QUESTIONS
TALLY
The ------ key can be used to select an existing
company from list of companies.
Import and Export of data between Tally and other
programs is possible only through ---------- Program.
F1
ALT+F1
Tally ODBC
Tally IMP
The re-order point is the inventory quantity that trigger
TRUE
a stock replishment activity.
A created company's detail can be modified through
keys
F3
A/An ------------- is the official notice that the firm sends
to its customers to advise then to the amount of money
that is owed.
Invoice
In tally,all masters have ________main options
In tally,to create a new column in balance sheet press
_______
In tally,the use of group behaves like a sub-ledger,
option is that we can summarize many ledger accounts
into one line statements
In tally, we can alter ledger details using either single
or multiple modes but not alble to delete a ledger from
multiple modes.
In tally,a group company is marked with an
______________
The systems that work together to order,receive, and
pay for replenishment of stock are --------------Tally allows to delete a ledger from --------- alteration
mode.
--------------------- is/are useful for management in the
decision making.
In tally,the group company must contain at least
_____________ members
To cancel a vourcher entry in Tally, short-cut key is ---------The accounting masters and inventory masters related
to
We press ------------- function key to display the agewise analysis of Bills Receivable or Bills Payable report
In Tally, we press ------------, to print report .
In Tally, Types of Accounts and Types of Vouchers
passed during the period, can be seen in ------------report.
In the Tally Software, the ------------ directory stores all
data entered by the user.
B
false
ALT+F3
Bill
Two
Three
Ctrl+C
Alt+C
TRUE
FALSE
TRUE
FALSE
*
$
Puchasing and
Accounts payable
Puchasing and
Receiving
Single
Cash Flow
Statements
Multiple
Fund Flow
Statements
Two
Three
Alt+D
Alt+X
Create Information
Alter Information
F4
Alt+P
F5
Ctrl+P
Tally Audit
Statistics
Bin
Data
The Ledger Accounts are unique in Financial
Accounting Packages
Customers can be permitted to enter their own data
into the firm‟s computer using the firm‟s wide area
network is an example of
In Tally, we can customize the Vouchers as per our
requirements
The number of steps in Accounts Compilation are
Each action/transaction of a firm is described by a ---------------.
Tally is based on mercantile accounting system
True
False
Enterprise Data
Interchange
Enterprise Data Information
TRUE
2
FALSE
3
data element
FALSE
Display stock
valuation method
data record
TRUE
Ledgers
Personal
Manual
Balance Sheet
Groups
Nominal
Automatic
Profit & Loss
Journal
Stock Journal
A --------- purchase orders data flow is directed to the
purchasing system for use in closing out the
outstanding purchase orders in the receiving system
diagram.
Filled
Receipt
Tally provides at least --------- predefined voucher
formats
11
16
The value of the inventory is included in a ledger
accounts as an asset on the balance sheet
FALSE
TRUE
Ctrl + N is used to ----------------------- in Tally classify the accounts under different
heads so that summarised information is possible.
Revenue Account also known as -------------- Account
Method of Voucher Numbering is/are
Accounts Receivable are displayed in
To assemble a product from different items -------------entry is used
Open Calculator
" The buyers can follow up with the suppliers to
management by
determine the reasons " is an example of ----------------- objective
From voucher entry mode , if we press __________
then we get payment voucher in tally
F4
management by
exception
Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify
given to the merged accounts member companies of
the group.
A ----------- is a primary document for recording all
financial transactions.
The field can have a value between
________________ in FA Package.
The _______ file maintains data that describes the
supplier past transaction with the firm in terms of
material quality in AIS
Main Location
Primary
True
False
Ledgers
Reports
0 to 9
1 to 100
Supplier
Suspense
F5
It is necessary to manipulate data to transform it into --------------In tally, to change the date of the voucher press
______
Tally can maintain budgets on ---------------The value of the inventory is included as an asset on
the balance sheet
In ratio analysis report of Tally FA packagewe we
press ________________ function key to the display
of bills receivable , bills payables report
The accounts payable system is responsible for paying
the suppliers for the ----------------What is the default financial year in Tally6.3
_________________
Tally encrypts and stores TALLY DATA at the data
directory
The Profit & Loss statement can be displayed in --------------- format(s).
Default ledger accounts in tally are ______
Default 'godown' name in tally is ____________
'Tally vault' is a _________________
To create a sales voucher in tally , you have to press
_______
A Group Company is ------------------------- given to the
merged accounts of member companies of the group.
In tally,"credit note" voucher type records entry for
________________
In tally you get currency symbol option from _______
menu
------------------ gives the balance for each day for the
voucher type has been selected.
For 'stock journal' entry we press ______________ in
tally
Tally provides the capability to the
administrator/auditor to track changes in the areas
is/are
In tally, types of users are _______________
Report
Output
F2
Net Transactions
F4
Closing Balance
True
False
F6 function key
Alt + f6 function key
Purchases
1-4-1996 to 31-31-4-1995 to 31-3-1996 1997
Sales
True
False
Horizontal
Vertical
Balance sheet & profit
& loss profit & loss
Profit & loss and trial
and trial balance
balance
Main location
Primary
Security mechanism Ledger a/c
F5
F7
a name
an identity
Sales return
Purchase return
Company creation
Stock items units
Trial Balance
Daybook
F7
Changes in
transactions or
vouchers
2
Alt + F7
By pressing -------- key, a list of inventory reports can
be displayed straightaway from the balace sheet report F9
Projected approximation of income or expenses is
called ______________ .
Balance sheet
"Administrator" type user is also called 'Auditor' of a
TRUE
company in Tally
Changes in Ledger
Masters
3
F10
Profit & loss a/c
FALSE
You will get company information , if you press
__________ from gateway of tally
A constituent(member) company can be a member of
more than one group.
Default stock category in tally is ______
To create a log of the import activity in a file
_____________ is located in the same directory as an
executable program in tally
In Tally,inventory valuation method option is available
from _______
Tally audit feature is available in a company
__________________
In tally, a group company can also be a
constituent(member) of another group company
Default number of groups in tally are ________
During voucher entry ------------- are used.
User designated as --------------- can view audit list.
F3
Ctrl+F3
TRUE
Main location
FALSE
Primary
Tally.imp
Tally.ini
Stock summary
Stock journal
By pressing F11
function key
During the creation
of a company
TRUE
128
Ledger Accounts
Administrator
FALSE
228
Groups
Owner
One company to
another company
created withon Tally
Package
Other programs - a
spreadsheet or a
database file.
Tally supports Importing of data from ---------------In an accounting information system, which of the
following types of computer files most likely would be a Inventory
subsidiary.
master file?
Cash disbursements.
Which of the following is an advantage of a computer- Does not require as
based system for transaction processing over a
stringent a set of
manual system? A computer-based system:
internal controls.
The memory address register is used to store
Will produce a more
accurate set of
financial statements.
data that has been
data to be transferred transferred from
to memory
memory
FUNDAMENTALS OF COMPUTER
Inefficient usage of excess computer equipment can
be controlled by
System feasibility
Contingency Planning report
Which of the following is not the component of a CPU
NIC Card
A trailer label is used on a magnetic tape file, it is the
last record and summarises the file. The following is
an information not found in the trailer label
Hard copy is a term used to describe...?
What do the abbreviations VAB stand for
What control would prevent the accidental erasure of
customer information from a magnetic tape
Record Count
Writing on a hard
board
Voice activated
broadcasting
Validity check
VSAT
Identification
Number
Printed output
Voice answer back
Boundary protection
What are the individual dots which make up a picture
on the monitor screen called?
Header label normally include all the following except
the
A daisy wheel is a type of...?
Which approach or technique is a control usually
associated with microcomputers
An impact printer creates characters by using...?
The best security control in a microcomputer
environment is to
What would you NOT use with a flatbed plotter?
What do you need for an ink jet printer?
The greatest control exposure in a microcomputer
environment is the lack of
What do you need for an ink jet printer?
A laser printer does NOT use?
The amount of data that a disk may contain is known
as the disks...?
You can ________ protect a floppy disk.
Information on a hard disk is usually backed-up using
a...?
Coloured spots
Pixels
File Name
Printer
Identification number
Storage device
System Logs
Electrically charged
ink
Restrict physical
access
A pen
A cartridge
Physical Security
An ink pen
Use only
unremovable media
Paper
A drum
Centralised function
Separation of duties for PC acquisition
A cartridge
A drum
A print head
A laser beam
Volume
Read
Size
Write
Magnetic tape
Serial access
medium
PAN drive
Random access
medium
1.44MB
20 GB
Which storage device has the largest capacity in Mb?
A CD-ROM
A floppy disk
Which storage device cannot be erased?
Where should floppy disks be stored?
The contents of these chips are lost when the
computer is switched off?
What are responsible for storing permanent data and
instructions?
Which parts of the computer perform arithmetic
calculations?
What are small high speed memory units used for
storing temporary results?
How many bits of information can each memory cell in
a computer chip hold?
A CD-ROM
By a sunny window
A floppy disk
By magnet objects
ROM chips
RAM chips
RAM chips
ROM chips
ALU
Registers
CPUs
Registers
0 bits
1 bit
What type of computer chips are said to be volatile?
RAM chips
Software can be divided into two areas:
Travel agents use this computer system when
reserving flights
Supercomputer
Magnetic tape is a...?
Hard disks can have a storage capacity in the region
of...?
ROM chips
Systems software
Network software and and application
software
security software
Personal computer
Which computers are used in the weather forecasting
industry?
Vacuum tube based electronic computers are...?
Which generation of computer was developed from
microchips?
Which generation of computer uses more than one
microprocessor?
Which generation of computer developed using
integrated circuits?
Which generation of computer developed using solid
state components?
Notebook computers
Supercomputers
First generation
Second generation
Second generation
First generation
Second generation
Third generation
Second generation
Third generation
Second generation
Third generation
DATABASES
Name three steps involved in developing an
information system
_______ is used for CAAT as database
Generalized audit software perform auditors to
undertake any past records and not concurrent
auditing
Generalized audit software is a file whose capabilities
for verifying processing is logic
Specification,
Programming,
Design, and Testing Design, and Testing
Oracle
ACL
True
False
True
False
CAAT's are computer program and data that auditor
uses as part of the audit procedures to process data if
audit significance contained in an entity information
True
system
CAAT do not contains package programs, purpose
written program, utility programs or system
management programs
yes
Embedded audit routines are sometimes built into an
entity's computer system to provide data for later user
true
by the auditor
SCARF involves embedding audit software modules
within an application system to provide continuous
monitoring
TRUE
false
Concurrent use auditors as the member of the system
TRUE
false
False
no
false
Regular cross system verification may minimize frauds true
Computer security is frequently associated with
true
confidentiality, integrity and authentication
Data reserve engineering process metadata to
document system and abstract business rules and
true
relationship
to determine the
audit objective
The first step for developing CAAT is_________
Using the open database connectivity feature in ACL is can bring the data
directly
______________
false
false
false
review and evaluate
the types of data
can bring the data
indirectly
Computer Assisted Audited Technique involves the
use of computers through "Black Box Approach"
White Box Approach necessary involves expert
knowledge on the part of Auditor
True
False
True
FALSE
change in the method
The transition from manual system to CIS environment of recording
use of accounting
bring dramatic changes including ________________ accounting transaction codes
documents driven
risk driven approach
Auditing with computer necessarily supports the
approach
CAAT involves an Auditors' appreciation of
__________
Widespread end use computing result in unlimited
errors creeping into system going to accept handling,
thereby increasing audit risks
For computerized auditing usage of sophisticated audit
software would be a necessity
hardware and
processing options,
software configuration file data structure
true
false
true
false
the source of data
Important knowledge needed to begin planning the use available to the audit source of data for
organization
of CAAT is _________
material planing
The move towards paperless EDI would eliminate
much of the traditional audit trail, radically changing the
true
nature of audit evidence
false
Computer operation controls are designed to provide
________________
the of by all
concerned
Systems development control, apart from others,
include authorization, approval, testing, implementation
and documentation of new systems software and
true
system software modification
A system could be _________
A system exhibits 'entropy'
Super computer are the largest and fastest and is very
suitable for commercial application including audit
work
Assembler language uses Mnemonic symbols
Operating systems are devised to optimize the
machine capabilities, the function
include_______________
General purpose software provides a framework for
highly complex scientific operation
In batch processing, transactions are processed one
after another
The use of computer assisted audit techniques is not
gaining popularity not only ________________
providing access to
computer to all
organization
personnel
false
natural/man-made
true
open/closed
false
true
true
false
false
scheduled jobs
manage hardware &
software resources
true
false
true
with audit
departments
false
with production
departments
On-line processing refers to grouping of transaction
and processing the same in one go from start to finish
Real time refers to the technique of updating files with
transaction data immediately after the occurrence of
the event to which it relates
In OLRT the CPU should process the capability of
program interruption
Time sharing system allow access to a CPU from
remote terminals
DSS is defined as a system that provides tools to
managers to assist them in solving structured
problems
DSS has the following components
_________________
Master files contains current records for identification
and summarizing
Transaction files contain relatively permanent records
take product profile, customer profile, employee profile
etc
Master file configuration includes ____________
______ is a file management software package that
lets users and programmers organize data into files
and then process those files
CAATS provide added value to the clients because
_______________
File volatility refers to the number of addition and
deletions to the file in a given period of time
File activity is the proportion of transaction file records
that are actually used and accessed in a given
processing run:
File interrogation refers to the _____ of information
from a file
One -to-one relationship means a single entity to a
single entity in a monogamous structure
RDBMS is structured to a series of 2 dimensional
tables
SADB stands for ____________
Controls are present over many aspects of the
computer system and its surrounding social
environment
In framed checking the data entry is checked against
an expected picture or format
Errors are correlated_________
Field check is exclusive to a field
true
false
true
false
true
false
true
false
true
false
databases
planning language
true
false
true
reference files
false
table files
filex
file-o-man
to have a complete
picture of a system
decentralized picture
of a system
true
false
true
false
back-ups
retrieval
true
false
true
seriously affected
database
false
subject area
database
true
false
true
at the year end
true
false
immediately
false
_________ law basically states that there is a specific
probability of the first digit of a no. being 1,2,3 etc
Check digit is a group of nos. added to a code for
determining the accuracy of other digits in the code
Hierarchical code means _________
The validation checks applied to a field depend on the
field's logical inter relationships with other fields in the
record
The contents of a field could determine _______ sign
for a ______ field
Batch is the process of ______ together _____ that
bear some type of relationship to one another
Hash totals means meaningless totals
With OLRT where interactive data entry is available,
the master file associated with a transaction may be
searched for confirming data
Benfish
Benford
true
false
blocks of nos. to the
primary attribute of
the the entity
consecutive nos. or
alphabets to entities
TRUE
false
valid, numeric
grouping,
transaction
true
invalid, alphabetic
true
false
Controls are required for authorization to ensure data
true
integrity and detect possible breaches in security
Data from client application are not stored in the
organization's database through auditables events and
function
true
All input records in a batch are normally of different
types
true
regrouping, events
false
false
false
incremental design
and enlarge activity
false
interactive data
extraction and
analysis
true
false
true
false
true
false
Internal tables are stored tables from which certain
values are extracted for further processing and storing true
false
IDEA stands for
_________________________________
A transaction file is sorted prior to the update of master
file
A sequence check on the transaction or master files by
an update program is not required
Whenever monetary transactions are processed
against master files, the update program should
maintain a correlation account to record such
transaction that does not have a matching master file
record
For small to medium sized systems, individual
modules are coded and individually tested and then
assembled to be tested as a whole-the testing strategy
is referred to as ___________________
e-brain
In systems testing, test involves_________________ bottom up tests
Recording transactions in a controlled manner may
amount to loss of stored data
yes
bouncing ball
top-down tests
no
read data on client's
Audit software is used by the auditor to _________
file
Core image comparison is a software used by the
auditor to compare _______ version of a program with
executables, master
a secure ________ copy
Database analyzer is a software which provides
detailed information concerning the operation of the
true
database
system analysis
software
SAS stands for ______________
Embedded code is a software used by the auditor to
examine backup data
true
Embedded code performs wide variety of audit task
Core image comparison is particularly useful where
only executable versions are distributed
Log analysis is a software used by auditor to detect
virus
On line testing techniques the auditor ______ data
either _______ or fictitious in order to see that a
specific program or sever edit test is doing its work
Mapping software is used by the auditor to list unused
program instructions
Mapping software has very objectives
Modeling is a variety of software which
________________
On line testing can be targeted for specific functions
carried out by programs
Program code analysis involves _____________
__________ is a software of CAAT
Snapshot is software which takes a picture of a file or
data or a transaction passing though the system
Base case system evaluation includes____________
While base testing forces on finding if there are any
defective execution policies in a program
provide information to
the audit
deleted, hard
false
system advanced
software
false
yes
no
true
false
true
false
manipulates, real
create, false
true
yes
false
no
can be very powerful
analytical tool
can enable the auditor
to execute provisions
on a number of
different bases
yes
no
provides detailed
information of
machine uses
IDEA
identifies program
code which may be
there for fraudulent
reason
ACL
true
fictitious data
applied against the
client program
false
comparison of source
version of a
programmed
TRUE
false
Black box testing seeks to determine whether
application output is what it is supposed to be
In integrated test facility approach the auditor should
ensure that the impact of test transaction is
subsequently eliminated from the computer files
Black box testing is _______ based and white box
testing is _______ based
Source code review means__________
true
false
true
specification,
program
identifying erroneous
code
false
In formula in flow hypothesis the auditor should expand
the extent of substantive tests to determine how the
defects may impact the attainment of the program
true
objectives
All material application oriented events that occur
within the boundary subsystem should be recorded in
true
the accounting audit trail
In examination of audit trail the following data
associated with an event may be ___________start and finish time
JCL means_________________
Audit should be periodically analyzed to detect any
control weakness of the system
Specializes audit program may be___________
Generalised audit software could be used by the
following in consistencies or significant fluctuations
false
false
authentication of
information support
job connectivity
job control language language
yes
no
In an accounting audit trail, intrusion detection system
might monitor the amount of processor time consumed
by the user to detect unusual deviation from the
amount processor time requested by the user in the
true
past
A sample size calculator program assists auditors in
determining RAND() function
true
Generalized audit software consists ___________
file, hardware
identifying ineffective
code
false
false
package computer
p[program for
performing a variety
of data processing
function
mathematical concept
prepared by the
auditor
TRUE
Generalized audit software function
file
include____________
access/organizations
In the file reorganization merging capabilities are
needed in data from separate file is to be combined on
a separate work file
TRUE
prepared by the entity
false
statistical/arithmetic
operation
false
Auditors cannot use generalised audit software to
extract the data needed for audit purpose
Auditors can combine functional capabilities of
generalized audit software to accomplish the task of
__________________
Which of the following is not the feature of GAPs
Which is the example of CAATs
In audit procedures, test data is
Which of the following is not the use of CAATs
Which of the following are called explicitly by another
procedure?
_________ data type is generally used for fields
assigned as primary keys in a table
MS access objects can be published in the web
In code-builder, got_focuse, click,dbl_click,enter are
examples of _______
_______can be used to automate certain actions in
response to events
In the macro sheet the macro is selected in the
_____field
To build complex expressions_____is used
The three list boxes present at the bottom of the
expression builder are called_____
________option is selected from the view menu to
create macros with conditions
_______report can be created with minimum user
input
true
false
examining the quality
of system process
Wide access to
various data base
ACL
A sample of
transactions
carrying analytical
review
Can extract and
analyse data
IDEA
A utility software
programme
Tests of details of
transactions
Analytical review
procedures
Macros
Action Procedures
integer
true
number
false
actions
events
report
form
macro
expression elements
calculator
code builder
action list
macro list
conditions
action
tabular
columnar
_______layout of a form displays one record at a time tabular
The table or query name on which we are going to
build our report is selected from the ____ dialogue box create report
columnar and
______and_____are the two types of auto reports
tabular
available
There are no wizards for creating a database in access
______option from the insert menu option is chosen to
add an embedded chart
In ms-access, while using SQL, references constraint
is used for creating _______
_______is used to create a mailing label
columnar
link report
stable and unstable
true
false
create fields
add chart
primary key
label wizard
alternate key
chart wizard
______header is present at the beginning of the report start header
group header
______is present at the bottom of each page in a
report
report footer
In SQL, having clause is used for _________
for ordering records
______field is added to the macro sheet when we
select grouping option from the view menu
condition
______can be used to create toolbars
VB Modules
_______query is used to add records from one or
more tables into an existing table
add
_______window is used to write VB code in access
application
report
Values for other tables, queries are maintained in look
true
up fields data type
RAD
Visual Basic language is a _____ tool
______ function is used to display a message box
SysCmd
Other ms-office applications can be accessed from msOLE
access using a concept called ________
object linking and
embedding
OLE stands for_____
The application that supplies data in OLE is called an
_________
OLE object
If any change made on the object from the client side
is reflected on the server then the object is said to be
linked
_____
_______is the file format that works on internet
exe
______ is used to convert any ms-access object into
html format
form wizard
_______ option in publish to web wizard produces a
page that is static in nature
static file
_______query is used to create or change database
append
objects in a current database
Currency fields express the amount in _________
_______is selected from the toolbar to add an OLE
object
To display an OLE object in the form of an icon ____
option is selected from insert object dialogue box
_______option from the file menu is selected to run
'publish to the web wizard'
_____page in an web application is used to navigate to
the rest of the pages in the application
______ is fired when an event is triggered is the
concept based on a Visual Basic language
Ms access is a ___________
A collection of data stored in different objects is known
as a _________
page footer
for updating records
group
reports
append
macro sheet
false
RAP
MsgBox
DDE
on line execution
OLE client
embedded
DLL
report wizard
static html
add
dollars
rupees
unbound object
bound object
display as icon
display
create html
new
startup
home
bullet
DBMS
command
RDBMS
data group
data collection
A blank database can be created using __________
new dialog box
new blank database
dialog box
Text type data can be of _____ characters in ACCESS 255
64000
______is a datatype that assigns values automatically
Tables cannot be imported from other databases
If two tables having same values for the fields are
joined it is called an ______
Duplication of records in a field won't be allowed if the
fields are declared a________
automatic number
true
AutoNumber
false
inner join
outer join
primary key
not null
Changes from a master table can be reflected on to
the child table by selecting _____option
To see more than one record at a time in a form we
use _______
In SQL, delete command is used to remove
_________
In MS-Access, filter excluding selection will display
only those record(s) which meet the criteria.
