Itt Questions

Published on June 2016 | Categories: Documents | Downloads: 43 | Comments: 0 | Views: 428
of 156
Download PDF   Embed   Report

itt questions

Comments

Content

OPTIONS
A

QUESTIONS
TALLY
The ------ key can be used to select an existing
company from list of companies.
Import and Export of data between Tally and other
programs is possible only through ---------- Program.

F1

ALT+F1

Tally ODBC

Tally IMP

The re-order point is the inventory quantity that trigger
TRUE
a stock replishment activity.
A created company's detail can be modified through
keys
F3
A/An ------------- is the official notice that the firm sends
to its customers to advise then to the amount of money
that is owed.
Invoice
In tally,all masters have ________main options
In tally,to create a new column in balance sheet press
_______
In tally,the use of group behaves like a sub-ledger,
option is that we can summarize many ledger accounts
into one line statements
In tally, we can alter ledger details using either single
or multiple modes but not alble to delete a ledger from
multiple modes.
In tally,a group company is marked with an
______________
The systems that work together to order,receive, and
pay for replenishment of stock are --------------Tally allows to delete a ledger from --------- alteration
mode.
--------------------- is/are useful for management in the
decision making.
In tally,the group company must contain at least
_____________ members
To cancel a vourcher entry in Tally, short-cut key is ---------The accounting masters and inventory masters related
to
We press ------------- function key to display the agewise analysis of Bills Receivable or Bills Payable report
In Tally, we press ------------, to print report .
In Tally, Types of Accounts and Types of Vouchers
passed during the period, can be seen in ------------report.
In the Tally Software, the ------------ directory stores all
data entered by the user.

B

false
ALT+F3

Bill

Two

Three

Ctrl+C

Alt+C

TRUE

FALSE

TRUE

FALSE

*

$

Puchasing and
Accounts payable

Puchasing and
Receiving

Single
Cash Flow
Statements

Multiple
Fund Flow
Statements

Two

Three

Alt+D

Alt+X

Create Information

Alter Information

F4
Alt+P

F5
Ctrl+P

Tally Audit

Statistics

Bin

Data

The Ledger Accounts are unique in Financial
Accounting Packages
Customers can be permitted to enter their own data
into the firm‟s computer using the firm‟s wide area
network is an example of
In Tally, we can customize the Vouchers as per our
requirements
The number of steps in Accounts Compilation are
Each action/transaction of a firm is described by a ---------------.
Tally is based on mercantile accounting system

True

False

Enterprise Data
Interchange

Enterprise Data Information

TRUE
2

FALSE
3

data element
FALSE
Display stock
valuation method

data record
TRUE

Ledgers
Personal
Manual
Balance Sheet

Groups
Nominal
Automatic
Profit & Loss

Journal

Stock Journal

A --------- purchase orders data flow is directed to the
purchasing system for use in closing out the
outstanding purchase orders in the receiving system
diagram.

Filled

Receipt

Tally provides at least --------- predefined voucher
formats

11

16

The value of the inventory is included in a ledger
accounts as an asset on the balance sheet

FALSE

TRUE

Ctrl + N is used to ----------------------- in Tally classify the accounts under different
heads so that summarised information is possible.
Revenue Account also known as -------------- Account
Method of Voucher Numbering is/are
Accounts Receivable are displayed in
To assemble a product from different items -------------entry is used

Open Calculator

" The buyers can follow up with the suppliers to
management by
determine the reasons " is an example of ----------------- objective
From voucher entry mode , if we press __________
then we get payment voucher in tally
F4

management by
exception

Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify
given to the merged accounts member companies of
the group.
A ----------- is a primary document for recording all
financial transactions.
The field can have a value between
________________ in FA Package.
The _______ file maintains data that describes the
supplier past transaction with the firm in terms of
material quality in AIS

Main Location

Primary

True

False

Ledgers

Reports

0 to 9

1 to 100

Supplier

Suspense

F5

It is necessary to manipulate data to transform it into --------------In tally, to change the date of the voucher press
______
Tally can maintain budgets on ---------------The value of the inventory is included as an asset on
the balance sheet
In ratio analysis report of Tally FA packagewe we
press ________________ function key to the display
of bills receivable , bills payables report
The accounts payable system is responsible for paying
the suppliers for the ----------------What is the default financial year in Tally6.3
_________________
Tally encrypts and stores TALLY DATA at the data
directory
The Profit & Loss statement can be displayed in --------------- format(s).

Default ledger accounts in tally are ______
Default 'godown' name in tally is ____________
'Tally vault' is a _________________
To create a sales voucher in tally , you have to press
_______
A Group Company is ------------------------- given to the
merged accounts of member companies of the group.
In tally,"credit note" voucher type records entry for
________________
In tally you get currency symbol option from _______
menu
------------------ gives the balance for each day for the
voucher type has been selected.
For 'stock journal' entry we press ______________ in
tally
Tally provides the capability to the
administrator/auditor to track changes in the areas
is/are
In tally, types of users are _______________

Report

Output

F2
Net Transactions

F4
Closing Balance

True

False

F6 function key

Alt + f6 function key

Purchases
1-4-1996 to 31-31-4-1995 to 31-3-1996 1997
Sales

True

False

Horizontal

Vertical

Balance sheet & profit
& loss profit & loss
Profit & loss and trial
and trial balance
balance
Main location
Primary
Security mechanism Ledger a/c
F5

F7

a name

an identity

Sales return

Purchase return

Company creation

Stock items units

Trial Balance

Daybook

F7
Changes in
transactions or
vouchers
2

Alt + F7

By pressing -------- key, a list of inventory reports can
be displayed straightaway from the balace sheet report F9
Projected approximation of income or expenses is
called ______________ .
Balance sheet
"Administrator" type user is also called 'Auditor' of a
TRUE
company in Tally

Changes in Ledger
Masters
3

F10
Profit & loss a/c
FALSE

You will get company information , if you press
__________ from gateway of tally
A constituent(member) company can be a member of
more than one group.
Default stock category in tally is ______
To create a log of the import activity in a file
_____________ is located in the same directory as an
executable program in tally
In Tally,inventory valuation method option is available
from _______
Tally audit feature is available in a company
__________________
In tally, a group company can also be a
constituent(member) of another group company
Default number of groups in tally are ________
During voucher entry ------------- are used.
User designated as --------------- can view audit list.

F3

Ctrl+F3

TRUE
Main location

FALSE
Primary

Tally.imp

Tally.ini

Stock summary

Stock journal

By pressing F11
function key

During the creation
of a company

TRUE
128
Ledger Accounts
Administrator

FALSE
228
Groups
Owner

One company to
another company
created withon Tally
Package

Other programs - a
spreadsheet or a
database file.

Tally supports Importing of data from ---------------In an accounting information system, which of the
following types of computer files most likely would be a Inventory
subsidiary.
master file?

Cash disbursements.

Which of the following is an advantage of a computer- Does not require as
based system for transaction processing over a
stringent a set of
manual system? A computer-based system:
internal controls.

The memory address register is used to store

Will produce a more
accurate set of
financial statements.
data that has been
data to be transferred transferred from
to memory
memory

FUNDAMENTALS OF COMPUTER
Inefficient usage of excess computer equipment can
be controlled by

System feasibility
Contingency Planning report

Which of the following is not the component of a CPU

NIC Card

A trailer label is used on a magnetic tape file, it is the
last record and summarises the file. The following is
an information not found in the trailer label
Hard copy is a term used to describe...?
What do the abbreviations VAB stand for
What control would prevent the accidental erasure of
customer information from a magnetic tape

Record Count
Writing on a hard
board
Voice activated
broadcasting
Validity check

VSAT

Identification
Number
Printed output
Voice answer back
Boundary protection

What are the individual dots which make up a picture
on the monitor screen called?
Header label normally include all the following except
the
A daisy wheel is a type of...?
Which approach or technique is a control usually
associated with microcomputers
An impact printer creates characters by using...?
The best security control in a microcomputer
environment is to
What would you NOT use with a flatbed plotter?
What do you need for an ink jet printer?
The greatest control exposure in a microcomputer
environment is the lack of
What do you need for an ink jet printer?
A laser printer does NOT use?
The amount of data that a disk may contain is known
as the disks...?
You can ________ protect a floppy disk.
Information on a hard disk is usually backed-up using
a...?

Coloured spots

Pixels

File Name
Printer

Identification number
Storage device

System Logs
Electrically charged
ink
Restrict physical
access
A pen
A cartridge

Physical Security
An ink pen
Use only
unremovable media
Paper
A drum

Centralised function
Separation of duties for PC acquisition
A cartridge
A drum
A print head
A laser beam
Volume
Read

Size
Write

Magnetic tape
Serial access
medium

PAN drive
Random access
medium

1.44MB

20 GB

Which storage device has the largest capacity in Mb?

A CD-ROM

A floppy disk

Which storage device cannot be erased?
Where should floppy disks be stored?
The contents of these chips are lost when the
computer is switched off?
What are responsible for storing permanent data and
instructions?
Which parts of the computer perform arithmetic
calculations?
What are small high speed memory units used for
storing temporary results?
How many bits of information can each memory cell in
a computer chip hold?

A CD-ROM
By a sunny window

A floppy disk
By magnet objects

ROM chips

RAM chips

RAM chips

ROM chips

ALU

Registers

CPUs

Registers

0 bits

1 bit

What type of computer chips are said to be volatile?

RAM chips

Software can be divided into two areas:
Travel agents use this computer system when
reserving flights

Supercomputer

Magnetic tape is a...?
Hard disks can have a storage capacity in the region
of...?

ROM chips
Systems software
Network software and and application
software
security software
Personal computer

Which computers are used in the weather forecasting
industry?
Vacuum tube based electronic computers are...?
Which generation of computer was developed from
microchips?
Which generation of computer uses more than one
microprocessor?
Which generation of computer developed using
integrated circuits?
Which generation of computer developed using solid
state components?

Notebook computers

Supercomputers

First generation

Second generation

Second generation

First generation

Second generation

Third generation

Second generation

Third generation

Second generation

Third generation

DATABASES
Name three steps involved in developing an
information system
_______ is used for CAAT as database
Generalized audit software perform auditors to
undertake any past records and not concurrent
auditing
Generalized audit software is a file whose capabilities
for verifying processing is logic

Specification,
Programming,
Design, and Testing Design, and Testing
Oracle
ACL

True

False

True

False

CAAT's are computer program and data that auditor
uses as part of the audit procedures to process data if
audit significance contained in an entity information
True
system
CAAT do not contains package programs, purpose
written program, utility programs or system
management programs
yes
Embedded audit routines are sometimes built into an
entity's computer system to provide data for later user
true
by the auditor
SCARF involves embedding audit software modules
within an application system to provide continuous
monitoring

TRUE

false

Concurrent use auditors as the member of the system

TRUE

false

False

no

false

Regular cross system verification may minimize frauds true
Computer security is frequently associated with
true
confidentiality, integrity and authentication
Data reserve engineering process metadata to
document system and abstract business rules and
true
relationship
to determine the
audit objective
The first step for developing CAAT is_________
Using the open database connectivity feature in ACL is can bring the data
directly
______________

false
false

false
review and evaluate
the types of data
can bring the data
indirectly

Computer Assisted Audited Technique involves the
use of computers through "Black Box Approach"
White Box Approach necessary involves expert
knowledge on the part of Auditor

True

False

True

FALSE

change in the method
The transition from manual system to CIS environment of recording
use of accounting
bring dramatic changes including ________________ accounting transaction codes
documents driven
risk driven approach
Auditing with computer necessarily supports the
approach
CAAT involves an Auditors' appreciation of
__________
Widespread end use computing result in unlimited
errors creeping into system going to accept handling,
thereby increasing audit risks
For computerized auditing usage of sophisticated audit
software would be a necessity

hardware and
processing options,
software configuration file data structure

true

false

true
false
the source of data
Important knowledge needed to begin planning the use available to the audit source of data for
organization
of CAAT is _________
material planing
The move towards paperless EDI would eliminate
much of the traditional audit trail, radically changing the
true
nature of audit evidence
false

Computer operation controls are designed to provide
________________

the of by all
concerned

Systems development control, apart from others,
include authorization, approval, testing, implementation
and documentation of new systems software and
true
system software modification
A system could be _________
A system exhibits 'entropy'
Super computer are the largest and fastest and is very
suitable for commercial application including audit
work
Assembler language uses Mnemonic symbols
Operating systems are devised to optimize the
machine capabilities, the function
include_______________
General purpose software provides a framework for
highly complex scientific operation
In batch processing, transactions are processed one
after another
The use of computer assisted audit techniques is not
gaining popularity not only ________________

providing access to
computer to all
organization
personnel

false

natural/man-made
true

open/closed
false

true
true

false
false

scheduled jobs

manage hardware &
software resources

true

false

true
with audit
departments

false
with production
departments

On-line processing refers to grouping of transaction
and processing the same in one go from start to finish
Real time refers to the technique of updating files with
transaction data immediately after the occurrence of
the event to which it relates
In OLRT the CPU should process the capability of
program interruption
Time sharing system allow access to a CPU from
remote terminals
DSS is defined as a system that provides tools to
managers to assist them in solving structured
problems
DSS has the following components
_________________
Master files contains current records for identification
and summarizing
Transaction files contain relatively permanent records
take product profile, customer profile, employee profile
etc
Master file configuration includes ____________
______ is a file management software package that
lets users and programmers organize data into files
and then process those files
CAATS provide added value to the clients because
_______________
File volatility refers to the number of addition and
deletions to the file in a given period of time
File activity is the proportion of transaction file records
that are actually used and accessed in a given
processing run:
File interrogation refers to the _____ of information
from a file
One -to-one relationship means a single entity to a
single entity in a monogamous structure
RDBMS is structured to a series of 2 dimensional
tables
SADB stands for ____________
Controls are present over many aspects of the
computer system and its surrounding social
environment
In framed checking the data entry is checked against
an expected picture or format
Errors are correlated_________
Field check is exclusive to a field

true

false

true

false

true

false

true

false

true

false

databases

planning language

true

false

true
reference files

false
table files

filex

file-o-man

to have a complete
picture of a system

decentralized picture
of a system

true

false

true

false

back-ups

retrieval

true

false

true
seriously affected
database

false
subject area
database

true

false

true
at the year end
true

false
immediately
false

_________ law basically states that there is a specific
probability of the first digit of a no. being 1,2,3 etc
Check digit is a group of nos. added to a code for
determining the accuracy of other digits in the code

Hierarchical code means _________
The validation checks applied to a field depend on the
field's logical inter relationships with other fields in the
record
The contents of a field could determine _______ sign
for a ______ field
Batch is the process of ______ together _____ that
bear some type of relationship to one another
Hash totals means meaningless totals
With OLRT where interactive data entry is available,
the master file associated with a transaction may be
searched for confirming data

Benfish

Benford

true

false
blocks of nos. to the
primary attribute of
the the entity

consecutive nos. or
alphabets to entities

TRUE

false

valid, numeric
grouping,
transaction
true

invalid, alphabetic

true

false

Controls are required for authorization to ensure data
true
integrity and detect possible breaches in security
Data from client application are not stored in the
organization's database through auditables events and
function
true
All input records in a batch are normally of different
types
true

regrouping, events
false

false

false

incremental design
and enlarge activity

false
interactive data
extraction and
analysis

true

false

true

false

true

false

Internal tables are stored tables from which certain
values are extracted for further processing and storing true

false

IDEA stands for
_________________________________
A transaction file is sorted prior to the update of master
file
A sequence check on the transaction or master files by
an update program is not required
Whenever monetary transactions are processed
against master files, the update program should
maintain a correlation account to record such
transaction that does not have a matching master file
record

For small to medium sized systems, individual
modules are coded and individually tested and then
assembled to be tested as a whole-the testing strategy
is referred to as ___________________
e-brain
In systems testing, test involves_________________ bottom up tests
Recording transactions in a controlled manner may
amount to loss of stored data
yes

bouncing ball
top-down tests
no

read data on client's
Audit software is used by the auditor to _________
file
Core image comparison is a software used by the
auditor to compare _______ version of a program with
executables, master
a secure ________ copy
Database analyzer is a software which provides
detailed information concerning the operation of the
true
database
system analysis
software
SAS stands for ______________
Embedded code is a software used by the auditor to
examine backup data
true
Embedded code performs wide variety of audit task
Core image comparison is particularly useful where
only executable versions are distributed
Log analysis is a software used by auditor to detect
virus
On line testing techniques the auditor ______ data
either _______ or fictitious in order to see that a
specific program or sever edit test is doing its work
Mapping software is used by the auditor to list unused
program instructions
Mapping software has very objectives

Modeling is a variety of software which
________________
On line testing can be targeted for specific functions
carried out by programs

Program code analysis involves _____________
__________ is a software of CAAT
Snapshot is software which takes a picture of a file or
data or a transaction passing though the system

Base case system evaluation includes____________
While base testing forces on finding if there are any
defective execution policies in a program

provide information to
the audit

deleted, hard

false
system advanced
software
false

yes

no

true

false

true

false

manipulates, real

create, false

true
yes

false
no

can be very powerful
analytical tool

can enable the auditor
to execute provisions
on a number of
different bases

yes

no

provides detailed
information of
machine uses
IDEA

identifies program
code which may be
there for fraudulent
reason
ACL

true
fictitious data
applied against the
client program

false
comparison of source
version of a
programmed

TRUE

false

Black box testing seeks to determine whether
application output is what it is supposed to be
In integrated test facility approach the auditor should
ensure that the impact of test transaction is
subsequently eliminated from the computer files
Black box testing is _______ based and white box
testing is _______ based
Source code review means__________

true

false

true
specification,
program
identifying erroneous
code

false

In formula in flow hypothesis the auditor should expand
the extent of substantive tests to determine how the
defects may impact the attainment of the program
true
objectives
All material application oriented events that occur
within the boundary subsystem should be recorded in
true
the accounting audit trail
In examination of audit trail the following data
associated with an event may be ___________start and finish time
JCL means_________________
Audit should be periodically analyzed to detect any
control weakness of the system

Specializes audit program may be___________
Generalised audit software could be used by the
following in consistencies or significant fluctuations

false

false
authentication of
information support
job connectivity
job control language language
yes

no

In an accounting audit trail, intrusion detection system
might monitor the amount of processor time consumed
by the user to detect unusual deviation from the
amount processor time requested by the user in the
true
past
A sample size calculator program assists auditors in
determining RAND() function
true

Generalized audit software consists ___________

file, hardware
identifying ineffective
code

false
false

package computer
p[program for
performing a variety
of data processing
function
mathematical concept

prepared by the
auditor
TRUE

Generalized audit software function
file
include____________
access/organizations
In the file reorganization merging capabilities are
needed in data from separate file is to be combined on
a separate work file
TRUE

prepared by the entity
false
statistical/arithmetic
operation

false

Auditors cannot use generalised audit software to
extract the data needed for audit purpose
Auditors can combine functional capabilities of
generalized audit software to accomplish the task of
__________________
Which of the following is not the feature of GAPs
Which is the example of CAATs
In audit procedures, test data is

Which of the following is not the use of CAATs
Which of the following are called explicitly by another
procedure?
_________ data type is generally used for fields
assigned as primary keys in a table
MS access objects can be published in the web
In code-builder, got_focuse, click,dbl_click,enter are
examples of _______
_______can be used to automate certain actions in
response to events
In the macro sheet the macro is selected in the
_____field
To build complex expressions_____is used
The three list boxes present at the bottom of the
expression builder are called_____
________option is selected from the view menu to
create macros with conditions
_______report can be created with minimum user
input

true

false

examining the quality
of system process
Wide access to
various data base
ACL
A sample of
transactions

carrying analytical
review
Can extract and
analyse data
IDEA
A utility software
programme

Tests of details of
transactions

Analytical review
procedures

Macros

Action Procedures

integer
true

number
false

actions

events

report

form

macro

expression elements

calculator

code builder

action list

macro list

conditions

action

tabular

columnar

_______layout of a form displays one record at a time tabular
The table or query name on which we are going to
build our report is selected from the ____ dialogue box create report
columnar and
______and_____are the two types of auto reports
tabular
available
There are no wizards for creating a database in access
______option from the insert menu option is chosen to
add an embedded chart
In ms-access, while using SQL, references constraint
is used for creating _______
_______is used to create a mailing label

columnar

link report
stable and unstable

true

false

create fields

add chart

primary key
label wizard

alternate key
chart wizard

______header is present at the beginning of the report start header

group header

______is present at the bottom of each page in a
report

report footer

In SQL, having clause is used for _________
for ordering records
______field is added to the macro sheet when we
select grouping option from the view menu
condition
______can be used to create toolbars
VB Modules
_______query is used to add records from one or
more tables into an existing table
add
_______window is used to write VB code in access
application
report
Values for other tables, queries are maintained in look
true
up fields data type
RAD
Visual Basic language is a _____ tool
______ function is used to display a message box
SysCmd
Other ms-office applications can be accessed from msOLE
access using a concept called ________
object linking and
embedding
OLE stands for_____
The application that supplies data in OLE is called an
_________
OLE object
If any change made on the object from the client side
is reflected on the server then the object is said to be
linked
_____
_______is the file format that works on internet
exe
______ is used to convert any ms-access object into
html format
form wizard
_______ option in publish to web wizard produces a
page that is static in nature
static file
_______query is used to create or change database
append
objects in a current database
Currency fields express the amount in _________
_______is selected from the toolbar to add an OLE
object
To display an OLE object in the form of an icon ____
option is selected from insert object dialogue box
_______option from the file menu is selected to run
'publish to the web wizard'
_____page in an web application is used to navigate to
the rest of the pages in the application
______ is fired when an event is triggered is the
concept based on a Visual Basic language
Ms access is a ___________
A collection of data stored in different objects is known
as a _________

page footer

for updating records
group
reports
append
macro sheet
false
RAP
MsgBox
DDE
on line execution
OLE client

embedded
DLL
report wizard
static html
add

dollars

rupees

unbound object

bound object

display as icon

display

create html

new

startup

home

bullet
DBMS

command
RDBMS

data group

data collection

A blank database can be created using __________

new dialog box

new blank database
dialog box

Text type data can be of _____ characters in ACCESS 255

64000

______is a datatype that assigns values automatically
Tables cannot be imported from other databases
If two tables having same values for the fields are
joined it is called an ______
Duplication of records in a field won't be allowed if the
fields are declared a________

automatic number
true

AutoNumber
false

inner join

outer join

primary key

not null

Changes from a master table can be reflected on to
the child table by selecting _____option
To see more than one record at a time in a form we
use _______
In SQL, delete command is used to remove
_________
In MS-Access, filter excluding selection will display
only those record(s) which meet the criteria.
Properties of the fields are managed by _____ in
Dynaset
______queries allows us to view data in row by column
manner
The type of queries that can update or delete record(s)
in a table(s) are called __________
Joining tables without any matching values in the fields
is called ____________
Primary key uniquely identifies each record
Which of the following dialog box is/are used in the
creation of form ________
_______ query wizards are used to generate summary
calculations for a table
Properties of a form can be changed by selecting
______from view menu options
Forms that are included in other forms are called
______________

cascade delete
related records

cascade change
related records

columnar

tabular

table or tables

query or queries

true

false

property field

field property

crosstab queries

row/column queries

action queries

row/column queries

inner join
true
new form dialog box

self join
false
form create dialog
box

summary

sum

change properties

properties

included form

sub form

Record Navigation

Record Operations

In MS-Access, while using form design view, for
creating a command button for adding a new record,
we should select the _______ category from the
command button wizard

