates. hubs
buffer overflow NetBIOS www.netstat.com
D D C B A
www.nettools.com www.WhoIs.com code correct. firewalls It can consist of hardware, software, or both. That any open applications be exited Antivirus software an intrusiondetection system. cycle. Make sure all update and security patches are applied. patches. switches
It hides your network. Dependencies on other services Intrusion-detection software antivirus software. renewal.
upgrades. scanners It is a barrier between One of its techniques is your network and the packet filtering. rest of the Internet. That you also shut That you are not on the down associated Internet services Firewall a network prevention system. age. Router a proxy filtering system. history.
B
B C A D
Install and keep current Limit user‟s ability to antivirus and anti-spyware configure the programs. workstation. Disable it and create a Delete it from the Delete it and change the nondescript user system and use the built-in guest account to a account with guest account. power user account. administrator rights. Tapes can be used over and over, and CDs should be kept forever. Trojan horse place a router between your ISP and your system. System acts abnormal
Block all incoming traffic on a network.
D
Create another administrator account to confuse the hacker. C
Tapes and CDs can be Tapes should be melted Give them to a recycle thrown away in the trash. and CDs broken. shop. C Virus IP spoofing Spyware C add spyware to your system. Files are missing download files from reliable Web sites. hone your programming skills. C Problems with your Printing problems wireless mouse D Never open an e-mail attachment unless you Turn off the auto-launch know what it is and in your e-mail client. who sent it. D spyware Spyware Check for open ports buffer overflow D A buffer overflow C Obtain usernames and passwords D
Update antivirus software. virus A virus Obtain system IP addresses E-mail and attachment scanning
Do not propagate hoax viruses. Trojan horse A Trojan horse Obtain cookies
Download scanning
File scanning
Backup file scanning
D
Use your browser‟s security settings Administrative assistant to the president The Standard toolbar multitasking. the default file location of new files
Do not open attachments Avoid “skins” and in unknown e-mails “toolbars” download
Use encryption software
D
Cook The Formatting toolbar tiling. whether the worksheet prints in landscape or portrait orientation
Junior accountant The Open command on the Edit menu cascading.
Network administrator D The Save command on the File menu A minimizing. A
the number of windows the margins on the you have open printed DOCUMENT minimizing cascading Click on the title bar and You cannot move a drag. floating toolbar.
A C C
shrinking multitasking Click on any border Click on any corner and and drag. drag. right mouse button anywhere on the Word window, choose the Customize command from the context-sensitive menu, and check the box for the missing toolbar right mouse button on any from the Toolbars visible toolbar, and click tab dialog box. on the missing toolbar. All documents are automatically saved with a default password. public domain software. public domain software. on-demand computing. best-cost provider Operational systems power outages. hot Delete
The password is casesensitive. nonprotective open source software. nonprotective open source software. on-demand software. software provider Informational systems hardware failures. cold Kill
left mouse button on any visible toolbar, and click on the missing toolbar. Once a document is protected by a password, it cannot be opened without that password. protective open source software. protective open source software. utility computing. Web service provider Structured query systems floods. empty Nothing
left mouse button anywhere on the Word window, choose the Customize command from the contextsensitive menu, and check the box for the missing toolbar from the Toolbars tab dialog box. B
Passwords can be up to only seven characters long. proprietary software proprietary software. utility software. application service provider Office automation All of the above.
A C D B D A D
text, graphics and text, hypertext and Power CD-ROM, digital email address. Point. camera and sound.
dormant B New C text, hypertext, Power Point, video and sound. D
the Line style Fill color Excel is started so that you can create a chart.
the Line color Line color A popup box prompts you for an existing Excel chart to insert.
the Font and the text alignment
Line thickness D Microsoft Graph is started so that you can The graph placeholder create a graph. is deleted. C taken from the first column or row of data in the datasheet, always taken from always taken from the depending on whether the first row of data first column of data in the the data series are in in the datasheet. datasheet. rows or columns. entered by the user. C Side-by-side column Stacked column Pie chart Line chart B Pull down the Insert menu and select Chart, click the Insert Chart button on the Standard toolbar, or Pull down the Click the Insert Chart Pull down the Insert pull down the Insert Insert menu and button on the Standard menu and select the menu and select the select Chart. toolbar. appropriate Object. appropriate Object. D Click the chart object, You cannot display the It automatically then click the View Pull down the Edit underlying datasheet displays in Slide Datasheet button on the menu, then select once the slide is view. Standard toolbar. Object. finished. B Single click the Change to Slide Sorter chart. Double click the chart. Click outside the chart. view. C A dialog box is displayed allowing you to enter the A dialog box is displayed name of the Excel allowing you to enter the worksheet that name of the Excel The datasheet window should be linked to worksheet that should be is toggled from closed the PowerPoint embedded in the The datasheet is saved to open (or from open presentation. PowerPoint presentation. as a separate file. to closed). D The application that The chart is The chart is doubled in created the chart is selected. The chart is deleted. size. started. A The chart is The chart is doubled in Microsoft Graph will selected. The chart is deleted. size. restart. D a slide one bullet item at a time, build bullet items a letter at a time, bullet items one letter at a bullet items one word at and build bullet items a time. a time. word at a time. D Subtle, Moderate, or Moderate Exciting Exciting D
Line style, Line color, text font, and text alignment Fill color, Line color, and Line thickness
D
a slide one bullet item at a time. Subtle
Enter and exit Enter
the way objects appear on a slide.
Neither enter nor exit; Both enter and exit, and neither fly in from top Fly in from top or bottom fly in from top or bottom nor bottom C Shift Alt Ctrl B Custom animation can be used to affect the way objects appear on a slide, to what objects do after they appear on a slide, and to the what objects do after they the way objects exit a way objects exit a appear on a slide. slide. slide. D The advanced timeline shows neither the sequence in which objects will appear on the slide, nor the duration of the effect applied to each object. C Clips, organization charts, and text D Animation program Fly in, From top, and Dissolve in A D
The advanced timeline The advanced shows the sequence in timeline shows the The advanced timeline which objects will sequence in which shows the duration of the appear on the slide and objects will appear effect applied to each the duration of the effect on the slide. object. applied to each object. Clips Paint program Fly in Once data is entered it cannot be changed. OLTP. You can change the appearance of a whole diagram, but not individual shapes of a diagram. [Enter+A] .ctx Validate On Error GoTo linelabel UpdateControls Organization charts Draw program From top Once data is entered it can be changed. OLAP. You can change both the appearance of a whole diagram and the individual shapes of a diagram. [Shift+Z] .ctl Validation On Error GoTo Inline PaintPicture Text Filtering program Dissolve in
Data cannot be entered There is no such thing into Datasheet. as a Datasheet. B OLST. OLIP. B
You cannot change the style of the connecting lines in an Organization chart. [Alt+Z] .ctr Check On Error Stop Refresh
You cannot change the color of the boxes in an Organization chart. B [Ctrl+Z] D .ocx Audit B A
On Error Resume Next D A
Cancel parameter to a non-zero value Cancel parameter to 0 Cancel parameter to a non-zero value Cancel parameter to 0 1 2
Resize UnloadMode UnloadMode parameter parameter to a zero to a non-zero value value UnloadMode UnloadMode parameter parameter to a zero to a non-zero value value 3 None of the above
A
A D
Consists of several Programs Form window, standard or code module Place code in the Terminate event AutoRedraw = True Msgbox err.no & err.text
Consists of several Applications Project window, view code window Place code in the Unload event AutoRedraw = False Msgbox err.number & err.text
Consists of Various Forms And Code Modules Class module, code module Place code in the Deactivate event
Consists of several Projects
D
None of the above None of the above
A B A D
Refresh PaintPicture Msgbox error.number & Msgbox error.number error.text & error.description
To display images to the user FreeFile Retrieve Common messages passed to Windows Caption
To help in creating a ToolBar GetFileNum Get
To allow the editing of icons GetFile GetProperty
To provide a repository for images used by other controls D GetBytes A Value B
Open dialog box Visible Click, KeyUp and Click and KeyPress KeyDown Ascii Format Binary Format CurrentX and CurrentY ScaleLeft and ScaleTop Property Get Background color property Min Shell Are one and the same You do not need to use the Set command here Property Assign
Windows explorer Multi-Line KeyUp and KeyDown Input Mode ScaleHeight and ScaleTop Property Let
Input box Font KeyPress, KeyUp and KeyDown Output mode x and y Property Set
D C D B A C
Caption property Max Substr
ZOrder property Value SetAttr Are actually not properties
AutoRedraw property CurrentVal CStr None of the above
C B A B
Can be different at times You do not have the permission to access the MyVar has not been class declared The ExecProcedure The Open method The Exec method method A warning query icon A critical message icon An exclamation icon statement. variable. intrinsic constant. InputBox function can MsgBox statement be created with the returns a value, InputBox function returns macro recorder, while while the InputBox a value, while the MsgBox the MsgBox statement function does not. statement does not. cannot.
None of the above None of the above
C D
None of the above B built-in procedure. C MsgBox statement can be created with the macro recorder, while the InputBox function cannot. B
Data cannot be entered into the form. Unload press the return key layers and planes tab
The form can be modified. QueryUnload press the tab key lines and spaces enter/return
Data can be entered. Deactivate press the escape key height and width backspace/ delete thesaurus
A new check box can be added. Terminate just keep typing rows and columns shift outliner
C C D D B C
grammar checker spell checker send a public message to friends interested in one topic send pictures to a friend Print all Enter closing database From ___ To ____ Copy tabbing
send private messages send a package to a to a friend friend Page setup Retrieve spacing word processing Storing information clip art Storing information Cut, copy, paste and clear Text which appear at the top of every page Print preview Save sorting spreadsheet None of the above clipboard
D B C B C B C
graphing Creating and editing To analyse figures documents subscript annotation Creating and editing To analyse figures documents Clear, replace and Spelling, grammar and select autocorrect Text at the bottom Numbers which appear of every page on every page Mouse, printer and processing system keyboard? Browser Clear, replace and Toolbars
Making Calculations B Font, Paragraph, Bullet and Numbering C Designated area on the document
C
Keyboard, Mouse, monitor and printer clip-art file Spelling, grammar and autocorrect
Monitor, keyboard and mouse microphone Cut, copy, paste and clear
None of the above digital scanner None of the above
B D C
Paste
Replace
Select all Delete, then paste
AutoCorrect Insert, then paste
B A
Copy, then paste Cut, then paste To give the original author a chance to accept suggested changes from the person who entered the revisions
To give the original author a chance to reject suggested changes from the person who entered the revisions
To complicate the revision process and to force the author to spend more time making corrections
To allow multiple people to work on one document in collaboration with one another C
A line appears through text that is to be deleted. Through the Edit menu by choosing Track Changes command The Versions command will allow you to save multiple versions of a document, including any changes that may have been made to that document. All versions are opened automatically.
A red underline appears beneath text that is to be added. Through the Tools menu by choosing Track Changes command
A vertical line outside the left margin signifies a change has been made at that point in the document.
Comments are enclosed in a text box at the right of the D document. Both through the Tools menu and the Reviewing toolbar
Through tools on the Reviewing toolbar
D
The Versions command will allow you to save only one version of a document, including any changes that may have been made to that document. The latest version is opened automatically.
The Versions command will allow The Versions command you to save only two will allow you to save versions of a only one version of a document: one version document without any of the original and one changes that were just version of any changes made to the document. made to the document. A The first and second The previous version versions are opened is opened automatically. automatically. B
Dictionary Word displays a list of the dates and times each file was saved. Fields Check boxes
Grammar check The most recent version will appear at the bottom of the list. Tools Toggle button
Spell check
Thesaurus
A
Word will show the Word is not able to tell name of the person who the most recent saved each version. version of a document. A Forms Text fields Comments can be edited or deleted by right clicking the highlighted text. Text which appear at the top of every page Insert A drop-down list Comments can be edited or deleted by left clicking the highlighted text. C B
Comments cannot Comments cannot be be edited. deleted. Text at the bottom Numbers which appear of every page on every page
C
None of the above
C
Press tab. text. header/footer. Copy button Fault Finding Insert
Press Return. graphics. bibliography. Paste button Bug Squashing Tools
Copy and paste. forms. find/search.
Insert page break. numbers. macro. This action is not Format Painter button possible. Error Injecting Debugging Edit Format
D C A C D C
a section of text where the first letter of each a section of white sentence is lowercase text on a black and the rest are uppercase. background. setting it in larger typing it all in capital type or font size. letters.
the guidelines used to establish where different an enlarged capital elements of the letter at the beginning newsletter will go. of a paragraph. underlining the text of the pull quote.
A
changing the color. A grid is a set of horizontal and vertical lines that A dropped cap is a word determine the placement of The reverse that starts with a technique means A pull quote is a quotation lowercase letter when it elements in a newsletter or other to add dark text on taken from (pulled) from should have a capital a light background. another document. letter. document. The tab spacing The width of each The height of each column column The number of columns within each column 6 10 12 72
A
D D D
One Press Ctrl+Enter to create a page break. A serif font at 10 points
Two
Three
Four
B
Press Ctrl+Shift+Enter to Press Enter to create a create a column break. section break. A sans serif font at 10 points A serif font at 20 points
2 inches 6 point 2½ inches.
3½ inches 10 point 2¾ inches.
4 inches 15 point
Press Shift+Enter to force a line break. C A sans serif font at D 45 points It depends on the left and right margins, and how many columns are D specified. B B
You are not in You have not inserted a Print Layout view. column section break..
to store a file on to store a file on a the hard drive diskette Data about a set of similar things Mainly text Thesaurus Spell Checker
25 point impossible to 3 inches. determine. Word cannot display columns during You have not specified editing; you will see continuous section them only when you breaks. print the document. to move a section of text to leave an original section of text in from the original place while pasting a location to another location copy elsewhere A set of different graphics None of the above Grammar Checker Find and Replace
A
D B B
q_id AC1 AC2 AC3 AC4 AC5 AC6 AC7 AC8 AC9 AC10 AC11 AC12 AC13 AC14 AC15 AC16 AC17 AC18 AC19 AC20 AC21 AC22 AC23 AC24 AC25
q_desc The ------ key can be used to select an existing company from list of companies. Import and Export of data between Tally and other programs is possible only through ---------- Program. The re-order point is the inventory quantity that trigger a stock replishment activity. A created company's detail can be modified through keys A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount of money that is owed. In tally,all masters have ________main options In tally,to create a new column in balance sheet press _______ In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger accounts into one line statements In tally, we can alter ledger details using either single or multiple modes but not alble to delete a ledger from multiple modes. In tally,a group company is marked with an ______________ The systems that work together to order,receive, and pay for replenishment of stock are --------------Tally allows to delete a ledger from --------- alteration mode. --------------------- is/are useful for management in the decision making. In tally,the group company must contain at least _____________ members To cancel a vourcher entry in Tally, short-cut key is ----------The accounting masters and inventory masters related to We press ------------- function key to display the age-wise analysis of Bills Receivable or Bills Payable report In Tally, we press ------------, to print report . In Tally, Types of Accounts and Types of Vouchers passed during the period, can be seen in ------------- report. In the Tally Software, the ------------ directory stores all data entered by the user. The Ledger Accounts are unique in Financial Accounting Packages Customers can be permitted to enter their own data into the firm‟s computer using the firm‟s wide area network is an example of In Tally, we can customize the Vouchers as per our requirements The number of steps in Accounts Compilation are Each action/transaction of a firm is described by a ----------------.
AC26 AC27 AC28 AC29 AC30 AC31 AC32 AC33 AC34 AC35 AC36 AC37 AC38 AC39 AC40 AC41 AC42 AC43 AC44 AC45 AC46 AC47 AC48 AC49 AC50 AC51
Tally is based on mercantile accounting system Ctrl + N is used to ----------------------- in Tally classify the accounts under different heads so that summarised information is possible. Revenue Account also known as -------------- Account Method of Voucher Numbering is/are Accounts Receivable are displayed in To assemble a product from different items -------------- entry is used A --------- purchase orders data flow is directed to the purchasing system for use in closing out the outstanding purchase orders in the receiving system diagram. Tally provides at least --------- predefined voucher formats The value of the inventory is included in a ledger accounts as an asset on the balance sheet " The buyers can follow up with the suppliers to determine the reasons " is an example of ----------------From voucher entry mode , if we press __________ then we get payment voucher in tally Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged accounts member companies of the group. A ----------- is a primary document for recording all financial transactions. The field can have a value between ________________ in FA Package. The _______ file maintains data that describes the supplier past transaction with the firm in terms of material quality in AIS It is necessary to manipulate data to transform it into ---------------In tally, to change the date of the voucher press ______ Tally can maintain budgets on ---------------The value of the inventory is included as an asset on the balance sheet In ratio analysis report of Tally FA packagewe we press ________________ function key to the display of bills receivable , bills payables report The accounts payable system is responsible for paying the suppliers for the ---------------What is the default financial year in Tally6.3 _________________ Tally encrypts and stores TALLY DATA at the data directory The Profit & Loss statement can be displayed in ---------------- format(s).
AC52 AC53 AC54 AC55 AC56 AC57 AC58 AC59 AC60 AC61 AC62 AC63 AC64 AC65 AC66 AC67 AC68 AC69 AC70 AC71 AC72 AC73 AC74 AC75 AC76 AC77
Default ledger accounts in tally are ______ Default 'godown' name in tally is ____________ 'Tally vault' is a _________________ To create a sales voucher in tally , you have to press _______ A Group Company is ------------------------- given to the merged accounts of member companies of the group. In tally,"credit note" voucher type records entry for ________________ In tally you get currency symbol option from _______ menu ------------------ gives the balance for each day for the voucher type has been selected. For 'stock journal' entry we press ______________ in tally Tally provides the capability to the administrator/auditor to track changes in the areas is/are In tally, types of users are _______________ By pressing -------- key, a list of inventory reports can be displayed straightaway from the balace sheet report Projected approximation of income or expenses is called ______________ . "Administrator" type user is also called 'Auditor' of a company in Tally You will get company information , if you press __________ from gateway of tally A constituent(member) company can be a member of more than one group. Default stock category in tally is ______ To create a log of the import activity in a file _____________ is located in the same directory as an executable program in tally In Tally,inventory valuation method option is available from _______ Tally audit feature is available in a company __________________ In tally, a group company can also be a constituent(member) of another group company Default number of groups in tally are ________ During voucher entry ------------- are used. User designated as --------------- can view audit list. Tally supports Importing of data from ---------------In an accounting information system, which of the following types of computer files most likely would be a master file?
AC78 BC1 BC2 BC3 BC4 BC5 BC6 BC7 BC8 BC9 BC10 BC11 BC12 BC13 BC14 BC15 BC16 BC17 BC18 BC19 BC20 BC21 CA1 CA2 CA3 CA4
Which of the following is an advantage of a computer-based system for transaction processing over a manual system? A computer-based system: The memory address register is used to store Inefficient usage of excess computer equipment can be controlled by Which of the following is not the component of a CPU A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The following is an information not found in the trailer label Hard copy is a term used to describe...? What do the abbreviations VAB stand for What control would prevent the accidental erasure of customer information from a magnetic tape What are the individual dots which make up a picture on the monitor screen called? Header label normally include all the following except the A daisy wheel is a type of...? Which approach or technique is a control usually associated with microcomputers An impact printer creates characters by using...? The best security control in a microcomputer environment is to What would you NOT use with a flatbed plotter? What do you need for an ink jet printer? The greatest control exposure in a microcomputer environment is the lack of What do you need for an ink jet printer? A laser printer does NOT use? The amount of data that a disk may contain is known as the disks...? You can ________ protect a floppy disk. Information on a hard disk is usually backed-up using a...? Using generalized audit software packages can add a lot of value _______ _______ is used for CAAT as database Generalized audit software perform auditors to undertake any past records and not concurrent auditing Generalized audit software is a file whose capabilities for verifying processing is logic
BC22 BC23 BC24 BC25 BC26 BC27 BC28 BC29 BC30 BC31 BC32 BC33 BC34 BC35 BC36 BC37 BC38 BC39 BC40 BC41 BC42 BC43 CA5 CA6 CA7 CA8
Magnetic tape is a...? Hard disks can have a storage capacity in the region of...? Which storage device has the largest capacity in Mb? Which storage device cannot be erased? You can ________ protect a floppy disk Where should floppy disks be stored? The contents of these chips are lost when the computer is switched off? What are responsible for storing permanent data and instructions? Which parts of the computer perform arithmetic calculations? What are small high speed memory units used for storing temporary results? How many bits of information can each memory cell in a computer chip hold? What type of computer chips are said to be volatile? Magnetic tape is a...? Software can be divided into two areas: Travel agents use this computer system when reserving flights Which computers are used in the weather forecasting industry? Vacuum tube based electronic computers are...? Which generation of computer was developed from microchips? Which generation of computer uses more than one microprocessor? Which generation of computer developed using integrated circuits? Which generation of computer developed using solid state components? Name three steps involved in developing an information system CAAT's are computer program and data that auditor uses as part of the audit procedures to process data if audit significance contained in an entity CAAT do not contains package programs, purpose written program, utility programs or system management programs Embedded audit routines are sometimes built into an entity's computer system to provide data for later user by the auditor SCARF involves embedding audit software modules within an application system to provide continuous monitoring
CA9 CA10 CA11 CA12 CA13 CA14 CA15 CA16 CA17 CA18 CA19 CA20 CA21 CA22 CA23 CA24 CA25 CA26 CA27 CA28 CA29 CA30 CA31 CA32 CA33 CA34
Concurrent use auditors as the member of the system Regular cross system verification may minimize frauds Computer security is frequently associated with confidentiality, integrity and authentication Data reserve engineering process metadata to document system and abstract business rules and relationship The first step for developing CAAT is_________ Using the open database connectivity feature in ACL is ______________ Computer Assisted Audited Technique involves the use of computers through "Black Box Approach" White Box Approach necessary involves expert knowledge on the part of Auditor The transition from manual system to CIS environment bring dramatic changes including ________________ Auditing with computer necessarily supports the CAAT involves an Auditors' appreciation of __________ Widespread end use computing result in unlimited errors creeping into system going to accept handling, thereby increasing audit risks For computerized auditing usage of sophisticated audit software would be a necessity Important knowledge needed to begin planning the use of CAAT is _________ The move towards paperless EDI would eliminate much of the traditional audit trail, radically changing the nature of audit evidence Computer operation controls are designed to provide ________________ Systems development control, apart from others, include authorization, approval, testing, implementation and documentation of new systems software A system could be _________ A system exhibits 'entropy' Super computer are the largest and fastest and is very suitable for commercial application including audit work Assembler language uses Mnemonic symbols Operating systems are devised to optimize the machine capabilities, the function include_______________ General purpose software provides a framework for highly complex scientific operation In batch processing, transactions are processed one after another The use of computer assisted audit techniques is not gaining popularity not only ________________ On-line processing refers to grouping of transaction and processing the same in one go from start to finish
CA35 CA36 CA37 CA38 CA39 CA40 CA41 CA42 CA43 CA44 CA45 CA46 CA47 CA48 CA49 CA50 CA51 CA52 CA53 CA54 CA55 CA56 CA57 CA58 CA59 CA60
Real time refers to the technique of updating files with transaction data immediately after the occurrence of the event to which it relates In OLRT the CPU should process the capability of program interruption Time sharing system allow access to a CPU from remote terminals DSS is defined as a system that provides tools to managers to assist them in solving structured problems DSS has the following components _________________ Master files contains current records for identification and summarizing Transaction files contain relatively permanent records take product profile, customer profile, employee profile etc Master file configuration includes ____________ ______ is a file management software package that lets users and programmers organize data into files and then process those files CAATS provide added value to the clients because _______________ File volatility refers to the number of addition and deletions to the file in a given period of time File activity is the proportion of transaction file records that are actually used and accessed in a given processing run: File interrogation refers to the _____ of information from a file One -to-one relationship means a single entity to a single entity in a monogamous structure RDBMS is structured to a series of 2 dimensional tables SADB stands for ____________ Controls are present over many aspects of the computer system and its surrounding social environment In framed checking the data entry is checked against an expected picture or format Errors are correlated_________ Field check is exclusive to a field _________ law basically states that there is a specific probability of the first digit of a no. being 1,2,3 etc Check digit is a group of nos. added to a code for determining the accuracy of other digits in the code Hierarchical code means _________ The validation checks applied to a field depend on the field's logical inter relationships with other fields in the record The contents of a field could determine _______ sign for a ______ field Batch is the process of ______ together _____ that bear some type of relationship to one another
CA61 CA62 CA63 CA64 CA65 CA66 CA67 CA68 CA69 CA70 CA71 CA72 CA73 CA74 CA75 CA76 CA77 CA78 CA79 CA80 CA81 CA82 CA83 CA84 CA85 CA86
Hash totals means meaningless totals With OLRT where interactive data entry is available, the master file associated with a transaction may be searched for confirming data Controls are required for authorization to ensure data integrity and detect possible breaches in security Data from client application are not stored in the organization's database through auditables events and function All input records in a batch are normally of different types IDEA stands for _________________________________ A transaction file is sorted prior to the update of master file A sequence check on the transaction or master files by an update program is not required Whenever monetary transactions are processed against master files, the update program should maintain a correlation account to record such Internal tables are stored tables from which certain values are extracted for further processing and storing For small to medium sized systems, individual modules are coded and individually tested and then assembled to be tested as a whole-the testing In systems testing, test involves_________________ Recording transactions in a controlled manner may amount to loss of stored data Audit software is used by the auditor to _________ Core image comparison is a software used by the auditor to compare _______ version of a program with a secure ________ copy Database analyzer is a software which provides detailed information concerning the operation of the database SAS stands for ______________ Embedded code is a software used by the auditor to examine backup data Embedded code performs wide variety of audit task Core image comparison is particularly useful where only executable versions are distributed Log analysis is a software used by auditor to detect virus On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a specific program or sever edit test is doing its work Mapping software is used by the auditor to list unused program instructions Mapping software has very objectives Modeling is a variety of software which ________________ On line testing can be targeted for specific functions carried out by programs
CA87 CA88 CA89 CA90 CA91 CA92 CA93 CA94 CA95 CA96 CA97 CA98 CA99 CA100 CA101 CA102 CA103 CA104 CA105 CA106 CA107 CA108 CA109 CA110 CA111 CA112
Program code analysis involves _____________ __________ is a software of CAAT Snapshot is software which takes a picture of a file or data or a transaction passing though the system Base case system evaluation includes____________ While base testing forces on finding if there are any defective execution policies in a program Black box testing seeks to determine whether application output is what it is supposed to be In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently eliminated from the computer files Black box testing is _______ based and white box testing is _______ based Source code review means__________ In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine how the defects may impact the attainment of the All material application oriented events that occur within the boundary subsystem should be recorded in the accounting audit trail In examination of audit trail the following data associated with an event may be ___________JCL means_________________ Audit should be periodically analyzed to detect any control weakness of the system In an accounting audit trail, intrusion detection system might monitor the amount of processor time consumed by the user to detect unusual deviation from the A sample size calculator program assists auditors in determining RAND() function Generalized audit software consists ___________ Specializes audit program may be___________ Generalised audit software could be used by the following in consistencies or significant fluctuations Generalized audit software function include____________ In the file reorganization merging capabilities are needed in data from separate file is to be combined on a separate work file Auditors cannot use generalised audit software to extract the data needed for audit purpose Auditors can combine functional capabilities of generalized audit software to accomplish the task of __________________ Which of the following is not the feature of GAPs Which is the example of CAATs In audit procedures, test data is
CA113 CA114 DB1 DB2 DB3 DB4 DB5 DB6 DB7 DB8 DB9 DB10 DB11 DB12 DB13 DB14 DB15 DB16 DB17 DB18 DB19 DB20 DB21 DB22 DB23 DB24
Which of the following is not the use of CAATs Which of the following are called explicitly by another procedure? _________ data type is generally used for fields assigned as primary keys in a table MS access objects can be published in the web In code-builder, got_focuse, click,dbl_click,enter are examples of _______ _______can be used to automate certain actions in response to events In the macro sheet the macro is selected in the _____field To build complex expressions_____is used The three list boxes present at the bottom of the expression builder are called_____ ________option is selected from the view menu to create macros with conditions _______report can be created with minimum user input _______layout of a form displays one record at a time The table or query name on which we are going to build our report is selected from the ____ dialogue box ______and_____are the two types of auto reports available There are no wizards for creating a database in access ______option from the insert menu option is chosen to add an embedded chart In ms-access, while using SQL, references constraint is used for creating _______ _______is used to create a mailing label ______header is present at the beginning of the report ______is present at the bottom of each page in a report In SQL, having clause is used for _________ ______field is added to the macro sheet when we select grouping option from the view menu ______can be used to create toolbars _______query is used to add records from one or more tables into an existing table _______window is used to write VB code in access application Values for other tables, queries are maintained in look up fields data type
DB25 DB26 DB27 DB28 DB29 DB30 DB31 DB32 DB33 DB34 DB35 DB36 DB37 DB38 DB39 DB40 DB41 DB42 DB43 DB44 DB45 DB46 DB47 DB48 DB49 DB50
Visual Basic language is a _____ tool ______ function is used to display a message box Other ms-office applications can be accessed from ms-access using a concept called ________ OLE stands for_____ The application that supplies data in OLE is called an _________ If any change made on the object from the client side is reflected on the server then the object is said to be _____ _______is the file format that works on internet ______ is used to convert any ms-access object into html format _______ option in publish to web wizard produces a page that is static in nature _______query is used to create or change database objects in a current database Currency fields express the amount in _________ _______is selected from the toolbar to add an OLE object To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box _______option from the file menu is selected to run 'publish to the web wizard' _____page in an web application is used to navigate to the rest of the pages in the application ______ is fired when an event is triggered is the concept based on a Visual Basic language Ms access is a ___________ A collection of data stored in different objects is known as a _________ A blank database can be created using __________ Text type data can be of _____ characters in ACCESS ______is a datatype that assigns values automatically Tables cannot be imported from other databases If two tables having same values for the fields are joined it is called an ______ Duplication of records in a field won't be allowed if the fields are declared a________ Changes from a master table can be reflected on to the child table by selecting _____option To see more than one record at a time in a form we use _______
DB51 DB52 DB53 DB54 DB55 DB56 DB57 DB58 DB59 DB60 DB61 DB62 DB63 DB64 DB65 DB66 DB67 DB68 DB69 DB70 DB71 DB72 DB73 DB74 DB75 DB76
In SQL, delete command is used to remove _________ In MS-Access, filter excluding selection will display only those record(s) which meet the criteria. Properties of the fields are managed by _____ in Dynaset ______queries allows us to view data in row by column manner The type of queries that can update or delete record(s) in a table(s) are called __________ Joining tables without any matching values in the fields is called ____________ Primary key uniquely identifies each record Which of the following dialog box is/are used in the creation of form ________ _______ query wizards are used to generate summary calculations for a table Properties of a form can be changed by selecting ______from view menu options Forms that are included in other forms are called ______________ In MS-Access, while using form design view, for creating a command button for adding a new record, we should select the _______ category from the _______ form displays fields in a single horizontal row The process of arranging the data in a meaningful order is known as ___________ ______ are used to select only some particular records from the table or any other database objects In MS-Access, user may specify criteria for filter in form view using _________ ___wildcard character represents any single character Records cannot be sorted by a primary key A control without a data source is known as ___________ Set of related option buttons, check boxes and toggle buttons is known as _____________ The collection of related data and objects is called a ____________ Which of the following is control types ____________ In MS-Access, the function that gives the current date is _____________ _____is a control that lists set of data ______is a form that summarize large amount of data ______allows to create a filter by typing the value in a data sheet
DB77 DB78 DB79 DB80 DB81 DB82 DB83 DB84 DB85 DB86 DB87 DB88 DB89 DB90 DB91 DB92 DB93 DB94 DB95 DB96 DB97 DB98 DB99 DB100 DB101 DB102
Wizards for toolbox controls are called a __________ The wild card representation for any 5 letter word that starts with ram is ________________ Look up fields slow up data entry ____is an access object that displays un-editable data _____option from the new object toolbar gives the easiest way of generating a report ______ represents data in a pictorial format Changes of one table can be carried over to another related table Hyperlinks are used to jump to any kind of information or data from a file The memo field can have text upto_____ characters in length In MS-Access, columnar layout can be used to view multiple records in a form In MS-Access, alter command may be used in adding a primary key to a table Update query is used to add records from one or more tables to the end of an existing table In ms-access, datasheet view is available in ___________ ______are used to jump to any kind of information from a datasheet or a form Home page will always be present as a first page of an application Make table queries create a new table from the records of another table In ms-access, to protect a database file from illegal access, we may set database password. The option of setting database password is available in Foreign key is a field that uniquely identifies each record and accept no null values Data definition queries are used to create or change database objects The attributes of a composite key are known as ________ OLE object is a data type in access Data displayed in forms cannot be edited A sub form is used to display one to many relationship between tables We can switch from datasheet view to form view by selecting view -> form view option In MS-Access long integer is a datatype In MS-Access, while designing a table for a particular field, the Required parameter is set to yes. This validates the field as _______
DB103 DB104 DB105 DB106 DB107 DB108 DB109 DB110 DB111 DB112 DB113 DB114 DB115 DB116 DB117 DB118 DB119 DB120 DB121 DB122 DB123 DB124 DB125 DB126 DB127 DB128
Sorting is applied to select only some particular records Filter by form can be created from a forms shortcut menu Advanced filter uses a filter similar to the query design window to create a filter ? Wildcard character represents any number of characters _________ of the following is/are a type of chart A bound control is tied to a underlying query or table A calculated control uses expression as a source of data Text boxes cannot be bound controls The default query invoked by ms-access is A control can be bind to a record using row source property List box is a control that offers a list of choices If a table is joined to itself it is called a ________________ A picture box combines the activities of both a text box or a list box Line is a tool box control Text boxes can be part of a option group _____ chart exists as a separate object Filtering data is a way of arranging data in a meaning full order Wild card characters are used for sorting records Pivot tables are used to navigate to the other tables in a database Reports are used to represent un-editable data In MS -Access, the records in a table are sorted based on _________ Relationship is an association between _________ Summary options dialog box is used to summarize data ______ queries can be used to delete a group of records that meet some specific records Charts can convert numerical data in a easily understandable format Embedded charts exist separately
DB129 DB130 DB131 DB132 DB133 DB134 DB135 DB136 DB137 DB138 DB139 DB140 DB141 DB142 DB143 DB144 DB145 DB146 DB147 DB148 DB149 DB150 DB151 DB152 DB153 DB154
The chart which cannot exists as a separate entity are _______________ From ms - access, if we want to view the records stored in a table in ms - excel worksheet, we need to Page header is present at the beginning of each record Detail section has a header and footer A macro is performed only when the user initiates an event The macro is selected from the action field of a macro sheet A macro can be made to execute before the starting of a database In MS-Access. While appending records, the source and the target table must have similar structure and fields We can add our own functions to the expression elements list box of the expression builder _______is the wildcard character which represents the presence of any number of characters Macros can be used to add a menu to a database object _____ header is a unique feature of reports Chart can either be a form or a report Group header will be present at the design view of a report even if the report is not grouped We can change from the design view to the form view without being prompted for saving the changes made Charts can be produced without the wizard Macros can be used to create user defined error messages Between and Not Between is ______ type of operators The default data type of VB is integer Visual Basic is based on __________ _______is the name of the database object that displays data and can be used to edit data In access OLE objects cannot be linked _____ section is present for each record in the report A ________ sheet lists all the properties that pertain to the form or the controls Textboxes can also be an example of unbound control In MS-Access, we may design command buttons for navigating records
DB155 DB156 DB157 DB158 DB159 DB160 DB161 DB162 DB163 DB164 DB165 DB166 DB167 DB168 DB169 DB170 DB171 DB172 DB173 DB174 DB175 DB176 DB177 DB178 DB179 DB180
_______are forms that are included in other forms _______ are used to represent our data in graphical format A field with a _______ uniquely identifies each record Large amount of data can be summarized using ______ tables _______ are employed to select only some particular records from a database object ______ control need not have a data source ______ control combines the functionality of both a text box and a drop down list MS access is a DBMS A form can be bind to a record source using _____ property of the form ______ forms displays field in single row ______ forms are usually used for tables with one to many relationship _______ control uses an expression as a source of control _______ control is tied to field _______is the form that can be created with minimum input from the user ______option from the tool menu is selected for setting relationships between tables ______,______and_____are the buttons belonging to the options group _________allows us to create a filter from a field short cut menu ________is a database object which displays data but cannot be used to edit data What term applies to a collection of related records in a database? All of the following terms are related to computerized databases except which one? What is a database? What does a record contain? An RDBMS is a Data Warehousing refers to Unauthorised alteration of on-line records can be prevented by employing What is a database?