Properties of the fields are managed by _____ in
Dynaset
______queries allows us to view data in row by column
manner
The type of queries that can update or delete record(s)
in a table(s) are called __________
Joining tables without any matching values in the fields
is called ____________
Primary key uniquely identifies each record
Which of the following dialog box is/are used in the
creation of form ________
_______ query wizards are used to generate summary
calculations for a table
Properties of a form can be changed by selecting
______from view menu options
Forms that are included in other forms are called
______________
cascade delete
related records
cascade change
related records
columnar
tabular
table or tables
query or queries
true
false
property field
field property
crosstab queries
row/column queries
action queries
row/column queries
inner join
true
new form dialog box
self join
false
form create dialog
box
summary
sum
change properties
properties
included form
sub form
Record Navigation
Record Operations
In MS-Access, while using form design view, for
creating a command button for adding a new record,
we should select the _______ category from the
command button wizard
_______ form displays fields in a single horizontal row columnar form
The process of arranging the data in a meaningful
order is known as ___________
filtering
______ are used to select only some particular records
filter
from the table or any other database objects
tabular form
ordering
sorts
In MS-Access, user may specify criteria for filter in
form view using _________
filter by form
filter by selection
___wildcard character represents any single character
Records cannot be sorted by a primary key
A control without a data source is known as
___________
Set of related option buttons, check boxes and toggle
buttons is known as _____________
The collection of related data and objects is called a
____________
*
true
$
false
bound control
unbound control
button group
option group
database
form
Which of the following is control types ____________
In MS-Access, the function that gives the current date
is _____________
_____is a control that lists set of data
bound
unbound
CURRDATE()
text box
TODAY()
list box
______is a form that summarize large amount of data
______allows to create a filter by typing the value in a
data sheet
pivot table
columnar form
data sheet filter
filter by input
Wizards for toolbox controls are called a __________
The wild card representation for any 5 letter word that
starts with ram is ________________
Look up fields slow up data entry
button wizard
control wizard
ram*
true
ram??
false
____is an access object that displays un-editable data
_____option from the new object toolbar gives the
easiest way of generating a report
______ represents data in a pictorial format
Changes of one table can be carried over to another
related table
Hyperlinks are used to jump to any kind of information
or data from a file
The memo field can have text upto_____ characters in
length
In MS-Access, columnar layout can be used to view
multiple records in a form
In MS-Access, alter command may be used in adding
a primary key to a table
Update query is used to add records from one or more
tables to the end of an existing table
In ms-access, datasheet view is available in
___________
______are used to jump to any kind of information
from a datasheet or a form
Home page will always be present as a first page of an
application
report
form
autoreport
chart
report
label
true
false
true
false
60,000
255
true
false
true
false
true
false
table
query
table
form
true
false
Make table queries create a new table from the
records of another table
In ms-access, to protect a database file from illegal
access, we may set database password. The option of
setting database password is available in _______
menu
Foreign key is a field that uniquely identifies each
record and accept no null values
Data definition queries are used to create or change
database objects
The attributes of a composite key are known as
________
OLE object is a data type in access
Data displayed in forms cannot be edited
A sub form is used to display one to many relationship
between tables
We can switch from datasheet view to form view by
selecting view -> form view option
In MS-Access long integer is a datatype
In MS-Access, while designing a table for a particular
field, the Required parameter is set to yes. This
validates the field as _______
Sorting is applied to select only some particular
records
Filter by form can be created from a forms shortcut
menu
Advanced filter uses a filter similar to the query design
window to create a filter
? Wildcard character represents any number of
characters
_________ of the following is/are a type of chart
A bound control is tied to a underlying query or table
A calculated control uses expression as a source of
data
Text boxes cannot be bound controls
The default query invoked by ms-access is
A control can be bind to a record using row source
property
List box is a control that offers a list of choices
If a table is joined to itself it is called a
________________
A picture box combines the activities of both a text box
or a list box
Line is a tool box control
Text boxes can be part of a option group
_____ chart exists as a separate object
Filtering data is a way of arranging data in a meaning
full order
true
false
Insert
Records
true
false
true
false
alternate keys
true
true
composite keys
false
false
true
false
true
true
false
false
null
not null
true
false
true
false
true
false
true
pie
false
bar
true
false
true
true
update query
false
false
select query
true
true
false
false
inner join
outer join
true
true
true
freestanding
false
false
false
embedded
true
false
Wild card characters are used for sorting records
Pivot tables are used to navigate to the other tables in
a database
Reports are used to represent un-editable data
In MS -Access, the records in a table are sorted based
on _________
Relationship is an association between _________
Summary options dialog box is used to summarize
data
______ queries can be used to delete a group of
records that meet some specific records
Charts can convert numerical data in a easily
understandable format
Embedded charts exist separately
The chart which cannot exists as a separate entity are
_______________
From ms - access, if we want to view the records
stored in a table in ms - excel worksheet, we need to
Page header is present at the beginning of each
record
Detail section has a header and footer
A macro is performed only when the user initiates an
event
The macro is selected from the action field of a macro
sheet
A macro can be made to execute before the starting of
a database
In MS-Access. While appending records, the source
and the target table must have similar structure and
fields
We can add our own functions to the expression
elements list box of the expression builder
_______is the wildcard character which represents the
presence of any number of characters
Macros can be used to add a menu to a database
object
_____ header is a unique feature of reports
Chart can either be a form or a report
Group header will be present at the design view of a
report even if the report is not grouped
We can change from the design view to the form view
without being prompted for saving the changes made
Charts can be produced without the wizard
Macros can be used to create user defined error
messages
true
false
true
true
the first field of the
table
forms
false
false
the last field of the
table
reports
true
false
delete
insert
true
true
false
false
freestanding
embedded
use hyperlink
use import
true
true
false
false
true
false
true
false
true
false
true
false
true
false
&
#
true
page
true
false
detail
false
true
false
true
true
false
false
true
false
Between and Not Between is ______ type of operators relational
list
The default data type of VB is integer
true
false
Visual Basic is based on __________
_______is the name of the database object that
displays data and can be used to edit data
In access OLE objects cannot be linked
action language
structured query
language
report
true
form
false
_____ section is present for each record in the report group
A ________ sheet lists all the properties that pertain to
the form or the controls
data
record
property
Textboxes can also be an example of unbound control
In MS-Access, we may design command buttons for
navigating records
_______are forms that are included in other forms
_______ are used to represent our data in graphical
format
true
false
true
sub forms
false
child forms
graphs
chart
A field with a _______ uniquely identifies each record
Large amount of data can be summarized using
______ tables
_______ are employed to select only some particular
records from a database object
______ control need not have a data source
______ control combines the functionality of both a
text box and a drop down list
MS access is a DBMS
A form can be bind to a record source using _____
property of the form
______ forms displays field in single row
______ forms are usually used for tables with one to
many relationship
_______ control uses an expression as a source of
control
_______ control is tied to field
_______is the form that can be created with minimum
input from the user
______option from the tool menu is selected for
setting relationships between tables
number
primary key
pivot
create
filters
form
queries
bound
list box
true
combo box
false
form name
tabular form
control
chart form
sub forms
tabular form
calculated
calculated
bound
unbound
sub form
auto form
set relation
connect
______,______and_____are the buttons belonging to
the options group
_________allows us to create a filter from a field short
cut menu
________is a database object which displays data but
cannot be used to edit data
option, toggle and
command buttons
command button,
check and list boxes
filter by form
filter by report
form
report
What term applies to a collection of related records in
a database?
All of the following terms are related to computerized
databases except which one?
What is a database?
What does a record contain?
An RDBMS is a
Data Warehousing refers to
Unauthorised alteration of on-line records can be
prevented by employing
clipboard
file
search
sort
A way to analyse and
manipulate numerical A tool to produce high
information
quality documents
It contains all the
data about one
Information about
specific item
certain programs
remote DBMS
storing data offline at
a separate site
Key verification
relative DBMS
backing up data
regularly
Computer sequence
checks
What is a report?
A way to analyse and
manipulate numerical A tool to produce high
information
qualitydocuments
It contains all the
data about one
Information about
specific item
certain programs
Reports allow users
to extract
Reports provide a
information as hard very flexible way of
copy (printed
creating and editing
output)
documents
What is the best way to analyse and change data
Extracting and
analysing data
Spreadsheets make
data easy to analyse
What are some popular office orientated software
applications?
Compilers,
interpreters, editors
Network software,
backup systems
Which of the following constraints can be used to
enforce the uniqueness of rows in a table?
Which of the following commands is used to change
the structure of table?
DEFAULT and NOT
NULL constraints
FOREIGN KEY
constraints
CHANGE TABLE
MODIFY TABLE
An RDBMS is a
remote DBMS
storing data offline at
a separate site
relative DBMS
backing up data
regularly
What is a database?
What does a record contain?
Data Warehousing refers to
You are creating a client application that calls ActiveX
DLLs. Which of the following properties of the Err
object provides the name of a component that sends
an error back to the client application?
Number
Description
This database holds personal information. The user
can help to keep it confidential by
using a password
keeping a backup
copy
the product code
the primary key
A database
Graphics
bookmarks
operators
Auto Primary
Auto ID
If the database holds customer names and addresses,
personalised letters can be created automatically using
Application software suited to storing the survey
information obtained in the table would be
The characters * and ? are sometimes used in search
criteria as
Which of the following field types will generate the
primary key automatically?
Referential integrity ensures that the:
related tables in a
records in a dynaset database are
are consistent with the consistent with one
another.
underlying tables.
Tables are related to one another through a:
foreign key.
main form and a
subform.
A foreign key is:
the primary key of
both related tables.
the primary key of
the related table.
You are creating a banking database to track customer
loans. The bank will, of course, have many customers,
each of whom may take out one or more loans, while
each loan may be associated with only one customer
(there are no joint accounts). What is the re
One-to-one
In a one-to-many relationship between Companies and
EmployeeID
Employees, which field is found in both tables?
Which of the following ensures that records in related
tables are consistent with one another? For example, it
ensures that you cannot add a record with an invalid
The Tools menu,
foreign key.
Relationship window
How would you delete a relationship between tables in Double click the
the Relationships window?
Relationship line
In a Customers tables, what does a plus sign next to
the CustomerID field mean?
One-to-many
CompanyID
Referential integrity
Right-click the
Relationship line,
then select Delete
from the shortcut
menu
That there are several
customers associated That some of the data
with that ID
is not viewable
What is required of the fields that join two tables?
They must both be
numbers
They cannot be text
fields
Assume a one-to-many relationship between the
Customers table and the Loans table, with referential
integrity in effect. What happens when you attempt to Nothing, Access
The customer‟s ID is
delete a customer ID from the Customer table that still ignores the attempted deleted from the
has entries in the Loans table?
command.
Customers table.
Which of the following is true when viewing a main
form and its associated subform in the Form Design
view?
The subform is not
visible.
Which of the following relationships does not belong in A one-to-many
a database based on a professional sports league
relationship between
such as football or basketball?
teams and players
Which symbol is used at the end of the join line in a
related table to signify the “many” side of a one-tomany relationship?
#
The subform is
displayed in
Datasheet view.
A one-to-many
relationship between
teams and coaches
M
Either table at any
time
prompt, title bar text,
icon.
The Customers table
only when there are
Loan records
associated with that
customer
prompt, icon, title
bar text.
Dim CreateList.
Sub CreateList.
A text field:
A check box enables
the form user to
choose from one of
several existing
entries.
must be set for one
word.
A text field enables
the form user to
choose from one of
several existing
entries.
must be set for
multiple words.
The purpose of a database is to:
A database stores:
A database records:
help people keep
track of things.
data.
facts.
store data in tables.
relationships.
figures.
A sales contact manager used by a salesperson is an
example of _______________
You have created a one-to-many relationship with
referential integrity between a Customers table and a
Loans table. From which table can you delete a
record?
The correct order of the arguments for the MsgBox
statement is:
The first statement in a procedure named CreateList
is:
Which of the following is TRUE related to form fields?
A Customer Resource Management (CRM) system is
an example of_________
The industry standard supported by all major DBMSs
that allows tables to be joined together is called
__________.
Sequential Query
Language (SQL)
A program whose job is to create, process and
administer databases is called the _____
Microsoft Access may use which of the following
DBMS engines?
Which of the following are basic components of an
enterprise-class database system?
In an enterprise-class database system ________ .
In an enterprise-class database system, the database
application ___ .
In an enterprise-class database system, reports are
created by ____________________ .
A database is considered "self-describing" because
_______ .
In an enterprise-class database system, the database
_________ .
A database may contain
_________________________ .
A database designed using spreadsheets from the
Sales department is a database being designed
_________________________ .
A database designed to implement requirements for a
reporting application needed by the Sales department
is a database being designed _______ .
A database designed to combine two databases used
by the Sales department is a database being designed
_________________________ .
Database professionals use ________________ as
specific data sources for studies and analyses.
Database professionals use a set of principles called
________________ to guide and assess database
design.
Database Modeling
System
Structured Question
Language (SQL)
Database
Management
System
Jet
SQL Server
The user
the database
application(s)
interact(s) with the
DBMS
The database
application
the DBMS accesses
the database data
creates queries
creates form
the user
the database
application
all the users' data is in it reduces data
one place
duplication
holds user data
holds metadata
tables
metadata
from existing data
as a new systems
development project
from existing nondatabase data
as a new systems
development project
from existing data
as a new systems
development project
data marts
normalization
data marts
normalization
A very popular development technique used by
database professionals for database design is known
as _______________________ .
A very popular development technique used by
database professionals to adopt a database design to
new or changing requirement is known as _____ .
The predecessor(s) of database processing was
(were) __________ .
In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to identify
particular rows in a is___ .
A combination of two or more columns used to identify
particular rows in a relation is________ .
A determinant that determines all the other columns in
a relation is______ .
When designing a database, one of the candidate keys
in a relation is selected as the _________ .
Normalization is a process used to deal with which of
the following modification anomalies?
When you are given a set of tables and asked to
create a database to store their data, the first step is to
____ .
Modern microcomputer personal DBMS
products______.
Which of the following are true about data mining
applications?
data marts
normalization
data marts
normalization
file managers
hierarchical models
entities in a column
vary as to kind
the order of the
columns is important
table
relation
record
field
record
field
record
field
composite key
primary key
Insertion anomaly
assess the existing
tables' structure and
content
Update anomaly
are supplied by
several wellestablished
manufacturers
They use
sophisticated
mathematical
techniques.
design the database
structure
were essentially
killed off by MS
Access
Their report delivery is
more difficult than
report delivery for
reporting systems.
We have obtained access to the company's
operational data. We examine 50 records for
customers with phone numbers that should use the
current area code of 345. Of these 50 records, we find
10 that still use an older area code of 567. This is an
example
dirty data
inconsistent data
We have obtained access to the company's
operational data. We have been asked to produce a
report with an item by item analysis of sales, but the
only sales figure available is the total sale value for
each order. This is example of_____
inconsistent data
dirty data
A data warehouse database differs from an operational
database because:
Which of the following objects is used to display a
menu?
Which of the following objects are NOT found in an
Access application?
You are developing an Access application that you
expect to upgrade periodically. Which of the following
statements is TRUE?
data warehouse data
are not stored in
tables.
data warehouse
databases do not
have metadata.
Form
Table
Forms and reports
Queries and tables
It will be easier for
the user to upgrade
It will be easier for the it if the objects are
in one database and
user to upgrade it if
the objects and tables the tables in
are in one database. another.
The Link Tables
command can be
used to associate the
tables in one
database with the
objects in another
database.
Which of the following statements regarding Access
applications is NOT true?
Which of the following brings a copy of the table into
the current database and does not maintain a tie to the
Import
original table?
It contains more than
What makes a database an application?
one table
What is the Access tool that is used to create the user
interface?
Menu Wizard
The purpose of a data warehouse is to:
___________ means the result of applying to specific
information certain specific technical processes.
__________ is an algorithm which creates a digital
representation or "fingerprint" in the form of a "hash
result".
__________ is of standard length which is usually
much smaller than the message but nevertheless
substantially unique to it.
Digital Signature involves two processes. They are
___________ and __________.
An application may
consist of multiple
databases, each with
multiple objects,
linked to yet another
database containing
only tables.
Link
It contains tables,
reports, queries, and
forms
Build Menu
create backups for
mission critical
corporate data.
centralize the
manageability of data
collection.
Digital Sign
Digital Certificate
Hash Function
Digital Signature
Hash Function
Digital Signature
creation
Hash Value
Digital Signature
Verification
The Costs of Digital Signature consists mainly of the
following
CA stands for ________________
A Digital Certificate is issued by a Certification
Authority and is signed with the CA's Private Key
A Digital Certificate does contain Owner's Public Key,
Owner's name, Expiration date of the Private Key,
Serial number of the digital certificate
______________ enable web servers to operate in a
secure mode.
______________ are used by individuals when they
exchange messages with other users or online
services.
______________ are on-line databases of certificates
and other information available for retrieval and use in
verifying digital signatures.
Signing Writings serve the following general
purposes______,_______,_______ and _______
The most widely accepted format for Digital Certificate
is defined by the CCITT X.509
A certificate may prove to be unreliable, such as in
situations where the subscriber misrepresents his
identity to the certification authority
CRL stands for
The prospective signer identified in the digital
certificate holds the_________ and is called the
___________
In EDI interface, the translation service receives
_________ as incoming files from the communication
service
The EDI standardisation for International Trade and
Commerce is introduced by __________
Institutional
Overhead and
Subscriber Relying
Party Cost
Certification
Authority
In EDI, the transmission files are composed of different
sets of external format files which are grouped into
multiple sets under the name of ________
batch files
The ________________ are pre-paid credit cards that
Smart Card
include an embedded cards
________________ are another form of credit
payment that lets customers use digital online cheques
to pay Web merchants directly
E-cash
interchange sets
Embedded cards
Digital Cash
In Active advertisement, there are two types of models. Billboards and Junk
They are _____ and ________
Mail
Online Catalog and
Billboards
The network based technology is/are ____________
Decryption is a process employed for scrambling of
plain text for web based transactions
Asymmetric cryptosystem is based on __________
and ____________
EDI
E-mail
True
Login_Id and
Password
False
Primary Key and
Private Key
Value Added Network is an example of _________
Global Network
Private Network
The advertising strategies emerging in the on-line
world are ____________
Active or push based
advertising
Passive or pull-based
advertising
The _________ model use direct mail, spot television
Broadcast
or cable television, in active based advertisement.
The ________ is a form of mail that is not targeted to a
specific audience
E-mail
Junk mail
Bulk-mail
The __________ model refers to information that is
placed at a point where it will be noticed by customers
in the course of other activities and does not require
active search
Catalog
Endorsement
The most beneficial advantage of ERP system is
What is the term that describes spying on one‟s
business rivals to gain a competitive advantage?
Error checking
Competitive
espionage
Data Integration
What would you NOT be looking for when spying on a
competitor?
A list of competitor‟s
clients
An online drugstore such as Drugstore.com is an
example of_______
Which of the following is an example of unacceptable
online „netiquette‟?
single-user database
application
Which of the following statements is correct
concerning the security of messages in an electronic
data interchange (EDI) system?
The wizard that is used to import text files
is_________________
Replying promptly
Removable drives that
can be locked up at
night provide
adequate security
when the
confidentiality of data
is the primary risk.
text import wizard
Corporate espionage
Contact numbers of
the management
group
multi-user database
application
Keeping messages
short
Message
authentication in EDI
systems performs the
same function as
segregation of duties
in other information
systems.
convert text to
columns wizard
The alphabet indicating the column followed by the row
number is known an__________
Which of the following files could not be opened in
excel _______________
In excel, the dates that are stored as sequential
numbers known as ________________The command to display the current date in a cell is
_________________
In excel, absolute references are represented by a
________ before the column and row addresses
The ________ can be used to select the function and
assemble the arguments correctly
Specific parts of information required by functions to
perform certain tasks are called as___________
Which of the following do not belong to the formula
category in excel environment__________
The function that in used to join cell values together in
a single cell ________
The function that is used to count all the values that
meet specific criteria _________
The wizard that is used to create and edit charts
_______________
The function that is used to calculate the payment for
specific loan terms ____________
cell reference
row reference
text files
Lotus 1-2-3
serial values
domain values
=today()
=date()
dollar sign
' = ' sign
AutoSum
AutoFill
variables
arguments
text
logical
concatenate
pmt
countif
vlookup
pivot table wizard
chart wizard
sumif
pmt
average
sum
page setup
print area
autoformat
AutoFill
bordering
formatting
page setup
print area
filtering
searching
all option
blanks
The URL for encyclopedia Britannica is_________
_______ maps IP addresses with the domain names
of the sites
www.ency.in
www.eb.com
URL
DNS
Internet can be defined as _______
The most important service of the ______ is to
manage traffic control
internal network
network of network
application layer
transport layer
The function that is used to add together all values that
meet specific criteria is known as ____________
The __________ option present in the file menu
options is used to specify major facts of the page to be
printed
The command that is used to apply a format
automatically __________
The ____________ makes the information in a
worksheet meaningful and easy to understand
A particular part of a work sheet can be printed by
setting the _________
The process of finding or selecting information is
known as ____________
The option that is used to cancel the filter process for a
specific column and display all the records is
________
_________is a program that displays information
finger service
about a host connected to the net
_______ is a program or a tool that helps in locating a
file anywhere on the net
FTP
uniform research
locator
URL stands for ____________
ping service
TELNET
uniform resource
locator
IN an URL the word before the color refers to _______
A ______ always begins with a slash
Prodigy is run by IBM and ______
The World Wide Web is referred to shortly as the
_______
host computer
message
Delphi
name of the resource
scheme
Microsoft
net
web
Gopher and WAIS enables the user to ______
______ is the program used to run CompuServe's
regular services
Navigating through the menu of gopher is called
moving around _______
The directories that come with built-in engines are
yahoo,lycos and ______
To use the finger command,SLIP users must run a
programme called______
The web maps are called _______
Directories consists of _______ levels
The _____ level gives the broadcast overview of the
net
The huge list of keywords from important items is
called ______
browser
read the Usenet news
CompuServe internet
dialer
spy mosaic
The two types of search in veronica are _____ and
______
_______ searches by keywords
Mosaic displays links in color whereas _____ does not
display links in color
______ supports one button publish
SPY MOSAIC is distributed by_______
______ is a program that helps us to log on to other
networks
directory search,index index search,menu
search
search
infoseek
excite
HTTP is the acronym for __________
______is used to transfer and copy files over the
internet
_____ is a program that helps us to log on to other
networks
TCP/IP stands for ________________
gophering
gopherspace
Alta vista
open text
finger server
list
no
ftp server
directories
maximum of five
middle
lower
hotlist
directory
netshark
lynx
Microsoft
cello
mosaic
internet
Usenet
finger service
Higher text transfer
protocol
Hyper text
transmission port
iccp
ftp
yahoo
ftp
transmission
control
protocol/internet
protocol
transfer control
protocol/internet
Archie servers can be accessed in_______ different
ways in internet
one
_______is the computer on the internet that translates
between the internet domain names and the internet
numeric address
ftp servers
TIA stands for_____ in internet
Service indicates the name of the ________ used to
access data, present on the other end of the link.