_______ form displays fields in a single horizontal row columnar form
The process of arranging the data in a meaningful
order is known as ___________
filtering
______ are used to select only some particular records
filter
from the table or any other database objects

tabular form
ordering

sorts

In MS-Access, user may specify criteria for filter in
form view using _________

filter by form

filter by selection

___wildcard character represents any single character
Records cannot be sorted by a primary key
A control without a data source is known as
___________
Set of related option buttons, check boxes and toggle
buttons is known as _____________
The collection of related data and objects is called a
____________

*
true

$
false

bound control

unbound control

button group

option group

database

form

Which of the following is control types ____________
In MS-Access, the function that gives the current date
is _____________
_____is a control that lists set of data

bound

unbound

CURRDATE()
text box

TODAY()
list box

______is a form that summarize large amount of data
______allows to create a filter by typing the value in a
data sheet

pivot table

columnar form

data sheet filter

filter by input

Wizards for toolbox controls are called a __________
The wild card representation for any 5 letter word that
starts with ram is ________________
Look up fields slow up data entry

button wizard

control wizard

ram*
true

ram??
false

____is an access object that displays un-editable data
_____option from the new object toolbar gives the
easiest way of generating a report
______ represents data in a pictorial format
Changes of one table can be carried over to another
related table
Hyperlinks are used to jump to any kind of information
or data from a file
The memo field can have text upto_____ characters in
length
In MS-Access, columnar layout can be used to view
multiple records in a form
In MS-Access, alter command may be used in adding
a primary key to a table
Update query is used to add records from one or more
tables to the end of an existing table
In ms-access, datasheet view is available in
___________
______are used to jump to any kind of information
from a datasheet or a form
Home page will always be present as a first page of an
application

report

form

autoreport
chart

report
label

true

false

true

false

60,000

255

true

false

true

false

true

false

table

query

table

form

true

false

Make table queries create a new table from the
records of another table
In ms-access, to protect a database file from illegal
access, we may set database password. The option of
setting database password is available in _______
menu
Foreign key is a field that uniquely identifies each
record and accept no null values
Data definition queries are used to create or change
database objects
The attributes of a composite key are known as
________
OLE object is a data type in access
Data displayed in forms cannot be edited
A sub form is used to display one to many relationship
between tables
We can switch from datasheet view to form view by
selecting view -> form view option
In MS-Access long integer is a datatype
In MS-Access, while designing a table for a particular
field, the Required parameter is set to yes. This
validates the field as _______
Sorting is applied to select only some particular
records
Filter by form can be created from a forms shortcut
menu
Advanced filter uses a filter similar to the query design
window to create a filter
? Wildcard character represents any number of
characters
_________ of the following is/are a type of chart
A bound control is tied to a underlying query or table
A calculated control uses expression as a source of
data
Text boxes cannot be bound controls
The default query invoked by ms-access is
A control can be bind to a record using row source
property
List box is a control that offers a list of choices
If a table is joined to itself it is called a
________________
A picture box combines the activities of both a text box
or a list box
Line is a tool box control
Text boxes can be part of a option group
_____ chart exists as a separate object
Filtering data is a way of arranging data in a meaning
full order

true

false

Insert

Records

true

false

true

false

alternate keys
true
true

composite keys
false
false

true

false

true
true

false
false

null

not null

true

false

true

false

true

false

true
pie

false
bar

true

false

true
true
update query

false
false
select query

true
true

false
false

inner join

outer join

true
true
true
freestanding

false
false
false
embedded

true

false

Wild card characters are used for sorting records
Pivot tables are used to navigate to the other tables in
a database
Reports are used to represent un-editable data
In MS -Access, the records in a table are sorted based
on _________
Relationship is an association between _________
Summary options dialog box is used to summarize
data
______ queries can be used to delete a group of
records that meet some specific records
Charts can convert numerical data in a easily
understandable format
Embedded charts exist separately
The chart which cannot exists as a separate entity are
_______________
From ms - access, if we want to view the records
stored in a table in ms - excel worksheet, we need to
Page header is present at the beginning of each
record
Detail section has a header and footer
A macro is performed only when the user initiates an
event
The macro is selected from the action field of a macro
sheet
A macro can be made to execute before the starting of
a database
In MS-Access. While appending records, the source
and the target table must have similar structure and
fields
We can add our own functions to the expression
elements list box of the expression builder
_______is the wildcard character which represents the
presence of any number of characters
Macros can be used to add a menu to a database
object
_____ header is a unique feature of reports
Chart can either be a form or a report
Group header will be present at the design view of a
report even if the report is not grouped
We can change from the design view to the form view
without being prompted for saving the changes made
Charts can be produced without the wizard
Macros can be used to create user defined error
messages

true

false

true
true
the first field of the
table
forms

false
false
the last field of the
table
reports

true

false

delete

insert

true
true

false
false

freestanding

embedded

use hyperlink

use import

true
true

false
false

true

false

true

false

true

false

true

false

true

false

&

#

true
page
true

false
detail
false

true

false

true
true

false
false

true

false

Between and Not Between is ______ type of operators relational

list

The default data type of VB is integer

true

false

Visual Basic is based on __________
_______is the name of the database object that
displays data and can be used to edit data
In access OLE objects cannot be linked

action language

structured query
language

report
true

form
false

_____ section is present for each record in the report group
A ________ sheet lists all the properties that pertain to
the form or the controls
data

record
property

Textboxes can also be an example of unbound control
In MS-Access, we may design command buttons for
navigating records
_______are forms that are included in other forms
_______ are used to represent our data in graphical
format

true

false

true
sub forms

false
child forms

graphs

chart

A field with a _______ uniquely identifies each record
Large amount of data can be summarized using
______ tables
_______ are employed to select only some particular
records from a database object
______ control need not have a data source
______ control combines the functionality of both a
text box and a drop down list
MS access is a DBMS
A form can be bind to a record source using _____
property of the form
______ forms displays field in single row
______ forms are usually used for tables with one to
many relationship
_______ control uses an expression as a source of
control
_______ control is tied to field
_______is the form that can be created with minimum
input from the user
______option from the tool menu is selected for
setting relationships between tables

number

primary key

pivot

create

filters
form

queries
bound

list box
true

combo box
false

form name
tabular form

control
chart form

sub forms

tabular form

calculated
calculated

bound
unbound

sub form

auto form

set relation

connect

______,______and_____are the buttons belonging to
the options group
_________allows us to create a filter from a field short
cut menu
________is a database object which displays data but
cannot be used to edit data

option, toggle and
command buttons

command button,
check and list boxes

filter by form

filter by report

form

report

What term applies to a collection of related records in
a database?
All of the following terms are related to computerized
databases except which one?

What is a database?

What does a record contain?
An RDBMS is a
Data Warehousing refers to
Unauthorised alteration of on-line records can be
prevented by employing

clipboard

file

search

sort

A way to analyse and
manipulate numerical A tool to produce high
information
quality documents
It contains all the
data about one
Information about
specific item
certain programs
remote DBMS
storing data offline at
a separate site
Key verification

relative DBMS
backing up data
regularly
Computer sequence
checks

What is a report?

A way to analyse and
manipulate numerical A tool to produce high
information
qualitydocuments
It contains all the
data about one
Information about
specific item
certain programs
Reports allow users
to extract
Reports provide a
information as hard very flexible way of
copy (printed
creating and editing
output)
documents

What is the best way to analyse and change data

Extracting and
analysing data

Spreadsheets make
data easy to analyse

What are some popular office orientated software
applications?

Compilers,
interpreters, editors

Network software,
backup systems

Which of the following constraints can be used to
enforce the uniqueness of rows in a table?
Which of the following commands is used to change
the structure of table?

DEFAULT and NOT
NULL constraints

FOREIGN KEY
constraints

CHANGE TABLE

MODIFY TABLE

An RDBMS is a

remote DBMS
storing data offline at
a separate site

relative DBMS
backing up data
regularly

What is a database?

What does a record contain?

Data Warehousing refers to

You are creating a client application that calls ActiveX
DLLs. Which of the following properties of the Err
object provides the name of a component that sends
an error back to the client application?

Number

Description

This database holds personal information. The user
can help to keep it confidential by

using a password

keeping a backup
copy

the product code

the primary key

A database

Graphics

bookmarks

operators

Auto Primary

Auto ID

If the database holds customer names and addresses,
personalised letters can be created automatically using
Application software suited to storing the survey
information obtained in the table would be
The characters * and ? are sometimes used in search
criteria as
Which of the following field types will generate the
primary key automatically?

Referential integrity ensures that the:

related tables in a
records in a dynaset database are
are consistent with the consistent with one
another.
underlying tables.

Tables are related to one another through a:

foreign key.

main form and a
subform.

A foreign key is:

the primary key of
both related tables.

the primary key of
the related table.

You are creating a banking database to track customer
loans. The bank will, of course, have many customers,
each of whom may take out one or more loans, while
each loan may be associated with only one customer
(there are no joint accounts). What is the re
One-to-one
In a one-to-many relationship between Companies and
EmployeeID
Employees, which field is found in both tables?
Which of the following ensures that records in related
tables are consistent with one another? For example, it
ensures that you cannot add a record with an invalid
The Tools menu,
foreign key.
Relationship window

How would you delete a relationship between tables in Double click the
the Relationships window?
Relationship line

In a Customers tables, what does a plus sign next to
the CustomerID field mean?

One-to-many
CompanyID

Referential integrity
Right-click the
Relationship line,
then select Delete
from the shortcut
menu

That there are several
customers associated That some of the data
with that ID
is not viewable

What is required of the fields that join two tables?

They must both be
numbers

They cannot be text
fields

Assume a one-to-many relationship between the
Customers table and the Loans table, with referential
integrity in effect. What happens when you attempt to Nothing, Access
The customer‟s ID is
delete a customer ID from the Customer table that still ignores the attempted deleted from the
has entries in the Loans table?
command.
Customers table.

Which of the following is true when viewing a main
form and its associated subform in the Form Design
view?

The subform is not
visible.

Which of the following relationships does not belong in A one-to-many
a database based on a professional sports league
relationship between
such as football or basketball?
teams and players
Which symbol is used at the end of the join line in a
related table to signify the “many” side of a one-tomany relationship?
#

The subform is
displayed in
Datasheet view.

A one-to-many
relationship between
teams and coaches

M

Either table at any
time
prompt, title bar text,
icon.

The Customers table
only when there are
Loan records
associated with that
customer
prompt, icon, title
bar text.

Dim CreateList.

Sub CreateList.

A text field:

A check box enables
the form user to
choose from one of
several existing
entries.
must be set for one
word.

A text field enables
the form user to
choose from one of
several existing
entries.
must be set for
multiple words.

The purpose of a database is to:
A database stores:
A database records:

help people keep
track of things.
data.
facts.

store data in tables.
relationships.
figures.

A sales contact manager used by a salesperson is an
example of _______________

single-user database multiuser database
application
application

You have created a one-to-many relationship with
referential integrity between a Customers table and a
Loans table. From which table can you delete a
record?
The correct order of the arguments for the MsgBox
statement is:
The first statement in a procedure named CreateList
is:

Which of the following is TRUE related to form fields?

A Customer Resource Management (CRM) system is
an example of_________

single-user database multiuser database
application
application

The industry standard supported by all major DBMSs
that allows tables to be joined together is called
__________.

Sequential Query
Language (SQL)

A program whose job is to create, process and
administer databases is called the _____
Microsoft Access may use which of the following
DBMS engines?
Which of the following are basic components of an
enterprise-class database system?

In an enterprise-class database system ________ .
In an enterprise-class database system, the database
application ___ .
In an enterprise-class database system, reports are
created by ____________________ .

A database is considered "self-describing" because
_______ .
In an enterprise-class database system, the database
_________ .
A database may contain
_________________________ .
A database designed using spreadsheets from the
Sales department is a database being designed
_________________________ .
A database designed to implement requirements for a
reporting application needed by the Sales department
is a database being designed _______ .
A database designed to combine two databases used
by the Sales department is a database being designed
_________________________ .
Database professionals use ________________ as
specific data sources for studies and analyses.
Database professionals use a set of principles called
________________ to guide and assess database
design.

Database Modeling
System

Structured Question
Language (SQL)
Database
Management
System

Jet

SQL Server

The user
the database
application(s)
interact(s) with the
DBMS

The database
application

the DBMS accesses
the database data

creates queries

creates form

the user

the database
application

all the users' data is in it reduces data
one place
duplication
holds user data

holds metadata

tables

metadata

from existing data

as a new systems
development project

from existing nondatabase data

as a new systems
development project

from existing data

as a new systems
development project

data marts

normalization

data marts

normalization

A very popular development technique used by
database professionals for database design is known
as _______________________ .
A very popular development technique used by
database professionals to adopt a database design to
new or changing requirement is known as _____ .
The predecessor(s) of database processing was
(were) __________ .

In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to identify
particular rows in a is___ .
A combination of two or more columns used to identify
particular rows in a relation is________ .
A determinant that determines all the other columns in
a relation is______ .
When designing a database, one of the candidate keys
in a relation is selected as the _________ .
Normalization is a process used to deal with which of
the following modification anomalies?
When you are given a set of tables and asked to
create a database to store their data, the first step is to
____ .

Modern microcomputer personal DBMS
products______.

Which of the following are true about data mining
applications?

data marts

normalization

data marts

normalization

file managers

hierarchical models

entities in a column
vary as to kind

the order of the
columns is important

table

relation

record

field

record

field

record

field

composite key

primary key

Insertion anomaly
assess the existing
tables' structure and
content

Update anomaly

are supplied by
several wellestablished
manufacturers
They use
sophisticated
mathematical
techniques.

design the database
structure
were essentially
killed off by MS
Access
Their report delivery is
more difficult than
report delivery for
reporting systems.

We have obtained access to the company's
operational data. We examine 50 records for
customers with phone numbers that should use the
current area code of 345. Of these 50 records, we find
10 that still use an older area code of 567. This is an
example
dirty data

inconsistent data

We have obtained access to the company's
operational data. We have been asked to produce a
report with an item by item analysis of sales, but the
only sales figure available is the total sale value for
each order. This is example of_____

inconsistent data

dirty data

A data warehouse database differs from an operational
database because:
Which of the following objects is used to display a
menu?
Which of the following objects are NOT found in an
Access application?

You are developing an Access application that you
expect to upgrade periodically. Which of the following
statements is TRUE?

data warehouse data
are not stored in
tables.

data warehouse
databases do not
have metadata.

Form

Table

Forms and reports

Queries and tables

It will be easier for
the user to upgrade
It will be easier for the it if the objects are
in one database and
user to upgrade it if
the objects and tables the tables in
are in one database. another.
The Link Tables
command can be
used to associate the
tables in one
database with the
objects in another
database.

Which of the following statements regarding Access
applications is NOT true?
Which of the following brings a copy of the table into
the current database and does not maintain a tie to the
Import
original table?

It contains more than
What makes a database an application?
one table
What is the Access tool that is used to create the user
interface?
Menu Wizard

The purpose of a data warehouse is to:
___________ means the result of applying to specific
information certain specific technical processes.
__________ is an algorithm which creates a digital
representation or "fingerprint" in the form of a "hash
result".
__________ is of standard length which is usually
much smaller than the message but nevertheless
substantially unique to it.
Digital Signature involves two processes. They are
___________ and __________.

An application may
consist of multiple
databases, each with
multiple objects,
linked to yet another
database containing
only tables.

Link
It contains tables,
reports, queries, and
forms
Build Menu

create backups for
mission critical
corporate data.

centralize the
manageability of data
collection.

Digital Sign

Digital Certificate

Hash Function

Digital Signature

Hash Function
Digital Signature
creation

Hash Value
Digital Signature
Verification

The Costs of Digital Signature consists mainly of the
following
CA stands for ________________
A Digital Certificate is issued by a Certification
Authority and is signed with the CA's Private Key
A Digital Certificate does contain Owner's Public Key,
Owner's name, Expiration date of the Private Key,
Serial number of the digital certificate
______________ enable web servers to operate in a
secure mode.
______________ are used by individuals when they
exchange messages with other users or online
services.
______________ are on-line databases of certificates
and other information available for retrieval and use in
verifying digital signatures.

Signing Writings serve the following general
purposes______,_______,_______ and _______
The most widely accepted format for Digital Certificate
is defined by the CCITT X.509
A certificate may prove to be unreliable, such as in
situations where the subscriber misrepresents his
identity to the certification authority
CRL stands for
The prospective signer identified in the digital
certificate holds the_________ and is called the
___________
In EDI interface, the translation service receives
_________ as incoming files from the communication
service
The EDI standardisation for International Trade and
Commerce is introduced by __________

Institutional
Overhead and
Subscriber Relying
Party Cost
Certification
Authority

Subscriber Relying
Party Cost

True

False

True

False

Server Certificate

Developer Certificate

Server Certificate

Developer Certificate

Private Certificate

Repositories

Certified Authority

Evidence, Ceremony,
Approval
Approval, Evidence
True

False

True
Certificate
Revocation List

False
Certificate Resource
List

Private Key,
Subscriber

Public key, Recipient

Internal Format File

External Format File

ANSI

UN/EBCDIC

In EDI, the transmission files are composed of different
sets of external format files which are grouped into
multiple sets under the name of ________
batch files
The ________________ are pre-paid credit cards that
Smart Card
include an embedded cards
________________ are another form of credit
payment that lets customers use digital online cheques
to pay Web merchants directly
E-cash

interchange sets
Embedded cards

Digital Cash

In Active advertisement, there are two types of models. Billboards and Junk
They are _____ and ________
Mail

Online Catalog and
Billboards

The network based technology is/are ____________
Decryption is a process employed for scrambling of
plain text for web based transactions
Asymmetric cryptosystem is based on __________
and ____________

EDI

E-mail

True
Login_Id and
Password

False
Primary Key and
Private Key

Value Added Network is an example of _________

Global Network

Private Network

The advertising strategies emerging in the on-line
world are ____________

Active or push based
advertising

Passive or pull-based
advertising

The _________ model use direct mail, spot television
Broadcast
or cable television, in active based advertisement.
The ________ is a form of mail that is not targeted to a
specific audience
E-mail

Junk mail
Bulk-mail

The __________ model refers to information that is
placed at a point where it will be noticed by customers
in the course of other activities and does not require
active search

Catalog

Endorsement

The most beneficial advantage of ERP system is
What is the term that describes spying on one‟s
business rivals to gain a competitive advantage?

Error checking
Competitive
espionage

Data Integration

What would you NOT be looking for when spying on a
competitor?

A list of competitor‟s
clients

An online drugstore such as Drugstore.com is an
example of_______
Which of the following is an example of unacceptable
online „netiquette‟?

single-user database
application

Which of the following statements is correct
concerning the security of messages in an electronic
data interchange (EDI) system?
The wizard that is used to import text files
is_________________

Replying promptly

Removable drives that
can be locked up at
night provide
adequate security
when the
confidentiality of data
is the primary risk.
text import wizard

Corporate espionage
Contact numbers of
the management
group
multi-user database
application
Keeping messages
short

Message
authentication in EDI
systems performs the
same function as
segregation of duties
in other information
systems.
convert text to
columns wizard

The alphabet indicating the column followed by the row
number is known an__________
Which of the following files could not be opened in
excel _______________
In excel, the dates that are stored as sequential
numbers known as ________________The command to display the current date in a cell is
_________________
In excel, absolute references are represented by a
________ before the column and row addresses
The ________ can be used to select the function and
assemble the arguments correctly
Specific parts of information required by functions to
perform certain tasks are called as___________
Which of the following do not belong to the formula
category in excel environment__________
The function that in used to join cell values together in
a single cell ________
The function that is used to count all the values that
meet specific criteria _________
The wizard that is used to create and edit charts
_______________
The function that is used to calculate the payment for
specific loan terms ____________

cell reference

row reference

text files

Lotus 1-2-3

serial values

domain values

=today()

=date()

dollar sign

' = ' sign

AutoSum

AutoFill

variables

arguments

text

logical

concatenate

pmt

countif

vlookup

pivot table wizard

chart wizard

sumif

pmt

average

sum

page setup

print area

autoformat

AutoFill

bordering

formatting

page setup

print area

filtering

searching

all option

blanks

The URL for encyclopedia Britannica is_________
_______ maps IP addresses with the domain names
of the sites

www.ency.in

www.eb.com

URL

DNS

Internet can be defined as _______
The most important service of the ______ is to
manage traffic control

internal network

network of network

application layer

transport layer

The function that is used to add together all values that
meet specific criteria is known as ____________
The __________ option present in the file menu
options is used to specify major facts of the page to be
printed
The command that is used to apply a format
automatically __________
The ____________ makes the information in a
worksheet meaningful and easy to understand
A particular part of a work sheet can be printed by
setting the _________
The process of finding or selecting information is
known as ____________
The option that is used to cancel the filter process for a
specific column and display all the records is
________

_________is a program that displays information
finger service
about a host connected to the net
_______ is a program or a tool that helps in locating a
file anywhere on the net
FTP
uniform research
locator
URL stands for ____________

ping service
TELNET
uniform resource
locator

IN an URL the word before the color refers to _______
A ______ always begins with a slash
Prodigy is run by IBM and ______
The World Wide Web is referred to shortly as the
_______

host computer
message
Delphi

name of the resource
scheme
Microsoft

net

web

Gopher and WAIS enables the user to ______
______ is the program used to run CompuServe's
regular services
Navigating through the menu of gopher is called
moving around _______
The directories that come with built-in engines are
yahoo,lycos and ______
To use the finger command,SLIP users must run a
programme called______
The web maps are called _______
Directories consists of _______ levels
The _____ level gives the broadcast overview of the
net
The huge list of keywords from important items is
called ______

browser
read the Usenet news
CompuServe internet
dialer
spy mosaic

The two types of search in veronica are _____ and
______
_______ searches by keywords
Mosaic displays links in color whereas _____ does not
display links in color
______ supports one button publish
SPY MOSAIC is distributed by_______
______ is a program that helps us to log on to other
networks

directory search,index index search,menu
search
search
infoseek
excite

HTTP is the acronym for __________
______is used to transfer and copy files over the
internet
_____ is a program that helps us to log on to other
networks

TCP/IP stands for ________________

gophering

gopherspace

Alta vista

open text

finger server
list
no

ftp server
directories
maximum of five

middle

lower

hotlist

directory

netshark
lynx
Microsoft

cello
mosaic
internet

Usenet

finger service

Higher text transfer
protocol

Hyper text
transmission port

iccp

ftp

yahoo

ftp
transmission
control
protocol/internet
protocol

transfer control
protocol/internet

Archie servers can be accessed in_______ different
ways in internet
one
_______is the computer on the internet that translates
between the internet domain names and the internet
numeric address
ftp servers
TIA stands for_____ in internet
Service indicates the name of the ________ used to
access data, present on the other end of the link.
HTTP stands for______
________ is used to link pages in the world wide web

the internet adapter
browser
hotlink text transfer
protocol
universal resource
locator