DB181 DB182 DB183 DB184 DB185 DB186 DB187 DB188 DB189 DB190 DB191 DB192 DB193 DB194 DB195 DB196 DB197 DB198 DB199 DB200 DB201 DB202 DB203 DB204 DB205 DB206
What does a record contain? What is a report? What is the best way to analyse and change data What are some popular office orientated software applications? Which of the following constraints can be used to enforce the uniqueness of rows in a table? Which of the following commands is used to change the structure of table? An RDBMS is a Data Warehousing refers to You are creating a client application that calls ActiveX DLLs. Which of the following properties of the Err object provides the name of a component that This database holds personal information. The user can help to keep it confidential by If the database holds customer names and addresses, personalised letters can be created automatically using Application software suited to storing the survey information obtained in the table would be The characters * and ? are sometimes used in search criteria as Which of the following field types will generate the primary key automatically? Referential integrity ensures that the: Tables are related to one another through a: A foreign key is: You are creating a banking database to track customer loans. The bank will, of course, have many customers, each of whom may take out one or more loans, In a one-to-many relationship between Companies and Employees, which field is found in both tables? Which of the following ensures that records in related tables are consistent with one another? For example, it ensures that you cannot add a record with an How would you delete a relationship between tables in the Relationships window? In a Customers tables, what does a plus sign next to the CustomerID field mean? What is required of the fields that join two tables? Assume a one-to-many relationship between the Customers table and the Loans table, with referential integrity in effect. What happens when you attempt Which of the following is true when viewing a main form and its associated subform in the Form Design view? Which of the following relationships does not belong in a database based on a professional sports league such as football or basketball?
DB207 DB208 DB209 DB210 DB211 DB212 DB213 DB214 DB215 DB216 DB217 DB218 DB219 DB220 DB221 DB222 DB223 DB224 DB225 DB226 DB227 DB228 DB229 DB230 DB231 DB232
Which symbol is used at the end of the join line in a related table to signify the “many” side of a one-to-many relationship? You have created a one-to-many relationship with referential integrity between a Customers table and a Loans table. From which table can you delete a record? The correct order of the arguments for the MsgBox statement is: The first statement in a procedure named CreateList is: Which of the following is TRUE related to form fields? A text field: The purpose of a database is to: A database stores: A database records: A sales contact manager used by a salesperson is an example of _______________ A Customer Resource Management (CRM) system is an example of_________ The industry standard supported by all major DBMSs that allows tables to be joined together is called __________. A program whose job is to create, process and administer databases is called the _____ Microsoft Access may use which of the following DBMS engines? Which of the following are basic components of an enterprise-class database system? In an enterprise-class database system ________ . In an enterprise-class database system, the database application ___ . In an enterprise-class database system, reports are created by ____________________ . A database is considered "self-describing" because _______ . In an enterprise-class database system, the database _________ . A database may contain _________________________ . A database designed using spreadsheets from the Sales department is a database being designed _________________________ . A database designed to implement requirements for a reporting application needed by the Sales department is a database being designed _______ . A database designed to combine two databases used by the Sales department is a database being designed _________________________ . Database professionals use ________________ as specific data sources for studies and analyses. Database professionals use a set of principles called ________________ to guide and assess database design.
DB233 DB234 DB235 DB236 DB237 DB238 DB239 DB240 DB241 DB242 DB243 DB244 DB245 DB246 DB247 DB248 DB249 DB250 DB251 DB252 DB253 DB254 DB255 DB256 DS1 DS2
A very popular development technique used by database professionals for database design is known as _______________________ . A very popular development technique used by database professionals to adopt a database design to new or changing requirement is known as _____ . The predecessor(s) of database processing was (were) __________ . In a relation __________________________ . An attribute is also known as a(n) . A combination of one or more columns used to identify particular rows in a is___ . A combination of two or more columns used to identify particular rows in a relation is________ . A determinant that determines all the other columns in a relation is______ . When designing a database, one of the candidate keys in a relation is selected as the _________ . Normalization is a process used to deal with which of the following modification anomalies? When you are given a set of tables and asked to create a database to store their data, the first step is to ____ . Modern microcomputer personal DBMS products______. Which of the following are true about data mining applications? We have obtained access to the company's operational data. We examine 50 records for customers with phone numbers that should use the current area We have obtained access to the company's operational data. We have been asked to produce a report with an item by item analysis of sales, but the only A data warehouse database differs from an operational database because: Which of the following objects is used to display a menu? Which of the following objects are NOT found in an Access application? You are developing an Access application that you expect to upgrade periodically. Which of the following statements is TRUE? Which of the following statements regarding Access applications is NOT true? Which of the following brings a copy of the table into the current database and does not maintain a tie to the original table? What makes a database an application? What is the Access tool that is used to create the user interface? The purpose of a data warehouse is to: ___________ means the result of applying to specific information certain specific technical processes. __________ is an algorithm which creates a digital representation or "fingerprint" in the form of a "hash result".
DS3 DS4 DS5 DS6 DS7 DS8 DS9 DS10 DS11 DS12 DS13 DS14 DS15 DS16 EC17 EC18 EC19 EC20 EC21 EC22 EC23 EC24 EC25 EC26 EC27 EC28
__________ is of standard length which is usually much smaller than the message but nevertheless substantially unique to it. Digital Signature involves two processes. They are ___________ and __________. The Costs of Digital Signature consists mainly of the following CA stands for ________________ A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the Private Key, Serial number of the digital certificate ______________ enable web servers to operate in a secure mode. ______________ are used by individuals when they exchange messages with other users or online services. ______________ are on-line databases of certificates and other information available for retrieval and use in verifying digital signatures. Signing Writings serve the following general purposes______,_______,_______ and _______ The most widely accepted format for Digital Certificate is defined by the CCITT X.509 A certificate may prove to be unreliable, such as in situations where the subscriber misrepresents his identity to the certification authority CRL stands for The prospective signer identified in the digital certificate holds the_________ and is called the ___________ In EDI interface, the translation service receives _________ as incoming files from the communication service The EDI standardisation for International Trade and Commerce is introduced by __________ In EDI, the transmission files are composed of different sets of external format files which are grouped into multiple sets under the name of ________ The ________________ are pre-paid credit cards that include an embedded cards ________________ are another form of credit payment that lets customers use digital online cheques to pay Web merchants directly In Active advertisement, there are two types of models. They are _____ and ________ The network based technology is/are ____________ Decryption is a process employed for scrambling of plain text for web based transactions Asymmetric cryptosystem is based on __________ and ____________ Value Added Network is an example of _________ The advertising strategies emerging in the on-line world are ____________ The _________ model use direct mail, spot television or cable television, in active based advertisement.
EC29 EC30 EC31 EC32 EC33 EC34 EC35 EC36 EX1 EX2 EX3 EX4 EX5 EX6 EX7 EX8 EX9 EX10 EX11 EX12 EX13 EX14 EX15 EX16 EX17 EX18
The ________ is a form of mail that is not targeted to a specific audience The __________ model refers to information that is placed at a point where it will be noticed by customers in the course of other activities and does not The most beneficial advantage of ERP system is What is the term that describes spying on one‟s business rivals to gain a competitive advantage? What would you NOT be looking for when spying on a competitor? An online drugstore such as Drugstore.com is an example of_______ Which of the following is an example of unacceptable online „netiquette‟? Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system? The wizard that is used to import text files is_________________ The alphabet indicating the column followed by the row number is known an__________ Which of the following files could not be opened in excel _______________ In excel, the dates that are stored as sequential numbers known as ________________The command to display the current date in a cell is _________________ In excel, absolute references are represented by a ________ before the column and row addresses The ________ can be used to select the function and assemble the arguments correctly Specific parts of information required by functions to perform certain tasks are called as___________ Which of the following do not belong to the formula category in excel environment__________ The function that in used to join cell values together in a single cell ________ The function that is used to count all the values that meet specific criteria _________ The wizard that is used to create and edit charts _______________ The function that is used to calculate the payment for specific loan terms ____________ The function that is used to add together all values that meet specific criteria is known as ____________ The __________ option present in the file menu options is used to specify major facts of the page to be printed The command that is used to apply a format automatically __________ The ____________ makes the information in a worksheet meaningful and easy to understand A particular part of a work sheet can be printed by setting the _________
EX19 EX20 IN9 IN10 IN11 IN12 IN13 IN14 IN15 IN16 IN17 IN18 IN19 IN20 IN21 IN22 IN23 IN24 IN25 IN26 IN27 IN28 IN29 IN30 IN31 IN32
The process of finding or selecting information is known as ____________ The option that is used to cancel the filter process for a specific column and display all the records is ________ The URL for encyclopedia Britannica is_________ _______ maps IP addresses with the domain names of the sites Internet can be defined as _______ The most important service of the ______ is to manage traffic control _________is a program that displays information about a host connected to the net _______ is a program or a tool that helps in locating a file anywhere on the net URL stands for ____________ IN an URL the word before the color refers to _______ A ______ always begins with a slash Prodigy is run by IBM and ______ The World Wide Web is referred to shortly as the _______ Gopher and WAIS enables the user to ______ ______ is the program used to run CompuServe's regular services Navigating through the menu of gopher is called moving around _______ The directories that come with built-in engines are yahoo,lycos and ______ To use the finger command,SLIP users must run a programme called______ The web maps are called _______ Directories consists of _______ levels The _____ level gives the broadcast overview of the net The huge list of keywords from important items is called ______ The two types of search in veronica are _____ and ______ _______ searches by keywords Mosaic displays links in color whereas _____ does not display links in color ______ supports one button publish
IN33 IN34 IN35 IN36 IN37 IN38 IN39 IN40 IN41 IN42 IN43 IN44 IN45 IN46 IN47 IN48 IN49 IN50 IN51 IN52 IN53 IN54 IN55 IN56 IN57 IN58
SPY MOSAIC is distributed by_______ ______ is a program that helps us to log on to other networks HTTP is the acronym for __________ ______is used to transfer and copy files over the internet _____ is a program that helps us to log on to other networks TCP/IP stands for ________________ Archie servers can be accessed in_______ different ways in internet _______is the computer on the internet that translates between the internet domain names and the internet numeric address TIA stands for_____ in internet Service indicates the name of the ________ used to access data, present on the other end of the link. HTTP stands for______ ________ is used to link pages in the world wide web FAQ stands for ______ The internet adapter is a programme that makes our connection act like a _____or a ____ account The step involved in Communicating between the web clients and servers is ______________ WSIRC stands for______ Two of the important browsers are_____ and_____ Lynx is a _______ programme that works with terminals The huge list of keywords from important items is called an_____ VERONICA is an acronym for _______________ The first freenet is created at the_____ and is called______ ________ are defined as ways of communication amongst networks ______and_____ are web searching features WINWAIS has two source lists namely____ and______ ________ is also called as WAIS manager HTML stands for_____
IN59 IN60 IN61 IN62 IN63 IN64 IN65 IN66 IN67 IN68 IN69 IN70 IN71 IN72 IN73 IN74 IN75 IN76 IN77 IN78 IN79 IN80 IN81 IN82 IN83 IN84
The system of interlinked documents is known as_______ The small programmes that create animation,multimedia,real-time games and multi user games are called______ The information displayed on the web page includes______,_____ and_____ The web pages that represent online home of their author are called______ GNN stands for______ _____ is the most popular internet service The online service offered by navigator gold 2.0 are _______ and_____ _______ is a program or a tool that helps us find a file anywhere on the net The databases to enable keyword search using Lycos are a2z,_______ ______ is a large worldwide bulletin board service network BABEL consists a glossary of _____ Dictionaries,encyclopaedias,government and other references are found in ______ Yahoo,lycos,excite and webcrawlers are _____ GIF is the acronym for ____________ JPEG is the acronym for ___________ The Web aids users to explore the ________ The three most popular mailer are_____,_____ and______ The World Wide Web consists of _________ In Microsoft Internet Explorer, the color of the text can be specified using _________ attribute of the font tag. The interface that provides effective communication between the web browsers and servers is _________ CGI is the _________ between web browsers and servers CGI programs are invoked based on the information provided by the _________ A CGI program is usually called after a request made by the _________ URL stands for ________ A hyperlink can be on ___________ HTML was derived from _________
IN85 IN86 IN87 IN88 IN89 IN90 IN91 IN92 IN93 IN94 IN95 IN96 IN97 IN98 IN99 IN100 IN101 IN102 IN103 IN104 IN105 IN106 IN107 IN108 IN109 IN110
SGML is a _________ PINE stands for _____________ The application that confirms whether a document is compliant to its DTD is _________ Web is a collection of ___________ IETF stands for ________ The two major browsers used to surf the Internet are ________,_______ Special characters allow browsers to display _________________ The keyword for providing links within or across documents is____________ Stringing pages together using hypertext technology helps view pages _______________ The initial web pages present in a web site is the ________ page. The image format supported by most browsers is________________. The components of a URL are ___________ The mail we send has a mailing address and most of them correspond to_____,_____ and Which of the following is not supported by internet explorer _______________ CGI stands for ____________ Host name indicates the domain name of the web ________ The internet is also called as _______________ The internet is similar to _________________ The net drivers______ from one place to another The net provides interesting services like______,______ and______ The windows internet software available are______,_______,________ and______ ________ is the ancestors of the internet DARPA stands for _______________________________________________ The uuencode files start with a _______ DARPA is broken into ________ and _______ NSFNET is the united states provides service to _____ and_____
IN111 IN112 IN113 IN114 IN115 IN116 IN117 IN118 IN119 IN120 IN121 IN122 IN123 IN124 IN125 IN126 IN127 IN128 IN129 IN130 IN131 IN132 DS17 DS18 DS19 DS20
HTML stands for ______________________________________ The first international IP network connections were established in 1973 with _____ and_____ A_____ is a set of computers interconnected by transmission paths to exchange information in internet A computer that provides a service usable by other computers is called______ A_______ is the representation of physical connectivity of the computers in internet DTE stands for ____________________ The basic function of the ______ is transmitting the bits over a channel The point to point channel network is also called as _____ and_____ Accessing files using FTP servers is called_____ The three most commonly used networks are______,______ and______ ________ is in between LAN and WAN _____ can be owed by multiple organisation Data is transmitted in the form of_____ signals DTD stands for __________ Modem stands for __________________ ______ is the process of the digital signals being converted into a form suitable for analog transmission ________ and______ are two basic ways of getting connected to the internet SLIP stands for ________________ PPP stands for _____ Which of the following best describes uploading information? A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time, expressed in bits per The act of searching through storage to locate information without necessarily knowing of the existence of the information being sought. A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named in the certificate is called the ____________ The Relying Party can use the ___________ listed in the certificate to verify that the digital signature was created with the corresponding _________ Digital Signatures are used for a variety of Electronic Transactions like ________________________ To associate with a key pair with a prospective signer, a Certification Authority issues Digital Certificate
DS21 DS22 DS23 DS24 DS25 DS26 DS27 DS28 DS29 DS30 DS31 DS32 DS33 DS34 DS35 EC1 EC2 EC3 EC4 EC5 EC6 EC7 EC8 EC9 EC10 EC11
Digital Signatures, if properly implemented and utilized offer promising solutions to the problems of Imposters, Message Integrity, __________ and In, Digital Signature, _____________ perform the "ceremonial" function of alerting the signer to the fact that the signer is consummating a transaction with A Digital Signature must have the following attributes ________________ and _____________ "Hash Function" is used in both creating and verifying Digital Signature ___________ provides assurance of the origin or delivery of data in order to protect the sender against false denial by the recipient that the data has been ___________ serves the ceremonial and approval functions of a signature and establishes the sense of having legally consummated a transaction. ________ is a branch of applied mathematics concerns itself with transforming messages into seemingly unintelligible forms and back again. The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily termed as _________, and ____________ _______ is known only to the signer and is used to create the digital signature. _______ is ordinarily more widely known and is used by a relying party to verify the digital signature. ____________ is the art of protecting information by transforming it into an unreadable format. Which of the following activities would most likely detect computer-related fraud? A digital signature is used primarily to determine that a message is: What is a major disadvantage to using a private key to encrypt data? Which of the following risks can be minimized by requiring all employees accessing the information system to use passwords? The acronym for B2B is ___________ The _____________ model is the least intrusive model but requires active search on the part of the customer __________ is / are a form of advertisement where people relate their experience with products and services The _________ are software agents who communicate with the business merchants on behalf of the customers The Pre-purchase preparation phase includes _______________ for a set of products The _________ phase includes customer service and support to address customer complaints , product returns and products defects The ________ allow companies to bypass the need for costly printed catalogs A ________________ is a basket on the Net that is used to place the items that are being purchased EDIFACT is an abbreviation of ________ The __________ allows for protocol conversion and communicates with the bank using the banks private network or the Internet In Ecommerce, data extraction, transforming the data into transmittable form, transmitting the data and downloading the data are the operations employed in
EC12 EC13 EC14 EC15 EC16 EX21 EX22 EX23 EX24 EX25 EX26 EX27 EX28 EX29 EX30 EX31 EX32 EX33 EX34 EX35 EX36 EX37 EX38 EX39 EX40 EX41
The _________ commerce assists in integrating the customers and suppliers of the company directly into the organisation E-cash means______________________ E-commerce is a tool that addresses the desire of firms to cut services cost and improving the quality of goods. It is a definition of e-commerce from _________ The small denomination digital tokens are called _________ The ____________ is the process of encoding information to prevent it from being read by unauthorized parties There are _________ types of data tables The tables that allows the user to change or rearrange the data, summarize the data and evaluate the data using changing points of view is known as The wizard that is used to suggest hints for doing a task In a chart Y-axis is known as_________ In a chart X-axis is known as_______________ _________ is a set of tables that describe each of the data series ________ is used to differentiate one data series from another The chart that contains only one data series is _________ The chart that holds the column chart is _________ The chart that display two or more data series on a surface is _________ The chart that is used to display discrete data _________ are not allowed in a macro name Which of the following tool cannot be used to view the excel web page_______ The wizard that used to build an interactive table from data existing on sheets The chart that is used for displaying stock market information In excel, the subtotal command also generates grand total after the last group subtotal_________ In advanced filter , the criteria occupying multiple columns but more than one row, is considered as an ________ criteria. The stacked bar graphs can be represented in __________ A pie chart can represent only one data series at a time The ______ generates a summarized report in tabular form in an interactive manner Which one of the following statements related to stock chart is NOT TRUE ?
EX42 EX43 EX44 EX45 EX46 EX47 EX48 EX49 EX50 EX51 EX52 EX53 EX54 EX55 EX56 EX57 EX58 EX59 EX60 EX61 EX62 EX63 EX64 EX65 EX66 EX67
The state government needs to finalize a five years plan to implement 100% literacy in the state. Which one of the following will be the best tool that should Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. Which one of the following will be the tool that provides a way to view and compare the results of all the different variations together on the worksheet ? A ___________ is an excel file where the user stores his data Spreadsheets are useful for _______________ Which one of the following is NOT the component of the pivot table ? Excel allows upto ______ levels of sorting Filtering rearranges a list to display the required records The stacked bar graphs can be represented in _____________ The ______ generates a summarised report in tabular form in an interactive manner Which one of the following statements related to stacked bar chart is NOT TRUE ? The state government needs to finalize a five years plan to implement 100% literacy in the state. Which one of the following will be the best tool that should Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. Which following function is used in subtotal option ?______________ A workbook consists of many ________ Which two of the following statements related to pivot table are TRUE ? Which one of the following is NOT a What-if analysis tool ? The _________ wizard separates contents in a cell into different cells A spreadsheet is a grid of rows and columns and is called as a ________ Pick out the window that is not a form of excel ___________ On an Excel sheet the active cell is indicated by… Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of cells A6, A7, and A8 are _____. If a cell shows ####### , it means that _____. Which is not an advantage of using computerized spreadsheets? The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. The use inputs different weights or amounts of exercise to The difference between the highest and the lowest values.
EX68 EX69 EX70 EX71 EX72 EX73 EX74 EX75 EX76 EX77 EX78 EX79 EX80 EX81 EX82 EX83 EX84 EX85 EX86 EX87 EX88 EX89 EX90 EX91 EX92 EX93
Spreadsheets can be used for... To select a column the easiest method is to … If you press _____, the cell accepts your typing as its contents. The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as All of the following are considered constants EXCEPT: Which of the following may NOT be included in a formula? Which of the following is NOT a valid mathematical operator in Excel? Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first? Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant? How can you tell which cell in a worksheet is the active cell? How can you change the active cell? Which of the following would you use to change the font size of a cell in Excel? The command that will save the current workbook with a different file type is: The command that will print an Excel workbook is found on the ____________ menu. In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the date and time a file was last modified. Which of the following commands will automatically adjust cell references in formulas? Which of the following commands will remove cells, rows, or columns from a worksheet? Which of the following options is NOT controlled through the Page Setup command? Which command enables you to change the margins for a printed worksheet? All commands are carried out on a rectangular groups of cells known as a: Which of the following is a valid cell range? In a copy operation, the cell(s) you are copying from is called the: In a copy operation, the cell(s) you are copying to is called the: Which of the following commands is needed to duplicate the contents of a cell in another? A cell reference that does not change during a copy operation is known as Which of the following is considered an absolute cell reference?
