QUESTIONS TALLY The ------ key can be used to select an existing company from list of companies.
A
B
C
D
ANS
F1
ALT+F1
CTRL+F1
None of the above
A
Import and Export of data between Tally and other programs is possible only through ---------- Program.Tally ODBC The re-order point is the inventory quantity that TRUE trigger a stock replishment activity. A created company's detail can be modified through keys F3 A/An ------------- is the official notice that the firm sends to its customers to advise then to the amount of money that is owed. Invoice In tally,all masters have ________main options Two In tally,to create a new column in balance sheet Ctrl+C press _______ In tally,the use of group behaves like a sub-ledger, option is that we can summarize many ledger TRUE accounts into one line statements In tally, we can alter ledger details using either single or multiple modes but not alble to delete a ledger TRUE from multiple modes. In tally,a group company is marked with an ______________ *
Tally IMP false ALT+F3
Tally INI
None of the above
A A
CTRL+F3
None of the above
B
Bill Three Alt+C
A or B Four Alt+Ctrl+C
None of the above Five None of the above
C B B
FALSE
A
FALSE $ & Accounts payable and Receiving ^ Puchasing, Receiving and Accounts payable Mone of the above All of the above One Ctrl+D All of the above
A A
The systems that work together to order,receive, Puchasing and Puchasing and and pay for replenishment of stock are --------------- Accounts payable Receiving Tally allows to delete a ledger from --------- alteration Single Multiple A or B mode. --------------------- is/are useful for management in the Cash Flow Fund Flow decision making. Statements Statements Ratio Analysis In tally,the group company must contain at least _____________ members Two Three Four To cancel a vourcher entry in Tally, short-cut key is ---------Alt+D Alt+X Ctrl+T The accounting masters and inventory masters Create Display Alter Information Information related to Information We press ------------- function key to display the agewise analysis of Bills Receivable or Bills Payable F4 F5 F6 report In Tally, we press ------------, to print report . Alt+P Ctrl+P Shift+P In Tally, Types of Accounts and Types of Vouchers passed during the period, can be seen in ------------report. Tally Audit Statistics Day Book In the Tally Software, the ------------ directory stores all data entered by the user. Bin Data Sub The Ledger Accounts are unique in Financial Accounting Packages True False Customers can be permitted to enter their own data into the firm¶s computer using the firm¶s wide area Enterprise Data Enterprise Data - Electronic Data network is an example of Interchange Information Interchange. In Tally, we can customize the Vouchers as per our requirements TRUE FALSE The number of steps in Accounts Compilation are Each action/transaction of a firm is described by a --data element -------------. Tally is based on mercantile accounting system FALSE 2 data record TRUE Open Calculator 3 Field 4
D A D A B D
F7 None of the above
C A
Journal Book None of the above
B B A
All of the above
C A 5C
All of the above
B B
Display stock Ctrl + N is used to ----------valuation method ------------- in Tally classify the accounts under different heads so that summarised information is Ledgers possible. Revenue Account also known as -------------Personal Account Method of Voucher Numbering is/are Manual Accounts Receivable are displayed in Balance Sheet To assemble a product from different items ------------- entry is used Journal A --------- purchase orders data flow is directed to the purchasing system for use in closing out the outstanding purchase orders in the receiving system diagram. Filled Tally provides at least --------- predefined voucher 11 formats
Change Period
None of the above
B
Groups Nominal Automatic Profit & Loss Stock Journal
Journals Real None Journal Book Physical Stock Transfer
None of the above None of the above All of the above All of the above Reversing Journal
B B D A B
Receipt 16
Issue 18
None of the above
A 21 B B
The value of the inventory is included in a ledger FALSE TRUE accounts as an asset on the balance sheet " The buyers can follow up with the suppliers to management by management determine the reasons " is an example of --------------objective by exception -From voucher entry mode , if we press __________ then we get payment voucher in tally F4 Default Cost Category in Tally is/are -------------Main Location A Group Company is simply a name and an identify given to the merged accounts member companies of True the group. A ----------- is a primary document for recording all financial transactions. Ledgers The field can have a value between 0 to 9 ________________ in FA Package. The _______ file maintains data that describes the supplier past transaction with the firm in terms of Supplier material quality in AIS It is necessary to manipulate data to transform it into Report ---------------In tally, to change the date of the voucher press F2 ______ Tally can maintain budgets on ----------------
electronic data analysis
All of the above
B
F5 Primary
F6 Primary Cost Category
Alt+f5 All of the above
B C
False Reports 1 to 100 Vouchers 10 to 60 None of the above None
A C A
Suspense Output F4
Order Information Ctrl+f2
All of the above None of the above Ctrl+f4 None of the above
A C A C
Net Transactions Closing Balance A and B
The value of the inventory is included as an asset on the balance sheet True In ratio analysis report of Tally FA packagewe we press ________________ function key to the display of bills receivable , bills payables report F6 function key The accounts payable system is responsible for paying the suppliers for the ----------------Sales What is the default financial year in Tally6.3 1-4-1995 to 31-3_________________ 1996 Tally encrypts and stores TALLY DATA at the data directory True The Profit & Loss statement can be displayed in -----Horizontal ---------- format(s). Balance sheet & profit & loss profit & loss and trial Default ledger accounts in tally are ______ balance Default 'godown' name in tally is ____________ Primary Security 'Tally vault' is a _________________ mechanism To create a sales voucher in tally , you have to press _______ F5 A Group Company is ------------------------- given to the merged accounts of member companies of the group. a name In tally,"credit note" voucher type records entry for ________________ Sales return In tally you get currency symbol option from Company _______ menu creation ------------------ gives the balance for each day for the voucher type has been selected. Trial Balance For 'stock journal' entry we press ______________ F7 in tally Tally provides the capability to the Changes in administrator/auditor to track changes in the areas transactions or is/are vouchers In tally, types of users are _______________ 2 By pressing -------- key, a list of inventory reports can be displayed straightaway from the balace sheet report F9 Projected approximation of income or expenses is called ______________ . Balance sheet "Administrator" type user is also called 'Auditor' of a company in Tally TRUE You will get company information , if you press __________ from gateway of tally F3 A constituent(member) company can be a member TRUE of more than one group. Default stock category in tally is ______ Main location To create a log of the import activity in a file _____________ is located in the same directory as an executable program in tally Tally.imp In Tally,inventory valuation method option is available from _______ Stock summary Tally audit feature is available in a company __________________ In tally, a group company can also be a constituent(member) of another group company Default number of groups in tally are ________ During voucher entry ------------- are used.
False
A
Alt + f6 function F7 function key key
None of the above
A B B A
Purchases A or B None of the above 1-4-1996 to 31- 1-4-1997 to 31-33-1997 1998 None of the above False Vertical A or B None of the above
C
Profit & loss and Cash and profit trial balance & loss Cash and bank Main location A or b None of the above Ledger a/c F7 Cost category F8 None of the above F9
C B A C
an identity
A and B
None of the above
C A A B B
Purchase return a or b None of the above Stock items units Regional setting None of the above Daybook Alt + F7 Balance Sheet F10 None of the above F11
Changes in Ledger Masters Both A and B None of the above C 3 4 1B
F10
F11
F12 None
A C A
Profit & loss a/c Budget FALSE Ctrl+F3 FALSE Primary Alt+F3
None of the above
C A B
Symbol
None of them
Tally.ini
A or b
None
A A
Stock journal During the By pressing F11 creation of a company function key TRUE 128 Ledger Accounts Groups Owner FALSE 228
Stock analysis None of the above In 'comp info -> security control' option None
B A 16 C
28 Sub-Groups Data Entry B or C TallyVault
A A
User designated as --------------- can view audit list. Administrator
Tally supports Importing of data from ---------------In an accounting information system, which of the following types of computer files most likely would Inventory be a master file? subsidiary.
One company to another company Other programs created withon a spreadsheet or Tally Package a database file. Both A and B
None of the above
C
Cash disbursements. Cash receipts. Will be more Does not require Will produce a efficient at Which of the following is an advantage of a as stringent a set more accurate producing computer-based system for transaction processing of internal set of financial financial statements. over a manual system? A computer-based system: controls. statements. data to be transferred to memory data that has the address of been transferred a memory from memory location
Payroll transactions. A Eliminates the need to reconcile control accounts and subsidiary ledgers. C an instruction that has been transferred from memory C
The memory address register is used to store FUNDAMENTALS OF COMPUTER
Inefficient usage of excess computer equipment canContingency be controlled by Planning Which of the following is not the component of a NIC Card CPU A trailer label is used on a magnetic tape file, it is the last record and summarises the file. The following is Record Count an information not found in the trailer label
System Capacity feasibility report Planning VSAT RAM
Exception reporting AGP Card
C B
Hard copy is a term used to describe...? What do the abbreviations VAB stand for
Control totals for one or more fields Storing information on Writing on a hard board Printed output the hard disk Voice activated Voice answer Visual audio broadcasting back board Identification Number Boundary protection Pixels Identification number
End-of-file and end-ofreel code B
None of above None of above
B C
What control would prevent the accidental erasure of customer information from a magnetic tape Validity check What are the individual dots which make up a picture on the monitor screen called? Coloured spots Header label normally include all the following except File Name the
File protection ring Limited access files Pixies Reel Number None of above Batch Total
C B D
A daisy wheel is a type of...? Which approach or technique is a control usually associated with microcomputers
Storage device Pointing device None of above A Physical System Logs Console Log Data Dictionary B Security Electrically An inked ribbon An impact printer creates characters by using...? An ink pen charged ink and print head None of above C Use only unremovable The best security control in a microcomputer Restrict Require user Make duplicate copies environment is to physical access media passwords of files A What would you NOT use with a flatbed plotter? A pen Paper Eraser None of above C What do you need for an ink jet printer? A cartridge A drum A ribbon A cassette A Centralised Centralised function for PC function for PC Distributed policies or The greatest control exposure in a microcomputer Separation of acquisition Disposition environment is the lack of duties procedures A Printer A laser printer does NOT use? A print head The amount of data that a disk may contain is known as the disks...? Volume You can ________ protect a floppy disk. Information on a hard disk is usually backed-up using a...? Read Magnetic tape A laser beam Size Write PAN drive An INK RIBBON None of above Storage capacity None of above Read and Write None of above Floppy disk None of above C C B A
Serial access medium Magnetic tape is a...? Hard disks can have a storage capacity in the region of...? 1.44MB Which storage device has the largest capacity in A CD-ROM Mb? Which storage device cannot be erased? A CD-ROM By a sunny window
Random access A parallel access medium medium None of above 20 GB A floppy disk A floppy disk By magnet objects RAM chips ROM chips Registers Registers 1 bit 700MB Magnetic tape storage Magnetic tape storage In a drawer CDROM chips DRAM chips Logic bus Control unit 8 bits CACHE None of above None of above None of above None of above None of above None of above None of above None of above None of above None of above
A B C A C B B A B B A
Where should floppy disks be stored? The contents of these chips are lost when the computer is switched off? ROM chips What are responsible for storing permanent data and instructions? RAM chips Which parts of the computer perform arithmetic ALU calculations? What are small high speed memory units used for CPUs storing temporary results? How many bits of information can each memory cell in a computer chip hold? 0 bits
What type of computer chips are said to be volatile?RAM chips
Business software and games software Software can be divided into two areas: Travel agents use this computer system when Mainframe reserving flights computer Jon Von Which computers are used in the weather Notebook Supercompute Neumann computers forecasting industry? computers rs Second Hoover Vacuum tube based electronic computers are...? First generation generation generation Which generation of computer was developed from Second Fourth microchips? generation First generation generation Which generation of computer uses more than one Second microprocessor? generation Third generation Fifth generation Which generation of computer developed using Second integrated circuits? generation Third generation Fifth generation Which generation of computer developed using solid Second Third generation Fifth generation state components? generation DATABASES Specification, Name three steps involved in developing an Design, and information system Testing _______ is used for CAAT as database Oracle Generalized audit software perform auditors to undertake any past records and not concurrent auditing TRUE Generalized audit software is a file whose TRUE capabilities for verifying processing is logic CAAT's are computer program and data that auditor uses as part of the audit procedures to process data if audit significance contained in an entity information system TRUE CAAT do not contains package programs, purpose written program, utility programs or system yes management programs Embedded audit routines are sometimes built into an entity's computer system to provide data for later user by the auditor TRUE SCARF involves embedding audit software modules within an application system to provide continuous monitoring TRUE Concurrent use auditors as the member of the system TRUE Regular cross system verification may minimize frauds true Computer security is frequently associated with confidentiality, integrity and authentication true Data reserve engineering process metadata to document system and abstract business rules and true relationship to determine the audit The first step for developing CAAT is_________ objective Using the open database connectivity feature in ACL can bring the is ______________ data directly Computer Assisted Audited Technique involves the True use of computers through "Black Box Approach" Programming, Design, and Testing ACL
ROM chips Systems Network software software and application and security software software Personal Supercomputer computer
None of the above None of above
B B
None of above None of above None of above None of above None of above None of above
B A C C B A
Analysis, System Design, and Implementation None of above JCL none the above
A A
FALSE FALSE
A B
FALSE
A
no
B
FALSE
A
FALSE false false false
A A A A
false review and evaluate the types of data can bring the data indirectly
A to obtain a record layout extract data from file A all the above none of the above A
False
B
White Box Approach necessary involves expert knowledge on the part of Auditor
The transition from manual system to CIS environment bring dramatic changes including ________________
True change in the method of recording accounting transaction
False
A
use of accounting codes
absence of audit trails all the above
D
Auditing with computer necessarily supports the
CAAT involves an Auditors' appreciation of __________ Widespread end use computing result in unlimited errors creeping into system going to accept handling, thereby increasing audit risks true For computerized auditing usage of sophisticated audit software would be a necessity
documents driven risk driven approach approach unique approach none of the above hardware and processing software options, file data checks and configuration structure controls all the above
B
D
false
A
true the source of data available Important knowledge needed to begin planning the to the audit use of CAAT is _________ organization The move towards paperless EDI would eliminate much of the traditional audit trail, radically changing the nature of audit evidence true
false source of data for material planing
A
all the above
none of these
A
false providing access to computer to all organization use of any programs personnel
A
Computer operation controls are designed to provide of by all the ________________ concerned Systems development control, apart from others, include authorization, approval, testing, implementation and documentation of new systems true software and system software modification natural/manmade A system could be _________ A system exhibits 'entropy' true Super computer are the largest and fastest and is very suitable for commercial application including true audit work Assembler language uses Mnemonic symbols true Operating systems are devised to optimize the machine capabilities, the function include_______________
none of the above
D
false open/closed false conceptual/physi cal all of them
A D A
scheduled jobs
false false manage hardware & software resources
A A enable multiple user resource sharing
all the above
D
General purpose software provides a framework for highly complex scientific operation true In batch processing, transactions are processed one after another true The use of computer assisted audit techniques is with audit not gaining popularity not only ________________ departments On-line processing refers to grouping of transaction and processing the same in one go from start to finish true Real time refers to the technique of updating files with transaction data immediately after the occurrence of the event to which it relates true In OLRT the CPU should process the capability of program interruption true Time sharing system allow access to a CPU from remote terminals true DSS is defined as a system that provides tools to managers to assist them in solving structured problems true DSS has the following components _________________ databases Master files contains current records for identification and summarizing true Transaction files contain relatively permanent records take product profile, customer profile, true employee profile etc Master file configuration includes ____________ reference files ______ is a file management software package that lets users and programmers organize data into files and then process those files filex to have a complete CAATS provide added value to the clients because picture of a system _______________ File volatility refers to the number of addition and deletions to the file in a given period of time true File activity is the proportion of transaction file records that are actually used and accessed in a true given processing run: File interrogation refers to the _____ of information from a file back-ups One -to-one relationship means a single entity to a true single entity in a monogamous structure RDBMS is structured to a series of 2 dimensional true tables
false false with production departments all the above
B B
none of these
A
false
A
false false false
A A A
false planning language false
B model base all the above D B
false table files
report files
none of the above
B D
file-o-man decentralized picture of a system false
file manager
filepet
C
all the above
none of the above
A A
false retrieval false false software and database deletion addition
B B A A
SADB stands for ____________ Controls are present over many aspects of the computer system and its surrounding social environment In framed checking the data entry is checked against an expected picture or format Errors are correlated_________ Field check is exclusive to a field
seriously affected subject area database database
safety and database B
true true at the year end true
false false immediately false on quarterly basis none of the above
A B B A
_________ law basically states that there is a specific probability of the first digit of a no. being 1,2,3 etc
Benfish
Benford
Benjamin
none of the above
B
Check digit is a group of nos. added to a code for determining the accuracy of other digits in the code true
Hierarchical code means _________ The validation checks applied to a field depend on the field's logical inter relationships with other fields in the record TRUE The contents of a field could determine _______ sign for a ______ field valid, numeric Batch is the process of ______ together _____ that grouping, bear some type of relationship to one another transaction Hash totals means meaningless totals true With OLRT where interactive data entry is available, the master file associated with a transaction may be searched for confirming data true Controls are required for authorization to ensure data integrity and detect possible breaches in security true Data from client application are not stored in the organization's database through auditables events and function true All input records in a batch are normally of different true types incremental design and IDEA stands for enlarge activity _________________________________ A transaction file is sorted prior to the update of true master file A sequence check on the transaction or master files by an update program is not required true Whenever monetary transactions are processed against master files, the update program should maintain a correlation account to record such transaction that does not have a matching master file record true Internal tables are stored tables from which certain values are extracted for further processing and storing true
false blocks of nos. to consecutive nos. the primary random or alphabets to attribute of the placement of the entity entities component
A none of the above none of the above all the above A
all the above
A A
false
A
false
A
false false interactive data interactive data extraction and innumerable analysis analysis false false
B B
none of the above
B A A
false
B
false
A
For small to medium sized systems, individual modules are coded and individually tested and then assembled to be tested as a whole-the testing strategy is referred to as ___________________ e-brain In systems testing, test involves_________________ bottom up tests Recording transactions in a controlled manner may amount to loss of stored data yes
bouncing ball top-down tests no
big-bang hybrid tests
stub all the above
C D B
read data on Audit software is used by the auditor to _________ client's file Core image comparison is a software used by the auditor to compare _______ version of a program executables, with a secure ________ copy master Database analyzer is a software which provides detailed information concerning the operation of the database true
provide information to the audit
re-perform procedures carried out by the clients programs all the above
D
deleted, hard
none of these
all the above
A
false system system analysis advanced software SAS stands for ______________ software Embedded code is a software used by the auditor to true false examine backup data Embedded code performs wide variety of audit task yes Core image comparison is particularly useful where only executable versions are distributed true Log analysis is a software used by auditor to detect virus true On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a specific program or sever edit test is doing its work Mapping software is used by the auditor to list unused program instructions Mapping software has very objectives no false false
A
all the above
none of the above
A B A A B
manipulates, real true yes
create, false false no can enable the auditor to execute provisions on a number of different bases no
none of these
all the above
A A A
can be very Modeling is a variety of software which powerful ________________ analytical tool On line testing can be targeted for specific functions yes carried out by programs
can provide the auditors with useful information with trend s and patterns all of the above
D A
Program code analysis involves _____________ __________ is a software of CAAT
identifies program code which may be provides detailed there for fraudulent information of reason machine uses IDEA ACL
examination of source code of a program with advice to following the logic of a none of the above program ALC ACLL
C B
Snapshot is software which takes a picture of a file or data or a transaction passing though the system true
false
A
Base case system evaluation includes____________ While base testing forces on finding if there are any true defective execution policies in a program Black box testing seeks to determine whether application output is what it is supposed to be true
fictitious data applied against the client program
comparison of source version of a programmed false false
analyzing the picture of a file or data all the above
A A A
In integrated test facility approach the auditor should ensure that the impact of test transaction is true subsequently eliminated from the computer files Black box testing is _______ based and white box specification, testing is _______ based program identifying erroneous code Source code review means__________ In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine how the defects may impact the attainment of the true program objectives All material application oriented events that occur within the boundary subsystem should be recorded in the accounting audit trail true In examination of audit trail the following data associated with an event may be ___________start and finish time
false file, hardware none of the above all the above
A A
identifying identifying nonineffective code standard code
all the above
D
false
A