FAQ stands for ______
frequent asked query
The internet adapter is a programme that makes our
SLIP,PPP
connection act like a _____or a ____ account
The step involved in Communicating between the web
connection
clients and servers is ______________
wide search for
information and
WSIRC stands for______
research
Two of the important browsers are_____ and_____
lynx,minx
Lynx is a _______ programme that works with
terminals
world wide web server
The huge list of keywords from important items is
called an_____
glossary
very easy and rodent
oriented net wide
index to
computerized
archives
VERONICA is an acronym for _______________
The first freenet is created at the_____ and is
called______
________ are defined as ways of communication
amongst networks

______and_____ are web searching features
WINWAIS has two source lists namely____
and______
________ is also called as WAIS manager

HTML stands for_____
The system of interlinked documents is known
as_______

two
domain name
servers
the internet
administration
protocol
hyper text transfer
protocol
uniform resource
locator
frequently asked
question
TCP,IP
response
windows sockets
internets relay chat
netscape,ie
world wide web
client
index

university of
berkeley,berkeley
freenet

very organised
network integration
and communication
application
university of
cleveland,cleveland
freenet

protocols

IP address

search
engines,directories

ftp and finger

allsrc,winsocks
allsrc

wais,allsrc
waisman

higher text medium
language

hyper transfer markup
language

hot links

hyper text

The small programmes that create
animation,multimedia,real-time games and multi user
games are called______
The information displayed on the web page
includes______,_____ and_____
The web pages that represent online home of their
author are called______

applets
images
graphics,videos,audi programms,images,te
o
xt

GNN stands for______
_____ is the most popular internet service

global network news
yahoo service

home page
global networks
navigator
electronic mail

The online service offered by navigator gold 2.0 are
_______ and_____
_______ is a program or a tool that helps us find a file
anywhere on the net
The databases to enable keyword search using Lycos
are a2z,_______
______ is a large worldwide bulletin board service
network

email and net
conference

Netscape page
starter site,netscape
page wizard

newsgroup

telnet

Lycos catalog

point review

apple link
computer related
abbreviations and
acronym
encyclopedia
Britannica
search engines

bitnet

JPEG is the acronym for ___________
The Web aids users to explore the ________
The three most popular mailer are_____,_____
and______

Graphical interpreter
formatting
Joint Pictures Expert
Group
mails
yahoo,infoseek,altavis
ta

Graphical
interchange Format
Jumbled pictures
expert graph
documents

The World Wide Web consists of _________

information

web pages

BABEL consists a glossary of _____
Dictionaries,encyclopaedias,government and other
references are found in ______
Yahoo,lycos,excite and webcrawlers are _____

GIF is the acronym for ____________

first page

In Microsoft Internet Explorer, the color of the text can
be specified using _________ attribute of the font tag. BACKGROUND
The interface that provides effective communication
between the web browsers and servers is _________
CGI is the _________ between web browsers and
servers
CGI programs are invoked based on the information
provided by the _________
A CGI program is usually called after a request made
by the _________

biographical
information
on-line reference
works
web directories

netscape,ie,lynx

COLOR

Communication
gateway interface

Common graphical
Interface

Network

Interface

Current web page

Browser

Browser/user

Server

URL stands for ________
A hyperlink can be on ___________
HTML was derived from _________
SGML is a _________
PINE stands for _____________
The application that confirms whether a document is
compliant to its DTD is _________
Web is a collection of ___________

IETF stands for ________

The two major browsers used to surf the Internet are
________,_______
Special characters allow browsers to display
_________________
The keyword for providing links within or across
documents is____________
Stringing pages together using hypertext technology
helps view pages _______________
The initial web pages present in a web site is the
________ page.
The image format supported by most browsers
is________________.

The components of a URL are ___________

The mail we send has a mailing address and most of
them correspond to_____,_____ and
Which of the following is not supported by internet
explorer _______________

CGI stands for ____________
Host name indicates the domain name of the web
________
The internet is also called as _______________

Unknown resonance
language
text only
SQL
alphalanguage

Uniform resource
locator
image only
PLSQL
betalanguage

palm is not eatable

palm is not elm

SGML Processor
web sites
Internet equipment
training faculty

SGML Preprocessor
images
International
Engineering trainers
and faculty

MS Internet Explorer
and Mosaic

Netscape Navigator
and Mosaic

text

data from a database

hyperlink

hypertext

in random order

in sequential order

first

start

.bmp and .gif

.bmp and .jpeg

Service, hostname
and directory path

service,hostname,p
ort,directory-path

mail servers,mail
clients and alternate
services

mail vendors,mail
identification and
password

<center>

<font size=n>

common gateway
communication
generated information interface
Server
arpanet

The internet is similar to _________________
The net drivers______ from one place to another

LAN
data

Client
the net
peer-to-peer
connectivity
parcel

The net provides interesting services
like______,______ and______

scripting,parsing and
compiling

news,cooking and
fine arts

The windows internet software available
are______,_______,________ and______
________ is the ancestors of the internet

nt,windows95,ie,winzi mosaic,gopher,eudo
ra,trumpnet
p
arpanet
dnet

DARPA stands for
___________________________________________
____
The uuencode files start with a _______

defensive
administrative rank
administration network
start
milnet,smaller
arpanet

DARPA is broken into ________ and _______
NSFNET is the united states provides service to _____
education,research
and_____
Higher text
HTML stands for
manipulation
______________________________________
language
The first international IP network connections were
established in 1973 with _____ and_____
united states and UK
A_____ is a set of computers interconnected by
transmission paths to exchange information in internet server
A computer that provides a service usable by other
computers is called______
client
A_______ is the representation of physical connectivity
of the computers in internet
network card
detailed transaction
DTE stands for ____________________
explanation
The basic function of the ______ is transmitting the
bits over a channel
application layer

dedicated and
registered projects
administration
begin
mailnet,inet
music and dance
Hotlink text markup
language
england,norway

client
stand-alone
network topology
data terminal
equipment
physical layer

point to point network
and broadcast
channel network
file access

packet
switching,store and
forward network
anonymous ftp

PAN,NAN,AAN
VAN
LAN
analog

KAN,RAN,VAN
MAN
MAN
digital

DTD stands for __________

Data type definition

Modem stands for __________________

Moralize/demoralize

Define type of data
Modulation/demodul
ation

______ is the process of the digital signals being
converted into a form suitable for analog transmission

Mapping

Modulation

The point to point channel network is also called as
_____ and_____
Accessing files using FTP servers is called_____
The three most commonly used networks
are______,______ and______
________ is in between LAN and WAN
_____ can be owed by multiple organisation
Data is transmitted in the form of_____ signals

________ and______ are two basic ways of getting
connected to the internet

Dedicated access
and dial up access
Stream line internet
protocol
Point to point
protocol

PPP stands for _____

Satellite link and
digital signals
Standard long internet
protocol
Prime prolonged
protocol

Which of the following best describes uploading
information?

storing data on a disk sending information
to a host computer
drive

SLIP stands for ________________

A characteristic of a communication channel that is the
amount of information that can be passed through it in
a given amount of time, expressed in bits per second.
The act of searching through storage to locate
information without necessarily knowing of the
existence of the information being sought.
A "recipient" of the certificate desiring to rely upon a
Digital Signature created by the subscriber named in
the certificate is called the ____________
The Relying Party can use the ___________ listed in
the certificate to verify that the digital signature was
created with the corresponding _________
Digital Signatures are used for a variety of Electronic
Transactions like ________________________

Bandwidth

Speed

Find

Save

Recipient Party

Relying Party

Public Key

Private Key

E-mail

Electronic Commerce

To associate with a key pair with a prospective signer,
Not False
a Certification Authority issues Digital Certificate

Not True

Digital Signatures, if properly implemented and utilized Closed
offer promising solutions to the problems of Imposters, System,Formal Legal Formal Legal
Message Integrity, __________ and _____________ requirements
Requirements
In, Digital Signature, _____________ perform the
"ceremonial" function of alerting the signer to the fact
that the signer is consummating a transaction with
legal consequences
A Digital Signature must have the following attributes
________________ and _____________
"Hash Function" is used in both creating and verifying
Digital Signature

Affirmative Act

Efficiency
Document
Signer Authentication Authentication
Not True

___________ provides assurance of the origin or
delivery of data in order to protect the sender against
false denial by the recipient that the data has been
received, or to protect the recipient against false denial Nonrepudiation
Service
by the sender that the data was sent.

Not False

Digital signature

___________ serves the ceremonial and approval
functions of a signature and establishes the sense of
having legally consummated a transaction.
________ is a branch of applied mathematics
concerns itself with transforming messages into
seemingly unintelligible forms and back again.
The complementary keys of an asymmetric
cryptosystem for Digital Signatures are arbitarily
termed as _________, and ____________
_______ is known only to the signer and is used to
create the digital signature.
_______ is ordinarily more widely known and is used
by a relying party to verify the digital signature.
____________ is the art of protecting information by
transforming it into an unreadable format.

Affirmative Act

Efficiency

Cryptography

Public Key

Private Key

Public Key

Private Key

Public Key

Private Key

Public Key

Decryption

Cipher

Which of the following activities would most likely
detect computer-related fraud?
Using data encryption.
A digital signature is used primarily to determine that a Unaltered in
transmission.
message is:
Both sender and
receiver must have
the private key
before this
What is a major disadvantage to using a private key to encryption method
will work.
encrypt data?
Which of the following risks can be minimized by
requiring all employees accessing the information
system to use passwords?
The acronym for B2B is ___________
The _____________ model is the least intrusive model
but requires active search on the part of the customer
__________ is / are a form of advertisement where
people relate their experience with products and
services
The _________ are software agents who
communicate with the business merchants on behalf
of the customers
The Pre-purchase preparation phase includes
_______________ for a set of products
The _________ phase includes customer service and
support to address customer complaints , product
returns and products defects

Performing validity
checks.
Not intercepted en
route.
The private key
cannot be broken into
fragments and
distributed to the
receiver.

Collision.
Business-toBusiness

Data entry errors.

Billboard

On-line Catalog

Customer
Endorsements

Billboard

Intermediaries

portals

Order Placement

Service

Post purchase
interaction

Purchase
consummation

The ________ allow companies to bypass the need for Billboard model of
costly printed catalogs
marketing

Business-to-Backend

Online catalog

A ________________ is a basket on the Net that is
used to place the items that are being purchased

EDIFACT is an abbreviation of ________
The __________ allows for protocol conversion and
communicates with the bank using the banks private
network or the Internet
In Ecommerce, data extraction, transforming the data
into transmittable form, transmitting the data and
downloading the data are the operations employed in
_________
The _________ commerce assists in integrating the
customers and suppliers of the company directly into
the organisation
E-cash means______________________
E-commerce is a tool that addresses the desire of
firms to cut services cost and improving the quality of
goods. It is a definition of e-commerce from
_________
The small denomination digital tokens are called
_________
The ____________ is the process of encoding
information to prevent it from being read by
unauthorized parties
There are _________ types of data tables

The tables that allows the user to change or rearrange
the data, summarize the data and evaluate the data
using changing points of view is known as
The wizard that is used to suggest hints for doing a
task
In a chart Y-axis is known as_________
In a chart X-axis is known as_______________
_________ is a set of tables that describe each of the
data series
________ is used to differentiate one data series from
another
The chart that contains only one data series is
_________
The chart that holds the column chart is _________
The chart that display two or more data series on a
surface is _________
The chart that is used to display discrete data
_________ are not allowed in a macro name
Which of the following tool cannot be used to view the
excel web page_______

Online Catalog

Shopping cart

EDI For
Administration,
Commerce and
Transaction

EDI For
Administration,
Consumer and
Transport

EDI

TCP/IP

Compiler

Interpreter

Business-toBusiness-to-Business Consumer
Electronic Cash
Emergency Cash

Communication
Perspective

Business Process
Perspective

Microcash

Micro Transactions

Decryption
1

SSL
2

data table

filtered table

pivot table wizard
series or rank
series or rank

chart wizard
category
category

series or rank

category

series or rank

category

column chart
column chart

bar chart
bar chart

column chart
column chart
spaces

bar chart
bar chart
wild card characters

excel97

internet explorer

The wizard that used to build an interactive table from
data existing on sheets
The chart that is used for displaying stock market
information
In excel, the subtotal command also generates grand
total after the last group subtotal_________
In advanced filter , the criteria occupying multiple
columns but more than one row, is considered as an
________ criteria.
The stacked bar graphs can be represented in
__________
A pie chart can represent only one data series at a
time
The ______ generates a summarized report in tabular
form in an interactive manner

pivot table wizard

chart wizard

line chart

bar chart

true

false

and

or

3-dimensions

4-dimensions

true

false

Data table

Pivot table

Which one of the following statements related to stock It is also called as
chart is NOT TRUE ?
high-low-close chart

It shows trends over
time

The state government needs to finalize a five years
plan to implement 100% literacy in the state. Which
one of the following will be the best tool that should be
used to work out the plan ?
Pivot table

Scenario manager

Forecast'99 is a group working on exit poll. It wants to
know how many seat ABC party needs to won in
totality to obtain majority to form the government.
Which one of the following will be the tool that will help
Goal seek
the team ?

Scenario manager

Which one of the following will be the tool that provides
a way to view and compare the results of all the
different variations together on the worksheet ?
Goal seek
A ___________ is an excel file where the user stores
Workbook
his data

Spreadsheets are useful for _______________
Which one of the following is NOT the component of
the pivot table ?
Excel allows upto ______ levels of sorting
Filtering rearranges a list to display the required
records
The stacked bar graphs can be represented in
_____________
The ______ generates a summarised report in tabular
form in an interactive manner

Pivot table
Worksheet

Performing
calculations.

Performing database
operations

Column field
two

Row field.
three

true

false

3-dimensions

4-dimensions

Data table

Pivot table

Which one of the following statements related to
stacked bar chart is NOT TRUE ?

It displays the data
series one on top of
the other.

The state government needs to finalize a five years
plan to implement 100% literacy in the state. Which
one of the following will be the best tool that should be
used to work out the plan ?
Pivot table.
Forecast'99 is a group working on exit poll. It wants to
know how many seat ABC party needs to won in
totality to obtain majority to form the government.
Which one of the following will be the tool that will help
Goal seek
the team ?
Which following function is used in subtotal option
Count.
?______________
A workbook consists of many ________
databases

Which two of the following statements related to pivot
table are TRUE ?
Which one of the following is NOT a What-if analysis
tool ?
The _________ wizard separates contents in a cell
into different cells
A spreadsheet is a grid of rows and columns and is
called as a ________
Pick out the window that is not a form of excel
___________
On an Excel sheet the active cell is indicated by…
Cell A4 =2 and A5 = 4. You select both cells and drag
the fill handle down to A8. The contents of cells A6,
A7, and A8 are _____.

If a cell shows ####### , it means that _____.
Which is not an advantage of using computerized
spreadsheets?

It is a tool for
summarizing and
analyzing the data
records in an
interactive manner.
Goal seek.

It is useful when
several components
are changing and
the user is
interested in the
sum of the
components.

Scenario manager

Scenario manager
Standard deviation
records
It is a tool that
provides a way to
view and compare the
results of all the
different variations
together on the
worksheet

text import wizard

Scenario manager
convert text to
columns wizard

worksheet

workbook

application window

document window

A dark wide border

A dotted border

8,16,32

2,4,2

your formula has a
syntax error
ability to generate
tables

the row is too short to
show the number at
the current font size
speed of calculation

The gym teacher has a new program to calculate
physical fitness in terms of weight and exercise. The
use inputs different weights or amounts of exercise to
determine the related physical fitness. This "What if"
program is most likely which of the followin
The difference between the highest and the lowest
values.
Spreadsheets can be used for...

To select a column the easiest method is to …
If you press _____, the cell accepts your typing as its
contents.
The contents of cell C15 is =AVERAGE(C3:C14).
AVERAGE(C3:C14) is known as
All of the following are considered constants EXCEPT:
Which of the following may NOT be included in a
formula?
Which of the following is NOT a valid mathematical
operator in Excel?
Given the formula =B5*B6+C3/D4^2, which expression
would be evaluated first?
Which part of the formula +E12/6+(G7*SUM(H9:H11)
is considered a constant?

word processing

graphical

Range
Producing graphs

Address
Writing letters

drag from the top cell
double-click any cell in in the column to the
the column
last cell in the column
ENTER

CTRL + ENTER

array.

function.

100

(201)555-1212.

Cell references

Functions

^

/

B5*B6

C3/D4

E12

6

How can you tell which cell in a worksheet is the active It is surrounded by a
heavy border.
cell?
It is blinking.

How can you change the active cell?

By clicking in a
different cell

By using the arrow
keys to move to a
different cell

Which of the following would you use to change the
font size of a cell in Excel?

The Standard toolbar

The Formatting
toolbar

The command that will save the current workbook with
a different file type is:
The command that will print an Excel workbook is
found on the ____________ menu.
In the Save As and Open dialog boxes, the
___________ view shows the file size as well as the
date and time a file was last modified.
Which of the following commands will automatically
adjust cell references in formulas?

the New command on the Save command
the File menu.
on the File menu.
File

Edit

Preview

Details

Insert

Delete

Which of the following commands will remove cells,
rows, or columns from a worksheet?
Which of the following options is NOT controlled
through the Page Setup command?
Which command enables you to change the margins
for a printed worksheet?
All commands are carried out on a rectangular groups
of cells known as a:
Which of the following is a valid cell range?
In a copy operation, the cell(s) you are copying from is
called the:
In a copy operation, the cell(s) you are copying to is
called the:
Which of the following commands is needed to
duplicate the contents of a cell in another?
A cell reference that does not change during a copy
operation is known as
Which of the following is considered an absolute cell
reference?
Cell E3 contains the function =AVERAGE(A3:D3). If
the contents of cell E3 are copied to cell E4, what will
be the contents of cell E4?

Delete
Clear
Orientation (portrait or
landscape)
Headers and footers
Options

Page Setup

worksheet.
6

range.
D12, G25

copy range.

destination range.

paste range.
The Duplicate
command

destination range.

absolute

relative

B4

$B4

#DIV/0!

#DIV/0!

Cell E3 contains the function =AVERAGE($A$3:$D$3).
If the contents of cell E3 are copied to cell E4, what will
be the contents of cell E4?
#DIV/0!
Which of the following commands is needed to
transfer the contents of one cell range to another?
The Move command

The F4 key is used to:
Which of the following quickly copies the formatting of
a selected cell to other cells?

The Copy command

#DIV/0!
The Cut command

copy and paste cells.

edit cells.

the Fill Handle

the Format Painter
Click the Insert
Hyperlink button on
the Standard
toolbar.

Which of the following will insert a hyperlink into an
Excel worksheet?

Select the Insert
Hyperlink command
from the File menu.

Conditional formatting applies formatting to a cell
based on:

whether the cell has a
formula or a value in
it.
the cell address.

text with a two-digit
If you enter a date into a cell, Excel stores the date as: year.

text with a four-digit
year.

You created a worksheet on July 30 and entered the
=Today() function in cell E17. You opened that
worksheet again on August 31. What will be displayed
Aug-31
in cell E17 on August 31?
Jul-30
subtracting the
earlier date from the adding the earlier
The number of days between two cells containing
later one.
dates can be calculated by:
date to the later one.
The function key that is used to quickly edit the
the F2 key.
contents of a cell is:
the F4 key.

What will be stored in a cell if 3/4 is entered in it?

03-Apr

0.75

A user‟s response to the InputBox function can be
stored in:
a cell on a worksheet. a variable.
The cell reference for a range of cells that starts in cell
B1 and goes over to column G and down to row 10 is
_____.
B1-G10
B1.G10
The teacher has a spreadsheet showing all Year 10
students and their marks in one Mathematics test. To
find the student with the highest mark, which of the
following functions should be used?

AVERAGE

COUNT

Which chart type best shows proportions of a whole?

Combination

Line

Once a bar chart is
chosen it cannot be
changed to a column
Which of the following is TRUE regarding chart types? chart.

Once a column chart
is chosen it cannot be
changed to a bar
chart.

To select several cells or ranges that are not touching
each other, you would _____ while selecting.

hold down the CTRL hold down the SHIFT
key
key

Your Institute teachers have set an assignment on
„Studies‟. You are required to use a spreadsheet to
record all that you study on each day for four weeks.
You decide to show each week‟s data with an
accompanying graph. What is the best way of doing
this
What would be the best method to quickly copy the
formula from the active cell to each cell below it?
To arrange rows in alphabetical order based on
column A, you need to use the command _____.
What can you NOT do with a spreadsheet?

Use tables

Create four separate
files

Paste

Fill Down

Tools | Sort
Analyse data

Data | Sort
Calculate data

To print just part of a sheet, you would select what you
want to print and _____ .
click the Print button
producing graphs
Spreadsheets can be used for...

press the PRINT
SCREEN key
writing letters

The formula that will add the value of cell D4 to the
value of C2 and then multiply by the value in B2 is
_____.
Which of the functions is not valid for performing
addition

(D4+C2)*B2
0

D4+C2*B2
=A3SUM:B3SUM:C3
SUM

The default orientation for the printed page is _____.
Which is not a valid cell address?

portrait
AD213

landscape
ZA1

The World Wide Web was devised by _________

CERN

ECRN

The useful URL schemes are_____ and______

yahoo and infoseek

mailto and files

news groups,yahoo
and infoseek

bulletin
boards,mails call
and wireless system

bulletin board
system
small
windows socks

business
broadcasting system
large
windows sockets

Mosaic

Yahoo

buffer

cache

Photography

Digital Signature

Key

Lock

User-id

Password

Penetration

Retrieval

Acts

Regulations

Spoofing
Loss

Imposting
Threat

Sales - tax authorities
Utility
Tim Berner Lee
Etrade.com

Income - tax
authorities
Pirated software
Hoffman
Amazon .com

The other ways of getting connected to the net
are_____

BBS stands for______
USENET is a BBS on ____ scale
WINSOCKS is expanded as______
IETF Level 2 HTML DTD supports graphical browsers
like _______
The space used by Netscape to store the retrieved
page is called______
The principles, means and methods for rendering
information unintelligible and for restoring encrypted
information to intelligible form.
A long string of seemingly random bits used with
cryptographic algorithms to create or verify digital
signatures and encrypt an decrypt messages and
conversations.
Protected/private character string used to authenticate
an identity or to authorize access to data.
The successful act of bypassing security mechanisms
of the system.
A set of rules and formats, semantic and syntactic,
that permits entities to exchange information.
An attempt to get access to a system by posing to be
an authorised person.
An action or event that might prejudice security.
According to information Technology Act, 2000, To
investigate contraventions the controller of certifying
authority shall exercise the like powers to that of
Malicious software.
None the person who is known as father of Internet
This website is the biggest bookstore on the earth.