HTTP stands for______
________ is used to link pages in the world wide web
the internet adapter
browser
hotlink text transfer
protocol
universal resource
locator
FAQ stands for ______
frequent asked query
The internet adapter is a programme that makes our
SLIP,PPP
connection act like a _____or a ____ account
The step involved in Communicating between the web
connection
clients and servers is ______________
wide search for
information and
WSIRC stands for______
research
Two of the important browsers are_____ and_____
lynx,minx
Lynx is a _______ programme that works with
terminals
world wide web server
The huge list of keywords from important items is
called an_____
glossary
very easy and rodent
oriented net wide
index to
computerized
archives
VERONICA is an acronym for _______________
The first freenet is created at the_____ and is
called______
________ are defined as ways of communication
amongst networks
______and_____ are web searching features
WINWAIS has two source lists namely____
and______
________ is also called as WAIS manager
HTML stands for_____
The system of interlinked documents is known
as_______
two
domain name
servers
the internet
administration
protocol
hyper text transfer
protocol
uniform resource
locator
frequently asked
question
TCP,IP
response
windows sockets
internets relay chat
netscape,ie
world wide web
client
index
university of
berkeley,berkeley
freenet
very organised
network integration
and communication
application
university of
cleveland,cleveland
freenet
protocols
IP address
search
engines,directories
ftp and finger
allsrc,winsocks
allsrc
wais,allsrc
waisman
higher text medium
language
hyper transfer markup
language
hot links
hyper text
The small programmes that create
animation,multimedia,real-time games and multi user
games are called______
The information displayed on the web page
includes______,_____ and_____
The web pages that represent online home of their
author are called______
applets
images
graphics,videos,audi programms,images,te
o
xt
GNN stands for______
_____ is the most popular internet service
global network news
yahoo service
home page
global networks
navigator
electronic mail
The online service offered by navigator gold 2.0 are
_______ and_____
_______ is a program or a tool that helps us find a file
anywhere on the net
The databases to enable keyword search using Lycos
are a2z,_______
______ is a large worldwide bulletin board service
network
email and net
conference
Netscape page
starter site,netscape
page wizard
newsgroup
telnet
Lycos catalog
point review
apple link
computer related
abbreviations and
acronym
encyclopedia
Britannica
search engines
bitnet
JPEG is the acronym for ___________
The Web aids users to explore the ________
The three most popular mailer are_____,_____
and______
Graphical interpreter
formatting
Joint Pictures Expert
Group
mails
yahoo,infoseek,altavis
ta
Graphical
interchange Format
Jumbled pictures
expert graph
documents
The World Wide Web consists of _________
information
web pages
BABEL consists a glossary of _____
Dictionaries,encyclopaedias,government and other
references are found in ______
Yahoo,lycos,excite and webcrawlers are _____
GIF is the acronym for ____________
first page
In Microsoft Internet Explorer, the color of the text can
be specified using _________ attribute of the font tag. BACKGROUND
The interface that provides effective communication
between the web browsers and servers is _________
CGI is the _________ between web browsers and
servers
CGI programs are invoked based on the information
provided by the _________
A CGI program is usually called after a request made
by the _________
biographical
information
on-line reference
works
web directories
netscape,ie,lynx
COLOR
Communication
gateway interface
Common graphical
Interface
Network
Interface
Current web page
Browser
Browser/user
Server
URL stands for ________
A hyperlink can be on ___________
HTML was derived from _________
SGML is a _________
PINE stands for _____________
The application that confirms whether a document is
compliant to its DTD is _________
Web is a collection of ___________
IETF stands for ________
The two major browsers used to surf the Internet are
________,_______
Special characters allow browsers to display
_________________
The keyword for providing links within or across
documents is____________
Stringing pages together using hypertext technology
helps view pages _______________
The initial web pages present in a web site is the
________ page.
The image format supported by most browsers
is________________.
The components of a URL are ___________
The mail we send has a mailing address and most of
them correspond to_____,_____ and
Which of the following is not supported by internet
explorer _______________
CGI stands for ____________
Host name indicates the domain name of the web
________
The internet is also called as _______________
Unknown resonance
language
text only
SQL
alphalanguage
Uniform resource
locator
image only
PLSQL
betalanguage
palm is not eatable
palm is not elm
SGML Processor
web sites
Internet equipment
training faculty
SGML Preprocessor
images
International
Engineering trainers
and faculty
MS Internet Explorer
and Mosaic
Netscape Navigator
and Mosaic
text
data from a database
hyperlink
hypertext
in random order
in sequential order
first
start
.bmp and .gif
.bmp and .jpeg
Service, hostname
and directory path
service,hostname,p
ort,directory-path
mail servers,mail
clients and alternate
services
mail vendors,mail
identification and
password
<center>
<font size=n>
common gateway
communication
generated information interface
Server
arpanet
The internet is similar to _________________
The net drivers______ from one place to another
LAN
data
Client
the net
peer-to-peer
connectivity
parcel
The net provides interesting services
like______,______ and______
scripting,parsing and
compiling
news,cooking and
fine arts
The windows internet software available
are______,_______,________ and______
________ is the ancestors of the internet
nt,windows95,ie,winzi mosaic,gopher,eudo
ra,trumpnet
p
arpanet
dnet
DARPA stands for
___________________________________________
____
The uuencode files start with a _______
DARPA is broken into ________ and _______
NSFNET is the united states provides service to _____
education,research
and_____
Higher text
HTML stands for
manipulation
______________________________________
language
The first international IP network connections were
established in 1973 with _____ and_____
united states and UK
A_____ is a set of computers interconnected by
transmission paths to exchange information in internet server
A computer that provides a service usable by other
computers is called______
client
A_______ is the representation of physical connectivity
of the computers in internet
network card
detailed transaction
DTE stands for ____________________
explanation
The basic function of the ______ is transmitting the
bits over a channel
application layer
dedicated and
registered projects
administration
begin
mailnet,inet
music and dance
Hotlink text markup
language
england,norway
client
stand-alone
network topology
data terminal
equipment
physical layer
point to point network
and broadcast
channel network
file access
packet
switching,store and
forward network
anonymous ftp
PAN,NAN,AAN
VAN
LAN
analog
KAN,RAN,VAN
MAN
MAN
digital
DTD stands for __________
Data type definition
Modem stands for __________________
Moralize/demoralize
Define type of data
Modulation/demodul
ation
______ is the process of the digital signals being
converted into a form suitable for analog transmission
Mapping
Modulation
The point to point channel network is also called as
_____ and_____
Accessing files using FTP servers is called_____
The three most commonly used networks
are______,______ and______
________ is in between LAN and WAN
_____ can be owed by multiple organisation
Data is transmitted in the form of_____ signals
________ and______ are two basic ways of getting
connected to the internet
Dedicated access
and dial up access
Stream line internet
protocol
Point to point
protocol
PPP stands for _____
Satellite link and
digital signals
Standard long internet
protocol
Prime prolonged
protocol
Which of the following best describes uploading
information?
storing data on a disk sending information
to a host computer
drive
SLIP stands for ________________
A characteristic of a communication channel that is the
amount of information that can be passed through it in
a given amount of time, expressed in bits per second.
The act of searching through storage to locate
information without necessarily knowing of the
existence of the information being sought.
A "recipient" of the certificate desiring to rely upon a
Digital Signature created by the subscriber named in
the certificate is called the ____________
The Relying Party can use the ___________ listed in
the certificate to verify that the digital signature was
created with the corresponding _________
Digital Signatures are used for a variety of Electronic
Transactions like ________________________
Bandwidth
Speed
Find
Save
Recipient Party
Relying Party
Public Key
Private Key
E-mail
Electronic Commerce
To associate with a key pair with a prospective signer,
Not False
a Certification Authority issues Digital Certificate
Not True
Digital Signatures, if properly implemented and utilized Closed
offer promising solutions to the problems of Imposters, System,Formal Legal Formal Legal
Message Integrity, __________ and _____________ requirements
Requirements
In, Digital Signature, _____________ perform the
"ceremonial" function of alerting the signer to the fact
that the signer is consummating a transaction with
legal consequences
A Digital Signature must have the following attributes
________________ and _____________
"Hash Function" is used in both creating and verifying
Digital Signature
Affirmative Act
Efficiency
Document
Signer Authentication Authentication
Not True
___________ provides assurance of the origin or
delivery of data in order to protect the sender against
false denial by the recipient that the data has been
received, or to protect the recipient against false denial Nonrepudiation
Service
by the sender that the data was sent.
Not False
Digital signature
___________ serves the ceremonial and approval
functions of a signature and establishes the sense of
having legally consummated a transaction.
________ is a branch of applied mathematics
concerns itself with transforming messages into
seemingly unintelligible forms and back again.
The complementary keys of an asymmetric
cryptosystem for Digital Signatures are arbitarily
termed as _________, and ____________
_______ is known only to the signer and is used to
create the digital signature.
_______ is ordinarily more widely known and is used
by a relying party to verify the digital signature.
____________ is the art of protecting information by
transforming it into an unreadable format.
Affirmative Act
Efficiency
Cryptography
Public Key
Private Key
Public Key
Private Key
Public Key
Private Key
Public Key
Decryption
Cipher
Which of the following activities would most likely
detect computer-related fraud?
Using data encryption.
A digital signature is used primarily to determine that a Unaltered in
transmission.
message is:
Both sender and
receiver must have
the private key
before this
What is a major disadvantage to using a private key to encryption method
will work.
encrypt data?
Which of the following risks can be minimized by
requiring all employees accessing the information
system to use passwords?
The acronym for B2B is ___________
The _____________ model is the least intrusive model
but requires active search on the part of the customer
__________ is / are a form of advertisement where
people relate their experience with products and
services
The _________ are software agents who
communicate with the business merchants on behalf
of the customers
The Pre-purchase preparation phase includes
_______________ for a set of products
The _________ phase includes customer service and
support to address customer complaints , product
returns and products defects
Performing validity
checks.
Not intercepted en
route.
The private key
cannot be broken into
fragments and
distributed to the
receiver.
Collision.
Business-toBusiness
Data entry errors.
Billboard
On-line Catalog
Customer
Endorsements
Billboard
Intermediaries
portals
Order Placement
Service
Post purchase
interaction
Purchase
consummation
The ________ allow companies to bypass the need for Billboard model of
costly printed catalogs
marketing
Business-to-Backend
Online catalog
A ________________ is a basket on the Net that is
used to place the items that are being purchased
EDIFACT is an abbreviation of ________
The __________ allows for protocol conversion and
communicates with the bank using the banks private
network or the Internet
In Ecommerce, data extraction, transforming the data
into transmittable form, transmitting the data and
downloading the data are the operations employed in
_________
The _________ commerce assists in integrating the
customers and suppliers of the company directly into
the organisation
E-cash means______________________
E-commerce is a tool that addresses the desire of
firms to cut services cost and improving the quality of
goods. It is a definition of e-commerce from
_________
The small denomination digital tokens are called
_________
The ____________ is the process of encoding
information to prevent it from being read by
unauthorized parties
There are _________ types of data tables
The tables that allows the user to change or rearrange
the data, summarize the data and evaluate the data
using changing points of view is known as
The wizard that is used to suggest hints for doing a
task
In a chart Y-axis is known as_________
In a chart X-axis is known as_______________
_________ is a set of tables that describe each of the
data series
________ is used to differentiate one data series from
another
The chart that contains only one data series is
_________
The chart that holds the column chart is _________
The chart that display two or more data series on a
surface is _________
The chart that is used to display discrete data
_________ are not allowed in a macro name
Which of the following tool cannot be used to view the
excel web page_______
The wizard that used to build an interactive table from
data existing on sheets
The chart that is used for displaying stock market
information
In excel, the subtotal command also generates grand
total after the last group subtotal_________
In advanced filter , the criteria occupying multiple
columns but more than one row, is considered as an
________ criteria.
The stacked bar graphs can be represented in
__________
A pie chart can represent only one data series at a
time
The ______ generates a summarized report in tabular
form in an interactive manner
pivot table wizard
chart wizard
line chart
bar chart
true
false
and
or
3-dimensions
4-dimensions
true
false
Data table
Pivot table
Which one of the following statements related to stock It is also called as
chart is NOT TRUE ?
high-low-close chart
It shows trends over
time
The state government needs to finalize a five years
plan to implement 100% literacy in the state. Which
one of the following will be the best tool that should be
used to work out the plan ?
Pivot table
Scenario manager
Forecast'99 is a group working on exit poll. It wants to
know how many seat ABC party needs to won in
totality to obtain majority to form the government.
Which one of the following will be the tool that will help
Goal seek
the team ?
Scenario manager
Which one of the following will be the tool that provides
a way to view and compare the results of all the
different variations together on the worksheet ?
Goal seek
A ___________ is an excel file where the user stores
Workbook
his data
Spreadsheets are useful for _______________
Which one of the following is NOT the component of
the pivot table ?
Excel allows upto ______ levels of sorting
Filtering rearranges a list to display the required
records
The stacked bar graphs can be represented in
_____________
The ______ generates a summarised report in tabular
form in an interactive manner
Pivot table
Worksheet
Performing
calculations.
Performing database
operations
Column field
two
Row field.
three
true
false
3-dimensions
4-dimensions
Data table
Pivot table
Which one of the following statements related to
stacked bar chart is NOT TRUE ?
It displays the data
series one on top of
the other.
The state government needs to finalize a five years
plan to implement 100% literacy in the state. Which
one of the following will be the best tool that should be
used to work out the plan ?
Pivot table.
Forecast'99 is a group working on exit poll. It wants to
know how many seat ABC party needs to won in
totality to obtain majority to form the government.
Which one of the following will be the tool that will help
Goal seek
the team ?
Which following function is used in subtotal option
Count.
?______________
A workbook consists of many ________
databases
Which two of the following statements related to pivot
table are TRUE ?
Which one of the following is NOT a What-if analysis
tool ?
The _________ wizard separates contents in a cell
into different cells
A spreadsheet is a grid of rows and columns and is
called as a ________
Pick out the window that is not a form of excel
___________
On an Excel sheet the active cell is indicated by…
Cell A4 =2 and A5 = 4. You select both cells and drag
the fill handle down to A8. The contents of cells A6,
A7, and A8 are _____.
If a cell shows ####### , it means that _____.
Which is not an advantage of using computerized
spreadsheets?
It is a tool for
summarizing and
analyzing the data
records in an
interactive manner.
Goal seek.
It is useful when
several components
are changing and
the user is
interested in the
sum of the
components.
Scenario manager
Scenario manager
Standard deviation
records
It is a tool that
provides a way to
view and compare the
results of all the
different variations
together on the
worksheet
text import wizard
Scenario manager
convert text to
columns wizard
worksheet
workbook
application window
document window
A dark wide border
A dotted border
8,16,32
2,4,2
your formula has a
syntax error
ability to generate
tables
the row is too short to
show the number at
the current font size
speed of calculation
The gym teacher has a new program to calculate
physical fitness in terms of weight and exercise. The
use inputs different weights or amounts of exercise to
determine the related physical fitness. This "What if"
program is most likely which of the followin
The difference between the highest and the lowest
values.
Spreadsheets can be used for...
To select a column the easiest method is to …
If you press _____, the cell accepts your typing as its
contents.
The contents of cell C15 is =AVERAGE(C3:C14).
AVERAGE(C3:C14) is known as
All of the following are considered constants EXCEPT:
Which of the following may NOT be included in a
formula?
Which of the following is NOT a valid mathematical
operator in Excel?
Given the formula =B5*B6+C3/D4^2, which expression
would be evaluated first?
Which part of the formula +E12/6+(G7*SUM(H9:H11)
is considered a constant?
word processing
graphical
Range
Producing graphs
Address
Writing letters
drag from the top cell
double-click any cell in in the column to the
the column
last cell in the column
ENTER
CTRL + ENTER
array.
function.
100
(201)555-1212.
Cell references
Functions
^
/
B5*B6
C3/D4
E12
6
How can you tell which cell in a worksheet is the active It is surrounded by a
heavy border.
cell?
It is blinking.
How can you change the active cell?
By clicking in a
different cell
By using the arrow
keys to move to a
different cell
Which of the following would you use to change the
font size of a cell in Excel?
The Standard toolbar
The Formatting
toolbar
The command that will save the current workbook with
a different file type is:
The command that will print an Excel workbook is
found on the ____________ menu.
In the Save As and Open dialog boxes, the
___________ view shows the file size as well as the
date and time a file was last modified.
Which of the following commands will automatically
adjust cell references in formulas?
the New command on the Save command
the File menu.
on the File menu.
File
Edit
Preview
Details
Insert
Delete
Which of the following commands will remove cells,
rows, or columns from a worksheet?
Which of the following options is NOT controlled
through the Page Setup command?
Which command enables you to change the margins
for a printed worksheet?
All commands are carried out on a rectangular groups
of cells known as a:
Which of the following is a valid cell range?
In a copy operation, the cell(s) you are copying from is
called the:
In a copy operation, the cell(s) you are copying to is
called the:
Which of the following commands is needed to
duplicate the contents of a cell in another?
A cell reference that does not change during a copy
operation is known as
Which of the following is considered an absolute cell
reference?
Cell E3 contains the function =AVERAGE(A3:D3). If
the contents of cell E3 are copied to cell E4, what will
be the contents of cell E4?
Delete
Clear
Orientation (portrait or
landscape)
Headers and footers
Options
Page Setup
worksheet.
6
range.
D12, G25
copy range.
destination range.
paste range.
The Duplicate
command
destination range.
absolute
relative
B4
$B4
#DIV/0!
#DIV/0!
Cell E3 contains the function =AVERAGE($A$3:$D$3).
If the contents of cell E3 are copied to cell E4, what will
be the contents of cell E4?
#DIV/0!
Which of the following commands is needed to
transfer the contents of one cell range to another?
The Move command
The F4 key is used to:
Which of the following quickly copies the formatting of
a selected cell to other cells?
The Copy command
#DIV/0!
The Cut command
copy and paste cells.
edit cells.
the Fill Handle
the Format Painter
Click the Insert
Hyperlink button on
the Standard
toolbar.
Which of the following will insert a hyperlink into an
Excel worksheet?
Select the Insert
Hyperlink command
from the File menu.
Conditional formatting applies formatting to a cell
based on:
whether the cell has a
formula or a value in
it.
the cell address.
text with a two-digit
If you enter a date into a cell, Excel stores the date as: year.
text with a four-digit
year.
You created a worksheet on July 30 and entered the
=Today() function in cell E17. You opened that
worksheet again on August 31. What will be displayed
Aug-31
in cell E17 on August 31?
Jul-30
subtracting the
earlier date from the adding the earlier
The number of days between two cells containing
later one.
dates can be calculated by:
date to the later one.
The function key that is used to quickly edit the
the F2 key.
contents of a cell is:
the F4 key.
What will be stored in a cell if 3/4 is entered in it?
03-Apr
0.75
A user‟s response to the InputBox function can be
stored in:
a cell on a worksheet. a variable.
The cell reference for a range of cells that starts in cell
B1 and goes over to column G and down to row 10 is
_____.
B1-G10
B1.G10
The teacher has a spreadsheet showing all Year 10
students and their marks in one Mathematics test. To
find the student with the highest mark, which of the
following functions should be used?
AVERAGE
COUNT
Which chart type best shows proportions of a whole?
Combination
Line
Once a bar chart is
chosen it cannot be
changed to a column
Which of the following is TRUE regarding chart types? chart.
Once a column chart
is chosen it cannot be
changed to a bar
chart.
To select several cells or ranges that are not touching
each other, you would _____ while selecting.
hold down the CTRL hold down the SHIFT
key
key
Your Institute teachers have set an assignment on
„Studies‟. You are required to use a spreadsheet to
record all that you study on each day for four weeks.
You decide to show each week‟s data with an
accompanying graph. What is the best way of doing
this
What would be the best method to quickly copy the
formula from the active cell to each cell below it?
To arrange rows in alphabetical order based on
column A, you need to use the command _____.
What can you NOT do with a spreadsheet?
Use tables
Create four separate
files
Paste
Fill Down
Tools | Sort
Analyse data
Data | Sort
Calculate data
To print just part of a sheet, you would select what you
want to print and _____ .
click the Print button
producing graphs
Spreadsheets can be used for...
press the PRINT
SCREEN key
writing letters
The formula that will add the value of cell D4 to the
value of C2 and then multiply by the value in B2 is
_____.
Which of the functions is not valid for performing
addition
(D4+C2)*B2
0
D4+C2*B2
=A3SUM:B3SUM:C3
SUM
The default orientation for the printed page is _____.
Which is not a valid cell address?
portrait
AD213
landscape
ZA1
The World Wide Web was devised by _________
CERN
ECRN
The useful URL schemes are_____ and______
yahoo and infoseek
mailto and files
news groups,yahoo
and infoseek
bulletin
boards,mails call
and wireless system
bulletin board
system
small
windows socks
business
broadcasting system
large
windows sockets
Mosaic
Yahoo
buffer
cache
Photography
Digital Signature
Key
Lock
User-id
Password
Penetration
Retrieval
Acts
Regulations
Spoofing
Loss
Imposting
Threat
Sales - tax authorities
Utility
Tim Berner Lee
Etrade.com
Income - tax
authorities
Pirated software
Hoffman
Amazon .com
The other ways of getting connected to the net
are_____
BBS stands for______
USENET is a BBS on ____ scale
WINSOCKS is expanded as______
IETF Level 2 HTML DTD supports graphical browsers
like _______
The space used by Netscape to store the retrieved
page is called______
The principles, means and methods for rendering
information unintelligible and for restoring encrypted
information to intelligible form.
A long string of seemingly random bits used with
cryptographic algorithms to create or verify digital
signatures and encrypt an decrypt messages and
conversations.
Protected/private character string used to authenticate
an identity or to authorize access to data.
The successful act of bypassing security mechanisms
of the system.
A set of rules and formats, semantic and syntactic,
that permits entities to exchange information.
An attempt to get access to a system by posing to be
an authorised person.
An action or event that might prejudice security.
According to information Technology Act, 2000, To
investigate contraventions the controller of certifying
authority shall exercise the like powers to that of
Malicious software.
None the person who is known as father of Internet
This website is the biggest bookstore on the earth.
When we talk of Data Transmission modes, then ATM
stands for
A sequence of bits or characters that identifies the
destination and the source of a transmission.
The means of communicating between networks
A group of computers and other devices dispersed
over a relatively limited area and connected by
communication links that enable a device to interact
with any other on the network.