false authentication of resource information requested support job connectivity language all the above no
A
all the above
D
job control language JCL means_________________ Audit should be periodically analyzed to detect any control weakness of the system yes In an accounting audit trail, intrusion detection system might monitor the amount of processor time consumed by the user to detect unusual deviation from the amount processor time requested by the true user in the past A sample size calculator program assists auditors in true determining RAND() function package computer p[program for performing a variety of data processing Generalized audit software consists ___________ function
none of the above
A A
false false
A B
mathematical concept
Specializes audit program may be___________
prepared by the auditor
master list of administered transactions questionnaire prepared by an outside programmer prepared by the engaged by the auditor all the above entity
A
D
Generalised audit software could be used by the following in consistencies or significant fluctuations true file Generalized audit software function access/organizati include____________ ons In the file reorganization merging capabilities are needed in data from separate file is to be combined true on a separate work file Auditors cannot use generalised audit software to extract the data needed for audit purpose true Auditors can combine functional capabilities of examining the generalized audit software to accomplish the task of quality of system __________________ process
false stratification and statistical/arithm frequency etic operation all the above analysis
A
D
false false carrying examining the analytical review quality of data
B B
all the above
D
Which of the following is not the feature of GAPs Which is the example of CAATs
In audit procedures, test data is
Which of the following is not the use of CAATs Which of the following are called explicitly by another procedure? _________ data type is generally used for fields assigned as primary keys in a table
Wide access to Can extract and Can aid in simple Can define the audit various data base analyse data selection objectives High End ACL IDEA CAATs All of the above A special A sample of A utility software purpose written program transactions programme None of the above Compliance tests Tests of details Analytical review of general EDP controls All of the above of transactions procedures Action Event Procedures Procedures Macros General Procedures integer number false events form expression elements code builder procedures chart comments expression builder expression elements list box insert auto report datasheet none of the above macros action primary number auto number
D D
A
D D D A B D D
MS access objects can be published in the web true In code-builder, got_focuse, click,dbl_click,enter are actions examples of _______ _______can be used to automate certain actions in response to events report In the macro sheet the macro is selected in the _____field macro To build complex expressions_____is used The three list boxes present at the bottom of the expression builder are called_____ ________option is selected from the view menu to create macros with conditions _______report can be created with minimum user input _______layout of a form displays one record at a time The table or query name on which we are going to build our report is selected from the ____ dialogue box ______and_____are the two types of auto reports available There are no wizards for creating a database in access calculator
expression elements C
action list conditions tabular tabular
macro list action columnar columnar
none of the above none of the above embedded justified
C A C B
create report columnar and tabular true
link report stable and unstable false
embedded report new report dynamic and none of the above static
D A B
______option from the insert menu option is chosen to add an embedded chart create fields In ms-access, while using SQL, references primary key constraint is used for creating _______ _______is used to create a mailing label label wizard ______header is present at the beginning of the report start header ______is present at the bottom of each page in a report footer report
add chart alternate key chart wizard group header page footer
chart foreign key mail wizard page header
insert chart none of the above none of the above report header
C C A D B
In SQL, having clause is used for _________ ______field is added to the macro sheet when we select grouping option from the view menu ______can be used to create toolbars _______query is used to add records from one or more tables into an existing table _______window is used to write VB code in access application Values for other tables, queries are maintained in look up fields data type Visual Basic language is a _____ tool
for ordering records condition VB Modules add report true RAD
for updating records group reports append macro sheet false RAP MsgBox
group footer none of the above for specifying conditions with group by none of the above clause macro names forms insert module none of the above macros delete none of the above
C C D B C A A B
RAID message
none of the above none of the above
______ function is used to display a message box SysCmd Other ms-office applications can be accessed from ms-access using a concept called ________ OLE object linking and embedding OLE stands for_____ The application that supplies data in OLE is called an _________ OLE object If any change made on the object from the client side is reflected on the server then the object is said linked to be _____ _______is the file format that works on internet exe ______ is used to convert any ms-access object into html format form wizard _______ option in publish to web wizard produces a page that is static in nature static file _______query is used to create or change database objects in a current database append Currency fields express the amount in _________ dollars _______is selected from the toolbar to add an OLE unbound object object To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box display as icon _______option from the file menu is selected to run create html 'publish to the web wizard' _____page in an web application is used to navigate startup to the rest of the pages in the application ______ is fired when an event is triggered is the bullet concept based on a Visual Basic language Ms access is a ___________ DBMS A collection of data stored in different objects is data group known as a _________
DDE
CME
none of the above none of the above OLE communicator
A A C
on line execution on line editing OLE client OLE server
embedded DLL report wizard static html add rupees bound object
edited html publish to web wizard none of the above data definition yen
A D D B D A B
command button list box
display new
link save as html
create icon none of the above
A C
home command RDBMS
end procedure front end
none of the above none of the above language
B C A C
data collection database data storage new blank database dialog new database dialog box A blank database can be created using __________new dialog box box database dialog box Text type data can be of _____ characters in 255 64000 235 63500 ACCESS ______is a datatype that assigns values automatic automatically number AutoNumber number automatic field Tables cannot be imported from other databases true If two tables having same values for the fields are joined it is called an ______ inner join Duplication of records in a field won't be allowed if the fields are declared a________ primary key Changes from a master table can be reflected on to cascade delete the child table by selecting _____option related records To see more than one record at a time in a form we use _______ columnar In SQL, delete command is used to remove table or tables _________ In MS-Access, filter excluding selection will display true only those record(s) which meet the criteria. Properties of the fields are managed by _____ in property field Dynaset ______queries allows us to view data in row by crosstab column manner queries The type of queries that can update or delete record(s) in a table(s) are called __________ action queries Joining tables without any matching values in the fields is called ____________ inner join Primary key uniquely identifies each record true Which of the following dialog box is/are used in the new form dialog creation of form ________ box _______ query wizards are used to generate summary calculations for a table summary Properties of a form can be changed by selecting change ______from view menu options properties Forms that are included in other forms are called included form ______________ In MS-Access, while using form design view, for creating a command button for adding a new record, we should select the _______ category from the Record command button wizard Navigation _______ form displays fields in a single horizontal columnar form row false outer join not null explicit join candidate key none of the above no duplicate key
A A B B A A
cascade change cascade update change all related related records related fields records both a and b record or query or queries records tabular none of the above none of the above
C B C
false field property row/column queries row/column queries self join false form create dialog box sum properties sub form Dynaset field properties select queries change/delete queries no match join form wizard dialog append form properties new form properties update queries update queries outer join
B B A A D A D D B B
both 1 and 3 simple new properties child form
Record Operations tabular form
Form Operations None of the above hierarchical form one to many form
B B
The process of arranging the data in a meaningful order is known as ___________ filtering ______ are used to select only some particular records from the table or any other database objectsfilter In MS-Access, user may specify criteria for filter in form view using _________ filter by form ___wildcard character represents any single * character Records cannot be sorted by a primary key true A control without a data source is known as ___________ bound control Set of related option buttons, check boxes and button group toggle buttons is known as _____________ Which of the following is control types bound ____________ In MS-Access, the function that gives the current date is _____________ CURRDATE() _____is a control that lists set of data text box ______is a form that summarize large amount of pivot table data ______allows to create a filter by typing the value in a data sheet data sheet filter Wizards for toolbox controls are called a __________ button wizard The wild card representation for any 5 letter word that starts with ram is ________________ ram* Look up fields slow up data entry true ____is an access object that displays un-editable data report _____option from the new object toolbar gives the easiest way of generating a report autoreport ______ represents data in a pictorial format chart Changes of one table can be carried over to another related table true Hyperlinks are used to jump to any kind of information or data from a file true The memo field can have text upto_____ characters 60,000 in length In MS-Access, columnar layout can be used to view true multiple records in a form In MS-Access, alter command may be used in adding a primary key to a table true Update query is used to add records from one or more tables to the end of an existing table true In ms-access, datasheet view is available in ___________ table ______are used to jump to any kind of information table from a datasheet or a form Home page will always be present as a first page of true an application Make table queries create a new table from the records of another table true In ms-access, to protect a database file from illegal access, we may set database password. The option of setting database password is available in _______ menu Insert Foreign key is a field that uniquely identifies each true record and accept no null values Data definition queries are used to create or change true database objects The attributes of a composite key are known as ________ alternate keys OLE object is a data type in access true Data displayed in forms cannot be edited true A sub form is used to display one to many relationship between tables true We can switch from datasheet view to form view by true selecting view -> form view option In MS-Access long integer is a datatype true In MS-Access, while designing a table for a particular field, the Required parameter is set to yes. This validates the field as _______ null Sorting is applied to select only some particular records true Filter by form can be created from a forms shortcut menu true Advanced filter uses a filter similar to the query true design window to create a filter ? Wildcard character represents any number of characters true _________ of the following is/are a type of chart pie A bound control is tied to a underlying query or tabletrue A calculated control uses expression as a source of data true Text boxes cannot be bound controls true The default query invoked by ms-access is update query A control can be bind to a record using row source property true List box is a control that offers a list of choices true If a table is joined to itself it is called a ________________ inner join A picture box combines the activities of both a text box or a list box true Line is a tool box control true Text boxes can be part of a option group true _____ chart exists as a separate object freestanding Filtering data is a way of arranging data in a meaning full order true Wild card characters are used for sorting records true Pivot tables are used to navigate to the other tables true in a database Reports are used to represent un-editable data true
ordering
sorting
querying
C
sorts
pipes
gateways None of the above ?
A A D B B B C C B A C C B B A A A A A
filter by selection filter by menu $ false unbound control option group unbound TODAY() list box columnar form filter by input control wizard ram?? false form report label false false 255 false false false query form false false form report 25,000 @
data less control data control controls group controlled DATE() combo box tabular form filter by form option control wizard record group all of the above DAY() static text main form none of the above tool wizard
In MS -Access, the records in a table are sorted based on _________
the first field of the table
the last field of the table reports false insert false false
primary key field none of the above attributes entities
C D A
Relationship is an association between _________ forms Summary options dialog box is used to summarize true data ______ queries can be used to delete a group of records that meet some specific records delete Charts can convert numerical data in a easily understandable format true Embedded charts exist separately true From ms - access, if we want to view the records stored in a table in ms - excel worksheet, we need to use hyperlink Page header is present at the beginning of each true record Detail section has a header and footer true A macro is performed only when the user initiates an true event The macro is selected from the action field of a true macro sheet A macro can be made to execute before the starting of a database true In MS-Access. While appending records, the source and the target table must have similar structure and fields true We can add our own functions to the expression elements list box of the expression builder
append
add
A A B
use import false false false false false
use datasheet in use export forms
D B B B A A
false
A
true
false
A
_______is the wildcard character which represents the presence of any number of characters & Macros can be used to add a menu to a database true object _____ header is a unique feature of reports page Chart can either be a form or a report true Group header will be present at the design view of a report even if the report is not grouped true We can change from the design view to the form view without being prompted for saving the changes made true Charts can be produced without the wizard true Macros can be used to create user defined error true messages Between and Not Between is ______ type of relational operators The default data type of VB is integer true
# false detail false false
?
*
D A C A B
group
topic
false false false list false range logical
A B A C B
Visual Basic is based on __________ _______is the name of the database object that displays data and can be used to edit data report In access OLE objects cannot be linked true _____ section is present for each record in the group report A ________ sheet lists all the properties that pertain to the form or the controls data Textboxes can also be an example of unbound control true In MS-Access, we may design command buttons for navigating records true
event structured query procedural based language action language language none of the above form false record property false false inner form labels index form sorts unbound button none of the above report identifier none of the above forms none of the above option button query table
C B B D B A A A B B A A C B A C A A A C B
session both a and b
detail none of the above
_______are forms that are included in other forms sub forms child forms _______ are used to represent our data in graphical graphs chart format A field with a _______ uniquely identifies each record number primary key Large amount of data can be summarized using ______ tables pivot create _______ are employed to select only some particular records from a database object filters queries ______ control need not have a data source form bound ______ control combines the functionality of both a text box and a drop down list list box combo box MS access is a DBMS true false A form can be bind to a record source using _____ property of the form form name control ______ forms displays field in single row tabular form chart form ______ forms are usually used for tables with one to many relationship sub forms tabular form _______ control uses an expression as a source of control calculated bound _______ control is tied to field calculated unbound _______is the form that can be created with minimum input from the user sub form auto form ______option from the tool menu is selected for setting relationships between tables set relation connect option, toggle and command button, check ______,______and_____are the buttons belonging command buttons and list boxes to the options group _________allows us to create a filter from a field short cut menu filter by form filter by report ________is a database object which displays data but cannot be used to edit data form report What term applies to a collection of related records clipboard file in a database? All of the following terms are related to computerized search sort databases except which one? A way to analyse and manipulate numerical information A tool to produce high quality documents
record source none of the above data sheet form none of the above columnar form unbound bound tabular form relationships list, check and combo boxes filter by record macro field none of the above none of the above static columnar form
none of the above C option button, toggle button and check boxes D filter by input table layout D B B
What is a database?
field names record grab D An organised way of storing information about a set of similar A way of maintaining things a log C
What does a record contain? An RDBMS is a
It contains all the A document Information about data about one which contains text certain programs specific item remote DBMS storing data offline at a separate site relative DBMS backing up data regularly Computer sequence checks Reports provide a very flexible way of creating and editing documents
A collection of files
B C
Relational DBMS Reliable DBMS
Data Warehousing refers to Unauthorised alteration of on-line records can be prevented by employing
is related to data uses tape as opposed mining to disk C Computer matching A tool which allows text and graphics to be placed in documents Database access controls
Key verification Reports allow users to extract information as hard copy (printed output)
D
What is a report?
None of the above
A
What is the best way to analyse and change data
Extracting and analysing data
Spreadsheets make data easy Using queries to analyse
None of the above
C
Compilers, What are some popular office orientated software interpreters, applications? editors DEFAULT and Which of the following constraints can be used to NOT NULL enforce the uniqueness of rows in a table? constraints Which of the following commands is used to changeCHANGE the structure of table? TABLE You are creating a client application that calls ActiveX DLLs. Which of the following properties of the Err object provides the name of a component that sends an error back to the client application? Number
Word processors, Network spreadsheets, software, backup systems databases, DTP None of the above PRIMARY KEY FOREIGN KEY and UNIQUE constraints IDENTITY columns constraints MODIFY TABLE ALTER TABLE UPDATE TABLE
C
C C
Description
This database holds personal information. The user keeping a can help to keep it confidential by using a password backup copy If the database holds customer names and addresses, personalised letters can be created automatically using the product code the primary key Application software suited to storing the survey information obtained in the table would be A database Graphics The characters * and ? are sometimes used in search criteria as bookmarks operators Which of the following field types will generate the Auto Primary Auto ID primary key automatically? records in a dynaset are consistent with the underlying tables.
Component keeping the original paper copy
Source saving the file with different filenames
D
A
mail merge browser wildcards AutoNumber
e-mail e-mail engines Auto Key
C A C C
Referential integrity ensures that the:
Tables are related to one another through a:
A foreign key is: You are creating a banking database to track customer loans. The bank will, of course, have many customers, each of whom may take out one or more loans, while each loan may be associated with only one customer (there are no joint accounts). What is the re One-to-one In a one-to-many relationship between Companies and Employees, which field is found in both tables? Which of the following ensures that records in related tables are consistent with one another? For example, it ensures that you cannot add a record with an invalid foreign key.
forms in a database are consistent with reports are consistent the underlying with the underlying tables or queries. tables or queries. B query and its main form and a associated report and its related dynaset. subform. query. foreign key. A the primary key of the primary key both related of the related a field from an not a primary key of tables. table. unrelated table. either related table. B related tables in a database are consistent with one another.
One-to-many
Many-to-many
Many-to-one
B
EmployeeID
CompanyID
EmployeeLastNa me CompanyAddress
A
The Tools menu, Relationship Referential window integrity
The join line
The one-to-many relationship
B
Right-click the Relationship line, then select Select Undo in Click the Delete How would you delete a relationship between tablesDouble click the Delete from the the Relationships Relationships button in the Relationships window? Relationship line shortcut menu pull-down menu on the toolbar B That there are several That some of That there are That records can be customers In a Customers tables, what does a plus sign next toassociated with the data is not records in a added by clicking on the CustomerID field mean? viewable related table the plus sign that ID C They cannot be They must both They cannot be AutoNumber They must be the text fields same data type What is required of the fields that join two tables? be numbers data types D
The customer¶s ID is deleted from the Assume a one-to-many relationship between the The customer¶s Customers table, Customers table and the Loans table, with referential Nothing, Access ID is deleted and all the integrity in effect. What happens when you attempt ignores the from the related loans are to delete a customer ID from the Customer table that Customers attempted deleted from the An error message is still has entries in the Loans table? table. command. displayed. Loans table. D The subform is an object on the form Which of the following is true when viewing a main The subform is The subform is and can be moved or sized like any other form and its associated subform in the Form Design The subform is displayed in displayed in object. not visible. view? Datasheet view. Form view. D
A one-to-many Which of the following relationships does not belongrelationship in a database based on a professional sports leaguebetween teams and players such as football or basketball? Which symbol is used at the end of the join line in a related table to signify the ³many´ side of a one-tomany relationship? #
A one-to-many relationship between teams and coaches
A one-to-many relationship A many-to-many between coaches relationship between and teams players and teams C
M
¥
*
C
You have created a one-to-many relationship with referential integrity between a Customers table and a Either table at Loans table. From which table can you delete a any time record? The correct order of the arguments for the MsgBox prompt, title bar statement is: text, icon. The first statement in a procedure named CreateList is: Dim CreateList. A check box enables the form user to choose from one of several existing entries. must be set for one word.
The Customers table only when there are Loan records associated with that customer prompt, icon, title bar text.
The Loans table Neither table at any time title bar text, title bar text, icon, prompt, icon. prompt. Sub.
C B B
Sub CreateList. CreateList.
A text field enables the form A drop-down list user to choose enables the user from one of to choose from several existing one of several Which of the following is TRUE related to form entries. fields? existing entries. must be set for does not have to A text field: multiple words. be set. create tables of help people keep store data in rows and track of things. tables. The purpose of a database is to: columns. A database stores: data. relationships. metadata. A database records: facts. figures. information. single-user multiuser e-commerce A sales contact manager used by a salesperson is database database database an example of _______________ application application application single-user multiuser e-commerce A Customer Resource Management (CRM) system database database database is an example of_________ application application application The industry standard supported by all major DBMSs that allows tables to be joined together is called __________. A program whose job is to create, process and administer databases is called the _____ Microsoft Access may use which of the following DBMS engines?
