Beruflich Dokumente
Kultur Dokumente
QUESTIONS
TALLY
The ------ key can be used to select an existing
company from list of companies.
Import and Export of data between Tally and other
programs is possible only through ---------- Program.
The re-order point is the inventory quantity that
trigger a stock replishment activity.
A created company's detail can be modified through
keys
A/An ------------- is the official notice that the firm
sends to its customers to advise then to the amount
of money that is owed.
In tally,all masters have ________main options
In tally,to create a new column in balance sheet
press _______
In tally,the use of group behaves like a sub-ledger,
option is that we can summarize many ledger
accounts into one line statements
In tally, we can alter ledger details using either
single or multiple modes but not alble to delete a
ledger from multiple modes.
In tally,a group company is marked with an
______________
F1
ALT+F1
Tally ODBC
Tally IMP
TRUE
false
F3
ALT+F3
Invoice
Two
Bill
Three
Ctrl+C
Alt+C
TRUE
FALSE
TRUE
FALSE
Puchasing and
Puchasing and
Accounts payable Receiving
Single
Cash Flow
Statements
Multiple
Fund Flow
Statements
Two
Three
Alt+D
Create
Information
Alt+X
F4
Alt+P
F5
Ctrl+P
Tally Audit
Statistics
Bin
Data
True
False
Alter Information
Enterprise Data
- Information
FALSE
data element
data record
FALSE
TRUE
Display stock
Open
valuation method Calculator
Ledgers
Groups
Personal
Manual
Nominal
Automatic
Balance Sheet
Journal
Stock Journal
Filled
Receipt
11
16
FALSE
TRUE
management by
objective
management
by exception
F4
F5
Main Location
Primary
True
False
Ledgers
Reports
0 to 9
1 to 100
Supplier
Suspense
Report
Output
F2
F4
Net Transactions
Closing Balance
True
False
Alt + f6 function
key
Purchases
1-4-1996 to
31-3-1997
False
Vertical
Primary
Security
mechanism
Main location
F5
F7
a name
an identity
Sales return
Company
creation
Purchase return
Stock items
units
Trial Balance
Daybook
F7
Changes in
transactions or
vouchers
Alt + F7
Ledger a/c
Changes in
Ledger Masters
2
F9
F10
Balance sheet
TRUE
FALSE
F3
Ctrl+F3
TRUE
Main location
FALSE
Primary
Tally.imp
Tally.ini
FALSE
128
228
Ledger
Accounts
Groups
Administrator
Owner
One company to
another company
created withon
Tally Package
Other programs
- a spreadsheet
or a database
file.
Inventory
subsidiary.
Cash
disbursements.
Will produce a
more accurate
set of financial
statements.
data to be
transferred to
memory
Tally supports Importing of data from ---------------In an accounting information system, which of the
following types of computer files most likely would
be a master file?
FUNDAMENTALS OF COMPUTER
Inefficient usage of excess computer equipment can Contingency
be controlled by
Planning
Which of the following is not the component of a
CPU
NIC Card
System
feasibility report
VSAT
Record Count
Identification
Number
Writing on a hard
board
Printed output
Voice activated
Voice answer
broadcasting
back
Validity check
Coloured spots
File Name
Printer
System Logs
Boundary
protection
Pixels
Identification
number
Storage device
Physical
Security
Electrically
charged ink
An ink pen
Use only
unremovable
Restrict
physical access media
A pen
Paper
A cartridge
A drum
Centralised
function for PC
Separation of
acquisition
duties
A print head
A laser beam
Volume
Size
Read
Write
Magnetic tape
PAN drive
Serial access
Magnetic tape is a...?
medium
Hard disks can have a storage capacity in the region
of...?
1.44MB
Which storage device has the largest capacity in
Mb?