The term HTTP stands for
A NIC is considered as
A hub is a device that can connect
Which of the following is true concerning the function
of a switch?
What do routers connect?
What does a router route?
Software which prevents external access to a system
is termed
If four computers are connected to a hub and then to
the internet, how many IP addresses are required for
these 5 devices?
Which of the following in an OSI layer
When creating a network from just two PCs, what kind
of cable would be used to connect them?
An IP address is a
To construct a simple LAN of 4 computers, you would
connect them with ______connect them
Automated Tailor
Machine
Any Time Money
Acts
Router
Regulations
Gateway
LAN
WAN
hyper terminal tracing
program
National Informatics
Center
Only Computers
Concentrates
connectivity
Bridges and
Repeaters.
bits
hypertext tracing
program
Network Interface
card
Can not computers
Combines
connectivity of a
hub with the traffic
regulation of a
bridge
Two or more
networks
frames
firewall
gateway
One
Physical Layer
Two
Data-Link Layer
RG7U
Coaxial cable
Physical address
Logical address
A cable
Hub
What happens to data that is ruined before reaching to Data return to the
receiver
sender
It gets destroyed bit
by bit.
Bluetooth is
Wireless technology Wired Technology
Which is not one of the recognized IEEE sub layers?
The most preferred number system to represent a IP
address is
A MAC address is of
Physical Layer
Data Link Layer
Binary
48 Bits
software that
facilitates connection
to the internet
ASCII
48 Bytes
a list of rules for
transferring data
over a network
Protocol is
A ............... is a LAN-based computer with software
that acts as a controlling device for controlling access
to at least part, if not all, of a local area network and its
available resources.
Novell PC
Client
There isn't one
If one node goes
down, it brings
down the entire ring
Physiology
Bus
Linear
Parallel
Topology
Star
Parallel
Circular
Ring
Bus
Ring
Bus
Which one of the following is NOT a network topology? Star
In a .............. , the cable system forms a loop with
workstations attached at various intervals around the
Ring
loop
Bus
The Media Access Control (MAC) is a sub layer of the:
What are the most common LAN technologies used in
networking today?
Modem speeds are measured in
LAN speeds are measured in
Transport Layer
Ethernet, token ring,
FDDI
kbps
Kbps
usually higher than
LAN speeds
measured in bytes
per second
CD-ROM drive
must use the World
Wide Web
a modem
must use electronic
mail
What is the biggest disadvantage of the Ring
topology?
The .............. of the network concerns how network
devices are physically (or optically) interconnected.
The principal topologies used with LANs are:
What are the various types of bus architecture?
What are the various types of ring architecture?
In a ................., each workstation attaches to a
common backplane via its own physical cable that
terminates at the hub
In a ............... , each work station is directly connected
to a common communications channel
WAN speeds are
Accessing the Internet from a typical home PC
requires the use of
To use the Internet, you
Bus
The worldwide web server uses the following standard
uniform resource
interface to act as the middleware:
key gateway interface locator
An NIC
Accessing the Internet from a typical home PC
requires the use of
The most widely used network operating system on
PC LANs is
a Novell Interface
Controller
used to control a
printer
CD-ROM drive
a modem
Linux
Novell Netware
JPEG and MPEG
have to do with
compression of
graphics and video
have to do with Web
pages
To use the Internet you
must use the World
Wide Web
must use electronic
mail
modem
An ISP
Printer
provides access to
the Internet
FTP is
used to send email
Telnet
used to send email
used to protect a
computer room from
fires and floods
a backup server
A multiplexer is a form of
A firewall is
A proxy server is
A search engine is
To look for information about interest areas on the
internet, the user should use a
hardware
is a CPU register
used to browse the
Web
uses wireless
communication
medium
a form of virus
an email server
IR system for the
Internet
An ISP
scanner
provides access to
the Internet
FTP is
used to send email
used to browse the
Web
Telnet
used to send email
uses telephone lines
Which of the following is a true statement about the
OSI model layers?
The layers cannot
Any layer can
communicate with one communicate directly
another.
with any other layer.
Which of the following is NOT true about the Internet?
The traditional intent and impact of this common type
of attack is to prevent or impair the legitimate use of
network resources.
CD-ROM
is a CPU register
It is one large
network.
It is made up of many
networks connected
into transmission lines
called backbones.
Password cracking
System intrusion
A firewall is
Which of the following is NOT an example of a DoS
attack that is popular among hackers?
A ____________ attack is when a hacker sends a
continuous flow of packets to a system.
One defense option on a large network is to configure
a ____________ to disallow any external traffic.
A proxy server is
Which of the following would be performed on a
network server and not normally on individual
workstations?
What can be said about the safety of the Internet?
To secure communication network against wiretapping the most effective control is
One way that a virus CANNOT spread throughout a
network is:
Which of the following is NOT a means of monitoring
employee use of company technology?
____________ would be used by parents to monitor
their children on their home system.
used to protect a
computer room from
fires and floods
IP flood
a form of virus
Flood a Web server
with requests
hack
packet
firewall
a backup server
router
an email server
Update virus
Apply security patches definitions
All sites are safe and
reliable.
There are safe and
unsafe sites.
Use of identifiers
Use of passwords
by attaching to an email.
through an FTP
port.
Phone
E-mail
A Trojan horse
Adware
The formal rules and parameters which are
established to permit a microcomputer to
communicate with the mainframe computer as though
it was a terminal of the mainframe are called
Modems
The two most common tools used to help with
cookies and Trojan
extracting information are:
horses.
Which of the following would NOT be considered an
example of cyber terrorism?
Which of the following would be a form of cyber
terrorism?
Which of the following is a likely target of a cyber
terrorist that would cause considerable loss of life?
An organisation is upgrading its telecommunication
lines. Which is the least important objective while
upgradation
A company posts a price list of its products on its
website. The advantage to the customer is that the
company can
Protocols
Trojan horses and
key loggers.
An attack with the
An attack on a system purpose of gaining
for personal gain
publicity
Disruption in
Economic damage
communication
Crashing the stock
market, as in the
Shutdown of military
1930s
security systems
To carry more
network capacity
To improve network
services
limit access to
set its prices very high computer owners only
Which of the following is an easy-to-use service to get
information on someone?
People Search
Which of the following pieces of information would
NOT be found online?
Which of the following is the most common danger on
the Internet?
Yahoo People
Search
Name of your bank
Date of birth
Virus
Fraud
buy stocks.
invest without risk.
Shill bidding
Phishing
Internet stalking.
cyber stalking.
pop-ups.
Use a fake e-mail
address.
cookies.
Never use your real
identity.
Encryption
Physical Security
controls
I only
II only
irc
Adds more bytes to
programs
ftp
Verifies integrity of
files
Which of the following is a Web browser?
HTML
Internet Explorer
A Web page is another name for ----------Domain names must contain a description of the type
of organisation that the domain represents. A very
common abbreviation used include:
A standard language for creating and formatting Web
documents is:
The Web page format in which all elements of a Web
page are saved as one file is called:
Web query.
HTML document.
.com is used for
company
round trip HTML.
.co in used for
company
the World Wide Web
Consortium
XML.
HTML.
using Internet
Explorer to view a
Web page that is
stored on the hard
drive on your
computer
updating the values
that are obtained
through a Web
query
The famous Nigerian Fraud scam offered victims the
opportunity to:
The fraud type that sends e-mails that claim to be from
legitimate sites in order to obtain sensitive information
is called _________________.
Using the Internet to pursue, harass, or contact
another in an unsolicited fashion is called:
Setting your privacy settings in Internet Explorer to
medium is one way to block:
What is the best means of protection from cyber
stalking?
Which of the following is not an appropriate control
over telecommunications software
Encryption techniques can be implemented in
Hardware-Software
Which protocol would be used to download a free antivirus program from the Internet?
The major advantage of the checksum program is
when it
Which of the following requires an Internet
connection?
Mr Rao wants to find a website that he briefly browsed Click on the Back
over yesterday. After turning on his computer how
arrow until the desired
would he do this?
site is found
the Refresh
Which of the following is used to update a Web query? command
You download from the internet, a screensaver, a tensecond sound file and a ten-second music video clip.
You also add a hyperlink. Which of the media
elements has the greatest effect on the file size?
When saving a photograph for use on a website, which
format should you choose?
While researching the Direct taxes assignment, you
find a useful website. What is the most efficient way to
access the site at a later time?
A system that uses the Internet for business-tobusiness interaction is called a(n):
A block of text automatically added to the end of an
outgoing email is called
_________ refers to the use of Internet technologies
for placing telephone calls.
Most client/server applications operate on a threetiered architecture consisting of which of the following
layers?
Which do you NOT need to connect to the Internet?
What does FTP stand for?
What is the purpose of DNS?
Which of the following is NOT a properly formatted IP
address?
Which of the following is a properly formatted email
address?
Click on „Go to‟ or
„Search‟ in the
browser
the Insert Hyperlink
command
Hyperlink
Screensaver
BMP
GIF
Save it to a floppy
disk.
Write it down on a
piece of paper.
extranet.
intranet.
an attachment.
a signature.
VoIP
Desktop client,
application, and
database.
Modem
IPT
Desktop client,
software, and
hardware.
CD-ROM
File Transmission
File Transfer Program Protocol
So computers can
be referenced by a
So IP addresses can
name
be shorter
If you do not pick up your email for a week...?
193.1.2.3
45.1.1.1
paul .trigg @ domain. paul.trigg@domain.
org.uk
org. uk
Scientists in
The US government Switzerland
International Relay of
Internet Relay Chat Characters
It will be waiting for
It will be deleted
you to collect it
What does HTML stand for?
Hyper Textual Markup Lingo
Hyperlink Text
Marking Language
What is a disadvantage of joining a mailing list?
Receiving messages
automatically from
anyone in the group
People discussing a
topic of interest
globally
The Internet is controlled by whom?
What does IRC stand for?
In Powerpoint2000 ,the built-in professional design
elements are
clipart & auto shapes
autolayouts and
presentation
templates
Selection handles are the 8 small ___________ that
appear around the object, when an object is selected
circles
points
The _______ is an invisible matrix of vertical and
horizontal lines that covers the entire slide workspace
square
image
tool bars
clip gallery & word
art
wave file
short cut menus
slide show & view
show
media clip
eof,false
movelast,true
properties window
form layout window
bof,false
movefirst,true
value()
int()
circle
rectangle
true
false
true
false
fontcolor
color
underline,true
fontunderline,true
textsize
one- millionth of a
second
size
one-hundredth of a
second
count
recordcount
form layout window
prperties window
title
prompt
_______ are drop-down menus that appear when the
right mouse button is clicked on the screen element
________ and ______ have the ability to add a lot of
visual impact into the PowerPoint presentation
_______ is a motion picture or any animation file
In visual basic, when a record pointer reaches to the
last record, _______ property of a recordset object is
automatically set to ______
In visual basic, the explorer view of a project is
displayed in ___________
In visual basic, when a record pointer reaches to the
first record, _______ property of a recordset object is
automatically set to ______
In visual basic, _______ is a method to convert a
string into integer.
In visual basic, in a shape control, a vb statement
gives Shape1.Shape = 2. What type of shape should
we get?
In visual basic, a timer event is only available in timer
control.
In visual basic, vbred or vbgreen or vbblue are the
property values of a backcolor of any object
In visual basic, _______ is a property of a textbox
control to set a color of a text.
In visual basic, _______ property of a textbox control is
set to _______ to underline a text
In visual basic, _______ property of a textbox control is
used to change the size of text.
In visual basic, the interval property of a timer control is
given in ________
In visual basic, _______ property of listbox control
counts the number of items in the list
In visual basic, the properties of various controls can
be set using __________
In visual basic, vbinformation, vbcritical,
vbexclaimation are the values of _______ in a
messagebox function.
In visual basic, ________ is a function which displays
a message and it also allows the user to enter values
in a form object
msgbox()
In visual basic, using a data control, ________ is a
recordset type which allows to add a new record and
also to update existing record in a recordsourse object opendynaset
In visual basic, while closing a form _______ event of
a form object is triggered earlier to terminate event.
In visual basic, to give a backcolor or to bring in a
picture to a command button can only be done if we
set the style property to ______
In visual basic, a method RGB(255,0,0) will generate
_______ color
In visual basic, a method RGB(255,255,255) will
generate _______ color
In visual basic, if a user uses a shortcut key ctrl+R
_________ becomes visible.
In visual basic, if a user uses a function key F4
_________ becomes visible.
In visual basic, when a textbox control receives the
focus ________ event is triggered.
In visual basic, a form is a ________ object.
Microsoft visual basic is a Rapid Application
Development tool.
In visual basic, when a form object appears on the
screen _________ event is triggered.
In visual basic, to display text on a label object
_________ property is used
In visual basic, _______ object is used to access the
database and also to manage the data in the
database.
In visual basic, when a checkbox control is checked
_______ property is automatically assigned with 1.
In visual basic, _______ keyword is used to declare a
variable
What is the extension of the Visual Basic project file
that stores the design of a user control.
Which event of a text box would you use for validating
the data entered by the user?
Which of the following statements forces inline error
handling?
The _______ method resets the contents of bound
controls to their original values when the user clicks on
the cancel button.
To deactivate the Form UnLoad event, you make the
following change in the function definiton:
textbox
opensnapshot
load
activate
standard
opaque
blue
red
red
green
properties window
form layout window
properties window
form layout window
change
child
lostfocus
parent
true
false
load
unload
text
name
opendatabase
dbengine
enabled
visible
dime
dim
.ctx
.ctl
Validate
On Error GoTo
linelabel
Validation
UpdateControls
PaintPicture
On Error GoTo Inline
Cancel parameter to Cancel parameter to
a non-zero value
0
How many root nodes can a TreeView control have?
1
2
Consists of several
Programs
Form window,
standard or code
module
Place code in the
Terminate event
Consists of several
Applications
A project group is a Project which:
Procedures declared in a _____ are local whereas
procedures declared in a ______ are available to the
whole application.
How can you keep the user from exiting a form by
clicking the Close button?
The _______ property enables Visual Basic to draw
complete images in memory before displaying them on
AutoRedraw = True
the Screen.
You want to display the code and the description of an Msgbox err.no &
error. What would be the correct syntax?
err.text
What is the purpose of the Image List Control?
Which method would you use to get a free or unused
File identifier while opening any file:
Which property procedure is used to retrieve the value
of a property?
Which of the following can be shown to the user using
the Common Dialog control in VB?
Which of the following are not properties of Command
Button:
Which events enable you to determine which key was
pressed by the user?
In order to access a file in Non-textual format, you
have to open file in:
Visual Basic displays information depending upon the
current value of two properties of the form, called:
Which of the following procedure types will execute
when you assign a value to a property of an object?
In order to overlap the controls (say a command
button) during design time, we use the „Send To Back‟
or „Bring To Front‟ option from the Edit menu. To
change it dynamically (i.e.during program execution)
we need to change:
Which property of the ProgressBar determines how
much of the bar is filled?
The ______ function can be used to run any .com,
.exe, .bat or .pif file from a Visual Basic program.
The caption and the name properties of the command
button:
Project window, view
code window
Place code in the
Unload event
AutoRedraw = False
Msgbox err.number &
err.text
To display images to
the user
To help in creating a
ToolBar
FreeFile
GetFileNum
Retrieve
Common messages
passed to Windows
Get
Caption
Click and KeyPress
Visible
Click, KeyUp and
KeyDown
Ascii Format
Binary Format
CurrentX and
CurrentY
ScaleLeft and
ScaleTop
Property Get
Property Assign
Background color
property
Caption property
Min
Max
Shell
Open dialog box
Substr
Can be different at
Are one and the same times
You try to initialize a new Object variable with the
following line but receive an error. What could be the
possible cause? Set MyVar = New Classname
You do not need to
You do not have the
use the Set command permission to access
here
the class
Which of the following will perform a direct execution
of a Command object?
The Open method
The vb Critical symbol displays:
A warning query icon
The Exec method
A critical message
icon
vbYesNo is an example of a(n):
statement.
variable.
MsgBox statement
returns a value, while
The primary difference between the MsgBox statement the InputBox function
and the InputBox function is the:
does not.
Which of the following is TRUE about a protected form
(i.e., a form where the Protect Form button on the
Forms toolbar is toggled on and is assumed to remain
in that position)?
Which event is triggered when the user moves to
another open form?
The user can use ______ to remove the undesirable
part of the image
InputBox function
returns a value,
while the MsgBox
statement does not.
Data cannot be
The form can be
entered into the form. modified.
Unload
QueryUnload
clipping tool
cropping tool
color palette
color box
ascent
tricolor scheme
10
28
column
images
bar
images and text
circular
radar
Each individual piece of data in a series is called a/an
PowerPoint launches an OLE-compatible application
called
entity
Microsoft
organization chart
data point
When the user double-clicks on an organization chart
object in PowerPoint
The _____ are used for selecting, editing and viewing
objects in the chart
the organization chart the chart is made
is expanded
available for editing
The power presentation has a _____ for a set of
compatible colors
The set three colors used for graphs and for
secondary slide items is called as
There are ______ types of charts available in
PowerPoint
_______ charts are useful while showing variations
over a period of time
_______ are the individual pages of a presentation
A PIE Chart is a ____ diagram that depicts the
relationship between a whole and its parts
box tools
clip art
general purpose tools
Manager box tool in organizational chart window is
The custom drawing tools are _______ by default
Click on the box tool ______ to draw three boxes
There are ____ default fields available in all boxes of
the organizational chart
The _____ tool is used in the same way as we use a
pen to draw a table
A/An _______ consists of smaller printed version of
the slides
The size of the object can be changed using the
______ tool
_______ is the process through which the slides in the
current presentation are included in another
presentation or application
________ can be used to create charts as well as
worksheets
PowerPoint can import text files that have been saved
in ______ format
PowerPoint outlines can have _____ outline levels
When a file is saved with _____ extension, the
graphics and text are also saved along with the slide
The hidden slide is
____ effect is used to introduce a slide during a slide
show
A _____ is a special effect that determines how the
objects appear on the slide
The notes page is formatted based on the
Pick the odd man out of the following
When a new presentation is opened ,powerpoint
creates slides that have a width of _____ and a height
of ______ with the landscape orientation
The default orientation for notes ,handouts and
outlines is ____ orientation
Build effect is also called as ______
Graphics for web pages are automatically stored in
____ format
A _______ is used to jump to any slide in the
presentation
The ______ language has been incorporated into
PowerPoint
In PowerPoint _____ is a series of commands that are
executed in sequence
used to mange
organizational chart
accessed only by
manager
turned on
once
turned off
twice
two
four
native tool
draw tool
autolayouts
handlayouts
zoom
reduce/enlarge
importing
exporting
Microsoft excel
auto shapes
.ppt(PowerPoint)
nine
.rtf(rich text format)
only one
.rtf(rich text format)
.wmf(windows
metafile)
not displayed during displayed only during
the slide show
the slide show
DTS(digital track
sound)
3D(3 dimension)
build
notes master
outline view
transition
slide master
slide view
15 inches,10 inches
10 inches,7.5 inches
portrait
animation
landscape
view show
gif
jpeg
hyperlink
visual c++
hypertext
visual basic for
application
macro
batch file
The macro will be activated
Developers can easily add ____ to PowerPoint 2000
by using the programming interface
______ determines the order in which order in which
the slides will be displayed during the show
_______ is used to organize and develop the contents
of a presentation
If we save the presentation file as a metafile, it can be
opened using
while creating a .exe
file
during slide transition
virus checkers
spell checkers
slide show
custom show
slide pane
notes pane
internet explorer
paint shop pro
Which of the following statement is not TRUE
PowerPoint creates a
sample presentation it is the quickest way
to which user can add to create a
words and pictures
presentation
user can insert only
pre-drawn, preuser can insert
objects like clip-arts, colored graphic
images reflected in
pictures stored in a
a clip arts to the
separate files to the
slides
slides
With reference to changing the order of slides, which
of the following statement is not true
in outline view, drag
in slide sorter view,
the slide icon to a new drag the slide to a
location
new location
Which of the following definitions are not true
the slide that holds the
formatted
placeholders for the
titles, main text and
any background items
that user wants to
appear on the slides is
called a master
templates
With reference to autocontent wizard for creating a
new presentation, which of the following statements
are not true
Which of the following statements are not true
transition means
applying special
effects to the
crossover between
the slides
in outline view, user
can see the
miniatures of all
with notes pages view slides in a
presentation,
user can prepare
complete with text
speaker notes and
and graphics
handouts
the slide that holds the
formatted
placeholders for the
titles, main text and
any background items
that user wants to
appear on the slides is
called a master
template
Which of the following definitions are not true
The options available in the common task toolbar does
not include
slide layout
transition means
applying special
effects to the
crossover between
the slides
customize
by default,
doughnut chart is
displayed based on
data to be graphed
resides in a datasheet the data in the
datasheet
window
With reference to chart, which of the following
statements are not true
The format of the text entered in a title, subtitle, or
bulleted-list object is determined by the format settings
in a special slide called -------the master slide
PowerPoint provides a _________ that searches the
entire presentation i.e., all the text objects in all the
slides, outlines, notes and handouts for spelling errors office assistant
PowerPoint's drawing toolbar contains _______
drawing tools
10
Click _______ on the rectangle drawing tools enables
us to draw multiple rectangles
once
An example of the components of a multimedia
presentation could include
Which of the following formatting elements can be
applied to a PowerPoint diagram using the AutoFormat
tool?
Which of the following formatting elements can be
applied to a PowerPoint diagram using the Format
AutoShape command?
the slide master
spell checker
12
twice
text, graphics and
email address.
text, hypertext and
Power Point.
the Line style
the Line color
Fill color
Line color
What happens when you double click a blank graph
placeholder in a PowerPoint presentation?
Excel is started so
that you can create a
chart.
A popup box prompts
you for an existing
Excel chart to insert.
The legend in a Microsoft Graph chart is:
always taken from the always taken from the
first row of data in the first column of data in
datasheet.
the datasheet.
Suppose you are creating a Microsoft Graph of
quarterly sales by region. Which would be the best
chart type if you want to emphasize the total sales of
each region?
Side-by-side column
Stacked column
Which of the following actions will enable you to insert
a graph into a PowerPoint presentation?
Pull down the Insert
menu and select
Chart.
Click the Insert Chart
button on the
Standard toolbar.
Click the chart
object, then click
the View Datasheet
button on the
If you are editing a slide containing a Microsoft Graph, It automatically
how do you display the underlying datasheet?
displays in Slide view. Standard toolbar.
How do you deselect a chart that has been placed onto
a PowerPoint slide after you have finished creating the
chart?
Single click the chart. Double click the chart.