A drop-down list enables the user to enter text. must be set for two words. maintain data on different things in different tables. all of the above a and b
C C
A D D
a or b
A
None of above
B
Structured Sequential Query Question Structured Query Relational Question Language (SQL) Language (SQL) Language (SQL) Language (RQL) Database Database Data Business Relational Model Management Modeling System System Model System Manager Jet SQL Server The database application the DBMS accesses the database data creates form the database application Oracle a and b The database management system (DBMS) All of the above.
C
B D
Which of the following are basic components of an enterprise-class database system? The user the database application(s) interact(s) with In an enterprise-class database system ________ . the DBMS In an enterprise-class database system, the database application ___ . creates queries In an enterprise-class database system, reports are the user created by ____________________ .
D
None of above
All of above
A D
A database is considered "self-describing" because all the users' data it reduces data _______ . is in one place duplication In an enterprise-class database system, the holds user data holds metadata database _________ . as a new systems A database designed using spreadsheets from the development Sales department is a database being designed from existing data project _________________________ . as a new systems A database designed to implement requirements for a reporting application needed by the Sales from existing non- development project department is a database being designed _______ .database data as a new A database designed to combine two databases systems used by the Sales department is a database being development designed _________________________ . from existing data project Database professionals use ________________ as specific data sources for studies and analyses. data marts Database professionals use a set of principles called ________________ to guide and assess database design. data marts A very popular development technique used by database professionals for database design is known as _______________________ .
creates reports b and c the database management system (DBMS) the database it contains a description of its own structure All of the above. holds indexes All of the above.
B
C D
as a redesign of an existing a and b database as a redesign of an existing database a and b as a redesign of an existing database a and b entity-relationship data modeling entity-relationship data modeling
A
B
C
normalization
data models
A
normalization
data models
B
data marts
normalization
data models
entity-relationship data modeling
D
A very popular development technique used by database professionals to adopt a database design to new or changing requirement is known as _____ .data marts normalization The predecessor(s) of database processing was hierarchical file managers (were) __________ . models entities in a the order of the column vary as to columns is kind important In a relation __________________________ . An attribute is also known as a(n) table relation . A combination of one or more columns used to identify particular rows in a is___ . record field A combination of two or more columns used to identify particular rows in a relation is________ . record field A determinant that determines all the other columns record field in a relation is______ .
entityrelationship data modeling data migration network models the order of the rows is unimportant row key composite key foreign key
D
relational data model A more than one column can use the same name C field tuple foreign key candidate key D C C D
When designing a database, one of the candidate keys in a relation is selected as the _________ . composite key primary key Normalization is a process used to deal with which of the following modification anomalies? Insertion anomaly Update anomaly assess the existing tables' When you are given a set of tables and asked to design the create a database to store their data, the first step isstructure and database content to ____ . structure are supplied by were essentially several wellkilled off by MS Modern microcomputer personal DBMS established Access products______. manufacturers
foreign key
surrogate key
B D
Deletion anomaly All of above
create one or move the data into the more new tables new database A
have poor response time
are not true DBMS products
B
Which of the following are true about data mining applications? We have obtained access to the company's operational data. We examine 50 records for customers with phone numbers that should use the current area code of 345. Of these 50 records, we find 10 that still use an older area code of 567. This is an example dirty data We have obtained access to the company's operational data. We have been asked to produce a report with an item by item analysis of sales, but the only sales figure available is the total sale value for dirty data each order. This is example of_____
They use sophisticated mathematical techniques.
Their report delivery is more difficult than report delivery Nonintegrated for reporting data systems.
None of the above
A
inconsistent data
nonintegrated data
a "wrong format" problem
B
inconsistent data
nonintegrated data
a "wrong format" problem
D
A data warehouse database differs from an operational database because: Which of the following objects is used to display a Form menu? Which of the following objects are NOT found in an Forms and Access application? reports
data warehouse data warehouse databases do data warehouse not have data are not data are often b and c stored in tables. metadata. denormalized. Table Queries and tables Report Macros Query Spreadsheets
C A D
It will be easier for the user to upgrade it if the You are developing an Access application that you objects and tables are in one expect to upgrade periodically. Which of the database. following statements is TRUE?
It will be easier for the user to upgrade it if the It is advisable to put each object objects are in and table into a one database and the tables in separate database. another.
Regardless of how the objects and tables are stored, the user will have to reenter the data in the tables when the application is upgraded. B
An application may consist of multiple The Link Tables databases, each An application can be command can be with multiple All objects in an created in such a way used to associate objects, linked to application, that it objects such as the tables in one yet another forms and reports can including the database with the database be changed without tables, must Which of the following statements regarding Access objects in another containing only reside within the disturbing the existing tables. database. applications is NOT true? same database. data. C Which of the following brings a copy of the table into the current database and does not maintain a tie to the original table? Import Link Merge Join A It contains tables, reports, It contains a user It contains more queries, and interface, or forms than one table What makes a database an application? It contains macros switchboard C What is the Access tool that is used to create the Interface Design Menu Wizard Build Menu Switchboard Manager D user interface? Wizard put key business information into the hands or store all corporate more decision transaction data in makers. one single location.
The purpose of a data warehouse is to: ___________ means the result of applying to specific information certain specific technical processes. Digital Sign __________ is an algorithm which creates a digital representation or "fingerprint" in the form of a "hash result". Hash Function __________ is of standard length which is usually much smaller than the message but nevertheless substantially unique to it. Hash Function
create backups for mission centralize the critical corporate manageability of data. data collection. Digital Certificate
C
Digital Signature None of the above
C
Digital Signature Digital Certificate Private Key
A
Hash Value
Hash Result
Either B or C
D
Digital Signature involves two processes. They are Digital Signature ___________ and __________. creation Institutional Overhead and Subscriber The Costs of Digital Signature consists mainly of theRelying Party following Cost Certification CA stands for ________________ Authority A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key
Digital Signature Both A and B Verification
Either A or B
C
Subscriber Relying Party Cost Certified Authority
Institutional Overhead Certificate Authority
None of the above None of the above
A A
True
False
A
A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration date of the Private Key, Serial number of the digital certificate True
False Personal Digital None of the above Certificate
B
______________ enable web servers to operate in a Developer Server Certificate Certificate secure mode.
A
______________ are used by individuals when they exchange messages with other users or online Developer services. Server Certificate Certificate ______________ are on-line databases of certificates and other information available for retrieval and use in verifying digital signatures. Private Certificate Repositories Evidence, Ceremony, Approval True
Personal Digital certificate None of the above
C
Public Key Efficiency and logistics, Evidence
none of the above
B
Signing Writings serve the following general purposes______,_______,_______ and _______ The most widely accepted format for Digital Certificate is defined by the CCITT X.509
Approval, Evidence False
Evidence, Ceremony, Approval, Efficiency and Logistics D A
A certificate may prove to be unreliable, such as in situations where the subscriber misrepresents his identity to the certification authority True Certificate CRL stands for Revocation List The prospective signer identified in the digital Private Key, certificate holds the_________ and is called the Subscriber ___________ In EDI interface, the translation service receives Internal Format _________ as incoming files from the File communication service The EDI standardisation for International Trade and Commerce is introduced by __________ ANSI In EDI, the transmission files are composed of different sets of external format files which are grouped into multiple sets under the name of batch files ________ The ________________ are pre-paid credit cards that include an embedded cards Smart Card ________________ are another form of credit payment that lets customers use digital online cheques to pay Web merchants directly E-cash In Active advertisement, there are two types of models. They are _____ and ________ Billboards and Junk Mail
False Certificate Resource List Public key, Recipient certificate Revocation LetterNone Of The Above Private Key, Recipient
A
A
None Of The Above
A
External Format Transmission File File UN/EBCDIC UNESCO
None of the above UN/EDIFACT
C D
interchange sets functions Embedded cards SET
functional groups None of the above
D A
Digital Cash Online Catalog and Billboards E-mail
Smart Cards Broadcast and Junk Mail EFT
Electronic cheques Online Catalog and Customer Endorsements All of the above
D
C D
The network based technology is/are ____________ EDI Decryption is a process employed for scrambling of True plain text for web based transactions Asymmetric cryptosystem is based on __________ Login_Id and and ____________ Password
False Public Key and Private Key None of the above
B
Primary Key and Public Key and Private Key Password Satellite Area Value Added Network is an example of _________ Global Network Private Network Network Passive or pull- Glow sign or The advertising strategies emerging in the on-line Active or push based hoarding world are ____________ based advertising advertising strategies The _________ model use direct mail, spot television or cable television, in active based Broadcast Junk mail Billboard advertisement. The ________ is a form of mail that is not targeted to a specific audience E-mail Bulk-mail Direct-mail The __________ model refers to information that is placed at a point where it will be noticed by customers in the course of other activities and does Catalog Endorsement Billboard not require active search Low cost of The most beneficial advantage of ERP system is Error checking Data Integration operation What is the term that describes spying on one¶s business rivals to gain a competitive advantage? Competitive espionage Corporate espionage Contact numbers of the management group multi-user database application Industrial espionage
D B
All of the above
D
Endorsements Junk mail
A D
Broadcast
C
Quality management B
Economic espionage C
A list of What would you NOT be looking for when spying oncompetitor¶s a competitor? clients single-user An online drugstore such as Drugstore.com is an database application example of_______ Which of the following is an example of unacceptable online µnetiquette¶? Replying promptly
Research data e-commerce database application
A competitor¶s new project
B
None of above Using all capital letters
C
Keeping Including the messages short Subject
D
Message Removable drivesauthentication in Encryption that can be performed by a Security at the EDI systems locked up at night performs the physically secure transaction phase in provide adequate same function hardware device EDI systems is not security when the as segregation is more secure necessary because confidentiality of of duties in other than encryption problems at that level Which of the following statements is correct data is the performed by will be identified by concerning the security of messages in an electronic information primary risk. software. the service provider. C data interchange (EDI) system? systems. The wizard that is used to import text files convert text to text import wizard columns wizard is_________________ The alphabet indicating the column followed by the row number is known an__________ cell reference row reference Which of the following files could not be opened in excel _______________ text files Lotus 1-2-3 In excel, the dates that are stored as sequential numbers known as ________________serial values domain values The command to display the current date in a cell is =today() =date() _________________ In excel, absolute references are represented by a ________ before the column and row addresses dollar sign The ________ can be used to select the function AutoSum and assemble the arguments correctly Specific parts of information required by functions to variables perform certain tasks are called as___________
tip wizard
function wizard
A A D D A
column reference none of the above quattropro or xbase files class files range values =currentdate() reference values none of the above
' = ' sign AutoFill
# sign function wizard
none of the above none of the above
A C
arguments
parameters
none of the above
B
Which of the following do not belong to the formula category in excel environment__________ text The function that in used to join cell values together in a single cell ________ concatenate The function that is used to count all the values that meet specific criteria _________ countif The wizard that is used to create and edit charts pivot table wizard _______________ The function that is used to calculate the payment sumif for specific loan terms ____________ The function that is used to add together all values that meet specific criteria is known as ____________ average The __________ option present in the file menu options is used to specify major facts of the page to page setup be printed The command that is used to apply a format autoformat automatically __________ The ____________ makes the information in a bordering worksheet meaningful and easy to understand A particular part of a work sheet can be printed by setting the _________ page setup The process of finding or selecting information is known as ____________ filtering The option that is used to cancel the filter process for a specific column and display all the records is ________ all option The URL for encyclopedia Britannica is_________ www.ency.in _______ maps IP addresses with the domain names of the sites URL
logical pmt vlookup chart wizard pmt
numeric merge
Boolean none of the above
D A A B B
pmt count convert text to columns wizard tip wizard countif none of the above
sum
sumif
countif
C
print area AutoFill formatting print area searching
print none of the above shading print sorting
none of the above
A A
none of the above print preview none of the above
B B A
blanks www.eb.com
all blanks none www.encybrit.co m none of the above FTP intermediate network physical layer ftp service ARCHIE none of the above none of the above session layer none of the above none of the above
A B B B D A C
Internet can be defined as _______ The most important service of the ______ is to application layer transport layer manage traffic control _________is a program that displays information about a host connected to the net finger service ping service _______ is a program or a tool that helps in locating a file anywhere on the net FTP TELNET uniform research uniform locator resource locator name of the resource host computer message scheme Delphi Microsoft net browser CompuServe internet dialer gophering Alta vista finger server list
DNS network of internal network network
URL stands for ____________ IN an URL the word before the color refers to _______ A ______ always begins with a slash Prodigy is run by IBM and ______ The World Wide Web is referred to shortly as the _______ Gopher and WAIS enables the user to ______ ______ is the program used to run CompuServe's regular services Navigating through the menu of gopher is called moving around _______ The directories that come with built-in engines are yahoo,lycos and ______ To use the finger command,SLIP users must run a programme called______ The web maps are called _______
unlimited restore locator none of the above scheme command line sears none of the above none of the above general electric editor none of the above none of the above none of the above none of the above none of the above none of the above many middle and lower glossary item search,index search all the above all the above navigator gold 2.0 CompuServe telnet
A C C C B C C C B A C B D C
web browser read the Usenet search for news database wincim or maccim spy mosaic gopherspace open text ftp server directories cyberspace excite web server image list
Directories consists of _______ levels no The _____ level gives the broadcast overview of the middle net The huge list of keywords from important items is hotlist called ______ directory The two types of search in veronica are _____ and search,index search ______ _______ searches by keywords infoseek Mosaic displays links in color whereas _____ does not display links in color netshark ______ supports one button publish lynx SPY MOSAIC is distributed by_______ Microsoft ______ is a program that helps us to log on to other Usenet networks
maximum of five one lower directory index search,menu search excite cello mosaic internet top index menu search,item search lycos lynx Lycos IBM ftp
C D C C D D
HTTP is the acronym for __________ ______is used to transfer and copy files over the internet iccp _____ is a program that helps us to log on to other networks yahoo
finger service Hyper text transmission Higher text transfer protocol port ftp
Hyper text Hyper text transfer transfer protocol port uucp none of the above
C C C
ftp transmission control transfer control protocol/internet TCP/IP stands for ________________ protocol/internet protocol Archie servers can be accessed in_______ different one two ways in internet _______is the computer on the internet that translates between the internet domain names and domain name the internet numeric address ftp servers servers the internet the internet TIA stands for_____ in internet adapter administration Service indicates the name of the ________ used to access data, present on the other end of the link. browser ________ is used to link pages in the world wide web
telnet none of the above transfer communication protocol/internet protocol none of the above three none of the above
B C
web servers the internet access
none of the above none of the above
B A
protocol
site
organization
B
universal uniform uniform resource resource locator resource locator label name of the above frequent asked query frequently asked frantically asked question question none of the above
B
FAQ stands for ______
B
The internet adapter is a programme that makes our SLIP,PPP connection act like a _____or a ____ account
TCP,IP
IP,UDP
none of the above
A
The step involved in Communicating between the web clients and servers is ______________
connection wide search for information and research lynx,minx world wide web server
WSIRC stands for______ Two of the important browsers are_____ and_____ Lynx is a _______ programme that works with terminals The huge list of keywords from important items is called an_____
response windows sockets internets relay chat
request
close
A
world search for information and research council none of the above none of the above none of the above none of the above
B B B B
netscape,ie mosaic,gopher world wide web client interface
VERONICA is an acronym for _______________ The first freenet is created at the_____ and is called______ ________ are defined as ways of communication amongst networks
glossary index hotwords very easy and very organised verification on rodent oriented network net wide index to integration and network computerized communication integration and communication archives application university of university of berkeley,berkeley cleveland,clevelauniversity of California net freenet nd freenet protocols IP address search engines,directorie ftp and finger s allsrc,winsocks allsrc hot links wais,allsrc waisman hyper text dns
none of the above
A
none of the above none of the above
B A
______and_____ are web searching features WINWAIS has two source lists namely____ and______ ________ is also called as WAIS manager The system of interlinked documents is known as_______ The small programmes that create animation,multimedia,real-time games and multi user games are called______ The information displayed on the web page includes______,_____ and_____ The web pages that represent online home of their author are called______
telnet and ftp wais,winsocks winsock books marks
none of the above none of the above none of the above none of the above
A B B B
images applets animation none of the above graphics,videos,a programms,ima animation,scripts udio ges,text ,executables none of the above first page global network news yahoo service home page global networks navigator electronic mail Netscape page starter site,netscape page wizard telnet point review bitnet welcome page grand network news search engines none of the above
B A B
GNN stands for______ _____ is the most popular internet service
none of the above none of the above
B B
The online service offered by navigator gold 2.0 are email and net _______ and_____ conference _______ is a program or a tool that helps us find a file anywhere on the net newsgroup The databases to enable keyword search using Lycos catalog Lycos are a2z,_______ ______ is a large worldwide bulletin board service apple link network
yahoo and altavista ftp all the above Delphi
none of the above archive none of the above fidonet
B D D A
BABEL consists a glossary of _____
computer related abbreviations and biographical information acronym
bookstores
none the above
A
Dictionaries,encyclopaedias,government and other encyclopedia references are found in ______ Britannica Yahoo,lycos,excite and webcrawlers are _____ search engines Graphical interpreter formatting
on-line reference works more information galenet web directories Graphical interchange Format Jumbled pictures expert graph documents database channel
A B
GIF is the acronym for ____________
Graphical Graphical Interface interface format format Joint pictures expert graph net eudora,netscape and pine network connections Joint pictures experimental group browsers none of the above mails
B
JPEG is the acronym for ___________ The Web aids users to explore the ________ The three most popular mailer are_____,_____ and______
Joint Pictures Expert Group mails yahoo,infoseek,al netscape,ie,lynx tavista
A C C B
The World Wide Web consists of _________ information web pages In Microsoft Internet Explorer, the color of the text can be specified using _________ attribute of the font tag. BACKGROUND COLOR The interface that provides effective communication Common Communication graphical between the web browsers and servers is gateway interface Interface _________ CGI is the _________ between web browsers and Network Interface servers CGI programs are invoked based on the informationCurrent web provided by the _________ page Browser A CGI program is usually called after a request made by the _________ Browser/user Server A hyperlink can be on ___________ HTML was derived from _________ SGML is a _________ text only SQL alphalanguage palm is not PINE stands for _____________ eatable The application that confirms whether a document is compliant to its DTD is _________ SGML Processor Web is a collection of ___________ web sites Internet equipment training faculty image only PLSQL betalanguage
FCOLOR FONTCOLOR Communication Common Gateway graphical Interface interface Communication Connection Client Web None of the above Channel
B
D B B A
IETF stands for ________
MS Internet The two major browsers used to surf the Internet are Explorer and ________,_______ Mosaic Special characters allow browsers to display text _________________ The keyword for providing links within or across hyperlink documents is____________
text or image SGML metalanguage pancake is not palm is not elm edible SGML Preprocessor SGML Parser images applets International Internet Engineering Engineering trainers and Task Force faculty MS Internet Explorer and Netscape Navigator and Netscape Navigator Mosaic data from a symbols database hypertext hotword
neither text nor image C CGI C none of the above C none of the above SGML Composer documents B C A
None of the above
C
None of the above video hotlink
C C B
Stringing pages together using hypertext technology helps view pages _______________ in random order The initial web pages present in a web site is the ________ page. first The image format supported by most browsers is________________. .bmp and .gif Service, hostname and The components of a URL are ___________ directory path
in sequential order start
in user-defined order home
none of the above none of the above
B C
.bmp and .jpeg .gif and .jpeg .wmf and .bmp C service,hostnam e,port,directory- service,port and service,hostname and directory path port path B
mail mailing lists,mail server robots and mail servers,mail vendors,mail identification and gateways to The mail we send has a mailing address and most clients and other services of them correspond to_____,_____ and none of the above alternate services password Which of the following is not supported by internet explorer _______________ <center> <font size=n> <hr size=n> <l1 type=shape> communication common classified general generated gateway instructions CGI stands for ____________ none of the above information interface Host name indicates the domain name of the web ________ Server Client Browser User The internet is also called as _______________ arpanet the net intranet none of the above peer-to-peer connectivity The internet is similar to _________________ LAN wan none of the above The net drivers______ from one place to another The net provides interesting services like______,______ and______ The windows internet software available are______,_______,________ and______ ________ is the ancestors of the internet data parcel packets none of the above email,file retrived,internet none of the above tools
C D
B A B B A
scripting,parsing news,cooking and compiling and fine arts
C
nt,windows95,ie, mosaic,gopher,e communicator,ie, winzip udora,trumpnet lynx,winsock all of the above dnet arpanet ARPANET none of the above defensive advanced research projects administration net none of the above first none of the above
B B
defensive administrative rank DARPA stands for _________________________________________ administration network ______ The uuencode files start with a _______ start milnet,smaller arpanet DARPA is broken into ________ and _______ NSFNET is the united states provides service to education,resear _____ and_____ ch The first international IP network connections were united states and established in 1973 with _____ and_____ UK A_____ is a set of computers interconnected by transmission paths to exchange information in server internet A computer that provides a service usable by other computers is called______ client A_______ is the representation of physical network card connectivity of the computers in internet detailed transaction DTE stands for ____________________ explanation The basic function of the ______ is transmitting the application layer bits over a channel point to point network and The point to point channel network is also called as broadcast channel network _____ and_____ Accessing files using FTP servers is called_____ The three most commonly used networks are______,______ and______ ________ is in between LAN and WAN _____ can be owed by multiple organisation Data is transmitted in the form of_____ signals DTD stands for __________ Modem stands for __________________ ______ is the process of the digital signals being converted into a form suitable for analog transmission file access
dedicated and registered projects administration begin mailnet,inet music and dance
C B A A B
intranet,extranet none of the above cooking and dining none of the above united states & england,norway Russia none of the above
client stand-alone
network
none of the above none of the above none of the above
C C B
servers network network topology redirectors data terminal equipment physical layer packet switching,store and forward network anonymous ftp data target equipment network layer
none of the above none of the above
B B
smart network and dumb network file transfer
none of the above none of the above
B B C B C B C B
PAN,NAN,AAN KAN,RAN,VAN VAN MAN LAN MAN analog digital Data type Define type of definition data Moralize/demorali Modulation/dem ze odulation
LAN,WAN,MAN none of the above TAN none of t he above WAN none of the above non-digital none of the above Document type definition Document type data Manipulate/dema nipulate none of the above
Modulation Manipulation none of the above Dedicated ________ and______ are two basic ways of getting Satellite link and access and dial up access connected to the internet digital signals Cable and wires none of the above Standard long Stream line Serial line internet protocol internet protocol protocol Prime prolonged Point to point protocol protocol sending storing data on a information to a disk drive host computer Pillar to pillar protocol storing data on the hard drive
Mapping
B
B
SLIP stands for ________________
none of the above
C
PPP stands for _____
none of the above
B
Which of the following best describes uploading information? A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time, expressed in Bandwidth bits per second. The act of searching through storage to locate information without necessarily knowing of the existence of the information being sought. Find
receiving information from a host computer B
Speed
Size
Channel
A
Save
Browse
Retrieve
C
A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named in the certificate is called the ____________ Recipient Party The Relying Party can use the ___________ listed in the certificate to verify that the digital signature Public Key was created with the corresponding _________
Relying Party
Either A or B
Neither A nor B
B
Private Key
Both A and B
Both B and A
C
Digital Signatures are used for a variety of Electronic Transactions like ________________________ E-mail To associate with a key pair with a prospective signer, a Certification Authority issues Digital Certificate Not False Digital Signatures, if properly implemented and Closed utilized offer promising solutions to the problems of System,Formal Imposters, Message Integrity, __________ and Legal _____________ requirements In, Digital Signature, _____________ perform the "ceremonial" function of alerting the signer to the fact that the signer is consummating a transaction with legal consequences Affirmative Act A Digital Signature must have the following Signer attributes ________________ and _____________ Authentication "Hash Function" is used in both creating and Not True verifying Digital Signature ___________ provides assurance of the origin or delivery of data in order to protect the sender against false denial by the recipient that the data has been received, or to protect the recipient against false Nonrepudiation denial by the sender that the data was sent. Service ________ is a branch of applied mathematics concerns itself with transforming messages into seemingly unintelligible forms and back again. Cryptography The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily Private Key termed as _________, and ____________ _______ is known only to the signer and is used to Private Key create the digital signature. _______ is ordinarily more widely known and is used by a relying party to verify the digital signature.Private Key ____________ is the art of protecting information by Decryption transforming it into an unreadable format.