A CD-ROM
Random access
medium
A floppy disk
By magnet
objects
A CD-ROM
By a sunny
window
20 GB
A floppy disk
ROM chips
RAM chips
RAM chips
ROM chips
ALU
Registers
CPUs
Registers
0 bits
1 bit
ROM chips
Systems
Network software software and
and security
application
software
software
Personal
Supercomputer
computer
Notebook
computers
First
generation
Second
generation
Second
generation
Second
generation
Second
generation
Supercompute
rs
Second
generation
Specification,
Design, and
Testing
Oracle
Programming,
Design, and
Testing
ACL
First generation
Third generation
Third generation
Third generation
DATABASES
no
1 false
true
false
true
false
true
to determine
the audit
The first step for developing CAAT is_________
objective
Using the open database connectivity feature in ACL can bring the
is ______________
data directly
Computer Assisted Audited Technique involves the
use of computers through "Black Box Approach"
White Box Approach necessary involves expert
knowledge on the part of Auditor
false
review and
evaluate the
types of data
can bring the
data indirectly
True
False
True
False
change in the
method of
recording
accounting
transaction
use of
accounting
codes
documents
driven approach
hardware and
software
configuration
risk driven
approach
processing
options, file data
structure
true
false
true
false
the source of
data available
to the audit
organization
source of data
for material
planing
true
false
the of by all
concerned
scheduled jobs
providing access
to computer to
all organization
personnel
false
open/closed
false
false
false
manage
hardware &
software
resources
false
false
with audit
departments
with production
departments
true
false
true
false
true
false
true
false
true
false
planning
language
false
false
table files
file-o-man
to have a
complete
picture of a
system
decentralized
picture of a
system
true
false
true
false
back-ups
retrieval
true
false
true
false
true
false
true
false
immediately
false
Benford
false
blocks of nos. to
consecutive nos. the primary
or alphabets to
attribute of the
entities
the entity
grouping,
transaction
true
regrouping,
events
false
true
false
true
false
true
false
true
false
incremental
design and
enlarge activity
interactive
data
extraction and
analysis
false
true
false
true
false
false
bouncing ball
bottom up tests
top-down tests
yes
no
read data on
client's file
provide
information to
the audit
deleted, hard
false
system
analysis
software
system
advanced
software
false
no
false
false
manipulates,
real
create, false
true
yes
false
no
can be very
Modeling is a variety of software which
powerful
________________
analytical tool
On line testing can be targeted for specific functions
yes
carried out by programs
identifies
program code
which may be
provides detailed there for
information of
fraudulent
machine uses
reason
IDEA
ACL
true
false
fictitious data
applied against
the client
program
comparison of
source version
of a
programmed
false
false
true
specification,
program
false
identifying
erroneous code
identifying
ineffective code
true
false
true
false
authentication
of information
support
job control
language
job connectivity
language
yes
no
JCL means_________________
Audit should be periodically analyzed to detect any
control weakness of the system
file, hardware
false
false
package
computer
p[program for
performing a
variety of data
processing
function
mathematical
concept
prepared by the
auditor
prepared by the
entity
true
false
file
access/organizati statistical/arithm
ons
etic operation
true
false
true
false
examining the
quality of system carrying
process
analytical review
Wide access to
Can extract and
various data base analyse data
ACL
A sample of
transactions
integer
number
true
false
actions
events
report
macro
form
expression
elements
calculator
code builder
action list
macro list
conditions
action
tabular
columnar
tabular
columnar
create report
columnar and
tabular
link report
stable and
unstable
true
false
IDEA
A utility software
programme
Analytical
Tests of details of review
procedures
transactions
Action
Macros
Procedures
create fields
add chart
primary key
label wizard
alternate key
chart wizard
start header
group header
report footer
page footer
for ordering
records
for updating
records
condition
VB Modules
group
reports
add
append
report
macro sheet
true
RAD
false
RAP
SysCmd
MsgBox
OLE
DDE
object linking
on line
and embedding execution
OLE object
OLE client
linked
exe
embedded
DLL
form wizard
report wizard
static file
static html
append
add
dollars
rupees
unbound object
bound object
display as icon
display
create html
new
startup
home
bullet
DBMS
command
RDBMS
data group
data collection
new blank
database dialog
new dialog box box
255
64000
AutoNumber
true
false
inner join
outer join
primary key
not null
cascade delete
related records
cascade change
related records
columnar
tabular
table or tables
query or queries
true
false
property field
crosstab
queries
action queries
field property
row/column
queries
row/column
queries
inner join
true
new form dialog
box
self join
false
form create
dialog box
summary
sum
change
properties
properties
included form
sub form
Record
Navigation
Record
Operations
columnar form
tabular form
filtering
ordering
filter
sorts
filter by
selection
filter by form
*
true
bound control
$
false
unbound
control
button group
option group
bound
unbound
CURRDATE()
text box
TODAY()
list box
pivot table
columnar form
filter by input
button wizard
control wizard
ram*
true
ram??