A dialog box is
displayed allowing you
to enter the name of
the Excel worksheet
that should be linked
What happens when you click the Datasheet button on to the PowerPoint
the Microsoft Graph toolbar?
presentation.
What happens if you single click a chart that is not
currently active?
What happens if you double click a chart that is not
currently active?
The chart is
selected.
A dialog box is
displayed allowing
you to enter the name
of the Excel
worksheet that should
be embedded in the
PowerPoint
presentation.
The chart is deleted.
The chart is selected. The chart is deleted.
a slide one bullet item bullet items one letter
Using custom animation effects, you can build:
at a time.
at a time.
Which of the following animation effects can be added
to a slide?
Subtle
Moderate
Which of the following animations effects can be
added to a slide?
Which keyboard key is used to select more than one
picture on a slide?
Custom animation can be used to affect ONLY:
Enter and exit
Fly in from top or
bottom
Enter
Shift
the way objects
appear on a slide.
what objects do after
they appear on a
slide.
The advanced
timeline shows the
sequence in which
objects will appear on
the slide.
The advanced
timeline shows the
duration of the effect
applied to each
object.
Which of the following best describes the information
that appears on the advanced timeline?
Which of the following objects can contain custom
animation effects?
Clips
What type of program allows an object within an image
Paint program
to be edited without affecting other objects?
Which of the following animation effects can be added
to a slide?
Fly in
Organization charts
Draw program
From top
Which of the following is TRUE regarding the
Once data is entered Once data is entered
Datasheet?
it cannot be changed. it can be changed.
Graphical software tools that provide complex analysis
OLAP.
of stored data are:
OLTP.
Which of the following statements is TRUE regarding
PowerPoint diagrams?
Which keyboard key combination is used to undo the
previous command(s)?
Microsoft visual basic project file has _______ file
extension.
You can change the
appearance of a
whole diagram, but
not individual shapes
of a diagram.
You can change
both the appearance
of a whole diagram
and the individual
shapes of a
diagram.
[Enter+A]
[Shift+Z]
.vbg
.vbp
In visual basic, _______ method is used to add an
item in a combobox
In visual basic, _______ method is used to load picture
during runtime in an image control
In visual basic, to populate a drive list box with a
directory list box __________ statement is used
In visual basic, to display a message in the run time
_________ function is used
In visual basic, to populate a directory list box with a
file list box ________ statement is used
In visual basic, ________ is a property of a recordset
object which counts the number of rows in a
recordsourse object
In visual basic, using a data control, a record can only
be added from the last record. Adding a new record is
only possible using _______ method of a recordset
object.
In visual basic, using a data control, a record is saved
to a recordsource object using _______ method of a
recordset object.
In visual basic, using a data control, to navigate to the
previous record ________ method of a recordset
object is used.
add
additem
loadpicture
load
Drive1.Drive=Dir1.Pat Dir1.Path =
Drive1.Drive
h
messagebox()
Dir1.Path=File1.Path
message()
Dir1.Path =
Drive1.Drive
openrecordset
opendatabase
update
append
append
update
movenext
movelast
To deactivate the Form UnLoad event, you make the
following change in the function definiton:Private Sub
Query_Unload(Cancel as Integer,UnloadMode as
Integer) To prevent the Form from closing, you will set Cancel parameter to Cancel parameter to
a non-zero value
the:
0
_______ is a word processing that is a member of the
Word 2000
office 2000 family
The feature that enables user to type anywhere in a
click-n-type
document without pressing or tab
The______ feature allows the user to copy and paste
upto 12 items at the same time in an application
______ and _____ key combination will extend the
selection by one character on the left and right
_____and_____ are improved layout in Word 2000
The easiest way to create a document in word is
In Office2000 environment the tool that makes work
easier for us is_____
A short description of a tool bar button called the
______ is displayed when the mouse pointer is
allowed to stay for a second on the button
Office 2000
double click
office clipboard
shift+end and
shift+home
web layout,
printlayout
cut
shift+left and
shift+right
normal layout, web
layout
wizard
templates
office assistant
inbox assistant
Screen Tip
Tool Tip
The _____ helps us to keep track of the margin of the
page
The keys that are used to navigate between headers
and footers are
Pick out the element from the following that dose not
form the type of tabs for the Word 2000
_______are blueprints or patterns for documents of a
certain type
The______ is used for quickly setting paragraph
indention using the mouse
Word art is text with
AutoShapes in word can be created by accessing the
_____
By default, a document consists of_____ section
The dialog box that is used to determine the
documents margins is
________ is a box surrounding a page on all slides or
a line that sets off a paragraph on one or more slides
The key that is used to perform a task to select all t he
text in the documents is
The key that is used to indent a paragraph is
The key that is used to change the font from the
current positioned in a document is
The key that is used to change the style of the
document that is from that normal to heading1 or
heading1 to other document styles.
'Set mapping' Check control that follows a text-type
validation, we use ----------------- application for data
analysis.
Excel can import data from other databases for the
data analysis.
tab stop
marginal stop
up arrow keys only
page up keys only
left
center
template
model
increase indent
special effect
decrease indent
control tool box
drawing toolbar
control box
1
2
page setup from the printer setup from the
file
file menu
border
shading
ctrl+a
ctrl+a
Del
Del
CTRL+SHIFT+F
CTRL+O
ctrl+shift+f
ctrl+o
Excel
Access
True
False
A System Auditor can uses CAAT tools to analyze data False
In the case of the ---------- control, it is ensured that the
data in combination with other fields are reasonable as
per standard set by an organisation.
Valid Signs
--------------- function searches for a value in the
leftmost column of a table and then returns a value in
the same row from a column that we specify in a table HLOOKUP
Most of the tools use in Data Analysis depends on
DDE
True
Transaction type
VLOOKUP
OLE
Analysis is the loading
Analysis translates
of programs that
program code of a
perform routines to
high level language to control peripheral
How do you define analysis of an information system? machine code
devices
What areas need to be considered in the SOFTWARE Only hardware and
design process?
software
What is the function of systems software?
Formatting a disk results in all the data being...?
What is Direct Implementation?
What is parallel running?
What documents are produced during the
development of a system?
What are User Guides are used for?
Systems software can be categorised into:
Which storage device cannot be erased?
Application software are programs that are written
Which bus carries information between processors
and peripherals?
Convert the decimal number 2989 to Hexadecimal
Which bus controls the sequencing of read/write
operations?
To collect data
Deleted from the
disk
Users operate the
manual system and
computer system at
the same time
The new system is
introduced
alongside the
existing system
Instructions and
technical
documentation
A gigabyte represents
Copied from the disk
Users operate the
computer system
from a given date
The new system is
introduced and users
start operating it
Log files and
temporary files
To enable any printer
to be connected to
For technical support the network
Network systems and
Operating systems communication
and system services services
Magnetic tape storage CD-ROM
To maintain a backup
To do a particular
copy of all the
task.
information
Data bus
FDDI
Auto bus
BAD
Data bus
Auto bus
Peripherals that are
connected to a
computer.
Operating system
routines that execute
in supervisor mode.
What are utilities?
Numbers are stored and transmitted inside a computer
binary form
in
The original ASCII codes
A Nibble corresponds to
Inputs, outputs, file
design hardware,
and software
To execute any
programs
were 7 bits
4 bits
More than 1000
mega bytes
ASCII code form
8 bits
8 bits
1000 kilobytes
A 32-bit processor has
32 registers
used to indicate
uppercase letters
A parity bit is
he contents of these chips are lost when the computer
ROM
is switched off?
Clock speed is measured in
bits per second
Cache memory enhances
CISC machines
Which parts of the computer perform arithmetic
calculations?
memory capacity
32 I/O devices
used to detect
errors
RAM
baud
memory access time
have fewer
instructions than RISC use more RAM than
machines
RISC machines
ALU
Registers
Every data from the primary memory will be erased if
An RS-232 interface is
For print quality you would expect best results from
Power is switched off
a parallel interface
line printer
Computer is
improperly shut down
a serial interface
dot matrix printer
ROM
is faster to access
than RAM
is non-volatile
A UPS
smart card
Laptop computers use
Multiprogramming refers to
Multitasking refers to
What are small high speed memory units used for
storing temporary results?
A good way to exchange information that changes
rapidly is through
Multiprogramming is a prerequisite for
Timesharing is the same as
______ is the default view in Word used for typing
Editing and Formatting the Text
increased the storage
capacity of a
increases the process
computer system
speed
has more storage
capacity than an ATM
is a form of ATM card card
LCD displays
CRT displays
having several
programs in RAM at
the same time
multitasking
having several
the ability to run 2 or
softwares running at more programs
the same time
concurrently
ALU
Registers
brochures
magazines
multitasking
multitasking
an operating system
multiprogramming
NORMAL
ONLINE LAYOUT
The short-cut-key that is used to indent a paragraph
spacing in the documents is
The short-cut-key that is used to paste the selected
text
The short-cut-key that is used for paragraph
spacing(1.5)
The box that separate text from the document and
allows it to behave like an independent object is known
as
The object that is used to provide information like the
title of the book, name of the chapter, page number
etc.
The object that helps us analyzing data statistically is
known as
To highlight certain parts of a page to set it apart from
the rest of the page we make use of the following
features
To clear all the tabs in a document the option that is
clicked from the tabs dialog
The dialog box that is used to incorporate picture
bullets into our documents or web pages is
The object that composes of set of tools which helps to
create and work on different shapes like rectangles,
circles, flowcharts etc.
When word is opened a new document called_____ is
displayed, where the user starts typing the content
right way
______ is an online dictionary maintained by word to
obtain synonyms for words
The thesaurus is invoked by pressing_______
When a new table is created the insertion point
flashes in the _____
By pressing the _____ key inserts a blank row after the
last row in the table
The ______ option enables us to convert text into a
table format
A table consists of ______ that contain text or graphics
The _______ option in word allows the user to
automatically correct misspell words as and when they
are typed
______ is a facility that enables recording and
replaying of a sequence of keystroke
In Word Macros are written in _____
In Word 2000 the macro dialog box is activated with
the help of ____ key combination
________shows how a document would look like when
published on the web or on an intranet
ctrl+m
ctrl+2
ctrl+v or ins
ctrl+c or ins
ctrl+2
ctrl+5
Text Box
Frame
Header and Footer
Screen Tips
Chart
WordArt
Borders
Shading
clear
picture bullets
dialog box
remove all
arrow bullet dialog
box
charts
WordArt
doc1
document1
thesaurus
shift+f7
hyphenation
thesaurus menu
first
second
tab
end
convert text to table convert data to table
row
rows & columns
AutoCorrect
AutoFormat
Mail Merging
basic
Macro
visual basic
shift+f8
shift+f7
web layout view
online layout view
______ is a software for sending and receiving e-mail
messages
________is the coding system used to create web
pages
The network that makes information easily accessible
across various networks is _______
email client
outlook express
html
xml
internet
intranet
field name must be
listed in the same
order as the
Which of the following statements are false with
corresponding
reference to the use of a header row source for a mail information in the data
merge
source
With reference TO TABLE WHICH OF THE
FOLLOWING STATEMENT ARE false
The alignment available for tabs does not include
it is not possible to
change the height of
only selected rows of
a table
left
the field separators
in a header source
and the data source
can not be set as
paragraph
auto format option
applies to the entire
table and not only to
the selected rows or
columns of a table
decimal
In order to type a
header from the third
A new section is
page of the document
created in order to
a section break is
change properties like inserted after t he
number of columns
third page
Which of the following statements related to a Section
Break are True
The user can set a spelling checker to skip the marked
true
part of the next
New option under the file menu of word creates a new
blank document that is based on the normal templates
The user can split the screen only into two parts
The features that enables the user to type text
graphics tables anywhere in the document without
pressing enter or tab
The user can modify the picture from the clip art
With reference to auto correct which of the following
statements are false
false
true
true
false
false
drag & drop
true
click -n-type
false
automatically corrects prohibits the user
from renaming an
common typing,
auto correct entry
spelling errors
With the reference to password protected documents
which of the following statements are false
The alignment available for tabs does not include
Which of the following statements are False
Drop Cap tool does not work for the contents in the
table format
The user can split the screen only into two parts in MSWord
The special symbols that are inserted using "insert
symbol" option of the word can not be printed by the
printer as they are not standard keyboard symbols
The "format columns" option allows to create columnar
text up 12 columns only.
The document that makes the user to organize and
maintain a long document, such as multipart report or
a book consisting of chapters
The view that enables us to view how objects will be
positioned on the page when it is printed
The mode that is initialized or toggled to if the user is in
a position to overwrite the text in the word
Veena is entering a paragraph in a word processing
program. When the cursor gets to the end of a line,
what is the best way to get the cursor to the next line?
How are data organized in a spreadsheet?
Which key moves the cursor to the beginning of the
next line of text?
Veena typed the following sentence: "The girl was very
beautiful." In which word processing utility could she
find a synonym for "beautiful"?
Using an electronic bulletin board, Seema can do all of
the following except which one?
Aryan has created a ten-page story, but only wants to
print the first two pages. What printer command should
he select?
What process should be used to recall a document
saved previously?
Which is used to indent text within a document?
password can not
include spaces
left
password protected
document can be
opened without
password as read
only
justified
a .ppt file can not not
be inserted at
specified position in
the current document
a document file can
be inserted in the
current document at
specified position
true
false
true
false
true
false
true
false
Master Document
Child Document
Print Layout View
Page Layout
Insert Mode
Type Over mode
press the return key
layers and planes
press the tab key
lines and spaces
tab
enter/return
grammar checker
spell checker
send a public
message to friends
send pictures to a
interested in one topic friend
Print all
From ___ To ____
Enter
closing
Copy
tabbing
Desktop publishing is a more sophisticated form of
which of the following types of software?
database
graphing
What is a Word Processor used for?
What is a picture that is saved on a diskette and can
be pasted into a document?
To analyse figures
Creating and editing
documents
subscript
annotation
What is a Word Processor used for?
What basic tools would you find in the Edit menu of a
word processor
To analyse figures
Clear, replace and
select
Creating and editing
documents
Spelling, grammar
and autocorrect
What is a header in a document?
Text at the bottom of
every page
Numbers which
appear on every page
Mouse, printer and
processing system
keyboard?
Keyboard, Mouse,
monitor and printer
Browser
Clear, replace and
Toolbars
clip-art file
Spelling, grammar
and autocorrect
What hardware is essential for a word?
The user could take a picture from a magazine and
insert it into the document by using a
What basic tools would you find in the Edit
Assume you are creating a two-column newsletter.
Which type size is the most reasonable for the text in
the columns?
6 point
Given the default left and right margins, and ½-inch
spacing between columns, the width of each column in
a two-column document will be:
2½ inches.
10 point
2¾ inches.
Assume you have made all appropriate selections in
You are not in Print
the Columns dialog box in Word, but cannot see any
columns on the screen. What is the most likely cause? Layout view.
You have not inserted
a column section
break..
While word processing, in which of the following
situations would Tom use the "Copy" command?
to store a file on the
hard drive
Data about a set of
similar things
to store a file on a
diskette
Thesaurus
Spell Checker
What does a document contain?
Before submitting your work you want to find any
words spelt incorrectly. Which of the following would
you use?
Mainly text
What command in a word-processing program can be
used to change the word „him‟ to „her‟, and also the
word „he‟ to „she‟ in the given phrase? “On a cold and
still night, the only sound that could be heard was the
owl that had ade its home in the nest outs
Paste
Replace
What edit commands would you use to insert a
paragraph from one document into another document,
while still keeping the paragraph in the first document? Copy, then paste
Cut, then paste
Which of the following statements would NOT be a
reason for showing suggested revisions in a Word
document without changing the original document?
To give the original
author a chance to
accept suggested
changes from the
person who entered
the revisions
To give the original
author a chance to
reject suggested
changes from the
person who entered
the revisions
Which statement is NOT true regarding revisions
made in a Word document?
A line appears
through text that is to
be deleted.
A red underline
appears beneath text
that is to be added.
Through the Tools
menu by choosing
Track Changes
command
Which of the following is TRUE about saving a
document using the Versions command?
Through the Edit
menu by choosing
Track Changes
command
The Versions
command will allow
you to save multiple
versions of a
document, including
any changes that
may have been
made to that
document.
What happens when you open a document that has
been saved using the Versions command?
The latest version is
opened
All versions are
opened automatically. automatically.
How are suggested changes entered for review on an
initial Word document?
You have used the word „discover‟ four times in an
English essay you have created using a word
processing program. You would like to find another
word of similar meaning to use instead of „discover‟.
Which of the following would you use to do this?
Dictionary
Word displays a list
When opening and working with multiple versions of a of the dates and
times each file was
document, how can you tell which is the most recent
saved.
version?
The Versions
command will allow
you to save only one
version of a
document, including
any changes that may
have been made to
that document.
Grammar check
The most recent
version will appear at
the bottom of the list.
Various fields are added to a regular document to
create a special document called a form through the
____________ toolbar.
Which of the following types of fields CANNOT be
inserted into a form?
Fields
Tools
Check boxes
Toggle button
Which of the following is TRUE related to editing
comments in a Word document?
Comments cannot be Comments cannot be
edited.
deleted.
What is a header in a document?
Text at the bottom of
every page
Numbers which
appear on every page
Press tab.
Press Return.
text.
graphics.
header/footer.
bibliography.
Copy button
Paste button
Fault Finding
Bug Squashing
Insert
Tools
A pull quote is best emphasized by:
a section of white
text on a black
background.
setting it in larger
type or font size.
a section of text
where the first letter
of each sentence is
lowercase and the
rest are uppercase.
typing it all in capital
letters.
Which of the following definitions is CORRECT?
The reverse technique
means to add dark
text on a light
background.
A pull quote is a
quotation taken from
(pulled) from another
document.
In your English essay you notice that the paragraph at
the bottom of page 1 continues on to page 2. You
would like to make this paragraph start on page
2.What would be the best way to do this?
Tables in a document help you to easily arrange all of
the following EXCEPT:
To identify a document, it is helpful to include the file
name on each page as a
Which of the following tools will copy the formatting of
selected text to other places?
What is the name of the process of determining the
cause of errors in a macro?
Drop caps are added to a Word document using the
___________ menu.
A reverse in a newsletter is:
Pertaining to newsletters, which of the following cannot The width of each
be changed using the Columns command dialog box? column
As related to type size, how many points are there to
the inch?
6
The height of each
column
10
Assume you are working on a newsletter in which the
masthead extends across the top of the entire first
page. The rest of the newsletter has two columns.
What is the minimum number of sections in the
newsletter?
One
Two
Which of the following is NOT correct with respect to
page, column, and section breaks?
Which of the following would be the most appropriate
font for a newsletter headline?
Press Ctrl+Enter to
create a page break.
A serif font at 10
points
Press
Ctrl+Shift+Enter to
create a column
break.
A sans serif font at 10
points
Which of the following is the default Word column
width?
2 inches
3½ inches
Sequence Check is a --------------- level control check. Field
Analyse data over two or more periods is called ---------------------- analysis
Horizontal
We use Hash Total to identify ------------ within a series
where there is a definite relation between items
Duplicate Value
Analyse fields by arranging them into rows and
columns is called
Cross Tabulate
--------------------- function searches for a value in the
leftmost column of a table and then returns a value in
the same row from a column that we specify in the
table.
To import data from Access to Excel ,it is not possible
to link between Access and Excel sheet
The GAP detection options can be used to test for
completeness of data.
Exception testing can be used to identify ----------------items
Data validity test represents
Year end ledger, inventory files or transaction files can
be tested for cut-off , to ensure that the data has been
provided is for the correct audit period
In Range Check , the data may not be in proper
sequence but should be within a predetermined range
In ---------------- Check data entry follow a particular
sequence and also a predetermined range.
Record
Vertical
Combined Value
Filter
RAND()
VLOOKUP()
TRUE
FALSE
TRUE
FALSE
Unusual
exception testing
Strange
comparison of data
True
False
True
False
Limit
Sequence
Virtual memory is
related to virtual reality a form of ROM
Multiprocessing is
same as multitasking
same as
multiprogramming
To help keep sensitive computer-based information
confidential, the user should
What is the function of a disk drive?
A 4GL is
A nanosecond is
What small, hand-held device is used to move the
cursor to a specific location on the screen?
The memory address register is used to store
The memory data register is used to store
The instruction register stores
Which of the following is used to indicate the location
on the computer monitor?
A mathematical procedure that can be explicitly coded
in a set of computer language instructions that
manipulate data.
Which of the following translates a program written in
high-level language into machine language for
execution?
Detecting errors in real memory is a function of
To find where a file has been saved on disk, the user
should
A series of instructions telling the computer how to
process data or files is defined as a
To ensure that data is not lost if a computer system
fails, the user should
Having a single CPU alternatively process tasks
entered from multiple terminals is called
The place in the CPU where the data and programs
are temporarily stored during processing is called the
All are examples of computer software except
Computer manufactures are now installing software
programs permanently inside the computer. It is known
as
Which of the following file organisation forms most
efficiently allows access to a record
The part of the computer system controlling data
manipulation is called the
save the file
to calculate numbers
Uses Cobol
106 sec
set up a password
to read from or write
information to a floppy
disk
uses Java
103 sec
a keypad
a mouse
data that has been
data to be transferred transferred from
to memory
memory
data to be transferred data to be transferred
to or from memory
to the stack
an instruction that has
an instruction that has been fetched from
been decoded
memory
a cursor
a scroll bar
Formula
Algorithm
Assembler
Memory protection
use the directory
search tools
Compiler
Parity Checking
search each file in
turn
Network
save copies of the file
with the same name
on the system
Program
use different
filenames on the
system
Multiprocessing
Time sharing
ROM
RAM
Firmware
Word Processor
Firmware
Word Processor
Sequential
Hashed
Operating System
ALU
For direct access storage devices the recording area is
divided into
Tracks and Sectors
Character, field,
The data hierarchy from the largest to the smallest is
database
Which of the following hardware or software system
controls provides a detailed record of all activities
performed by a computer system
Valid character check
Which one of the following parts of a computer is
necessary to enable it to play music?
Sound card.
An educational CD-ROM on Indian Poets contains
1000 pages of text, 500 colour pictures, 15 minutes of
sound and 1 minute of video. Which of the four
different media listed takes up most space on the CDROM?
Text
Which one of the following printers is suitable for
printing sprocket fed carbon copies?
Laser
viewing an
encyclopaedia CDMultimedia software can be most productively used for ROM.
To be effective a virus checker should be
replaced regularly
Which one of the following software applications would
be the MOST appropriate for performing numerical
and statistical calculations?
Database
Passwords enable users to
How many bytes do 4 Kilobytes represent?
Back up of the data files will help to prevent
Which one of the following is the MOST common
internet protocol?