Electronic Commerce
Electronic Fund Transfers All The Above
D
Not True
A Formal Legal Requirements, Open System D
Formal Legal Requirements
Open System
Efficiency Document Authentication Not False
Signer authentication
None of the above
A
Both A and B
Neither A nor B
C B
Digital signature Digital certificate Private Key
A
Public Key
Private Key
None of the above
A
Public Key Public Key
Both A and B Both A and B
Either A or B Either A or B
C A
Public Key Cipher
Both A and B Encryption
Either A or B Cryptography
B C
Which of the following activities would most likely detect computer-related fraud?
Using data encryption.
A digital signature is used primarily to determine that Unaltered in a message is: transmission.
Conducting fraudawareness Performing Reviewing the validity checks. training. systems-access log. D Received by the Not intercepted intended Sent to the correct recipient. en route. address. A The private key The private key is used by the cannot be sender for broken into encryption but fragments and not by the distributed to the receiver for receiver. decryption.
Both sender and receiver must have the private key before this What is a major disadvantage to using a private key encryption method will work. to encrypt data? Which of the following risks can be minimized by requiring all employees accessing the information system to use passwords? The acronym for B2B is ___________ The _____________ model is the least intrusive model but requires active search on the part of the customer __________ is / are a form of advertisement where people relate their experience with products and services The _________ are software agents who communicate with the business merchants on behalf of the customers The Pre-purchase preparation phase includes _______________ for a set of products The _________ phase includes customer service and support to address customer complaints , product returns and products defects
The private key is used by the receiver for decryption but not by the sender for encryption. A
Collision. Business-toBusiness
Data entry errors. Business-toBackend
Failure of server duplicating function. Firewall vulnerability. D Backend-toBusiness Business- to-Billboard A
Billboard Customer Endorsements
On-line Catalog Endorsements
Broadcast
B
Billboard
Catalog
Broadcast
A
Intermediaries
portals
Order Placement Service
.COM Search and discovery
Domains None of the above
A C
Post purchase interaction
Purchase consummation
The ________ allow companies to bypass the need Billboard model for costly printed catalogs of marketing A ________________ is a basket on the Net that is used to place the items that are being purchased Online Catalog EDI For Administration, Commerce and Transaction EDIFACT is an abbreviation of ________ The __________ allows for protocol conversion and communicates with the bank using the banks private EDI network or the Internet In Ecommerce, data extraction, transforming the data into transmittable form, transmitting the data and downloading the data are the operations employed in _________ Compiler The _________ commerce assists in integrating the Business-tocustomers and suppliers of the company directly Business into the organisation E-cash means______________________ E-commerce is a tool that addresses the desire of firms to cut services cost and improving the quality of goods. It is a definition of e-commerce from _________ The small denomination digital tokens are called _________ The ____________ is the process of encoding information to prevent it from being read by unauthorized parties
Online catalog
Pre-purchase preparation Endorsement model of marketing
Search and discovery A
None of the above
B
Shopping cart EDI For Administration, Consumer and Transport
Billboard EDI For Administration, Commerce and Transport
Pulling cart
B
None of the above
C
TCP/IP
EFT
Gateway
D
Interpreter Business-toConsumer
Assembler Consumer-toBusiness
EDI Customer-toCompany Endorsed Cash
D
B B
Emergency Cash Electronic Cash Euro Cash Business Process Perspective Micro Transactions
Communication Perspective Microcash
Service Perspective TT(Tiny token)
None of the above E-token
C A
Decryption
SSL
Encryption
Subscription
C
There are _________ types of data tables
1
2
3
4B
The tables that allows the user to change or rearrange the data, summarize the data and evaluate the data using changing points of view is known as data table The wizard that is used to suggest hints for doing a task pivot table wizard In a chart Y-axis is known as_________ series or rank In a chart X-axis is known as_______________ series or rank _________ is a set of tables that describe each of series or rank the data series ________ is used to differentiate one data series from another series or rank The chart that contains only one data series is _________ column chart The chart that holds the column chart is _________ column chart The chart that display two or more data series on a column chart surface is _________ The chart that is used to display discrete data column chart _________ are not allowed in a macro name Which of the following tool cannot be used to view the excel web page_______ The wizard that used to build an interactive table from data existing on sheets The chart that is used for displaying stock market information spaces excel97
filtered table chart wizard category category category category bar chart bar chart bar chart bar chart wild card characters
index table convert text to columns wizard legend legend legend legend pie chart pie chart pie chart pie chart symbols
pivot table tip wizard data marker data marker data marker data marker surface chart surface chart surface chart surface chart none of the above
D D A B C D C B D A A A A C
internet explorer Netscape word 2000 convert text to pivot table wizard chart wizard columns wizard tip wizard line chart bar chart stock chart pie chart
In excel, the subtotal command also generates grand total after the last group subtotal_________ true In advanced filter , the criteria occupying multiple columns but more than one row, is considered as an ________ criteria. and The stacked bar graphs can be represented in 3-dimensions __________ A pie chart can represent only one data series at a time true The ______ generates a summarized report in tabular form in an interactive manner Data table
false
A
or 4-dimensions false Pivot table Multi-dimensions
B A A
Which one of the following statements related to stock chart is NOT TRUE ? The state government needs to finalize a five years plan to implement 100% literacy in the state. Which one of the following will be the best tool that should be used to work out the plan ? Pivot table Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. Which one of the following will be the tool that will Goal seek help the team ? Which one of the following will be the tool that provides a way to view and compare the results of all the different variations together on the worksheet ? Goal seek A ___________ is an excel file where the user stores his data Workbook
B It is often used to display share It is also used for market prices indicating fluctuations It is also called as It shows trends over a period of in temperature high-low-close time changes over time chart B
Solver Spreadsheet Performing text formatting. Source table name. N
Data table. none of the above
D A
Performing calculations. Spreadsheets are useful for _______________ Which one of the following is NOT the component of the pivot table ? Column field Excel allows upto ______ levels of sorting two Filtering rearranges a list to display the required records true The stacked bar graphs can be represented in _____________ 3-dimensions The ______ generates a summarised report in tabular form in an interactive manner Data table
All of the above Pivot table item.
D C B B
Multi-dimensions
A B
Pivot table It is useful when several components are changing and It displays the the user is data series one interested in the on top of the Which one of the following statements related to sum of the other. stacked bar chart is NOT TRUE ? components. Which following function is used in subtotal option Standard Count. ?______________ deviation A workbook consists of many ________ databases records It is a tool that provides a way to view and compare the It is a tool for summarizing and results of all the different analyzing the data records in variations together on the an interactive Which two of the following statements related to worksheet manner. pivot table are TRUE ? Which one of the following is NOT a What-if Scenario Goal seek. analysis tool ? manager The _________ wizard separates contents in a cell into different cells A spreadsheet is a grid of rows and columns and is called as a ________ Pick out the window that is not a form of excel ___________
It can be represented in 3dimensions SumIf tables
B A D
worksheets
It summarizes the data by using analytical functions. solver Pivot table
A D
convert text to text import wizard columns wizard tip wizard workbook document window tables modal window
function wizard database
B A C
worksheet application window A dark wide On an Excel sheet the active cell is indicated by« border Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8. The contents of cells 8,16,32 A6, A7, and A8 are _____.
A dotted border No border
A blinking border
A
2,4,2
2,2,2
6,8,10
D
If a cell shows ####### , it means that _____. Which is not an advantage of using computerized spreadsheets?
the row is too short to show the number at your formula has the current font size a syntax error ability to generate speed of tables calculation
the column is too narrow to show all the digits of the number either b or c flexibility of moving entries cost of initial set-up
C D
The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. The use inputs different weights or amounts of exercise to determine the related physical fitness. This "What if" program is most likely which of the followin word processing graphical The difference between the highest and the lowest values. Range Address Producing Spreadsheets can be used for... graphs Writing letters drag from the top cell in the column to the double-click any last cell in the cell in the column column To select a column the easiest method is to « If you press _____, the cell accepts your typing as ENTER CTRL + ENTER its contents. The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as All of the following are considered constants EXCEPT: Which of the following may NOT be included in a formula? Which of the following is NOT a valid mathematical operator in Excel? Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first? Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant? How can you tell which cell in a worksheet is the active cell?
database Gap
spreadsheet Rows
D A A
Drawing pictures Document filing
click the column heading click the column label C TAB INSERT A
array.
function.
constant.
formula. Tom McKenzie. Text constants \ It is impossible to determine.
G7*SUM(H9:H11) The phrase ³active It is displayed in cell´ appears in the Status bar. reverse video. By either clicking in a different cell or using the arrow keys to move to a different cell
B
A
How can you change the active cell?
By clicking in a different cell
By using the arrow keys to move to a different cell
By typing the reference of the cell you want to move to in the formula bar C The Font Size command on the Tools menu. B the File Type command on the File menu. C Window A
Which of the following would you use to change the The Standard font size of a cell in Excel? toolbar the New The command that will save the current workbook command on the with a different file type is: File menu. The command that will print an Excel workbook is found on the ____________ menu. File In the Save As and Open dialog boxes, the ___________ view shows the file size as well as the Preview date and time a file was last modified.
The Cell Format The Formatting command on the toolbar Edit menu the Save the Save As command on the command on the File menu. File menu. Edit View
Details
List Both Insert and Delete Both Clear and Delete
Properties
B
Which of the following commands will automatically adjust cell references in formulas? Insert Delete Which of the following commands will remove cells, rows, or columns from a worksheet? Clear Delete Orientation (portrait or Which of the following options is NOT controlled Headers and landscape) through the Page Setup command? footers Which command enables you to change the margins for a printed worksheet? Options Page Setup All commands are carried out on a rectangular groups of cells known as a: worksheet. range. Which of the following is a valid cell range? 6 D12, G25 In a copy operation, the cell(s) you are copying from destination is called the: range. copy range. In a copy operation, the cell(s) you are copying to is destination called the: range. paste range. Which of the following commands is needed to The Duplicate The Copy duplicate the contents of a cell in another? command command A cell reference that does not change during a copy operation is known as absolute relative Which of the following is considered an absolute cell reference? B4 $B4 Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are copied to cell E4, what will be the contents of cell E4? #DIV/0! Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to cell E4, what will be the contents of #DIV/0! cell E4? Which of the following commands is needed to The Move transfer the contents of one cell range to another? command
Margins Edit cell group. D source range. source range. Both the Copy and Paste commands constant $B$4
C B B C D B D A D
#DIV/0!
#DIV/0!
#DIV/0!
B
#DIV/0! The Cut command
#DIV/0! The Paste command
#DIV/0! Both the Cut and Paste commands
C
D
copy and paste The F4 key is used to: cells. Which of the following quickly copies the formatting of a selected cell to other cells? the Fill Handle Select the Insert Hyperlink Which of the following will insert a hyperlink into an command from Excel worksheet? the File menu.
edit cells. the Format Painter Click the Insert Hyperlink button on the Standard toolbar.
cycle through absolute, relative, and mixed cell cycle through open applications. references. C the Formatting toolbar Conditional formatting B Right-click a cell and click the Edit Double-click a cell and click the Insert Hyperlink Hyperlink command. B command.
whether the cell has an absolute whether the cell or a relative cell Conditional formatting applies formatting to a cell has a formula or based on: the cell address. reference. the value in the cell D a value in it. text with either a twodigit or four-digit year, depending on the If you enter a date into a cell, Excel stores the date text with a two- text with a fourformat. an integer. as: digit year. digit year. C You created a worksheet on July 30 and entered the =Today() function in cell E17. You opened that worksheet again on August 31. What will be displayed in cell E17 on August 31? Jul-30
Aug-31
29/03/2008 subtracting the later date from the earlier one. the Esc key. March 4 of the 0.75 current year
It is impossible to determine from the information given.
B
The number of days between two cells containing dates can be calculated by: The function key that is used to quickly edit the contents of a cell is:
subtracting the adding the earlier date from earlier date to the later one. the later one. the F4 key. the F2 key.
adding the later date to the earlier one. A the F1 key. B Either 3/4 or .75, depending on the cell formatting C either a cell on a worksheet or a variable. D
What will be stored in a cell if 3/4 is entered in it?
03-Apr
A user¶s response to the InputBox function can be a cell on a stored in: worksheet. The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is _____. B1-G10 The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test. To find the student with the highest mark, which of the following functions should be used? AVERAGE Which chart type best shows proportions of a Combination whole? Once a bar chart is chosen it cannot be changed to a column chart.
a variable.
a constant.
B1.G10
B1;G10
B1:G10
D
COUNT Line
MAX Pie
SUM Scatter
C C
Which of the following is TRUE regarding chart types? To select several cells or ranges that are not hold down the touching each other, you would _____ while CTRL key selecting. Your Institute teachers have set an assignment on µStudies¶. You are required to use a spreadsheet to record all that you study on each day for four weeks. You decide to show each week¶s data with an accompanying graph. What is the best way of doing this Use tables What would be the best method to quickly copy the formula from the active cell to each cell below it? Paste To arrange rows in alphabetical order based on column A, you need to use the command _____. What can you NOT do with a spreadsheet?
Once a column Once a pie chart chart is chosen has been chosen Once a line chart has been chosen it can be it cannot be it cannot be changed to a bar changed to line changed to a pie chart. chart. chart. D hold down the SHIFT key hold down the ALT key hold down CTRL + SHIFT
A
Create four separate files
Transfer information to a database Use multiple sheets
D
Fill Down
Fill Right
Paste Special
B
Tools | Sort Analyse data
Data | Sort Calculate data
To print just part of a sheet, you would select what click the Print you want to print and _____ . button The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is _____. (D4+C2)*B2 Which of the functions is not valid for performing addition The default orientation for the printed page is _____. ortrait p Which is not a valid cell address? AD213 The World Wide Web was devised by _________ CERN yahoo and infoseek
press the PRINT SCREEN key
Edit | Data | Sort Create forms select Print selection on Page Setup | Sheet and then print
none of the choices None of the above
B C
select Print selection in the Print dialog and then print D
D4+C2*B2 #VALUE! =A3SUM:B3SU 0 M:C3SUM REF! whatever was last used landscape ZA1 A0 ECRN CARN
=(B2*(D4+C2) None of the above vertical None of the above NET
C B A C A
The useful URL schemes are_____ and______
newsgroups and mailto and files search engines none of the above bulletin application boards,mails call servers,proxy and wireless servers and web system servers business bulletin broadcasting broadcasting system system large very small windows sockets windows stocks Yahoo cache PINE built-in
B
The other ways of getting connected to the net are_____
news groups,yahoo and infoseek bulletin board system small
none of the above
B
BBS stands for______ USENET is a BBS on ____ scale
none of the above none of the above none of the above Lynx none of the above
A B B A B
WINSOCKS is expanded as______ windows socks IETF Level 2 HTML DTD supports graphical Mosaic browsers like _______ The space used by Netscape to store the retrieved page is called______ buffer The principles, means and methods for rendering information unintelligible and for restoring encrypted Photography information to intelligible form. A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt an decrypt messages and Key conversations. Protected/private character string used to authenticate an identity or to authorize access to data. User-id The successful act of bypassing security Penetration mechanisms of the system.