false
report
form
autoreport
chart
report
label
true
false
true
false
60,000
255
true
false
true
false
true
false
table
query
table
form
true
false
true
false
Insert
Records
true
false
true
false
alternate keys
true
true
composite keys
false
false
true
false
true
true
false
false
null
not null
true
false
true
false
true
false
true
pie
false
bar
true
false
true
true
update query
false
false
select query
true
true
false
false
inner join
outer join
true
true
true
freestanding
false
false
false
embedded
true
false
true
false
true
true
the first field of
the table
false
false
the last field of
the table
forms
reports
true
false
delete
insert
true
true
false
false
use hyperlink
use import
true
true
false
false
true
false
true
false
true
false
true
false
true
false
&
false
detail
false
false
false
false
false
list
false
action language
structured query
language
report
true
form
false
group
record
data
property
true
false
true
false
sub forms
child forms
graphs
chart
number
primary key
pivot
create
filters
form
queries
bound
list box
true
combo box
false
form name
tabular form
control
chart form
sub forms
tabular form
calculated
calculated
bound
unbound
sub form
auto form
set relation
option, toggle
and command
buttons
connect
command
button, check
and list boxes
filter by form
filter by report
form
report
clipboard
file
search
sort
What is a database?
A way to analyse
and manipulate
numerical
information
A tool to
produce high
quality
documents
Information
about certain
programs
It contains all
the data about
one specific
item
An RDBMS is a
remote DBMS
storing data
offline at a
separate site
relative DBMS
Key verification
backing up data
regularly
Computer
sequence
checks
What is a report?
Reports allow
users to extract
information as
hard copy
(printed output)
Reports provide
a very flexible
way of creating
and editing
documents
Extracting and
analysing data
Spreadsheets
make data easy
to analyse
Compilers,
interpreters,
editors
Network
software,
backup systems
DEFAULT and
Which of the following constraints can be used to
NOT NULL
enforce the uniqueness of rows in a table?
constraints
Which of the following commands is used to change
the structure of table?
CHANGE TABLE
You are creating a client application that calls
ActiveX DLLs. Which of the following properties of
the Err object provides the name of a component
that sends an error back to the client application?
This database holds personal information. The user
can help to keep it confidential by
If the database holds customer names and
addresses, personalised letters can be created
automatically using
Application software suited to storing the survey
information obtained in the table would be
The characters * and ? are sometimes used in
search criteria as
Which of the following field types will generate the
primary key automatically?
Number
FOREIGN KEY
constraints
MODIFY TABLE
Description
keeping a
using a password backup copy
Graphics
bookmarks
operators
Auto Primary
Auto ID
records in a
dynaset are
consistent with
the underlying
tables.
related tables in
a database are
consistent with
one another.
foreign key.
the primary key
of both related
tables.
One-to-one
One-to-many
EmployeeID
CompanyID
Referential
integrity
How would you delete a relationship between tables Double click the
in the Relationships window?
Relationship line
Right-click the
Relationship
line, then select
Delete from the
shortcut menu
That some of
the data is not
viewable
They cannot be
text fields
Nothing, Access
ignores the
attempted
command.
The customers
ID is deleted
from the
Customers
table.
The subform is
displayed in
Datasheet view.
A one-to-many
relationship
between teams
and players
A one-to-many
relationship
between teams
and coaches
Either table at
any time
prompt, title bar
text, icon.
The Customers
table only when
there are Loan
records
associated with
that customer
prompt, icon,
title bar text.
Dim CreateList.
Sub CreateList.
A check box
enables the form
user to choose
from one of
several existing
entries.
must be set for
one word.
A text field
enables the
form user to
choose from one
of several
existing entries.
must be set for
multiple words.
store data in
tables.
relationships.
figures.
multiuser
database
application
multiuser
database
application
Structured
Sequential Query Question
Language (SQL) Language (SQL)
Database
Database
Management
Modeling System System
Jet
SQL Server
The user
The database
application
the database
application(s)
interact(s) with
the DBMS
the DBMS
accesses the
database data
creates queries
creates form
the user
all the users'
data is in one
place
the database
application
it reduces data
duplication
holds metadata
from existing
data
as a new
systems
development
project
as a new
systems
development
project
as a new
systems
development
project
from existing
data
normalization
normalization
data marts
normalization
data marts
file managers
entities in a
column vary as
to kind
normalization
hierarchical
models
the order of the
columns is
important
table
relation
record
field
record
field
record
field
composite key
Insertion
anomaly
primary key
assess the
existing tables'
structure and
content
design the
database
structure
are supplied by
several wellestablished
manufacturers
were essentially
killed off by MS
Access
In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to
identify particular rows in a is___ .