The advantage of a PC network is that
The term A:\ refers to
UPS stands for
The main problem associated with uninstalling
software is that
You are conducting research for a Income Tax
assignment. The raw facts you collect are called
A flow chart is the
Blocks and Sectors
Database, character,
record
Maintenance
diagnostic program
CD-ROM
Pictures
Dot matrix
creating the plans for
a building design.
never updated
Document processor
get into the system
quickly
512
loss of confidentiality
make efficient use of
time
1024
duplication of data
TCP/IP
HTML
access to the internet
is quicker
files can be shared
a file name
a subdirectory
up-line provider
universal port serial
service
orphan files can be
left on the system
the program
executable may not
allow it to be
uninstalled
data.
documents.
Graphical
Rules writte in
representation of logic procedural language
A voucher entry in Tally is done for
Passwords are applied to files in order to
Each of the following is an enabler of IT-business
alignment except:
The basic systems model is used to describe virtually
all information systems and it consists of the following
elements:
What is a computer-aided design system?
A(n) __________ offers a solution package for an
entire industry.
File extensions are used in order to
Information systems controls include all of the
following EXCEPT:
Hashing for disk files is called
Components of expert systems include: a) inference
engine; b) user interface; c) knowledge base; d) fuzzy
logic
Black box testing and white box testing are part of:
What is the term used to describe the point of
interaction between a computer and any other entity,
such as a printer or human operator?
The advantages of CASE tools are: a) reusability; b)
maintainability; c) portability; d) flexibility
Purchase, sales,
receipt, payments etc. To fill the log register
assist in maintenance speed up access
senior executive
IT management lacks
support for IT.
leadership.
input.
output.
The use of computers
to design state-of-theart, high-quality
Using computers to
products.
do architecture.
Application Service
specialist or functional Provider
ensure the filename is
name the file
not lost
preventive controls.
external hashing
detective controls.
static hashing
A: (a) , (b), (d)
corrective controls
B: (a) to (d)
preventive controls
Component
Interface
(a), (c), (d)
(b), (c), (d)
Which of the following is an acceptable way to shut
down the computer?
Press the reset
button.
Turn the computer off
at the power point.
Yesterday, in your music class you saved your
compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best
way to locate the files?
Ask the person next
Create the files again. to you.
Components of an information system model are: a)
applications architecture; b) functional architecture; c)
technology architecture; d) information architecture
(a), (c), (d)
Benchmarks form part of:
Continuity controls include: a) record counts; b) date
checks; c) label checks; d) run-to-run totals
detective controls
(a), (b), (c)
organisational
controls
(a), (c), (d)
(a), (b), (c)
Which is not part of help desk documentation:
problem logging
call lights
Testing of individual modules is known as:
Design phase of CASE tools includes: a) data
architecture; b) decision architecture; c) interface
architecture; d) presentation architecture
unit testing
data testing
(b), (c), (d)
Which is part of installation testing:
benchmark testing
(a), (b), (d)
specifications
matching
Multiplexer.
Peripheral
processors.
The computer operating system performs scheduling,
resource allocation, and data retrieval functions based
on a set of instructions provided by the:
Which of the following falls under multimedia data: a)
text; b) images; c) video; d) audio
Which of the following procedures should be included
in the disaster recovery plan for an Information
Technology department?
Designing relationships among components is part of:
Several Computers connected together is called:
Which network topology uses a Hub?
(a) to (d)
(b), (c), (d)
Replacement personal
computers for user
Identification of critical
departments.
applications.
architectural design
Client-server
Star
Which of the following topologies is used for Ethernet? Star
Application software are programs
interface design
Client
Bus
Bus
To maintain a backup To do a particular job
copy of are written all such as editing,
the information
storing information
Which type of file search method requires a computer
first read all locations preceding the desired one
Direct
Sequential
Which of the following areas of responsibility are
normally assigned to a systems programmer in a
computer system environment?
Which of the following is recommended when many
searches for data are required
Systems analysis and
applications
programming.
A sequential file on a
disk
Data communications
hardware and
software.
A sequential file on a
tape
Tapes can only be
read by the machine
on which they are
written
Parity errors will result
Data path part
Control Unit
Distributed systems
Local Area network
It is unlikely that a magnetic tape containing several
thousand blocked records can be used on two
machines of different architecture directly because
Which component of the CPU has the most influence
on its cost versus performance
Which of the following terms applies to network used
to connect computers with other computers,
peripherals and workstations that are in fairly close
proximity
Intelligent terminals differ from dumb terminals in that
they
Use the computer to
which they are
Can send data to a
connected to perform
computer and receive all processing
data from a computer operations
A computer is to be linked to 8 terminals using a single
communication link. To permit simultaneous terminal
operations, communication path will require which of
the following
Mixer
Allows computer
signals to be send
A modem is a device that
over a telephone line
A LAN includes 20 PCs, each directly connected to the
central shared pool of disk drives and printers. This
type of network is called a
Planetary network
A computer based system for sending, forwarding,
receiving and storing messages is called an
Office Automation
If a workstation contains a processor, monitor, screen
manipulation device, printer, storage and
communication capabilities, it is said to be
A dumb workstation
Time of day control
Terminal hardware controls include
locks
Modem
Aids in back-up
procedures
Ring Network
Executor systems
An intelligent
workstation
Encryption algorithms
RS-232 is a
Type of cable
What is a compiler?
A compiler converts
the whole of a higher
A compiler does a
level program code
conversion line by line into machine code in
as the program is run one step
What are the stages in the compilation process?
Which of the following is not a data transmission
coding scheme
Terminal Standard
Feasibility study,
system design, and
testing
Implementation and
documentation
CRC
Baudot
An interpreter does
the conversion line by
line as the program is
run
An interpreter is a
representation of the
system being
designed
What is the definition of an interpreter?
A device used in data communications to divide a
transmission signal into several sub-bands is known as
a
Modem
Third generation languages such as COBOL, C, and
FORTRAN are referred to as
High-level languages
It is faster than
Serial Communication is used over long distance
parallel
because it
communication
Demodulator
Middle-level
languages
It is less error prone
In what areas is the COBOL programming language
used?
Financial sector and
engineering
The primary function of a front-end processor is to
Manage the paging
Communicate with the function in a virtual
console operator
environment
Specification and
design
System Analysis
What is the first stage in program development?
Which of the following is not used for data
transmission within a local area network
What is System Analysis?
A device to device hardware communication link is
called
What will a good software provider consider?
The topology of a network can be each of the following
except
What is the 8-bit binary value of the decimal number
85?
Which is the most common data transmission error
checking method
Fiber Optics
Coaxial Cable
The design of the
screen the user will
see and use to enter
or display data
System Analysis
defines the format
and type of data the
program will use
A cache
The different types of
network to be used
An interface
Testing to check for
errors before the
system is introduced
Star
Packet
10101010
1100101
Parity
Retransmission
What is the decimal value of the binary number 1111? 15
Which of the following devices merges communication
signals onto a single line
Port
What is the decimal value of the octal number 215?
327
Which tool is used to help an organization build and
use business intelligence?
Cache memory enhances
What is the decimal value of the hexadecimal number
FF?
Numbers are stored and transmitted inside a computer
in
What is the hexadecimal value of the decimal number
1476?
A byte corresponds to
What does EBCDIC coding of numbers mean?
A Kb corresponds to
What is the binary sum of 01011 and 00101?
Information is stored and transmitted inside a
computer in
Where would you find the letters QWERTY?
A parity bit is
How did the computer mouse get its name?
Clock speed is measured in
What are you most likely to use when playing a
computer game?
CPU performance may be measured in
A digitising tablet can be used for?
In processing cheques which of the following I/O
techniques have banks traditionally used
Which of the following is a pointing device used for
computer input?
A UPS
binary form
Mouse
used to indicate
uppercase letters
Because it squeaks
when moved
bits per second
ASCII code form
Keyboard
Touch screen
BPS
Light pen
MIPS
Printing letters
Tracing diagrams
OCR
MICR
used to detect errors
Its moves like a
mouse
baud
Touch screen
Hard disk
increased the storage
capacity of a
increases the process
computer system
speed
What does a light pen contain?
The capacity of a 3.5” floppy is around
What general term describes the physical equipment
of a computer system, such as its video screen,
keyboard, and storage devices?
Where would you find the letters QUERTY?
What are you most likely to use when playing a
computer game?
Refillable ink
100K
Pencil lead
1.44 Mb
hardware
Mouse
software
Keyboard
Touch screen
Light pen
A digitising tablet can be used for?
Which of the following is a pointing device used for
computer input?
Printing letters
Tracing Diagrams
Touch screen
Hard disk
What input device could tell you the price of a product
Where would you find a magnetic strip?
Mouse
Credit card
Writing on a hard
board
Bar code reader
Mouse
Coloured spots
Printer
Pixels
Storage device
Mouse
CRT displays
Bar code reader
LCD displays
screen layout
mouse button layout
Mouse
hardware
Bar code reader
language interpreter
Hard copy is a term used to describe...?
What are the individual dots which make up a picture
on the monitor screen Called
A daisy wheel is a type of...?
What input device can be used for marking a multiplechoice test?
Laptop computers use
QWERTY is used with reference to
What input device could tell you the price of a bar of
chocolate?
A GUI is
Printed output
Where would you find a magnetic strip?
Credit card
having several
programs in RAM at
the same time
having several
programs in RAM at
the same time
Speakers
UNIVAC Computer belongs to the
Timesharing is the same as
Name the first Indian Super Computer?
multitasking
First - generation
computers.
multitasking
Vishwajeet
an operating system
Second - generation
computers.
multiprogramming
Deep Blue
Disk fragmentation
is caused by wear
caused by overuse
The technology which is used to check answer sheets
of multiple-choice questions in civil services or similar
examinations is: -
Bar code Reader
Technology
Optical Mark Reader
Technology
A compiler is
Which printer among the following is fastest
“Zipping” a file means
a fast interpreter
Drum Printer
encrypting it
slower than an
interpreter
Dot - Matrix Printer
decrypting it
Multiprogramming refers to
Multitasking refers to
Multiprogramming is a prerequisite for
What does acronym VIRUS stands for
An impact printer creates characters by using...?
A client-server system is based on
A nanosecond is
A procedural control used to minimize the possibility of
data or program file destruction through operator error
is the use of
_______ software enables users to send and receive
data to/from remote computers
A _____ is a running instance of an application
Splitting of CPU's time for different tasks _______
prevents time slicing
multitasking
The ability to run 2 or
more programs
concurrently
Very important reader Vital information
user sequence
resource under siege
Electrically charged
ink
Thermal Paper
mainframe technology LAN technology
10-6 sec
10-3 sec
Limit checks
Control figures
application
project
system
model
multiprocessing
multithreading
______ computers are used in large organizations for
large scale jobs which have large storage capacities
mainframes
super computers
_______ is responsible for all calculations and logical
operations that have to be performed on the data
______ printer use laser light
control unit
band printer
arithmetic and logic
unit
drum printer
______ software enhances the user to enter ,store,
manipulate and print any text
______ software enables users to send and receive
data to/from remote computers
_______ is the temporary storage place for deleted
files
_____ is a collection of related fields
integrated software
word processing
communication
software
my computer
field
recycle bin
file
_____ language consists of strings of binary numbers
______ symbol is used to represent processes like
assigning a value to a variable or adding a number
assembly language
machine language
terminator symbol
processed symbol
_______ is an example for micro computer
_________capability supports concurrent users doing
different tasks
PC-at
hp vectra system
multiprocessing
multithreading
"dumb terminals"
wan
dumb servers
distributed computing
system
host
server
host
server
PC
LAN
server processing
host processing
four
file management
system
one
hierarchical database
system
multiprocessing
multithreading
repairing
The ______ do not have processing power of their
own and has only a screen, keyboard and the
necessary hardware to communicate with the host. For
this reason, the terminals are referred
as_______________
A______is nothing but a PC with a network operating
system
_____system is responsible for handling the screen
and user I/O processing
The______ handles data processing and disk access
in a Client/Server architecture
Both the DBMS and the application resides on the
same component in a ____system
When all the processing is done by the mainframe
itself, the type of processing is sometimes called as
DBMS models can be grouped under____ categories
______is the most advantageous database system
A new user initiates a new process of execution at the
background,while the user can continue his query
process as usual in the foreground. This situation is
referred to as ______
The process of data being automatically written to a
duplicate database is called______
data management
Modem stands for __________ .
Multiple changes to the same record or a field are
prevented by the DBMS through______
_________allows an application to multitask within
itself
Code/De-code
redo logging
Modulation/Demodula
tion
fixes
locks
multiprocessing
multithreading
LAN stands for __________ .
New process of execution is referred to as______
Linear area networks
task
Local area networks
process
ISDN stands for _______.
_____________ is the Worlds largest computer
network .
_______is/are a popular front end tool
When LAN connected together ,it is called
__________ .
TCP/IP stands for _________ .
Data is broken into small unit called __________ .
SMTP stands for __________ .
The __________ protocol is a network protocol to be
built for the World Wide Web .
ATM stands for __________ .
The computer which can receive data from other
computers on the network and print it is _______
The hardware and the software requirements together
form the_____
ATM, Asynchronous transfer mode is a __________
technology.
__________ is designed telephone system
Integrated system
dynamic networks.
Integrated Symbolic
Digital networks.
Ethernet
visual basic
Internet
power builder
MAN
WAN
Transfer control
protocol/Internet
protocol
Cells
Transfer
communication
protocol/Internet
protocol
Bits
System modulation
transfer protocol
Software Mail
transmission protocol
Transfer Protocol
Aggregate transfer
mode
Transmission protocol
Asynchronous
transfer mode
File server
Printer server
platform
configuration
MAN and WAN
ISDN
LAN and WAN
ATM
Internal Services
Digital Network
Expansion of WBT is ______________
_________ connects LANs.
Collection of instruction is called a _____
Combination of alphabetic and numeric data is called
_____ data
Web based Training
Bridges
procedure
Internal Services
Design Network
Web based
Technology
Routers
batch
alpha numeric
alpha beta
Computers can be classified based on
______,______and _______
_________ are used in large organizations for large
scale jobs
_______ is responsible for feeding data into the
computer
_______ is the capability of the o/s to run numerous
applications simultaneously
_______ involves conversion of raw data into some
meaningful information
_______ is responsible for obtaining the processed
data from the computer
space occupied, price, cost, performance
no. of users allowed
their ratio
Expansion of ISDN is ________
mini computers
microprocessors
input
output
multiprocessing
multithreading
interpreter
compiler
input
processor
_______ printers use light to produce the dots needed
to form pages of characters
impact printers
operating system,
Hardware components in a computer are
bootstrap, kernel,
_____,____,_____,______
shell
_______ software are programs that are complex and
can be developed or purchased
operating system
_______ is a set of special instructions used to
communicate effectively with the computer
batch
_______ converts a high level language into machine
language
processor
_______ translates assembly language program into
machine language instructions
compiler
Journals
Real
None
Journal Book
Physical Stock
Transfer
None of the above
None of the above
All of the above
All of the above
B
B
D
A
Reversing Journal
B
Issue
None of the above
A
18
21
B
B
electronic data
analysis
F6
Primary Cost
Category
All of the above
B
Alt+f5
B
All of the above
C
A
Vouchers
None of the above
C
10 to 60
None
A
Order
All of the above
A
Information
None of the above
C
Ctrl+f2
A and B
Ctrl+f4
None of the above
A
C
A
F7 function key
None of the above
A
A or B
1-4-1997 to 31-31998
None of the above
B
None of the above
B
A
None of the above
C
Cash and profit &
loss
Cash and bank
A or b
None of the above
C
B
Cost category
None of the above
A
F8
F9
C
A and B
None of the above
C
a or b
None of the above
A
Regional setting
None of the above
A
Balance Sheet
None of the above
B
F10
F11
B
Both A and B
4
None of the above
1
C
B
F11
F12
A
Budget
None
C
A or B
A
Alt+F3
None of the above
C
Symbol
None of them
A
B
A or b
None
A
Stock analysis
In 'comp info ->
security control'
option
None of the above
A
None
B
28
Sub-Groups
Data Entry
16
B or C
TallyVault
A
C
A
A
Both A and B
None of the above
C
Cash receipts.
Will be more
efficient at
producing
financial
statements.
Payroll transactions.
A
Eliminates the need to
reconcile control
accounts and
subsidiary ledgers.
an instruction that has
been transferred from
memory
C
the address of a
memory location
C
Capacity Planning Exception reporting
C
RAM
AGP Card
B
Control totals for
one or more fields
Storing information
on the hard disk
Visual audio
board
File protection
ring
End-of-file and end-ofreel code
B
None of above
B
None of above
C
Limited access files
C
Pixies
None of above
B
Reel Number
Pointing device
Batch Total
None of above
D
A
Console Log
An inked ribbon
and print head
Require user
passwords
Eraser
A ribbon
Centralised
function for PC
Disposition
A ribbon
An INK RIBBON
Data Dictionary
B
None of above
Make duplicate copies
of files
None of above
A cassette
C
A
C
A
Distributed policies or
procedures
None of above
None of above
A
A
C
Storage capacity
Read and Write
None of above
None of above
C
B
Floppy disk
A parallel access
medium
None of above
A
None of above
A
700MB
Magnetic tape
storage
Magnetic tape
storage
In a drawer
None of above
B
None of above
C
None of above
None of above
A
C
CDROM chips
None of above
B
DRAM chips
None of above
B
Logic bus
None of above
A
Control unit
None of above
B
8 bits
None of above
B
CACHE
Business software
and games
software
Mainframe
computer
None of above
A
None of the above
B
None of above
B
Jon Von Neumann
computers
None of above
B
Hoover generation
None of above
A
Fourth generation None of above
C
Fifth generation
None of above
C
Fifth generation
None of above
B
Fifth generation
None of above
A
Analysis, System
Design, and
Implementation
JCL
None of above
none the above
A
A
A
B
A
B
A
A
A
A
A
A
to obtain a record
layout
extract data from file
A
all the above
none of the above
A
B
A
absence of audit
trails
all the above
D
unique approach
none of the above
B
checks and
controls
all the above
D
A
A
all the above
none of these
A
A
use of any
programs
none of the above
D
A
conceptual/physical all of them
D
A
A
enable multiple
user resource
sharing
all the above
D
B
B
all the above
none of these
A
A
A
A
A
B
model base
all the above
D
B
report files
none of the above
B
D
file manager
filepet
C
all the above
none of the above
A
A
B
deletion
addition
B
A
A
software and
database
safety and database
B
A
on quarterly basis
none of the above
B
B
A
Benjamin
none of the above
B
B
random placement
none of the above
of component
D
A
none of the above
all the above
A
none of the above
all the above
A
A
A
A
B
B
interactive data
innumerable
analysis
none of the above
B
A
A
B
A
big-bang
hybrid tests
stub
all the above
C
D
B
re-perform
procedures carried
out by the clients
all the above
programs
D
none of these
A
all the above
A
all the above
none of the above
A
B
A
A
B
none of these
all the above
A
A
A
can provide the
auditors with useful
information with
trend s and
all of the above
patterns
D
A
examination of
source code of a
program with
advice to
following the
logic of a program none of the above
ALC
ACLL
C
B
A
analyzing the
picture of a file or
data
all the above
A
A
A
A
none of the above
identifying nonstandard code
all the above
A
all the above
D
A
A
resource requested all the above
D
all the above
A
none of the above
A
A
B
master list of
transactions
administered
questionnaire
A
prepared by an
outside
programmer
engaged by the
auditor
all the above
D
A
stratification and
frequency analysis all the above
D
B
B
examining the
quality of data
Can aid in simple
selection
High End CAATs
A special purpose
written program
Compliance tests
of general EDP
controls
D
all the above
Can define the audit
objectives
All of the above
D
D
None of the above
A
All of the above
D
Event Procedures
General Procedures
D
primary number
auto number
D
A
procedures
none of the above
B
chart
macros
D
comments
expression
builder
action
D
expression elements
C
expression
elements list box
none of the above
C
insert
none of the above
A
auto report
embedded
C
datasheet
justified
B
embedded report
new report
D
dynamic and static none of the above
A
B
chart
insert chart
C
foreign key
mail wizard
none of the above
none of the above
C
A
page header
report header
D
group footer
none of the above
B
for specifying
conditions with
group by clause
none of the above
C
macro names
forms
none of the above
macros
C
D
insert
delete
B
module
none of the above
C
RAID
message
none of the above
none of the above
A
A
B
CME
none of the above
A
on line editing
none of the above
A
OLE server
OLE communicator
C
connected
BMP
edited
html
A
D
query wizard
publish to web wizard D
dynamic file
none of the above
B
insert
data definition
D
pesos
yen
A
command button
list box
B
link
create icon
A
save as html
none of the above
C
end
none of the above
B
procedure
front end
none of the above
language
C
A
database
data storage
C
new database
dialog box
database dialog box
A
235
63500
A
number
automatic field
B
B
explicit join
none of the above
A
candidate key
no duplicate key
A
cascade update
related fields
change all related
records
C
both a and b
none of the above
B
record or records none of the above
C
B
Dynaset field
properties
properties
B
select queries
change/delete
queries
update queries
A
update queries
A
no match join
outer join
D
A
form wizard dialog
both 1 and 3
D
append
simple
D
form properties
new properties
B
new form
child form
B
Form Operations
None of the above
B
hierarchical form
one to many form
B
sorting
querying
C
pipes
gateways
A
filter by menu
None of the above
A
@
?
D
B
data less control
data control
B
controls group
record group
B
collection
none of the above
A
controlled
all of the above
C
DATE()
combo box
DAY()
static text
C
B
tabular form
main form
A
filter by form
option control
wizard
none of the above
C
tool wizard
C
two of the above
none of the above
B
B
table
ledger
A
module
bitmap
none of the above
report
A
A
A
A
25,000
64,000
D
B
A
B
form
all of the above
D
report
hyperlink
D
A
A
Tools
none of the above
C
1 B
A
candidate keys
primary key
C
A
B
A
A
B
zero
none of the above
B
B
B
A
both 1 and 2
none of the above
B
C
A
delete query
append query
A
B
B
B
A
self join
stand alone
table join
C
sub chart
B
A
B
D
B
B
B
A
primary key field
attributes
none of the above
entities
C
D
A
append
add
A
A
B
stand alone
sub chart
B
use datasheet in
forms
use export
D
B
B
B
A
A
A
A
?