EX94 EX95 EX96 EX97 EX98 EX99 EX100 EX101 EX102 EX103 EX104 EX105 EX106 EX107 EX108 EX109 EX110 EX111 EX112 EX113 EX114 EX115 EX116 EX117 EX118 EX119
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Which of the following commands is needed to transfer the contents of one cell range to another? The F4 key is used to: Which of the following quickly copies the formatting of a selected cell to other cells? Which of the following will insert a hyperlink into an Excel worksheet? Conditional formatting applies formatting to a cell based on: If you enter a date into a cell, Excel stores the date as: You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened that worksheet again on August 31. What will be displayed in The number of days between two cells containing dates can be calculated by: The function key that is used to quickly edit the contents of a cell is: What will be stored in a cell if 3/4 is entered in it? A user‟s response to the InputBox function can be stored in: The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is _____. The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test. To find the student with the highest mark, which of the Which chart type best shows proportions of a whole? Which of the following is TRUE regarding chart types? To select several cells or ranges that are not touching each other, you would _____ while selecting. Your Institute teachers have set an assignment on „Studies‟. You are required to use a spreadsheet to record all that you study on each day for four weeks. You What would be the best method to quickly copy the formula from the active cell to each cell below it? To arrange rows in alphabetical order based on column A, you need to use the command _____. What can you NOT do with a spreadsheet? To print just part of a sheet, you would select what you want to print and _____ . Spreadsheets can be used for... The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is _____. Which of the functions is not valid for performing addition
EX120 EX121 IN1 IN2 IN3 IN4 IN5 IN6 IN7 IN8 IN133 IN134 IN135 IN136 IN137 IN138 IN139 IN140 IN141 IN142 IN143 IN144 IN145 IN146 IN147 IN148
The default orientation for the printed page is _____. Which is not a valid cell address? The World Wide Web was devised by _________ The useful URL schemes are_____ and______ The other ways of getting connected to the net are_____ BBS stands for______ USENET is a BBS on ____ scale WINSOCKS is expanded as______ IETF Level 2 HTML DTD supports graphical browsers like _______ The space used by Netscape to store the retrieved page is called______ The principles, means and methods for rendering information unintelligible and for restoring encrypted information to intelligible form. A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt an decrypt messages and Protected/private character string used to authenticate an identity or to authorize access to data. The successful act of bypassing security mechanisms of the system. A set of rules and formats, semantic and syntactic, that permits entities to exchange information. An attempt to get access to a system by posing to be an authorised person. An action or event that might prejudice security. According to information Technology Act, 2000, To investigate contraventions the controller of certifying authority shall exercise the like powers to that of Malicious software. None the person who is known as father of Internet This website is the biggest bookstore on the earth. When we talk of Data Transmission modes, then ATM stands for A sequence of bits or characters that identifies the destination and the source of a transmission. The means of communicating between networks A group of computers and other devices dispersed over a relatively limited area and connected by communication links that enable a device to interact with any The term HTTP stands for
IN149 IN150 IN151 IN152 IN153 IN154 IN155 IN156 IN157 IN158 IN159 IN160 IN161 IN162 IN163 IN164 IN165 IN166 IN167 IN168 IN169 IN170 IN171 IN172 IN173 IN174
A NIC is considered as A hub is a device that can connect Which of the following is true concerning the function of a switch? What do routers connect? What does a router route? Software which prevents external access to a system is termed If four computers are connected to a hub and then to the internet, how many IP addresses are required for these 5 devices? Which of the following in an OSI layer When creating a network from just two PCs, what kind of cable would be used to connect them? An IP address is a To construct a simple LAN of 4 computers, you would connect them with ______connect them What happens to data that is ruined before reaching to receiver Bluetooth is Which is not one of the recognized IEEE sub layers? The most preferred number system to represent a IP address is A MAC address is of Protocol is A ............... is a LAN-based computer with software that acts as a controlling device for controlling access to at least part, if not all, of a local area network What is the biggest disadvantage of the Ring topology? The .............. of the network concerns how network devices are physically (or optically) interconnected. The principal topologies used with LANs are: What are the various types of bus architecture? What are the various types of ring architecture? In a ................., each workstation attaches to a common backplane via its own physical cable that terminates at the hub In a ............... , each work station is directly connected to a common communications channel Which one of the following is NOT a network topology?
IN175 IN176 IN177 IN178 IN179 IN180 IN181 IN182 IN183 IN184 IN185 IN186 IN187 IN188 IN189 IN190 IN191 IN192 IN193 IN194 IN195 IN196 IN197 IN198 IN199 IN200
In a .............. , the cable system forms a loop with workstations attached at various intervals around the loop The Media Access Control (MAC) is a sub layer of the: What are the most common LAN technologies used in networking today? Modem speeds are measured in LAN speeds are measured in WAN speeds are Accessing the Internet from a typical home PC requires the use of To use the Internet, you The worldwide web server uses the following standard interface to act as the middleware: An NIC Accessing the Internet from a typical home PC requires the use of The most widely used network operating system on PC LANs is JPEG and MPEG To use the Internet you A multiplexer is a form of An ISP FTP is Telnet A firewall is A proxy server is A search engine is To look for information about interest areas on the internet, the user should use a An ISP FTP is Telnet Which of the following is a true statement about the OSI model layers?
IN201 IN202 IN203 IN204 IN205 IN206 IN207 IN208 IN209 IN210 IN211 IN212 IN213 IN214 IN215 IN216 IN217 IN218 IN219 IN220 IN221 IN222 IN223 IN224 IN225 IN226
Which of the following is NOT true about the Internet? The traditional intent and impact of this common type of attack is to prevent or impair the legitimate use of network resources. A firewall is Which of the following is NOT an example of a DoS attack that is popular among hackers? A ____________ attack is when a hacker sends a continuous flow of packets to a system. One defense option on a large network is to configure a ____________ to disallow any external traffic. A proxy server is Which of the following would be performed on a network server and not normally on individual workstations? What can be said about the safety of the Internet? To secure communication network against wire-tapping the most effective control is One way that a virus CANNOT spread throughout a network is: Which of the following is NOT a means of monitoring employee use of company technology? ____________ would be used by parents to monitor their children on their home system. The formal rules and parameters which are established to permit a microcomputer to communicate with the mainframe computer as though it was The two most common tools used to help with extracting information are: Which of the following would NOT be considered an example of cyber terrorism? Which of the following would be a form of cyber terrorism? Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life? An organisation is upgrading its telecommunication lines. Which is the least important objective while upgradation A company posts a price list of its products on its website. The advantage to the customer is that the company can Which of the following is an easy-to-use service to get information on someone? Which of the following pieces of information would NOT be found online? Which of the following is the most common danger on the Internet? The famous Nigerian Fraud scam offered victims the opportunity to: The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called _________________. Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called:
IN227 IN228 IN229 IN230 IN231 IN232 IN233 IN234 IN235 IN236 IN237 IN238 IN239 IN240 IN241 IN242 IN243 IN244 IN245 IN246 IN247 IN248 IN249 IN250 IN251 IN252
Setting your privacy settings in Internet Explorer to medium is one way to block: What is the best means of protection from cyber stalking? Which of the following is not an appropriate control over telecommunications software Encryption techniques can be implemented in Hardware-Software Which protocol would be used to download a free anti-virus program from the Internet? The major advantage of the checksum program is when it Which of the following is a Web browser? A Web page is another name for ----------Domain names must contain a description of the type of organisation that the domain represents. A very common abbreviation used include: A standard language for creating and formatting Web documents is: The Web page format in which all elements of a Web page are saved as one file is called: Which of the following requires an Internet connection? Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer how would he do this? Which of the following is used to update a Web query? You download from the internet, a screensaver, a ten-second sound file and a ten-second music video clip. You also add a hyperlink. Which of the media When saving a photograph for use on a website, which format should you choose? While researching the Direct taxes assignment, you find a useful website. What is the most efficient way to access the site at a later time? A system that uses the Internet for business-to-business interaction is called a(n): A block of text automatically added to the end of an outgoing email is called _________ refers to the use of Internet technologies for placing telephone calls. Most client/server applications operate on a three-tiered architecture consisting of which of the following layers? Which do you NOT need to connect to the Internet? What does FTP stand for? What is the purpose of DNS? Which of the following is NOT a properly formatted IP address? Which of the following is a properly formatted email address?
IN253 IN254 IN255 IN256 IN257 PP1 PP2 PP3 PP4 PP5 PP6 VB11 VB12 VB13 VB14 VB15 VB16 VB17 VB18 VB19 VB20 VB21 VB22 VB23 VB24 VB25
The Internet is controlled by whom? What does IRC stand for? If you do not pick up your email for a week...? What does HTML stand for? What is a disadvantage of joining a mailing list? In Powerpoint2000 ,the built-in professional design elements are Selection handles are the 8 small ___________ that appear around the object, when an object is selected The _______ is an invisible matrix of vertical and horizontal lines that covers the entire slide workspace _______ are drop-down menus that appear when the right mouse button is clicked on the screen element ________ and ______ have the ability to add a lot of visual impact into the PowerPoint presentation _______ is a motion picture or any animation file In visual basic, when a record pointer reaches to the last record, _______ property of a recordset object is automatically set to ______ In visual basic, the explorer view of a project is displayed in ___________ In visual basic, when a record pointer reaches to the first record, _______ property of a recordset object is automatically set to ______ In visual basic, _______ is a method to convert a string into integer. In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type of shape should we get? In visual basic, a timer event is only available in timer control. In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor of any object In visual basic, _______ is a property of a textbox control to set a color of a text. In visual basic, _______ property of a textbox control is set to _______ to underline a text In visual basic, _______ property of a textbox control is used to change the size of text. In visual basic, the interval property of a timer control is given in ________ In visual basic, _______ property of listbox control counts the number of items in the list In visual basic, the properties of various controls can be set using __________ In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a messagebox function. In visual basic, ________ is a function which displays a message and it also allows the user to enter values in a form object
VB26 VB27 VB28 VB29 VB30 VB31 VB32 VB33 VB34 VB35 VB36 VB37 VB38 VB39 VB40 VB41 VB42 VB43 VB44 VB45 VB46 VB47 VB48 VB49 VB50 VB51
In visual basic, using a data control, ________ is a recordset type which allows to add a new record and also to update existing record in a recordsourse object In visual basic, while closing a form _______ event of a form object is triggered earlier to terminate event. In visual basic, to give a backcolor or to bring in a picture to a command button can only be done if we set the style property to ______ In visual basic, a method RGB(255,0,0) will generate _______ color In visual basic, a method RGB(255,255,255) will generate _______ color In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible. In visual basic, if a user uses a function key F4 _________ becomes visible. In visual basic, when a textbox control receives the focus ________ event is triggered. In visual basic, a form is a ________ object. Microsoft visual basic is a Rapid Application Development tool. In visual basic, when a form object appears on the screen _________ event is triggered. In visual basic, to display text on a label object _________ property is used In visual basic, _______ object is used to access the database and also to manage the data in the database. In visual basic, when a checkbox control is checked _______ property is automatically assigned with 1. In visual basic, _______ keyword is used to declare a variable What is the extension of the Visual Basic project file that stores the design of a user control. Which event of a text box would you use for validating the data entered by the user? Which of the following statements forces inline error handling? The _______ method resets the contents of bound controls to their original values when the user clicks on the cancel button. To deactivate the Form UnLoad event, you make the following change in the function definiton: How many root nodes can a TreeView control have? A project group is a Project which: Procedures declared in a _____ are local whereas procedures declared in a ______ are available to the whole application. How can you keep the user from exiting a form by clicking the Close button? The _______ property enables Visual Basic to draw complete images in memory before displaying them on the Screen. You want to display the code and the description of an error. What would be the correct syntax?
VB52 VB53 VB54 VB55 VB56 VB57 VB58 VB59 VB60 VB61 VB62 VB63 VB64 VB65 VB66 VB67 VB68 VB69 VB70 VB71 PP7 PP8 PP9 PP10 PP11 PP12
What is the purpose of the Image List Control? Which method would you use to get a free or unused File identifier while opening any file: Which property procedure is used to retrieve the value of a property? Which of the following can be shown to the user using the Common Dialog control in VB? Which of the following are not properties of Command Button: Which events enable you to determine which key was pressed by the user? In order to access a file in Non-textual format, you have to open file in: Visual Basic displays information depending upon the current value of two properties of the form, called: Which of the following procedure types will execute when you assign a value to a property of an object? In order to overlap the controls (say a command button) during design time, we use the „Send To Back‟ or „Bring To Front‟ option from the Edit menu. To Which property of the ProgressBar determines how much of the bar is filled? The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program. The caption and the name properties of the command button: You try to initialize a new Object variable with the following line but receive an error. What could be the possible cause? Set MyVar = New Classname Which of the following will perform a direct execution of a Command object? The vb Critical symbol displays: vbYesNo is an example of a(n): The primary difference between the MsgBox statement and the InputBox function is the: Which of the following is TRUE about a protected form (i.e., a form where the Protect Form button on the Forms toolbar is toggled on and is assumed to Which event is triggered when the user moves to another open form? The user can use ______ to remove the undesirable part of the image The power presentation has a _____ for a set of compatible colors The set three colors used for graphs and for secondary slide items is called as There are ______ types of charts available in PowerPoint _______ charts are useful while showing variations over a period of time _______ are the individual pages of a presentation
PP13 PP14 PP15 PP16 PP17 PP18 PP19 PP20 PP21 PP22 PP23 PP24 PP25 PP26 PP27 PP28 PP29 PP30 PP31 PP32 PP33 PP34 PP35 PP36 PP37 PP38
A PIE Chart is a ____ diagram that depicts the relationship between a whole and its parts Each individual piece of data in a series is called a/an PowerPoint launches an OLE-compatible application called When the user double-clicks on an organization chart object in PowerPoint The _____ are used for selecting, editing and viewing objects in the chart Manager box tool in organizational chart window is The custom drawing tools are _______ by default Click on the box tool ______ to draw three boxes There are ____ default fields available in all boxes of the organizational chart The _____ tool is used in the same way as we use a pen to draw a table A/An _______ consists of smaller printed version of the slides The size of the object can be changed using the ______ tool _______ is the process through which the slides in the current presentation are included in another presentation or application ________ can be used to create charts as well as worksheets PowerPoint can import text files that have been saved in ______ format PowerPoint outlines can have _____ outline levels When a file is saved with _____ extension, the graphics and text are also saved along with the slide The hidden slide is ____ effect is used to introduce a slide during a slide show A _____ is a special effect that determines how the objects appear on the slide The notes page is formatted based on the Pick the odd man out of the following When a new presentation is opened ,powerpoint creates slides that have a width of _____ and a height of ______ with the landscape orientation The default orientation for notes ,handouts and outlines is ____ orientation Build effect is also called as ______ Graphics for web pages are automatically stored in ____ format
PP39 PP40 PP41 PP42 PP43 PP44 PP45 PP46 PP47 PP48 PP49 PP50 PP51 PP52 PP53 PP54 PP55 PP56 PP57 PP58 PP59 PP60 PP61 PP62 PP63 PP64
A _______ is used to jump to any slide in the presentation The ______ language has been incorporated into PowerPoint In PowerPoint _____ is a series of commands that are executed in sequence The macro will be activated Developers can easily add ____ to PowerPoint 2000 by using the programming interface ______ determines the order in which order in which the slides will be displayed during the show _______ is used to organize and develop the contents of a presentation If we save the presentation file as a metafile, it can be opened using With reference to autocontent wizard for creating a new presentation, which of the following statements are not true Which of the following statement is not TRUE With reference to changing the order of slides, which of the following statement is not true Which of the following definitions are not true Which of the following statements are not true Which of the following definitions are not true The options available in the common task toolbar does not include With reference to chart, which of the following statements are not true The format of the text entered in a title, subtitle, or bulleted-list object is determined by the format settings in a special slide called -------PowerPoint provides a _________ that searches the entire presentation i.e., all the text objects in all the slides, outlines, notes and handouts for spelling errors PowerPoint's drawing toolbar contains _______ drawing tools Click _______ on the rectangle drawing tools enables us to draw multiple rectangles An example of the components of a multimedia presentation could include Which of the following formatting elements can be applied to a PowerPoint diagram using the AutoFormat tool? Which of the following formatting elements can be applied to a PowerPoint diagram using the Format AutoShape command? What happens when you double click a blank graph placeholder in a PowerPoint presentation? The legend in a Microsoft Graph chart is: Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best chart type if you want to emphasize the total sales of each
PP65 PP66 PP67 PP68 PP69 PP70 PP71 PP72 PP73 PP74 PP75 PP76 PP77 PP78 PP79 PP80 PP81 PP82 PP83 VB1 VB2 VB3 VB4 VB5 VB6 VB7
Which of the following actions will enable you to insert a graph into a PowerPoint presentation? If you are editing a slide containing a Microsoft Graph, how do you display the underlying datasheet? How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished creating the chart? What happens when you click the Datasheet button on the Microsoft Graph toolbar? What happens if you single click a chart that is not currently active? What happens if you double click a chart that is not currently active? Using custom animation effects, you can build: Which of the following animation effects can be added to a slide? Which of the following animations effects can be added to a slide? Which keyboard key is used to select more than one picture on a slide? Custom animation can be used to affect ONLY: Which of the following best describes the information that appears on the advanced timeline? Which of the following objects can contain custom animation effects? What type of program allows an object within an image to be edited without affecting other objects? Which of the following animation effects can be added to a slide? Which of the following is TRUE regarding the Datasheet? Graphical software tools that provide complex analysis of stored data are: Which of the following statements is TRUE regarding PowerPoint diagrams? Which keyboard key combination is used to undo the previous command(s)? Microsoft visual basic project file has _______ file extension. In visual basic, _______ method is used to add an item in a combobox In visual basic, _______ method is used to load picture during runtime in an image control In visual basic, to populate a drive list box with a directory list box __________ statement is used In visual basic, to display a message in the run time _________ function is used In visual basic, to populate a directory list box with a file list box ________ statement is used In visual basic, ________ is a property of a recordset object which counts the number of rows in a recordsourse object
VB8 VB9 VB10 VB72 WO1 WO2 WO3 WO4 WO5 WO6 WO7 WO8 WO9 WO10 WO11 WO12 WO13 WO14 WO15 WO16 WO17 WO18 WO19 WO20 WO21 WO22
In visual basic, using a data control, a record can only be added from the last record. Adding a new record is only possible using _______ method of a In visual basic, using a data control, a record is saved to a recordsource object using _______ method of a recordset object. In visual basic, using a data control, to navigate to the previous record ________ method of a recordset object is used. To deactivate the Form UnLoad event, you make the following change in the function definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as _______ is a word processing that is a member of the office 2000 family The feature that enables user to type anywhere in a document without pressing or tab The______ feature allows the user to copy and paste upto 12 items at the same time in an application ______ and _____ key combination will extend the selection by one character on the left and right _____and_____ are improved layout in Word 2000 The easiest way to create a document in word is In Office2000 environment the tool that makes work easier for us is_____ A short description of a tool bar button called the ______ is displayed when the mouse pointer is allowed to stay for a second on the button The _____ helps us to keep track of the margin of the page The keys that are used to navigate between headers and footers are Pick out the element from the following that dose not form the type of tabs for the Word 2000 _______are blueprints or patterns for documents of a certain type The______ is used for quickly setting paragraph indention using the mouse Word art is text with AutoShapes in word can be created by accessing the _____ By default, a document consists of_____ section The dialog box that is used to determine the documents margins is ________ is a box surrounding a page on all slides or a line that sets off a paragraph on one or more slides The key that is used to perform a task to select all t he text in the documents is The key that is used to indent a paragraph is The key that is used to change the font from the current positioned in a document is The key that is used to change the style of the document that is from that normal to heading1 or heading1 to other document styles.
DA13 DA14 DA15 DA16 DA17 DA18 BC44 BC45 BC46 BC47 BC48 BC49 BC50 BC51 BC52 BC53 BC54 BC55 BC56 BC57 BC58 BC59 BC60 BC61 BC62 BC63
'Set mapping' Check control that follows a text-type validation, we use ---------------- application for data analysis. Excel can import data from other databases for the data analysis. A System Auditor can uses CAAT tools to analyze data In the case of the ---------- control, it is ensured that the data in combination with other fields are reasonable as per standard set by an organisation. --------------- function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in a table Most of the tools use in Data Analysis depends on How do you define analysis of an information system? What areas need to be considered in the SOFTWARE design process? What is the function of systems software? Formatting a disk results in all the data being...? What is Direct Implementation? What is parallel running? What documents are produced during the development of a system? What are User Guides are used for? Systems software can be categorised into: Which storage device cannot be erased? Application software are programs that are written Which bus carries information between processors and peripherals? Convert the decimal number 2989 to Hexadecimal Which bus controls the sequencing of read/write operations? What are utilities? Numbers are stored and transmitted inside a computer in The original ASCII codes A Nibble corresponds to A gigabyte represents A 32-bit processor has
BC64 BC65 BC66 BC67 BC68 BC69 BC70 BC71 BC72 BC73 BC74 BC75 BC76 BC77 BC78 BC79 BC80 BC81 BC82 WO23 WO24 WO25 WO26 WO27 WO28 WO29
A parity bit is he contents of these chips are lost when the computer is switched off? Clock speed is measured in Cache memory enhances CISC machines Which parts of the computer perform arithmetic calculations? Every data from the primary memory will be erased if An RS-232 interface is For print quality you would expect best results from ROM A UPS smart card Laptop computers use Multiprogramming refers to Multitasking refers to What are small high speed memory units used for storing temporary results? A good way to exchange information that changes rapidly is through Multiprogramming is a prerequisite for Timesharing is the same as ______ is the default view in Word used for typing Editing and Formatting the Text The short-cut-key that is used to indent a paragraph spacing in the documents is The short-cut-key that is used to paste the selected text The short-cut-key that is used for paragraph spacing(1.5) The box that separate text from the document and allows it to behave like an independent object is known as The object that is used to provide information like the title of the book, name of the chapter, page number etc. The object that helps us analyzing data statistically is known as
WO30 WO31 WO32 WO33 WO34 WO35 WO36 WO37 WO38 WO39 WO40 WO41 WO42 WO43 WO44 WO45 WO46 WO47 WO48 WO49 WO50 WO51 WO52 WO53 WO54 WO55
To highlight certain parts of a page to set it apart from the rest of the page we make use of the following features To clear all the tabs in a document the option that is clicked from the tabs dialog The dialog box that is used to incorporate picture bullets into our documents or web pages is The object that composes of set of tools which helps to create and work on different shapes like rectangles, circles, flowcharts etc. When word is opened a new document called_____ is displayed, where the user starts typing the content right way ______ is an online dictionary maintained by word to obtain synonyms for words The thesaurus is invoked by pressing_______ When a new table is created the insertion point flashes in the _____ By pressing the _____ key inserts a blank row after the last row in the table The ______ option enables us to convert text into a table format A table consists of ______ that contain text or graphics The _______ option in word allows the user to automatically correct misspell words as and when they are typed ______ is a facility that enables recording and replaying of a sequence of keystroke In Word Macros are written in _____ In Word 2000 the macro dialog box is activated with the help of ____ key combination ________shows how a document would look like when published on the web or on an intranet ______ is a software for sending and receiving e-mail messages ________is the coding system used to create web pages The network that makes information easily accessible across various networks is _______ Which of the following statements are false with reference to the use of a header row source for a mail merge With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false The alignment available for tabs does not include Which of the following statements related to a Section Break are True The user can set a spelling checker to skip the marked part of the next New option under the file menu of word creates a new blank document that is based on the normal templates The user can split the screen only into two parts
WO56 WO57 WO58 WO59 WO60 WO61 WO62 WO63 WO64 WO65 WO66 WO67 WO68 WO69 WO70 WO71 WO72 WO73 WO74 WO75 WO76 WO77 WO78 WO79 WO80 WO81
The features that enables the user to type text graphics tables anywhere in the document without pressing enter or tab The user can modify the picture from the clip art With reference to auto correct which of the following statements are false With the reference to password protected documents which of the following statements are false The alignment available for tabs does not include Which of the following statements are False Drop Cap tool does not work for the contents in the table format The user can split the screen only into two parts in MS-Word The special symbols that are inserted using "insert symbol" option of the word can not be printed by the printer as they are not standard keyboard symbols The "format columns" option allows to create columnar text up 12 columns only. The document that makes the user to organize and maintain a long document, such as multipart report or a book consisting of chapters The view that enables us to view how objects will be positioned on the page when it is printed The mode that is initialized or toggled to if the user is in a position to overwrite the text in the word Veena is entering a paragraph in a word processing program. When the cursor gets to the end of a line, what is the best way to get the cursor to the next line? How are data organized in a spreadsheet? Which key moves the cursor to the beginning of the next line of text? Veena typed the following sentence: "The girl was very beautiful." In which word processing utility could she find a synonym for "beautiful"? Using an electronic bulletin board, Seema can do all of the following except which one? Aryan has created a ten-page story, but only wants to print the first two pages. What printer command should he select? What process should be used to recall a document saved previously? Which is used to indent text within a document? Desktop publishing is a more sophisticated form of which of the following types of software? What is a Word Processor used for? What is a picture that is saved on a diskette and can be pasted into a document? What is a Word Processor used for? What basic tools would you find in the Edit menu of a word processor
WO82 WO83 WO84 WO85 WO86 WO87 WO88 WO89 WO90 WO91 WO92 WO93 WO94 WO95 WO96 WO97 WO98 WO99 WO100 WO101 WO102 WO103 WO104 WO105 WO106 WO107
What is a header in a document? What hardware is essential for a word? The user could take a picture from a magazine and insert it into the document by using a What basic tools would you find in the Edit Assume you are creating a two-column newsletter. Which type size is the most reasonable for the text in the columns? Given the default left and right margins, and ½-inch spacing between columns, the width of each column in a two-column document will be: Assume you have made all appropriate selections in the Columns dialog box in Word, but cannot see any columns on the screen. What is the most likely While word processing, in which of the following situations would Tom use the "Copy" command? What does a document contain? Before submitting your work you want to find any words spelt incorrectly. Which of the following would you use? What command in a word-processing program can be used to change the word „him‟ to „her‟, and also the word „he‟ to „she‟ in the given phrase? “On a cold and What edit commands would you use to insert a paragraph from one document into another document, while still keeping the paragraph in the first document? Which of the following statements would NOT be a reason for showing suggested revisions in a Word document without changing the original Which statement is NOT true regarding revisions made in a Word document? How are suggested changes entered for review on an initial Word document? Which of the following is TRUE about saving a document using the Versions command? What happens when you open a document that has been saved using the Versions command? You have used the word „discover‟ four times in an English essay you have created using a word processing program. You would like to find another word When opening and working with multiple versions of a document, how can you tell which is the most recent version? Various fields are added to a regular document to create a special document called a form through the ____________ toolbar. Which of the following types of fields CANNOT be inserted into a form? Which of the following is TRUE related to editing comments in a Word document? What is a header in a document? In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2. You would like to make this paragraph start on page Tables in a document help you to easily arrange all of the following EXCEPT: To identify a document, it is helpful to include the file name on each page as a
WO108 WO109 WO110 WO111 WO112 WO113 WO114 WO115 WO116 WO117 WO118 WO119 DA1 DA2 DA3 DA4 DA5 DA6 DA7 DA8 DA9 DA10 DA11 DA12 BC83 BC84
Which of the following tools will copy the formatting of selected text to other places? What is the name of the process of determining the cause of errors in a macro? Drop caps are added to a Word document using the ___________ menu. A reverse in a newsletter is: A pull quote is best emphasized by: Which of the following definitions is CORRECT? Pertaining to newsletters, which of the following cannot be changed using the Columns command dialog box? As related to type size, how many points are there to the inch? Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. The rest of the newsletter has two columns. Which of the following is NOT correct with respect to page, column, and section breaks? Which of the following would be the most appropriate font for a newsletter headline? Which of the following is the default Word column width? Sequence Check is a --------------- level control check. Analyse data over two or more periods is called ----------------------- analysis We use Hash Total to identify ------------ within a series where there is a definite relation between items Analyse fields by arranging them into rows and columns is called --------------------- function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in the To import data from Access to Excel ,it is not possible to link between Access and Excel sheet The GAP detection options can be used to test for completeness of data. Exception testing can be used to identify ----------------- items Data validity test represents Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that the data has been provided is for the correct audit period In Range Check , the data may not be in proper sequence but should be within a predetermined range In ---------------- Check data entry follow a particular sequence and also a predetermined range. Virtual memory is Multiprocessing is
BC85 BC86 BC87 BC88 BC89 BC90 BC91 BC92 BC93 BC94 BC95 BC96 BC97 BC98 BC99 BC100 BC101 BC102 BC103 BC104 BC105 BC106 BC107 BC108 BC109 BC110
To help keep sensitive computer-based information confidential, the user should What is the function of a disk drive? A 4GL is A nanosecond is What small, hand-held device is used to move the cursor to a specific location on the screen? The memory address register is used to store The memory data register is used to store The instruction register stores Which of the following is used to indicate the location on the computer monitor? A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate data. Which of the following translates a program written in high-level language into machine language for execution? Detecting errors in real memory is a function of To find where a file has been saved on disk, the user should A series of instructions telling the computer how to process data or files is defined as a To ensure that data is not lost if a computer system fails, the user should Having a single CPU alternatively process tasks entered from multiple terminals is called The place in the CPU where the data and programs are temporarily stored during processing is called the All are examples of computer software except Computer manufactures are now installing software programs permanently inside the computer. It is known as Which of the following file organisation forms most efficiently allows access to a record The part of the computer system controlling data manipulation is called the For direct access storage devices the recording area is divided into The data hierarchy from the largest to the smallest is Which of the following hardware or software system controls provides a detailed record of all activities performed by a computer system Which one of the following parts of a computer is necessary to enable it to play music? An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes of sound and 1 minute of video. Which of the four
BC111 BC112 BC113 BC114 BC115 BC116 BC117 BC118 BC119 BC120 BC121 BC122 BC123 BC124 BC125 BC126 BC127 BC128 BC129 BC130 BC131 BC132 BC133 BC134 BC135 BC136
Which one of the following printers is suitable for printing sprocket fed carbon copies? Multimedia software can be most productively used for To be effective a virus checker should be Which one of the following software applications would be the MOST appropriate for performing numerical and statistical calculations? Passwords enable users to How many bytes do 4 Kilobytes represent? Back up of the data files will help to prevent Which one of the following is the MOST common internet protocol? The advantage of a PC network is that The term A:\ refers to UPS stands for The main problem associated with uninstalling software is that You are conducting research for a Income Tax assignment. The raw facts you collect are called A flow chart is the A voucher entry in Tally is done for Passwords are applied to files in order to Each of the following is an enabler of IT-business alignment except: The basic systems model is used to describe virtually all information systems and it consists of the following elements: What is a computer-aided design system? A(n) __________ offers a solution package for an entire industry. File extensions are used in order to Information systems controls include all of the following EXCEPT: Hashing for disk files is called Components of expert systems include: a) inference engine; b) user interface; c) knowledge base; d) fuzzy logic Black box testing and white box testing are part of: What is the term used to describe the point of interaction between a computer and any other entity, such as a printer or human operator?