A combination of two or more columns used to
identify particular rows in a relation is________ .
A determinant that determines all the other
columns in a relation is______ .
Update anomaly
They use
sophisticated
mathematical
techniques.
Their report
delivery is more
difficult than
report delivery
for reporting
systems.
inconsistent
data
inconsistent
data
data warehouse
data are not
stored in tables.
data warehouse
databases do
not have
metadata.
Form
Forms and
reports
Table
Queries and
tables
It will be easier
for the user to
upgrade it if the
objects and
tables are in one
database.
It will be easier
for the user to
upgrade it if the
objects are in
one database
and the tables in
another.
An application
may consist of
The Link Tables
multiple
command can be databases, each
used to associate with multiple
the tables in one objects, linked
database with
to yet another
the objects in
database
Which of the following statements regarding Access another
containing only
applications is NOT true?
database.
tables.
Which of the following brings a copy of the table
into the current database and does not maintain a
tie to the original table?
Import
Link
It contains more
than one table
It contains
tables, reports,
queries, and
forms
Menu Wizard
Build Menu
create backups
for mission
centralize the
critical corporate manageability of
data.
data collection.
Digital Sign
Digital
Certificate
Hash Function
Digital Signature
Hash Function
Hash Value
Institutional
Overhead and
Subscriber
The Costs of Digital Signature consists mainly of the Relying Party
following
Cost
Certification
CA stands for ________________
Authority
Subscriber
Relying Party
Cost
Certified
Authority
True
False
True
False
Developer
Server Certificate Certificate
Developer
Server Certificate Certificate
Private
Certificate
Repositories
Evidence,
Ceremony,
Approval
Approval,
Evidence
True
False
True
False
Certificate
Revocation List
Certificate
Resource List
Private Key,
Subscriber
Public key,
Recipient
Internal Format
File
External Format
File
ANSI
UN/EBCDIC
interchange sets
Embedded cards
Digital Cash
Billboards and
Junk Mail
Online Catalog
and Billboards
EDI
True
False
Login_Id and
Password
Global Network
Private Network
Passive or pullActive or push
based
based advertising advertising
Broadcast
Junk mail
Bulk-mail
Endorsement
Error checking
Data Integration
Competitive
espionage
Corporate
espionage
A list of
What would you NOT be looking for when spying on competitors
a competitor?
clients
single-user
An online drugstore such as Drugstore.com is an
database
example of_______
application
Contact
numbers of the
management
group
multi-user
database
application
Replying
promptly
Keeping
messages short
Removable
drives that can
be locked up at
night provide
adequate
security when
the
confidentiality of
data is the
primary risk.
Message
authentication in
EDI systems
performs the
same function
as segregation
of duties in
other
information
systems.
text import
wizard
convert text to
columns wizard
cell reference
row reference
text files
Lotus 1-2-3
serial values
domain values
=today()
=date()
dollar sign
AutoSum
AutoFill
variables
arguments
text
logical
concatenate
pmt
countif
vlookup
pmt
average
sum
page setup
print area
autoformat
AutoFill
bordering
formatting
page setup
print area
filtering
searching
all option
blanks
www.ency.in
www.eb.com
URL
internal network
DNS
network of
network
application layer
transport layer
finger service
ping service
FTP
TELNET
browser
CompuServe
internet dialer
spy mosaic
gophering
gopherspace
Alta vista
open text
finger server
list
ftp server
directories
no
maximum of five
middle
lower
hotlist
directory
search,index
search
infoseek
directory
index
search,menu
search
excite
netshark
lynx
Microsoft
cello
mosaic
internet
Usenet
Higher text
transfer protocol
finger service
Hyper text
transmission
port
iccp
ftp
yahoo
ftp
transmission
control
transfer control
protocol/internet
protocol/internet protocol
one
two
ftp servers
the internet
adapter
domain name
servers
the internet
administration
browser
protocol
universal
________ is used to link pages in the world wide web resource locator
uniform
resource locator
frequent asked
query
frequently asked
question
SLIP,PPP
TCP,IP
connection
response
windows sockets
internets relay
chat
lynx,minx
world wide web
server
netscape,ie
world wide web
client
glossary
index
very organised