*
D
group
topic
A
C
A
B
A
B
A
range
logical
C
B
event - procedural
based language
none of the above
C
query
table
B
B
session
detail
D
both a and b
none of the above
B
A
inner form
none of the above
A
A
labels
report
B
index
identifier
B
form
none of the above
A
sorts
unbound
forms
none of the above
A
C
button
option button
B
A
record source
data sheet form
none of the above
none of the above
C
A
columnar form
none of the above
A
unbound
bound
none of the above
static
A
C
tabular form
columnar form
B
relationships
C
list, check and
combo boxes
none of the above
option button, toggle
button and check
boxes
filter by record
filter by input
D
macro
table
B
D
field
layout
record grab
field names
An organised way
of storing
information about
a set of similar
A way of maintaining a
things
log
A document which
contains text
A collection of files
Relational DBMS
is related to data
mining
Reliable DBMS
uses tape as opposed
to disk
Database access
Computer matching controls
An organised way
of storing
information about
a set of similar
things
None of the above
A document which
contains text
B
D
C
B
C
C
D
C
None of the above
B
A tool which allows
text and graphics to
be placed in
documents
None of the above
A
Using queries
C
None of the above
Word processors,
spreadsheets,
databases, DTP
None of the above
PRIMARY KEY
and UNIQUE
constraints
IDENTITY columns
C
C
ALTER TABLE
UPDATE TABLE
C
Relational DBMS
is related to data
mining
Reliable DBMS
uses tape as opposed
to disk
C
C
Component
Source
D
keeping the original saving the file with
paper copy
different filenames
A
mail merge
e-mail
C
browser
e-mail
A
wildcards
engines
C
AutoNumber
Auto Key
C
reports are consistent
with the underlying
tables or queries.
B
report and its related
query.
A
not a primary key of
either related table.
B
forms in a
database are
consistent with the
underlying tables or
queries.
query and its
associated
dynaset.
a field from an
unrelated table.
Many-to-many
Many-to-one
EmployeeLastNam
e
CompanyAddress
B
A
The join line
The one-to-many
relationship
Select Undo in the
Relationships pulldown menu
Click the Delete
Relationships button on
B
the toolbar
That there are
records in a
related table
That records can be
added by clicking on
the plus sign
B
C
They cannot be
AutoNumber data
types
They must be the
same data type
D
The customer‟s ID
is deleted from the
Customers table,
and all the related
loans are deleted
An error message is
from the Loans
displayed.
table.
The subform is an
object on the form
and can be moved or
The subform is
displayed in Form sized like any other
object.
view.
D
A one-to-many
relationship
A many-to-many
between coaches relationship between
and teams
players and teams
C
¥
*
C
The Loans table
at any time
title bar text,
prompt, icon.
Neither table
title bar text, icon,
prompt.
C
B
CreateList.
Sub.
B
A drop-down list
enables the user
to choose from
one of several
existing entries.
does not have to
be set.
A drop-down list
enables the user to
enter text.
must be set for two
words.
maintain data on
create tables of
different things in
rows and columns. different tables.
all of the above
metadata.
a and b
information.
e-commerce
database
application
a or b
D
C
C
A
D
D
A
e-commerce
database
application
None of above
B
Structured Query Relational Question
Language (SQL) Language (RQL)
C
Data Business
Model System
Relational Model
Manager
B
Oracle
The database
management
system (DBMS)
a and b
D
All of the above.
D
None of above
All of above
A
creates reports
the database
management
system (DBMS)
b and c
D
the database
B
it contains a
description of its
own structure
All of the above.
C
holds indexes
All of the above.
D
stored procedures
All of the above.
D
as a redesign of an
existing database a and b
as a redesign of an
existing database a and b
as a redesign of
an existing
database
a and b
entity-relationship
data modeling
data models
data models
entity-relationship data
modeling
A
B
C
A
B
data models
entity-relationship
data modeling
D
entity-relationship
data modeling
data migration
D
network models
the order of the
rows is
unimportant
relational data model
more than one column
can use the same
name
A
row
field
D
key
tuple
C
composite key
foreign key
C
foreign key
candidate key
D
foreign key
surrogate key
B
Deletion anomaly
All of above
D
C
create one or more move the data into the
new tables
new database
A
have poor
response time
are not true DBMS
products
B
Nonintegrated data None of the above
A
a "wrong format"
nonintegrated data problem
B
a "wrong format"
nonintegrated data problem
D
data warehouse
data are often
denormalized.
b and c
C
Report
Query
A
Macros
Spreadsheets
D
Regardless of how the
objects and tables are
It is advisable to
stored, the user will
put each object and have to reenter the data
table into a
in the tables when the
separate database. application is upgraded. B
All objects in an
application,
including the
tables, must
reside within the
same database.
An application can be
created in such a way
that it objects such as
forms and reports can
be changed without
disturbing the existing
data.
C
A
Merge
Join
It contains a user
interface, or
C
switchboard
It contains macros
Interface Design
Switchboard Manager D
Wizard
put key business
information into
store all corporate
the hands or more transaction data in one
decision makers. single location.
C
Digital Signature
None of the above
C
Digital Certificate
Private Key
A
Hash Result
Either B or C
D
Both A and B
Either A or B
C
Institutional
Overhead
None of the above
A
Certificate Authority None of the above
A
A
B
Personal Digital
Certificate
None of the above
A
Personal Digital
certificate
None of the above
C
Public Key
none of the above
B
Efficiency and
logistics, Evidence
Evidence, Ceremony,
Approval, Efficiency
and Logistics
D
A
A
certificate
Revocation Letter
None Of The Above
A
Private Key,
Recipient
None Of The Above
A
Transmission File None of the above
C
UNESCO
UN/EDIFACT
D
functions
functional groups
D
SET
None of the above
A
Smart Cards
Electronic cheques
D
Broadcast and
Junk Mail
Online Catalog and
Customer
Endorsements
C
EFT
All of the above
D
Public Key and
Password
Satellite Area
Network
Public Key and
Private Key
D
None of the above
B
B
Glow sign or
hoarding strategies All of the above
D
Billboard
Endorsements
A
Direct-mail
Junk mail
D
Billboard
Low cost of
operation
Industrial
espionage
Broadcast
C
Quality management
B
Economic espionage
C
A competitor‟s new
project
B
Research data
e-commerce
database
application
Including the
Subject
C
None of above
Using all capital
letters
D
Encryption
performed by a
physically secure
hardware device
is more secure
than encryption
performed by
software.
Security at the
transaction phase in
EDI systems is not
necessary because
problems at that level
will be identified by the
service provider.
C
tip wizard
function wizard
A
A
column reference none of the above
quattropro or xbase
class files
files
D
range values
reference values
D
=currentdate()
none of the above
A
# sign
none of the above
A
function wizard
none of the above
C
parameters
none of the above
B
numeric
Boolean
D
merge
none of the above
A
pmt
convert text to
columns wizard
count
A
tip wizard
B
countif
none of the above
B
sumif
countif
C
print
none of the above
A
A
none of the above
shading
none of the above
B
print
print preview
B
sorting
none of the above
A
all blanks
none
A
www.encybrit.com
none of the above
B
FTP
intermediate
network
none of the above
B
none of the above
B
physical layer
session layer
D
ftp service
none of the above
A
ARCHIE
unlimited restore
locator
none of the above
C
none of the above
A
scheme
command line
sears
none of the above
none of the above
general electric
C
C
C
browser
search for
database
editor
B
none of the above
C
wincim or maccim none of the above
C
cyberspace
none of the above
B
excite
none of the above
B
web server
image list
one
none of the above
none of the above
many
A
C
B
top
middle and lower
D
index
glossary
C
menu search,item item search,index
search
search
all the above
lycos
C
D
lynx
Lycos
IBM
all the above
navigator gold 2.0
CompuServe
C
C
D
ftp
telnet
D
Hyper text
transfer protocol
Hyper text transfer port C
uucp
none of the above
b
telnet
none of the above
C
transfer
communication
protocol/internet
protocol
none of the above
B
three
none of the above
C
web servers
none of the above
B
the internet access none of the above
A
site
higher type transfer
protocol
uniform resource
label
frantically asked
question
organization
B
none of the above
B
name of the above
B
none of the above
B
IP,UDP
none of the above
A
request
world search for
information and
research council
mosaic,gopher
close
A
none of the above
none of the above
B
B
interface
none of the above
B
hotwords
none of the above
B
verification on
network integration
and communication none of the above
A
university of
California net
none of the above
B
dns
none of the above
A
telnet and ftp
none of the above
A
wais,winsocks
winsock
none of the above
none of the above
B
B
hyper text markup
language
none of the above
C
books marks
B
none of the above
animation
none of the above
animation,scripts,e
xecutables
none of the above
B
welcome page
grand network
news
search engines
none of the above
B
none of the above
none of the above
B
B
yahoo and altavista none of the above
B
A
ftp
archive
D
all the above
none of the above
D
Delphi
fidonet
A
bookstores
none the above
A
more information
database
galenet
channel
A
B
Graphical interface
format
Joint pictures
expert graph
net
eudora,netscape
and pine
network
connections
Graphical Interface
format
Joint pictures
experimental group
browsers
B
A
C
none of the above
C
mails
B
FCOLOR
FONTCOLOR
B
Communication
graphical interface
Common Gateway
Interface
D
Communication
Connection
B
Client
None of the above
B
Web
Channel
A
United relay limited
text or image
SGML
metalanguage
pancake is not
edible
None of the above
neither text nor image
CGI
none of the above
B
C
C
C
none of the above
B
SGML Parser
applets
Internet
Engineering Task
Force
MS Internet
Explorer and
Netscape
Navigator
SGML Composer
documents
C
A
None of the above
C
None of the above
C
symbols
video
C
hotword
in user-defined
order
hotlink
B
none of the above
B
home
none of the above
C
.gif and .jpeg
.wmf and .bmp
C
service,port and
directory path
service,hostname and
port
B
mailing lists,mail
server robots and
gateways to other
services
none of the above
C
<hr size=n>
<l1 type=shape>
D
classified general
instructions
none of the above
B
Browser
intranet
User
none of the above
A
B
wan
packets
email,file
retrived,internet
tools
none of the above
none of the above
B
A
none of the above
C
communicator,ie,ly
nx,winsock
all of the above
ARPANET
none of the above
B
B
defensive
advanced
research projects
administration net none of the above
first
none of the above
C
B
intranet,extranet
none of the above
A
cooking and dining none of the above
A
Hyper transfer
meta language
united states &
Russia
Hyper text markup
Language
D
none of the above
B
network
none of the above
C
servers
none of the above
C
network redirectors none of the above
data target
equipment
none of the above
B
network layer
none of the above
B
smart network and
dumb network
none of the above
file transfer
none of the above
B
B
LAN,WAN,MAN
TAN
WAN
non-digital
Document type
definition
Manipulate/demani
pulate
none
none
none
none
Manipulation
of
of
of
of
the above
t he above
the above
the above
B
C
B
C
B
Document type data
C
none of the above
B
none of the above
B
Cable and wires
Serial line
protocol
Pillar to pillar
protocol
none of the above
B
none of the above
C
none of the above
B
storing data on the receiving information
hard drive
from a host computer
B
Size
Channel
A
Browse
Retrieve
C
Either A or B
Neither A nor B
B
Both A and B
Both B and A
C
Electronic Fund
Transfers
All The Above
D
A
Open System
Formal Legal
Requirements, Open
System
D
Signer
authentication
None of the above
A
Both A and B
Neither A nor B
C
B
Digital certificate
Private Key
A
Either A or B
Neither A nor B.
A
Private Key
None of the above
A
Both A and B
Either A or B
C
Both A and B
Either A or B
A
Both A and B
Either A or B
B
Encryption
Cryptography
C
Conducting fraudawareness training.
Received by the
intended recipient.
Reviewing the
systems-access log.
Sent to the correct
address.
The private key is
used by the sender
for encryption but
not by the receiver
for decryption.
Failure of server
duplicating
function.
Backend-toBusiness
The private key is used
by the receiver for
decryption but not by
the sender for
A
encryption.
Business- to-Billboard
A
Endorsements
Broadcast
B
Catalog
Broadcast
A
.COM
Search and
discovery
Domains
A
None of the above
C
Search and discovery
A
Pre-purchase
preparation
D
A
Firewall vulnerability. D
Endorsement
model of marketing None of the above
B
Billboard
EDI For
Administration,
Commerce and
Transport
Pulling cart
B
None of the above
C
EFT
Gateway
D
Assembler
EDI
D
Consumer-toBusiness
Euro Cash
Customer-to-Company B
B
Endorsed Cash
Service
Perspective
None of the above
C
TT(Tiny token)
E-token
A
Encryption
3
Subscription
4
C
B
index table
convert text to
columns wizard
legend
legend
pivot table
D
tip wizard
data marker
data marker
D
A
B
legend
data marker
C
legend
data marker
D
pie chart
pie chart
surface chart
surface chart
C
B
pie chart
pie chart
symbols
surface chart
surface chart
none of the above
D
A
A
Netscape
word 2000
A
convert text to
columns wizard
tip wizard
A
stock chart
pie chart
C
A
B
A
Multi-dimensions
A
B
It is often used to
display share
It is also used for
market prices over indicating fluctuations in
B
a period of time
temperature changes
Solver
Data table.
C
Pivot table
Data table.
A
Solver
Data table.
D
Spreadsheet
none of the above
A
All of the above
D
Pivot table item.
C
B
Performing text
formatting.
Source table
name.
N
B
Multi-dimensions
A
B
It can be
represented in 3dimensions
B
Solver
Data table
C
Pivot table
Data table
A
worksheets
A
D
SumIf
tables
It summarizes the
data by using
analytical functions.
A
solver
Pivot table
D
tip wizard
function wizard
B
tables
database
A
modal window
C
No border
A blinking border
A
2,2,2
6,8,10
D
the column is too
narrow to show
all the digits of
the number
either b or c
flexibility of moving
cost of initial set-up
entries
C
D
database
spreadsheet
D
Gap
Drawing pictures
Rows
Document filing
A
A
click the column
heading
click the column label
C
TAB
INSERT
A
constant.
formula.
B
#VALUE!
Tom McKenzie.
C
Numeric constants Text constants
D
*
D4^2
SUM(H9:H11)
It is displayed in
reverse video.
By either clicking
in a different cell
or using the arrow
keys to move to a
different cell
The Cell Format
command on the
Edit menu
the Save As
command on the
File menu.
\
It is impossible to
determine.
D
C
B
G7*SUM(H9:H11)
The phrase “active cell”
appears in the Status
A
bar.
By typing the reference
of the cell you want to
move to in the formula
C
bar
The Font Size
command on the Tools
B
menu.
the File Type command
C
on the File menu.
View
Window
A
List
Both Insert and
Delete
Properties
B
Clear
C
Both Clear and
Delete
Remove
B
Fonts
Margins
C
View
Edit
B
group.
D12:G25
cell group.
D
B
C
clipboard.
source range.
D
clipboard.
The Paste
command
source range.
Both the Copy and
Paste commands
B
mixed
constant
A
B$4
$B$4
D
#DIV/0!
#DIV/0!
B
#DIV/0!
The Paste
command
#DIV/0!
Both the Cut and
Paste commands
C
cycle through
absolute, relative,
and mixed cell
references.
the Formatting
toolbar
cycle through open
applications.
C
Conditional formatting
B
Double-click a cell and
click the Insert
Hyperlink command.
B
Right-click a cell
and click the Edit
Hyperlink
command.
whether the cell
has an absolute or
a relative cell
the value in the cell
reference.
an integer.
text with either a twodigit or four-digit year,
depending on the
format.
D
D
D
C
It is impossible to
determine from the
information given.
B
29/03/2008
subtracting the later
date from the
adding the later date to
A
earlier one.
the earlier one.
the Esc key.
B
a constant.
the F1 key.
Either 3/4 or .75,
depending on the cell
formatting
either a cell on a
worksheet or a
variable.
D
B1;G10
B1:G10
D
MAX
SUM
C
Pie
Scatter
C
Once a pie chart
has been chosen it
cannot be changed
to line chart.
Once a line chart has
been chosen it can be
changed to a pie
chart.
D
March 4 of the
current year
C
hold down the ALT hold down CTRL +
key
SHIFT
A
Transfer
information to a
database
Use multiple sheets
D
Fill Right
Paste Special
B
Edit | Data | Sort
Create forms
none of the choices
None of the above
B
C
select Print
selection on Page
Setup | Sheet and
then print
drawing pictures
select Print selection
in the Print dialog and
then print
D
A
None of the above
#VALUE!
=(B2*(D4+C2)
C
REF!
whatever was last
used
A0
None of the above
B
vertical
None of the above
A
C
CARN
newsgroups and
search engines
NET
A
none of the above
B
none of the above
B
none of the above
none of the above
none of the above
A
B
B
PINE
Lynx
A
built-in
none of the above
B
Cryptography
Message Digest
C
Hash Function
Formula
A
Name
Address
B
Cryptography
Password Cracker
A
Address
Protocols
D
Unauthorising
Exposure
Approving
Hacking
A
B
Judge of a civil
court
Virus
Charles Bubbage
Dell .com
Police officer of IPS
rank.
Cracker
Howard Aiken
Msn .com
B
C
A
B
application
servers,proxy
servers and web
servers
bulletin
broadcasting
system
very small
windows stocks
Asynchronous
Transmission
mode
None of above
C
Address
Port
Protocols
Pin
C
B
CAN
PAN
A
hypertext transfer
protocol
New Information
Card
Only printers
hypertext tracing
protocol
C
None of the above
None of the above
B
D
Switches data from
incoming ports to
outgoing ports.
All of Above
B
Bridges and Hubs
Packets
Hubs and nodes
None of the above
B
C
router
virus checker
A
Four
Network Layer
None of the above
All of the above
C
D
Fiber
Twisted pair
B
A memory address None of the above
B
Router
It continue on to
target device with
corrupt data
Ultra violet
technology
None of the above
B
None of the above
B
None of the above
A
Network Layer
All of the above
D
Octal
48 KB
None of the above
48 MB
a gateway calling
software that allows program for internet
file copying
bridging
A
A
B
Server
Network PC
If the hub goes
down, it brings
down all of the
nodes on that
section
If the hub goes down, it
brings down all of the
nodes on all of the rings B
Both A and B
Ring
Both A and B
Linear
None of the above
All of above
None
Both A and B
B
D
A
B
Star
Mesh
C
Star
Mesh
B
Linear
Ring
C
Star
Mesh
A
Physical Layer
Ethernet, DecNET,
FDDI
mbps
Mbps
Data Link Layer
Ethernet, token ring,
ARCnet
mips
Mips
D
depend on the
transmission
medium
limited by modem
speeds
C
Netscape
B
All of the above
A
Windows 95
must have a LAN
account
C
B
B
C
common gateway application protocol
interface
C
interface
interfaces a
connects a computer
modem to a
D
to a network
computer
Windows package
Netscape
B
Windows NT
None of the above
C
the Internet
must have a LAN
account
none of the previous
use appropriate
communications
software
none of the previous
bridge
is a CPU functional
unit
make of processor
A
A
D
A
is a protocol for the
transfer of files
is part of Netscape between computers
D
is part of Netscape None of the above
D
a screen saver
program
a poor file server
none of the previous
none
D
D
browser
none of the previous
C
search engine
clip-art file
is a CPU functional
unit
make of processor
D
A
is a protocol for the
transfer of files
is part of Netscape between computers
is a protocol that
allows for remote
is part of Netscape login
D
Any layer can
communicate only
with the layer
Any layer can
directly above or communicate only with
below it.
the layer above it.
C
It works the same
way as a local
network.
Individual computers
can connect to it using
an ISP.
A
Denial of Service
Port sniffing
C
D
a screen saver
none of the previous
program
Virus that initiates a
ping flood
UDP flood
A
flood
traffic
C
switch
a poor file server
hub
none of the above
B
D
D
Backup data on a
daily basis
Limit logging on access C
Only large namerecognizable sites ActiveX-enabled sites
B
are safe.
are safe.
Use
of
encryption
Use of logical
D
methods
access methods
by attaching itself
to a document.
by scanning the
computer for a
connection.
B
Web traffic
Application updates
D
A worm
Spyware
D
Multiplexors
cookies and key
loggers.
LAN
B
Giving out
disinformation
Disruption in supply
lines
Changing the content
of a Web page
D
All of the above are
D
correct.
Contaminating
water systems
Shutdown of nuclear
plant safety systems
key loggers and worms. C
D
To obtain an accurate
inventory of network
related equipment
To improve system and parts and
network nodes
D
response time
update its prices as
stop its competitors soon as they are
D
seeing their prices changed
USA People
Search
Lycos Search
B
Personal assets
Criminal records
A
Spyware
make large amounts
of money by parking
purchase off-shore funds in their bank
account.
property.
B
Siphoning
Hoaxing
B
virtual stalking.
Web stalking.
B
Adware
spam.
viruses.
Use anti-spyware
Use a proxy server. software.
D
B
B
Message sequence
number checking
Logical access controls B
Both I & II
Neither I or II
www
Increases boot up
time
C
telnet
Misleads a program
B
recompilation
both HTML and Internet
B
Explorer
Microsoft Excel
round trip HTML
document.
C
Web browser.
B
.con is used for
companies
None of the above
A
HTML.
one way HTML.
C
DHTML.
MHTML
D
clicking a hyperlink
that references a
document that is
stored in the floppy
drive on your
computer
viewing an Excel
worksheet that you
have saved as a Web
page.
B
Go to the History
page and look for
the site
the Update
command
Go to the Bookmarks or
C
Favorites page
the External Data
A
command
Sound
Video
C
JPEG
Add it to
‘Favourites’ or
‘Bookmarks’.
TIFF
Cut and paste it to a
word processor
document.
C
C
privileged network. network topology
A
a footer.
an encryption.
B
IPP
Desktop server,
application, and
database.
Telephone line
File Transfer
Protocol
PoIP
Desktop server,
software, and
hardware.