BC137 BC138 BC139 BC140 BC141 BC142 BC143 BC144 BC145 BC146 BC147 BC148 BC149 BC150 BC151 BC152 BC153 BC154 BC155 BC156 BC157 BC158 BC159 BC160 BC161 BC162
The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility Which of the following is an acceptable way to shut down the computer? Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot remember where you saved them. Which is the best way to Components of an information system model are: a) applications architecture; b) functional architecture; c) technology architecture; d) information architecture Benchmarks form part of: Continuity controls include: a) record counts; b) date checks; c) label checks; d) run-to-run totals Which is not part of help desk documentation: Testing of individual modules is known as: Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface architecture; d) presentation architecture Which is part of installation testing: The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a set of instructions provided by the: Which of the following falls under multimedia data: a) text; b) images; c) video; d) audio Which of the following procedures should be included in the disaster recovery plan for an Information Technology department? Designing relationships among components is part of: Several Computers connected together is called: Which network topology uses a Hub? Which of the following topologies is used for Ethernet? Application software are programs Which type of file search method requires a computer first read all locations preceding the desired one Which of the following areas of responsibility are normally assigned to a systems programmer in a computer system environment? Which of the following is recommended when many searches for data are required It is unlikely that a magnetic tape containing several thousand blocked records can be used on two machines of different architecture directly because Which component of the CPU has the most influence on its cost versus performance Which of the following terms applies to network used to connect computers with other computers, peripherals and workstations that are in fairly close Intelligent terminals differ from dumb terminals in that they A computer is to be linked to 8 terminals using a single communication link. To permit simultaneous terminal operations, communication path will require which
BC163 BC164 BC165 BC166 BC167 BC168 BC169 BC170 BC171 BC172 BC173 BC174 BC175 BC176 BC177 BC178 BC179 BC180 BC181 BC182 BC183 BC184 BC185 BC186 BC187 BC188
A modem is a device that A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and printers. This type of network is called a A computer based system for sending, forwarding, receiving and storing messages is called an If a workstation contains a processor, monitor, screen manipulation device, printer, storage and communication capabilities, it is said to be Terminal hardware controls include RS-232 is a What is a compiler? What are the stages in the compilation process? Which of the following is not a data transmission coding scheme What is the definition of an interpreter? A device used in data communications to divide a transmission signal into several sub-bands is known as a Third generation languages such as COBOL, C, and FORTRAN are referred to as Serial Communication is used over long distance because it In what areas is the COBOL programming language used? The primary function of a front-end processor is to What is the first stage in program development? Which of the following is not used for data transmission within a local area network What is System Analysis? A device to device hardware communication link is called What will a good software provider consider? The topology of a network can be each of the following except What is the 8-bit binary value of the decimal number 85? Which is the most common data transmission error checking method What is the decimal value of the binary number 1111? Which of the following devices merges communication signals onto a single line What is the decimal value of the octal number 215?
BC189 BC190 BC191 BC192 BC193 BC194 BC195 BC196 BC197 BC198 BC199 BC200 BC201 BC202 BC203 BC204 BC205 BC206 BC207 BC208 BC209 BC210 BC211 BC212 BC213 BC214
Which tool is used to help an organization build and use business intelligence? Cache memory enhances What is the decimal value of the hexadecimal number FF? Numbers are stored and transmitted inside a computer in What is the hexadecimal value of the decimal number 1476? A byte corresponds to What does EBCDIC coding of numbers mean? A Kb corresponds to What is the binary sum of 01011 and 00101? Information is stored and transmitted inside a computer in Where would you find the letters QWERTY? A parity bit is How did the computer mouse get its name? Clock speed is measured in What are you most likely to use when playing a computer game? CPU performance may be measured in A digitising tablet can be used for? In processing cheques which of the following I/O techniques have banks traditionally used Which of the following is a pointing device used for computer input? A UPS What does a light pen contain? The capacity of a 3.5” floppy is around What general term describes the physical equipment of a computer system, such as its video screen, keyboard, and storage devices? Where would you find the letters QUERTY? What are you most likely to use when playing a computer game? A digitising tablet can be used for?
BC215 BC216 BC217 BC218 BC219 BC220 BC221 BC222 BC223 BC224 BC225 BC226 BC227 BC228 BC229 BC230 BC231 BC232 BC233 BC234 BC235 BC236 BC237 BC238 BC239 BC240
Which of the following is a pointing device used for computer input? What input device could tell you the price of a product Where would you find a magnetic strip? Hard copy is a term used to describe...? What are the individual dots which make up a picture on the monitor screen Called A daisy wheel is a type of...? What input device can be used for marking a multiple-choice test? Laptop computers use QWERTY is used with reference to What input device could tell you the price of a bar of chocolate? A GUI is Where would you find a magnetic strip? Multiprogramming refers to Multitasking refers to Multiprogramming is a prerequisite for UNIVAC Computer belongs to the Timesharing is the same as Name the first Indian Super Computer? Disk fragmentation The technology which is used to check answer sheets of multiple-choice questions in civil services or similar examinations is: A compiler is Which printer among the following is fastest “Zipping” a file means What does acronym VIRUS stands for An impact printer creates characters by using...? A client-server system is based on
BC241 BC242 BC243 BC244 BC245 BC246 BC247 BC248 BC249 BC250 BC251 BC252 BC253 BC254 BC255 BC256 BC257 BC258 BC259 BC260 BC261 BC262 BC263 BC264 BC265 BC266
A nanosecond is A procedural control used to minimize the possibility of data or program file destruction through operator error is the use of _______ software enables users to send and receive data to/from remote computers A _____ is a running instance of an application Splitting of CPU's time for different tasks _______ prevents time slicing ______ computers are used in large organizations for large scale jobs which have large storage capacities _______ is responsible for all calculations and logical operations that have to be performed on the data ______ printer use laser light ______ software enhances the user to enter ,store, manipulate and print any text ______ software enables users to send and receive data to/from remote computers _______ is the temporary storage place for deleted files _____ is a collection of related fields _____ language consists of strings of binary numbers ______ symbol is used to represent processes like assigning a value to a variable or adding a number _______ is an example for micro computer _________capability supports concurrent users doing different tasks The ______ do not have processing power of their own and has only a screen, keyboard and the necessary hardware to communicate with the host. For this A______is nothing but a PC with a network operating system _____system is responsible for handling the screen and user I/O processing The______ handles data processing and disk access in a Client/Server architecture Both the DBMS and the application resides on the same component in a ____system When all the processing is done by the mainframe itself, the type of processing is sometimes called as DBMS models can be grouped under____ categories ______is the most advantageous database system A new user initiates a new process of execution at the background,while the user can continue his query process as usual in the foreground. This situation is The process of data being automatically written to a duplicate database is called______
BC267 BC268 BC269 BC270 BC271 BC272 BC273 BC274 BC275 BC276 BC277 BC278 BC279 BC280 BC281 BC282 BC283 BC284 BC285 BC286 BC287 BC288 BC289 BC290 BC291 BC292
Modem stands for __________ . Multiple changes to the same record or a field are prevented by the DBMS through______ _________allows an application to multitask within itself LAN stands for __________ . New process of execution is referred to as______ ISDN stands for _______. _____________ is the Worlds largest computer network . _______is/are a popular front end tool When LAN connected together ,it is called __________ . TCP/IP stands for _________ . Data is broken into small unit called __________ . SMTP stands for __________ . The __________ protocol is a network protocol to be built for the World Wide Web . ATM stands for __________ . The computer which can receive data from other computers on the network and print it is _______ The hardware and the software requirements together form the_____ ATM, Asynchronous transfer mode is a __________ technology. __________ is designed telephone system Expansion of ISDN is ________ Expansion of WBT is ______________ _________ connects LANs. Collection of instruction is called a _____ Combination of alphabetic and numeric data is called _____ data Computers can be classified based on ______,______and _______ _________ are used in large organizations for large scale jobs _______ is responsible for feeding data into the computer
BC293 BC294 BC295 BC296 BC297 BC298 BC299 BC300 BC301
_______ is the capability of the o/s to run numerous applications simultaneously _______ involves conversion of raw data into some meaningful information _______ is responsible for obtaining the processed data from the computer _______ printers use light to produce the dots needed to form pages of characters Hardware components in a computer are _____,____,_____,______ _______ software are programs that are complex and can be developed or purchased _______ is a set of special instructions used to communicate effectively with the computer _______ converts a high level language into machine language _______ translates assembly language program into machine language instructions
op1 F1 Tally ODBC TRUE F3 Invoice Two Ctrl+C TRUE TRUE ALT+F1 Tally IMP false ALT+F3 Bill Three Alt+C FALSE FALSE
op2 CTRL+F1 Tally INI
op3
op4 None of the above None of the above
CTRL+F3 A or B Four Alt+Ctrl+C
None of the above None of the above Five None of the above
* $ & Puchasing and Accounts Accounts payable and payable Puchasing and Receiving Receiving Single Cash Flow Statements Two Alt+D Create Information F4 Alt+P Tally Audit Bin True Enterprise Data Interchange TRUE 2 data element Multiple Fund Flow Statements Three Alt+X Alter Information F5 Ctrl+P Statistics Data False Enterprise Data Information FALSE 3 data record 4 Field A or B Ratio Analysis Four Ctrl+T Display Information F6 Shift+P Day Book Sub
^ Puchasing, Receiving and Accounts payable Mone of the above All of the above One Ctrl+D All of the above F7 None of the above Journal Book None of the above
Electronic Data Interchange.
All of the above
5 All of the above
FALSE Display stock valuation method Ledgers Personal Manual Balance Sheet Journal Filled 11 FALSE management by objective F4 Main Location True Ledgers 0 to 9 Supplier Report F2 Net Transactions True F6 function key Sales 1-4-1995 to 31-3-1996 True Horizontal
TRUE Open Calculator Groups Nominal Automatic Profit & Loss Stock Journal Receipt 16 TRUE management by exception F5 Primary False Reports 1 to 100 Suspense Output F4 Closing Balance False Alt + f6 function key Purchases 1-4-1996 to 31-3-1997 False Vertical A or B None of the above F7 function key A or B 1-4-1997 to 31-3-1998 None of the above None of the above None of the above Vouchers 10 to 60 Order Information Ctrl+f2 A and B None of the above None All of the above None of the above Ctrl+f4 None of the above Change Period Journals Real None Journal Book Physical Stock Transfer Issue 18 None of the above None of the above None of the above All of the above All of the above Reversing Journal None of the above 21
electronic data analysis F6 Primary Cost Category
All of the above Alt+f5 All of the above
Balance sheet & profit & Profit & loss and trial loss profit & loss and trial balance Primary Security mechanism F5 a name Sales return Company creation Trial Balance Main location Ledger a/c F7 an identity Purchase return Stock items units Daybook
Cash and profit & loss A or b Cost category F8 A and B a or b Regional setting Balance Sheet F10 Both A and B 4 F11 Budget
Cash and bank None of the above None of the above F9 None of the above None of the above None of the above None of the above F11 None of the above 1 F12 None
F7 Alt + F7 Changes in transactions Changes in Ledger or vouchers Masters 2 F9 Balance sheet TRUE F3 TRUE Main location Tally.imp 3 F10 Profit & loss a/c FALSE Ctrl+F3 FALSE Primary Tally.ini
Alt+F3
None of the above
Symbol A or b Stock analysis In 'comp info -> security control' option
None of them None None of the above None
Stock summary Stock journal By pressing F11 function During the creation of a key company TRUE 128 Ledger Accounts FALSE 228 Groups
28 Sub-Groups Data Entry Both A and B Cash receipts.
16 B or C TallyVault None of the above Payroll transactions.
Administrator Owner One company to another Other programs - a company created withon spreadsheet or a Inventory subsidiary. Cash disbursements.
Does not require as stringent a set of internal data to be transferred to memory Contingency Planning NIC Card Record Count Writing on a hard board Voice activated broadcasting Validity check Coloured spots File Name Printer System Logs Electrically charged ink
Will produce a more accurate set of financial data that has been transferred from memory System feasibility report VSAT Identification Number Printed output Voice answer back Boundary protection Pixels Identification number Storage device Physical Security
Will be more efficient at producing financial the address of a memory location Capacity Planning RAM Control totals for one or more fields Storing information on the hard disk Visual audio board File protection ring Pixies Reel Number Pointing device
Eliminates the need to reconcile control an instruction that has been transferred from Exception reporting AGP Card End-of-file and end-ofreel code None of above None of above Limited access files None of above Batch Total None of above
An ink pen Use only unremovable Restrict physical access media A pen A cartridge Separation of duties A cartridge A print head Volume Read Paper A drum Centralised function for PC acquisition A drum A laser beam Size Write
Console Log Data Dictionary An inked ribbon and print head None of above Make duplicate copies of Require user passwords files Eraser A ribbon Centralised function for PC Disposition A ribbon An INK RIBBON Storage capacity Read and Write Floppy disk all the above JCL None of above A cassette Distributed policies or procedures None of above None of above None of above None of above None of above none of these none the above
Magnetic tape PAN drive to an audit department's products & services to add customers Oracle True True ACL False False
Serial access medium 1.44MB A CD-ROM A CD-ROM Read By a sunny window ROM chips RAM chips ALU CPUs 0 bits RAM chips Serial access medium Network software and security software Supercomputer Notebook computers First generation Second generation Second generation Second generation Second generation Specification, Design, and Testing True yes true true
A parallel access Random access medium medium 20 GB A floppy disk A floppy disk Write By magnet objects RAM chips ROM chips Registers Registers 1 bit ROM chips 700MB Magnetic tape storage Magnetic tape storage Read and Write In a drawer CDROM chips DRAM chips Logic bus Control unit 8 bits
None of above None of above None of above None of above Not None of above None of above None of above None of above None of above None of above None of above A selective access medium None of the above None of above None of above None of above None of above None of above None of above
CACHE A parallel access Random access medium medium Systems software and Business software and application software games software Personal computer Supercomputers Second generation First generation Third generation Third generation Third generation Programming, Design, and Testing False no false false Mainframe computer Jon Von Neumann computers Hoover generation Fourth generation Fifth generation Fifth generation
Fifth generation None of above Analysis, System Design, and Implementation None of above
true true true true to determine the audit objective can bring the data directly True True change in the method of recording accounting documents driven approach hardware and software configuration true true the source of data available to the audit true the of by all concerned true natural/man-made true true true scheduled jobs true true with audit departments true
false false false false review and evaluate the types of data can bring the data indirectly False False use of accounting codes absence of audit trails risk driven approach processing options, file data structure false false source of data for material planing false providing access to computer to all false open/closed false false false manage hardware & software resources false false with production departments false conceptual/physical all of them unique approach checks and controls all the above none of the above all the above
to obtain a record layout extract data from file all the above none of the above
all the above
none of these
use of any programs
none of the above
enable multiple user resource sharing
all the above
all the above
none of these
true true true true databases true true reference files filex to have a complete picture of a system true true back-ups true true seriously affected database true true at the year end true Benfish true consecutive nos. or alphabets to entities true valid, numeric grouping, transaction
false false false false planning language false false table files report files none of the above filepet none of the above model base all the above
file-o-man file manager decentralized picture of a system all the above false false retrieval false false subject area database false false immediately false Benford false blocks of nos. to the primary attribute of the false invalid, alphabetic regrouping, events none of the above none of the above Benjamin on quarterly basis software and database deletion
addition
safety and database
none of the above
none of the above
random placement of component
none of the above
all the above all the above
true true true true true incremental design and enlarge activity true true true true e-brain bottom up tests yes read data on client's file executables, master true
false false false false false interactive data extraction and analysis false false false false bouncing ball top-down tests big-bang hybrid tests stub all the above
interactive data innumerable analysis
none of the above
no provide information to the re-perform procedures audit carried out by the clients all the above deleted, hard none of these all the above
false system advanced system analysis software software true yes true true manipulates, real true yes can be very powerful analytical tool yes false no false false create, false false
all the above
none of the above
none of these
all the above
no can enable the auditor to can provide the auditors execute provisions on a with useful information all of the above no
provides detailed information of machine IDEA true fictitious data applied against the client true true true specification, program identifying erroneous code true true start and finish time job control language yes true
identifies program code which may be there for ACL
examination of source code of a program with ALC
none of the above ACLL
false comparison of source analyzing the picture of a version of a programmed file or data all the above false false false file, hardware identifying ineffective code false false authentication of information support none of the above identifying non-standard code all the above all the above
resource requested
all the above none of the above
job connectivity language all the above no false
true false package computer p[program for performing mathematical concept prepared by the auditor true prepared by the entity
master list of administered transactions questionnaire prepared by an outside programmer engaged by all the above
false statistical/arithmetic file access/organizations operation true true examining the quality of system process Wide access to various data base ACL false false
stratification and frequency analysis
all the above
examining the quality of carrying analytical review data Can extract and analyse Can aid in simple data selection
all the above Can define the audit objectives
IDEA A utility software A sample of transactions programme
High End CAATs All of the above A special purpose written program None of the above
Tests of details of transactions Macros integer true actions report macro calculator action list conditions tabular tabular create report columnar and tabular true create fields primary key label wizard start header report footer for ordering records condition VB Modules add report true
Analytical review procedures Action Procedures number false events form expression elements code builder macro list action columnar columnar link report stable and unstable false add chart alternate key chart wizard group header page footer for updating records group reports append macro sheet false
Compliance tests of general EDP controls Event Procedures primary number
All of the above General Procedures auto number
procedures chart comments
none of the above macros action
expression builder expression elements expression elements list box none of the above insert auto report datasheet embedded report dynamic and static none of the above embedded justified new report none of the above
chart foreign key mail wizard page header group footer for specifying conditions with group by clause macro names forms insert module
insert chart none of the above none of the above report header none of the above none of the above none of the above macros delete none of the above
RAD SysCmd OLE object linking and embedding OLE object linked exe form wizard static file append dollars unbound object display as icon create html startup bullet DBMS data group new dialog box 255 automatic number true inner join primary key cascade delete related records columnar
RAP MsgBox DDE on line execution OLE client embedded DLL report wizard static html add rupees bound object display new home command RDBMS data collection new blank database dialog box 64000 AutoNumber false outer join not null cascade change related records tabular
RAID message CME on line editing OLE server connected BMP query wizard dynamic file insert pesos command button link save as html end procedure front end database
none of the above none of the above none of the above none of the above OLE communicator edited html publish to web wizard none of the above data definition yen list box create icon none of the above none of the above none of the above language data storage
new database dialog box database dialog box 235 number 63500 automatic field
explicit join candidate key cascade update related fields both a and b
none of the above no duplicate key change all related records none of the above
table or tables true property field crosstab queries action queries inner join true new form dialog box summary change properties included form Record Navigation columnar form filtering filter filter by form * true bound control button group database bound CURRDATE() text box pivot table data sheet filter
query or queries false field property row/column queries row/column queries self join false form create dialog box sum properties sub form Record Operations tabular form ordering sorts filter by selection $ false unbound control option group form unbound TODAY() list box columnar form filter by input
record or records
none of the above
Dynaset field properties select queries change/delete queries no match join
properties update queries update queries outer join
form wizard dialog append form properties new form Form Operations hierarchical form sorting pipes filter by menu @
both 1 and 3 simple new properties child form None of the above one to many form querying gateways None of the above ?
data less control controls group collection controlled DATE() combo box tabular form filter by form
data control record group none of the above all of the above DAY() static text main form none of the above
button wizard ram* true report autoreport chart true true 60,000 true true true table table true true Insert true true alternate keys true true true true true null
control wizard ram?? false form report label false false 255 false false false query form false false Records false false composite keys false false false false false not null
option control wizard two of the above
tool wizard none of the above
table module bitmap
ledger none of the above report
25,000
64,000
form report
all of the above hyperlink
Tools
none of the above
candidate keys
primary key
zero
none of the above
true true true true pie true true true update query true true inner join true true true freestanding true true true true the first field of the table forms true delete true true
false false false false bar false false false select query false false outer join false false false embedded false false false false the last field of the table reports false insert false false append add primary key field attributes none of the above entities stand alone sub chart self join table join delete query append query both 1 and 2 none of the above
freestanding use hyperlink true true true true true true true & true page true true true true true relational true action language report true group data true true
embedded use import false false false false false false false # false detail false false false false false list false structured query language form false record property false false
stand alone use datasheet in forms
sub chart use export
?
*
group
topic
range
logical
event - procedural based language none of the above query table
session both a and b
detail none of the above
sub forms graphs number pivot filters form list box true form name tabular form sub forms calculated calculated sub form set relation option, toggle and command buttons filter by form form clipboard search A way to analyse and manipulate numerical Information about certain programs remote DBMS storing data offline at a separate site Key verification A way to analyse and manipulate numerical
child forms chart primary key create queries bound combo box false control chart form tabular form bound unbound auto form
inner form labels index form sorts unbound button
none of the above report identifier none of the above forms none of the above option button
record source data sheet form columnar form unbound bound tabular form
none of the above none of the above none of the above none of the above static columnar form none of the above option button, toggle button and check boxes filter by input table layout record grab A way of maintaining a log A collection of files Reliable DBMS uses tape as opposed to disk Database access controls
connect relationships command button, check list, check and combo and list boxes boxes filter by report report file sort A tool to produce high quality documents It contains all the data about one specific item relative DBMS backing up data regularly Computer sequence checks A tool to produce high qualitydocuments filter by record macro field field names An organised way of storing information about A document which contains text Relational DBMS is related to data mining
Computer matching An organised way of storing information about None of the above
Information about certain programs Reports allow users to extract information as Extracting and analysing data Compilers, interpreters, editors DEFAULT and NOT NULL constraints CHANGE TABLE remote DBMS storing data offline at a separate site Number using a password the product code A database bookmarks
It contains all the data about one specific item Reports provide a very flexible way of creating Spreadsheets make data easy to analyse Network software, backup systems FOREIGN KEY constraints MODIFY TABLE relative DBMS backing up data regularly Description keeping a backup copy the primary key Graphics operators
A document which contains text A tool which allows text and graphics to be Using queries Word processors, spreadsheets, PRIMARY KEY and UNIQUE constraints ALTER TABLE Relational DBMS
None of the above None of the above None of the above None of the above IDENTITY columns UPDATE TABLE
Reliable DBMS uses tape as opposed to is related to data mining disk Source saving the file with different filenames e-mail e-mail engines Auto Key reports are consistent with the underlying tables report and its related query. not a primary key of either related table. Many-to-one
Component keeping the original paper copy mail merge browser wildcards AutoNumber forms in a database are consistent with the query and its associated dynaset. a field from an unrelated table. Many-to-many EmployeeLastName
Auto Primary Auto ID records in a dynaset are related tables in a consistent with the database are consistent main form and a foreign key. subform. the primary key of both the primary key of the related tables. related table. One-to-one EmployeeID The Tools menu, Relationship window Double click the Relationship line That there are several customers associated They must both be numbers Nothing, Access ignores the attempted command. The subform is not visible. A one-to-many relationship between One-to-many CompanyID
CompanyAddress The one-to-many Referential integrity The join line relationship Right-click the Select Undo in the Click the Delete Relationship line, then Relationships pull-down Relationships button on That some of the data is That there are records in That records can be not viewable a related table added by clicking on the They cannot be text They cannot be They must be the same fields AutoNumber data types data type The customer‟s ID is The customer‟s ID is An error message is deleted from the deleted from the displayed. The subform is displayed The subform is displayed The subform is an object in Datasheet view. in Form view. on the form and can be A one-to-many A one-to-many A many-to-many relationship between relationship between relationship between
# Either table at any time prompt, title bar text, icon. Dim CreateList. A check box enables the form user to choose from must be set for one word. help people keep track of things. data. facts. single-user database application single-user database application Sequential Query Language (SQL) Database Modeling System Jet
M The Customers table only when there are Loan prompt, icon, title bar text. Sub CreateList. A text field enables the form user to choose from must be set for multiple words. store data in tables. relationships. figures. multiuser database application multiuser database application Structured Question Language (SQL) Database Management System SQL Server
¥ The Loans table at any time title bar text, prompt, icon.
* Neither table title bar text, icon, prompt.