When we talk of Data Transmission modes, then ATM
stands for
A sequence of bits or characters that identifies the
destination and the source of a transmission.
The means of communicating between networks
A group of computers and other devices dispersed
over a relatively limited area and connected by
communication links that enable a device to interact
with any other on the network.

The term HTTP stands for
A NIC is considered as
A hub is a device that can connect

Which of the following is true concerning the function
of a switch?
What do routers connect?
What does a router route?
Software which prevents external access to a system
is termed
If four computers are connected to a hub and then to
the internet, how many IP addresses are required for
these 5 devices?
Which of the following in an OSI layer
When creating a network from just two PCs, what kind
of cable would be used to connect them?
An IP address is a
To construct a simple LAN of 4 computers, you would
connect them with ______connect them

Automated Tailor
Machine

Any Time Money

Acts
Router

Regulations
Gateway

LAN

WAN

hyper terminal tracing
program
National Informatics
Center
Only Computers

Concentrates
connectivity
Bridges and
Repeaters.
bits

hypertext tracing
program
Network Interface
card
Can not computers
Combines
connectivity of a
hub with the traffic
regulation of a
bridge
Two or more
networks
frames

firewall

gateway

One
Physical Layer

Two
Data-Link Layer

RG7U

Coaxial cable

Physical address

Logical address

A cable

Hub

What happens to data that is ruined before reaching to Data return to the
receiver
sender

It gets destroyed bit
by bit.

Bluetooth is

Wireless technology Wired Technology

Which is not one of the recognized IEEE sub layers?
The most preferred number system to represent a IP
address is
A MAC address is of

Physical Layer

Data Link Layer

Binary
48 Bits
software that
facilitates connection
to the internet

ASCII
48 Bytes
a list of rules for
transferring data
over a network

Protocol is

A ............... is a LAN-based computer with software
that acts as a controlling device for controlling access
to at least part, if not all, of a local area network and its
available resources.
Novell PC

Client

There isn't one

If one node goes
down, it brings
down the entire ring

Physiology
Bus
Linear
Parallel

Topology
Star
Parallel
Circular

Ring

Bus

Ring

Bus

Which one of the following is NOT a network topology? Star
In a .............. , the cable system forms a loop with
workstations attached at various intervals around the
Ring
loop

Bus

The Media Access Control (MAC) is a sub layer of the:
What are the most common LAN technologies used in
networking today?
Modem speeds are measured in
LAN speeds are measured in

Network Layer
Ethernet, token ring,
DecNET
bps
bps

Transport Layer
Ethernet, token ring,
FDDI
kbps
Kbps

usually higher than
LAN speeds

measured in bytes
per second

CD-ROM drive
must use the World
Wide Web

a modem
must use electronic
mail

What is the biggest disadvantage of the Ring
topology?
The .............. of the network concerns how network
devices are physically (or optically) interconnected.
The principal topologies used with LANs are:
What are the various types of bus architecture?
What are the various types of ring architecture?
In a ................., each workstation attaches to a
common backplane via its own physical cable that
terminates at the hub
In a ............... , each work station is directly connected
to a common communications channel

WAN speeds are
Accessing the Internet from a typical home PC
requires the use of
To use the Internet, you

Bus

The worldwide web server uses the following standard
uniform resource
interface to act as the middleware:
key gateway interface locator

An NIC
Accessing the Internet from a typical home PC
requires the use of
The most widely used network operating system on
PC LANs is

a Novell Interface
Controller

used to control a
printer

CD-ROM drive

a modem

Linux

Novell Netware

JPEG and MPEG

have to do with
compression of
graphics and video

have to do with Web
pages

To use the Internet you

must use the World
Wide Web

must use electronic
mail
modem

An ISP

Printer
provides access to
the Internet

FTP is

used to send email

Telnet

used to send email
used to protect a
computer room from
fires and floods
a backup server

A multiplexer is a form of

A firewall is
A proxy server is
A search engine is
To look for information about interest areas on the
internet, the user should use a

hardware

is a CPU register

used to browse the
Web
uses wireless
communication
medium

a form of virus
an email server
IR system for the
Internet

An ISP

scanner
provides access to
the Internet

FTP is

used to send email

used to browse the
Web

Telnet

used to send email

uses telephone lines

Which of the following is a true statement about the
OSI model layers?

The layers cannot
Any layer can
communicate with one communicate directly
another.
with any other layer.

Which of the following is NOT true about the Internet?
The traditional intent and impact of this common type
of attack is to prevent or impair the legitimate use of
network resources.

CD-ROM
is a CPU register

It is one large
network.

It is made up of many
networks connected
into transmission lines
called backbones.

Password cracking

System intrusion

A firewall is
Which of the following is NOT an example of a DoS
attack that is popular among hackers?
A ____________ attack is when a hacker sends a
continuous flow of packets to a system.
One defense option on a large network is to configure
a ____________ to disallow any external traffic.
A proxy server is
Which of the following would be performed on a
network server and not normally on individual
workstations?

What can be said about the safety of the Internet?
To secure communication network against wiretapping the most effective control is
One way that a virus CANNOT spread throughout a
network is:
Which of the following is NOT a means of monitoring
employee use of company technology?
____________ would be used by parents to monitor
their children on their home system.

used to protect a
computer room from
fires and floods
IP flood

a form of virus
Flood a Web server
with requests

hack

packet

firewall
a backup server

router
an email server

Update virus
Apply security patches definitions
All sites are safe and
reliable.

There are safe and
unsafe sites.

Use of identifiers

Use of passwords

by attaching to an email.

through an FTP
port.

Phone

E-mail

A Trojan horse

Adware

The formal rules and parameters which are
established to permit a microcomputer to
communicate with the mainframe computer as though
it was a terminal of the mainframe are called
Modems
The two most common tools used to help with
cookies and Trojan
extracting information are:
horses.
Which of the following would NOT be considered an
example of cyber terrorism?
Which of the following would be a form of cyber
terrorism?
Which of the following is a likely target of a cyber
terrorist that would cause considerable loss of life?

An organisation is upgrading its telecommunication
lines. Which is the least important objective while
upgradation
A company posts a price list of its products on its
website. The advantage to the customer is that the
company can

Protocols
Trojan horses and
key loggers.
An attack with the
An attack on a system purpose of gaining
for personal gain
publicity
Disruption in
Economic damage
communication
Crashing the stock
market, as in the
Shutdown of military
1930s
security systems

To carry more
network capacity

To improve network
services

limit access to
set its prices very high computer owners only

Which of the following is an easy-to-use service to get
information on someone?
People Search
Which of the following pieces of information would
NOT be found online?
Which of the following is the most common danger on
the Internet?

Yahoo People
Search

Name of your bank

Date of birth

Virus

Fraud

buy stocks.

invest without risk.

Shill bidding

Phishing

Internet stalking.

cyber stalking.

pop-ups.
Use a fake e-mail
address.

cookies.
Never use your real
identity.

Encryption

Physical Security
controls

I only

II only

irc
Adds more bytes to
programs

ftp
Verifies integrity of
files

Which of the following is a Web browser?

HTML

Internet Explorer

A Web page is another name for ----------Domain names must contain a description of the type
of organisation that the domain represents. A very
common abbreviation used include:
A standard language for creating and formatting Web
documents is:
The Web page format in which all elements of a Web
page are saved as one file is called:

Web query.

HTML document.

.com is used for
company
round trip HTML.

.co in used for
company
the World Wide Web
Consortium

XML.

HTML.

using Internet
Explorer to view a
Web page that is
stored on the hard
drive on your
computer

updating the values
that are obtained
through a Web
query

The famous Nigerian Fraud scam offered victims the
opportunity to:
The fraud type that sends e-mails that claim to be from
legitimate sites in order to obtain sensitive information
is called _________________.
Using the Internet to pursue, harass, or contact
another in an unsolicited fashion is called:
Setting your privacy settings in Internet Explorer to
medium is one way to block:
What is the best means of protection from cyber
stalking?
Which of the following is not an appropriate control
over telecommunications software
Encryption techniques can be implemented in
Hardware-Software
Which protocol would be used to download a free antivirus program from the Internet?
The major advantage of the checksum program is
when it

Which of the following requires an Internet
connection?

Mr Rao wants to find a website that he briefly browsed Click on the Back
over yesterday. After turning on his computer how
arrow until the desired
would he do this?
site is found
the Refresh
Which of the following is used to update a Web query? command
You download from the internet, a screensaver, a tensecond sound file and a ten-second music video clip.
You also add a hyperlink. Which of the media
elements has the greatest effect on the file size?
When saving a photograph for use on a website, which
format should you choose?
While researching the Direct taxes assignment, you
find a useful website. What is the most efficient way to
access the site at a later time?
A system that uses the Internet for business-tobusiness interaction is called a(n):
A block of text automatically added to the end of an
outgoing email is called
_________ refers to the use of Internet technologies
for placing telephone calls.
Most client/server applications operate on a threetiered architecture consisting of which of the following
layers?
Which do you NOT need to connect to the Internet?
What does FTP stand for?

What is the purpose of DNS?
Which of the following is NOT a properly formatted IP
address?
Which of the following is a properly formatted email
address?

Click on „Go to‟ or
„Search‟ in the
browser
the Insert Hyperlink
command

Hyperlink

Screensaver

BMP

GIF

Save it to a floppy
disk.

Write it down on a
piece of paper.

extranet.

intranet.

an attachment.

a signature.

VoIP
Desktop client,
application, and
database.
Modem

IPT
Desktop client,
software, and
hardware.
CD-ROM
File Transmission
File Transfer Program Protocol
So computers can
be referenced by a
So IP addresses can
name
be shorter

If you do not pick up your email for a week...?

193.1.2.3
45.1.1.1
paul .trigg @ domain. paul.trigg@domain.
org.uk
org. uk
Scientists in
The US government Switzerland
International Relay of
Internet Relay Chat Characters
It will be waiting for
It will be deleted
you to collect it

What does HTML stand for?

Hyper Textual Markup Lingo

Hyperlink Text
Marking Language

What is a disadvantage of joining a mailing list?

Receiving messages
automatically from
anyone in the group

People discussing a
topic of interest
globally

The Internet is controlled by whom?
What does IRC stand for?

In Powerpoint2000 ,the built-in professional design
elements are

clipart & auto shapes

autolayouts and
presentation
templates

Selection handles are the 8 small ___________ that
appear around the object, when an object is selected

circles

points

The _______ is an invisible matrix of vertical and
horizontal lines that covers the entire slide workspace

square

image

tool bars
clip gallery & word
art
wave file

short cut menus
slide show & view
show
media clip

eof,false

movelast,true

properties window

form layout window

bof,false

movefirst,true

value()

int()

circle

rectangle

true

false

true

false

fontcolor

color

underline,true

fontunderline,true

textsize
one- millionth of a
second

size
one-hundredth of a
second

count

recordcount

form layout window

prperties window

title

prompt

_______ are drop-down menus that appear when the
right mouse button is clicked on the screen element
________ and ______ have the ability to add a lot of
visual impact into the PowerPoint presentation
_______ is a motion picture or any animation file
In visual basic, when a record pointer reaches to the
last record, _______ property of a recordset object is
automatically set to ______
In visual basic, the explorer view of a project is
displayed in ___________
In visual basic, when a record pointer reaches to the
first record, _______ property of a recordset object is
automatically set to ______
In visual basic, _______ is a method to convert a
string into integer.
In visual basic, in a shape control, a vb statement
gives Shape1.Shape = 2. What type of shape should
we get?
In visual basic, a timer event is only available in timer
control.
In visual basic, vbred or vbgreen or vbblue are the
property values of a backcolor of any object
In visual basic, _______ is a property of a textbox
control to set a color of a text.
In visual basic, _______ property of a textbox control is
set to _______ to underline a text
In visual basic, _______ property of a textbox control is
used to change the size of text.
In visual basic, the interval property of a timer control is
given in ________
In visual basic, _______ property of listbox control
counts the number of items in the list
In visual basic, the properties of various controls can
be set using __________
In visual basic, vbinformation, vbcritical,
vbexclaimation are the values of _______ in a
messagebox function.

In visual basic, ________ is a function which displays
a message and it also allows the user to enter values
in a form object

msgbox()

In visual basic, using a data control, ________ is a
recordset type which allows to add a new record and
also to update existing record in a recordsourse object opendynaset
In visual basic, while closing a form _______ event of
a form object is triggered earlier to terminate event.
In visual basic, to give a backcolor or to bring in a
picture to a command button can only be done if we
set the style property to ______
In visual basic, a method RGB(255,0,0) will generate
_______ color
In visual basic, a method RGB(255,255,255) will
generate _______ color
In visual basic, if a user uses a shortcut key ctrl+R
_________ becomes visible.
In visual basic, if a user uses a function key F4
_________ becomes visible.
In visual basic, when a textbox control receives the
focus ________ event is triggered.
In visual basic, a form is a ________ object.
Microsoft visual basic is a Rapid Application
Development tool.
In visual basic, when a form object appears on the
screen _________ event is triggered.
In visual basic, to display text on a label object
_________ property is used
In visual basic, _______ object is used to access the
database and also to manage the data in the
database.
In visual basic, when a checkbox control is checked
_______ property is automatically assigned with 1.
In visual basic, _______ keyword is used to declare a
variable
What is the extension of the Visual Basic project file
that stores the design of a user control.
Which event of a text box would you use for validating
the data entered by the user?
Which of the following statements forces inline error
handling?
The _______ method resets the contents of bound
controls to their original values when the user clicks on
the cancel button.
To deactivate the Form UnLoad event, you make the
following change in the function definiton:

textbox

opensnapshot

load

activate

standard

opaque

blue

red

red

green

properties window

form layout window

properties window

form layout window

change
child

lostfocus
parent

true

false

load

unload

text

name

opendatabase

dbengine

enabled

visible

dime

dim

.ctx

.ctl

Validate
On Error GoTo
linelabel

Validation

UpdateControls

PaintPicture

On Error GoTo Inline

Cancel parameter to Cancel parameter to
a non-zero value
0

How many root nodes can a TreeView control have?

1

2

Consists of several
Programs
Form window,
standard or code
module
Place code in the
Terminate event

Consists of several
Applications

A project group is a Project which:
Procedures declared in a _____ are local whereas
procedures declared in a ______ are available to the
whole application.
How can you keep the user from exiting a form by
clicking the Close button?
The _______ property enables Visual Basic to draw
complete images in memory before displaying them on
AutoRedraw = True
the Screen.
You want to display the code and the description of an Msgbox err.no &
error. What would be the correct syntax?
err.text

What is the purpose of the Image List Control?
Which method would you use to get a free or unused
File identifier while opening any file:
Which property procedure is used to retrieve the value
of a property?
Which of the following can be shown to the user using
the Common Dialog control in VB?
Which of the following are not properties of Command
Button:
Which events enable you to determine which key was
pressed by the user?
In order to access a file in Non-textual format, you
have to open file in:
Visual Basic displays information depending upon the
current value of two properties of the form, called:
Which of the following procedure types will execute
when you assign a value to a property of an object?
In order to overlap the controls (say a command
button) during design time, we use the „Send To Back‟
or „Bring To Front‟ option from the Edit menu. To
change it dynamically (i.e.during program execution)
we need to change:
Which property of the ProgressBar determines how
much of the bar is filled?
The ______ function can be used to run any .com,
.exe, .bat or .pif file from a Visual Basic program.
The caption and the name properties of the command
button:

Project window, view
code window
Place code in the
Unload event

AutoRedraw = False
Msgbox err.number &
err.text

To display images to
the user

To help in creating a
ToolBar

FreeFile

GetFileNum

Retrieve
Common messages
passed to Windows

Get

Caption
Click and KeyPress

Visible
Click, KeyUp and
KeyDown

Ascii Format

Binary Format

CurrentX and
CurrentY

ScaleLeft and
ScaleTop

Property Get

Property Assign

Background color
property

Caption property

Min

Max

Shell

Open dialog box

Substr
Can be different at
Are one and the same times

You try to initialize a new Object variable with the
following line but receive an error. What could be the
possible cause? Set MyVar = New Classname

You do not need to
You do not have the
use the Set command permission to access
here
the class

Which of the following will perform a direct execution
of a Command object?

The Open method

The vb Critical symbol displays:

A warning query icon

The Exec method
A critical message
icon

vbYesNo is an example of a(n):

statement.

variable.

MsgBox statement
returns a value, while
The primary difference between the MsgBox statement the InputBox function
and the InputBox function is the:
does not.
Which of the following is TRUE about a protected form
(i.e., a form where the Protect Form button on the
Forms toolbar is toggled on and is assumed to remain
in that position)?
Which event is triggered when the user moves to
another open form?
The user can use ______ to remove the undesirable
part of the image

InputBox function
returns a value,
while the MsgBox
statement does not.

Data cannot be
The form can be
entered into the form. modified.
Unload

QueryUnload

clipping tool

cropping tool

color palette

color box

ascent

tricolor scheme

10

28

column
images

bar
images and text

circular

radar

Each individual piece of data in a series is called a/an
PowerPoint launches an OLE-compatible application
called

entity
Microsoft
organization chart

data point

When the user double-clicks on an organization chart
object in PowerPoint
The _____ are used for selecting, editing and viewing
objects in the chart

the organization chart the chart is made
is expanded
available for editing

The power presentation has a _____ for a set of
compatible colors
The set three colors used for graphs and for
secondary slide items is called as
There are ______ types of charts available in
PowerPoint
_______ charts are useful while showing variations
over a period of time
_______ are the individual pages of a presentation
A PIE Chart is a ____ diagram that depicts the
relationship between a whole and its parts

box tools

clip art

general purpose tools

Manager box tool in organizational chart window is
The custom drawing tools are _______ by default
Click on the box tool ______ to draw three boxes
There are ____ default fields available in all boxes of
the organizational chart
The _____ tool is used in the same way as we use a
pen to draw a table
A/An _______ consists of smaller printed version of
the slides
The size of the object can be changed using the
______ tool
_______ is the process through which the slides in the
current presentation are included in another
presentation or application
________ can be used to create charts as well as
worksheets
PowerPoint can import text files that have been saved
in ______ format
PowerPoint outlines can have _____ outline levels
When a file is saved with _____ extension, the
graphics and text are also saved along with the slide

The hidden slide is
____ effect is used to introduce a slide during a slide
show
A _____ is a special effect that determines how the
objects appear on the slide
The notes page is formatted based on the
Pick the odd man out of the following
When a new presentation is opened ,powerpoint
creates slides that have a width of _____ and a height
of ______ with the landscape orientation
The default orientation for notes ,handouts and
outlines is ____ orientation
Build effect is also called as ______
Graphics for web pages are automatically stored in
____ format
A _______ is used to jump to any slide in the
presentation
The ______ language has been incorporated into
PowerPoint
In PowerPoint _____ is a series of commands that are
executed in sequence

used to mange
organizational chart

accessed only by
manager

turned on
once

turned off
twice

two

four

native tool

draw tool

autolayouts

handlayouts

zoom

reduce/enlarge

importing

exporting

Microsoft excel

auto shapes

.ppt(PowerPoint)
nine

.rtf(rich text format)
only one

.rtf(rich text format)

.wmf(windows
metafile)

not displayed during displayed only during
the slide show
the slide show
DTS(digital track
sound)
3D(3 dimension)
build
notes master
outline view

transition
slide master
slide view

15 inches,10 inches

10 inches,7.5 inches

portrait
animation

landscape
view show

gif

jpeg

hyperlink
visual c++

hypertext
visual basic for
application

macro

batch file

The macro will be activated
Developers can easily add ____ to PowerPoint 2000
by using the programming interface
______ determines the order in which order in which
the slides will be displayed during the show
_______ is used to organize and develop the contents
of a presentation
If we save the presentation file as a metafile, it can be
opened using

while creating a .exe
file

during slide transition

virus checkers

spell checkers

slide show

custom show

slide pane

notes pane

internet explorer

paint shop pro

Which of the following statement is not TRUE

PowerPoint creates a
sample presentation it is the quickest way
to which user can add to create a
words and pictures
presentation
user can insert only
pre-drawn, preuser can insert
objects like clip-arts, colored graphic
images reflected in
pictures stored in a
a clip arts to the
separate files to the
slides
slides

With reference to changing the order of slides, which
of the following statement is not true

in outline view, drag
in slide sorter view,
the slide icon to a new drag the slide to a
location
new location

Which of the following definitions are not true

the slide that holds the
formatted
placeholders for the
titles, main text and
any background items
that user wants to
appear on the slides is
called a master
templates

With reference to autocontent wizard for creating a
new presentation, which of the following statements
are not true

Which of the following statements are not true

transition means
applying special
effects to the
crossover between
the slides
in outline view, user
can see the
miniatures of all
with notes pages view slides in a
presentation,
user can prepare
complete with text
speaker notes and
and graphics
handouts

the slide that holds the
formatted
placeholders for the
titles, main text and
any background items
that user wants to
appear on the slides is
called a master
template

Which of the following definitions are not true
The options available in the common task toolbar does
not include
slide layout

transition means
applying special
effects to the
crossover between
the slides

customize
by default,
doughnut chart is
displayed based on
data to be graphed
resides in a datasheet the data in the
datasheet
window

With reference to chart, which of the following
statements are not true
The format of the text entered in a title, subtitle, or
bulleted-list object is determined by the format settings
in a special slide called -------the master slide
PowerPoint provides a _________ that searches the
entire presentation i.e., all the text objects in all the
slides, outlines, notes and handouts for spelling errors office assistant
PowerPoint's drawing toolbar contains _______
drawing tools
10
Click _______ on the rectangle drawing tools enables
us to draw multiple rectangles
once
An example of the components of a multimedia
presentation could include
Which of the following formatting elements can be
applied to a PowerPoint diagram using the AutoFormat
tool?
Which of the following formatting elements can be
applied to a PowerPoint diagram using the Format
AutoShape command?

the slide master

spell checker
12
twice

text, graphics and
email address.

text, hypertext and
Power Point.

the Line style

the Line color

Fill color

Line color

What happens when you double click a blank graph
placeholder in a PowerPoint presentation?

Excel is started so
that you can create a
chart.

A popup box prompts
you for an existing
Excel chart to insert.

The legend in a Microsoft Graph chart is:

always taken from the always taken from the
first row of data in the first column of data in
datasheet.
the datasheet.

Suppose you are creating a Microsoft Graph of
quarterly sales by region. Which would be the best
chart type if you want to emphasize the total sales of
each region?

Side-by-side column

Stacked column

Which of the following actions will enable you to insert
a graph into a PowerPoint presentation?

Pull down the Insert
menu and select
Chart.

Click the Insert Chart
button on the
Standard toolbar.

Click the chart
object, then click
the View Datasheet
button on the
If you are editing a slide containing a Microsoft Graph, It automatically
how do you display the underlying datasheet?
displays in Slide view. Standard toolbar.
How do you deselect a chart that has been placed onto
a PowerPoint slide after you have finished creating the
chart?
Single click the chart. Double click the chart.