Digital Signature Cryptography
Message Digest
C
Lock
Hash Function
Formula
A
Password Retrieval
Name Cryptography
Address Password Cracker
B A
A set of rules and formats, semantic and syntactic, that permits entities to exchange information. Acts An attempt to get access to a system by posing to be an authorised person. Spoofing An action or event that might prejudice security. Loss According to information Technology Act, 2000, To investigate contraventions the controller of certifyingSales - tax authorities authority shall exercise the like powers to that of Malicious software. Utility
Regulations Imposting Threat
Address Unauthorising Exposure
Protocols Approving Hacking
D A B
Income - tax authorities
Judge of a civil court
Police officer of IPS rank. Cracker
B C A B
Pirated software Virus Hoffman Amazon .com
None the person who is known as father of Internet Tim Berner Lee This website is the biggest bookstore on the earth. Etrade.com When we talk of Data Transmission modes, then ATM stands for
Charles Bubbage Howard Aiken Msn .com
Dell .com Asynchronous Transmission Automated Tailor Any Time Money mode Machine
None of above
C
A sequence of bits or characters that identifies the destination and the source of a transmission. Acts The means of communicating between networks Router
Regulations Gateway
Address Port
Protocols Pin
C B
A group of computers and other devices dispersed over a relatively limited area and connected by communication links that enable a device to interact with any other on the network. LAN hyper terminal tracing program National Informatics Center
WAN
CAN
PAN
A
The term HTTP stands for
hypertext tracing hypertext transfer hypertext tracing program protocol protocol New Information Card None of the above Only printers None of the above
C
A NIC is considered as A hub is a device that can connect
Network Interface card Can not Only Computers computers Combines connectivity of a hub with the traffic regulation of a bridge Two or more networks frames gateway
B D
Which of the following is true concerning the function of a switch?
What do routers connect? What does a router route? Software which prevents external access to a system is termed firewall If four computers are connected to a hub and then to the internet, how many IP addresses are required for these 5 devices? One Which of the following in an OSI layer When creating a network from just two PCs, what kind of cable would be used to connect them? An IP address is a To construct a simple LAN of 4 computers, you would connect them with ______connect them
Concentrates connectivity Bridges and Repeaters. bits
Switches data from incoming ports to outgoing All of Above ports. Bridges and Hubs Hubs and nodes Packets None of the above router virus checker
B B C A
Two
Four
None of the above All of the above
C D
Physical Layer
Data-Link Layer Network Layer
Fiber A memory Physical address Logical address address A cable Hub Router
RG7U
Coaxial cable
Twisted pair None of the above None of the above
B B B
It continue on to What happens to data that is ruined before reachingData return to the It gets destroyed target device with corrupt data None of the above to receiver sender bit by bit. B Wireless Wired Ultra violet Bluetooth is None of the above technology Technology technology A Which is not one of the recognized IEEE sub layers? Physical Layer Data Link Layer Network Layer All of the above D The most preferred number system to represent a IP address is Binary ASCII Octal None of the above A A MAC address is of 48 Bits 48 Bytes 48 KB 48 MB A software that facilitates a list of rules for software that a gateway calling connection to the transferring data allows file program for internet internet Protocol is over a network copying bridging B A ............... is a LAN-based computer with software that acts as a controlling device for controlling access to at least part, if not all, of a local area network and its available resources. Novell PC Client Server Network PC C If the hub goes If one node goes down, it brings If the hub goes down, down, it brings down all of the it brings down all of What is the biggest disadvantage of the Ring down the entire nodes on that the nodes on all of the section There isn't one ring topology? rings B The .............. of the network concerns how network devices are physically (or optically) interconnected. The principal topologies used with LANs are: What are the various types of bus architecture? What are the various types of ring architecture? In a ................., each workstation attaches to a common backplane via its own physical cable that terminates at the hub
Physiology Bus Linear Parallel
Topology Star Parallel Circular
Both A and B Ring Both A and B Linear
None of the above All of above None Both A and B
B D A B
Ring
Bus
Star
Mesh
C
In a ............... , each work station is directly connected to a common communications channel Ring Which one of the following is NOT a network topology? Star In a .............. , the cable system forms a loop with workstations attached at various intervals around the loop Ring The Media Access Control (MAC) is a sub layer of the: Network Layer What are the most common LAN technologies used Ethernet, token in networking today? ring, DecNET Modem speeds are measured in bps
Bus Bus
Star Linear
Mesh Ring
B C
Bus Transport Layer Ethernet, token ring, FDDI kbps
Star Physical Layer Ethernet, DecNET, FDDI mbps
Mesh
A
Data Link Layer D Ethernet, token ring, ARCnet B mips B
LAN speeds are measured in
bps
WAN speeds are Accessing the Internet from a typical home PC requires the use of
Kbps measured in bytes per usually higher than LAN speeds second CD-ROM drive a modem
Mbps depend on the transmission medium Windows 95
Mips limited by modem speeds Netscape
C
C B
To use the Internet, you The worldwide web server uses the following standard interface to act as the middleware:
must use the must use World Wide Web electronic mail key gateway interface
must have a LAN All of the above account
A
An NIC Accessing the Internet from a typical home PC requires the use of The most widely used network operating system on Linux PC LANs is have to do with compression of graphics and JPEG and MPEG video A multiplexer is a form of Printer
uniform common gateway application protocol resource locator interface interface C interfaces a a Novell Interface used to control a modem to a connects a computer Controller printer to a network computer D Windows package CD-ROM drive a modem Netscape B Novell Netware Windows NT None of the above C
have to do with Web pages the Internet modem bridge is a CPU functional unit is part of Netscape is part of Netscape
none of the previous A none of the previous D
An ISP
provides access is a CPU to the Internet register used to send email used to browse the Web uses wireless communication medium
FTP is
make of processor is a protocol for the transfer of files between computers
A
D
Telnet
A firewall is A proxy server is
used to send email used to protect a computer room from fires and a form of virus floods
None of the above
D
a screen saver program
none of the previous D
A search engine is To look for information about interest areas on the scanner internet, the user should use a
a backup server an email server a poor file server none D IR system for the Internet hardware browser none of the previous C CD-ROM clip-art file is a CPU functional unit search engine D
An ISP
provides access is a CPU to the Internet register used to send email used to send email
FTP is
used to browse is part of the Web Netscape uses telephone is part of lines Netscape
Telnet
make of processor is a protocol for the transfer of files between computers is a protocol that allows for remote login
A
D
D
The layers cannot Which of the following is a true statement about the communicate with one another. OSI model layers?
Which of the following is NOT true about the Internet? The traditional intent and impact of this common type of attack is to prevent or impair the legitimate use of network resources.
It is one large network. Password cracking
Any layer can communicate directly with any other layer. It is made up of many networks connected into transmission lines called backbones.
Any layer can communicate Any layer can only with the communicate only layer directly above or below it. with the layer above it.C
It works the same way as a local network.
Individual computers can connect to it using an ISP. A
Which of the following is NOT an example of a DoS IP flood attack that is popular among hackers? A ____________ attack is when a hacker sends a continuous flow of packets to a system. hack One defense option on a large network is to configure a ____________ to disallow any external traffic. firewall A proxy server is Which of the following would be performed on a network server and not normally on individual workstations?
System intrusion Denial of Service Port sniffing Flood a Web Virus that server with initiates a ping requests flood UDP flood packet flood traffic
C
A C
router
switch
hub
B D
a backup server an email server a poor file server none of the above Apply security patches Update virus definitions Backup data on a Limit logging on daily basis access
C
There are safe All sites are safe and unsafe What can be said about the safety of the Internet? and reliable. sites. To secure communication network against wiretapping the most effective control is Use of Use of identifiers passwords
Only large nameActiveX-enabled sites recognizable are safe. sites are safe. B
Use of logical Use of encryption access methods methods by scanning the One way that a virus CANNOT spread throughout a by attaching to an through an FTP by attaching itself computer for a network is: e-mail. port. to a document. connection. Which of the following is NOT a means of monitoring employee use of company technology? Phone ____________ would be used by parents to monitor their children on their home system. A Trojan horse The formal rules and parameters which are established to permit a microcomputer to communicate with the mainframe computer as though it was a terminal of the mainframe are calledModems The two most common tools used to help with extracting information are: cookies and Trojan horses.
D
B
E-mail Adware
Web traffic A worm
Application updates Spyware
D D
Protocols
Multiplexors
LAN
B
Trojan horses cookies and key key loggers and and key loggers. loggers. worms.
C
An attack on a Which of the following would NOT be considered an system for personal gain example of cyber terrorism? Which of the following would be a form of cyber Economic terrorism? damage
An attack with the purpose of gaining publicity Disruption in communication
Giving out disinformation Disruption in supply lines
Changing the content of a Web page D All of the above are correct. D
Crashing the Shutdown of Which of the following is a likely target of a cyber stock market, as military security Contaminating terrorist that would cause considerable loss of life? in the 1930s water systems systems
Shutdown of nuclear plant safety systems D
An organisation is upgrading its telecommunication lines. Which is the least important objective while upgradation
A company posts a price list of its products on its website. The advantage to the customer is that the company can Which of the following is an easy-to-use service to get information on someone? Which of the following pieces of information would NOT be found online? Which of the following is the most common danger Virus on the Internet?
To obtain an accurate inventory of network related equipment and To improve system response parts and network To carry more To improve nodes network capacity network services time D stop its limit access to competitors update its prices as seeing their set its prices very computer soon as they are prices high owners only changed D Yahoo People USA People Search People Search Search Lycos Search B Name of your Date of birth Personal assets Criminal records bank A Fraud Adware Spyware B make large amounts of money by parking funds in their bank account. D
The famous Nigerian Fraud scam offered victims the opportunity to:
buy stocks.
invest without risk.
purchase offshore property.
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called _________________. Shill bidding Phishing Using the Internet to pursue, harass, or contact Internet stalking. cyber stalking. another in an unsolicited fashion is called: Setting your privacy settings in Internet Explorer to medium is one way to block: pop-ups. cookies. What is the best means of protection from cyber stalking?
Siphoning virtual stalking. spam.
Hoaxing Web stalking. viruses. Use anti-spyware software.
B B B
Use a fake e-mail Never use your Use a proxy address. real identity. server.
B
Which of the following is not an appropriate control over telecommunications software Encryption Encryption techniques can be implemented in Hardware-Software I only Which protocol would be used to download a free irc anti-virus program from the Internet?
Message Physical Logical access sequence Security controls number checking controls II only ftp Both I & II www Neither I or II telnet Misleads a program recompilation both HTML and Internet Explorer
B C C
The major advantage of the checksum program is Adds more bytes Verifies integrity Increases boot when it to programs of files up time Which of the following is a Web browser? HTML Internet Explorer Microsoft Excel HTML document.
B B
A Web page is another name for -----------
Web query.
round trip HTML document. Web browser.
B
Domain names must contain a description of the type of organisation that the domain represents. A .com is used for .co in used for very common abbreviation used include: company company the World Wide Web A standard language for creating and formatting round trip HTML. Consortium Web documents is: The Web page format in which all elements of a XML. HTML. Web page are saved as one file is called:
.con is used for companies
None of the above
A
HTML.
one way HTML.
C D
Which of the following requires an Internet connection? Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer how would he do this? Which of the following is used to update a Web query?
DHTML. MHTML clicking a hyperlink that using Internet references a Explorer to view a document that is viewing an Excel Web page that is updating the values that are stored in the worksheet that you stored on the obtained through floppy drive on have saved as a Web hard drive on your computer page. a Web query your computer Click on the Back arrow until the Click on µGo to¶ Go to the History desired site is or µSearch¶ in the page and look for Go to the Bookmarks found or Favorites page browser the site the Insert the Refresh the Update the External Data Hyperlink command command command command
B
C
A
You download from the internet, a screensaver, a ten-second sound file and a ten-second music video clip. You also add a hyperlink. Which of the media elements has the greatest effect on the file size? Hyperlink Screensaver Sound When saving a photograph for use on a website, BMP GIF JPEG which format should you choose? While researching the Direct taxes assignment, you Add it to find a useful website. What is the most efficient way Save it to a floppy Write it down on µFavourites¶ or disk. a piece of paper. µBookmarks¶. to access the site at a later time? A system that uses the Internet for business-toprivileged extranet. intranet. business interaction is called a(n): network. A block of text automatically added to the end of an an attachment. a signature. a footer. outgoing email is called _________ refers to the use of Internet technologies for placing telephone calls. VoIP IPT IPP Most client/server applications operate on a three- Desktop client, tiered architecture consisting of which of the application, and following layers? database. Which do you NOT need to connect to the Internet? Modem File Transfer Program Desktop client, software, and hardware. CD-ROM File Transmission Protocol
Video TIFF Cut and paste it to a word processor document. network topology an encryption. PoIP
C C
C A B A
Desktop server, Desktop server, application, and software, and database. hardware. Telephone line File Transfer Protocol None of the above
A B
What does FTP stand for?
None of the above
B
What is the purpose of DNS? Which of the following is NOT a properly formatted 193.1.2.3 IP address? Which of the following is a properly formatted email paul .trigg @ address? domain. org. uk The US government The Internet is controlled by whom?
So computers can be referenced by a name
So IP addresses So email is can be shorter delivered faster 143.215.12.19 paul.domain.uk No-one
None of the above None of the above None of the above None of the above
A D B C
What does IRC stand for?
If you do not pick up your email for a week...?
What is a disadvantage of joining a mailing list?
45.1.1.1 paul.trigg@dom ain.org.uk Scientists in Switzerland International Relay of Internet Relay Characters Chat It will be waiting for you to collect It will be deleted it Receiving messages People automatically discussing a from anyone in topic of interest the group globally
Internet Remote Conversations None of the above A letter will be sent to you in the post None of the above
A
A
High volumes of None of the above email
C
In Powerpoint2000 ,the built-in professional design clipart & auto elements are shapes Selection handles are the 8 small ___________ that appear around the object, when an object is selected circles The _______ is an invisible matrix of vertical and horizontal lines that covers the entire slide workspace square _______ are drop-down menus that appear when the right mouse button is clicked on the screen element tool bars ________ and ______ have the ability to add a lot of gallery & clip visual impact into the PowerPoint presentation word art _______ is a motion picture or any animation file wave file In visual basic, when a record pointer reaches to the last record, _______ property of a recordset object is automatically set to ______ eof,false In visual basic, the explorer view of a project is properties displayed in ___________ window In visual basic, when a record pointer reaches to the first record, _______ property of a recordset object is automatically set to ______ bof,false In visual basic, _______ is a method to convert a string into integer. value() In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What type of shape should we get? circle In visual basic, a timer event is only available in timer control. true
autolayouts and slide view & presentation outline view templates
none of the above
B
points
squares
icons
C
image
grid
guide
C
short cut menus auto shapes slide show & view show media clip
all the above
B
fonts & images .video file
none the above all the above
A B
movelast,true form layout window
movelast,false toolbox
eof,true project explorer
D D
movefirst,true int()
movefirst,false number()
bof,true val()
D D
rectangle false
square
oval
D A
In visual basic, vbred or vbgreen or vbblue are the true false property values of a backcolor of any object A In visual basic, _______ is a property of a textbox control to set a color of a text. fontcolor color forecolor none of the above C In visual basic, _______ property of a textbox control fontunderline,tru is set to _______ to underline a text e underline,true textunderline,true none of the above B In visual basic, _______ property of a textbox control is used to change the size of text. textsize size foresize fontsize D In visual basic, the interval property of a timer control one- millionth of a one-hundredth one-thousandth one-ten thousandth of is given in ________ second of a second of a second a second C In visual basic, _______ property of listbox control count recordcount itemcount listcount counts the number of items in the list D In visual basic, the properties of various controls can form layout be set using __________ window prperties window project explorer toolbox B In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______ in a messagebox function. title prompt vbmsgboxstyle none of the above C In visual basic, ________ is a function which displays a message and it also allows the user to enter values in a form object msgbox() textbox label inputbox() D In visual basic, using a data control, ________ is a recordset type which allows to add a new record and also to update existing record in a recordsourse opendynaset opensnapshot dbopensnapshot dbopendynaset object D In visual basic, while closing a form _______ event of a form object is triggered earlier to terminate event. load activate unload initialze C In visual basic, to give a backcolor or to bring in a picture to a command button can only be done if we set the style property to ______ standard opaque transparent graphical D In visual basic, a method RGB(255,0,0) will generate _______ color blue red green black B In visual basic, a method RGB(255,255,255) will generate _______ color red green blue white D In visual basic, if a user uses a shortcut key ctrl+R properties form layout project explorer _________ becomes visible. window window window toolbox D In visual basic, if a user uses a function key F4 properties form layout project explorer toolbox _________ becomes visible. window window window A In visual basic, when a textbox control receives the change lostfocus text gotfocus focus ________ event is triggered. D In visual basic, a form is a ________ object. child parent container none of the above C Microsoft visual basic is a Rapid Application true false Development tool. A In visual basic, when a form object appears on the load unload initialize activate screen _________ event is triggered. D In visual basic, to display text on a label object _________ property is used text name caption none of the above C In visual basic, _______ object is used to access the database and also to manage the data in the database. opendatabase dbengine openrecordset none of the above B
In visual basic, when a checkbox control is checked _______ property is automatically assigned with 1. enabled In visual basic, _______ keyword is used to declare a variable dime
visible dim
value var
style none of the above
C B
What is the extension of the Visual Basic project file that stores the design of a user control. .ctx .ctl Which event of a text box would you use for validating the data entered by the user? Validate Validation Which of the following statements forces inline error On Error GoTo On Error GoTo handling? linelabel Inline The _______ method resets the contents of bound controls to their original values when the user clicks UpdateControls PaintPicture on the cancel button. Cancel parameter to To deactivate the Form UnLoad event, you make the a non-zero Cancel value following change in the function definiton: parameter to 0 How many root nodes can a TreeView control have? 1 2
.ctr Check On Error Stop
.ocx Audit On Error Resume Next
B A D
Refresh UnloadMode parameter to a non-zero value
Resize UnloadMode parameter to a zero value 3 None of the above
A
A D
Consists of several Consists of A project group is a Project which: several Programs Applications Procedures declared in a _____ are local whereas Form window, Project window, Class module, procedures declared in a ______ are available to the standard or code view code code module whole application. module window How can you keep the user from exiting a form by Place code in the clicking the Close button? Terminate event The _______ property enables Visual Basic to draw complete images in memory before displaying them AutoRedraw = on the Screen. True
Consists of Various Forms And Code Modules
Consists of several Projects
D
None of the above
A
Place code in Place code in the the Unload event Deactivate event None of the above
B
AutoRedraw = False Msgbox You want to display the code and the description of Msgbox err.no & err.number & err.text an error. What would be the correct syntax? err.text To display images to the user FreeFile Retrieve Common messages passed to Windows Caption Click and KeyPress Ascii Format CurrentX and CurrentY To help in creating a ToolBar GetFileNum Get
Refresh Msgbox error.number & error.text
PaintPicture
A
Msgbox error.number & error.description D To provide a repository for images used by other controls D GetBytes Value A B
What is the purpose of the Image List Control? Which method would you use to get a free or unused File identifier while opening any file: Which property procedure is used to retrieve the value of a property?