CreateList. Sub. A drop-down list enables A drop-down list enables the user to choose from the user to enter text. must be set for two does not have to be set. words. create tables of rows and maintain data on columns. different things in metadata. information. e-commerce database application e-commerce database application Structured Query Language (SQL) Data Business Model System all of the above a and b a or b None of above Relational Question Language (RQL) Relational Model Manager a and b All of the above. All of above b and c the database All of the above. All of the above. All of the above. a and b a and b a and b entity-relationship data modeling entity-relationship data modeling
Oracle The database The user The database application management system the database the DBMS accesses the application(s) interact(s) database data None of above creates queries the user all the users' data is in one place holds user data tables from existing data from existing nondatabase data from existing data data marts data marts creates form creates reports the database the database application management system it reduces data it contains a description duplication of its own structure holds metadata metadata as a new systems development project as a new systems development project as a new systems development project normalization normalization holds indexes stored procedures as a redesign of an existing database as a redesign of an existing database as a redesign of an existing database data models data models
data marts data marts
normalization normalization
data models entity-relationship data modeling
entity-relationship data modeling data migration relational data model more than one column can use the same name field tuple foreign key candidate key surrogate key
file managers hierarchical models network models entities in a column vary the order of the columns the order of the rows is as to kind is important unimportant table record record record composite key Insertion anomaly assess the existing tables' structure and are supplied by several well-established They use sophisticated mathematical dirty data relation field field field primary key Update anomaly design the database structure were essentially killed off by MS Access Their report delivery is more difficult than report inconsistent data row key composite key foreign key foreign key Deletion anomaly create one or more new tables
All of above move the data into the new database are not true DBMS have poor response time products Nonintegrated data nonintegrated data None of the above a "wrong format" problem a "wrong format" problem
dirty data inconsistent data data warehouse data are data warehouse not stored in tables. databases do not have Form Forms and reports It will be easier for the user to upgrade it if the The Link Tables command can be used to Import It contains more than one table Table Queries and tables It will be easier for the user to upgrade it if the An application may consist of multiple Link It contains tables, reports, queries, and
nonintegrated data data warehouse data are often denormalized. b and c Report Macros It is advisable to put each object and table into a All objects in an application, including the Query
Spreadsheets Regardless of how the objects and tables are An application can be created in such a way
Merge Join It contains a user interface, or switchboard It contains macros Interface Design Wizard Switchboard Manager put key business store all corporate information into the transaction data in one Digital Signature Digital Certificate None of the above Private Key
Menu Wizard Build Menu create backups for centralize the mission critical corporate manageability of data Digital Sign Hash Function Digital Certificate Digital Signature
Hash Function
Hash Value Hash Result Digital Signature Digital Signature creation Verification Both A and B Institutional Overhead Subscriber Relying Party and Subscriber Relying Cost Institutional Overhead Certification Authority True True Server Certificate Server Certificate Private Certificate Evidence, Ceremony, Approval True True Certificate Revocation List Private Key, Subscriber Internal Format File ANSI batch files Smart Card E-cash Certified Authority False False Developer Certificate Developer Certificate Repositories Approval, Evidence False False certificate Revocation Certificate Resource List Letter Public key, Recipient External Format File UN/EBCDIC interchange sets Embedded cards Private Key, Recipient Transmission File UNESCO functions SET Smart Cards Personal Digital Certificate Personal Digital certificate Public Key Efficiency and logistics, Evidence Certificate Authority
Either B or C Either A or B None of the above None of the above
None of the above None of the above none of the above Evidence, Ceremony, Approval, Efficiency and
None Of The Above None Of The Above None of the above UN/EDIFACT functional groups None of the above
Digital Cash Online Catalog and Billboards and Junk Mail Billboards EDI True Login_Id and Password Global Network Active or push based advertising Broadcast E-mail
Electronic cheques Online Catalog and Broadcast and Junk Mail Customer Endorsements EFT All of the above
False Primary Key and Private Public Key and Private Key Public Key and Password Key Private Network Passive or pull-based advertising Junk mail Satellite Area Network Glow sign or hoarding strategies Billboard None of the above All of the above Endorsements
E-mail Catalog Error checking Competitive espionage A list of competitor‟s clients single-user database application
Bulk-mail Endorsement Data Integration
Direct-mail Billboard Low cost of operation Industrial espionage Research data e-commerce database application
Junk mail Broadcast Quality management Economic espionage A competitor‟s new project None of above
Corporate espionage Contact numbers of the management group multi-user database application Keeping messages Replying promptly short Removable drives that Message authentication can be locked up at night in EDI systems performs convert text to columns text import wizard wizard cell reference text files serial values =today() dollar sign AutoSum variables text concatenate countif pivot table wizard sumif average page setup autoformat bordering page setup row reference Lotus 1-2-3 domain values =date() ' = ' sign AutoFill arguments logical pmt vlookup chart wizard pmt sum print area AutoFill formatting print area
Including the Subject Using all capital letters Encryption performed by Security at the a physically secure transaction phase in EDI tip wizard column reference function wizard none of the above
quattropro or xbase files class files range values =currentdate() # sign function wizard parameters numeric merge pmt convert text to columns wizard countif sumif print none of the above shading print none of the above print preview reference values none of the above none of the above none of the above none of the above Boolean none of the above count tip wizard none of the above countif none of the above
filtering all option www.ency.in URL internal network application layer finger service FTP
searching blanks www.eb.com DNS network of network transport layer ping service TELNET
sorting all blanks www.encybrit.com FTP intermediate network physical layer ftp service ARCHIE
none of the above none none of the above none of the above none of the above session layer none of the above none of the above
uniform research locator uniform resource locator unlimited restore locator none of the above host computer message Delphi net browser CompuServe internet dialer gophering Alta vista finger server list no middle hotlist directory search,index search infoseek netshark lynx name of the resource scheme Microsoft web read the Usenet news spy mosaic gopherspace open text ftp server directories maximum of five lower directory index search,menu search excite cello mosaic scheme command line sears browser search for database wincim or maccim cyberspace excite web server image list one top index none of the above none of the above general electric editor none of the above none of the above none of the above none of the above none of the above none of the above many middle and lower glossary
menu search,item search item search,index search lycos lynx Lycos all the above all the above navigator gold 2.0
Microsoft Usenet Higher text transfer protocol iccp yahoo transfer control protocol/internet one ftp servers the internet adapter browser hotlink text transfer protocol universal resource locator frequent asked query SLIP,PPP
internet finger service Hyper text transmission port ftp
IBM ftp Hyper text transfer protocol uucp
CompuServe telnet Hyper text transfer port none of the above
ftp telnet none of the above transmission control transfer communication protocol/internet protocol protocol/internet protocol none of the above two domain name servers the internet administration protocol hyper text transfer protocol three web servers the internet access site higher type transfer protocol none of the above none of the above none of the above organization none of the above
uniform resource locator uniform resource label name of the above frequently asked question frantically asked question none of the above TCP,IP IP,UDP none of the above
connection response wide search for windows sockets information and research internets relay chat lynx,minx world wide web server glossary very easy and rodent oriented net wide index university of berkeley,berkeley freenet protocols search engines,directories allsrc,winsocks allsrc higher text medium language netscape,ie world wide web client index very organised network integration and university of cleveland,cleveland IP address ftp and finger wais,allsrc waisman hyper transfer markup language
request close world search for information and research none of the above mosaic,gopher interface hotwords verification on network integration and university of California net dns telnet and ftp wais,winsocks winsock hyper text markup language none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above
hot links images graphics,videos,audio first page global network news yahoo service
hyper text applets programms,images,text home page global networks navigator
books marks
none of the above
animation none of the above animation,scripts,execut ables none of the above welcome page grand network news search engines yahoo and altavista ftp all the above Delphi bookstores more information database Graphical interface format Joint pictures expert graph net eudora,netscape and pine network connections FCOLOR Communication graphical interface Communication Client Web none of the above none of the above none of the above none of the above archive none of the above fidonet none the above galenet channel Graphical Interface format Joint pictures experimental group browsers none of the above mails FONTCOLOR Common Gateway Interface Connection None of the above Channel None of the above neither text nor image CGI
electronic mail Netscape page starter email and net conference site,netscape page newsgroup Lycos catalog apple link computer related abbreviations and encyclopedia Britannica search engines Graphical interpreter formatting Joint Pictures Expert Group mails yahoo,infoseek,altavista information telnet point review bitnet biographical information on-line reference works web directories Graphical interchange Format Jumbled pictures expert graph documents netscape,ie,lynx web pages
BACKGROUND COLOR Communication gateway Common graphical interface Interface Network Current web page Browser/user Unknown resonance language text only SQL Interface Browser Server
Uniform resource locator United relay limited image only PLSQL text or image SGML
alphalanguage palm is not eatable SGML Processor web sites Internet equipment training faculty MS Internet Explorer and Mosaic text hyperlink in random order first .bmp and .gif Service, hostname and directory path mail servers,mail clients and alternate services <center> communication generated information Server arpanet LAN data scripting,parsing and compiling nt,windows95,ie,winzip
betalanguage palm is not elm SGML Preprocessor images International Engineering trainers and faculty Netscape Navigator and Mosaic data from a database hypertext in sequential order start .bmp and .jpeg service,hostname,port,dir ectory-path mail vendors,mail identification and <font size=n> common gateway interface Client the net
metalanguage pancake is not edible SGML Parser
none of the above none of the above SGML Composer
applets documents Internet Engineering Task Force None of the above MS Internet Explorer and Netscape Navigator None of the above symbols hotword in user-defined order home .gif and .jpeg service,port and directory path mailing lists,mail server robots and gateways to <hr size=n> classified general instructions Browser intranet video hotlink none of the above none of the above .wmf and .bmp service,hostname and port none of the above <l1 type=shape> none of the above User none of the above none of the above
peer-to-peer connectivity wan parcel news,cooking and fine arts mosaic,gopher,eudora,tr umpnet
packets none of the above email,file retrived,internet tools none of the above communicator,ie,lynx,win sock all of the above none of the above none of the above none of the above none of the above none of the above
dnet arpanet ARPANET defensive administrative dedicated and registered defensive advanced rank administration projects administration research projects start milnet,smaller arpanet education,research begin mailnet,inet music and dance first intranet,extranet cooking and dining
Higher text manipulation Hotlink text markup language language united states and UK server client network card detailed transaction explanation application layer point to point network and broadcast channel file access PAN,NAN,AAN VAN LAN analog Data type definition Moralize/demoralize Mapping Satellite link and digital signals Standard long internet protocol england,norway client stand-alone network topology
Hyper transfer meta language united states & Russia network servers network redirectors
Hyper text markup Language none of the above none of the above none of the above none of the above none of the above
data terminal equipment data target equipment physical layer packet switching,store and forward network anonymous ftp KAN,RAN,VAN MAN MAN digital Define type of data
network layer none of the above smart network and dumb network none of the above file transfer LAN,WAN,MAN TAN WAN non-digital none of the above none of the above none of t he above none of the above none of the above
Document type definition Document type data
Modulation/demodulation Manipulate/demanipulate none of the above Modulation Dedicated access and dial up access Stream line internet protocol Manipulation Cable and wires Serial line protocol none of the above none of the above none of the above none of the above receiving information from a host computer Channel Retrieve Neither A nor B Both B and A All The Above
Prime prolonged protocol Point to point protocol Pillar to pillar protocol storing data on a disk sending information to a storing data on the hard drive host computer drive Bandwidth Find Recipient Party Public Key E-mail Not False Speed Save Relying Party Private Key Electronic Commerce Not True Size Browse Either A or B Both A and B Electronic Fund Transfers
Closed System,Formal Legal requirements Affirmative Act Signer Authentication Not True Nonrepudiation Service Affirmative Act Cryptography Private Key Private Key Private Key Decryption
Formal Legal Requirements Efficiency
Open System Signer authentication
Formal Legal Requirements, Open None of the above Neither A nor B
Document Authentication Both A and B Not False Digital signature Efficiency Public Key Public Key Public Key Public Key Cipher Performing validity checks. Digital certificate Either A or B Private Key Both A and B Both A and B Both A and B
Private Key Neither A nor B. None of the above Either A or B Either A or B Either A or B Cryptography Reviewing the systemsaccess log. Sent to the correct address. The private key is used by the receiver for Firewall vulnerability. Business- to-Billboard Broadcast Broadcast Domains None of the above Search and discovery None of the above Pulling cart None of the above Gateway EDI
Encryption Conducting fraudUsing data encryption. awareness training. Unaltered in Received by the intended transmission. Not intercepted en route. recipient. Both sender and receiver The private key cannot The private key is used must have the private be broken into fragments by the sender for Failure of server Collision. Data entry errors. duplicating function. Business-to- Business Billboard Business-to-Backend On-line Catalog Backend-to-Business Endorsements Catalog .COM
Customer Endorsements Billboard Intermediaries Order Placement portals Service
Search and discovery Pre-purchase Post purchase interaction Purchase consummation preparation Billboard model of Endorsement model of marketing Online catalog marketing Online Catalog EDI For Administration, Commerce and EDI Compiler Shopping cart Billboard EDI For Administration, EDI For Administration, Consumer and Transport Commerce and TCP/IP Interpreter EFT Assembler
Business-to-Business Emergency Cash Communication Perspective Microcash Decryption 1 data table pivot table wizard series or rank series or rank series or rank series or rank column chart column chart column chart column chart spaces excel97 pivot table wizard line chart true and 3-dimensions true Data table It is also called as highlow-close chart
Business-to-Consumer Electronic Cash Business Process Perspective Micro Transactions SSL 2 filtered table chart wizard category category category category bar chart bar chart bar chart bar chart wild card characters internet explorer chart wizard bar chart false or 4-dimensions false Pivot table
Consumer-to-Business Euro Cash Service Perspective TT(Tiny token) Encryption 3 index table convert text to columns wizard legend legend legend legend pie chart pie chart pie chart pie chart symbols Netscape convert text to columns wizard stock chart
Customer-to-Company Endorsed Cash None of the above E-token Subscription 4 pivot table tip wizard data marker data marker data marker data marker surface chart surface chart surface chart surface chart none of the above word 2000 tip wizard pie chart
Multi-dimensions
It is often used to display It is also used for It shows trends over time share market prices over indicating fluctuations in
Pivot table Goal seek Goal seek Workbook
Scenario manager Scenario manager Pivot table
Solver Pivot table Solver Spreadsheet Performing text formatting. Source table name. N
Data table. Data table. Data table. none of the above All of the above Pivot table item.
Worksheet Performing database Performing calculations. operations Column field two true 3-dimensions Row field. three false 4-dimensions
Multi-dimensions
Data table Pivot table It displays the data series It is useful when several It can be represented in one on top of the other. components are 3-dimensions Pivot table. Goal seek Count. databases It is a tool for summarizing and Goal seek. text import wizard worksheet application window A dark wide border 8,16,32 your formula has a syntax error Scenario manager Scenario manager Standard deviation Solver Pivot table SumIf worksheets Data table Data table
records tables It is a tool that provides a It summarizes the data way to view and compare by using analytical Scenario manager convert text to columns wizard workbook document window A dotted border 2,4,2 the row is too short to show the number at the solver tip wizard tables modal window No border
Pivot table function wizard database
A blinking border
ability to generate tables speed of calculation word processing Range graphical Address
2,2,2 6,8,10 the column is too narrow to show all the digits of either b or c flexibility of moving entries cost of initial set-up database Gap spreadsheet Rows
Producing graphs double-click any cell in the column ENTER array. 100 Cell references ^ B5*B6 E12 It is surrounded by a heavy border. By clicking in a different cell The Standard toolbar the New command on the File menu. File Preview Insert Clear Orientation (portrait or landscape) Options worksheet. 6 copy range. paste range.
Writing letters Drawing pictures Document filing drag from the top cell in the column to the last cell click the column heading click the column label CTRL + ENTER function. (201)555-1212. Functions / C3/D4 6 TAB constant. #VALUE! Numeric constants * D4^2 INSERT formula. Tom McKenzie. Text constants \ It is impossible to determine. G7*SUM(H9:H11) The phrase “active cell” appears in the Status By typing the reference of the cell you want to The Font Size command on the Tools menu. the File Type command on the File menu. Window Properties Clear Remove Margins Edit cell group. D source range. source range. Both the Copy and Paste commands constant $B$4
SUM(H9:H11) It is displayed in reverse It is blinking. video. By using the arrow keys By either clicking in a to move to a different cell different cell or using the The Cell Format The Formatting toolbar command on the Edit the Save command on the Save As command the File menu. on the File menu. Edit Details Delete Delete Headers and footers Page Setup range. D12, G25 destination range. destination range. View List Both Insert and Delete Both Clear and Delete Fonts View group. D12:G25 clipboard. clipboard. The Paste command mixed B$4
The Duplicate command The Copy command absolute B4 relative $B4
#DIV/0! #DIV/0! The Move command copy and paste cells. the Fill Handle Select the Insert Hyperlink command from whether the cell has a formula or a value in it.
#DIV/0! #DIV/0! The Cut command edit cells.
#DIV/0! #DIV/0! The Paste command cycle through absolute, relative, and mixed cell
#DIV/0! #DIV/0! Both the Cut and Paste commands cycle through open applications. Conditional formatting Double-click a cell and click the Insert Hyperlink
the value in the cell text with either a two-digit text with a two-digit year. text with a four-digit year. an integer. or four-digit year, It is impossible to Jul-30 Aug-31 29/03/2008 determine from the subtracting the earlier adding the earlier date to subtracting the later date adding the later date to date from the later one. the later one. from the earlier one. the earlier one. the F4 key. 03-Apr a cell on a worksheet. B1-G10 AVERAGE Combination Once a bar chart is chosen it cannot be the F2 key. 0.75 a variable. B1.G10 COUNT Line Once a column chart is chosen it cannot be the Esc key. March 4 of the current year a constant. B1;G10 MAX the F1 key. Either 3/4 or .75, depending on the cell either a cell on a worksheet or a variable. B1:G10 SUM
the Format Painter the Formatting toolbar Click the Insert Hyperlink Right-click a cell and button on the Standard click the Edit Hyperlink whether the cell has an the cell address. absolute or a relative cell
Pie Scatter Once a pie chart has Once a line chart has been chosen it cannot be been chosen it can be hold down CTRL + hold down the CTRL key hold down the SHIFT key hold down the ALT key SHIFT Transfer information to a Use tables Create four separate files database Use multiple sheets Paste Tools | Sort Analyse data click the Print button producing graphs (D4+C2)*B2 0 Fill Down Data | Sort Calculate data press the PRINT SCREEN key writing letters Fill Right Edit | Data | Sort Create forms select Print selection on Page Setup | Sheet drawing pictures Paste Special none of the choices None of the above select Print selection in the Print dialog and then None of the above =(B2*(D4+C2) None of the above
D4+C2*B2 #VALUE! =A3SUM:B3SUM:C3SU M REF!
portrait AD213 CERN yahoo and infoseek news groups,yahoo and infoseek bulletin board system small windows socks Mosaic buffer Photography Key User-id Penetration Acts Spoofing Loss Sales - tax authorities Utility Tim Berner Lee Etrade.com Automated Tailor Machine Acts Router LAN hyper terminal tracing program
landscape ZA1 ECRN
whatever was last used A0
vertical None of the above NET none of the above none of the above none of the above none of the above none of the above Lynx none of the above Message Digest Formula Address Password Cracker Protocols Approving Hacking Police officer of IPS rank. Cracker Howard Aiken Msn .com None of above Protocols Pin PAN hypertext tracing protocol
CARN newsgroups and search mailto and files engines bulletin boards,mails call application servers,proxy and wireless system servers and web servers business broadcasting bulletin broadcasting system system large windows sockets Yahoo cache Digital Signature Lock Password Retrieval Regulations Imposting Threat Income - tax authorities Pirated software Hoffman Amazon .com Any Time Money Regulations Gateway WAN hypertext tracing program very small windows stocks PINE built-in Cryptography Hash Function Name Cryptography Address Unauthorising Exposure Judge of a civil court Virus Charles Bubbage Dell .com Asynchronous Transmission mode Address Port CAN hypertext transfer protocol
National Informatics Center Only Computers Concentrates connectivity Bridges and Repeaters. bits firewall One Physical Layer RG7U Physical address A cable
Network Interface card
New Information Card
None of the above None of the above All of Above Hubs and nodes None of the above virus checker None of the above All of the above Twisted pair None of the above None of the above None of the above None of the above All of the above None of the above 48 MB a gateway calling program for internet Network PC If the hub goes down, it brings down all of the None of the above All of above None Both A and B Mesh Mesh Ring
Can not computers Only printers Combines connectivity of Switches data from a hub with the traffic incoming ports to Two or more networks frames gateway Two Data-Link Layer Coaxial cable Logical address Bridges and Hubs Packets router Four Network Layer Fiber A memory address Router It continue on to target device with corrupt data Ultra violet technology Network Layer Octal 48 KB software that allows file copying
Hub It gets destroyed bit by Data return to the sender bit. Wireless technology Physical Layer Binary Wired Technology Data Link Layer ASCII
48 Bits 48 Bytes software that facilitates a list of rules for connection to the internet transferring data over a Novell PC There isn't one Physiology Bus Linear Parallel Ring Ring Star
Client Server If one node goes down, it If the hub goes down, it brings down the entire brings down all of the Topology Star Parallel Circular Bus Bus Bus Both A and B Ring Both A and B Linear Star Star Linear
Ring Network Layer Ethernet, token ring, DecNET bps bps usually higher than LAN speeds CD-ROM drive must use the World Wide Web key gateway interface a Novell Interface Controller CD-ROM drive
Bus Transport Layer Ethernet, token ring, FDDI kbps Kbps measured in bytes per second a modem
Star Physical Layer
Mesh
Data Link Layer Ethernet, token ring, Ethernet, DecNET, FDDI ARCnet mbps Mbps depend on the transmission medium mips Mips limited by modem speeds Netscape All of the above application protocol interface connects a computer to a network Netscape None of the above none of the previous use appropriate communications none of the previous make of processor is a protocol for the transfer of files between None of the above none of the previous none none of the previous search engine make of processor is a protocol for the transfer of files between is a protocol that allows for remote login Any layer can communicate only with
Windows 95 must have a LAN must use electronic mail account common gateway uniform resource locator interface interfaces a modem to a used to control a printer computer a modem Windows package
Linux Novell Netware Windows NT have to do with have to do with Web compression of graphics pages the Internet must use the World must have a LAN Wide Web must use electronic mail account Printer provides access to the Internet used to send email modem is a CPU register bridge is a CPU functional unit
used to send email used to protect a computer room from fires a form of virus a backup server hardware scanner provides access to the Internet used to send email used to send email The layers cannot communicate with one
used to browse the Web is part of Netscape uses wireless communication medium is part of Netscape a screen saver program a poor file server
an email server
IR system for the Internet browser CD-ROM is a CPU register clip-art file is a CPU functional unit
used to browse the Web is part of Netscape uses telephone lines Any layer can communicate directly is part of Netscape Any layer can communicate only with
It is one large network.
It is made up of many It works the same way as Individual computers can networks connected into a local network. connect to it using an Denial of Service Port sniffing
Password cracking System intrusion used to protect a computer room from fires a form of virus Flood a Web server with IP flood requests hack firewall a backup server Apply security patches All sites are safe and reliable. Use of identifiers packet router an email server Update virus definitions There are safe and unsafe sites. Use of passwords
a screen saver program none of the previous Virus that initiates a ping flood UDP flood flood switch a poor file server Backup data on a daily basis Only large namerecognizable sites are Use of logical access methods by attaching itself to a document. Web traffic A worm Multiplexors traffic hub none of the above Limit logging on access ActiveX-enabled sites are safe. Use of encryption methods by scanning the computer for a Application updates Spyware LAN
by attaching to an e-mail. through an FTP port. Phone A Trojan horse Modems cookies and Trojan horses. An attack on a system for personal gain Economic damage Crashing the stock market, as in the 1930s To carry more network capacity set its prices very high People Search Name of your bank Virus buy stocks. Shill bidding Internet stalking. E-mail Adware Protocols Trojan horses and key loggers. An attack with the purpose of gaining Disruption in communication Shutdown of military security systems To improve network services limit access to computer owners only Yahoo People Search Date of birth Fraud invest without risk. Phishing cyber stalking.
cookies and key loggers. key loggers and worms. Changing the content of Giving out disinformation a Web page All of the above are Disruption in supply lines correct. Contaminating water Shutdown of nuclear systems plant safety systems To improve system To obtain an accurate response time inventory of network stop its competitors update its prices as soon seeing their prices as they are changed USA People Search Personal assets Adware purchase off-shore property. Siphoning virtual stalking. Lycos Search Criminal records Spyware make large amounts of money by parking funds Hoaxing Web stalking.
pop-ups. Use a fake e-mail address. Encryption I only irc Adds more bytes to programs HTML Web query. .com is used for company round trip HTML. XML. using Internet Explorer to view a Web page that is Click on the Back arrow until the desired site is the Refresh command Hyperlink BMP Save it to a floppy disk. extranet. an attachment. VoIP Desktop client, application, and Modem File Transfer Program So computers can be referenced by a name 193.1.2.3 paul .trigg @ domain. org. uk
cookies. Never use your real identity. Physical Security controls II only ftp Verifies integrity of files Internet Explorer HTML document. .co in used for company the World Wide Web Consortium HTML. updating the values that are obtained through a Click on „Go to‟ or „Search‟ in the browser the Insert Hyperlink command Screensaver
spam. Use a proxy server. Message sequence number checking Both I & II www Increases boot up time Microsoft Excel round trip HTML document. .con is used for companies HTML. DHTML. clicking a hyperlink that references a document Go to the History page and look for the site the Update command Sound
viruses. Use anti-spyware software. Logical access controls Neither I or II telnet Misleads a program recompilation both HTML and Internet Explorer Web browser. None of the above one way HTML. MHTML viewing an Excel worksheet that you have Go to the Bookmarks or Favorites page the External Data command Video TIFF Cut and paste it to a word processor network topology an encryption. PoIP Desktop server, software, and hardware. None of the above None of the above None of the above None of the above None of the above
GIF JPEG Write it down on a piece Add it to „Favourites‟ or of paper. „Bookmarks‟. intranet. a signature. privileged network. a footer.
IPT IPP Desktop client, software, Desktop server, and hardware. application, and CD-ROM File Transmission Protocol So IP addresses can be shorter Telephone line File Transfer Protocol So email is delivered faster
45.1.1.1 143.215.12.19
[email protected] k paul.domain.uk
The US government Internet Relay Chat It will be deleted Hyper Textual Mark-up Lingo Receiving messages automatically from clipart & auto shapes circles square tool bars clip gallery & word art wave file eof,false properties window bof,false value() circle true true fontcolor underline,true textsize one- millionth of a second count form layout window title msgbox()
Scientists in Switzerland International Relay of Characters It will be waiting for you to collect it Hyperlink Text Marking Language People discussing a topic of interest globally autolayouts and presentation templates points image short cut menus slide show & view show media clip movelast,true form layout window movefirst,true int() rectangle false false color fontunderline,true size one-hundredth of a second recordcount prperties window prompt textbox
No-one Internet Remote Conversations A letter will be sent to you in the post Hyper Text Mark-up Language High volumes of email
None of the above None of the above None of the above None of the above None of the above
slide view & outline view none of the above squares grid auto shapes fonts & images .video file movelast,false toolbox movefirst,false number() square icons guide all the above none the above all the above eof,true project explorer bof,true val() oval
forecolor textunderline,true foresize one-thousandth of a second itemcount project explorer vbmsgboxstyle label
none of the above none of the above fontsize one-ten thousandth of a second listcount toolbox none of the above inputbox()
opendynaset load standard blue red properties window properties window change child true load text opendatabase enabled dime .ctx Validate On Error GoTo linelabel UpdateControls Cancel parameter to a non-zero value 1 Consists of several Programs Form window, standard or code module Place code in the Terminate event AutoRedraw = True
opensnapshot activate opaque red green form layout window form layout window lostfocus parent false unload name dbengine visible dim .ctl Validation On Error GoTo Inline PaintPicture Cancel parameter to 0 2 Consists of several Applications Project window, view code window Place code in the Unload event
dbopensnapshot unload transparent green blue toolbox toolbox text container
dbopendynaset initialze graphical black white project explorer window project explorer window gotfocus none of the above
initialize caption openrecordset value var .ctr Check On Error Stop Refresh UnloadMode parameter to a non-zero value 3 Consists of Various Forms And Code Class module, code module Place code in the Deactivate event Refresh Msgbox error.number & error.text
activate none of the above none of the above style none of the above .ocx Audit On Error Resume Next Resize UnloadMode parameter to a zero value None of the above Consists of several Projects None of the above None of the above PaintPicture Msgbox error.number & error.description
AutoRedraw = False Msgbox err.number & Msgbox err.no & err.text err.text
To display images to the To help in creating a user ToolBar FreeFile Retrieve Common messages passed to Windows Caption Click and KeyPress Ascii Format CurrentX and CurrentY Property Get Background color property Min Shell Are one and the same You do not need to use the Set command here The Open method A warning query icon statement. MsgBox statement returns a value, while the Data cannot be entered into the form. Unload clipping tool color palette ascent 10 column images GetFileNum Get Open dialog box Visible Click, KeyUp and KeyDown Binary Format ScaleLeft and ScaleTop Property Assign Caption property Max Substr
To allow the editing of icons GetFile GetProperty Windows explorer Multi-Line KeyUp and KeyDown Input Mode ScaleHeight and ScaleTop Property Let ZOrder property Value
To provide a repository for images used by other GetBytes Value Input box Font KeyPress, KeyUp and KeyDown Output mode x and y Property Set AutoRedraw property CurrentVal CStr None of the above None of the above None of the above None of the above
SetAttr Are actually not Can be different at times properties You do not have the MyVar has not been permission to access the declared The ExecProcedure The Exec method method A critical message icon variable. InputBox function returns a value, while the The form can be modified. QueryUnload cropping tool color box tricolor scheme 28 bar images and text An exclamation icon
intrinsic constant. built-in procedure. InputBox function can be MsgBox statement can created with the macro be created with the A new check box can be Data can be entered. added. Deactivate cutting tool color scheme color palette 18 pie slides Terminate scribble drawing tool color guide primary color scheme 36 linear slide sorter views
circular entity Microsoft organization chart the organization chart is expanded box tools used to mange organizational chart turned on once two native tool autolayouts zoom importing Microsoft excel .ppt(PowerPoint) nine .rtf(rich text format) not displayed during the slide show
radar data point clip art the chart is made available for editing general purpose tools accessed only by manager turned off twice four draw tool handlayouts reduce/enlarge exporting auto shapes .rtf(rich text format) only one
doughnut data auto shapes the chart window opens displaying a chart custom drawing tools used to create a manager box for an not available in the tool bar thrice five standard tool slide view preview copying clip art .doc(document) six
all the above stream track changes none of the above standard drawing tools used to store the other tools of the available in the tool bar any of the above eight all the above none of these none of the above moving drawing tools .html(hypertext format) twelve .doc(document) none of the above transition view show master notes slide sorter view none the above none of the above b or c none of the above
.wmf(windows metafile) .txt(plain text) displayed only during the displayed only in outline slide show view both a and b slide show master slide view show 7.5 inches,5 inches a or b transition png
DTS(digital track sound) 3D(3 dimension) build notes master outline view 15 inches,10 inches portrait animation gif transition slide master slide view 10 inches,7.5 inches landscape view show jpeg
hyperlink visual c++ macro while creating a .exe file virus checkers slide show slide pane internet explorer PowerPoint creates a sample presentation to user can insert objects like clip-arts, pictures in outline view, drag the slide icon to a new the slide that holds the formatted placeholders with notes pages view user can prepare the slide that holds the formatted placeholders slide layout data to be graphed resides in a datasheet the master slide office assistant 10
hypertext visual basic for application batch file during slide transition spell checkers custom show notes pane paint shop pro it is the quickest way to create a presentation user can insert only predrawn, pre-colored in slide sorter view, drag the slide to a new transition means applying special effects in outline view, user can see the miniatures of all transition means applying special effects
action button
all the above
Microsoft visual interdev all the above templates when the slide show is run header files both a and b properties pane paint shop pro contains sample presentations for a user can insert picture to the master slide which in notes pages view, drag the slide icon to a design templates is the template whose format user should select the slide view to add the text design template is the template whose format add-ins none of the above all the above none of the above outline pane power point 2000 provides suggested content and design user can insert picture to the title slide which gets I slide view, drag the slide icon to a new the slide that holds the formatted placeholders the slides can be reordered in the outline the slide that holds the formatted placeholders set up show user can add data labels and gridlines to the chart the format slide none of the above 22 four times text, hypertext, Power Point, video and sound. Line style, Line color, text font, and text alignment Fill color, Line color, and Line thickness The graph placeholder is deleted.
customize new slide by default, doughnut data is plotted in a chart chart is displayed based window the slide master spell checker 12 the header slide grammar checker 102 three CD-ROM, digital camera and sound. the Font and the text alignment
once twice text, graphics and email text, hypertext and address. Power Point. the Line style Fill color Excel is started so that you can create a chart. always taken from the first row of data in the Side-by-side column the Line color Line color A popup box prompts you for an existing Excel always taken from the first column of data in the Stacked column
Line thickness Microsoft Graph is started so that you can taken from the first column or row of data in entered by the user. Pie chart Line chart
Pull down the Insert menu and select Chart. It automatically displays in Slide view.
Click the Insert Chart button on the Standard Click the chart object, then click the View
Pull down the Insert menu and select the Pull down the Edit menu, then select Object.
Single click the chart. Double click the chart. Click outside the chart. A dialog box is displayed A dialog box is displayed The datasheet is saved allowing you to enter the allowing you to enter the as a separate file. The chart is doubled in The chart is selected. The chart is deleted. size. The chart is doubled in The chart is selected. The chart is deleted. size. a slide one bullet item at bullet items one letter at bullet items one word at a time. a time. a time. Subtle Enter and exit Enter the way objects appear on a slide. The advanced timeline shows the sequence in Clips Paint program Fly in Once data is entered it cannot be changed. OLTP. You can change the appearance of a whole [Enter+A] .vbg add load Drive1.Drive=Dir1.Path messagebox() Dir1.Path=File1.Path openrecordset Moderate Exciting Both enter and exit, and Fly in from top or bottom fly in from top or bottom Shift what objects do after they appear on a slide. The advanced timeline shows the duration of the Organization charts Draw program From top Once data is entered it can be changed. Alt the way objects exit a slide. The advanced timeline shows the sequence in Text Filtering program Dissolve in Data cannot be entered into Datasheet.