A dialog box is
displayed allowing you
to enter the name of
the Excel worksheet
that should be linked
What happens when you click the Datasheet button on to the PowerPoint
the Microsoft Graph toolbar?
presentation.
What happens if you single click a chart that is not
currently active?
What happens if you double click a chart that is not
currently active?

The chart is
selected.

A dialog box is
displayed allowing
you to enter the name
of the Excel
worksheet that should
be embedded in the
PowerPoint
presentation.

The chart is deleted.

The chart is selected. The chart is deleted.

a slide one bullet item bullet items one letter
Using custom animation effects, you can build:
at a time.
at a time.
Which of the following animation effects can be added
to a slide?
Subtle
Moderate

Which of the following animations effects can be
added to a slide?
Which keyboard key is used to select more than one
picture on a slide?

Custom animation can be used to affect ONLY:

Enter and exit

Fly in from top or
bottom

Enter

Shift

the way objects
appear on a slide.

what objects do after
they appear on a
slide.

The advanced
timeline shows the
sequence in which
objects will appear on
the slide.

The advanced
timeline shows the
duration of the effect
applied to each
object.

Which of the following best describes the information
that appears on the advanced timeline?
Which of the following objects can contain custom
animation effects?
Clips
What type of program allows an object within an image
Paint program
to be edited without affecting other objects?
Which of the following animation effects can be added
to a slide?
Fly in

Organization charts
Draw program
From top

Which of the following is TRUE regarding the
Once data is entered Once data is entered
Datasheet?
it cannot be changed. it can be changed.
Graphical software tools that provide complex analysis
OLAP.
of stored data are:
OLTP.

Which of the following statements is TRUE regarding
PowerPoint diagrams?
Which keyboard key combination is used to undo the
previous command(s)?
Microsoft visual basic project file has _______ file
extension.

You can change the
appearance of a
whole diagram, but
not individual shapes
of a diagram.

You can change
both the appearance
of a whole diagram
and the individual
shapes of a
diagram.

[Enter+A]

[Shift+Z]

.vbg

.vbp

In visual basic, _______ method is used to add an
item in a combobox
In visual basic, _______ method is used to load picture
during runtime in an image control
In visual basic, to populate a drive list box with a
directory list box __________ statement is used
In visual basic, to display a message in the run time
_________ function is used
In visual basic, to populate a directory list box with a
file list box ________ statement is used
In visual basic, ________ is a property of a recordset
object which counts the number of rows in a
recordsourse object
In visual basic, using a data control, a record can only
be added from the last record. Adding a new record is
only possible using _______ method of a recordset
object.
In visual basic, using a data control, a record is saved
to a recordsource object using _______ method of a
recordset object.
In visual basic, using a data control, to navigate to the
previous record ________ method of a recordset
object is used.

add

additem

loadpicture
load
Drive1.Drive=Dir1.Pat Dir1.Path =
Drive1.Drive
h
messagebox()
Dir1.Path=File1.Path

message()
Dir1.Path =
Drive1.Drive

openrecordset

opendatabase

update

append

append

update

movenext

movelast

To deactivate the Form UnLoad event, you make the
following change in the function definiton:Private Sub
Query_Unload(Cancel as Integer,UnloadMode as
Integer) To prevent the Form from closing, you will set Cancel parameter to Cancel parameter to
a non-zero value
the:
0
_______ is a word processing that is a member of the
Word 2000
office 2000 family
The feature that enables user to type anywhere in a
click-n-type
document without pressing or tab
The______ feature allows the user to copy and paste
upto 12 items at the same time in an application
______ and _____ key combination will extend the
selection by one character on the left and right
_____and_____ are improved layout in Word 2000

The easiest way to create a document in word is
In Office2000 environment the tool that makes work
easier for us is_____
A short description of a tool bar button called the
______ is displayed when the mouse pointer is
allowed to stay for a second on the button

Office 2000
double click

office clipboard
shift+end and
shift+home
web layout,
printlayout

cut
shift+left and
shift+right
normal layout, web
layout

wizard

templates

office assistant

inbox assistant

Screen Tip

Tool Tip

The _____ helps us to keep track of the margin of the
page
The keys that are used to navigate between headers
and footers are
Pick out the element from the following that dose not
form the type of tabs for the Word 2000
_______are blueprints or patterns for documents of a
certain type
The______ is used for quickly setting paragraph
indention using the mouse
Word art is text with
AutoShapes in word can be created by accessing the
_____
By default, a document consists of_____ section
The dialog box that is used to determine the
documents margins is
________ is a box surrounding a page on all slides or
a line that sets off a paragraph on one or more slides
The key that is used to perform a task to select all t he
text in the documents is
The key that is used to indent a paragraph is
The key that is used to change the font from the
current positioned in a document is
The key that is used to change the style of the
document that is from that normal to heading1 or
heading1 to other document styles.
'Set mapping' Check control that follows a text-type
validation, we use ----------------- application for data
analysis.
Excel can import data from other databases for the
data analysis.

tab stop

marginal stop

up arrow keys only

page up keys only

left

center

template

model

increase indent
special effect

decrease indent
control tool box

drawing toolbar
control box
1
2
page setup from the printer setup from the
file
file menu

border

shading

ctrl+a
ctrl+a

Del
Del

CTRL+SHIFT+F

CTRL+O

ctrl+shift+f

ctrl+o

Excel

Access

True

False

A System Auditor can uses CAAT tools to analyze data False
In the case of the ---------- control, it is ensured that the
data in combination with other fields are reasonable as
per standard set by an organisation.
Valid Signs
--------------- function searches for a value in the
leftmost column of a table and then returns a value in
the same row from a column that we specify in a table HLOOKUP
Most of the tools use in Data Analysis depends on
DDE

True

Transaction type

VLOOKUP
OLE

Analysis is the loading
Analysis translates
of programs that
program code of a
perform routines to
high level language to control peripheral
How do you define analysis of an information system? machine code
devices

What areas need to be considered in the SOFTWARE Only hardware and
design process?
software
What is the function of systems software?
Formatting a disk results in all the data being...?

What is Direct Implementation?

What is parallel running?
What documents are produced during the
development of a system?

What are User Guides are used for?

Systems software can be categorised into:
Which storage device cannot be erased?

Application software are programs that are written
Which bus carries information between processors
and peripherals?
Convert the decimal number 2989 to Hexadecimal
Which bus controls the sequencing of read/write
operations?

To collect data
Deleted from the
disk
Users operate the
manual system and
computer system at
the same time
The new system is
introduced
alongside the
existing system
Instructions and
technical
documentation

A gigabyte represents

Copied from the disk
Users operate the
computer system
from a given date
The new system is
introduced and users
start operating it
Log files and
temporary files

To enable any printer
to be connected to
For technical support the network
Network systems and
Operating systems communication
and system services services
Magnetic tape storage CD-ROM
To maintain a backup
To do a particular
copy of all the
task.
information
Data bus
FDDI

Auto bus
BAD

Data bus

Auto bus

Peripherals that are
connected to a
computer.

Operating system
routines that execute
in supervisor mode.

What are utilities?
Numbers are stored and transmitted inside a computer
binary form
in
The original ASCII codes
A Nibble corresponds to

Inputs, outputs, file
design hardware,
and software
To execute any
programs

were 7 bits
4 bits
More than 1000
mega bytes

ASCII code form
8 bits
8 bits
1000 kilobytes

A 32-bit processor has

32 registers
used to indicate
uppercase letters

A parity bit is
he contents of these chips are lost when the computer
ROM
is switched off?
Clock speed is measured in
bits per second
Cache memory enhances

CISC machines
Which parts of the computer perform arithmetic
calculations?

memory capacity

32 I/O devices
used to detect
errors
RAM
baud
memory access time

have fewer
instructions than RISC use more RAM than
machines
RISC machines
ALU

Registers

Every data from the primary memory will be erased if
An RS-232 interface is
For print quality you would expect best results from

Power is switched off
a parallel interface
line printer

Computer is
improperly shut down
a serial interface
dot matrix printer

ROM

is faster to access
than RAM

is non-volatile

A UPS

smart card
Laptop computers use

Multiprogramming refers to

Multitasking refers to
What are small high speed memory units used for
storing temporary results?
A good way to exchange information that changes
rapidly is through

Multiprogramming is a prerequisite for
Timesharing is the same as
______ is the default view in Word used for typing
Editing and Formatting the Text

increased the storage
capacity of a
increases the process
computer system
speed
has more storage
capacity than an ATM
is a form of ATM card card
LCD displays
CRT displays
having several
programs in RAM at
the same time
multitasking
having several
the ability to run 2 or
softwares running at more programs
the same time
concurrently
ALU

Registers

brochures

magazines

multitasking
multitasking

an operating system
multiprogramming

NORMAL

ONLINE LAYOUT

The short-cut-key that is used to indent a paragraph
spacing in the documents is
The short-cut-key that is used to paste the selected
text
The short-cut-key that is used for paragraph
spacing(1.5)
The box that separate text from the document and
allows it to behave like an independent object is known
as
The object that is used to provide information like the
title of the book, name of the chapter, page number
etc.
The object that helps us analyzing data statistically is
known as
To highlight certain parts of a page to set it apart from
the rest of the page we make use of the following
features
To clear all the tabs in a document the option that is
clicked from the tabs dialog
The dialog box that is used to incorporate picture
bullets into our documents or web pages is
The object that composes of set of tools which helps to
create and work on different shapes like rectangles,
circles, flowcharts etc.
When word is opened a new document called_____ is
displayed, where the user starts typing the content
right way
______ is an online dictionary maintained by word to
obtain synonyms for words
The thesaurus is invoked by pressing_______
When a new table is created the insertion point
flashes in the _____
By pressing the _____ key inserts a blank row after the
last row in the table
The ______ option enables us to convert text into a
table format
A table consists of ______ that contain text or graphics
The _______ option in word allows the user to
automatically correct misspell words as and when they
are typed
______ is a facility that enables recording and
replaying of a sequence of keystroke
In Word Macros are written in _____
In Word 2000 the macro dialog box is activated with
the help of ____ key combination
________shows how a document would look like when
published on the web or on an intranet

ctrl+m

ctrl+2

ctrl+v or ins

ctrl+c or ins

ctrl+2

ctrl+5

Text Box

Frame

Header and Footer

Screen Tips

Chart

WordArt

Borders

Shading

clear
picture bullets
dialog box

remove all
arrow bullet dialog
box

charts

WordArt

doc1

document1

thesaurus
shift+f7

hyphenation
thesaurus menu

first

second

tab

end

convert text to table convert data to table
row

rows & columns

AutoCorrect

AutoFormat

Mail Merging
basic

Macro
visual basic

shift+f8

shift+f7

web layout view

online layout view

______ is a software for sending and receiving e-mail
messages
________is the coding system used to create web
pages
The network that makes information easily accessible
across various networks is _______

email client

outlook express

html

xml

internet

intranet

field name must be
listed in the same
order as the
Which of the following statements are false with
corresponding
reference to the use of a header row source for a mail information in the data
merge
source

With reference TO TABLE WHICH OF THE
FOLLOWING STATEMENT ARE false
The alignment available for tabs does not include

it is not possible to
change the height of
only selected rows of
a table
left

the field separators
in a header source
and the data source
can not be set as
paragraph

auto format option
applies to the entire
table and not only to
the selected rows or
columns of a table
decimal

In order to type a
header from the third
A new section is
page of the document
created in order to
a section break is
change properties like inserted after t he
number of columns
third page

Which of the following statements related to a Section
Break are True
The user can set a spelling checker to skip the marked
true
part of the next
New option under the file menu of word creates a new
blank document that is based on the normal templates
The user can split the screen only into two parts
The features that enables the user to type text
graphics tables anywhere in the document without
pressing enter or tab
The user can modify the picture from the clip art

With reference to auto correct which of the following
statements are false

false

true
true

false
false

drag & drop
true

click -n-type
false

automatically corrects prohibits the user
from renaming an
common typing,
auto correct entry
spelling errors

With the reference to password protected documents
which of the following statements are false
The alignment available for tabs does not include

Which of the following statements are False
Drop Cap tool does not work for the contents in the
table format
The user can split the screen only into two parts in MSWord
The special symbols that are inserted using "insert
symbol" option of the word can not be printed by the
printer as they are not standard keyboard symbols
The "format columns" option allows to create columnar
text up 12 columns only.
The document that makes the user to organize and
maintain a long document, such as multipart report or
a book consisting of chapters
The view that enables us to view how objects will be
positioned on the page when it is printed
The mode that is initialized or toggled to if the user is in
a position to overwrite the text in the word
Veena is entering a paragraph in a word processing
program. When the cursor gets to the end of a line,
what is the best way to get the cursor to the next line?
How are data organized in a spreadsheet?
Which key moves the cursor to the beginning of the
next line of text?
Veena typed the following sentence: "The girl was very
beautiful." In which word processing utility could she
find a synonym for "beautiful"?

Using an electronic bulletin board, Seema can do all of
the following except which one?
Aryan has created a ten-page story, but only wants to
print the first two pages. What printer command should
he select?
What process should be used to recall a document
saved previously?
Which is used to indent text within a document?

password can not
include spaces
left

password protected
document can be
opened without
password as read
only
justified

a .ppt file can not not
be inserted at
specified position in
the current document

a document file can
be inserted in the
current document at
specified position

true

false

true

false

true

false

true

false

Master Document

Child Document

Print Layout View

Page Layout

Insert Mode

Type Over mode

press the return key
layers and planes

press the tab key
lines and spaces

tab

enter/return

grammar checker

spell checker

send a public
message to friends
send pictures to a
interested in one topic friend

Print all

From ___ To ____

Enter
closing

Copy
tabbing

Desktop publishing is a more sophisticated form of
which of the following types of software?

database

graphing

What is a Word Processor used for?
What is a picture that is saved on a diskette and can
be pasted into a document?

To analyse figures

Creating and editing
documents

subscript

annotation

What is a Word Processor used for?
What basic tools would you find in the Edit menu of a
word processor

To analyse figures
Clear, replace and
select

Creating and editing
documents
Spelling, grammar
and autocorrect

What is a header in a document?

Text at the bottom of
every page

Numbers which
appear on every page

Mouse, printer and
processing system
keyboard?

Keyboard, Mouse,
monitor and printer

Browser
Clear, replace and
Toolbars

clip-art file
Spelling, grammar
and autocorrect

What hardware is essential for a word?
The user could take a picture from a magazine and
insert it into the document by using a

What basic tools would you find in the Edit
Assume you are creating a two-column newsletter.
Which type size is the most reasonable for the text in
the columns?
6 point
Given the default left and right margins, and ½-inch
spacing between columns, the width of each column in
a two-column document will be:
2½ inches.

10 point

2¾ inches.

Assume you have made all appropriate selections in
You are not in Print
the Columns dialog box in Word, but cannot see any
columns on the screen. What is the most likely cause? Layout view.

You have not inserted
a column section
break..

While word processing, in which of the following
situations would Tom use the "Copy" command?

to store a file on the
hard drive
Data about a set of
similar things

to store a file on a
diskette

Thesaurus

Spell Checker

What does a document contain?
Before submitting your work you want to find any
words spelt incorrectly. Which of the following would
you use?

Mainly text

What command in a word-processing program can be
used to change the word „him‟ to „her‟, and also the
word „he‟ to „she‟ in the given phrase? “On a cold and
still night, the only sound that could be heard was the
owl that had ade its home in the nest outs
Paste

Replace

What edit commands would you use to insert a
paragraph from one document into another document,
while still keeping the paragraph in the first document? Copy, then paste

Cut, then paste

Which of the following statements would NOT be a
reason for showing suggested revisions in a Word
document without changing the original document?

To give the original
author a chance to
accept suggested
changes from the
person who entered
the revisions

To give the original
author a chance to
reject suggested
changes from the
person who entered
the revisions

Which statement is NOT true regarding revisions
made in a Word document?

A line appears
through text that is to
be deleted.

A red underline
appears beneath text
that is to be added.
Through the Tools
menu by choosing
Track Changes
command

Which of the following is TRUE about saving a
document using the Versions command?

Through the Edit
menu by choosing
Track Changes
command
The Versions
command will allow
you to save multiple
versions of a
document, including
any changes that
may have been
made to that
document.

What happens when you open a document that has
been saved using the Versions command?

The latest version is
opened
All versions are
opened automatically. automatically.

How are suggested changes entered for review on an
initial Word document?

You have used the word „discover‟ four times in an
English essay you have created using a word
processing program. You would like to find another
word of similar meaning to use instead of „discover‟.
Which of the following would you use to do this?

Dictionary
Word displays a list
When opening and working with multiple versions of a of the dates and
times each file was
document, how can you tell which is the most recent
saved.
version?

The Versions
command will allow
you to save only one
version of a
document, including
any changes that may
have been made to
that document.

Grammar check
The most recent
version will appear at
the bottom of the list.

Various fields are added to a regular document to
create a special document called a form through the
____________ toolbar.
Which of the following types of fields CANNOT be
inserted into a form?

Fields

Tools

Check boxes

Toggle button

Which of the following is TRUE related to editing
comments in a Word document?

Comments cannot be Comments cannot be
edited.
deleted.

What is a header in a document?

Text at the bottom of
every page

Numbers which
appear on every page

Press tab.

Press Return.

text.

graphics.

header/footer.

bibliography.

Copy button

Paste button

Fault Finding

Bug Squashing

Insert

Tools

A pull quote is best emphasized by:

a section of white
text on a black
background.
setting it in larger
type or font size.

a section of text
where the first letter
of each sentence is
lowercase and the
rest are uppercase.
typing it all in capital
letters.

Which of the following definitions is CORRECT?

The reverse technique
means to add dark
text on a light
background.

A pull quote is a
quotation taken from
(pulled) from another
document.

In your English essay you notice that the paragraph at
the bottom of page 1 continues on to page 2. You
would like to make this paragraph start on page
2.What would be the best way to do this?
Tables in a document help you to easily arrange all of
the following EXCEPT:
To identify a document, it is helpful to include the file
name on each page as a
Which of the following tools will copy the formatting of
selected text to other places?
What is the name of the process of determining the
cause of errors in a macro?
Drop caps are added to a Word document using the
___________ menu.

A reverse in a newsletter is:

Pertaining to newsletters, which of the following cannot The width of each
be changed using the Columns command dialog box? column
As related to type size, how many points are there to
the inch?
6

The height of each
column
10

Assume you are working on a newsletter in which the
masthead extends across the top of the entire first
page. The rest of the newsletter has two columns.
What is the minimum number of sections in the
newsletter?

One

Two

Which of the following is NOT correct with respect to
page, column, and section breaks?
Which of the following would be the most appropriate
font for a newsletter headline?

Press Ctrl+Enter to
create a page break.
A serif font at 10
points

Press
Ctrl+Shift+Enter to
create a column
break.
A sans serif font at 10
points

Which of the following is the default Word column
width?

2 inches

3½ inches

Sequence Check is a --------------- level control check. Field
Analyse data over two or more periods is called ---------------------- analysis
Horizontal
We use Hash Total to identify ------------ within a series
where there is a definite relation between items
Duplicate Value
Analyse fields by arranging them into rows and
columns is called
Cross Tabulate
--------------------- function searches for a value in the
leftmost column of a table and then returns a value in
the same row from a column that we specify in the
table.
To import data from Access to Excel ,it is not possible
to link between Access and Excel sheet
The GAP detection options can be used to test for
completeness of data.
Exception testing can be used to identify ----------------items
Data validity test represents
Year end ledger, inventory files or transaction files can
be tested for cut-off , to ensure that the data has been
provided is for the correct audit period
In Range Check , the data may not be in proper
sequence but should be within a predetermined range
In ---------------- Check data entry follow a particular
sequence and also a predetermined range.

Record
Vertical

Combined Value
Filter

RAND()

VLOOKUP()

TRUE

FALSE

TRUE

FALSE

Unusual
exception testing

Strange
comparison of data

True

False

True

False

Limit

Sequence

Virtual memory is

related to virtual reality a form of ROM

Multiprocessing is

same as multitasking

same as
multiprogramming

To help keep sensitive computer-based information
confidential, the user should

What is the function of a disk drive?
A 4GL is
A nanosecond is
What small, hand-held device is used to move the
cursor to a specific location on the screen?

The memory address register is used to store

The memory data register is used to store

The instruction register stores
Which of the following is used to indicate the location
on the computer monitor?
A mathematical procedure that can be explicitly coded
in a set of computer language instructions that
manipulate data.
Which of the following translates a program written in
high-level language into machine language for
execution?
Detecting errors in real memory is a function of
To find where a file has been saved on disk, the user
should
A series of instructions telling the computer how to
process data or files is defined as a
To ensure that data is not lost if a computer system
fails, the user should
Having a single CPU alternatively process tasks
entered from multiple terminals is called
The place in the CPU where the data and programs
are temporarily stored during processing is called the
All are examples of computer software except
Computer manufactures are now installing software
programs permanently inside the computer. It is known
as
Which of the following file organisation forms most
efficiently allows access to a record
The part of the computer system controlling data
manipulation is called the

save the file

to calculate numbers
Uses Cobol
106 sec

set up a password
to read from or write
information to a floppy
disk
uses Java
103 sec

a keypad

a mouse
data that has been
data to be transferred transferred from
to memory
memory
data to be transferred data to be transferred
to or from memory
to the stack
an instruction that has
an instruction that has been fetched from
been decoded
memory
a cursor

a scroll bar

Formula

Algorithm

Assembler
Memory protection
use the directory
search tools

Compiler
Parity Checking
search each file in
turn

Network
save copies of the file
with the same name
on the system

Program
use different
filenames on the
system

Multiprocessing

Time sharing

ROM

RAM

Firmware

Word Processor

Firmware

Word Processor

Sequential

Hashed

Operating System

ALU

For direct access storage devices the recording area is
divided into
Tracks and Sectors
Character, field,
The data hierarchy from the largest to the smallest is
database
Which of the following hardware or software system
controls provides a detailed record of all activities
performed by a computer system
Valid character check
Which one of the following parts of a computer is
necessary to enable it to play music?
Sound card.
An educational CD-ROM on Indian Poets contains
1000 pages of text, 500 colour pictures, 15 minutes of
sound and 1 minute of video. Which of the four
different media listed takes up most space on the CDROM?
Text
Which one of the following printers is suitable for
printing sprocket fed carbon copies?
Laser

viewing an
encyclopaedia CDMultimedia software can be most productively used for ROM.
To be effective a virus checker should be
replaced regularly
Which one of the following software applications would
be the MOST appropriate for performing numerical
and statistical calculations?
Database

Passwords enable users to
How many bytes do 4 Kilobytes represent?
Back up of the data files will help to prevent
Which one of the following is the MOST common
internet protocol?

The advantage of a PC network is that
The term A:\ refers to
UPS stands for

The main problem associated with uninstalling
software is that
You are conducting research for a Income Tax
assignment. The raw facts you collect are called

A flow chart is the

Blocks and Sectors
Database, character,
record
Maintenance
diagnostic program
CD-ROM

Pictures
Dot matrix

creating the plans for
a building design.
never updated

Document processor

get into the system
quickly
512
loss of confidentiality

make efficient use of
time
1024
duplication of data

TCP/IP

HTML

access to the internet
is quicker
files can be shared
a file name
a subdirectory
up-line provider
universal port serial
service

orphan files can be
left on the system

the program
executable may not
allow it to be
uninstalled

data.

documents.