To allow the editing of icons GetFile GetProperty
Which of the following can be shown to the user using the Common Dialog control in VB? Which of the following are not properties of Command Button: Which events enable you to determine which key was pressed by the user? In order to access a file in Non-textual format, you have to open file in: Visual Basic displays information depending upon the current value of two properties of the form, called:
Windows Open dialog box explorer Visible Click, KeyUp and KeyDown Binary Format ScaleLeft and ScaleTop Multi-Line KeyUp and KeyDown Input Mode
Input box
D
Font C KeyPress, KeyUp and KeyDown D Output mode B
ScaleHeight and ScaleTop x and y
A
Which of the following procedure types will execute when you assign a value to a property of an object? Property Get
Property Assign Property Let
Property Set
C
In order to overlap the controls (say a command button) during design time, we use the µSend To Back¶ or µBring To Front¶ option from the Edit menu. To change it dynamically (i.e.during program Background color execution) we need to change: Caption property ZOrder property AutoRedraw property C property Which property of the ProgressBar determines how much of the bar is filled? Min Max Value CurrentVal B The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual Basic program. Shell The caption and the name properties of the command button:
Substr
SetAttr
CStr
A
Are one and the Can be different Are actually not None of the above same at times properties
B
You do not have You try to initialize a new Object variable with the You do not need the permission to access the following line but receive an error. What could be the use the Set to MyVar has not possible cause? Set MyVar = New Classname command here class been declared The ExecProcedure Which of the following will perform a direct execution The Open The Exec method of a Command object? method method A warning query A critical An exclamation The vb Critical symbol displays: icon message icon icon intrinsic vbYesNo is an example of a(n): statement. variable. constant. InputBox function can be created with the InputBox function returns macro recorder, MsgBox while the statement returns a value, while MsgBox a value, while the the MsgBox InputBox function statement does statement The primary difference between the MsgBox cannot. not. does not. statement and the InputBox function is the: Which of the following is TRUE about a protected form (i.e., a form where the Protect Form button on Data cannot be the Forms toolbar is toggled on and is assumed to entered into the The form can be Data can be remain in that position)? modified. entered. form. Which event is triggered when the user moves to another open form? Unload QueryUnload Deactivate The user can use ______ to remove the undesirable clipping tool cropping tool cutting tool part of the image The power presentation has a _____ for a set of color palette color box color scheme compatible colors The set three colors used for graphs and for ascent tricolor scheme color palette secondary slide items is called as
None of the above
C
None of the above None of the above built-in procedure.
D B C
MsgBox statement can be created with the macro recorder, while the InputBox function cannot.
B
A new check box can be added. C Terminate C
scribble drawing tool A color guide C
primary color scheme A
There are ______ types of charts available in PowerPoint _______ charts are useful while showing variations column over a period of time _______ are the individual pages of a presentation images A PIE Chart is a ____ diagram that depicts the relationship between a whole and its parts circular Each individual piece of data in a series is called a/an entity
10 bar
28 pie
18 linear slide sorter views all the above stream
36 C A C A B
images and text slides radar data point doughnut data
PowerPoint launches an OLE-compatible application Microsoft called organization chartclip art the chart is the organization made available chart is expanded for editing general purpose box tools tools
auto shapes
track changes
A
When the user double-clicks on an organization chart object in PowerPoint The _____ are used for selecting, editing and viewing objects in the chart
the chart window opens displaying a chart template none of the above custom drawing standard drawing tools tools used to create a manager box for an existing box not available in the tool bar thrice five standard tool slide view used to store the other tools of the organizational chart available in the tool bar any of the above eight all the above none of these none of the above
C C
used to mange organizational Manager box tool in organizational chart window is chart The custom drawing tools are _______ by default turned on
accessed only by manager turned off twice four draw tool handlayouts
C B C B B B B
Click on the box tool ______ to draw three boxes once There are ____ default fields available in all boxes of two the organizational chart The _____ tool is used in the same way as we use a native tool pen to draw a table A/An _______ consists of smaller printed version of the slides autolayouts The size of the object can be changed using the ______ tool zoom _______ is the process through which the slides in the current presentation are included in another presentation or application importing ________ can be used to create charts as well as worksheets Microsoft excel PowerPoint can import text files that have been saved in ______ format .ppt(PowerPoint) PowerPoint outlines can have _____ outline levels nine When a file is saved with _____ extension, the .rtf(rich text graphics and text are also saved along with the slideformat) not displayed during the slide The hidden slide is show ____ effect is used to introduce a slide during a DTS(digital track slide show sound) A _____ is a special effect that determines how the build objects appear on the slide The notes page is formatted based on the notes master Pick the odd man out of the following outline view When a new presentation is opened ,powerpoint creates slides that have a width of _____ and a height of ______ with the landscape orientation The default orientation for notes ,handouts and outlines is ____ orientation Build effect is also called as ______ Graphics for web pages are automatically stored in ____ format A _______ is used to jump to any slide in the presentation The ______ language has been incorporated into PowerPoint In PowerPoint _____ is a series of commands that are executed in sequence
reduce/enlarge preview
exporting auto shapes .rtf(rich text format) only one
.wmf(windows metafile) .txt(plain text) .doc(document) displayed only during the slide displayed only in outline view none of the above show 3D(3 dimension) both a and b transition slide master slide view slide show master slide view show transition view show master notes slide sorter view
B
A D A A C
15 inches,10 inches portrait animation gif hyperlink visual c++
10 inches,7.5 inches landscape view show jpeg hypertext visual basic for application batch file during slide transition spell checkers
7.5 inches,5 inches a or b transition png
none the above none of the above b or c none of the above
B A A D D B A C A
action button all the above Microsoft visual all the above interdev templates when the slide show is run header files add-ins none of the above all the above
macro while creating a .exe file The macro will be activated Developers can easily add ____ to PowerPoint 2000 by using the programming interface virus checkers
______ determines the order in which order in which the slides will be displayed during the show slide show custom show _______ is used to organize and develop the contents of a presentation slide pane notes pane If we save the presentation file as a metafile, it can internet explorer paint shop pro be opened using
both a and b
none of the above
B D D
properties pane outline pane paint shop pro power point 2000
PowerPoint creates a sample presentation to With reference to autocontent wizard for creating a which user can it is the quickest contains sample new presentation, which of the following statements add words and way to create a presentations for provides suggested pictures are not true presentation a variety of topics content and design
D
Which of the following statement is not TRUE
With reference to changing the order of slides, which of the following statement is not true
user can insert objects like cliparts, pictures stored in a separate files to the slides in outline view, drag the slide icon to a new location
user can insert only pre-drawn, pre-colored graphic images reflected in a clip arts to the slides in slide sorter view, drag the slide to a new location
user can insert picture to the master slide which gets reflected in all the slides using that master slide in notes pages view, drag the slide icon to a new location
user can insert picture to the title slide which gets reflected in all the slides using that title slide B I slide view, drag the slide icon to a new location C
Which of the following definitions are not true
the slide that holds the formatted placeholders for the titles, main text and any background items that user wants to appear on the slides is called a master templates
Which of the following statements are not true
design templates transition means is the template applying special whose format and color effects to the scheme user crossover applies to a between the presentation slides in outline view, user can see the miniatures of all with notes pages slides in a presentation, view user can user should prepare speaker complete with select the slide text and notes and view to add the graphics handouts text to the slide the slide that holds the formatted placeholders for the titles, main text and any background items that user wants to appear on the slides is called a master template slide layout
the slide that holds the formatted placeholders for the title and sub-title for the presentation is called a title template D
the slides can be reordered in the outline view
B
Which of the following definitions are not true The options available in the common task toolbar does not include
transition means applying special effects to the crossover between the slides
design template is the template whose format and color scheme user applies to a presentation
the slide that holds the formatted placeholders for the title and subtitle for the presentation is called a title template D set up show B
With reference to chart, which of the following statements are not true The format of the text entered in a title, subtitle, or bulleted-list object is determined by the format the master slide the slide master the header slide settings in a special slide called -------PowerPoint provides a _________ that searches the entire presentation i.e., all the text objects in all the slides, outlines, notes and handouts for spelling grammar errors office assistant spell checker checker PowerPoint's drawing toolbar contains _______ 10 12 102 drawing tools Click _______ on the rectangle drawing tools enables us to draw multiple rectangles once twice three text, hypertext CD-ROM, digital camera and An example of the components of a multimedia text, graphics and and Power Point. sound. presentation could include email address. Which of the following formatting elements can be applied to a PowerPoint diagram using the the Font and the AutoFormat tool? the Line style the Line color text alignment Which of the following formatting elements can be applied to a PowerPoint diagram using the Format Fill color Line color Line thickness AutoShape command?
customize new slide by default, doughnut chart is displayed data to be graphed resides based on the data in the in a datasheet data is plotted in datasheet window a chart window
user can add data labels and gridlines to the chart B
the format slide
B
none of the above
B 22 B
four times B text, hypertext, Power Point, video and sound. D Line style, Line color, text font, and text alignment D Fill color, Line color, and Line thickness
D
Excel is started What happens when you double click a blank graph so that you can placeholder in a PowerPoint presentation? create a chart.
A popup box Microsoft Graph prompts you for is started so that The graph an existing Excel you can create a placeholder is chart to insert. graph. deleted.
C
The legend in a Microsoft Graph chart is: Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best chart type if you want to emphasize the total sales of Side-by-side each region? column
taken from the first column or row of data in the datasheet, depending on always taken always taken whether the data from the first row from the first of data in the column of data series are in datasheet. in the datasheet. rows or columns. entered by the user.
C
Stacked column Pie chart
Line chart
B
Which of the following actions will enable you to insert a graph into a PowerPoint presentation?
If you are editing a slide containing a Microsoft Graph, how do you display the underlying datasheet? How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished Single click the creating the chart? chart.
Pull down the Insert menu and select Chart, click the Insert Chart button on the Pull down the Click the Insert Insert menu and Standard toolbar, or pull down the Insert Pull down the Chart button on select the menu and select the appropriate Insert menu and the Standard appropriate Object. D Object. select Chart. toolbar. Click the chart object, then click the View Datasheet You cannot display It automatically button on the Pull down the the underlying displays in Slide Standard Edit menu, then datasheet once the toolbar. view. select Object. slide is finished. B Double click the Click outside the Change to Slide chart. chart. Sorter view.
C
A dialog box is displayed A dialog box is allowing you to displayed allowing you to enter the name enter the name of of the Excel worksheet that the Excel should be worksheet that should be linked embedded in the The datasheet is What happens when you click the Datasheet button to the PowerPoint PowerPoint saved as a presentation. presentation. on the Microsoft Graph toolbar? separate file.
The datasheet window is toggled from closed to open (or from open to closed). D The application that created the chart is What happens if you single click a chart that is not The chart is The chart is The chart is currently active? selected. deleted. doubled in size. started. A What happens if you double click a chart that is not The chart is The chart is The chart is Microsoft Graph will currently active? selected. deleted. doubled in size. restart. D a slide one bullet item at a time, build bullet items a letter at a time, and build bullet a slide one bullet bullet items one bullet items one items a word at a Using custom animation effects, you can build: item at a time. letter at a time. word at a time. time. D Which of the following animation effects can be Subtle, Moderate, or added to a slide? Exciting Subtle Moderate Exciting D Both enter and exit, and fly in Neither enter nor exit; Which of the following animations effects can be Fly in from top or from top or neither fly in from top bottom added to a slide? bottom Enter and exit nor bottom C Which keyboard key is used to select more than one Enter Shift Alt Ctrl picture on a slide? B
Custom animation can be used to affect ONLY:
Custom animation can be used to affect the way objects appear on a slide, to what objects do after they appear on a what objects do the way objects after they appear the way objects slide, and to the way objects exit a slide. appear on a slide. on a slide. exit a slide. D
The advanced timeline shows The advanced the sequence in timeline shows neither The advanced The advanced which objects will the sequence in which objects will timeline shows timeline shows appear on the appear on the slide, the sequence in the duration of slide and the duration of the nor the duration of the which objects will the effect appear on the applied to each effect applied to effect applied to each Which of the following best describes the each object. object. object. information that appears on the advanced timeline? slide. C Which of the following objects can contain custom Organization Clips, organization Clips Text animation effects? charts charts, and text D What type of program allows an object within an image to be edited without affecting other objects? Paint program Which of the following animation effects can be Fly in added to a slide?
Draw program From top
Filtering program Animation program A Fly in, From top, and Dissolve in Dissolve in D
Which of the following is TRUE regarding the Datasheet? Graphical software tools that provide complex analysis of stored data are:
Once data is Once data is Data cannot be entered it cannot entered it can be entered into be changed. changed. Datasheet. OLTP. OLAP. OLST.
There is no such thing as a Datasheet. B OLIP. B
Which of the following statements is TRUE regarding PowerPoint diagrams? Which keyboard key combination is used to undo the previous command(s)? Microsoft visual basic project file has _______ file extension. In visual basic, _______ method is used to add an item in a combobox In visual basic, _______ method is used to load picture during runtime in an image control
You can change both the You can change appearance of a the appearance whole diagram and the of a whole diagram, but not individual individual shapes shapes of a diagram. of a diagram. [Enter+A] .vbg add load [Shift+Z] .vbp additem loadpicture
You cannot change the style of the connecting You cannot change lines in an the color of the boxes Organization in an Organization chart. chart. B [Alt+Z] .frm loaditem addpicture File1.Path = Dir1.Path msgbox() File1.Path = Dir1.Path [Ctrl+Z] .frx none of the above none of the above D B B B
In visual basic, to populate a drive list box with a Drive1.Drive=Dir Dir1.Path = directory list box __________ statement is used 1.Path Drive1.Drive In visual basic, to display a message in the run time messagebox() message() _________ function is used In visual basic, to populate a directory list box with aDir1.Path=File1. Dir1.Path = file list box ________ statement is used Path Drive1.Drive In visual basic, ________ is a property of a recordset object which counts the number of rows in a recordsourse object openrecordset opendatabase In visual basic, using a data control, a record can only be added from the last record. Adding a new record is only possible using _______ method of a recordset object. update append In visual basic, using a data control, a record is saved to a recordsource object using _______ method of a recordset object. append update In visual basic, using a data control, to navigate to the previous record ________ method of a recordset object is used. movenext movelast To deactivate the Form UnLoad event, you make the following change in the function definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode Cancel parameter as Integer) To prevent the Form from closing, you to a non-zero Cancel will set the: value parameter to 0 _______ is a word processing that is a member of Word 2000 Office 2000 the office 2000 family
none of the above
B
none of the above C File1.pattern=Dir1.pat h C
recordcount
count
C
addnew
additem
C
additem
addnew
B
moveprevious
movefirst
C
UnloadMode parameter to a non-zero value Office 97
UnloadMode parameter to a zero value Back Office
A A
The feature that enables user to type anywhere in a document without pressing or tab click-n-type The______ feature allows the user to copy and paste upto 12 items at the same time in an office clipboard application ______ and _____ key combination will extend the shift+end and selection by one character on the left and right shift+home web layout, _____and_____ are improved layout in Word 2000 printlayout
double click
drag & drop
none of the above
A
cut shift+left and shift+right normal layout, web layout
select ctr+end and ctr+home web layout, page layout click from start program, MSWord from the task menu document assistant
none of the above
A
none of the above none of the above
B A
The easiest way to create a document in word is wizard In Office2000 environment the tool that makes work office assistant easier for us is_____ A short description of a tool bar button called the ______ is displayed when the mouse pointer is Screen Tip allowed to stay for a second on the button The _____ helps us to keep track of the margin of the page tab stop The keys that are used to navigate between headers arrow keys up and footers are only Pick out the element from the following that does not left form the type of tabs for the Word 2000 _______are blueprints or patterns for documents of a certain type template The______ is used for quickly setting paragraph indention using the mouse increase indent Word art is text with special effect AutoShapes in word can be created by accessing the _____ drawing toolbar By default, a document consists of_____ section The dialog box that is used to determine the documents margins is ________ is a box surrounding a page on all slides or a line that sets off a paragraph on one or more slides The key that is used to perform a task to select all t he text in the documents is The key that is used to indent a paragraph is The key that is used to change the font from the current positioned in a document is The key that is used to change the style of the document that is from that normal to heading1 or heading1 to other document styles. Set mapping' Check control that follows a text-type validation, we use ----------------- application for data analysis. Excel can import data from other databases for the data analysis. A System Auditor can uses CAAT tools to analyze data 1
templates inbox assistant
none of the above none of the above
A A
Tool Tip marginal stop page up keys only center model
Icon Tip ruler home and end keys only decimal dialogs/alerts
Document Tip none of the above up and down arrow rotation none of the above none of the above pictures forms 0
A B D D B C A A 11 A
decrease indent both A and B control tool box design wizard control box 2 print preview from the file database
printer setup page setup from from the file menu the file
none of the above
A
border ctrl+a ctrl+a
shading Del Del
style box ctrl+f ctrl+f
none of the above ctrl+m ctrl+m
A A D A
CTRL+SHIFT+F CTRL+O
CTRL+SHIFT+S CTRL+SHIFT+P
ctrl+shift+f
ctrl+o
ctrl+shift+s
ctrl+shift+p
C
Excel TRUE FALSE
Access FALSE TRUE
Both
None of the above
B A B
In the case of the ---------- control, it is ensured that the data in combination with other fields are reasonable as per standard set by an organisation. Valid Signs --------------- function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in a table HLOOKUP Most of the tools use in Data Analysis depends on DDE
Transaction type Limit Check
Reasonableness
D
VLOOKUP OLE
A or B ODBC
None of the above All of the above
B C
How do you define analysis of an information system?
What areas need to be considered in the SOFTWARE design process? What is the function of systems software? Formatting a disk results in all the data being...?
Analysis is the loading of programs that perform routines to control peripheral devices Inputs, outputs, file design Only hardware hardware, and and software software To execute any programs To collect data Deleted from the Copied from the disk disk Analysis translates program code of a high level language to machine code Users operate the manual system and computer system at the same time The new system is introduced alongside the existing system Instructions and technical documentation
This involves looking at a system and finding out how information is being handled Maintenance, reliability, and upgradeability To maintain security
None of above
C
None of above
B
None of the above D Transferred from the Saved to the disk disk A
What is Direct Implementation?
Users operate the computer system from a given date
Users operate the manual system
None of above
B
What is parallel running? What documents are produced during the development of a system?
What are User Guides are used for?