network
integration and
communication
application
university of
cleveland,clevel
and freenet
protocols
IP address
search
engines,directori
es
ftp and finger
allsrc,winsocks
allsrc
wais,allsrc
waisman
hot links
hyper text
images
applets
graphics,videos,a programms,ima
udio
ges,text
first page
home page
global network
news
yahoo service
global networks
navigator
electronic mail
Netscape page
starter
site,netscape
page wizard
newsgroup
telnet
Lycos catalog
point review
apple link
bitnet
computer related
abbreviations
biographical
and acronym
information
encyclopedia
Britannica
on-line
reference works
search engines
Graphical
interpreter
formatting
web directories
Graphical
interchange
Format
Joint Pictures
Expert Group
mails
yahoo,infoseek,al
tavista
Jumbled pictures
expert graph
documents
netscape,ie,lynx
web pages
image only
PLSQL
betalanguage
text only
SQL
alphalanguage
palm is not
eatable
SGML Processor
COLOR
Common
graphical
Interface
Interface
Browser
Server
web sites
images
Internet
equipment
training faculty
International
Engineering
trainers and
faculty
MS Internet
Explorer and
Mosaic
text
Netscape
Navigator and
Mosaic
data from a
database
hyperlink
hypertext
in random order
in sequential
order
first
start
mail servers,mail
clients and
The mail we send has a mailing address and most of alternate
them correspond to_____,_____ and
services
Which of the following is not supported by internet
<center>
explorer _______________
communication
generated
CGI stands for ____________
information
Host name indicates the domain name of the web
________
Server
The internet is also called as _______________
arpanet
mail
vendors,mail
identification
and password
<font size=n>
common
gateway
interface
LAN
Client
the net
peer-to-peer
connectivity
data
parcel
scripting,parsing news,cooking
and compiling
and fine arts
nt,windows95,ie, mosaic,gopher,e
winzip
udora,trumpnet
dnet
arpanet
defensive
administrative
rank
administration
network
start
milnet,smaller
arpanet
education,resear
ch
united states and
UK
dedicated and
registered
projects
administration
begin
mailnet,inet
music and
dance
england,norway
server
client
client
stand-alone
network
topology
network card
detailed
transaction
explanation
data terminal
equipment
application layer
physical layer
point to point
network and
broadcast
channel network
packet
switching,store
and forward
network
file access
anonymous ftp
PAN,NAN,AAN
VAN
LAN
analog
Data type
definition
Moralize/demoral
ize
KAN,RAN,VAN
MAN
MAN
digital
Define type of
data
Modulation/dem
odulation
Mapping
Modulation
Dedicated
Satellite link and access and dial
digital signals
up access
Standard long
internet protocol
Stream line
internet protocol
Prime prolonged
protocol
Point to point
protocol
sending
storing data on a information to a
disk drive
host computer
Bandwidth
Speed
Find
Save
Relying Party
Private Key
Public Key
Electronic
Commerce
Not True
Formal Legal
Requirements
Affirmative Act
Efficiency
Signer
Authentication
Document
Authentication
Not True
Not False
Digital signature
Public Key
Private Key
Public Key
Private Key
Public Key
Private Key
Public Key
Decryption
Cipher
Using data
encryption.
Performing
validity checks.
Unaltered in
transmission.
Not intercepted
en route.
Collision.
Business-toBusiness
Data entry
errors.
Business-toBackend
Billboard
On-line Catalog
Customer
Endorsements
Billboard
Intermediaries
portals
Post purchase
interaction
Purchase
consummation
Billboard model
of marketing
Online catalog
Online Catalog
Shopping cart
EDI For
Administration,
Commerce and
Transaction
EDI For
Administration,
Consumer and
Transport
EDI
TCP/IP
Compiler
Interpreter
Business-toBusiness
Business-toConsumer
E-cash means______________________
Business
Process
Perspective
Micro
Transactions
Communication
Perspective
Microcash
Decryption
SSL
1
data table
filtered table
category
series or rank
category
column chart
bar chart
column chart
bar chart
column chart
column chart
spaces
bar chart
bar chart
wild card
characters
excel97
internet explorer
bar chart
true
false
and
or
3-dimensions
4-dimensions
true
false
Data table
Pivot table
It is also called as
high-low-close
It shows trends
chart
over time
Scenario
manager
Goal seek
Scenario
manager
Goal seek
Pivot table
Workbook
Worksheet
Performing
database
operations
Performing
Spreadsheets are useful for _______________
calculations.