Graphical
Rules writte in
representation of logic procedural language

A voucher entry in Tally is done for

Passwords are applied to files in order to
Each of the following is an enabler of IT-business
alignment except:
The basic systems model is used to describe virtually
all information systems and it consists of the following
elements:

What is a computer-aided design system?
A(n) __________ offers a solution package for an
entire industry.
File extensions are used in order to
Information systems controls include all of the
following EXCEPT:
Hashing for disk files is called
Components of expert systems include: a) inference
engine; b) user interface; c) knowledge base; d) fuzzy
logic
Black box testing and white box testing are part of:
What is the term used to describe the point of
interaction between a computer and any other entity,
such as a printer or human operator?
The advantages of CASE tools are: a) reusability; b)
maintainability; c) portability; d) flexibility

Purchase, sales,
receipt, payments etc. To fill the log register

assist in maintenance speed up access
senior executive
IT management lacks
support for IT.
leadership.

input.

output.

The use of computers
to design state-of-theart, high-quality
Using computers to
products.
do architecture.
Application Service
specialist or functional Provider
ensure the filename is
name the file
not lost
preventive controls.
external hashing

detective controls.
static hashing

A: (a) , (b), (d)
corrective controls

B: (a) to (d)
preventive controls

Component

Interface

(a), (c), (d)

(b), (c), (d)

Which of the following is an acceptable way to shut
down the computer?

Press the reset
button.

Turn the computer off
at the power point.

Yesterday, in your music class you saved your
compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best
way to locate the files?

Ask the person next
Create the files again. to you.

Components of an information system model are: a)
applications architecture; b) functional architecture; c)
technology architecture; d) information architecture

(a), (c), (d)

Benchmarks form part of:
Continuity controls include: a) record counts; b) date
checks; c) label checks; d) run-to-run totals

detective controls

(a), (b), (c)
organisational
controls

(a), (c), (d)

(a), (b), (c)

Which is not part of help desk documentation:

problem logging

call lights

Testing of individual modules is known as:
Design phase of CASE tools includes: a) data
architecture; b) decision architecture; c) interface
architecture; d) presentation architecture

unit testing

data testing

(b), (c), (d)

Which is part of installation testing:

benchmark testing

(a), (b), (d)
specifications
matching

Multiplexer.

Peripheral
processors.

The computer operating system performs scheduling,
resource allocation, and data retrieval functions based
on a set of instructions provided by the:
Which of the following falls under multimedia data: a)
text; b) images; c) video; d) audio
Which of the following procedures should be included
in the disaster recovery plan for an Information
Technology department?
Designing relationships among components is part of:
Several Computers connected together is called:
Which network topology uses a Hub?

(a) to (d)
(b), (c), (d)
Replacement personal
computers for user
Identification of critical
departments.
applications.
architectural design
Client-server
Star

Which of the following topologies is used for Ethernet? Star

Application software are programs

interface design
Client
Bus
Bus

To maintain a backup To do a particular job
copy of are written all such as editing,
the information
storing information

Which type of file search method requires a computer
first read all locations preceding the desired one
Direct

Sequential

Which of the following areas of responsibility are
normally assigned to a systems programmer in a
computer system environment?
Which of the following is recommended when many
searches for data are required

Systems analysis and
applications
programming.
A sequential file on a
disk

Data communications
hardware and
software.
A sequential file on a
tape

Tapes can only be
read by the machine
on which they are
written

Parity errors will result

Data path part

Control Unit

Distributed systems

Local Area network

It is unlikely that a magnetic tape containing several
thousand blocked records can be used on two
machines of different architecture directly because
Which component of the CPU has the most influence
on its cost versus performance
Which of the following terms applies to network used
to connect computers with other computers,
peripherals and workstations that are in fairly close
proximity

Intelligent terminals differ from dumb terminals in that
they

Use the computer to
which they are
Can send data to a
connected to perform
computer and receive all processing
data from a computer operations

A computer is to be linked to 8 terminals using a single
communication link. To permit simultaneous terminal
operations, communication path will require which of
the following
Mixer
Allows computer
signals to be send
A modem is a device that
over a telephone line
A LAN includes 20 PCs, each directly connected to the
central shared pool of disk drives and printers. This
type of network is called a
Planetary network
A computer based system for sending, forwarding,
receiving and storing messages is called an
Office Automation
If a workstation contains a processor, monitor, screen
manipulation device, printer, storage and
communication capabilities, it is said to be
A dumb workstation
Time of day control
Terminal hardware controls include
locks

Modem
Aids in back-up
procedures

Ring Network
Executor systems
An intelligent
workstation
Encryption algorithms

RS-232 is a

Type of cable

What is a compiler?

A compiler converts
the whole of a higher
A compiler does a
level program code
conversion line by line into machine code in
as the program is run one step

What are the stages in the compilation process?
Which of the following is not a data transmission
coding scheme

Terminal Standard

Feasibility study,
system design, and
testing

Implementation and
documentation

CRC

Baudot

An interpreter does
the conversion line by
line as the program is
run

An interpreter is a
representation of the
system being
designed

What is the definition of an interpreter?
A device used in data communications to divide a
transmission signal into several sub-bands is known as
a
Modem
Third generation languages such as COBOL, C, and
FORTRAN are referred to as
High-level languages
It is faster than
Serial Communication is used over long distance
parallel
because it
communication

Demodulator
Middle-level
languages

It is less error prone

In what areas is the COBOL programming language
used?

Financial sector and
engineering

The primary function of a front-end processor is to

Manage the paging
Communicate with the function in a virtual
console operator
environment
Specification and
design
System Analysis

What is the first stage in program development?
Which of the following is not used for data
transmission within a local area network

What is System Analysis?
A device to device hardware communication link is
called

What will a good software provider consider?
The topology of a network can be each of the following
except
What is the 8-bit binary value of the decimal number
85?
Which is the most common data transmission error
checking method

Fiber Optics

Coaxial Cable

The design of the
screen the user will
see and use to enter
or display data

System Analysis
defines the format
and type of data the
program will use

A cache
The different types of
network to be used

An interface
Testing to check for
errors before the
system is introduced

Star

Packet

10101010

1100101

Parity

Retransmission

What is the decimal value of the binary number 1111? 15
Which of the following devices merges communication
signals onto a single line
Port
What is the decimal value of the octal number 215?
327
Which tool is used to help an organization build and
use business intelligence?
Cache memory enhances
What is the decimal value of the hexadecimal number
FF?
Numbers are stored and transmitted inside a computer
in
What is the hexadecimal value of the decimal number
1476?
A byte corresponds to
What does EBCDIC coding of numbers mean?
A Kb corresponds to
What is the binary sum of 01011 and 00101?

Graphic design and
education

4
Modem
141

Data warehouse

Data Mining tools

memory capacity

memory access time

30

255

binary form

ASCII code form

4C5
4 bits
Basic Coding
Description
1024 bits
10000

1B7
8 bits
Binary Coded
Decimal
1000 bytes
1112

Information is stored and transmitted inside a
computer in
Where would you find the letters QWERTY?
A parity bit is
How did the computer mouse get its name?
Clock speed is measured in
What are you most likely to use when playing a
computer game?
CPU performance may be measured in
A digitising tablet can be used for?
In processing cheques which of the following I/O
techniques have banks traditionally used
Which of the following is a pointing device used for
computer input?

A UPS

binary form
Mouse
used to indicate
uppercase letters
Because it squeaks
when moved
bits per second

ASCII code form
Keyboard

Touch screen
BPS

Light pen
MIPS

Printing letters

Tracing diagrams

OCR

MICR

used to detect errors
Its moves like a
mouse
baud

Touch screen
Hard disk
increased the storage
capacity of a
increases the process
computer system
speed

What does a light pen contain?
The capacity of a 3.5” floppy is around
What general term describes the physical equipment
of a computer system, such as its video screen,
keyboard, and storage devices?
Where would you find the letters QUERTY?
What are you most likely to use when playing a
computer game?

Refillable ink
100K

Pencil lead
1.44 Mb

hardware
Mouse

software
Keyboard

Touch screen

Light pen

A digitising tablet can be used for?
Which of the following is a pointing device used for
computer input?

Printing letters

Tracing Diagrams

Touch screen

Hard disk

What input device could tell you the price of a product
Where would you find a magnetic strip?

Mouse
Credit card
Writing on a hard
board

Bar code reader
Mouse

Coloured spots
Printer

Pixels
Storage device

Mouse
CRT displays

Bar code reader
LCD displays

screen layout

mouse button layout

Mouse
hardware

Bar code reader
language interpreter

Hard copy is a term used to describe...?
What are the individual dots which make up a picture
on the monitor screen Called
A daisy wheel is a type of...?
What input device can be used for marking a multiplechoice test?
Laptop computers use
QWERTY is used with reference to
What input device could tell you the price of a bar of
chocolate?
A GUI is

Printed output

Where would you find a magnetic strip?

Credit card
having several
programs in RAM at
the same time
having several
programs in RAM at
the same time

Speakers

UNIVAC Computer belongs to the
Timesharing is the same as
Name the first Indian Super Computer?

multitasking
First - generation
computers.
multitasking
Vishwajeet

an operating system
Second - generation
computers.
multiprogramming
Deep Blue

Disk fragmentation

is caused by wear

caused by overuse

The technology which is used to check answer sheets
of multiple-choice questions in civil services or similar
examinations is: -

Bar code Reader
Technology

Optical Mark Reader
Technology

A compiler is
Which printer among the following is fastest
“Zipping” a file means

a fast interpreter
Drum Printer
encrypting it

slower than an
interpreter
Dot - Matrix Printer
decrypting it

Multiprogramming refers to

Multitasking refers to

Multiprogramming is a prerequisite for

What does acronym VIRUS stands for
An impact printer creates characters by using...?
A client-server system is based on
A nanosecond is
A procedural control used to minimize the possibility of
data or program file destruction through operator error
is the use of
_______ software enables users to send and receive
data to/from remote computers
A _____ is a running instance of an application
Splitting of CPU's time for different tasks _______
prevents time slicing

multitasking
The ability to run 2 or
more programs
concurrently

Very important reader Vital information
user sequence
resource under siege
Electrically charged
ink
Thermal Paper
mainframe technology LAN technology
10-6 sec
10-3 sec

Limit checks

Control figures

application
project

system
model

multiprocessing

multithreading

______ computers are used in large organizations for
large scale jobs which have large storage capacities

mainframes

super computers

_______ is responsible for all calculations and logical
operations that have to be performed on the data
______ printer use laser light

control unit
band printer

arithmetic and logic
unit
drum printer

______ software enhances the user to enter ,store,
manipulate and print any text
______ software enables users to send and receive
data to/from remote computers
_______ is the temporary storage place for deleted
files
_____ is a collection of related fields

integrated software

word processing
communication
software

my computer
field

recycle bin
file

_____ language consists of strings of binary numbers
______ symbol is used to represent processes like
assigning a value to a variable or adding a number

assembly language

machine language

terminator symbol

processed symbol

_______ is an example for micro computer
_________capability supports concurrent users doing
different tasks

PC-at

hp vectra system

multiprocessing

multithreading

"dumb terminals"
wan

dumb servers
distributed computing
system

host

server

host

server

PC

LAN

server processing

host processing

four
file management
system

one
hierarchical database
system

multiprocessing

multithreading

repairing

The ______ do not have processing power of their
own and has only a screen, keyboard and the
necessary hardware to communicate with the host. For
this reason, the terminals are referred
as_______________
A______is nothing but a PC with a network operating
system
_____system is responsible for handling the screen
and user I/O processing
The______ handles data processing and disk access
in a Client/Server architecture
Both the DBMS and the application resides on the
same component in a ____system
When all the processing is done by the mainframe
itself, the type of processing is sometimes called as
DBMS models can be grouped under____ categories
______is the most advantageous database system
A new user initiates a new process of execution at the
background,while the user can continue his query
process as usual in the foreground. This situation is
referred to as ______
The process of data being automatically written to a
duplicate database is called______

data management

Modem stands for __________ .
Multiple changes to the same record or a field are
prevented by the DBMS through______
_________allows an application to multitask within
itself

Code/De-code

redo logging
Modulation/Demodula
tion

fixes

locks

multiprocessing

multithreading

LAN stands for __________ .
New process of execution is referred to as______

Linear area networks
task

Local area networks
process

ISDN stands for _______.
_____________ is the Worlds largest computer
network .
_______is/are a popular front end tool
When LAN connected together ,it is called
__________ .

TCP/IP stands for _________ .
Data is broken into small unit called __________ .

SMTP stands for __________ .
The __________ protocol is a network protocol to be
built for the World Wide Web .
ATM stands for __________ .
The computer which can receive data from other
computers on the network and print it is _______
The hardware and the software requirements together
form the_____
ATM, Asynchronous transfer mode is a __________
technology.
__________ is designed telephone system

Integrated system
dynamic networks.

Integrated Symbolic
Digital networks.

Ethernet
visual basic

Internet
power builder

MAN

WAN

Transfer control
protocol/Internet
protocol
Cells

Transfer
communication
protocol/Internet
protocol
Bits

System modulation
transfer protocol

Software Mail
transmission protocol

Transfer Protocol
Aggregate transfer
mode

Transmission protocol
Asynchronous
transfer mode

File server

Printer server

platform

configuration

MAN and WAN
ISDN

LAN and WAN
ATM

Internal Services
Digital Network

Expansion of WBT is ______________
_________ connects LANs.
Collection of instruction is called a _____
Combination of alphabetic and numeric data is called
_____ data

Web based Training
Bridges
procedure

Internal Services
Design Network
Web based
Technology
Routers
batch

alpha numeric

alpha beta

Computers can be classified based on
______,______and _______
_________ are used in large organizations for large
scale jobs
_______ is responsible for feeding data into the
computer
_______ is the capability of the o/s to run numerous
applications simultaneously
_______ involves conversion of raw data into some
meaningful information
_______ is responsible for obtaining the processed
data from the computer

space occupied, price, cost, performance
no. of users allowed
their ratio

Expansion of ISDN is ________

mini computers

microprocessors

input

output

multiprocessing

multithreading

interpreter

compiler

input

processor

_______ printers use light to produce the dots needed
to form pages of characters
impact printers
operating system,
Hardware components in a computer are
bootstrap, kernel,
_____,____,_____,______
shell
_______ software are programs that are complex and
can be developed or purchased
operating system
_______ is a set of special instructions used to
communicate effectively with the computer
batch
_______ converts a high level language into machine
language
processor
_______ translates assembly language program into
machine language instructions
compiler

drum printers
control program,
interpreter,
assembler, compiler
application software
protocols
compiler
interpreter

C

ANS

D

CTRL+F1

None of the above

A

Tally INI

None of the above

A
A

CTRL+F3

None of the above

B

A or B

None of the above

C

Four

Five

B

Alt+Ctrl+C

None of the above

B

A

A
A

&

^

Accounts payable
and Receiving

Puchasing, Receiving
and Accounts payable D

A or B

Mone of the above

A

Ratio Analysis

All of the above

D

Four

One

A

Ctrl+T

Ctrl+D

B

Display Information All of the above

D

F6
Shift+P

F7
None of the above

C
A

Day Book

Journal Book

B

Sub

None of the above

B

A
Electronic Data
Interchange.

All of the above

C

4

5

A
C

Field

All of the above

B
B

Change Period

None of the above

B

Journals
Real
None
Journal Book
Physical Stock
Transfer

None of the above
None of the above
All of the above
All of the above

B
B
D
A

Reversing Journal

B

Issue

None of the above

A

18

21

B

B
electronic data
analysis
F6
Primary Cost
Category

All of the above

B

Alt+f5

B

All of the above

C

A
Vouchers

None of the above

C

10 to 60

None

A

Order

All of the above

A

Information

None of the above

C

Ctrl+f2
A and B

Ctrl+f4
None of the above

A
C
A

F7 function key

None of the above

A

A or B
1-4-1997 to 31-31998

None of the above

B

None of the above

B
A

None of the above

C

Cash and profit &
loss
Cash and bank
A or b
None of the above

C
B

Cost category

None of the above

A

F8

F9

C

A and B

None of the above

C

a or b

None of the above

A

Regional setting

None of the above

A

Balance Sheet

None of the above

B

F10

F11

B

Both A and B
4

None of the above
1

C
B

F11

F12

A

Budget

None

C

A or B

A

Alt+F3

None of the above

C

Symbol

None of them

A
B

A or b

None

A

Stock analysis
In 'comp info ->
security control'
option

None of the above

A

None

B

28
Sub-Groups
Data Entry

16
B or C
TallyVault

A
C
A
A

Both A and B

None of the above

C

Cash receipts.
Will be more
efficient at
producing
financial
statements.

Payroll transactions.

A

Eliminates the need to
reconcile control
accounts and
subsidiary ledgers.
an instruction that has
been transferred from
memory

C

the address of a
memory location

C

Capacity Planning Exception reporting

C

RAM

AGP Card

B

Control totals for
one or more fields
Storing information
on the hard disk
Visual audio
board
File protection
ring

End-of-file and end-ofreel code

B

None of above

B

None of above

C

Limited access files

C

Pixies

None of above

B

Reel Number
Pointing device

Batch Total
None of above

D
A

Console Log
An inked ribbon
and print head
Require user
passwords
Eraser
A ribbon
Centralised
function for PC
Disposition
A ribbon
An INK RIBBON

Data Dictionary

B

None of above
Make duplicate copies
of files
None of above
A cassette

C
A
C
A

Distributed policies or
procedures
None of above
None of above

A
A
C

Storage capacity
Read and Write

None of above
None of above

C
B

Floppy disk
A parallel access
medium

None of above

A

None of above

A

700MB
Magnetic tape
storage
Magnetic tape
storage
In a drawer

None of above

B

None of above

C

None of above
None of above

A
C

CDROM chips

None of above

B

DRAM chips

None of above

B

Logic bus

None of above

A

Control unit

None of above

B

8 bits

None of above

B

CACHE
Business software
and games
software
Mainframe
computer

None of above

A

None of the above

B

None of above

B

Jon Von Neumann
computers
None of above

B

Hoover generation

None of above

A

Fourth generation None of above

C

Fifth generation

None of above

C

Fifth generation

None of above

B

Fifth generation

None of above

A

Analysis, System
Design, and
Implementation
JCL

None of above
none the above

A
A

A
B

A

B

A

A
A
A
A

A
to obtain a record
layout

extract data from file

A

all the above

none of the above

A

B
A

absence of audit
trails

all the above

D

unique approach

none of the above

B

checks and
controls

all the above

D

A
A

all the above

none of these

A

A

use of any
programs

none of the above

D

A
conceptual/physical all of them

D
A

A
enable multiple
user resource
sharing

all the above

D
B
B

all the above

none of these

A

A

A
A
A

B
model base

all the above

D
B

report files

none of the above

B
D

file manager

filepet

C

all the above

none of the above

A

A

B
deletion

addition

B
A
A

software and
database

safety and database

B

A

on quarterly basis

none of the above

B
B
A

Benjamin

none of the above

B
B

random placement
none of the above
of component

D

A
none of the above

all the above

A

none of the above

all the above

A
A

A

A

B

B
interactive data
innumerable
analysis

none of the above

B
A
A

B

A

big-bang
hybrid tests

stub
all the above

C
D
B

re-perform
procedures carried
out by the clients
all the above
programs

D

none of these

A

all the above

A
all the above

none of the above

A
B

A
A
B

none of these

all the above

A
A
A

can provide the
auditors with useful
information with
trend s and
all of the above
patterns

D
A

examination of
source code of a
program with
advice to
following the
logic of a program none of the above
ALC
ACLL

C
B
A

analyzing the
picture of a file or
data

all the above

A

A

A

A
none of the above
identifying nonstandard code

all the above

A

all the above

D

A

A
resource requested all the above

D

all the above

A

none of the above

A

A
B

master list of
transactions

administered
questionnaire

A

prepared by an
outside
programmer
engaged by the
auditor

all the above

D
A

stratification and
frequency analysis all the above

D

B

B
examining the
quality of data
Can aid in simple
selection
High End CAATs
A special purpose
written program
Compliance tests
of general EDP
controls

D

all the above
Can define the audit
objectives
All of the above

D
D

None of the above

A

All of the above

D

Event Procedures

General Procedures

D

primary number

auto number

D
A

procedures

none of the above

B

chart

macros

D

comments
expression
builder

action

D

expression elements

C

expression
elements list box

none of the above

C

insert

none of the above

A

auto report

embedded

C

datasheet

justified

B

embedded report

new report

D

dynamic and static none of the above

A
B

chart

insert chart

C

foreign key
mail wizard

none of the above
none of the above

C
A

page header

report header

D

group footer

none of the above

B

for specifying
conditions with
group by clause

none of the above

C

macro names
forms

none of the above
macros

C
D

insert

delete

B

module

none of the above

C

RAID
message

none of the above
none of the above

A
A
B

CME

none of the above

A

on line editing

none of the above

A

OLE server

OLE communicator

C

connected
BMP

edited
html

A
D

query wizard

publish to web wizard D

dynamic file

none of the above

B

insert

data definition

D

pesos

yen

A

command button

list box

B

link

create icon

A

save as html

none of the above

C

end

none of the above

B

procedure
front end

none of the above
language

C
A

database

data storage

C

new database
dialog box

database dialog box

A

235

63500

A

number

automatic field

B
B

explicit join

none of the above

A

candidate key

no duplicate key

A

cascade update
related fields

change all related
records

C

both a and b

none of the above

B

record or records none of the above

C
B

Dynaset field
properties

properties

B

select queries
change/delete
queries

update queries

A

update queries

A

no match join

outer join

D
A

form wizard dialog

both 1 and 3

D

append

simple

D

form properties

new properties

B

new form

child form

B

Form Operations

None of the above

B

hierarchical form

one to many form

B

sorting

querying

C

pipes

gateways

A

filter by menu

None of the above

A

@

?

D
B

data less control

data control

B

controls group

record group

B

collection

none of the above

A

controlled

all of the above

C

DATE()
combo box

DAY()
static text

C
B

tabular form

main form

A

filter by form
option control
wizard

none of the above

C

tool wizard

C

two of the above

none of the above

B
B

table

ledger

A

module
bitmap

none of the above
report

A
A
A
A

25,000

64,000

D
B

A
B
form

all of the above

D

report

hyperlink

D
A

A

Tools

none of the above

C
1 B

A
candidate keys

primary key

C
A
B
A
A
B

zero

none of the above

B
B
B

A

both 1 and 2

none of the above

B
C

A

delete query

append query

A
B
B
B
A

self join

stand alone

table join

C

sub chart

B
A
B
D
B

B
B
A
primary key field
attributes

none of the above
entities

C
D
A

append

add

A
A
B

stand alone

sub chart

B

use datasheet in
forms

use export

D
B
B
B

A
A

A
A
?