Systems software can be categorised into:
The new system is introduced Users continue and users start operating the old operating it None of above system User Guide and technical Log files and temporary files documentation None of above User guides To enable any cover how to run the system, enter printer to be For technical connected to the data, save, print, etc. support None of above network Network systems and Operating Database communication systems and systems and system services services backup services None of the above
A
C
C
A
Which storage device cannot be erased?
Magnetic tape storage
CD-ROM
floppy disk
Hard disk
B
To maintain a backup copy of To do a Application software are programs that are written all the information particular task. Which bus carries information between processors and peripherals? Data bus Auto bus Convert the decimal number 2989 to Hexadecimal FDDI Which bus controls the sequencing of read/write operations? Data bus BAD Auto bus
To help someone who is applying for employment None of the above Address bus TED Address bus Control Bus MAD Control Bus
B A B D
What are utilities? Numbers are stored and transmitted inside a computer in The original ASCII codes A Nibble corresponds to A gigabyte represents A 32-bit processor has
Operating system routines Peripherals that that execute in are connected to supervisor mode. a computer. binary form were 7 bits 4 bits More than 1000 mega bytes 32 registers
Data structures that are part of the kernel of an Shells, compilers and operating other useful system system. programs. D alphanumeric form represented 127 characters 32 bits A A A
ASCII code form decimal form represented 256 characters 8 bits 8 bits 16 bits 1000 kilobytes 32 I/O devices 230 bytes 32 Mb of RAM
1024 bytes A a 32-bit bus or 32-bit registers D
A parity bit is the contents of these chips are lost when the computer is switched off? Clock speed is measured in
used to indicate used to detect uppercase letters errors ROM bits per second RAM baud memory access time use more RAM than RISC machines
is the first bit in a byte is the last bit in a byte B DRAM bytes CROM Hertz A D
Cache memory enhances
CISC machines
memory capacity have fewer instructions than RISC machines
secondary secondary storage storage capacity access time have medium clock speeds use variable size instructions
B
D
Power is switched off Every data from the primary memory will be erased if a parallel interface An RS-232 interface is For print quality you would expect best results from line printer is faster to access than ROM RAM
Computer is Data is not saved improperly shut before computer down is shut down All of the above a serial interface printer interface a modem interface dot matrix printer ink-jet printer laser printer. stores more information than is used for cache memory is non-volatile RAM
D B D
B
A UPS
smart card Laptop computers use
increased the storage capacity of a computer increases the system process speed has more storage capacity is a form of ATM than an ATM card card CRT displays LCD displays
provides backup power in the event of a power cut none of the previous C is an access card for a contains a security system microprocessor SSGA displays
C
none of the previous B
Multiprogramming refers to
Multitasking refers to What are small high speed memory units used for ALU storing temporary results? A good way to exchange information that changes rapidly is through brochures
having several programs in RAM at the same time multitasking having several the ability to run softwares 2 or more running at the programs same time concurrently Registers magazines
writing programs in multiple none of the previous A languages writing programs in multiple languages none of the previous D Variables CD-ROM Logic Bus e-mail B D
Multiprogramming is a prerequisite for
multitasking
Timesharing is the same as multitasking ______ is the default view in Word used for typing Editing and Formatting the Text NORMAL The short-cut-key that is used to indent a paragraph spacing in the documents is ctrl+m The short-cut-key that is used to paste the selected text ctrl+v or ins The short-cut-key that is used for paragraph ctrl+2 spacing(1.5) The box that separate text from the document and allows it to behave like an independent object is Text Box known as The object that is used to provide information like the title of the book, name of the chapter, page number Header and Footer etc. The object that helps us analyzing data statistically is known as Chart To highlight certain parts of a page to set it apart from the rest of the page we make use of the Borders following features To clear all the tabs in a document the option that is clicked from the tabs dialog clear The dialog box that is used to incorporate picture picture bullets bullets into our documents or web pages is dialog box The object that composes of set of tools which helps to create and work on different shapes like charts rectangles, circles, flowcharts etc.
to run more than an operating one program at system the same time multiprogrammin multiuser g ONLINE LAYOUT PAGELAYOUT ctrl+2 ctrl+c or ins ctrl+5 ctrl+end ctrl+x or ins ctrl+1
none of the above
C
none of the previous C ONLINE DOCUMENT A ctrl+home ctrl+v or Del none of the above B A B
Frame
AutoShape
Border
A
Screen Tips WordArt
Page Layout Auto Shapes
none of the above File
A A
Shading remove all arrow bullet dialog box
WordArt remove circle bullet dialog box
Bullets clear all
D D
none dialog box
A
WordArt
AutoShapes
files
C
When word is opened a new document called_____ is displayed, where the user starts typing the content right way doc1 ______ is an online dictionary maintained by word to obtain synonyms for words thesaurus The thesaurus is invoked by pressing_______ shift+f7 When a new table is created the insertion point first flashes in the _____ By pressing the _____ key inserts a blank row after tab the last row in the table The ______ option enables us to convert text into a convert text to table format table A table consists of ______ that contain text or graphics row The _______ option in word allows the user to automatically correct misspell words as and when they are typed AutoCorrect ______ is a facility that enables recording and replaying of a sequence of keystroke Mail Merging In Word Macros are written in _____ basic In Word 2000 the macro dialog box is activated with the help of ____ key combination shift+f8 ________shows how a document would look like when published on the web or on an intranet ______ is a software for sending and receiving email messages ________is the coding system used to create web pages The network that makes information easily accessible across various networks is _______
document1 hyphenation
new document mail merge
default document none of t he above tools+spelling menu last cell of the t able
B A A A A A B
thesaurus menu shift+f8 second end convert data to table first row
enter none of the above table auto format option none of the above none of the above
rows & columns records
AutoFormat Macro visual basic shift+f7
style gallery Data Source vj++ alt+f8
none of the above none of the above visual FoxPro alt+f5
A B B A
online layout web layout view view email client html internet field name must be listed in the same order as the corresponding information in the data source
browser micro soft outlook express outlook xml intranet the field separators in a header source and the data source can not be set as paragraph sgml arpanet
none of the above hotmail vb script LAN
A A A A
Which of the following statements are false with reference to the use of a header row source for a mail merge
field names in the header the number of fields source must names in the header match any merge source must be the fields you've same as the number inserted in the of data fields in the main document data source B by default cell height and weight option applies to all the rows and columns of a table justified
With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false The alignment available for tabs does not include
auto format option applies to it is not possible the entire table and not only to to change the the selected height of only selected rows of rows or columns of a table a table left decimal
delete cells option allows to delete the entire row or a column or shift cells up or shifts cells left C top A
Which of the following statements related to a Section Break are True The user can set a spelling checker to skip the marked part of the next New option under the file menu of word creates a new blank document that is based on the normal templates The user can split the screen only into two parts The features that enables the user to type text graphics tables anywhere in the document without pressing enter or tab The user can modify the picture from the clip art
A new section is created in order to change properties like number of columns true
In order to type a If a header is header from the inserted in the third page of the second section document a then the same section break is header is inserted after t applicable to the he third page first section false
A section is a portion of a document in which certain page formatting option can be set D A
true true
false false
A A
drag & drop true
click -n-type false
Double Click
none of the above
B A
automatically corrects common With reference to auto correct which of the following typing, spelling errors statements are false
With the reference to password protected documents which of the following statements are false The alignment available for tabs does not include
prohibits the user from renaming an auto correct entry password protected document can be opened without password can not password as include spaces read only justified a document file can be inserted in the current document at specified position false
automatically corrects the grammatically errors
with t he caps lock key accidentally turned on reverses the case of the letters that were capitalized incorrectly and then turns off the caps lock B
password are not password can be upto case sensitive 15 characters long B hanging top A
left
Which of the following statements are False Drop Cap tool does not work for the contents in the table format true
a .ppt file can not not be inserted at specified position in the current document
a multiple documents files can be inserted in the single document
an .xls data can not be inserted at specified position in the current document B A
The special symbols that are inserted using "insert symbol" option of the word can not be printed by the printer as they are not standard keyboard symbols true false The "format columns" option allows to create columnar text up 12 columns only. true false The document that makes the user to organize and maintain a long document, such as multipart report Master Hyperlink or a book consisting of chapters Document Child Document Document The view that enables us to view how objects will be Print Layout View Page Layout Outline Layout positioned on the page when it is printed
B A
none of the above none of the above
A B
The mode that is initialized or toggled to if the user is in a position to overwrite the text in the word Insert Mode Veena is entering a paragraph in a word processing program. When the cursor gets to the end of a line, what is the best way to get the cursor to the next press the return line? key
Type Over mode Remove
none of the above
A
press the tab key
press the escape key just keep typing
D D B
How are data organized in a spreadsheet? layers and planes lines and spaces height and width rows and columns Which key moves the cursor to the beginning of the backspace/ tab enter/return shift next line of text? delete Veena typed the following sentence: "The girl was very beautiful." In which word processing utility could she find a synonym for "beautiful"? grammar checker spell checker thesaurus outliner send a public message to Using an electronic bulletin board, Seema can do allfriends interested in one topic of the following except which one? Aryan has created a ten-page story, but only wants to print the first two pages. What printer command Print all should he select? What process should be used to recall a document Enter saved previously? Which is used to indent text within a document? closing Desktop publishing is a more sophisticated form of which of the following types of software? database To analyse figures What is a Word Processor used for? What is a picture that is saved on a diskette and can be pasted into a document? subscript What basic tools would you find in the Edit menu of Clear, replace a word processor and select Text at the bottom of every page Mouse, printer and processing system keyboard?
C
send private send pictures to messages to a friend a friend From ___ To ____ Copy tabbing graphing Creating and editing documents annotation Spelling, grammar and autocorrect
send a package to a friend D
Page setup Retrieve spacing
Print preview Save sorting
B C B C
word processing spreadsheet Storing information clip art
None of the above clipboard
B C
Cut, copy, paste Font, Paragraph, and clear Bullet and Numbering C
What is a header in a document?
Numbers which Text which appear on every appear at the top Designated area on page of every page the document Keyboard, Monitor, Mouse, monitor keyboard and and printer mouse clip-art file microphone
C
What hardware is essential for a word? The user could take a picture from a magazine and insert it into the document by using a Browser Assume you are creating a two-column newsletter. Which type size is the most reasonable for the text in the columns? 6 point Given the default left and right margins, and ½-inch spacing between columns, the width of each column in a two-column document will be: 2½ inches.
None of the above digital scanner
B D
10 point
15 point
25 point impossible to determine.
B
2¾ inches.
3 inches.
B
Assume you have made all appropriate selections in You have not the Columns dialog box in Word, but cannot see any inserted a columns on the screen. What is the most likely column section You are not in cause? Print Layout view. break..
You have not specified continuous section breaks.
Word cannot display columns during editing; you will see them only when you print the document. A
While word processing, in which of the following situations would Tom use the "Copy" command?
to move a section of text from the to leave an original original location section of text in place while pasting a copy to store a file on to store a file on to another elsewhere the hard drive a diskette location D A set of different graphics None of the above Grammar Checker
Data about a set of similar things Mainly text What does a document contain? Before submitting your work you want to find any words spelt incorrectly. Which of the following would Thesaurus Spell Checker you use?
B
Find and Replace
B
What command in a word-processing program can be used to change the word µhim¶ to µher¶, and also the word µhe¶ to µshe¶ in the given phrase? ³On a cold and still night, the only sound that could be heard was the owl that had ade its home in the nest outs Paste Replace Select all What edit commands would you use to insert a paragraph from one document into another document, while still keeping the paragraph in the Delete, then first document? Copy, then paste Cut, then paste paste To give the original author a chance to accept suggested changes from the Which of the following statements would NOT be a person who reason for showing suggested revisions in a Word entered the document without changing the original document? revisions To give the original author a chance to reject suggested changes from the person who entered the revisions
AutoCorrect
B
Insert, then paste
A
Which statement is NOT true regarding revisions made in a Word document?
To complicate the revision process and to force the author to spend more time making corrections A vertical line outside the left margin signifies A red underline a change has A line appears appears beneath been made at through text that text that is to be that point in the document. is to be deleted. added.
To allow multiple people to work on one document in collaboration with one another C
Comments are enclosed in a text box at the right of the document. D
Through the Edit menu by choosing Track How are suggested changes entered for review on Changes an initial Word document? command
Through the Tools menu by choosing Track Through tools on Both through the the Reviewing Tools menu and the Changes toolbar Reviewing toolbar command
D
Which of the following is TRUE about saving a document using the Versions command?
The Versions command will The Versions The Versions The Versions allow you to savecommand will command will command will allow allow you to save only one version allow you to save you to save only two multiple versions of a document, only one version versions of a of a document, including any of a document document: one changes that including any without any version of the original changes that may may have been changes that and one version of have been made made to that were just made any changes made to to that document. document. to the document. the document. A The latest version is opened automatically. The first and second versions The previous version is opened are opened automatically. automatically. B
All versions are What happens when you open a document that has opened automatically. been saved using the Versions command? You have used the word µdiscover¶ four times in an English essay you have created using a word processing program. You would like to find another word of similar meaning to use instead of µdiscover¶. Dictionary Which of the following would you use to do this?
Grammar check The most recent Word displays a version will When opening and working with multiple versions oflist of the dates appear at the and times each bottom of the a document, how can you tell which is the most file was saved. list. recent version? Various fields are added to a regular document to create a special document called a form through the Fields Tools ____________ toolbar. Which of the following types of fields CANNOT be inserted into a form? Check boxes Toggle button
Spell check Word will show the name of the person who saved each version.
Thesaurus Word is not able to tell the most recent version of a document.
A
A
Forms Text fields Comments can be edited or deleted by right clicking the highlighted text.
Insert A drop-down list Comments can be edited or deleted by left clicking the highlighted text.
C B
Which of the following is TRUE related to editing comments in a Word document?
Comments Comments cannot be cannot be edited. deleted. Text at the bottom of every page
C
What is a header in a document?
Numbers which Text which appear on every appear at the top page of every page None of the above
C
In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2. You would like to make this paragraph start on page Press tab. 2.What would be the best way to do this? Tables in a document help you to easily arrange all of the following EXCEPT: text. To identify a document, it is helpful to include the file name on each page as a header/footer. Which of the following tools will copy the formatting of selected text to other places? Copy button What is the name of the process of determining the Fault Finding cause of errors in a macro? Drop caps are added to a Word document using the Insert ___________ menu.
Copy and paste. Insert page break. forms. find/search. Format Painter button numbers. macro. This action is not possible. Debugging Edit
D C A C D C
Bug Squashing Error Injecting Tools Format
A reverse in a newsletter is:
a section of text where the first letter of each sentence is a section of white lowercase and text on a black the rest are background. uppercase. setting it in larger typing it all in type or font size. capital letters.
A pull quote is best emphasized by:
the guidelines used to establish where different elements of the newsletter will go. underlining the text of the pull quote.
an enlarged capital letter at the beginning of a paragraph. A
changing the color.
A
Which of the following definitions is CORRECT? Pertaining to newsletters, which of the following cannot be changed using the Columns command The width of dialog box? each column As related to type size, how many points are there to the inch? Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. The rest of the newsletter has two columns. What is the minimum number of sections One in the newsletter?
A grid is a set of A dropped cap is horizontal and vertical The reverse A pull quote is a a word that starts lines that determine technique means quotation taken with a lowercase the placement of elements in a to add dark text from (pulled) letter when it newsletter or other on a light from another should have a document. background. document. capital letter. D The height of each column 6 10 The number of columns 12 The tab spacing within each column
D 72 D
Two Press Press Ctrl+Enter Ctrl+Shift+Enter Which of the following is NOT correct with respect to create a page to create a break. to page, column, and section breaks? column break. Which of the following would be the most appropriate font for a newsletter headline?
Three
Four
B
Press Enter to create a section Press Shift+Enter to break. force a line break.
C
Which of the following is the default Word column width? Sequence Check is a --------------- level control Field check. Analyse data over two or more periods is called ---------------------- analysis Horizontal We use Hash Total to identify ------------ within a series where there is a definite relation between items Duplicate Value Analyse fields by arranging them into rows and Cross Tabulate columns is called
A serif font at 10 A sans serif font A serif font at 20 A sans serif font at 45 points at 10 points points points D It depends on the left and right margins, and how many columns are 2 inches 3½ inches 4 inches specified. D Record Vertical Both A or B None of the above None of the Above A A
Combined Value Gaps Filter Merge
All of the above None of the above
C A
--------------------- function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in the table. RAND() To import data from Access to Excel ,it is not possible to link between Access and Excel sheet TRUE The GAP detection options can be used to test for TRUE completeness of data. Exception testing can be used to identify ---------------Unusual - items Data validity test represents
VLOOKUP()
HLOOKUP()
None of the above
B
FALSE FALSE A or B duplicates testing None of the above All of the above
A A C D
Strange comparison of exception testing data
Year end ledger, inventory files or transaction files can be tested for cut-off , to ensure that the data has True been provided is for the correct audit period In Range Check , the data may not be in proper sequence but should be within a predetermined True range
False
A
False
A
In ---------------- Check data entry follow a particular sequence and also a predetermined range. Limit Sequence Range related to virtual reality Virtual memory is a form of ROM a form of VRAM same as multiprogrammin same as g multitasking Multiprocessing is multiuser To help keep sensitive computer-based information set up a make a backup confidential, the user should password copy save the file
Both B & C
B
none of the previous D involves using more than one processor at the same time D use a virus protection program B
What is the function of a disk drive?
to calculate numbers
to read from or to display information write information to print sheets of or pictures on a to a floppy disk paper screen B uses Java 103 sec a mouse uses C++ 1012 sec a frog none of the previous. D 109 sec D a message pad B
A 4GL is Uses Cobol A nanosecond is 106 sec What small, hand-held device is used to move the a keypad cursor to a specific location on the screen? data to be transferred to memory
The memory address register is used to store
data that has an instruction that has been transferred the address of a been transferred from from memory memory location memory. C an instruction that has the address of a been transferred from memory location memory A an instruction that has been executed a light pen the address of the next instruction to be executed D a magic marker A
The memory data register is used to store
The instruction register stores Which of the following is used to indicate the location on the computer monitor? a cursor A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate data. Formula Which of the following translates a program written in high-level language into machine language for execution? Assembler Memory Detecting errors in real memory is a function of protection
data to be data to be transferred to or transferred to from memory the stack an instruction an instruction that has been that has been fetched from decoded memory a scroll bar
Algorithm
Program Artificial Intelligence
Data
B
Compiler
Parity Checker
B B
Parity Checking Range checking Validation search each file use the backup in turn facility Program System
To find where a file has been saved on disk, the use the directory user should search tools A series of instructions telling the computer how to Network process data or files is defined as a save copies of the file with the To ensure that data is not lost if a computer system same name on the system fails, the user should Having a single CPU alternatively process tasks entered from multiple terminals is called Multiprocessing The place in the CPU where the data and programs are temporarily stored during processing is called ROM the All are examples of computer software except Firmware Computer manufactures are now installing software programs permanently inside the computer. It is Firmware known as Which of the following file organisation forms most Sequential efficiently allows access to a record The part of the computer system controlling data Operating manipulation is called the System For direct access storage devices the recording area Tracks and is divided into Sectors
use find and replace A Modem B
use different filenames on the keep a record of backup to a secure computer failures medium system Multiprogrammin g Time sharing Multiplexing
D D
Floppy Disk Telephone Word Processor modem Telephone Word Processor modem Hashed Indexed CPU
RAM
Magnetic Disk Shareware
B C
Shareware Random
A C B A
ALU Blocks and Sectors Database, Character, field, character, record The data hierarchy from the largest to the smallest is database Which of the following hardware or software system Maintenance controls provides a detailed record of all activities Valid character diagnostic performed by a computer system program check Which one of the following parts of a computer is Sound card. CD-ROM necessary to enable it to play music? An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour pictures, 15 minutes of sound and 1 minute of video. Which of the four different media listed takes up most space on the CD-ROM? Text Pictures Which one of the following printers is suitable for printing sprocket fed carbon copies? Laser Dot matrix
Primary Storage Schema and Files and Tracks subschema
File, record, field Element, field, file
C
Systems logs MIDI interface
Parity check Serial interface
C A
Sound Ink-jet
Video
D B
viewing an Multimedia software can be most productively used encyclopaedia for CD-ROM.