None of the above
A
None of the above
C
So email is
delivered faster
None of the above
A
143.215.12.19
None of the above
D
paul.domain.uk
None of the above
B
No-one
None of the above
Internet Remote
Conversations
None of the above
A letter will be sent
to you in the post
None of the above
C
A
B
A
A
Hyper Text Markup Language
None of the above
C
High volumes of
email
None of the above
C
slide view & outline
view
none of the above
B
squares
icons
C
grid
guide
C
auto shapes
all the above
B
fonts & images
.video file
none the above
all the above
A
B
movelast,false
eof,true
D
toolbox
project explorer
D
movefirst,false
bof,true
D
number()
val()
D
square
oval
D
A
A
forecolor
none of the above
C
textunderline,true
none of the above
B
foresize
one-thousandth
of a second
D
fontsize
one-ten thousandth of a
C
second
itemcount
listcount
D
project explorer
toolbox
B
vbmsgboxstyle
none of the above
C
label
inputbox()
D
dbopensnapshot
dbopendynaset
D
unload
initialze
C
transparent
graphical
D
green
black
B
blue
D
toolbox
white
project explorer
window
toolbox
project explorer window A
text
container
gotfocus
none of the above
D
D
C
A
initialize
activate
D
caption
none of the above
C
openrecordset
none of the above
B
value
style
C
var
none of the above
B
.ctr
.ocx
B
Check
Audit
On Error Resume
Next
A
On Error Stop
D
A
Refresh
Resize
UnloadMode
parameter to a non- UnloadMode parameter
A
zero value
to a zero value
3
None of the above
Consists of Various
Consists of several
Forms And Code
Projects
Modules
Class module,
code module
Place code in the
Deactivate event
D
D
None of the above
A
None of the above
B
Refresh
Msgbox
error.number &
error.text
PaintPicture
A
GetFile
GetBytes
A
GetProperty
Value
B
Windows explorer
Input box
D
Multi-Line
KeyUp and
KeyDown
C
Font
KeyPress, KeyUp and
KeyDown
D
Input Mode
Output mode
B
ScaleHeight and
ScaleTop
x and y
A
Property Let
Property Set
C
ZOrder property
AutoRedraw property
C
Value
CurrentVal
B
SetAttr
Are actually not
properties
CStr
A
None of the above
B
Msgbox error.number
& error.description
D
To provide a
repository for images
To allow the editing used by other
D
controls
of icons
MyVar has not
been declared
The
ExecProcedure
method
An exclamation
icon
None of the above
C
None of the above
D
None of the above
B
intrinsic constant. built-in procedure.
C
InputBox function
can be created with
the macro recorder,
while the MsgBox
statement cannot.
MsgBox statement can
be created with the
macro recorder, while
the InputBox function
B
cannot.
Data can be
entered.
A new check box can
be added.
C
Deactivate
Terminate
C
cutting tool
scribble drawing tool
A
color scheme
color guide
C
color palette
primary color scheme
A
18
36
C
pie
slides
linear
slide sorter views
A
C
doughnut
all the above
A
data
stream
B
auto shapes
track changes
A
the chart window
opens displaying
a chart template
custom drawing
tools
none of the above
C
standard drawing tools
C
used to create a
manager box for
an existing box
not available in the
tool bar
thrice
used to store the other
tools of the
organizational chart
five
eight
B
standard tool
all the above
B
slide view
none of these
B
preview
none of the above
B
copying
moving
B
clip art
drawing tools
A
.doc(document)
six
.html(hypertext format) B
C
twelve
.txt(plain text)
.doc(document)
B
displayed only in
outline view
none of the above
A
both a and b
transition
D
slide show
master slide
view show
view show
master notes
slide sorter view
A
A
C
7.5 inches,5 inches none the above
B
a or b
transition
none of the above
b or c
A
A
png
none of the above
D
action button
Microsoft visual
interdev
all the above
D
all the above
B
templates
add-ins
A
C
available in the tool bar B
C
any of the above
when the slide
show is run
none of the above
C
header files
all the above
A
both a and b
none of the above
B
properties pane
outline pane
D
paint shop pro
power point 2000
D
contains sample
presentations for a provides suggested
content and design
variety of topics
user can insert
picture to the
master slide which
gets reflected in all
the slides using
that master slide
in notes pages
view, drag the
slide icon to a
new location
D
user can insert picture
to the title slide which
gets reflected in all the
slides using that title
slide
B
I slide view, drag the
slide icon to a new
location
C
design templates is
the template whose
format and color
scheme user
applies to a
presentation
the slide that holds
the formatted
placeholders for the
title and sub-title for
the presentation is
called a title template D
user should select
the slide view to
add the text to the
slide
the slides can be
reordered in the outline
B
view
design template is
the template whose
format and color
scheme user
applies to a
presentation
the slide that holds
the formatted
placeholders for the
title and subtitle for
the presentation is
called a title template D
new slide
set up show
B
data is plotted in a
chart window
user can add data
labels and gridlines to
the chart
B
the header slide
the format slide
B
grammar checker
none of the above
B
102
22
B
B
four times
text, hypertext, Power
Point, video and
CD-ROM, digital
D
camera and sound. sound.
Line style, Line color,
text font, and text
the Font and the
D
alignment
text alignment
three
Line thickness
Microsoft Graph
is started so that
you can create a
graph.
Fill color, Line color,
and Line thickness
D
The graph placeholder
is deleted.
C
taken from the
first column or
row of data in the
datasheet,
depending on
whether the data
series are in rows
or columns.
entered by the user.
C
Pie chart
Line chart
B
Pull down the Insert
menu and select
Chart, click the Insert
Chart button on the
Pull down the Insert Standard toolbar, or
pull down the Insert
menu and select
menu and select the
the appropriate
D
appropriate Object.
Object.
Pull down the Edit
menu, then select
Object.
You cannot display the
underlying datasheet
once the slide is
finished.
B
Click outside the
chart.
Change to Slide Sorter
view.
C
The datasheet is
saved as a
separate file.
The chart is
doubled in size.
The chart is
doubled in size.
bullet items one
word at a time.
Exciting
The datasheet
window is toggled
from closed to open
(or from open to
closed).
The application that
created the chart is
started.
Microsoft Graph will
restart.
a slide one bullet item
at a time, build bullet
items a letter at a
time, and build bullet
items a word at a
time.
Subtle, Moderate, or
Exciting
D
A
D
D
D
Both enter and
exit, and fly in
from top or
bottom
Neither enter nor exit;
neither fly in from top
nor bottom
C
Alt
Ctrl
B
Custom animation
can be used to affect
the way objects
appear on a slide, to
what objects do after
they appear on a
the way objects exit slide, and to the way
objects exit a slide.
a slide.
D
The advanced
timeline shows
the sequence in
which objects will
appear on the
slide and the
duration of the
effect applied to
each object.
C
Text
Filtering program
Dissolve in
Data cannot be
entered into
Datasheet.
OLST.
The advanced timeline
shows neither the
sequence in which
objects will appear on
the slide, nor the
duration of the effect
applied to each object.
Clips, organization
charts, and text
Animation program
Fly in, From top, and
Dissolve in
D
A
D
There is no such thing
as a Datasheet.
B
OLIP.
B
You cannot change
the style of the
connecting lines in You cannot change the
an Organization
color of the boxes in an
B
chart.
Organization chart.
[Alt+Z]
[Ctrl+Z]
D
.frm
.frx
B
loaditem
none of the above
B
addpicture
File1.Path =
Dir1.Path
none of the above
B
none of the above
B
msgbox()
File1.Path =
Dir1.Path
none of the above
C
recordcount
count
C
addnew
additem
C
additem
addnew
B
moveprevious
movefirst
C
File1.pattern=Dir1.path C
UnloadMode
parameter to a non- UnloadMode parameter
A
zero value
to a zero value
Office 97
Back Office
A
drag & drop
none of the above
A
select
ctr+end and
ctr+home
web layout, page
layout
none of the above
A
none of the above
B
none of the above
A
click from start
program, MSWord
from the task menu none of the above
A
document assistant none of the above
A
Icon Tip
A
Document Tip
ruler
none of the above
home and end keys
up and down arrow
only
B
D
decimal
rotation
D
dialogs/alerts
none of the above
B
both A and B
design wizard
none of the above
pictures
C
A
database
0
print preview from
the file
forms
11
A
A
none of the above
A
style box
none of the above
A
ctrl+f
ctrl+f
ctrl+m
ctrl+m
A
D
CTRL+SHIFT+S
CTRL+SHIFT+P
A
ctrl+shift+s
ctrl+shift+p
C
Both
None of the above
B
A
B
Limit Check
Reasonableness
D
A or B
ODBC
This involves
looking at a
system and
finding out how
information is
being handled
None of the above
All of the above
B
C
None of above
C
Maintenance,
reliability, and
upgradeability
To maintain
security
None of above
B
D
Saved to the disk
None of the above
Transferred from the
disk
Users operate the
manual system
None of above
B
Users continue
operating the old
system
None of above
User Guide and
technical
documentation
None of above
User guides cover
how to run the
system, enter
data, save, print,
etc.
None of above
Database systems
and backup
services
None of the above
A
A
C
C
A
floppy disk
Hard disk
To help someone
who is applying for
employment
None of the above
B
Address bus
TED
Control Bus
MAD
A
B
Address bus
Control Bus
D
B
Data structures that
Shells, compilers and
are part of the
other useful system
kernel of an
D
operating system. programs.
decimal form
represented 256
characters
16 bits
alphanumeric form
represented 127
characters
32 bits
A
230 bytes
1024 bytes
A
A
A
32 Mb of RAM
is the first bit in a
byte
DRAM
bytes
secondary storage
capacity
a 32-bit bus or 32-bit
registers
D
is the last bit in a byte
B
CROM
Hertz
secondary storage
access time
A
D
have medium clock use variable size
instructions
speeds
B
D
Logic Bus
A
All of the above
a modem interface
laser printer.
D
B
D
is used for cache
memory
B
none of the previous
C
contains a
microprocessor
none of the previous
C
B
writing programs in
multiple languages none of the previous
A
writing programs in
multiple languages none of the previous
D
Variables
Logic Bus
B
CD-ROM
e-mail
D
to run more than
one program at
the same time
multiuser
none of the above
none of the previous
C
C
PAGELAYOUT
ONLINE DOCUMENT
A
Variables
Data is not saved
before computer is
shut down
printer interface
ink-jet printer
stores more
information than
RAM
provides backup
power in the
event of a power
cut
is an access card
for a security
system
SSGA displays
ctrl+end
ctrl+home
B
ctrl+x or ins
ctrl+v or Del
A
ctrl+1
none of the above
B
AutoShape
Border
A
Page Layout
none of the above
A
Auto Shapes
File
A
WordArt
Bullets
D
remove
circle bullet dialog
box
clear all
D
none dialog box
A
AutoShapes
files
C
new document
default document
B
mail merge
shift+f8
none of t he above
tools+spelling menu
A
A
first row
last cell of the t able
A
enter
table auto format
option
none of the above
A
none of the above
A
records
none of the above
B
style gallery
none of the above
A
Data Source
vj++
none of the above
visual FoxPro
B
B
alt+f8
alt+f5
A
browser
none of the above
A
micro soft outlook
hotmail
A
sgml
vb script
A
arpanet
LAN
A
field names in the
header source
must match any
merge fields you've
inserted in the main
document
the number of fields
names in the header
source must be the
same as the number of
data fields in the data
B
source
by default cell
height and weight
option applies to
all the rows and
columns of a
table
justified
delete cells option
allows to delete the
entire row or a column
or shift cells up or shifts
C
cells left
A
top
If a header is
inserted in the
second section
then the same
header is
applicable to the
first section
A section is a portion
of a document in
which certain page
formatting option can
be set
D
A
A
A
Double Click
none of the above
automatically
corrects the
grammatically
errors
with t he caps lock key
accidentally turned on
reverses the case of
the letters that were
capitalized incorrectly
and then turns off the
caps lock
B
A
B
password are not
case sensitive
hanging
password can be upto
15 characters long
top
B
A
a multiple
documents files
can be inserted in
the single
document
an .xls data can not be
inserted at specified
position in the current
document
B
A
A
B
A
Hyperlink
Document
none of the above
A
Outline Layout
none of the above
B
Remove
none of the above
A
press the escape
key
height and width
just keep typing
rows and columns
D
D
backspace/ delete
shift
B
thesaurus
outliner
C
send private
messages to a
friend
send a package to a
friend
D
Page setup
Print preview
B
Retrieve
spacing
Save
sorting
C
B
word processing
spreadsheet
C
Storing information None of the above
B
clip art
C
clipboard
B
Storing information Making Calculations
Cut, copy, paste
Font, Paragraph, Bullet
C
and clear
and Numbering
Text which appear
at the top of every Designated area on the
C
page
document
Monitor, keyboard
and mouse
None of the above
B
microphone
Cut, copy, paste
and clear
digital scanner
D
None of the above
C
15 point
25 point
B
3 inches.
impossible to
determine.
B
You have not
specified
continuous section
breaks.
Word cannot display
columns during editing;
you will see them only
when you print the
A
document.
to move a section
of text from the
original location to
another location
A set of different
graphics
to leave an original
section of text in
place while pasting a
copy elsewhere
D
None of the above
B
Grammar Checker Find and Replace
B
Select all
AutoCorrect
B
Delete, then paste
Insert, then paste
A
To complicate the
revision process
and to force the
author to spend
more time making
corrections
To allow multiple
people to work on one
document in
collaboration with one
another
C
A vertical line
outside the left
margin signifies a
change has been
made at that point
in the document.
Comments are
enclosed in a text box
at the right of the
D
document.
Through tools on
the Reviewing
toolbar
Both through the
Tools menu and the
Reviewing toolbar
The Versions
command will allow
you to save only
one version of a
document without
any changes that
were just made to
the document.
The Versions command
will allow you to save
only two versions of a
document: one version
of the original and one
version of any changes
made to the document. A
The first and
second versions
are opened
automatically.
The previous version is
opened automatically. B
Spell check
Thesaurus
D
A
Word will show the
name of the person Word is not able to tell
who saved each
the most recent version
A
version.
of a document.
Forms
Insert
C
Text fields
Comments can be
edited or deleted
by right clicking
the highlighted
text.
A drop-down list
B
Comments can be
edited or deleted by left
clicking the highlighted
C
text.
Text which appear
at the top of every
page
None of the above
C
Copy and paste.
Insert page break.
D
forms.
numbers.
C
find/search.
Format Painter
button
macro.
This action is not
possible.
A
ss
Debugging
D
Format
Edit
C
the guidelines used
to establish where
different elements
of the newsletter
will go.
underlining the text
of the pull quote.
an enlarged capital
letter at the beginning
of a paragraph.
A
changing the color.
A
C
A dropped cap is a A grid is a set of
word that starts
horizontal and vertical
with a lowercase
lines that determine the
letter when it
placement of elements
should have a
in a newsletter or other
D
capital letter.
document.
The number of
columns
The tab spacing
within each column
D
12
72
D
Three
Press Enter to
create a section
break.
A serif font at 20
points
Four
B
4 inches
Press Shift+Enter to
C
force a line break.
A sans serif font at 45
D
points
It depends on the left
and right margins,
and how many
columns are
D
specified.
Both
None of the above
A
A or B
None of the Above
A
Gaps
All of the above
C
Merge
None of the above
A
HLOOKUP()
None of the above
B
A
A
A or B
duplicates testing
None of the above
All of the above
C
D
A
A
Range
Both B & C
B
a form of VRAM
none of the previous
involves using more
than one processor at
the same time
D
multiuser
D
make a backup
copy
use a virus protection
program
to print sheets of
paper
uses C++
1012 sec
to display information or
B
pictures on a screen
D
none of the previous.
D
109 sec
B
a message pad
an instruction that has
the address of a
been transferred from
memory location
memory.
an instruction that has
the address of a
been transferred from
memory location
memory
the address of the next
an instruction that instruction to be
has been executed executed
B
a light pen
a magic marker
A
Program
Data
B
Parity Checker
Validation
B
B
use find and replace
A
System
Modem
B
keep a record of
computer failures
backup to a secure
medium
D
Multiprogramming
Multiplexing
D
Floppy Disk
Magnetic Disk
B
a frog
Artificial
Intelligence
Range checking
use the backup
facility
C
A
D
Telephone modem Shareware
C
Telephone modem Shareware
A
Indexed
Random
C
CPU
Primary Storage
B
Files and Tracks
Schema and
subschema
A
File, record, field
Element, field, file
C
Systems logs
Parity check
C
MIDI interface
Serial interface
A
Sound
Video
D
Ink-jet
Drum
B
presenting an order
for stock to a
warehouse.
updated regularly
recording current stock
in a supermarket and
answering customer
A
queries.
C
updated once a year
Graphics package
Spreadsheet
retain confidentiality
of files
simplify file structures
4096
8192
virus infection
loss of data
IPX/SPX
printer can do
1000s of pages a
day
the root directory
uninterruptable
power supply
NetBEUI
D
C
C
D
A
the operating system is
B
easy to use
D
the hard drive
uniform page source
C
the system requires
a network
the system always
administrator to
requires a re-boot and
uninstall it
defrag afterwards
A
information.
text.
A
Logical Steps in
any language
None of the above
A
It is mandatory in
tally
None of the bove
prevent
unauthorised
access
allow encryption
IT understands the
business
None of the above
A
C
B
processing.
All of the above
D
Software that
generates
innovated designs
and artistic
patterns.
None of the above
A
enterprise
local
B
identify the file type
All of the above are
corrective controls. parts of IS controls.
dynamic hashing
extensible hashing
D
C: (a), (b), (c)
detective controls
D: (b), (c), (d)
general controls
C
C
Settings
Control
B
(a) to (d)
Select the „Shut
Down‟ option from
a menu.
(a), (b), (c)
Pull the power cord
from the back of the
computer.
C
Use the Find or
Search feature.
Put your hand up and
ask the teacher
C
(a) to (d)
(b), (c), (d)
C
identify the file
D
A
C
preventive controls corrective controls
C
(a) to (d)
program change
requests
(b), (c), (d)
C
resolution procedures
C
thread testing
loop testing
A
(a), (b), (c)
(a) to (d)
D
parallel operations
system walkthroughs
B
Concentrator.
Job control language.
D
(a), (b), (c)
(a), (c), (d)
Physical security of
warehouse
Cross-training of
facilities.
operating personnel.
A
procedural design
Computer network
Mesh
data design
Hub
Ring
A
C
A
Ring
All of the above
D
B
To help someone
who is applying for To Store data in an
employment
organised manner
B
Binary
B
Indexed
Operating systems
and compilers.
Computer operations. C
A direct access file A direct access file on a
C
on a disk
tape
Information formats
commonly vary
between
Data record can never
architectures
be blocked together
Address calculation
part
Input output channel
C
Wide area network Protocol
B
A
Generally require a
keyboard for data
entry and a CRT for
display
Are required with a
microprocessor which
permits some data
processing such as
input validation
Multiplexor
Time sharing computer C
Packs data in a
disk file
Speeds up online
printing
A
Loop Network
Star Network
D
Electronic mailing
Instant post-office
C
A personal
computer
A mainframe PC
B
Parity checks
Communication
protocol
All of them
Device interconnect
standard
C
D
D
A compiler is a
general purpose
language providing
very efficient
execution
None of the above
B
Lexical analysis,
CONVERSION,
and code
generation
None of the above
D
ASCII
EBCDIC
A
An interpreter is a
general purpose
language providing
very efficient
execution
None of the above
Frequency division Time Division
multiplexor
Multiplexor
Low-level
languages
None of the above
It is less prone to
attenuation
Uses only one path
A
C
C
D
Accounting
systems,
commercial sector
None of the above
C
Relieve the main
CPU of repetitive
communication
tasks
Reduce competition
between the
input/output devices
C
Testing
None of the above
B
Common carrier
Telephone Lines
C
System Analysis
involves creating a
formal model of the
problem to be
solved
None of the above
C
A buffer
Hardware,
Software and size
of program.
An online protocol
B
None of the above
B
Ring
Bus
B
1010101
None of the above
C
Cyclic Redundancy Hash Count
A
64
None of the above
A
Multiplexor
97
Acoustic coupler
None of the above
C
B
Data management
systems
All of them
secondary storage secondary storage
capacity
access time
B
B
256
None of the above
B
decimal form
alphanumeric form
A
5C4
16 bits
None of the above
32 bits
A
B
Bit Code Design
210 bits
1110
None of the above
210 bytes
None of the above
D
A
A
decimal form
Numeric Keypad
is the first bit in a
byte
alphanumeric form
None of the above
A
A
is the last bit in a byte
B
It has ears
bytes
None of the above
Hertz
D
D
Joystick
MHz
None of the above
VLSI
C
B
Reading bar codes None of the above
B
barcode scanning
voice recognition
B
CD-ROM drive
provides backup
power in the event
of a power cut
Light sensitive
elements
5 Mb
None of the above
A
none of the previous
C
None of the above
1 Gb
C
B
output
Numeric Keypad
input
Printer
A
B
Joystick
Scanner
C
Reading Bar Codes Digital Signatures
B
Keyboard
Optical mark
reader
Speakers
Storing information
on the hard disk
CD ROM Drive
A
Keyboard
Printer
B
A
Pixies
Pointing device
Optical mark
reader
SSGA displays
Pickers
CD-ROM
keyboard layout
Optical mark
reader
software interface
Back-up on a Cartridge B
None of the above
none of the previous
word processing
software
None of the above
an operating system
B
A
B
C
B
C
Smart card
None of the above
writing programs in
multiple languages none of the previous
writing programs in
multiple languages
To run more than
one program at the
same time
Third - generation
computers.
Multi-user
Param
is due to bad disk
blocks
A
A
none of the previous
B
none of the above
Fifth - generation
computers.
none of the previous
Arjun
C
none of the previous
C
Image Scanning
Technology
B
none of the previous
Thermal Printer
transmitting it
C
A
C
B
An ink pen
None of above
An inked ribbon and
print head
WAN technology
10-12 sec
Unix operating system
10-9 sec
B
D
External file labels
Cross footing tests
C
operating system
pilot project
communication
process
D
D
multiplexing
multitasking
D
micro computers
none of the above
A
central processing
unit
non impact printer
none of the above
none of the above
B
C
Magnetic Ink
Character
Recognition
Technology
converts a program
to machine code
Desk - jet Printer
compressing it
Virtual information
reader & user
system
A
A
C
D
electronic
spreadsheet
none of the above
B
idea processor
none of the above
B
Microsoft exchange none of the above
record
none of the above
B
C
high level language none of the above
B
connector symbol
fazitsu vp200
series
input/output symbol
B
IBM-PC
B
multiplexing
none of the above
D
dummy terminals
dummy servers
A
windows NT
LAN
D
back end
front end
D
back end
distributed
computing
front end
C
centralized
A
dumb processing
data processing
B
two
network database
system
many
relational database
system
A
multiplexing
disk
defragmentation
none of the above
B
disk mirroring
D
D
Module/De-module None of the above
B
constraints
traps
B
multiplexing
Local array of
networks.
thread
none of the above
B
None of the above
client-server
B
C
Integrated Services
Digital network.
None of the above.
C
ARPANET
SQL * plus
None of the above.
all of the above
B
D
GAN
None of the above.
B
Transmission
control
protocol/Internet
protocol
Packets
None of the above.
None of the above.
C
C
Simple Mail
transfer protocol
None of the above.
C
Hyper text
None of the above.
C
Area transfer mode None of the above.
B
Receiver
None of the above.
B
package
system
A
LAN and MAN
Internet
LAN WAN and MAN
Intranet
B
A
None of the above.
C
Integrated Services
Digital Network
Web based
Transport
Protocol
command
numerous alpha
Web based Transaction A
B
Repeaters
D
program
number and alpha