Pull down the Insert menu and select Chart, You cannot display the underlying datasheet Change to Slide Sorter view. The datasheet window is toggled from closed to The application that created the chart is Microsoft Graph will restart. a slide one bullet item at a time, build bullet items Subtle, Moderate, or Exciting Neither enter nor exit; neither fly in from top nor Ctrl Custom animation can be used to affect the way The advanced timeline shows neither the Clips, organization charts, and text Animation program Fly in, From top, and Dissolve in There is no such thing as a Datasheet. OLIP. You cannot change the color of the boxes in an [Ctrl+Z] .frx none of the above none of the above none of the above none of the above File1.pattern=Dir1.path count
OLAP. OLST. You can change both the You cannot change the appearance of a whole style of the connecting [Shift+Z] .vbp additem loadpicture Dir1.Path = Drive1.Drive message() [Alt+Z] .frm loaditem addpicture File1.Path = Dir1.Path msgbox()
Dir1.Path = Drive1.Drive File1.Path = Dir1.Path opendatabase recordcount
update append movenext Cancel parameter to a non-zero value Word 2000 click-n-type office clipboard
append update movelast Cancel parameter to 0 Office 2000 double click cut
addnew additem moveprevious UnloadMode parameter to a non-zero value Office 97 drag & drop select ctr+end and ctr+home
additem addnew movefirst UnloadMode parameter to a zero value Back Office none of the above none of the above none of the above
shift+end and shift+home shift+left and shift+right web layout, printlayout wizard office assistant Screen Tip tab stop up arrow keys only left template increase indent special effect drawing toolbar 1 page setup from the file border ctrl+a ctrl+a CTRL+SHIFT+F ctrl+shift+f
normal layout, web layout web layout, page layout none of the above click from start program, templates MSWord from the task none of the above inbox assistant Tool Tip marginal stop page up keys only center model decrease indent control tool box control box document assistant Icon Tip ruler none of the above Document Tip none of the above
home and end keys only up and down arrow decimal dialogs/alerts both A and B design wizard database rotation none of the above none of the above pictures forms
2 0 11 printer setup from the file menu print preview from the file none of the above shading Del Del CTRL+O ctrl+o style box ctrl+f ctrl+f CTRL+SHIFT+S ctrl+shift+s none of the above ctrl+m ctrl+m CTRL+SHIFT+P ctrl+shift+p
Excel True False Valid Signs HLOOKUP DDE Analysis translates program code of a high Only hardware and software To collect data Deleted from the disk Users operate the manual system and The new system is introduced alongside the Instructions and technical documentation For technical support Operating systems and system services Magnetic tape storage To maintain a backup copy of all the Data bus FDDI Data bus Peripherals that are connected to a binary form were 7 bits 4 bits More than 1000 mega bytes 32 registers
Access False True Transaction type VLOOKUP OLE Analysis is the loading of programs that perform Inputs, outputs, file design hardware, and To execute any programs Copied from the disk Users operate the computer system from a The new system is introduced and users Log files and temporary files To enable any printer to be connected to the Network systems and communication services CD-ROM To do a particular task. Auto bus BAD Auto bus Operating system routines that execute in ASCII code form 8 bits 8 bits 1000 kilobytes 32 I/O devices
Both
None of the above
Limit Check A or B
Reasonableness None of the above
ODBC All of the above This involves looking at a system and finding out None of above Maintenance, reliability, and upgradeability None of above To maintain security Saved to the disk Users operate the manual system Users continue operating the old system User Guide and technical documentation User guides cover how to run the system, enter Database systems and backup services None of the above Transferred from the disk None of above None of above None of above None of above None of the above
floppy disk Hard disk To help someone who is applying for employment None of the above Address bus TED Address bus Data structures that are part of the kernel of an decimal form represented 256 characters 16 bits 230 bytes 32 Mb of RAM Control Bus MAD Control Bus Shells, compilers and other useful system alphanumeric form represented 127 characters 32 bits 1024 bytes a 32-bit bus or 32-bit registers
used to indicate uppercase letters ROM bits per second memory capacity have fewer instructions than RISC machines ALU Power is switched off a parallel interface line printer is faster to access than RAM increased the storage capacity of a computer is a form of ATM card CRT displays having several programs in RAM at the same time having several softwares running at the same time ALU brochures multitasking multitasking NORMAL ctrl+m ctrl+v or ins ctrl+2 Text Box Header and Footer Chart
used to detect errors RAM baud memory access time use more RAM than RISC machines Registers Computer is improperly shut down a serial interface dot matrix printer is non-volatile increases the process speed has more storage capacity than an ATM LCD displays multitasking the ability to run 2 or more programs Registers magazines an operating system multiprogramming ONLINE LAYOUT ctrl+2 ctrl+c or ins ctrl+5 Frame Screen Tips WordArt
is the first bit in a byte DRAM bytes secondary storage capacity have medium clock speeds
is the last bit in a byte CROM Hertz secondary storage access time use variable size instructions
Variables Logic Bus Data is not saved before computer is shut down All of the above printer interface ink-jet printer stores more information than RAM provides backup power in the event of a power is an access card for a security system SSGA displays writing programs in multiple languages writing programs in multiple languages Variables CD-ROM to run more than one program at the same multiuser PAGELAYOUT ctrl+end ctrl+x or ins ctrl+1 AutoShape Page Layout Auto Shapes a modem interface laser printer. is used for cache memory none of the previous contains a microprocessor none of the previous none of the previous none of the previous Logic Bus e-mail none of the above none of the previous ONLINE DOCUMENT ctrl+home ctrl+v or Del none of the above Border none of the above File
Borders clear
Shading remove all
WordArt remove circle bullet dialog box AutoShapes new document mail merge shift+f8 first row enter table auto format option records style gallery Data Source vj++ alt+f8 browser micro soft outlook sgml arpanet field names in the header source must match any by default cell height and weight option applies to
Bullets clear all none dialog box files default document none of t he above tools+spelling menu last cell of the t able none of the above none of the above none of the above none of the above none of the above visual FoxPro alt+f5 none of the above hotmail vb script LAN the number of fields names in the header delete cells option allows to delete the entire row
picture bullets dialog box arrow bullet dialog box charts doc1 thesaurus shift+f7 first tab convert text to table row AutoCorrect Mail Merging basic shift+f8 web layout view email client html internet field name must be listed in the same order as the it is not possible to change the height of only WordArt document1 hyphenation thesaurus menu second end convert data to table rows & columns AutoFormat Macro visual basic shift+f7 online layout view outlook express xml intranet the field separators in a header source and the auto format option applies to the entire table
left decimal justified top A new section is created In order to type a header If a header is inserted in A section is a portion of a in order to change from the third page of the the second section then document in which true true true false false false
drag & drop true automatically corrects common typing, spelling password can not include spaces
click -n-type false prohibits the user from renaming an auto correct password protected document can be
Double Click
none of the above
automatically corrects the grammatically errors password are not case sensitive hanging a multiple documents files can be inserted in
with t he caps lock key accidentally turned on password can be upto 15 characters long top an .xls data can not be inserted at specified
left justified a .ppt file can not not be a document file can be inserted at specified inserted in the current true true true true Master Document Print Layout View Insert Mode press the return key layers and planes tab grammar checker send a public message to friends interested in Print all Enter closing database To analyse figures subscript false false false false Child Document Page Layout Type Over mode press the tab key lines and spaces enter/return spell checker
Hyperlink Document Outline Layout Remove press the escape key height and width backspace/ delete
none of the above none of the above none of the above just keep typing rows and columns shift outliner send a package to a friend Print preview Save sorting spreadsheet None of the above clipboard Making Calculations Font, Paragraph, Bullet and Numbering
thesaurus send private messages send pictures to a friend to a friend From ___ To ____ Copy tabbing graphing Creating and editing documents Page setup Retrieve spacing word processing Storing information clip art Storing information Cut, copy, paste and clear
annotation Creating and editing To analyse figures documents Spelling, grammar and Clear, replace and select autocorrect
Text at the bottom of every page Mouse, printer and processing system Browser Clear, replace and Toolbars 6 point 2½ inches. You are not in Print Layout view. to store a file on the hard drive Data about a set of similar things Thesaurus Paste Copy, then paste To give the original author a chance to A line appears through text that is to be deleted. Through the Edit menu by choosing Track The Versions command will allow you to save All versions are opened automatically.
Numbers which appear on every page Keyboard, Mouse, monitor and printer clip-art file Spelling, grammar and autocorrect 10 point 2¾ inches. You have not inserted a column section break.. to store a file on a diskette Mainly text Spell Checker Replace Cut, then paste To give the original author a chance to reject A red underline appears beneath text that is to be Through the Tools menu by choosing Track The Versions command will allow you to save The latest version is opened automatically.
Text which appear at the Designated area on the top of every page document Monitor, keyboard and mouse None of the above microphone Cut, copy, paste and clear 15 point 3 inches. You have not specified continuous section to move a section of text from the original location A set of different graphics Grammar Checker Select all Delete, then paste To complicate the revision process and to A vertical line outside the left margin signifies a Through tools on the Reviewing toolbar The Versions command will allow you to save The first and second versions are opened digital scanner None of the above 25 point impossible to determine. Word cannot display columns during editing; to leave an original section of text in place None of the above Find and Replace AutoCorrect Insert, then paste To allow multiple people to work on one document Comments are enclosed in a text box at the right Both through the Tools menu and the Reviewing The Versions command will allow you to save The previous version is opened automatically.
Dictionary Grammar check Spell check Thesaurus Word displays a list of The most recent version Word will show the name Word is not able to tell the dates and times each will appear at the bottom of the person who saved the most recent version Fields Check boxes Comments cannot be edited. Text at the bottom of every page Press tab. text. header/footer. Tools Toggle button Comments cannot be deleted. Numbers which appear on every page Press Return. graphics. bibliography. Forms Text fields Comments can be edited or deleted by right Text which appear at the top of every page Copy and paste. forms. find/search. Insert A drop-down list Comments can be edited or deleted by left clicking None of the above Insert page break. numbers. macro.
Copy button Fault Finding Insert a section of white text on a black background. setting it in larger type or font size. The reverse technique means to add dark text The width of each column 6 One Press Ctrl+Enter to create a page break. A serif font at 10 points 2 inches Field Horizontal Duplicate Value Cross Tabulate RAND() TRUE TRUE Unusual exception testing True True Limit related to virtual reality same as multitasking
Paste button Bug Squashing Tools a section of text where the first letter of each typing it all in capital letters. A pull quote is a quotation taken from The height of each column 10 Two Press Ctrl+Shift+Enter to create a column break. A sans serif font at 10 points 3½ inches Record Vertical Combined Value Filter VLOOKUP() FALSE FALSE Strange comparison of data False False Sequence a form of ROM same as multiprogramming
Format Painter button Error Injecting Format the guidelines used to establish where different underlining the text of the pull quote. A dropped cap is a word that starts with a The number of columns 12 Three Press Enter to create a section break. A serif font at 20 points 4 inches Both A or B Gaps Merge HLOOKUP()
This action is not possible. Debugging Edit an enlarged capital letter at the beginning of a changing the color. A grid is a set of horizontal and vertical The tab spacing within each column 72 Four Press Shift+Enter to force a line break. A sans serif font at 45 points It depends on the left and right margins, and how None of the above None of the Above All of the above None of the above None of the above
A or B duplicates testing
None of the above All of the above
Range a form of VRAM multiuser
Both B & C none of the previous involves using more than one processor at the
save the file to calculate numbers Uses Cobol 106 sec a keypad data to be transferred to memory data to be transferred to or from memory an instruction that has been decoded a cursor Formula Assembler
set up a password to read from or write information to a floppy uses Java 103 sec a mouse data that has been transferred from memory data to be transferred to the stack an instruction that has been fetched from a scroll bar Algorithm Compiler
make a backup copy to print sheets of paper uses C++ 1012 sec a frog the address of a memory location the address of a memory location an instruction that has been executed a light pen Program Artificial Intelligence Range checking use the backup facility System keep a record of computer failures Multiprogramming Floppy Disk Telephone modem Telephone modem Indexed CPU Files and Tracks File, record, field Systems logs MIDI interface Sound
use a virus protection program to display information or pictures on a screen none of the previous. 109 sec a message pad an instruction that has been transferred from an instruction that has been transferred from the address of the next instruction to be a magic marker Data Parity Checker Validation use find and replace Modem backup to a secure medium Multiplexing Magnetic Disk Shareware Shareware Random Primary Storage Schema and subschema Element, field, file Parity check Serial interface Video
Memory protection Parity Checking use the directory search tools search each file in turn Network save copies of the file with the same name on Multiprocessing ROM Firmware Firmware Sequential Operating System Tracks and Sectors Character, field, database Valid character check Sound card. Text Program use different filenames on the system Time sharing RAM Word Processor Word Processor Hashed ALU Blocks and Sectors Database, character, record Maintenance diagnostic program CD-ROM Pictures
Laser Dot matrix viewing an creating the plans for a encyclopaedia CD-ROM. building design. replaced regularly Database get into the system quickly 512 loss of confidentiality TCP/IP access to the internet is quicker a file name universal port serial orphan files can be left on the system data. Graphical representation of logic Purchase, sales, receipt, payments etc. never updated Document processor make efficient use of time 1024 duplication of data HTML files can be shared a subdirectory up-line provider service the program executable may not allow it to be
Ink-jet presenting an order for stock to a warehouse. updated regularly Graphics package retain confidentiality of files 4096 virus infection IPX/SPX printer can do 1000s of pages a day the root directory uninterruptable power supply the system requires a network administrator to
Drum recording current stock in a supermarket and updated once a year Spreadsheet simplify file structures 8192 loss of data NetBEUI the operating system is easy to use the hard drive uniform page source the system always requires a re-boot and text. None of the above None of the bove allow encryption None of the above All of the above None of the above local identify the file type All of the above are parts of IS controls. extensible hashing D: (b), (c), (d) general controls Control
documents. information. Rules writte in procedural Logical Steps in any language language To fill the log register It is mandatory in tally prevent unauthorised access IT understands the business processing. Software that generates innovated designs and enterprise identify the file corrective controls. dynamic hashing C: (a), (b), (c) detective controls Settings
assist in maintenance speed up access senior executive support IT management lacks for IT. leadership. input. output. The use of computers to Using computers to do design state-of-the-art, architecture. Application Service specialist or functional Provider ensure the filename is name the file not lost preventive controls. external hashing A: (a) , (b), (d) corrective controls Component detective controls. static hashing B: (a) to (d) preventive controls Interface
(a), (c), (d) Press the reset button. Create the files again. (a), (c), (d) detective controls (a), (c), (d) problem logging unit testing (b), (c), (d) benchmark testing Multiplexer. (a) to (d) Replacement personal computers for user architectural design Client-server Star
(b), (c), (d) Turn the computer off at the power point. Ask the person next to you. (a), (b), (c) organisational controls (a), (b), (c) call lights data testing (a), (b), (d) specifications matching Peripheral processors. (b), (c), (d) Identification of critical applications. interface design Client Bus
(a) to (d) Select the „Shut Down‟ option from a menu. Use the Find or Search feature. (a) to (d) preventive controls (a) to (d) program change requests thread testing (a), (b), (c) parallel operations Concentrator. (a), (b), (c) Physical security of warehouse facilities. procedural design Computer network Mesh
(a), (b), (c) Pull the power cord from the back of the Put your hand up and ask the teacher (b), (c), (d) corrective controls (b), (c), (d) resolution procedures loop testing (a) to (d) system walkthroughs Job control language. (a), (c), (d) Cross-training of operating personnel. data design Hub Ring
Star Bus To maintain a backup To do a particular job copy of are written all the such as editing, storing Direct Systems analysis and applications A sequential file on a disk Tapes can only be read by the machine on which Data path part Distributed systems Can send data to a computer and receive Mixer Sequential Data communications hardware and software. A sequential file on a tape Parity errors will result Control Unit Local Area network Use the computer to which they are Modem
Ring All of the above To help someone who is To Store data in an applying for employment organised manner Binary Operating systems and compilers. A direct access file on a disk Information formats commonly vary between Indexed Computer operations. A direct access file on a tape Data record can never be blocked together
Address calculation part Input output channel Wide area network Generally require a keyboard for data entry Multiplexor Protocol Are required with a microprocessor which Time sharing computer
Allows computer signals Aids in back-up to be send over a procedures Planetary network Office Automation A dumb workstation Ring Network Executor systems
Packs data in a disk file Loop Network Electronic mailing
Speeds up online printing Star Network Instant post-office A mainframe PC
An intelligent workstation A personal computer Parity checks
Time of day control locks Encryption algorithms Type of cable A compiler does a conversion line by line as Feasibility study, system design, and testing Terminal Standard A compiler converts the whole of a higher level Implementation and documentation
All of them Device interconnect Communication protocol standard A compiler is a general purpose language None of the above Lexical analysis, CONVERSION, and None of the above ASCII An interpreter is a general purpose Frequency division multiplexor Low-level languages It is less prone to attenuation Accounting systems, commercial sector Relieve the main CPU of repetitive communication Testing EBCDIC None of the above Time Division Multiplexor None of the above Uses only one path None of the above Reduce competition between the input/output None of the above
CRC Baudot An interpreter does the An interpreter is a conversion line by line as representation of the Modem High-level languages It is faster than parallel communication Financial sector and engineering Communicate with the console operator Demodulator Middle-level languages It is less error prone Graphic design and education Manage the paging function in a virtual
Specification and design System Analysis
Fiber Optics Coaxial Cable Common carrier Telephone Lines The design of the screen System Analysis defines System Analysis involves the user will see and use the format and type of creating a formal model None of the above A cache The different types of network to be used Star 10101010 Parity 15 Port 327 An interface A buffer An online protocol Testing to check for Hardware, Software and errors before the system size of program. None of the above Packet 1100101 Retransmission 4 Modem 141 Ring 1010101 Cyclic Redundancy 64 Multiplexor 97 Bus None of the above Hash Count None of the above Acoustic coupler None of the above
Data warehouse memory capacity 30 binary form 4C5 4 bits
Data Mining tools memory access time 255 ASCII code form 1B7 8 bits
Data management systems secondary storage capacity 256 decimal form 5C4 16 bits Bit Code Design 210 bits 1110 decimal form Numeric Keypad is the first bit in a byte It has ears bytes Joystick MHz Reading bar codes barcode scanning CD-ROM drive provides backup power in the event of a power
All of them secondary storage access time None of the above alphanumeric form None of the above 32 bits None of the above 210 bytes None of the above alphanumeric form None of the above is the last bit in a byte None of the above Hertz None of the above VLSI None of the above voice recognition None of the above none of the previous
Basic Coding Description Binary Coded Decimal 1024 bits 10000 binary form Mouse used to indicate uppercase letters Because it squeaks when moved bits per second Touch screen BPS Printing letters OCR Touch screen increased the storage capacity of a computer Refillable ink 100K hardware Mouse Touch screen Printing letters 1000 bytes 1112 ASCII code form Keyboard used to detect errors Its moves like a mouse baud Light pen MIPS Tracing diagrams MICR Hard disk increases the process speed Pencil lead 1.44 Mb software Keyboard Light pen Tracing Diagrams
Light sensitive elements None of the above 5 Mb output Numeric Keypad Joystick Reading Bar Codes 1 Gb input Printer Scanner Digital Signatures
Touch screen Mouse Credit card Writing on a hard board Coloured spots Printer Mouse CRT displays screen layout Mouse hardware Credit card having several programs in RAM at the same time having several programs in RAM at the same time multitasking First - generation computers. multitasking Vishwajeet is caused by wear Bar code Reader Technology a fast interpreter Drum Printer encrypting it Very important reader user sequence Electrically charged ink mainframe technology
Hard disk Bar code reader Mouse Printed output Pixels Storage device Bar code reader LCD displays mouse button layout Bar code reader language interpreter Speakers multitasking The ability to run 2 or more programs an operating system Second - generation computers. multiprogramming Deep Blue caused by overuse Optical Mark Reader Technology slower than an interpreter Dot - Matrix Printer decrypting it Vital information resource under siege Thermal Paper LAN technology
Keyboard Optical mark reader Speakers Storing information on the hard disk Pixies Pointing device Optical mark reader SSGA displays keyboard layout Optical mark reader software interface Smart card writing programs in multiple languages writing programs in multiple languages To run more than one program at the same Third - generation computers. Multi-user Param is due to bad disk blocks Magnetic Ink Character Recognition Technology converts a program to machine code Desk - jet Printer
CD ROM Drive Keyboard Printer Back-up on a Cartridge Pickers CD-ROM None of the above none of the previous word processing software None of the above an operating system None of the above none of the previous none of the previous none of the above Fifth - generation computers. none of the previous Arjun none of the previous Image Scanning Technology none of the previous Thermal Printer
compressing it transmitting it Virtual information reader & user system None of above An inked ribbon and print An ink pen head WAN technology Unix operating system
10-6 sec Limit checks application project multiprocessing mainframes control unit band printer data management integrated software my computer field assembly language terminator symbol PC-at multiprocessing "dumb terminals" wan host host PC server processing four
10-3 sec Control figures system model multithreading super computers arithmetic and logic unit drum printer word processing
10-12 sec External file labels operating system pilot project multiplexing micro computers central processing unit non impact printer electronic spreadsheet
10-9 sec Cross footing tests communication process multitasking none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above input/output symbol IBM-PC none of the above dummy servers LAN front end front end centralized data processing many relational database system none of the above disk mirroring
communication software idea processor recycle bin file machine language processed symbol hp vectra system multithreading dumb servers distributed computing system server server LAN host processing Microsoft exchange record high level language connector symbol fazitsu vp200 series multiplexing dummy terminals windows NT back end back end distributed computing dumb processing two network database system multiplexing disk defragmentation
one hierarchical database file management system system multiprocessing repairing multithreading redo logging
Code/De-code fixes multiprocessing Linear area networks task Integrated system dynamic networks. Ethernet visual basic
Modulation/Demodulatio n Module/De-module locks multithreading Local area networks process Integrated Symbolic Digital networks. Internet power builder constraints multiplexing Local array of networks. thread Integrated Services Digital network. ARPANET SQL * plus
None of the above traps none of the above None of the above client-server None of the above. None of the above. all of the above
MAN WAN GAN None of the above. Transfer control Transfer communication Transmission control protocol/Internet protocol protocol/Internet protocol protocol/Internet protocol None of the above. Cells System modulation transfer protocol Transfer Protocol Bits Software Mail transmission protocol Packets Simple Mail transfer protocol Hyper text Area transfer mode Receiver package LAN and MAN None of the above. None of the above. None of the above. None of the above. None of the above. system LAN WAN and MAN Intranet None of the above. Web based Transaction Repeaters program number and alpha input, output, performance ratios mainframes write
Transmission protocol Asynchronous transfer Aggregate transfer mode mode File server platform MAN and WAN ISDN Internal Services Digital Network Web based Training Bridges procedure alpha numeric space occupied, price, no. of users allowed mini computers input Printer server configuration LAN and WAN
ATM Internet Internal Services Design Integrated Services Network Digital Network Web based Technology Routers batch alpha beta cost, performance their ratio microprocessors output Web based Transport Protocol command numerous alpha size, performance, cost PCs feed
multiprocessing interpreter input impact printers operating system, bootstrap, kernel, shell operating system batch processor compiler
multithreading compiler processor drum printers control program, interpreter, assembler, application software protocols compiler interpreter
multiplexing converter ram non-impact desktop printers monitor, program, keyboard, bus windows 95 software's assembler assembler
multitasking process output thermal printers CPU, memory, input, output interpreter procedures coder processor
ans A A A B C B B A A A D A D A B D C A B B A C A C B
B B B B D A B A B B B B C A C A A C A C A A B B A C
C B A D C A A B B C B A C A C A B A A B A C A A C A
C C C B B B C C B D A B C A C A A A C C B A A A A B
A B C A B C B B A B B A A B B B A C C B A A A B A A
A A A A A A B A D B D A A A A D A D A A A D B B A A
A A A B D B B D C A A B B A A B A B B A B B D A A A
A A A B B B A A B A C D B D A A A B A A B A A A D A
C B A A A A A A D A A D A A A B A D A D B B D D D A
D D D A B D D C C A C B D A B C C A D B C C D B C A
A B A A C A D D B D A B A C B C A C A A B B A A C B
C B B A A D A D D B B B B C A A D B B B A C C B A C
C B B A A A A A D B A B D D A A C B A C A B A A B B
B B A B C A A B B B A C B A B D B B B A C D A A A B
B D B B B A A A A D A C A B A B A C B C B B D B A A
A B B A A C B A C A A A C B C D D B B D C B C C D C
B A C C C C C C D A C A C C B A B B A B B C D D D C
C C B B C C A D D A B C B D D A D B C D D A B C A B
D D A C D C C D B D A B A B D C A D B C A C D C C A
D C A A A B A C B D A A A A C D D A D C D B D B D A
D C B C B C D C A A D D A A C B D A A B B C A A B B
A A B B B D A C A C C C B C C C B A C B D C C D C C
D D C C C B C B A B B B B A A B B B B A B A A B B C
B B A B B B B D D A D A B B A C C B B D B B A B C C
C B C A C C C B B C C B C D B A B B A C B B C B A A
D B C C B B B B B C B C B C B B B C B B A C B C D A
D A C B A A A C A B C D A A D A B A A C A B B C D D
B B C A C B D D A B C D C B D A A A A C A B A A B B
C A D A D C B B A B B C A A D A D B A C A D C D D A
A C A B C D D C B A C B C A B C B C B B C D B D A D
B C D C B B D C B A B C D D C C D A D B B C D A C B
A C A B B A B B A B C A B A D A B B C A B C C B A C
B D B B C A C D B B B B A D A A B C B B D A B C B C
A D B B C C B A C D B C A A D A D D D D C D A D D C
A C D A C B D C B D B D D B C D D D D D B A B D B B
B B B C C B B B A C D B C A C C C A B A A B B A D B
C A A C C B C C B A B D D D D D A A C B D C D B C D
D C D B D D A D C A D C B C B B A D A A D D A B A D
D A B D C D B A C C B A B C D B C B C C A C A C A C
A B A C C C B C B B B B B A B C B A D A A C B A A D
D B A C A B D D D B C D B D B B B B B B D D D C C B
D B C D A D D D C B D C D A D B B B D B B B B C C C
C B C A A A A B A A A A B D D B C A A A A A A D A C
B A B D B C C B D A B A C C A B B A B D D A A A A D
B A D B D A D B D B C C B A D B D C C A B A B A A A
D D A C B A A A A A B A B B A A A A A B C A D A A A
B A B B A B A A B A A B A D D B C D B C B C B C B C
C B D C B B A D B B B A C D D A B A A C B C C D C A
C D C A A D D D B C D D A A C A B A A C D A A B D D
B B D D B C A D A B B B A B D D B C A C B A C C A D
B A C D C C D A B D C A A A A C B D A B D D A C C B
C C C C C C C A D B D A B A C A D B B C C C A B D C
A D C B C D B D A A C C D C C B C C B B B C A A C B
B B B A A B D A A A A B D D C B B B A C C B A B C B
A B A B B A
B C B C A A B C A A C C B C A C B D B
D C D D D A B C B B B C B B B D A D D C A B A D B D
B B B B C C B D B C C C C B B A B A C A B D A C D A
D D D C D B C B C
q_id
q_desc
op1 clipart & auto shapes circles square tool bars clip gallery & word art wave file
PP1 In Powerpoint2000 ,the built-in professional design elements are Selection handles are the 8 small ___________ that appear around the PP2 object, when an object is selected The _______ is an invisible matrix of vertical and horizontal lines that PP3 covers the entire slide workspace _______ are drop-down menus that appear when the right mouse PP4 button is clicked on the screen element ________ and ______ have the ability to add a lot of visual impact into PP5 the PowerPoint presentation PP6 _______ is a motion picture or any animation file
PP7 The user can use ______ to remove the undesirable part of the image clipping tool PP8 The power presentation has a _____ for a set of compatible colors The set three colors used for graphs and for secondary slide items is PP9 called as PP1 0 There are ______ types of charts available in PowerPoint PP1 _______ charts are useful while showing variations over a period of 1 time PP1 2 _______ are the individual pages of a presentation PP1 A PIE Chart is a ____ diagram that depicts the relationship between a 3 whole and its parts PP1 4 Each individual piece of data in a series is called a/an PP1 5 PowerPoint launches an OLE-compatible application called PP1 When the user double-clicks on an organization chart object in 6 PowerPoint PP1 The _____ are used for selecting, editing and viewing objects in the 7 chart PP1 8 Manager box tool in organizational chart window is PP1 9 The custom drawing tools are _______ by default PP2 0 Click on the box tool ______ to draw three boxes PP2 There are ____ default fields available in all boxes of the organizational 1 chart PP2 The _____ tool is used in the same way as we use a pen to draw a 2 table PP2 3 A/An _______ consists of smaller printed version of the slides PP2 4 The size of the object can be changed using the ______ tool PP2 _______ is the process through which the slides in the current 5 presentation are included in another presentation or application color palette ascent 10 column images circular entity Microsoft organization chart the organization chart is expanded box tools used to mange organizational chart turned on once two native tool autolayouts zoom importing
PP2 6 PP2 7 PP2 8 PP2 9 PP3 0 PP3 1 PP3 2 PP3 3 PP3 4 PP3 5 PP3 6 PP3 7 PP3 8 PP3 9 PP4 0 PP4 1 PP4 2 PP4 3 PP4 4 PP4 5 PP4 6 PP4 7 PP4 8 PP4 9 PP5 0 PP5 1
________ can be used to create charts as well as worksheets PowerPoint can import text files that have been saved in ______ format PowerPoint outlines can have _____ outline levels When a file is saved with _____ extension, the graphics and text are also saved along with the slide The hidden slide is ____ effect is used to introduce a slide during a slide show A _____ is a special effect that determines how the objects appear on the slide The notes page is formatted based on the Pick the odd man out of the following When a new presentation is opened ,powerpoint creates slides that have a width of _____ and a height of ______ with the landscape The default orientation for notes ,handouts and outlines is ____ orientation Build effect is also called as ______ Graphics for web pages are automatically stored in ____ format A _______ is used to jump to any slide in the presentation The ______ language has been incorporated into PowerPoint In PowerPoint _____ is a series of commands that are executed in sequence The macro will be activated Developers can easily add ____ to PowerPoint 2000 by using the programming interface ______ determines the order in which order in which the slides will be displayed during the show _______ is used to organize and develop the contents of a presentation If we save the presentation file as a metafile, it can be opened using With reference to autocontent wizard for creating a new presentation, which of the following statements are not true Which of the following statement is not TRUE With reference to changing the order of slides, which of the following statement is not true Which of the following definitions are not true Which of the following statements are not true
Microsoft excel .ppt(PowerPoint) nine .rtf(rich text format) not displayed during the slide show DTS(digital track sound) build notes master outline view 15 inches,10 inches portrait animation gif hyperlink visual c++ macro while creating a .exe file virus checkers slide show slide pane internet explorer PowerPoint creates a sample presentation to user can insert objects like clip-arts, pictures in outline view, drag the slide icon to a new the slide that holds the formatted placeholders with notes pages view user can prepare
PP5 2 PP5 3 PP5 4 PP5 5 PP5 6 PP5 7 PP5 8 PP5 9 PP6 0 PP6 1 PP6 2 PP6 3 PP6 4 PP6 5 PP6 6 PP6 7 PP6 8 PP6 9 PP7 0 PP7 1 PP7 2 PP7 3 PP7 4 PP7 5 PP7 6 PP7 7
Which of the following definitions are not true The options available in the common task toolbar does not include
the slide that holds the formatted placeholders slide layout data to be graphed resides in a datasheet
With reference to chart, which of the following statements are not true The format of the text entered in a title, subtitle, or bulleted-list object is determined by the format settings in a special slide called -------the master slide PowerPoint provides a _________ that searches the entire presentation i.e., all the text objects in all the slides, outlines, notes and office assistant PowerPoint's drawing toolbar contains _______ drawing tools Click _______ on the rectangle drawing tools enables us to draw multiple rectangles An example of the components of a multimedia presentation could include Which of the following formatting elements can be applied to a PowerPoint diagram using the AutoFormat tool? Which of the following formatting elements can be applied to a PowerPoint diagram using the Format AutoShape command? What happens when you double click a blank graph placeholder in a PowerPoint presentation? The legend in a Microsoft Graph chart is: Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best chart type if you want to emphasize Which of the following actions will enable you to insert a graph into a PowerPoint presentation? If you are editing a slide containing a Microsoft Graph, how do you display the underlying datasheet? How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished creating the chart? What happens when you click the Datasheet button on the Microsoft Graph toolbar? What happens if you single click a chart that is not currently active? What happens if you double click a chart that is not currently active? Using custom animation effects, you can build: Which of the following animation effects can be added to a slide? Which of the following animations effects can be added to a slide? Which keyboard key is used to select more than one picture on a slide? Custom animation can be used to affect ONLY: Which of the following best describes the information that appears on the advanced timeline? Which of the following objects can contain custom animation effects? 10
once text, graphics and email address. the Line style Fill color Excel is started so that you can create a chart. always taken from the first row of data in the Side-by-side column Pull down the Insert menu and select Chart. It automatically displays in Slide view. Single click the chart. A dialog box is displayed allowing you The chart is selected. The chart is selected. a slide one bullet item at a time. Subtle Enter and exit Enter the way objects appear on a slide. The advanced timeline shows the sequence in Clips
PP7 8 PP7 9 PP8 0 PP8 1 PP8 2 PP8 3
What type of program allows an object within an image to be edited without affecting other objects? Which of the following animation effects can be added to a slide? Which of the following is TRUE regarding the Datasheet? Graphical software tools that provide complex analysis of stored data are: Which of the following statements is TRUE regarding PowerPoint diagrams? Which keyboard key combination is used to undo the previous command(s)?