Which one of the following is NOT the component of
the pivot table ?
Column field
Excel allows upto ______ levels of sorting
two
Filtering rearranges a list to display the required
records
true
The stacked bar graphs can be represented in
_____________
3-dimensions
The ______ generates a summarised report in
tabular form in an interactive manner
Data table
Row field.
three
false
4-dimensions
Pivot table
It displays the
data series one
on top of the
other.
It is useful when
several
components are
changing and
the user is
interested in the
sum of the
components.
Standard
deviation
records
It is a tool that
provides a way
to view and
It is a tool for
compare the
summarizing and results of all the
analyzing the
different
data records in
variations
Which two of the following statements related to
an interactive
together on the
pivot table are TRUE ?
manner.
worksheet
Which one of the following is NOT a What-if analysis
Scenario
tool ?
Goal seek.
manager
The _________ wizard separates contents in a cell
into different cells
A spreadsheet is a grid of rows and columns and is
called as a ________
Pick out the window that is not a form of excel
___________
On an Excel sheet the active cell is indicated by
Cell A4 =2 and A5 = 4. You select both cells and
drag the fill handle down to A8. The contents of
cells A6, A7, and A8 are _____.
text import
wizard
convert text to
columns wizard
worksheet
application
window
A dark wide
border
workbook
document
window
8,16,32
2,4,2
A dotted border
graphical
Address
CTRL + ENTER
array.
function.
100 (201)555-1212.
Cell references
Functions
B5*B6
C3/D4
E12
It is surrounded
by a heavy
border.
It is blinking.
By clicking in a
different cell
By using the
arrow keys to
move to a
different cell
Which of the following would you use to change the The Standard
font size of a cell in Excel?
toolbar
the New
The command that will save the current workbook
command on the
with a different file type is:
File menu.
The command that will print an Excel workbook is
found on the ____________ menu.
File
In the Save As and Open dialog boxes, the
___________ view shows the file size as well as the
date and time a file was last modified.
Preview
Which of the following commands will automatically
adjust cell references in formulas?
Insert
Which of the following commands will remove cells,
rows, or columns from a worksheet?
Clear
The Formatting
toolbar
the Save
command on
the File menu.
Edit
Details
Delete
Delete
Orientation
(portrait or
landscape)
Headers and
footers
Options
Page Setup
worksheet.
copy range.
paste range.
The Duplicate
command
range.
6 D12, G25
destination
range.
destination
range.
The Copy
command
absolute
relative
B4
$B4
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
The Move
command
The Cut
command
edit cells.
the Format
Painter
subtracting the
adding the
earlier date from earlier date to
the later one.
the later one.
the F4 key.
the F2 key.
03-Apr
Aug-31
0.75
a variable.
B1.G10
AVERAGE
COUNT
Combination
Line
Once a column
chart is chosen
it cannot be
changed to a
bar chart.
Use tables
Create four
separate files
Fill Down
Data | Sort
Calculate data
Tools | Sort
Analyse data
To print just part of a sheet, you would select what click the Print
you want to print and _____ .
button
The formula that will add the value of cell D4 to the
value of C2 and then multiply by the value in B2 is
_____.
(D4+C2)*B2
Which of the functions is not valid for performing
addition
D4+C2*B2
=A3SUM:B3SUM
0 :C3SUM
landscape
ZA1
CERN
ECRN
yahoo and
infoseek
news
groups,yahoo
and infoseek
bulletin board
system
small
bulletin
boards,mails call
and wireless
system
business
broadcasting
system
large
windows sockets
Yahoo
cache
Photography
Digital Signature
Key
Lock
User-id
Password
Penetration
Retrieval
Acts
Regulations
Spoofing
Loss
Imposting
Threat
Income - tax
authorities
Malicious software.
Utility
Pirated software
Hoffman
Etrade.com
Amazon .com
Automated Tailor
Machine
Any Time Money
Acts
Regulations
Router
Gateway
LAN
WAN
hypertext
tracing program
A NIC is considered as
hyper terminal
tracing program
National
Informatics
Center
Only Computers
Network
Interface card
Can not
computers
Concentrates
connectivity
Bridges and
Repeaters.
bits
Combines
connectivity of a
hub with the
traffic regulation
of a bridge
Two or more
networks
frames
Physical Layer
gateway
Two
Data-Link Layer
RG7U
Coaxial cable
Physical address
Logical address
A cable
Hub
It gets destroyed
bit by bit.