*

D

group

topic

A
C
A
B

A
B

A
range

logical

C

B

event - procedural
based language
none of the above

C

query

table

B
B

session

detail

D

both a and b

none of the above

B
A

inner form

none of the above

A
A

labels

report

B

index

identifier

B

form

none of the above

A

sorts
unbound

forms
none of the above

A
C

button

option button

B
A

record source
data sheet form

none of the above
none of the above

C
A

columnar form

none of the above

A

unbound
bound

none of the above
static

A
C

tabular form

columnar form

B

relationships

C

list, check and
combo boxes

none of the above
option button, toggle
button and check
boxes

filter by record

filter by input

D

macro

table

B

D

field

layout

record grab
field names
An organised way
of storing
information about
a set of similar
A way of maintaining a
things
log
A document which
contains text

A collection of files

Relational DBMS
is related to data
mining

Reliable DBMS
uses tape as opposed
to disk
Database access
Computer matching controls
An organised way
of storing
information about
a set of similar
things
None of the above
A document which
contains text

B

D

C

B
C
C
D

C

None of the above

B

A tool which allows
text and graphics to
be placed in
documents
None of the above

A

Using queries

C

None of the above

Word processors,
spreadsheets,
databases, DTP
None of the above
PRIMARY KEY
and UNIQUE
constraints
IDENTITY columns

C

C

ALTER TABLE

UPDATE TABLE

C

Relational DBMS
is related to data
mining

Reliable DBMS
uses tape as opposed
to disk

C
C

Component

Source

D

keeping the original saving the file with
paper copy
different filenames

A

mail merge

e-mail

C

browser

e-mail

A

wildcards

engines

C

AutoNumber

Auto Key

C

reports are consistent
with the underlying
tables or queries.

B

report and its related
query.

A

not a primary key of
either related table.

B

forms in a
database are
consistent with the
underlying tables or
queries.
query and its
associated
dynaset.
a field from an
unrelated table.

Many-to-many
Many-to-one
EmployeeLastNam
e
CompanyAddress

B
A

The join line

The one-to-many
relationship

Select Undo in the
Relationships pulldown menu

Click the Delete
Relationships button on
B
the toolbar

That there are
records in a
related table

That records can be
added by clicking on
the plus sign

B

C

They cannot be
AutoNumber data
types

They must be the
same data type

D

The customer‟s ID
is deleted from the
Customers table,
and all the related
loans are deleted
An error message is
from the Loans
displayed.
table.
The subform is an
object on the form
and can be moved or
The subform is
displayed in Form sized like any other
object.
view.

D

A one-to-many
relationship
A many-to-many
between coaches relationship between
and teams
players and teams

C

¥

*

C

The Loans table
at any time
title bar text,
prompt, icon.

Neither table
title bar text, icon,
prompt.

C
B

CreateList.

Sub.

B

A drop-down list
enables the user
to choose from
one of several
existing entries.
does not have to
be set.

A drop-down list
enables the user to
enter text.
must be set for two
words.
maintain data on
create tables of
different things in
rows and columns. different tables.
all of the above
metadata.
a and b
information.
e-commerce
database
application
a or b

D

C
C

A
D
D

A

e-commerce
database
application

None of above

B

Structured Query Relational Question
Language (SQL) Language (RQL)

C

Data Business
Model System

Relational Model
Manager

B

Oracle
The database
management
system (DBMS)

a and b

D

All of the above.

D

None of above

All of above

A

creates reports
the database
management
system (DBMS)

b and c

D

the database

B

it contains a
description of its
own structure

All of the above.

C

holds indexes

All of the above.

D

stored procedures

All of the above.

D

as a redesign of an
existing database a and b

as a redesign of an
existing database a and b
as a redesign of
an existing
database
a and b
entity-relationship
data modeling
data models

data models

entity-relationship data
modeling

A

B

C

A

B

data models

entity-relationship
data modeling

D

entity-relationship
data modeling

data migration

D

network models
the order of the
rows is
unimportant

relational data model
more than one column
can use the same
name

A

row

field

D

key

tuple

C

composite key

foreign key

C

foreign key

candidate key

D

foreign key

surrogate key

B

Deletion anomaly

All of above

D

C

create one or more move the data into the
new tables
new database

A

have poor
response time

are not true DBMS
products

B

Nonintegrated data None of the above

A

a "wrong format"
nonintegrated data problem

B

a "wrong format"
nonintegrated data problem

D

data warehouse
data are often
denormalized.

b and c

C

Report

Query

A

Macros

Spreadsheets

D

Regardless of how the
objects and tables are
It is advisable to
stored, the user will
put each object and have to reenter the data
table into a
in the tables when the
separate database. application is upgraded. B
All objects in an
application,
including the
tables, must
reside within the
same database.

An application can be
created in such a way
that it objects such as
forms and reports can
be changed without
disturbing the existing
data.

C

A
Merge
Join
It contains a user
interface, or
C
switchboard
It contains macros
Interface Design
Switchboard Manager D
Wizard

put key business
information into
store all corporate
the hands or more transaction data in one
decision makers. single location.

C

Digital Signature

None of the above

C

Digital Certificate

Private Key

A

Hash Result

Either B or C

D

Both A and B

Either A or B

C

Institutional
Overhead

None of the above

A

Certificate Authority None of the above

A

A

B
Personal Digital
Certificate

None of the above

A

Personal Digital
certificate

None of the above

C

Public Key

none of the above

B

Efficiency and
logistics, Evidence

Evidence, Ceremony,
Approval, Efficiency
and Logistics
D

A

A
certificate
Revocation Letter

None Of The Above

A

Private Key,
Recipient

None Of The Above

A

Transmission File None of the above

C

UNESCO

UN/EDIFACT

D

functions

functional groups

D

SET

None of the above

A

Smart Cards

Electronic cheques

D

Broadcast and
Junk Mail

Online Catalog and
Customer
Endorsements

C

EFT

All of the above

D

Public Key and
Password
Satellite Area
Network

Public Key and
Private Key

D

None of the above

B

B

Glow sign or
hoarding strategies All of the above

D

Billboard

Endorsements

A

Direct-mail

Junk mail

D

Billboard
Low cost of
operation
Industrial
espionage

Broadcast

C

Quality management

B

Economic espionage

C

A competitor‟s new
project

B

Research data
e-commerce
database
application
Including the
Subject

C

None of above
Using all capital
letters

D

Encryption
performed by a
physically secure
hardware device
is more secure
than encryption
performed by
software.

Security at the
transaction phase in
EDI systems is not
necessary because
problems at that level
will be identified by the
service provider.

C

tip wizard

function wizard

A

A

column reference none of the above
quattropro or xbase
class files
files

D

range values

reference values

D

=currentdate()

none of the above

A

# sign

none of the above

A

function wizard

none of the above

C

parameters

none of the above

B

numeric

Boolean

D

merge

none of the above

A

pmt
convert text to
columns wizard

count

A

tip wizard

B

countif

none of the above

B

sumif

countif

C

print

none of the above

A

A

none of the above
shading

none of the above

B

print

print preview

B

sorting

none of the above

A

all blanks

none

A

www.encybrit.com

none of the above

B

FTP
intermediate
network

none of the above

B

none of the above

B

physical layer

session layer

D

ftp service

none of the above

A

ARCHIE
unlimited restore
locator

none of the above

C

none of the above

A

scheme
command line
sears

none of the above
none of the above
general electric

C
C
C

browser
search for
database

editor

B

none of the above

C

wincim or maccim none of the above

C

cyberspace

none of the above

B

excite

none of the above

B

web server
image list
one

none of the above
none of the above
many

A
C
B

top

middle and lower

D

index

glossary

C

menu search,item item search,index
search
search
all the above
lycos

C
D

lynx
Lycos
IBM

all the above
navigator gold 2.0
CompuServe

C
C
D

ftp

telnet

D

Hyper text
transfer protocol

Hyper text transfer port C

uucp

none of the above

b

telnet

none of the above

C

transfer
communication
protocol/internet
protocol

none of the above

B

three

none of the above

C

web servers

none of the above

B

the internet access none of the above

A

site
higher type transfer
protocol
uniform resource
label
frantically asked
question

organization

B

none of the above

B

name of the above

B

none of the above

B

IP,UDP

none of the above

A

request
world search for
information and
research council
mosaic,gopher

close

A

none of the above
none of the above

B
B

interface

none of the above

B

hotwords

none of the above

B

verification on
network integration
and communication none of the above

A

university of
California net

none of the above

B

dns

none of the above

A

telnet and ftp

none of the above

A

wais,winsocks
winsock

none of the above
none of the above

B
B

hyper text markup
language
none of the above

C

books marks

B

none of the above

animation
none of the above
animation,scripts,e
xecutables
none of the above

B

welcome page
grand network
news
search engines

none of the above

B

none of the above
none of the above

B
B

yahoo and altavista none of the above

B

A

ftp

archive

D

all the above

none of the above

D

Delphi

fidonet

A

bookstores

none the above

A

more information
database

galenet
channel

A
B

Graphical interface
format
Joint pictures
expert graph
net
eudora,netscape
and pine
network
connections

Graphical Interface
format
Joint pictures
experimental group
browsers

B
A
C

none of the above

C

mails

B

FCOLOR

FONTCOLOR

B

Communication
graphical interface

Common Gateway
Interface

D

Communication

Connection

B

Client

None of the above

B

Web

Channel

A

United relay limited
text or image
SGML
metalanguage
pancake is not
edible

None of the above
neither text nor image
CGI
none of the above

B
C
C
C

none of the above

B

SGML Parser
applets
Internet
Engineering Task
Force
MS Internet
Explorer and
Netscape
Navigator

SGML Composer
documents

C
A

None of the above

C

None of the above

C

symbols

video

C

hotword
in user-defined
order

hotlink

B

none of the above

B

home

none of the above

C

.gif and .jpeg

.wmf and .bmp

C

service,port and
directory path

service,hostname and
port

B

mailing lists,mail
server robots and
gateways to other
services
none of the above

C

<hr size=n>

<l1 type=shape>

D

classified general
instructions

none of the above

B

Browser
intranet

User
none of the above

A
B

wan
packets
email,file
retrived,internet
tools

none of the above
none of the above

B
A

none of the above

C

communicator,ie,ly
nx,winsock
all of the above
ARPANET
none of the above

B
B

defensive
advanced
research projects
administration net none of the above
first
none of the above

C
B

intranet,extranet

none of the above

A

cooking and dining none of the above

A

Hyper transfer
meta language
united states &
Russia

Hyper text markup
Language

D

none of the above

B

network

none of the above

C

servers

none of the above

C

network redirectors none of the above
data target
equipment
none of the above

B

network layer

none of the above

B

smart network and
dumb network
none of the above
file transfer
none of the above

B
B

LAN,WAN,MAN
TAN
WAN
non-digital
Document type
definition
Manipulate/demani
pulate

none
none
none
none

Manipulation

of
of
of
of

the above
t he above
the above
the above

B

C
B
C
B

Document type data

C

none of the above

B

none of the above

B

Cable and wires
Serial line
protocol
Pillar to pillar
protocol

none of the above

B

none of the above

C

none of the above

B

storing data on the receiving information
hard drive
from a host computer

B

Size

Channel

A

Browse

Retrieve

C

Either A or B

Neither A nor B

B

Both A and B

Both B and A

C

Electronic Fund
Transfers

All The Above

D

A

Open System

Formal Legal
Requirements, Open
System

D

Signer
authentication

None of the above

A

Both A and B

Neither A nor B

C
B

Digital certificate

Private Key

A

Either A or B

Neither A nor B.

A

Private Key

None of the above

A

Both A and B

Either A or B

C

Both A and B

Either A or B

A

Both A and B

Either A or B

B

Encryption

Cryptography

C

Conducting fraudawareness training.
Received by the
intended recipient.

Reviewing the
systems-access log.
Sent to the correct
address.

The private key is
used by the sender
for encryption but
not by the receiver
for decryption.
Failure of server
duplicating
function.
Backend-toBusiness

The private key is used
by the receiver for
decryption but not by
the sender for
A
encryption.

Business- to-Billboard

A

Endorsements

Broadcast

B

Catalog

Broadcast

A

.COM
Search and
discovery

Domains

A

None of the above

C

Search and discovery

A

Pre-purchase
preparation

D

A

Firewall vulnerability. D

Endorsement
model of marketing None of the above

B

Billboard
EDI For
Administration,
Commerce and
Transport

Pulling cart

B

None of the above

C

EFT

Gateway

D

Assembler

EDI

D

Consumer-toBusiness
Euro Cash

Customer-to-Company B
B
Endorsed Cash

Service
Perspective

None of the above

C

TT(Tiny token)

E-token

A

Encryption
3

Subscription
4

C
B

index table
convert text to
columns wizard
legend
legend

pivot table

D

tip wizard
data marker
data marker

D
A
B

legend

data marker

C

legend

data marker

D

pie chart
pie chart

surface chart
surface chart

C
B

pie chart
pie chart
symbols

surface chart
surface chart
none of the above

D
A
A

Netscape

word 2000

A

convert text to
columns wizard

tip wizard

A

stock chart

pie chart

C

A

B

A

Multi-dimensions

A
B
It is often used to
display share
It is also used for
market prices over indicating fluctuations in
B
a period of time
temperature changes

Solver

Data table.

C

Pivot table

Data table.

A

Solver

Data table.

D

Spreadsheet

none of the above

A

All of the above

D

Pivot table item.

C
B

Performing text
formatting.
Source table
name.
N

B
Multi-dimensions

A
B

It can be
represented in 3dimensions

B

Solver

Data table

C

Pivot table

Data table

A

worksheets

A
D

SumIf
tables

It summarizes the
data by using
analytical functions.

A

solver

Pivot table

D

tip wizard

function wizard

B

tables

database

A

modal window

C

No border

A blinking border

A

2,2,2

6,8,10

D

the column is too
narrow to show
all the digits of
the number
either b or c
flexibility of moving
cost of initial set-up
entries

C
D

database

spreadsheet

D

Gap
Drawing pictures

Rows
Document filing

A
A

click the column
heading

click the column label

C

TAB

INSERT

A

constant.

formula.

B

#VALUE!

Tom McKenzie.

C

Numeric constants Text constants

D

*
D4^2
SUM(H9:H11)
It is displayed in
reverse video.
By either clicking
in a different cell
or using the arrow
keys to move to a
different cell
The Cell Format
command on the
Edit menu
the Save As
command on the
File menu.

\
It is impossible to
determine.

D
C

B
G7*SUM(H9:H11)
The phrase “active cell”
appears in the Status
A
bar.

By typing the reference
of the cell you want to
move to in the formula
C
bar
The Font Size
command on the Tools
B
menu.
the File Type command
C
on the File menu.

View

Window

A

List
Both Insert and
Delete

Properties

B

Clear

C

Both Clear and
Delete

Remove

B

Fonts

Margins

C

View

Edit

B

group.
D12:G25

cell group.
D

B
C

clipboard.

source range.

D

clipboard.
The Paste
command

source range.
Both the Copy and
Paste commands

B

mixed

constant

A

B$4

$B$4

D

#DIV/0!

#DIV/0!

B

#DIV/0!
The Paste
command

#DIV/0!
Both the Cut and
Paste commands

C

cycle through
absolute, relative,
and mixed cell
references.
the Formatting
toolbar

cycle through open
applications.

C

Conditional formatting

B

Double-click a cell and
click the Insert
Hyperlink command.

B

Right-click a cell
and click the Edit
Hyperlink
command.

whether the cell
has an absolute or
a relative cell
the value in the cell
reference.

an integer.

text with either a twodigit or four-digit year,
depending on the
format.

D

D

D

C

It is impossible to
determine from the
information given.

B
29/03/2008
subtracting the later
date from the
adding the later date to
A
earlier one.
the earlier one.
the Esc key.

B

a constant.

the F1 key.
Either 3/4 or .75,
depending on the cell
formatting
either a cell on a
worksheet or a
variable.

D

B1;G10

B1:G10

D

MAX

SUM

C

Pie

Scatter

C

Once a pie chart
has been chosen it
cannot be changed
to line chart.

Once a line chart has
been chosen it can be
changed to a pie
chart.
D

March 4 of the
current year

C

hold down the ALT hold down CTRL +
key
SHIFT

A

Transfer
information to a
database

Use multiple sheets

D

Fill Right

Paste Special

B

Edit | Data | Sort
Create forms

none of the choices
None of the above

B
C

select Print
selection on Page
Setup | Sheet and
then print
drawing pictures

select Print selection
in the Print dialog and
then print
D
A
None of the above

#VALUE!

=(B2*(D4+C2)

C

REF!
whatever was last
used
A0

None of the above

B

vertical
None of the above

A
C

CARN
newsgroups and
search engines

NET

A

none of the above

B

none of the above

B

none of the above
none of the above
none of the above

A
B
B

PINE

Lynx

A

built-in

none of the above

B

Cryptography

Message Digest

C

Hash Function

Formula

A

Name

Address

B

Cryptography

Password Cracker

A

Address

Protocols

D

Unauthorising
Exposure

Approving
Hacking

A
B

Judge of a civil
court
Virus
Charles Bubbage
Dell .com

Police officer of IPS
rank.
Cracker
Howard Aiken
Msn .com

B
C
A
B

application
servers,proxy
servers and web
servers
bulletin
broadcasting
system
very small
windows stocks

Asynchronous
Transmission
mode

None of above

C

Address
Port

Protocols
Pin

C
B

CAN

PAN

A

hypertext transfer
protocol
New Information
Card
Only printers

hypertext tracing
protocol

C

None of the above
None of the above

B
D

Switches data from
incoming ports to
outgoing ports.
All of Above

B

Bridges and Hubs
Packets

Hubs and nodes
None of the above

B
C

router

virus checker

A

Four
Network Layer

None of the above
All of the above

C
D

Fiber

Twisted pair

B

A memory address None of the above

B

Router
It continue on to
target device with
corrupt data
Ultra violet
technology

None of the above

B

None of the above

B

None of the above

A

Network Layer

All of the above

D

Octal
48 KB

None of the above
48 MB
a gateway calling
software that allows program for internet
file copying
bridging

A
A

B

Server

Network PC

If the hub goes
down, it brings
down all of the
nodes on that
section

If the hub goes down, it
brings down all of the
nodes on all of the rings B

Both A and B
Ring
Both A and B
Linear

None of the above
All of above
None
Both A and B

B
D
A
B

Star

Mesh

C

Star

Mesh

B

Linear

Ring

C

Star

Mesh

A

Physical Layer
Ethernet, DecNET,
FDDI
mbps
Mbps

Data Link Layer
Ethernet, token ring,
ARCnet
mips
Mips

D

depend on the
transmission
medium

limited by modem
speeds

C

Netscape

B

All of the above

A

Windows 95
must have a LAN
account

C

B
B
C

common gateway application protocol
interface
C
interface
interfaces a
connects a computer
modem to a
D
to a network
computer
Windows package

Netscape

B

Windows NT

None of the above

C

the Internet
must have a LAN
account

none of the previous
use appropriate
communications
software

none of the previous
bridge
is a CPU functional
unit
make of processor

A

A
D

A

is a protocol for the
transfer of files
is part of Netscape between computers

D

is part of Netscape None of the above

D

a screen saver
program
a poor file server

none of the previous
none

D
D

browser

none of the previous

C

search engine
clip-art file
is a CPU functional
unit
make of processor

D
A

is a protocol for the
transfer of files
is part of Netscape between computers
is a protocol that
allows for remote
is part of Netscape login

D

Any layer can
communicate only
with the layer
Any layer can
directly above or communicate only with
below it.
the layer above it.

C

It works the same
way as a local
network.

Individual computers
can connect to it using
an ISP.

A

Denial of Service

Port sniffing

C

D

a screen saver
none of the previous
program
Virus that initiates a
ping flood
UDP flood

A

flood

traffic

C

switch
a poor file server

hub
none of the above

B
D

D

Backup data on a
daily basis
Limit logging on access C
Only large namerecognizable sites ActiveX-enabled sites
B
are safe.
are safe.
Use
of
encryption
Use of logical
D
methods
access methods
by attaching itself
to a document.

by scanning the
computer for a
connection.

B

Web traffic

Application updates

D

A worm

Spyware

D

Multiplexors
cookies and key
loggers.

LAN

B

Giving out
disinformation
Disruption in supply
lines

Changing the content
of a Web page
D
All of the above are
D
correct.

Contaminating
water systems

Shutdown of nuclear
plant safety systems

key loggers and worms. C

D

To obtain an accurate
inventory of network
related equipment
To improve system and parts and
network nodes
D
response time
update its prices as
stop its competitors soon as they are
D
seeing their prices changed

USA People
Search

Lycos Search

B

Personal assets

Criminal records

A

Spyware
make large amounts
of money by parking
purchase off-shore funds in their bank
account.
property.

B

Siphoning

Hoaxing

B

virtual stalking.

Web stalking.

B

Adware

spam.

viruses.
Use anti-spyware
Use a proxy server. software.

D

B

B

Message sequence
number checking
Logical access controls B
Both I & II

Neither I or II

www
Increases boot up
time

C
telnet
Misleads a program
B
recompilation
both HTML and Internet
B
Explorer

Microsoft Excel
round trip HTML
document.

C

Web browser.

B

.con is used for
companies

None of the above

A

HTML.

one way HTML.

C

DHTML.

MHTML

D

clicking a hyperlink
that references a
document that is
stored in the floppy
drive on your
computer

viewing an Excel
worksheet that you
have saved as a Web
page.

B

Go to the History
page and look for
the site
the Update
command

Go to the Bookmarks or
C
Favorites page
the External Data
A
command

Sound

Video

C

JPEG
Add it to
‘Favourites’ or
‘Bookmarks’.

TIFF
Cut and paste it to a
word processor
document.

C

C

privileged network. network topology

A

a footer.

an encryption.