Drum recording current stock in a supermarket and creating the presenting an plans for a order for stock to answering customer queries. building design. a warehouse.
A
To be effective a virus checker should be Which one of the following software applications would be the MOST appropriate for performing numerical and statistical calculations?
replaced regularlynever updated
updated regularly updated once a year C
Passwords enable users to How many bytes do 4 Kilobytes represent? Back up of the data files will help to prevent Which one of the following is the MOST common internet protocol?
Graphics Spreadsheet package retain get into the make efficient confidentiality of files simplify file structures system quickly use of time 512 1024 4096 8192 loss of duplication of confidentiality data virus infection loss of data Database TCP/IP HTML
Document processor
D
C C D
The advantage of a PC network is that The term A:\ refers to
access to the files can be internet is quicker shared a file name universal port serial a subdirectory
IPX/SPX NetBEUI A printer can do 1000s of pages a the operating system is easy to use day B the root directory the hard drive D
UPS stands for
The main problem associated with uninstalling software is that You are conducting research for a Income Tax assignment. The raw facts you collect are called
up-line provider uninterruptable service power supply the system the program requires a orphan files can executable may network not allow it to be administrator to be left on the uninstalled system uninstall it
uniform page source C
the system always requires a re-boot and defrag afterwards A
A flow chart is the
A voucher entry in Tally is done for
data. documents. Graphical Rules writte in representation of procedural logic language Purchase, sales, receipt, payments To fill the log etc. register assist in maintenance speed up access
information.
text.
A
Logical Steps in any language None of the above It is mandatory in None of the bove tally prevent unauthorised access allow encryption
A
A
Passwords are applied to files in order to
C
Each of the following is an enabler of IT-business senior executive IT management IT understands alignment except: support for IT. lacks leadership. the business The basic systems model is used to describe virtually all information systems and it consists of the following elements: input. output. processing. The use of computers to design state-of- Using computers to do the-art, highquality products. architecture. specialist or functional Application Service Provider ensure the filename is not lost detective controls. static hashing
None of the above
B
All of the above
D
What is a computer-aided design system? A(n) __________ offers a solution package for an entire industry.
Software that generates innovated designs and artistic patterns. None of the above
A
enterprise
local
B
File extensions are used in order to Information systems controls include all of the following EXCEPT:
name the file preventive controls.
identify the file corrective controls.
identify the file type All of the above are parts of IS controls.
D D A
Hashing for disk files is called external hashing Components of expert systems include: a) inference engine; b) user interface; c) knowledge base; d) A: (a) , (b), (d) fuzzy logic corrective Black box testing and white box testing are part of: controls What is the term used to describe the point of interaction between a computer and any other entity, Component such as a printer or human operator? The advantages of CASE tools are: a) reusability; b) maintainability; c) portability; d) flexibility (a), (c), (d)
dynamic hashing extensible hashing
B: (a) to (d) preventive controls
C: (a), (b), (c)
D: (b), (c), (d)
C C
detective controlsgeneral controls
Interface
Settings
Control
B
(b), (c), (d)
(a) to (d)
(a), (b), (c)
C
Which of the following is an acceptable way to shut Press the reset down the computer? button. Yesterday, in your music class you saved your compositions as MP3 files. Today, you cannot remember where you saved them. Which is the bestCreate the files again. way to locate the files? Components of an information system model are: a) applications architecture; b) functional architecture; c) technology architecture; d) information architecture (a), (c), (d)
Turn the Select the µShut Pull the power cord computer off at Down¶ option from the back of the the power point. from a menu. computer.
C
Ask the person Use the Find or next to you. Search feature.
Put your hand up and ask the teacher C
(a), (b), (c) organisational Benchmarks form part of: detective controls controls Continuity controls include: a) record counts; b) date (a), (c), (d) (a), (b), (c) checks; c) label checks; d) run-to-run totals
(a) to (d) preventive controls (a) to (d)
(b), (c), (d) corrective controls (b), (c), (d)
C C C
Which is not part of help desk documentation: Testing of individual modules is known as: Design phase of CASE tools includes: a) data architecture; b) decision architecture; c) interface architecture; d) presentation architecture
problem logging call lights unit testing data testing
program change resolution procedures C requests thread testing loop testing A
Which is part of installation testing: The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a set of instructions provided by the: Multiplexer. Which of the following falls under multimedia data: (a) to (d) a) text; b) images; c) video; d) audio
(b), (c), (d) benchmark testing
(a), (b), (d) specifications matching
(a), (b), (c) parallel operations
(a) to (d)
D
system walkthroughs B
Peripheral processors. (b), (c), (d)
Concentrator. (a), (b), (c)
Job control language. D (a), (c), (d) A
Replacement personal computers for Which of the following procedures should be user included in the disaster recovery plan for an departments. Information Technology department? Designing relationships among components is part architectural of: design Several Computers connected together is called: Which network topology uses a Hub? Which of the following topologies is used for Ethernet? Client-server Star Star
Identification of Physical security critical of warehouse applications. facilities. procedural interface design design Computer Client network Bus Mesh Ring
Cross-training of operating personnel. B data design Hub Ring All of the above A C A D
Application software are programs Which type of file search method requires a computer first read all locations preceding the desired one
Bus To do a To maintain a particular job backup copy of such as editing, are written all the storing information information
To help someone who is applying To Store data in an for employment organised manner
B
Sequential Data Which of the following areas of responsibility are Systems analysis communications normally assigned to a systems programmer in a and applications hardware and software. computer system environment? programming. Which of the following is recommended when many A sequential file A sequential file searches for data are required on a disk on a tape Tapes can only be read by the It is unlikely that a magnetic tape containing several machine on which they are thousand blocked records can be used on two Parity errors will machines of different architecture directly because written result Which component of the CPU has the most influence on its cost versus performance Data path part Control Unit Which of the following terms applies to network used to connect computers with other computers, peripherals and workstations that are in fairly close Distributed Local Area proximity systems network Use the computer to which they are Can send data to connected to a computer and perform all Intelligent terminals differ from dumb terminals in receive data from processing a computer that they operations A computer is to be linked to 8 terminals using a single communication link. To permit simultaneous terminal operations, communication path will require which of the following Mixer
Direct
Binary Operating systems and compilers. A direct access file on a disk Information formats commonly vary between architectures Address calculation part
Indexed
B
Computer operations. C A direct access file on a tape C
Data record can never be blocked together C Input output channel A
Wide area network
Protocol
B
Are required with a Generally require microprocessor which a keyboard for permits some data data entry and a processing such as CRT for display input validation D
Modem
Multiplexor
Time sharing computer
C
A modem is a device that
Allows computer signals to be send over a Aids in back-up Packs data in a telephone line procedures disk file
Speeds up online printing
A
A LAN includes 20 PCs, each directly connected to the central shared pool of disk drives and printers. This type of network is called a Planetary networkRing Network A computer based system for sending, forwarding, receiving and storing messages is called an If a workstation contains a processor, monitor, screen manipulation device, printer, storage and communication capabilities, it is said to be Terminal hardware controls include RS-232 is a Office Automation A dumb workstation Time of day control locks Type of cable Executor systems An intelligent workstation Encryption algorithms Terminal Standard
Loop Network Electronic mailing A personal computer
Star Network
D
Instant post-office
C
A mainframe PC
B C D
Parity checks All of them Communication Device interconnect protocol standard
What is a compiler?
A compiler A compiler is a converts the general purpose whole of a language A compiler does higher level a conversion line program code providing very efficient by line as the into machine None of the above program is run code in one step execution Lexical analysis, Feasibility study, Implementation CONVERSION, system design, and and code and testing documentation generation None of the above CRC Baudot ASCII An interpreter is a general purpose An interpreter is language a representation providing very efficient of the system being designed execution Frequency division Demodulator multiplexor Middle-level Low-level languages languages It is less error prone EBCDIC
B
What are the stages in the compilation process? Which of the following is not a data transmission coding scheme
D A
What is the definition of an interpreter? A device used in data communications to divide a transmission signal into several sub-bands is known Modem as a Third generation languages such as COBOL, C, High-level and FORTRAN are referred to as languages It is faster than Serial Communication is used over long distance parallel because it communication
An interpreter does the conversion line by line as the program is run
None of the above Time Division Multiplexor None of the above
A
C C
It is less prone to attenuation Uses only one path Accounting systems, In what areas is the COBOL programming languageFinancial sector Graphic design commercial None of the above used? and engineering and education sector
D
C
Communicate with the console The primary function of a front-end processor is to operator Specification and design What is the first stage in program development? Which of the following is not used for data Fiber Optics transmission within a local area network
Manage the paging function in a virtual environment
Relieve the main CPU of repetitive Reduce competition communication between the tasks input/output devices None of the above
C B C
System Analysis Testing Coaxial Cable
Common carrier Telephone Lines
What is System Analysis? A device to device hardware communication link is called A cache
The design of the System Analysis screen the user defines the will see and use format and type to enter or display of data the data program will use An interface
System Analysis involves creating a formal model of the problem to be solved None of the above A buffer An online protocol
C B
What will a good software provider consider? The topology of a network can be each of the following except Star Packet Ring Bus What is the 8-bit binary value of the decimal number 85? 10101010 1100101 1010101 None of the above Which is the most common data transmission error Cyclic Parity Retransmission Redundancy Hash Count checking method What is the decimal value of the binary number 15 4 64 None of the above 1111? Which of the following devices merges communication signals onto a single line Port Modem Multiplexor Acoustic coupler What is the decimal value of the octal number 215? 327 141 Data management systems 97 None of the above
Testing to check The different for errors before Hardware, types of network the system is Software and to be used size of program. None of the above introduced
B B C A A C B
Which tool is used to help an organization build and Data Mining use business intelligence? Data warehouse tools
All of them
B
Cache memory enhances What is the decimal value of the hexadecimal number FF? Numbers are stored and transmitted inside a computer in What is the hexadecimal value of the decimal number 1476? A byte corresponds to What does EBCDIC coding of numbers mean? A Kb corresponds to What is the binary sum of 01011 and 00101? Information is stored and transmitted inside a computer in
memory access secondary secondary storage memory capacity time storage capacity access time 30 binary form 4C5 4 bits Basic Coding Description 1024 bits 10000 binary form used to indicate uppercase letters Because it squeaks when moved Touch screen BPS 255 ASCII code form decimal form 1B7 8 bits Binary Coded Decimal 1000 bytes 1112 5C4 16 bits 256 None of the above alphanumeric form None of the above 32 bits
B B A A B D A A A
Bit Code Design None of the above 210 bits 210 bytes 1110 None of the above alphanumeric form
ASCII code form decimal form used to detect errors
A parity bit is
is the first bit in a byte is the last bit in a byte B
How did the computer mouse get its name? What are you most likely to use when playing a computer game? CPU performance may be measured in
Its moves like a mouse It has ears Light pen MIPS Tracing diagrams MICR Hard disk Pencil lead 1.44 Mb Joystick MHz Reading bar codes barcode scanning CD-ROM drive Light sensitive elements 5 Mb
None of the above None of the above VLSI None of the above voice recognition None of the above None of the above 1 Gb
D C B B B A C B
A digitising tablet can be used for? Printing letters In processing cheques which of the following I/O techniques have banks traditionally used OCR Which of the following is a pointing device used for Touch screen computer input? What does a light pen contain? Refillable ink The capacity of a 3.5´ floppy is around 100K What general term describes the physical equipment of a computer system, such as its video hardware screen, keyboard, and storage devices? Where would you find the letters QUERTY? What input device could tell you the price of a product Where would you find a magnetic strip? What are the individual dots which make up a picture on the monitor screen Called What input device can be used for marking a multiple-choice test? Mouse Mouse Credit card Coloured spots
software Keyboard
output
input
A B B A B C C B
Numeric Keypad Printer Optical mark Bar code reader reader Keyboard Mouse Speakers Printer Pixels Pickers None of the above word processing software None of the above
Pixies Optical mark Mouse Bar code reader reader mouse button layout QWERTY is used with reference to screen layout keyboard layout What input device could tell you the price of a bar of Optical mark chocolate? Mouse Bar code reader reader language software interpreter interface A GUI is hardware Second Third First - generation generation generation computers. UNIVAC Computer belongs to the computers. computers. Name the first Indian Super Computer? Vishwajeet Deep Blue Param caused by is due to bad is caused by overuse disk blocks Disk fragmentation wear Magnetic Ink Character The technology which is used to check answer Optical Mark Recognition sheets of multiple-choice questions in civil services Bar code Reader Reader Technology Technology or similar examinations is: Technology converts a slower than an program to A compiler is a fast interpreter interpreter machine code Dot - Matrix Which printer among the following is fastest Drum Printer Desk - jet Printer Printer ³Zipping´ a file means encrypting it decrypting it compressing it
an operating system C Fifth - generation computers. Arjun
A C
none of the previous C
Image Scanning Technology
B
none of the previous C Thermal Printer transmitting it A C
Very important reader user sequence What does acronym VIRUS stands for Electrically An impact printer creates characters by using...? charged ink mainframe technology A client-server system is based on A nanosecond is 10-6 sec A procedural control used to minimize the possibility of data or program file destruction through operator Limit checks error is the use of _______ software enables users to send and application receive data to/from remote computers A _____ is a running instance of an application project Splitting of CPU's time for different tasks _______ prevents time slicing multiprocessing ______ computers are used in large organizations for large scale jobs which have large storage mainframes capacities _______ is responsible for all calculations and logical operations that have to be performed on the data control unit ______ printer use laser light band printer ______ software enhances the user to enter ,store, data manipulate and print any text management ______ software enables users to send and receive integrated data to/from remote computers software _______ is the temporary storage place for deleted my computer files _____ is a collection of related fields field _____ language consists of strings of binary assembly numbers language
Virtual Vital information information resource under reader & user system siege Thermal Paper An ink pen
None of above An inked ribbon and print head
B D
LAN technology WAN technology Unix operating systemB 10-3 sec 10-12 sec 10-9 sec D External file labels
Control figures system model multithreading super computers arithmetic and logic unit
Cross footing tests
C D D D
operating system communication pilot project process multiplexing multitasking
micro computers none of the above
A
central processing unit non impact printer drum printer electronic word processing spreadsheet communication idea processor software Microsoft recycle bin exchange file record machine high level language language connector symbol fazitsu vp200 series multiplexing
none of the above none of the above none of the above none of the above none of the above none of the above none of the above
B C B B B C B
______ symbol is used to represent processes like processed assigning a value to a variable or adding a number terminator symbol symbol hp vectra _______ is an example for micro computer PC-at system _________capability supports concurrent users multiprocessing multithreading doing different tasks The ______ do not have processing power of their own and has only a screen, keyboard and the necessary hardware to communicate with the host. For this reason, the terminals are referred as_______________ "dumb terminals" dumb servers distributed computing A______is nothing but a PC with a network system wan operating system _____system is responsible for handling the screen host server and user I/O processing The______ handles data processing and disk access in a Client/Server architecture host server Both the DBMS and the application resides on the same component in a ____system PC LAN When all the processing is done by the mainframe server itself, the type of processing is sometimes called as processing DBMS models can be grouped under____ categories four host processing
input/output symbol IBM-PC none of the above
B B D
dummy terminals dummy servers
A
windows NT back end back end distributed computing
LAN front end front end centralized
D D C A
dumb processing data processing two many
B A
one hierarchical file management database system ______is the most advantageous database system system A new user initiates a new process of execution at the background,while the user can continue his query process as usual in the foreground. This situation is referred to as ______ multiprocessing multithreading The process of data being automatically written to a duplicate database is called______ repairing Modem stands for __________ . Code/De-code Multiple changes to the same record or a field are fixes prevented by the DBMS through______ _________allows an application to multitask within multiprocessing itself Linear area networks LAN stands for __________ . New process of execution is referred to as______ task
network relational database database system system D
multiplexing
none of the above
B
disk defragmentation disk mirroring redo logging Modulation/De Module/Demodulation module None of the above locks constraints traps none of the above None of the above client-server
D B B B B C
multithreading multiplexing Local area Local array of networks networks. process thread
ISDN stands for _______. _____________ is the Worlds largest computer network . _______is/are a popular front end tool When LAN connected together ,it is called __________ .
Integrated Integrated Integrated system dynamic Symbolic Digital Services Digital networks. networks. network. None of the above. Ethernet visual basic MAN Internet power builder WAN Bits Software Mail transmission protocol Transmission protocol ARPANET SQL * plus GAN Packets Simple Mail transfer protocol Hyper text None of the above. all of the above None of the above. None of the above.
C B D B C
Data is broken into small unit called __________ . Cells System modulation SMTP stands for __________ . transfer protocol The __________ protocol is a network protocol to be Transfer Protocol built for the World Wide Web . The computer which can receive data from other computers on the network and print it is _______ The hardware and the software requirements together form the_____ ATM, Asynchronous transfer mode is a __________ technology. __________ is designed telephone system
None of the above. None of the above.
C C
File server platform MAN and WAN ISDN
Printer server configuration
Receiver package
None of the above. system
B A
LAN and WAN LAN and MAN ATM Internet
LAN WAN and MAN B Intranet A
Expansion of WBT is ______________ _________ connects LANs. Collection of instruction is called a _____ Combination of alphabetic and numeric data is called _____ data
Web based Training Bridges procedure alpha numeric
Web based Technology Routers batch alpha beta cost, performance their ratio output multithreading compiler processor
Web based Transport Protocol command
Web based Transaction Repeaters program
A B D A
numerous alpha number and alpha size, performance, cost feed multiplexing converter ram non-impact desktop printers
space occupied, Computers can be classified based on price, no. of ______,______and _______ users allowed _______ is responsible for feeding data into the computer input _______ is the capability of the o/s to run numerous multiprocessing applications simultaneously _______ involves conversion of raw data into some interpreter meaningful information _______ is responsible for obtaining the processed data from the computer input _______ printers use light to produce the dots needed to form pages of characters
input, output, performance ratios write multitasking process output
C A D D D
impact printers
drum printers
thermal printers
C
Hardware components in a computer are _____,____,_____,______ _______ software are programs that are complex and can be developed or purchased _______ is a set of special instructions used to communicate effectively with the computer batch _______ converts a high level language into machine language processor _______ translates assembly language program into compiler machine language instructions
control program, operating system, interpreter, bootstrap, kernel, assembler, shell compiler application operating system software protocols compiler interpreter
monitor, program, keyboard, bus windows 95 software's assembler assembler