Paint program Fly in Once data is entered it cannot be changed. OLTP. You can change the appearance of a whole [Enter+A]
op2 autolayouts and presentation templates points image short cut menus slide show & view show media clip cropping tool color box tricolor scheme 28 bar images and text radar data point
op3 slide view & outline view squares grid auto shapes fonts & images .video file cutting tool color scheme color palette 18 pie slides doughnut data
op4 none of the above icons guide all the above none the above all the above scribble drawing tool color guide primary color scheme 36 linear slide sorter views all the above stream track changes none of the above
clip art auto shapes the chart is made available for the chart window opens editing displaying a chart template general purpose tools accessed only by manager turned off twice four draw tool handlayouts reduce/enlarge exporting
standard drawing tools custom drawing tools used to create a manager box for used to store the other tools of the organizational chart an existing box not available in the tool bar thrice five standard tool slide view preview copying available in the tool bar any of the above eight all the above none of these none of the above moving
auto shapes .rtf(rich text format) only one
clip art .doc(document) six
drawing tools .html(hypertext format) twelve .doc(document) none of the above transition view show master notes slide sorter view none the above none of the above b or c none of the above all the above all the above add-ins none of the above all the above none of the above outline pane power point 2000 provides suggested content and design user can insert picture to the title slide which gets reflected in all I slide view, drag the slide icon to a new location the slide that holds the formatted placeholders for the the slides can be reordered in the outline view
.txt(plain text) .wmf(windows metafile) displayed only during the slide show displayed only in outline view 3D(3 dimension) transition slide master slide view 10 inches,7.5 inches landscape view show jpeg hypertext both a and b slide show master slide view show 7.5 inches,5 inches a or b transition png action button
visual basic for application Microsoft visual interdev batch file during slide transition spell checkers custom show notes pane paint shop pro it is the quickest way to create a presentation user can insert only predrawn, pre-colored graphic in slide sorter view, drag the slide to a new location transition means applying special effects to the in outline view, user can see the miniatures of all slides in a templates when the slide show is run header files both a and b properties pane paint shop pro contains sample presentations for a variety of topics user can insert picture to the master slide which gets reflected in in notes pages view, drag the slide icon to a new location design templates is the template whose format and color scheme user should select the slide view to add the text to the slide
transition means applying special effects to the customize by default, doughnut chart is displayed based on the the slide master spell checker 12 twice text, hypertext and Power Point. the Line color Line color A popup box prompts you for an existing Excel chart to always taken from the first column of data in the Stacked column Click the Insert Chart button on the Standard toolbar. Click the chart object, then click the View Datasheet Double click the chart. A dialog box is displayed allowing you to enter the The chart is deleted. The chart is deleted. bullet items one letter at a time. Moderate Fly in from top or bottom Shift what objects do after they appear on a slide. The advanced timeline shows the duration of the effect Organization charts
design template is the template whose format and color scheme new slide data is plotted in a chart window the header slide grammar checker 102 three CD-ROM, digital camera and sound. the Font and the text alignment
the slide that holds the formatted placeholders for the title and set up show user can add data labels and gridlines to the chart the format slide none of the above 22 four times text, hypertext, Power Point, video and sound. Line style, Line color, text font, and text alignment Fill color, Line color, and Line thickness
Line thickness Microsoft Graph is started so The graph placeholder is deleted. that you can create a graph. taken from the first column or row of data in the datasheet, depending entered by the user. Pie chart Pull down the Insert menu and select the appropriate Object. Pull down the Edit menu, then select Object. Click outside the chart. The datasheet is saved as a separate file. The chart is doubled in size. The chart is doubled in size. bullet items one word at a time. Exciting Both enter and exit, and fly in from top or bottom Alt the way objects exit a slide. The advanced timeline shows the sequence in which objects Text Line chart Pull down the Insert menu and select Chart, click the Insert You cannot display the underlying datasheet once the slide is Change to Slide Sorter view. The datasheet window is toggled from closed to open The application that created the chart is started. Microsoft Graph will restart. a slide one bullet item at a time, build bullet items a letter Subtle, Moderate, or Exciting Neither enter nor exit; neither fly in from top nor bottom Ctrl Custom animation can be used to affect the way objects The advanced timeline shows neither the sequence in which Clips, organization charts, and text
Draw program From top Once data is entered it can be changed. OLAP. You can change both the appearance of a whole [Shift+Z]
Filtering program Dissolve in Data cannot be entered into Datasheet.
Animation program Fly in, From top, and Dissolve in There is no such thing as a Datasheet.
OLST. OLIP. You cannot change the style of the You cannot change the color of connecting lines in an Organization the boxes in an Organization [Alt+Z] [Ctrl+Z]
ans B C C B A B A C A C A C A B A C C C B C B B B B B
A B C B A D A A C B A A D D B A C A B D D D B C D B
D B B B B B B D D D C C B D B C D A D D D C B D C D
A D B B B D
q_id IN90 IN91 IN92 IN93 IN94 IN95 IN96
q_desc The two major browsers used to surf the Internet are ________,_______ Special characters allow browsers to display _________________ The keyword for providing links within or across documents is____________ Stringing pages together using hypertext technology helps view pages _______________ The initial web pages present in a web site is the ________ page. The image format supported by most browsers is________________. The components of a URL are ___________ The mail we send has a mailing address and most of them correspond to_____,_____ and Which of the following is not supported by internet explorer _______________ CGI stands for ____________ Host name indicates the domain name of the web ________ The internet is also called as _______________ The internet is similar to _________________ The net drivers______ from one place to another The World Wide Web was devised by _________ The useful URL schemes are_____ and______ The other ways of getting connected to the net are_____ BBS stands for______ USENET is a BBS on ____ scale WINSOCKS is expanded as______ IETF Level 2 HTML DTD supports graphical browsers like _______ The space used by Netscape to store the retrieved page is called______ The URL for encyclopedia Britannica is_________ _______ maps IP addresses with the domain names of the sites Internet can be defined as _______ The most important service of the ______ is to manage traffic control _________is a program that displays information about a host connected to the net _______ is a program or a tool that helps in locating a file anywhere on the net URL stands for ____________ IN an URL the word before the color refers to _______ A ______ always begins with a slash Prodigy is run by IBM and ______ The World Wide Web is referred to shortly as the _______ Gopher and WAIS enables the user to ______ ______ is the program used to run CompuServe's regular services Navigating through the menu of gopher is called moving around _______
IN97 IN98 IN99 IN100 IN101 IN102 IN103 IN1 IN2 IN3 IN4 IN5 IN6 IN7 IN8 IN9 IN10 IN11 IN12 IN13 IN14 IN15 IN16 IN17 IN18 IN19 IN20 IN21 IN22
IN23 IN24 IN25 IN26 IN27 IN28 IN29 IN30 IN31 IN32 IN33 IN34 IN35 IN36 IN37 IN38 IN39 IN40 IN41 IN42 IN43 IN44 IN45 IN46 IN47 IN48 IN49 IN50 IN51
The directories that come with built-in engines are yahoo,lycos and ______ To use the finger command,SLIP users must run a programme called______ The web maps are called _______ Directories consists of _______ levels The _____ level gives the broadcast overview of the net The huge list of keywords from important items is called ______ The two types of search in veronica are _____ and ______ _______ searches by keywords Mosaic displays links in color whereas _____ does not display links in color ______ supports one button publish SPY MOSAIC is distributed by_______ ______ is a program that helps us to log on to other networks HTTP is the acronym for __________ ______is used to transfer and copy files over the internet _____ is a program that helps us to log on to other networks TCP/IP stands for ________________ Archie servers can be accessed in_______ different ways in internet _______is the computer on the internet that translates between the internet domain names and the internet numeric address TIA stands for_____ in internet Service indicates the name of the ________ used to access data, present on the other end of the link. HTTP stands for______ ________ is used to link pages in the world wide web FAQ stands for ______ The internet adapter is a programme that makes our connection act like a _____or a ____ account The step involved in Communicating between the web clients and servers is ______________ WSIRC stands for______ Two of the important browsers are_____ and_____ Lynx is a _______ programme that works with terminals The huge list of keywords from important items is called an_____
IN52 IN53 IN54 IN55 IN56 IN57
VERONICA is an acronym for _______________ The first freenet is created at the_____ and is called______ ________ are defined as ways of communication amongst networks ______and_____ are web searching features WINWAIS has two source lists namely____ and______ ________ is also called as WAIS manager
IN58 IN59 IN60 IN61 IN62 IN63 IN64 IN65 IN66 IN67 IN68 IN69 IN70 IN71 IN72 IN73 IN74 IN75 IN76 IN77 IN78 IN79 IN80 IN81 IN82 IN83 IN84 IN85 IN86 IN87 IN88 IN89 IN104
HTML stands for_____ The system of interlinked documents is known as_______ The small programmes that create animation,multimedia,real-time games and multi user games are called______ The information displayed on the web page includes______,_____ and_____ The web pages that represent online home of their author are called______ GNN stands for______ _____ is the most popular internet service The online service offered by navigator gold 2.0 are _______ and_____ _______ is a program or a tool that helps us find a file anywhere on the net The databases to enable keyword search using Lycos are a2z,_______ ______ is a large worldwide bulletin board service network BABEL consists a glossary of _____ Dictionaries,encyclopaedias,government and other references are found in ______ Yahoo,lycos,excite and webcrawlers are _____ GIF is the acronym for ____________ JPEG is the acronym for ___________ The Web aids users to explore the ________ The three most popular mailer are_____,_____ and______ The World Wide Web consists of _________ In Microsoft Internet Explorer, the color of the text can be specified using _________ attribute of the font tag. The interface that provides effective communication between the web browsers and servers is _________ CGI is the _________ between web browsers and servers CGI programs are invoked based on the information provided by the _________ A CGI program is usually called after a request made by the _________ URL stands for ________ A hyperlink can be on ___________ HTML was derived from _________ SGML is a _________ PINE stands for _____________ The application that confirms whether a document is compliant to its DTD is _________ Web is a collection of ___________ IETF stands for ________ The net provides interesting services like______,______ and______
IN105 IN106
The windows internet software available are______,_______,________ and______ ________ is the ancestors of the internet DARPA stands for _______________________________________________ The uuencode files start with a _______ DARPA is broken into ________ and _______ NSFNET is the united states provides service to _____ and_____ HTML stands for ______________________________________ The first international IP network connections were established in 1973 with _____ and_____ A_____ is a set of computers interconnected by transmission paths to exchange information in internet A computer that provides a service usable by other computers is called______ A_______ is the representation of physical connectivity of the computers in internet DTE stands for ____________________ The basic function of the ______ is transmitting the bits over a channel The point to point channel network is also called as _____ and_____ Accessing files using FTP servers is called_____ The three most commonly used networks are______,______ and______ ________ is in between LAN and WAN _____ can be owed by multiple organisation Data is transmitted in the form of_____ signals DTD stands for __________ Modem stands for __________________ ______ is the process of the digital signals being converted into a form suitable for analog transmission ________ and______ are two basic ways of getting connected to the internet SLIP stands for ________________ PPP stands for _____ Which of the following best describes uploading information? A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time, expressed in bits per second. The act of searching through storage to locate information without necessarily knowing of the existence of the information being sought. The principles, means and methods for rendering information unintelligible and for restoring encrypted information to intelligible form.
IN107 IN108 IN109 IN110 IN111 IN112 IN113 IN114 IN115 IN116 IN117 IN118 IN119 IN120 IN121 IN122 IN123 IN124 IN125 IN126 IN127 IN128 IN129 IN130
IN131 IN132
IN133
IN134 IN135 IN136 IN137 IN138 IN139
IN140 IN141 IN142 IN143 IN144 IN145 IN146
A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt an decrypt messages and conversations. Protected/private character string used to authenticate an identity or to authorize access to data. The successful act of bypassing security mechanisms of the system. A set of rules and formats, semantic and syntactic, that permits entities to exchange information. An attempt to get access to a system by posing to be an authorised person. An action or event that might prejudice security. According to information Technology Act, 2000, To investigate contraventions the controller of certifying authority shall exercise the like powers to that of Malicious software. None the person who is known as father of Internet This website is the biggest bookstore on the earth. When we talk of Data Transmission modes, then ATM stands for A sequence of bits or characters that identifies the destination and the source of a transmission. The means of communicating between networks A group of computers and other devices dispersed over a relatively limited area and connected by communication links that enable a device to interact with any other on the network. The term HTTP stands for A NIC is considered as A hub is a device that can connect
IN147 IN148 IN149 IN150
IN151 IN152 IN153 IN154 IN155 IN156 IN157 IN158 IN159 IN160 IN161 IN162 IN163 IN164 IN165
Which of the following is true concerning the function of a switch? What do routers connect? What does a router route? Software which prevents external access to a system is termed If four computers are connected to a hub and then to the internet, how many IP addresses are required for these 5 devices? Which of the following in an OSI layer When creating a network from just two PCs, what kind of cable would be used to connect them? An IP address is a To construct a simple LAN of 4 computers, you would connect them with ______connect them What happens to data that is ruined before reaching to receiver Bluetooth is Which is not one of the recognized IEEE sub layers? The most preferred number system to represent a IP address is A MAC address is of Protocol is
IN166
A ............... is a LAN-based computer with software that acts as a controlling device for controlling access to at least part, if not all, of a local area network and its available resources.
IN167 IN168 IN169 IN170 IN171 IN172 IN173 IN174 IN175 IN176 IN177 IN178 IN179 IN180 IN181 IN182 IN183 IN184 IN185 IN186
What is the biggest disadvantage of the Ring topology? The .............. of the network concerns how network devices are physically (or optically) interconnected. The principal topologies used with LANs are: What are the various types of bus architecture? What are the various types of ring architecture? In a ................., each workstation attaches to a common backplane via its own physical cable that terminates at the hub In a ............... , each work station is directly connected to a common communications channel Which one of the following is NOT a network topology? In a .............. , the cable system forms a loop with workstations attached at various intervals around the loop The Media Access Control (MAC) is a sub layer of the: What are the most common LAN technologies used in networking today? Modem speeds are measured in LAN speeds are measured in WAN speeds are Accessing the Internet from a typical home PC requires the use of To use the Internet, you The worldwide web server uses the following standard interface to act as the middleware: An NIC Accessing the Internet from a typical home PC requires the use of The most widely used network operating system on PC LANs is
IN187 IN188 IN189 IN190
JPEG and MPEG To use the Internet you A multiplexer is a form of An ISP
IN191 IN192 IN193 IN194 IN195
FTP is Telnet A firewall is A proxy server is A search engine is
IN196 IN197 IN198 IN199
To look for information about interest areas on the internet, the user should use a An ISP FTP is Telnet
IN200
Which of the following is a true statement about the OSI model layers?
IN201 IN202 IN203 IN204 IN205 IN206 IN207 IN208 IN209 IN210 IN211 IN212 IN213
Which of the following is NOT true about the Internet? The traditional intent and impact of this common type of attack is to prevent or impair the legitimate use of network resources. A firewall is Which of the following is NOT an example of a DoS attack that is popular among hackers? A ____________ attack is when a hacker sends a continuous flow of packets to a system. One defense option on a large network is to configure a ____________ to disallow any external traffic. A proxy server is Which of the following would be performed on a network server and not normally on individual workstations? What can be said about the safety of the Internet? To secure communication network against wire-tapping the most effective control is One way that a virus CANNOT spread throughout a network is: Which of the following is NOT a means of monitoring employee use of company technology? ____________ would be used by parents to monitor their children on their home system. The formal rules and parameters which are established to permit a microcomputer to communicate with the mainframe computer as though it was a terminal of the mainframe are called The two most common tools used to help with extracting information are: Which of the following would NOT be considered an example of cyber terrorism? Which of the following would be a form of cyber terrorism? Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life?
IN214 IN215 IN216 IN217 IN218
IN219 IN220 IN221 IN222 IN223
An organisation is upgrading its telecommunication lines. Which is the least important objective while upgradation A company posts a price list of its products on its website. The advantage to the customer is that the company can Which of the following is an easy-to-use service to get information on someone? Which of the following pieces of information would NOT be found online? Which of the following is the most common danger on the Internet?
IN224
The famous Nigerian Fraud scam offered victims the opportunity to: The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called _________________. Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called: Setting your privacy settings in Internet Explorer to medium is one way to block: What is the best means of protection from cyber stalking? Which of the following is not an appropriate control over telecommunications software Encryption techniques can be implemented in Hardware-Software Which protocol would be used to download a free anti-virus program from the Internet? The major advantage of the checksum program is when it Which of the following is a Web browser? A Web page is another name for ----------Domain names must contain a description of the type of organisation that the domain represents. A very common abbreviation used include: A standard language for creating and formatting Web documents is: The Web page format in which all elements of a Web page are saved as one file is called:
IN225 IN226 IN227 IN228 IN229 IN230 IN231 IN232 IN233 IN234
IN235 IN236 IN237
IN238
Which of the following requires an Internet connection? Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer how would he do this? Which of the following is used to update a Web query? You download from the internet, a screensaver, a ten-second sound file and a ten-second music video clip. You also add a hyperlink. Which of the media elements has the greatest effect on the file size? When saving a photograph for use on a website, which format should you choose?
IN239 IN240
IN241 IN242
IN243 IN244 IN245 IN246
While researching the Direct taxes assignment, you find a useful website. What is the most efficient way to access the site at a later time? A system that uses the Internet for business-to-business interaction is called a(n): A block of text automatically added to the end of an outgoing email is called _________ refers to the use of Internet technologies for placing telephone calls. Most client/server applications operate on a three-tiered architecture consisting of which of the following layers? Which do you NOT need to connect to the Internet? What does FTP stand for? What is the purpose of DNS? Which of the following is NOT a properly formatted IP address? Which of the following is a properly formatted email address? The Internet is controlled by whom? What does IRC stand for? If you do not pick up your email for a week...? What does HTML stand for?
IN247 IN248 IN249 IN250 IN251 IN252 IN253 IN254 IN255 IN256
IN257
What is a disadvantage of joining a mailing list?
op1 MS Internet Explorer and Mosaic text hyperlink in random order first .bmp and .gif Service, hostname and directory path
op3 MS Internet Explorer and Netscape Navigator and Mosaic Netscape Navigator data from a database symbols hypertext in sequential order start .bmp and .jpeg service,hostname,port,director y-path hotword in user-defined order home .gif and .jpeg service,port and directory path mailing lists,mail server robots and gateways to other services <hr size=n> classified general instructions Browser intranet wan packets CARN newsgroups and search engines application servers,proxy servers and web servers bulletin broadcasting system very small windows stocks PINE built-in www.encybrit.com FTP intermediate network physical layer ftp service ARCHIE unlimited restore locator scheme command line sears browser search for database wincim or maccim cyberspace
op2
mail servers,mail clients and mail vendors,mail identification alternate services and password <center> communication generated information Server arpanet LAN data CERN yahoo and infoseek news groups,yahoo and infoseek bulletin board system small windows socks Mosaic buffer www.ency.in URL internal network application layer finger service FTP uniform research locator host computer message Delphi net browser CompuServe internet dialer gophering <font size=n> common gateway interface Client the net peer-to-peer connectivity parcel ECRN mailto and files bulletin boards,mails call and wireless system business broadcasting system large windows sockets Yahoo cache www.eb.com DNS network of network transport layer ping service TELNET uniform resource locator name of the resource scheme Microsoft web read the Usenet news spy mosaic gopherspace
Alta vista finger server list no middle hotlist
open text ftp server directories maximum of five lower directory
excite web server image list one top index menu search,item search lycos lynx Lycos IBM ftp Hyper text transfer protocol uucp telnet transfer communication protocol/internet protocol three web servers the internet access site higher type transfer protocol uniform resource label frantically asked question IP,UDP request world search for information and research council mosaic,gopher interface hotwords verification on network integration and communication university of California net dns telnet and ftp wais,winsocks winsock
directory search,index search index search,menu search infoseek excite netshark lynx Microsoft Usenet Higher text transfer protocol iccp yahoo transfer control protocol/internet one ftp servers the internet adapter browser hotlink text transfer protocol universal resource locator frequent asked query SLIP,PPP connection wide search for information and research lynx,minx world wide web server glossary very easy and rodent oriented net wide index to computerized archives university of berkeley,berkeley freenet protocols cello mosaic internet finger service Hyper text transmission port ftp ftp transmission control protocol/internet protocol two domain name servers the internet administration protocol hyper text transfer protocol uniform resource locator frequently asked question TCP,IP response windows sockets internets relay chat netscape,ie world wide web client index very organised network integration and communication application university of cleveland,cleveland freenet IP address
search engines,directories ftp and finger allsrc,winsocks wais,allsrc allsrc waisman
hyper transfer markup higher text medium language language hot links hyper text images graphics,videos,audio first page global network news yahoo service email and net conference newsgroup Lycos catalog apple link computer related abbreviations and acronym encyclopedia Britannica search engines Graphical interpreter formatting Joint Pictures Expert Group mails yahoo,infoseek,altavista information BACKGROUND Communication gateway interface Network Current web page Browser/user Unknown resonance language text only SQL alphalanguage palm is not eatable SGML Processor web sites Internet equipment training faculty scripting,parsing and compiling applets programms,images,text home page global networks navigator electronic mail Netscape page starter site,netscape page wizard telnet point review bitnet biographical information on-line reference works web directories
hyper text markup language books marks animation animation,scripts,executables welcome page grand network news search engines yahoo and altavista ftp all the above Delphi bookstores more information database
Graphical interchange Format Graphical interface format Jumbled pictures expert graph documents netscape,ie,lynx web pages COLOR Common graphical Interface Interface Browser Server Uniform resource locator image only PLSQL betalanguage palm is not elm SGML Preprocessor images International Engineering trainers and faculty news,cooking and fine arts Joint pictures expert graph net eudora,netscape and pine network connections FCOLOR Communication graphical interface Communication Client Web United relay limited text or image SGML metalanguage pancake is not edible SGML Parser applets Internet Engineering Task Force email,file retrived,internet tools
nt,windows95,ie,winzip dnet defensive administrative rank administration network start milnet,smaller arpanet education,research Higher text manipulation language united states and UK server client network card detailed transaction explanation application layer point to point network and broadcast channel network file access PAN,NAN,AAN VAN LAN analog Data type definition Moralize/demoralize Mapping Satellite link and digital signals Standard long internet protocol Prime prolonged protocol storing data on a disk drive
mosaic,gopher,eudora,trumpn communicator,ie,lynx,winsock et ARPANET arpanet dedicated and registered projects administration begin mailnet,inet music and dance Hotlink text markup language england,norway client stand-alone network topology data terminal equipment physical layer packet switching,store and forward network anonymous ftp KAN,RAN,VAN MAN MAN digital Define type of data Modulation/demodulation Modulation Dedicated access and dial up access Stream line internet protocol Point to point protocol sending information to a host computer defensive advanced research projects administration net first intranet,extranet cooking and dining Hyper transfer meta language united states & Russia network servers network redirectors data target equipment network layer smart network and dumb network file transfer LAN,WAN,MAN TAN WAN non-digital Document type definition Manipulate/demanipulate Manipulation Cable and wires Serial line protocol Pillar to pillar protocol storing data on the hard drive
Bandwidth Find
Speed Save
Size Browse
Photography
Digital Signature
Cryptography
Key User-id Penetration Acts Spoofing Loss
Lock Password Retrieval Regulations Imposting Threat
Hash Function Name Cryptography Address Unauthorising Exposure
Sales - tax authorities Utility Tim Berner Lee Etrade.com Automated Tailor Machine Acts Router
Income - tax authorities Pirated software Hoffman Amazon .com Any Time Money Regulations Gateway
Judge of a civil court Virus Charles Bubbage Dell .com Asynchronous Transmission mode Address Port
LAN hyper terminal tracing program National Informatics Center Only Computers
WAN hypertext tracing program Network Interface card Can not computers Combines connectivity of a hub with the traffic regulation of a bridge Two or more networks frames gateway Two Data-Link Layer Coaxial cable Logical address Hub It gets destroyed bit by bit. Wired Technology Data Link Layer ASCII 48 Bytes a list of rules for transferring data over a network
CAN hypertext transfer protocol New Information Card Only printers Switches data from incoming ports to outgoing ports. Bridges and Hubs Packets router Four Network Layer Fiber A memory address Router It continue on to target device with corrupt data Ultra violet technology Network Layer Octal 48 KB software that allows file copying
Concentrates connectivity Bridges and Repeaters. bits firewall One Physical Layer RG7U Physical address A cable Data return to the sender Wireless technology Physical Layer Binary 48 Bits software that facilitates connection to the internet
Novell PC
Client If one node goes down, it brings down the entire ring Topology Star Parallel Circular Bus Bus Bus Bus Transport Layer Ethernet, token ring, FDDI kbps Kbps measured in bytes per second a modem must use electronic mail uniform resource locator
There isn't one Physiology Bus Linear Parallel Ring Ring Star Ring Network Layer Ethernet, token ring, DecNET bps bps usually higher than LAN speeds CD-ROM drive must use the World Wide Web key gateway interface
Server If the hub goes down, it brings down all of the nodes on that section Both A and B Ring Both A and B Linear Star Star Linear Star Physical Layer Ethernet, DecNET, FDDI mbps Mbps depend on the transmission medium Windows 95 must have a LAN account common gateway interface interfaces a modem to a computer Windows package Windows NT
a Novell Interface Controller used to control a printer CD-ROM drive a modem Linux Novell Netware have to do with compression of graphics have to do with Web pages and video must use the World Wide must use electronic mail Web Printer modem provides access to the is a CPU register Internet
the Internet must have a LAN account bridge is a CPU functional unit
used to send email used to send email used to protect a computer room from fires and floods a backup server hardware
used to browse the Web uses wireless communication medium a form of virus an email server IR system for the Internet
is part of Netscape is part of Netscape a screen saver program a poor file server browser
scanner provides access to the Internet used to send email used to send email The layers cannot communicate with one another.
CD-ROM is a CPU register used to browse the Web uses telephone lines
clip-art file is a CPU functional unit is part of Netscape is part of Netscape Any layer can communicate only with the layer directly above or below it.
Any layer can communicate directly with any other layer.
It is one large network. Password cracking used to protect a computer room from fires and floods IP flood hack firewall a backup server Apply security patches
It is made up of many networks connected into transmission lines It works the same way as a called backbones. local network. System intrusion a form of virus Flood a Web server with requests packet router an email server Denial of Service a screen saver program Virus that initiates a ping flood flood switch a poor file server Backup data on a daily basis Only large name-recognizable sites are safe. Use of logical access methods by attaching itself to a document. Web traffic A worm
Update virus definitions There are safe and unsafe All sites are safe and reliable. sites. Use of identifiers by attaching to an e-mail. Phone A Trojan horse Use of passwords through an FTP port. E-mail Adware
Modems cookies and Trojan horses. An attack on a system for personal gain Economic damage Crashing the stock market, as in the 1930s
Protocols Trojan horses and key loggers. An attack with the purpose of gaining publicity Disruption in communication Shutdown of military security systems
Multiplexors cookies and key loggers. Giving out disinformation Disruption in supply lines Contaminating water systems
To carry more network capacity set its prices very high People Search Name of your bank Virus
To improve system response To improve network services time limit access to computer owners stop its competitors seeing only their prices Yahoo People Search Date of birth Fraud USA People Search Personal assets Adware
buy stocks.
invest without risk.
purchase off-shore property.
Shill bidding Internet stalking. pop-ups. Use a fake e-mail address. Encryption I only irc Adds more bytes to programs HTML Web query.
Phishing cyber stalking. cookies. Never use your real identity. Physical Security controls II only ftp Verifies integrity of files Internet Explorer HTML document.