Wired
Technology
Which is not one of the recognized IEEE sub layers? Physical Layer
The most preferred number system to represent a IP
address is
Binary
A MAC address is of
48 Bits
Protocol is
software that
facilitates
a list of rules for
connection to the transferring data
internet
over a network
Novell PC
Client
Physiology
Bus
Linear
Parallel
Topology
Star
Parallel
Circular
Ring
Bus
Ring
Bus
Star
Bus
Ring
Bus
Network Layer
Transport Layer
Ethernet, token
ring, DecNET
bps
bps
Ethernet, token
ring, FDDI
kbps
Kbps
measured in
bytes per
usually higher
than LAN speeds second
CD-ROM drive
a modem
must use
electronic mail
key gateway
interface
uniform
resource locator
a Novell Interface
An NIC
Controller
Accessing the Internet from a typical home PC
requires the use of
CD-ROM drive
The most widely used network operating system on
PC LANs is
Linux
used to control a
printer
a modem
Novell Netware
have to do with
compression of
graphics and
video
have to do with
Web pages
A multiplexer is a form of
Printer
modem
An ISP
provides access
to the Internet
is a CPU register
FTP is
used to send
email
Telnet
used to send
email
A firewall is
used to protect a
computer room
from fires and
floods
a form of virus
A proxy server is
a backup server
A search engine is
To look for information about interest areas on the
internet, the user should use a
hardware
an email server
IR system for
the Internet
scanner
CD-ROM
provides access
to the Internet
is a CPU register
An ISP
used to browse
the Web
uses wireless
communication
medium
FTP is
used to send
email
used to browse
the Web
Telnet
used to send
email
uses telephone
lines
The layers
cannot
Which of the following is a true statement about the communicate
OSI model layers?
with one another.
It is one large
network.
Password
cracking
IP flood
System intrusion
Flood a Web
server with
requests
hack
packet
firewall
router
a backup server
an email server
Apply security
patches
Update virus
definitions
Use of
Use of identifiers passwords
by attaching to
an e-mail.
through an FTP
port.
Phone
A Trojan horse
Adware
Modems
Protocols
cookies and
Trojan horses.
Trojan horses
and key loggers.
An attack on a
Which of the following would NOT be considered an system for
example of cyber terrorism?
personal gain
Which of the following would be a form of cyber
Economic
terrorism?
damage
Crashing the
stock market, as
in the 1930s
An attack with
the purpose of
gaining publicity
Disruption in
communication
Shutdown of
military security
systems
limit access to
set its prices very computer
high
owners only
Yahoo People
People Search
Search
Name of your
bank
Date of birth
Virus
Shill bidding
Fraud
invest without
risk.
Phishing
cookies.
Encryption
Physical Security
controls
I only
II only
irc
ftp
HTML
Internet Explorer
Web query.
HTML document.
XML.
HTML.
using Internet
Explorer to view
a Web page that
is stored on the
hard drive on
your computer
updating the
values that are
obtained
through a Web
query
Hyperlink
Screensaver
BMP
GIF
Save it to a
floppy disk.
Write it down on
a piece of paper.
A system that uses the Internet for business-tobusiness interaction is called a(n):
extranet.
A block of text automatically added to the end of an
outgoing email is called
an attachment.
_________ refers to the use of Internet technologies
for placing telephone calls.
VoIP
Most client/server applications operate on a threetiered architecture consisting of which of the
following layers?
Desktop client,
application, and
database.
intranet.
a signature.
IPT
Desktop client,
software, and
hardware.