B

IPP
Desktop server,
application, and
database.
Telephone line
File Transfer
Protocol

PoIP
Desktop server,
software, and
hardware.
None of the above

A

None of the above

C

So email is
delivered faster

None of the above

A

143.215.12.19

None of the above

D

paul.domain.uk

None of the above

B

No-one
None of the above
Internet Remote
Conversations
None of the above
A letter will be sent
to you in the post
None of the above

C

A
B

A
A

Hyper Text Markup Language

None of the above

C

High volumes of
email

None of the above

C

slide view & outline
view
none of the above

B

squares

icons

C

grid

guide

C

auto shapes

all the above

B

fonts & images
.video file

none the above
all the above

A
B

movelast,false

eof,true

D

toolbox

project explorer

D

movefirst,false

bof,true

D

number()

val()

D

square

oval

D
A
A

forecolor

none of the above

C

textunderline,true

none of the above

B

foresize
one-thousandth
of a second

D
fontsize
one-ten thousandth of a
C
second

itemcount

listcount

D

project explorer

toolbox

B

vbmsgboxstyle

none of the above

C

label

inputbox()

D

dbopensnapshot

dbopendynaset

D

unload

initialze

C

transparent

graphical

D

green

black

B

blue

D

toolbox

white
project explorer
window

toolbox

project explorer window A

text
container

gotfocus
none of the above

D

D
C

A
initialize

activate

D

caption

none of the above

C

openrecordset

none of the above

B

value

style

C

var

none of the above

B

.ctr

.ocx

B

Check

Audit
On Error Resume
Next

A

On Error Stop

D

A
Refresh
Resize
UnloadMode
parameter to a non- UnloadMode parameter
A
zero value
to a zero value

3

None of the above

Consists of Various
Consists of several
Forms And Code
Projects
Modules
Class module,
code module
Place code in the
Deactivate event

D

D

None of the above

A

None of the above

B

Refresh
Msgbox
error.number &
error.text

PaintPicture

A

GetFile

GetBytes

A

GetProperty

Value

B

Windows explorer

Input box

D

Multi-Line
KeyUp and
KeyDown

C
Font
KeyPress, KeyUp and
KeyDown
D

Input Mode

Output mode

B

ScaleHeight and
ScaleTop

x and y

A

Property Let

Property Set

C

ZOrder property

AutoRedraw property

C

Value

CurrentVal

B

SetAttr
Are actually not
properties

CStr

A

None of the above

B

Msgbox error.number
& error.description
D
To provide a
repository for images
To allow the editing used by other
D
controls
of icons

MyVar has not
been declared
The
ExecProcedure
method
An exclamation
icon

None of the above

C

None of the above

D

None of the above

B

intrinsic constant. built-in procedure.

C

InputBox function
can be created with
the macro recorder,
while the MsgBox
statement cannot.

MsgBox statement can
be created with the
macro recorder, while
the InputBox function
B
cannot.

Data can be
entered.

A new check box can
be added.

C

Deactivate

Terminate

C

cutting tool

scribble drawing tool

A

color scheme

color guide

C

color palette

primary color scheme

A

18

36

C

pie
slides

linear
slide sorter views

A
C

doughnut

all the above

A

data

stream

B

auto shapes

track changes

A

the chart window
opens displaying
a chart template
custom drawing
tools

none of the above

C

standard drawing tools

C

used to create a
manager box for
an existing box
not available in the
tool bar
thrice

used to store the other
tools of the
organizational chart

five

eight

B

standard tool

all the above

B

slide view

none of these

B

preview

none of the above

B

copying

moving

B

clip art

drawing tools

A

.doc(document)
six

.html(hypertext format) B
C
twelve

.txt(plain text)

.doc(document)

B

displayed only in
outline view

none of the above

A

both a and b

transition

D

slide show
master slide
view show

view show
master notes
slide sorter view

A
A
C

7.5 inches,5 inches none the above

B

a or b
transition

none of the above
b or c

A
A

png

none of the above

D

action button
Microsoft visual
interdev

all the above

D

all the above

B

templates

add-ins

A

C

available in the tool bar B
C
any of the above

when the slide
show is run

none of the above

C

header files

all the above

A

both a and b

none of the above

B

properties pane

outline pane

D

paint shop pro

power point 2000

D

contains sample
presentations for a provides suggested
content and design
variety of topics
user can insert
picture to the
master slide which
gets reflected in all
the slides using
that master slide
in notes pages
view, drag the
slide icon to a
new location

D

user can insert picture
to the title slide which
gets reflected in all the
slides using that title
slide

B

I slide view, drag the
slide icon to a new
location

C

design templates is
the template whose
format and color
scheme user
applies to a
presentation

the slide that holds
the formatted
placeholders for the
title and sub-title for
the presentation is
called a title template D

user should select
the slide view to
add the text to the
slide

the slides can be
reordered in the outline
B
view

design template is
the template whose
format and color
scheme user
applies to a
presentation

the slide that holds
the formatted
placeholders for the
title and subtitle for
the presentation is
called a title template D

new slide

set up show

B

data is plotted in a
chart window

user can add data
labels and gridlines to
the chart

B

the header slide

the format slide

B

grammar checker

none of the above

B

102

22

B

B
four times
text, hypertext, Power
Point, video and
CD-ROM, digital
D
camera and sound. sound.
Line style, Line color,
text font, and text
the Font and the
D
alignment
text alignment
three

Line thickness
Microsoft Graph
is started so that
you can create a
graph.

Fill color, Line color,
and Line thickness

D

The graph placeholder
is deleted.

C

taken from the
first column or
row of data in the
datasheet,
depending on
whether the data
series are in rows
or columns.
entered by the user.

C

Pie chart

Line chart

B

Pull down the Insert
menu and select
Chart, click the Insert
Chart button on the
Pull down the Insert Standard toolbar, or
pull down the Insert
menu and select
menu and select the
the appropriate
D
appropriate Object.
Object.

Pull down the Edit
menu, then select
Object.

You cannot display the
underlying datasheet
once the slide is
finished.

B

Click outside the
chart.

Change to Slide Sorter
view.

C

The datasheet is
saved as a
separate file.
The chart is
doubled in size.
The chart is
doubled in size.

bullet items one
word at a time.
Exciting

The datasheet
window is toggled
from closed to open
(or from open to
closed).
The application that
created the chart is
started.
Microsoft Graph will
restart.
a slide one bullet item
at a time, build bullet
items a letter at a
time, and build bullet
items a word at a
time.
Subtle, Moderate, or
Exciting

D

A
D

D
D

Both enter and
exit, and fly in
from top or
bottom

Neither enter nor exit;
neither fly in from top
nor bottom

C

Alt

Ctrl

B

Custom animation
can be used to affect
the way objects
appear on a slide, to
what objects do after
they appear on a
the way objects exit slide, and to the way
objects exit a slide.
a slide.

D

The advanced
timeline shows
the sequence in
which objects will
appear on the
slide and the
duration of the
effect applied to
each object.

C

Text
Filtering program
Dissolve in
Data cannot be
entered into
Datasheet.
OLST.

The advanced timeline
shows neither the
sequence in which
objects will appear on
the slide, nor the
duration of the effect
applied to each object.
Clips, organization
charts, and text
Animation program
Fly in, From top, and
Dissolve in

D
A
D

There is no such thing
as a Datasheet.

B

OLIP.

B

You cannot change
the style of the
connecting lines in You cannot change the
an Organization
color of the boxes in an
B
chart.
Organization chart.
[Alt+Z]

[Ctrl+Z]

D

.frm

.frx

B

loaditem

none of the above

B

addpicture
File1.Path =
Dir1.Path

none of the above

B

none of the above

B

msgbox()
File1.Path =
Dir1.Path

none of the above

C

recordcount

count

C

addnew

additem

C

additem

addnew

B

moveprevious

movefirst

C

File1.pattern=Dir1.path C

UnloadMode
parameter to a non- UnloadMode parameter
A
zero value
to a zero value

Office 97

Back Office

A

drag & drop

none of the above

A

select
ctr+end and
ctr+home
web layout, page
layout

none of the above

A

none of the above

B

none of the above

A

click from start
program, MSWord
from the task menu none of the above

A

document assistant none of the above

A

Icon Tip

A

Document Tip

ruler
none of the above
home and end keys
up and down arrow
only

B
D

decimal

rotation

D

dialogs/alerts

none of the above

B

both A and B
design wizard

none of the above
pictures

C
A

database
0
print preview from
the file

forms
11

A
A

none of the above

A

style box

none of the above

A

ctrl+f
ctrl+f

ctrl+m
ctrl+m

A
D

CTRL+SHIFT+S

CTRL+SHIFT+P

A

ctrl+shift+s

ctrl+shift+p

C

Both

None of the above

B
A
B

Limit Check

Reasonableness

D

A or B
ODBC
This involves
looking at a
system and
finding out how
information is
being handled

None of the above
All of the above

B
C

None of above

C

Maintenance,
reliability, and
upgradeability
To maintain
security

None of above

B
D

Saved to the disk

None of the above
Transferred from the
disk

Users operate the
manual system

None of above

B

Users continue
operating the old
system
None of above
User Guide and
technical
documentation
None of above
User guides cover
how to run the
system, enter
data, save, print,
etc.
None of above
Database systems
and backup
services
None of the above

A

A

C

C

A

floppy disk
Hard disk
To help someone
who is applying for
employment
None of the above

B

Address bus
TED

Control Bus
MAD

A
B

Address bus

Control Bus

D

B

Data structures that
Shells, compilers and
are part of the
other useful system
kernel of an
D
operating system. programs.
decimal form
represented 256
characters
16 bits

alphanumeric form
represented 127
characters
32 bits

A

230 bytes

1024 bytes

A

A
A

32 Mb of RAM
is the first bit in a
byte
DRAM
bytes
secondary storage
capacity

a 32-bit bus or 32-bit
registers

D

is the last bit in a byte

B

CROM
Hertz
secondary storage
access time

A
D

have medium clock use variable size
instructions
speeds

B

D

Logic Bus

A

All of the above
a modem interface
laser printer.

D
B
D

is used for cache
memory

B

none of the previous

C

contains a
microprocessor
none of the previous

C
B

writing programs in
multiple languages none of the previous

A

writing programs in
multiple languages none of the previous

D

Variables

Logic Bus

B

CD-ROM

e-mail

D

to run more than
one program at
the same time
multiuser

none of the above
none of the previous

C
C

PAGELAYOUT

ONLINE DOCUMENT

A

Variables
Data is not saved
before computer is
shut down
printer interface
ink-jet printer
stores more
information than
RAM
provides backup
power in the
event of a power
cut
is an access card
for a security
system
SSGA displays

ctrl+end

ctrl+home

B

ctrl+x or ins

ctrl+v or Del

A

ctrl+1

none of the above

B

AutoShape

Border

A

Page Layout

none of the above

A

Auto Shapes

File

A

WordArt

Bullets

D

remove
circle bullet dialog
box

clear all

D

none dialog box

A

AutoShapes

files

C

new document

default document

B

mail merge
shift+f8

none of t he above
tools+spelling menu

A
A

first row

last cell of the t able

A

enter
table auto format
option

none of the above

A

none of the above

A

records

none of the above

B

style gallery

none of the above

A

Data Source
vj++

none of the above
visual FoxPro

B
B

alt+f8

alt+f5

A

browser

none of the above

A

micro soft outlook

hotmail

A

sgml

vb script

A

arpanet

LAN

A

field names in the
header source
must match any
merge fields you've
inserted in the main
document

the number of fields
names in the header
source must be the
same as the number of
data fields in the data
B
source

by default cell
height and weight
option applies to
all the rows and
columns of a
table
justified

delete cells option
allows to delete the
entire row or a column
or shift cells up or shifts
C
cells left
A
top

If a header is
inserted in the
second section
then the same
header is
applicable to the
first section

A section is a portion
of a document in
which certain page
formatting option can
be set
D

A

A
A

Double Click

none of the above

automatically
corrects the
grammatically
errors

with t he caps lock key
accidentally turned on
reverses the case of
the letters that were
capitalized incorrectly
and then turns off the
caps lock

B
A

B

password are not
case sensitive
hanging

password can be upto
15 characters long
top

B
A

a multiple
documents files
can be inserted in
the single
document

an .xls data can not be
inserted at specified
position in the current
document

B
A
A

B
A
Hyperlink
Document

none of the above

A

Outline Layout

none of the above

B

Remove

none of the above

A

press the escape
key
height and width

just keep typing
rows and columns

D
D

backspace/ delete

shift

B

thesaurus

outliner

C

send private
messages to a
friend

send a package to a
friend

D

Page setup

Print preview

B

Retrieve
spacing

Save
sorting

C
B

word processing

spreadsheet

C

Storing information None of the above

B

clip art

C

clipboard

B
Storing information Making Calculations
Cut, copy, paste
Font, Paragraph, Bullet
C
and clear
and Numbering
Text which appear
at the top of every Designated area on the
C
page
document

Monitor, keyboard
and mouse

None of the above

B

microphone
Cut, copy, paste
and clear

digital scanner

D

None of the above

C

15 point

25 point

B

3 inches.

impossible to
determine.

B

You have not
specified
continuous section
breaks.

Word cannot display
columns during editing;
you will see them only
when you print the
A
document.

to move a section
of text from the
original location to
another location
A set of different
graphics

to leave an original
section of text in
place while pasting a
copy elsewhere

D

None of the above

B

Grammar Checker Find and Replace

B

Select all

AutoCorrect

B

Delete, then paste

Insert, then paste

A

To complicate the
revision process
and to force the
author to spend
more time making
corrections

To allow multiple
people to work on one
document in
collaboration with one
another

C

A vertical line
outside the left
margin signifies a
change has been
made at that point
in the document.

Comments are
enclosed in a text box
at the right of the
D
document.

Through tools on
the Reviewing
toolbar

Both through the
Tools menu and the
Reviewing toolbar

The Versions
command will allow
you to save only
one version of a
document without
any changes that
were just made to
the document.

The Versions command
will allow you to save
only two versions of a
document: one version
of the original and one
version of any changes
made to the document. A

The first and
second versions
are opened
automatically.

The previous version is
opened automatically. B

Spell check

Thesaurus

D

A

Word will show the
name of the person Word is not able to tell
who saved each
the most recent version
A
version.
of a document.

Forms

Insert

C

Text fields
Comments can be
edited or deleted
by right clicking
the highlighted
text.

A drop-down list

B

Comments can be
edited or deleted by left
clicking the highlighted
C
text.

Text which appear
at the top of every
page
None of the above

C

Copy and paste.

Insert page break.

D

forms.

numbers.

C

find/search.
Format Painter
button

macro.
This action is not
possible.

A

ss

Debugging

D

Format

Edit

C

the guidelines used
to establish where
different elements
of the newsletter
will go.
underlining the text
of the pull quote.

an enlarged capital
letter at the beginning
of a paragraph.

A

changing the color.

A

C

A dropped cap is a A grid is a set of
word that starts
horizontal and vertical
with a lowercase
lines that determine the
letter when it
placement of elements
should have a
in a newsletter or other
D
capital letter.
document.
The number of
columns

The tab spacing
within each column

D

12

72

D

Three
Press Enter to
create a section
break.
A serif font at 20
points

Four

B

4 inches

Press Shift+Enter to
C
force a line break.
A sans serif font at 45
D
points
It depends on the left
and right margins,
and how many
columns are
D
specified.

Both

None of the above

A

A or B

None of the Above

A

Gaps

All of the above

C

Merge

None of the above

A

HLOOKUP()

None of the above

B
A
A

A or B
duplicates testing

None of the above
All of the above

C
D

A

A
Range

Both B & C

B

a form of VRAM

none of the previous
involves using more
than one processor at
the same time

D

multiuser

D

make a backup
copy

use a virus protection
program

to print sheets of
paper
uses C++
1012 sec

to display information or
B
pictures on a screen
D
none of the previous.
D
109 sec

B

a message pad
an instruction that has
the address of a
been transferred from
memory location
memory.
an instruction that has
the address of a
been transferred from
memory location
memory
the address of the next
an instruction that instruction to be
has been executed executed

B

a light pen

a magic marker

A

Program

Data

B

Parity Checker
Validation

B
B

use find and replace

A

System

Modem

B

keep a record of
computer failures

backup to a secure
medium

D

Multiprogramming

Multiplexing

D

Floppy Disk

Magnetic Disk

B

a frog

Artificial
Intelligence
Range checking
use the backup
facility

C

A

D

Telephone modem Shareware

C

Telephone modem Shareware

A

Indexed

Random

C

CPU

Primary Storage

B

Files and Tracks

Schema and
subschema

A

File, record, field

Element, field, file

C

Systems logs

Parity check

C

MIDI interface

Serial interface

A

Sound

Video

D

Ink-jet

Drum

B

presenting an order
for stock to a
warehouse.
updated regularly

recording current stock
in a supermarket and
answering customer
A
queries.
C
updated once a year

Graphics package

Spreadsheet

retain confidentiality
of files
simplify file structures
4096
8192
virus infection
loss of data
IPX/SPX
printer can do
1000s of pages a
day
the root directory
uninterruptable
power supply

NetBEUI

D

C
C
D
A

the operating system is
B
easy to use
D
the hard drive
uniform page source

C

the system requires
a network
the system always
administrator to
requires a re-boot and
uninstall it
defrag afterwards

A

information.

text.

A

Logical Steps in
any language

None of the above

A

It is mandatory in
tally
None of the bove
prevent
unauthorised
access
allow encryption
IT understands the
business
None of the above

A

C
B

processing.

All of the above

D

Software that
generates
innovated designs
and artistic
patterns.

None of the above

A

enterprise

local

B

identify the file type
All of the above are
corrective controls. parts of IS controls.
dynamic hashing
extensible hashing

D

C: (a), (b), (c)
detective controls

D: (b), (c), (d)
general controls

C
C

Settings

Control

B

(a) to (d)
Select the „Shut
Down‟ option from
a menu.

(a), (b), (c)
Pull the power cord
from the back of the
computer.

C

Use the Find or
Search feature.

Put your hand up and
ask the teacher

C

(a) to (d)

(b), (c), (d)

C

identify the file

D
A

C

preventive controls corrective controls

C

(a) to (d)
program change
requests

(b), (c), (d)

C

resolution procedures

C

thread testing

loop testing

A

(a), (b), (c)

(a) to (d)

D

parallel operations

system walkthroughs

B

Concentrator.

Job control language.

D

(a), (b), (c)
(a), (c), (d)
Physical security of
warehouse
Cross-training of
facilities.
operating personnel.

A

procedural design
Computer network
Mesh

data design
Hub
Ring

A
C
A

Ring

All of the above

D

B

To help someone
who is applying for To Store data in an
employment
organised manner

B

Binary

B

Indexed

Operating systems
and compilers.
Computer operations. C
A direct access file A direct access file on a
C
on a disk
tape
Information formats
commonly vary
between
Data record can never
architectures
be blocked together
Address calculation
part
Input output channel

C

Wide area network Protocol

B

A

Generally require a
keyboard for data
entry and a CRT for
display

Are required with a
microprocessor which
permits some data
processing such as
input validation

Multiplexor

Time sharing computer C

Packs data in a
disk file

Speeds up online
printing

A

Loop Network

Star Network

D

Electronic mailing

Instant post-office

C

A personal
computer

A mainframe PC

B

Parity checks
Communication
protocol

All of them
Device interconnect
standard

C

D

D

A compiler is a
general purpose
language providing
very efficient
execution
None of the above

B

Lexical analysis,
CONVERSION,
and code
generation

None of the above

D

ASCII

EBCDIC

A

An interpreter is a
general purpose
language providing
very efficient
execution
None of the above
Frequency division Time Division
multiplexor
Multiplexor
Low-level
languages
None of the above
It is less prone to
attenuation

Uses only one path

A

C
C

D

Accounting
systems,
commercial sector

None of the above

C

Relieve the main
CPU of repetitive
communication
tasks

Reduce competition
between the
input/output devices

C

Testing

None of the above

B

Common carrier

Telephone Lines

C

System Analysis
involves creating a
formal model of the
problem to be
solved
None of the above

C

A buffer
Hardware,
Software and size
of program.

An online protocol

B

None of the above

B

Ring

Bus

B

1010101

None of the above

C

Cyclic Redundancy Hash Count

A

64

None of the above

A

Multiplexor
97

Acoustic coupler
None of the above

C
B

Data management
systems
All of them
secondary storage secondary storage
capacity
access time

B
B

256

None of the above

B

decimal form

alphanumeric form

A

5C4
16 bits

None of the above
32 bits

A
B

Bit Code Design
210 bits
1110

None of the above
210 bytes
None of the above

D
A
A

decimal form
Numeric Keypad
is the first bit in a
byte

alphanumeric form
None of the above

A
A

is the last bit in a byte

B

It has ears
bytes

None of the above
Hertz

D
D

Joystick
MHz

None of the above
VLSI

C
B

Reading bar codes None of the above

B

barcode scanning

voice recognition

B

CD-ROM drive
provides backup
power in the event
of a power cut
Light sensitive
elements
5 Mb

None of the above

A

none of the previous

C

None of the above
1 Gb

C
B

output
Numeric Keypad

input
Printer

A
B

Joystick

Scanner

C

Reading Bar Codes Digital Signatures

B

Keyboard
Optical mark
reader
Speakers
Storing information
on the hard disk

CD ROM Drive

A

Keyboard
Printer

B
A

Pixies
Pointing device
Optical mark
reader
SSGA displays

Pickers
CD-ROM

keyboard layout
Optical mark
reader
software interface

Back-up on a Cartridge B

None of the above
none of the previous
word processing
software
None of the above
an operating system

B
A

B
C
B
C

Smart card

None of the above

writing programs in
multiple languages none of the previous
writing programs in
multiple languages
To run more than
one program at the
same time
Third - generation
computers.
Multi-user
Param
is due to bad disk
blocks

A

A

none of the previous

B

none of the above
Fifth - generation
computers.
none of the previous
Arjun

C

none of the previous

C

Image Scanning
Technology

B

none of the previous
Thermal Printer
transmitting it

C
A
C

B

An ink pen

None of above
An inked ribbon and
print head

WAN technology
10-12 sec

Unix operating system
10-9 sec

B
D

External file labels

Cross footing tests

C

operating system
pilot project

communication
process

D
D

multiplexing

multitasking

D

micro computers

none of the above

A

central processing
unit
non impact printer

none of the above
none of the above

B
C

Magnetic Ink
Character
Recognition
Technology
converts a program
to machine code
Desk - jet Printer
compressing it
Virtual information
reader & user
system

A
A
C

D

electronic
spreadsheet

none of the above

B

idea processor

none of the above

B

Microsoft exchange none of the above
record
none of the above

B
C

high level language none of the above

B

connector symbol
fazitsu vp200
series

input/output symbol

B

IBM-PC

B

multiplexing

none of the above

D

dummy terminals

dummy servers

A

windows NT

LAN

D

back end

front end

D

back end
distributed
computing

front end

C

centralized

A

dumb processing

data processing

B

two
network database
system

many
relational database
system

A

multiplexing
disk
defragmentation

none of the above

B

disk mirroring

D

D

Module/De-module None of the above

B

constraints

traps

B

multiplexing
Local array of
networks.
thread

none of the above

B

None of the above
client-server

B
C

Integrated Services
Digital network.
None of the above.

C

ARPANET
SQL * plus

None of the above.
all of the above

B
D

GAN

None of the above.

B

Transmission
control
protocol/Internet
protocol
Packets

None of the above.
None of the above.

C
C

Simple Mail
transfer protocol

None of the above.

C

Hyper text

None of the above.

C

Area transfer mode None of the above.

B

Receiver

None of the above.

B

package

system

A

LAN and MAN
Internet

LAN WAN and MAN
Intranet

B
A

None of the above.

C

Integrated Services
Digital Network
Web based
Transport
Protocol
command
numerous alpha

Web based Transaction A
B
Repeaters
D
program
number and alpha

A

size, performance, input, output,
cost
performance ratios

C

PCs

mainframes

D

feed

write

A

multiplexing

multitasking

D

converter

process

D

ram

output

D

non-impact desktop
printers
thermal printers

C

monitor, program,
keyboard, bus

CPU, memory, input,
output

D

windows 95

interpreter

B

software's

procedures

C

assembler

coder

B

assembler

processor

C

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close