Siphoning virtual stalking. spam. Use a proxy server. Message sequence number checking Both I & II www Increases boot up time Microsoft Excel round trip HTML document.
.com is used for company round trip HTML. XML. using Internet Explorer to view a Web page that is stored on the hard drive on your computer
.co in used for company
.con is used for companies
the World Wide Web Consortium HTML. HTML. DHTML. clicking a hyperlink that references a document that is updating the values that are stored in the floppy drive on obtained through a Web query your computer
Click on the Back arrow until Click on „Go to‟ or „Search‟ in the Go to the History page and the desired site is found browser look for the site the Insert Hyperlink command the Update command the Refresh command
Hyperlink BMP
Screensaver GIF
Sound JPEG
Save it to a floppy disk. extranet. an attachment. VoIP Desktop client, application, and database. Modem File Transfer Program So computers can be referenced by a name 193.1.2.3
Write it down on a piece of paper. intranet. a signature. IPT Desktop client, software, and hardware. CD-ROM File Transmission Protocol So IP addresses can be shorter 45.1.1.1
Add it to ‘Favourites’ or ‘Bookmarks’. privileged network. a footer. IPP Desktop server, application, and database. Telephone line File Transfer Protocol So email is delivered faster 143.215.12.19 paul.domain.uk No-one Internet Remote Conversations A letter will be sent to you in the post Hyper Text Mark-up Language
paul .trigg @ domain. org. uk
[email protected] The US government Scientists in Switzerland International Relay of Characters It will be waiting for you to collect it It will be deleted Hyperlink Text Marking Hyper Textual Mark-up Lingo Language Receiving messages automatically from anyone in People discussing a topic of the group interest globally Internet Relay Chat
High volumes of email
op4 None of the above video hotlink none of the above none of the above .wmf and .bmp service,hostname and port
ans C C B B C C B
none of the above <l1 type=shape> none of the above User none of the above none of the above none of the above NET none of the above none of the above none of the above none of the above none of the above Lynx none of the above none of the above none of the above none of the above session layer none of the above none of the above none of the above none of the above none of the above general electric editor none of the above none of the above none of the above
C D B A B B A A B B A B B A B B B B D A C B C C C B C C C
none of the above none of the above none of the above many middle and lower glossary item search,index search all the above all the above navigator gold 2.0 CompuServe telnet Hyper text transfer port none of the above none of the above none of the above none of the above none of the above none of the above organization none of the above name of the above none of the above none of the above close none of the above none of the above none of the above none of the above
B A C B D C C D C C D D C C C B C B A B B B B A A B B B B
none of the above none of the above none of the above none of the above none of the above none of the above
A B A A B B
none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above archive none of the above fidonet none the above galenet channel Graphical Interface format Joint pictures experimental group browsers none of the above mails FONTCOLOR Common Gateway Interface Connection None of the above Channel None of the above neither text nor image CGI none of the above none of the above SGML Composer documents None of the above none of the above
C B B A B B B B D D A D A B B A C C B B D B B A B C C C B C A C C
all of the above none of the above
B B
none of the above none of the above none of the above none of the above Hyper text markup Language none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of the above none of t he above none of the above none of the above Document type data none of the above none of the above none of the above none of the above none of the above receiving information from a host computer
C B A A D B C C B B B B B C B C B C B B B C B B
Channel Retrieve
A C
Message Digest
C
Formula Address Password Cracker Protocols Approving Hacking
A B A D A B
Police officer of IPS rank. Cracker Howard Aiken Msn .com None of above Protocols Pin
B C A B C C B
PAN hypertext tracing protocol None of the above None of the above
A C B D
All of Above Hubs and nodes None of the above virus checker None of the above All of the above Twisted pair None of the above None of the above None of the above None of the above All of the above None of the above 48 MB a gateway calling program for internet bridging
B B C A C D B B B B A D A A B
Network PC If the hub goes down, it brings down all of the nodes on all of the rings None of the above All of above None Both A and B Mesh Mesh Ring Mesh Data Link Layer Ethernet, token ring, ARCnet mips Mips limited by modem speeds Netscape All of the above application protocol interface connects a computer to a network Netscape None of the above
C
B B D A B C B C A D B B C C B A C D B C
none of the previous use appropriate communications software none of the previous make of processor is a protocol for the transfer of files between computers None of the above none of the previous none none of the previous
A A D A
D D D D C
search engine make of processor is a protocol for the transfer of files between computers is a protocol that allows for remote login
D A D D
Any layer can communicate only with the layer above it.
C
Individual computers can connect to it using an ISP. Port sniffing none of the previous UDP flood traffic hub none of the above Limit logging on access ActiveX-enabled sites are safe. Use of encryption methods by scanning the computer for a connection. Application updates Spyware
A C D A C B D C B D B D D
LAN key loggers and worms. Changing the content of a Web page All of the above are correct. Shutdown of nuclear plant safety systems
B C D D D
To obtain an accurate inventory of network related equipment and parts and network nodes update its prices as soon as they are changed Lycos Search Criminal records Spyware make large amounts of money by parking funds in their bank account.
D D B A B
D
Hoaxing Web stalking. viruses. Use anti-spyware software. Logical access controls Neither I or II telnet Misleads a program recompilation both HTML and Internet Explorer Web browser.
B B B B B C C B B B
None of the above one way HTML. MHTML
A C D
viewing an Excel worksheet that you have saved as a Web page. Go to the Bookmarks or Favorites page the External Data command
B
C A
Video TIFF
C C
Cut and paste it to a word processor document. network topology an encryption. PoIP Desktop server, software, and hardware. None of the above None of the above None of the above None of the above None of the above None of the above None of the above None of the above None of the above
C A B A
A B B A D B C A A C
None of the above
C
q_id EX1 EX2 EX3 EX4 EX5 EX6 EX7 EX8 EX9 EX10 EX11 EX12 EX13 EX14 EX15 EX16 EX17 EX18 EX19 EX20 EX21 EX22 EX23 EX24 EX25 EX26 EX27 EX28 EX29 EX30 EX31 EX32 EX33
q_desc The wizard that is used to import text files is_________________ The alphabet indicating the column followed by the row number is known an__________ Which of the following files could not be opened in excel _______________ In excel, the dates that are stored as sequential numbers known as ________________The command to display the current date in a cell is _________________ In excel, absolute references are represented by a ________ before the column and row addresses The ________ can be used to select the function and assemble the arguments correctly Specific parts of information required by functions to perform certain tasks are called as___________ Which of the following do not belong to the formula category in excel environment__________ The function that in used to join cell values together in a single cell ________ The function that is used to count all the values that meet specific criteria _________ The wizard that is used to create and edit charts _______________ The function that is used to calculate the payment for specific loan terms ____________ The function that is used to add together all values that meet specific criteria is known as ____________ The __________ option present in the file menu options is used to specify major facts of the page to be printed The command that is used to apply a format automatically __________ The ____________ makes the information in a worksheet meaningful and easy to understand A particular part of a work sheet can be printed by setting the _________ The process of finding or selecting information is known as ____________ The option that is used to cancel the filter process for a specific column and display all the records is ________ There are _________ types of data tables The tables that allows the user to change or rearrange the data, summarize the data and evaluate the data using changing points of view is known as The wizard that is used to suggest hints for doing a task In a chart Y-axis is known as_________ In a chart X-axis is known as_______________ _________ is a set of tables that describe each of the data series ________ is used to differentiate one data series from another The chart that contains only one data series is _________ The chart that holds the column chart is _________ The chart that display two or more data series on a surface is _________ The chart that is used to display discrete data _________ are not allowed in a macro name Which of the following tool cannot be used to view the excel web page_______
EX34 EX35 EX36 EX37 EX38 EX39 EX40
The wizard that used to build an interactive table from data existing on sheets The chart that is used for displaying stock market information In excel, the subtotal command also generates grand total after the last group subtotal_________ In advanced filter , the criteria occupying multiple columns but more than one row, is considered as an ________ criteria. The stacked bar graphs can be represented in __________ A pie chart can represent only one data series at a time The ______ generates a summarized report in tabular form in an interactive manner
EX41
EX42
EX43 EX44 EX45 EX46 EX47 EX48 EX49 EX50 EX51
Which one of the following statements related to stock chart is NOT TRUE ? The state government needs to finalize a five years plan to implement 100% literacy in the state. Which one of the following will be the best tool that should be used to work out the plan ? Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. Which one of the following will be the tool that will help the team ? Which one of the following will be the tool that provides a way to view and compare the results of all the different variations together on the worksheet ? A ___________ is an excel file where the user stores his data Spreadsheets are useful for _______________ Which one of the following is NOT the component of the pivot table ? Excel allows upto ______ levels of sorting Filtering rearranges a list to display the required records The stacked bar graphs can be represented in _____________ The ______ generates a summarised report in tabular form in an interactive manner
EX52
EX53
EX54 EX55 EX56
Which one of the following statements related to stacked bar chart is NOT TRUE ? The state government needs to finalize a five years plan to implement 100% literacy in the state. Which one of the following will be the best tool that should be used to work out the plan ? Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. Which one of the following will be the tool that will help the team ? Which following function is used in subtotal option ?______________ A workbook consists of many ________
EX57 EX58
Which two of the following statements related to pivot table are TRUE ? Which one of the following is NOT a What-if analysis tool ?
EX59 EX60 EX61 EX62 EX63
The _________ wizard separates contents in a cell into different cells A spreadsheet is a grid of rows and columns and is called as a ________ Pick out the window that is not a form of excel ___________ On an Excel sheet the active cell is indicated by… Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of cells A6, A7, and A8 are _____.
EX64 EX65
If a cell shows ####### , it means that _____. Which is not an advantage of using computerized spreadsheets? The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. The use inputs different weights or amounts of exercise to determine the related physical fitness. This "What if" program is most likely which of the followin The difference between the highest and the lowest values. Spreadsheets can be used for...
EX66 EX67 EX68
EX69 EX70 EX71 EX72 EX73 EX74 EX75 EX76 EX77
To select a column the easiest method is to … If you press _____, the cell accepts your typing as its contents. The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as All of the following are considered constants EXCEPT: Which of the following may NOT be included in a formula? Which of the following is NOT a valid mathematical operator in Excel? Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first? Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant? How can you tell which cell in a worksheet is the active cell?
EX78
How can you change the active cell?
EX79
Which of the following would you use to change the font size of a cell in Excel?
EX80 EX81 EX82 EX83
The command that will save the current workbook with a different file type is: The command that will print an Excel workbook is found on the ____________ menu. In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the date and time a file was last modified. Which of the following commands will automatically adjust cell references in formulas?
EX84 EX85 EX86 EX87 EX88 EX89 EX90 EX91 EX92 EX93 EX94 EX95 EX96
Which of the following commands will remove cells, rows, or columns from a worksheet? Which of the following options is NOT controlled through the Page Setup command? Which command enables you to change the margins for a printed worksheet? All commands are carried out on a rectangular groups of cells known as a: Which of the following is a valid cell range? In a copy operation, the cell(s) you are copying from is called the: In a copy operation, the cell(s) you are copying to is called the: Which of the following commands is needed to duplicate the contents of a cell in another? A cell reference that does not change during a copy operation is known as Which of the following is considered an absolute cell reference? Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? Which of the following commands is needed to transfer the contents of one cell range to another?
EX97 EX98
The F4 key is used to: Which of the following quickly copies the formatting of a selected cell to other cells?
EX99
Which of the following will insert a hyperlink into an Excel worksheet?
EX100
Conditional formatting applies formatting to a cell based on:
EX101
EX102
If you enter a date into a cell, Excel stores the date as: You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened that worksheet again on August 31. What will be displayed in cell E17 on August 31?
EX103 EX104
The number of days between two cells containing dates can be calculated by: The function key that is used to quickly edit the contents of a cell is:
EX105 EX106 EX107
What will be stored in a cell if 3/4 is entered in it? A user‟s response to the InputBox function can be stored in: The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is _____. The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test. To find the student with the highest mark, which of the following functions should be used?
EX108
EX109
Which chart type best shows proportions of a whole?
EX110 EX111
EX112 EX113 EX114 EX115
Which of the following is TRUE regarding chart types? To select several cells or ranges that are not touching each other, you would _____ while selecting. Your Institute teachers have set an assignment on „Studies‟. You are required to use a spreadsheet to record all that you study on each day for four weeks. You decide to show each week‟s data with an accompanying graph. What is the best way of doing this What would be the best method to quickly copy the formula from the active cell to each cell below it? To arrange rows in alphabetical order based on column A, you need to use the command _____. What can you NOT do with a spreadsheet?
EX116 EX117 EX118 EX119 EX120 EX121
To print just part of a sheet, you would select what you want to print and _____ . Spreadsheets can be used for... The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is _____. Which of the functions is not valid for performing addition The default orientation for the printed page is _____. Which is not a valid cell address?
op1 text import wizard cell reference text files serial values =today() dollar sign AutoSum variables text concatenate countif pivot table wizard sumif average page setup autoformat bordering page setup filtering all option 1 data table pivot table wizard series or rank series or rank series or rank series or rank column chart column chart column chart column chart spaces excel97
op2 convert text to columns wizard row reference Lotus 1-2-3 domain values =date() ' = ' sign AutoFill arguments logical pmt vlookup chart wizard pmt sum print area AutoFill formatting print area searching blanks 2 filtered table chart wizard category category category category bar chart bar chart bar chart bar chart wild card characters internet explorer
op3 tip wizard column reference quattropro or xbase files range values =currentdate() # sign function wizard parameters numeric merge pmt convert text to columns wizard countif sumif print none of the above shading print sorting all blanks 3 index table convert text to columns wizard legend legend legend legend pie chart pie chart pie chart pie chart symbols Netscape
op4 function wizard none of the above class files reference values none of the above none of the above none of the above none of the above Boolean none of the above count tip wizard none of the above countif none of the above
none of the above print preview none of the above none 4 pivot table tip wizard data marker data marker data marker data marker surface chart surface chart surface chart surface chart none of the above word 2000
pivot table wizard line chart true and 3-dimensions true Data table
chart wizard bar chart false or 4-dimensions false Pivot table
convert text to columns wizard stock chart
tip wizard pie chart
Multi-dimensions
It is often used to display It is also used for indicating It is also called as highshare market prices over fluctuations in temperature low-close chart changes It shows trends over time a period of time
Pivot table
Scenario manager
Solver
Data table.
Goal seek Goal seek Workbook Performing calculations. Column field two true 3-dimensions Data table
Scenario manager Pivot table Worksheet Performing database operations Row field. three false 4-dimensions
Pivot table Solver Spreadsheet Performing text formatting. Source table name. N Multi-dimensions
Data table. Data table. none of the above All of the above Pivot table item.
It displays the data series one on top of the other.
Pivot table It is useful when several components are changing and the user is interested in the sum of the It can be represented in 3dimensions components.
Pivot table.
Scenario manager
Solver
Data table
Goal seek Count. databases It is a tool for summarizing and analyzing the data records in an interactive manner. Goal seek.
Scenario manager Standard deviation records It is a tool that provides a way to view and compare the results of all the different variations together on the worksheet Scenario manager
Pivot table SumIf tables
Data table worksheets
It summarizes the data by using analytical functions. solver Pivot table
text import wizard worksheet application window A dark wide border 8,16,32
convert text to columns wizard workbook document window A dotted border 2,4,2
tip wizard tables modal window No border 2,2,2
function wizard database A blinking border 6,8,10
your formula has a syntax error ability to generate tables
the row is too short to show the column is too narrow to show all the the number at the current font size digits of the number flexibility of moving speed of calculation entries
either b or c cost of initial set-up
word processing Range Producing graphs
graphical Address Writing letters drag from the top cell in the double-click any cell in column to the last cell in the the column column CTRL + ENTER ENTER array. 100 Cell references ^ B5*B6 function. (201)555-1212. Functions / C3/D4
database Gap Drawing pictures click the column heading TAB constant. #VALUE! Numeric constants * D4^2 SUM(H9:H11) It is displayed in reverse video. By either clicking in a different cell or using the arrow keys to move to a different cell The Cell Format command on the Edit menu the Save As command on the File menu. View List Both Insert and Delete
spreadsheet Rows Document filing
click the column label INSERT formula. Tom McKenzie. Text constants \ It is impossible to determine. G7*SUM(H9:H11) The phrase “active cell” appears in the Status bar.
E12 6 It is surrounded by a It is blinking. heavy border.
By clicking in a different cell
By using the arrow keys to move to a different cell
By typing the reference of the cell you want to move to in the formula bar The Font Size command on the Tools menu. the File Type command on the File menu. Window Properties Clear
The Standard toolbar
The Formatting toolbar
the New command on the Save command on the the File menu. File menu. File Preview Insert Edit Details Delete
Clear Delete Orientation (portrait or landscape) Headers and footers Options worksheet. 6 copy range. paste range. The Duplicate command absolute B4 #DIV/0! #DIV/0! The Move command Page Setup range. D12, G25 destination range. destination range. The Copy command relative $B4 #DIV/0! #DIV/0! The Cut command
Both Clear and Delete Fonts View group. D12:G25 clipboard. clipboard. The Paste command mixed B$4 #DIV/0! #DIV/0! The Paste command
Remove Margins Edit cell group. D source range. source range. Both the Copy and Paste commands constant $B$4 #DIV/0! #DIV/0! Both the Cut and Paste commands
copy and paste cells. the Fill Handle Select the Insert Hyperlink command from the File menu.
edit cells. the Format Painter Click the Insert Hyperlink button on the Standard toolbar.
cycle through absolute, relative, and mixed cell cycle through open applications. references. the Formatting toolbar Right-click a cell and click the Edit Hyperlink command. whether the cell has an absolute or a relative cell reference. Conditional formatting Double-click a cell and click the Insert Hyperlink command.
whether the cell has a formula or a value in it. the cell address. text with a two-digit year.
text with a four-digit year.
an integer.
the value in the cell text with either a two-digit or four-digit year, depending on the format. It is impossible to determine from the information given.
Jul-30 subtracting the earlier date from the later one. the F4 key.
Aug-31 adding the earlier date to the later one. the F2 key.
29/03/2008
subtracting the later date adding the later date to the from the earlier one. earlier one. the Esc key. the F1 key. March 4 of the current year a constant. B1;G10 Either 3/4 or .75, depending on the cell formatting either a cell on a worksheet or a variable. B1:G10
03-Apr a cell on a worksheet. B1-G10
0.75 a variable. B1.G10
AVERAGE
COUNT
MAX
SUM
Combination Once a bar chart is chosen it cannot be changed to a column chart. hold down the CTRL key
Line Once a column chart is chosen it cannot be changed to a bar chart. hold down the SHIFT key
Pie
Scatter
Once a line chart has been Once a pie chart has been chosen it cannot be chosen it can be changed changed to line chart. to a pie chart. hold down the ALT key hold down CTRL + SHIFT
Use tables Paste Tools | Sort Analyse data
Create four separate files Fill Down Data | Sort Calculate data
Transfer information to a database Use multiple sheets Fill Right Paste Special none of the choices None of the above select Print selection in the Print dialog and then print None of the above =(B2*(D4+C2) None of the above vertical None of the above
click the Print button producing graphs (D4+C2)*B2 0 portrait AD213
Edit | Data | Sort Create forms select Print selection on press the PRINT SCREEN Page Setup | Sheet key and then print writing letters drawing pictures D4+C2*B2 =A3SUM:B3SUM:C3SUM landscape ZA1 #VALUE! REF! whatever was last used A0
ans A A D D A A C B D A A B B C A A B B A A B D D A B C D C B D A A A
A C A B A A B
B
C
A D A D C B B A B
B
C
A A D
A D
B A C A D
C D
D A A
C A B C D D C B A
C
B
C A B C
B C B B C D B D A D B C D
C B
B
D
C
B
A B
C D D
C
C
D A
D B B C
D A C B A C
q_id EC1 EC2 EC3 EC4 EC5
q_desc The acronym for B2B is ___________ The _____________ model is the least intrusive model but requires active search on the part of the customer __________ is / are a form of advertisement where people relate their experience with products and services The _________ are software agents who communicate with the business merchants on behalf of the customers The Pre-purchase preparation phase includes _______________ for a set of products The _________ phase includes customer service and support to address customer complaints , product returns and products defects The ________ allow companies to bypass the need for costly printed catalogs A ________________ is a basket on the Net that is used to place the items that are being purchased
op1 Business-toBusiness Billboard Customer Endorsements Intermediaries Order Placement Post purchase interaction Billboard model of marketing Online Catalog EDI For Administration, Commerce and Transaction
EC6 EC7 EC8
EC9
EDIFACT is an abbreviation of ________
EC10
EC11
The __________ allows for protocol conversion and communicates with the bank using the banks private network or the Internet EDI In Ecommerce, data extraction, transforming the data into transmittable form, transmitting the data and downloading the data are the operations employed in _________ Compiler The _________ commerce assists in integrating the customers and suppliers of the company directly into the organisation E-cash means______________________ E-commerce is a tool that addresses the desire of firms to cut services cost and improving the quality of goods. It is a definition of e-commerce from _________ The small denomination digital tokens are called _________ The ____________ is the process of encoding information to prevent it from being read by unauthorized parties In EDI interface, the translation service receives _________ as incoming files from the communication service The EDI standardisation for International Trade and Commerce is introduced by __________ In EDI, the transmission files are composed of different sets of external format files which are grouped into multiple sets under the name of ________ The ________________ are pre-paid credit cards that include an embedded cards ________________ are another form of credit payment that lets customers use digital online cheques to pay Web merchants directly
EC12 EC13
Business-to-Business Emergency Cash Communication Perspective Microcash Decryption Internal Format File ANSI
EC14 EC15 EC16 EC17 EC18
EC19 EC20
batch files Smart Card
EC21
E-cash
EC22 EC23 EC24 EC25 EC26 EC27 EC28 EC29
In Active advertisement, there are two types of models. They are _____ and ________ The network based technology is/are ____________ Decryption is a process employed for scrambling of plain text for web based transactions Asymmetric cryptosystem is based on __________ and ____________ Value Added Network is an example of _________ The advertising strategies emerging in the on-line world are ____________ The _________ model use direct mail, spot television or cable television, in active based advertisement. The ________ is a form of mail that is not targeted to a specific audience The __________ model refers to information that is placed at a point where it will be noticed by customers in the course of other activities and does not require active search The most beneficial advantage of ERP system is What is the term that describes spying on one‟s business rivals to gain a competitive advantage?
Billboards and Junk Mail EDI True Login_Id and Password Global Network Active or push based advertising Broadcast E-mail
EC30 EC31 EC32
Catalog Error checking Competitive espionage
EC33
A list of competitor‟s What would you NOT be looking for when spying on a competitor? clients An online drugstore such as Drugstore.com is an example of_______ Which of the following is an example of unacceptable online „netiquette‟? single-user database application Replying promptly Removable drives that can be locked up at night provide adequate security when the confidentiality of data is the primary risk.
EC34 EC35
EC36
Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system?
op2
op3
op4
ans A B A A C
Business-to-Backend Backend-to-Business Business- to-Billboard On-line Catalog Billboard portals Service Purchase consummation Online catalog Shopping cart EDI For Administration, Consumer and Transport Endorsements Catalog .COM Search and discovery Pre-purchase preparation Endorsement model of marketing Billboard EDI For Administration, Commerce and Transport Broadcast Broadcast Domains None of the above
Search and discovery None of the above Pulling cart
A B B
None of the above
C
TCP/IP
EFT
Gateway
D
Interpreter Business-toConsumer Electronic Cash Business Process Perspective Micro Transactions SSL External Format File UN/EBCDIC
Assembler Consumer-toBusiness Euro Cash
EDI Customer-toCompany Endorsed Cash
D
B B
Service Perspective None of the above TT(Tiny token) E-token Encryption Transmission File UNESCO Subscription None of the above UN/EDIFACT
C A C C D
interchange sets Embedded cards
functions SET
functional groups None of the above
D A
Digital Cash
Smart Cards
Electronic cheques
D
Online Catalog and Billboards E-mail False Primary Key and Private Key
Online Catalog and Broadcast and Junk Customer Endorsements Mail EFT All of the above
C D B
Public Key and Password
Public Key and Private Key
D B D A D
Satellite Area Network None of the above Private Network Passive or pull-based Glow sign or hoarding advertising strategies All of the above Junk mail Bulk-mail Billboard Direct-mail Endorsements Junk mail
Endorsement Data Integration
Billboard
Broadcast
C B C
Low cost of operation Quality management
Corporate espionage Industrial espionage Economic espionage Contact numbers of the management Research data group multi-user database application Keeping messages short
A competitor‟s new project
B
e-commerce database application None of above Using all capital Including the Subject letters Encryption performed by a Message Security at the authentication in EDI physically secure transaction phase in systems performs the hardware device is EDI systems is not more secure than same function as necessary because segregation of duties encryption problems at that level performed by in other information will be identified by systems. the service provider. software.
C D
C
q_id DS1 DS2 DS3 DS4
q_desc ___________ means the result of applying to specific information certain specific technical processes. __________ is an algorithm which creates a digital representation or "fingerprint" in the form of a "hash result". __________ is of standard length which is usually much smaller than the message but nevertheless substantially unique to it. Digital Signature involves two processes. They are ___________ and __________.
DS5 DS6 DS7 DS8 DS9
The Costs of Digital Signature consists mainly of the following CA stands for ________________ A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the Private Key, Serial number of the digital certificate ______________ enable web servers to operate in a secure mode. ______________ are used by individuals when they exchange messages with other users or online services. ______________ are on-line databases of certificates and other information available for retrieval and use in verifying digital signatures.
DS10 DS11
DS12 DS13 DS14
Signing Writings serve the following general purposes______,_______,_______ and _______ The most widely accepted format for Digital Certificate is defined by the CCITT X.509 A certificate may prove to be unreliable, such as in situations where the subscriber misrepresents his identity to the certification authority
DS15 DS16
CRL stands for The prospective signer identified in the digital certificate holds the_________ and is called the ___________ A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named in the certificate is called the ____________ The Relying Party can use the ___________ listed in the certificate to verify that the digital signature was created with the corresponding _________ Digital Signatures are used for a variety of Electronic Transactions like ________________________ To associate with a key pair with a prospective signer, a Certification Authority issues Digital Certificate Digital Signatures, if properly implemented and utilized offer promising solutions to the problems of Imposters, Message Integrity, __________ and _____________
DS17
DS18 DS19 DS20
DS21
DS22 DS23 DS24
DS25 DS26
In, Digital Signature, _____________ perform the "ceremonial" function of alerting the signer to the fact that the signer is consummating a transaction with legal consequences A Digital Signature must have the following attributes ________________ and _____________ "Hash Function" is used in both creating and verifying Digital Signature ___________ provides assurance of the origin or delivery of data in order to protect the sender against false denial by the recipient that the data has been received, or to protect the recipient against false denial by the sender that the data was sent. ___________ serves the ceremonial and approval functions of a signature and establishes the sense of having legally consummated a transaction. ________ is a branch of applied mathematics concerns itself with transforming messages into seemingly unintelligible forms and back again. The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily termed as _________, and ____________ _______ is known only to the signer and is used to create the digital signature. _______ is ordinarily more widely known and is used by a relying party to verify the digital signature. ____________ is the art of protecting information by transforming it into an unreadable format. Which of the following activities would most likely detect computer-related fraud?
DS27 DS28 DS29 DS30 DS31
DS32
DS33
A digital signature is used primarily to determine that a message is:
DS34
What is a major disadvantage to using a private key to encrypt data? Which of the following risks can be minimized by requiring all employees accessing the information system to use passwords?
DS35
op1 Digital Sign Hash Function Hash Function Digital Signature creation Institutional Overhead and Subscriber Relying Party Cost Certification Authority True True Server Certificate
op2 Digital Certificate Digital Signature Hash Value Digital Signature Verification
op3 Digital Signature
op4 None of the above
ans C A D C
Digital Certificate Private Key Hash Result Both A and B Both B and A Either A or B None of the above None of the above
Subscriber Relying Party Institutional Cost Overhead Certificate Certified Authority Authority False False Developer Certificate Personal Digital Certificate
A A A B
None of the above
A
Server Certificate Private Certificate
Developer Certificate Repositories
Evidence, Ceremony, Approval Approval, Evidence True True False False
Personal Digital None of the above certificate none of the Public Key above Evidence, Ceremony, Approval, Efficiency and Efficiency and logistics, Evidence Logistics
C B
D A A
Certificate Revocation List Private Key, Subscriber
certificate Revocation Certificate Resource List Letter Private Key, Public key, Recipient Recipient
None Of The Above None Of The Above
A A
Recipient Party
Relying Party
Either A or B
Neither A nor B
B
Public Key E-mail Not False Closed System,Formal Legal requirements
Private Key Electronic Commerce Not True Formal Legal Requirements
Both A and B Electronic Fund Transfers
Both B and A All The Above
C D A
Open System
Formal Legal Requirements, Open System
D
Affirmative Act Signer Authentication Not True
Efficiency
Signer authentication
None of the above Neither A nor B
A C B
Document Authentication Both A and B Not False
Nonrepudiation Service Affirmative Act
Digital signature Efficiency
Digital certificate Private Key Either A or B
A
Neither A nor B. A None of the above Either A or B Either A or B Either A or B
Cryptography Private Key Private Key Private Key Decryption
Public Key Public Key Public Key Public Key Cipher
Private Key Both A and B Both A and B Both A and B
A C A B C
Using data encryption.
Unaltered in transmission.
Both sender and receiver must have the private key before this encryption method will work.
Collision.
Cryptography Encryption Conducting fraud- Reviewing the systems-access Performing validity awareness checks. training. log. Received by the intended Sent to the Not intercepted en route. recipient. correct address. The private key is used by the The private key sender for is used by the The private key cannot encryption but receiver for be broken into fragments not by the decryption but and distributed to the receiver for not by the sender receiver. decryption. for encryption. Failure of server Firewall duplicating Data entry errors. function. vulnerability.
D
A
A
D