CD-ROM
File Transfer
Program
File Transmission
Protocol
So computers
can be
referenced by a
name
So IP addresses
can be shorter
45.1.1.1
paul.trigg@dom
ain.org.uk
Scientists in
Switzerland
International
Internet Relay
Relay of
Chat
Characters
It will be waiting
for you to collect
It will be deleted it
Receiving
messages
automatically
from anyone in
the group
People
discussing a
topic of interest
globally
autolayouts and
presentation
templates
circles
points
square
image
eof,false
properties
window
movelast,true
form layout
window
bof,false
movefirst,true
value()
int()
circle
rectangle
true
false
true
false
fontcolor
underline,true
color
fontunderline,tru
e
textsize
one- millionth of
a second
size
one-hundredth
of a second
count
form layout
window
recordcount
prperties
window
title
prompt
msgbox()
textbox
opensnapshot
activate
opaque
blue
red
red
properties
window
properties
window
green
form layout
window
form layout
window
change
child
lostfocus
parent
true
false
load
unload
text
name
opendatabase
dbengine
visible
dim
.ctx
.ctl
Validate
On Error GoTo
linelabel
Validation
On Error GoTo
Inline
UpdateControls
Cancel
To deactivate the Form UnLoad event, you make the parameter to a
following change in the function definiton:
non-zero value
PaintPicture
Cancel
parameter to 0
Consists of
several Programs
Form window,
standard or code
module
Consists of
several
Applications
Project window,
view code
window
Place code in
Place code in the the Unload
Terminate event event
AutoRedraw =
False
Msgbox
err.number &
err.text
To help in
To display images creating a
to the user
ToolBar
FreeFile
GetFileNum
Retrieve
Get
Common
messages passed
to Windows
Open dialog box
Caption
Click and
KeyPress
Visible
Click, KeyUp and
KeyDown
Ascii Format
Binary Format
CurrentX and
CurrentY
ScaleLeft and
ScaleTop
Property Assign
Min
Max
Shell
Substr
Can be different
at times
Background color
property
Caption property
The Open
method
A warning query
icon
The Exec
method
A critical
message icon
statement.
variable.
MsgBox
statement
returns a value,
while the
InputBox function
does not.
InputBox
function returns
a value, while
the MsgBox
statement does
not.
Data cannot be
entered into the
form.
Unload
QueryUnload
clipping tool
cropping tool
color palette
color box
ascent
tricolor scheme
10
28
column
bar
images
circular
radar
entity
Microsoft
PowerPoint launches an OLE-compatible application organization
chart
called
data point
the organization
When the user double-clicks on an organization
chart is
chart object in PowerPoint
expanded
The _____ are used for selecting, editing and viewing
objects in the chart
box tools
the chart is
made available
for editing
general purpose
tools
used to mange
organizational
chart
clip art
accessed only
by manager
turned on
turned off
once
twice
two
four
native tool
draw tool
autolayouts
handlayouts
zoom
reduce/enlarge
importing
exporting
Microsoft excel
.ppt(PowerPoint)
auto shapes
.rtf(rich text
format)
nine
only one
.rtf(rich text
format)
not displayed
during the slide
show
The hidden slide is
____ effect is used to introduce a slide during a slide DTS(digital track
show
sound)
A _____ is a special effect that determines how the
build
objects appear on the slide
The notes page is formatted based on the
notes master
Pick the odd man out of the following
outline view
When a new presentation is opened ,powerpoint
creates slides that have a width of _____ and a
height of ______ with the landscape orientation
The default orientation for notes ,handouts and
outlines is ____ orientation
Build effect is also called as ______
Graphics for web pages are automatically stored in
____ format
A _______ is used to jump to any slide in the
presentation
The ______ language has been incorporated into
PowerPoint
In PowerPoint _____ is a series of commands that are
executed in sequence
The macro will be activated
.wmf(windows
metafile)
displayed only
during the slide
show
3D(3 dimension)
transition
slide master
slide view
15 inches,10
inches
10 inches,7.5
inches
portrait
animation
landscape
view show
gif
jpeg
hyperlink
visual c++
hypertext
visual basic for
application
macro
while creating
a .exe file
batch file
during slide
transition
virus checkers
spell checkers
in outline view,
drag the slide
icon to a new
location
in slide sorter
view, drag the
slide to a new
location
transition means
applying special
effects to the
crossover
between the
slides
in outline view,
user can see the
miniatures of all
with notes pages slides in a
view user can
presentation,
prepare speaker complete with
notes and
text and
handouts
graphics
transition means
applying special
effects to the
crossover
between the
slides
slide layout
customize
data to be
graphed resides
in a datasheet
window
by default,
doughnut chart
is displayed
based on the
data in the
datasheet
Excel is started
What happens when you double click a blank graph so that you can
placeholder in a PowerPoint presentation?
create a chart.
spell checker
12
twice
text, hypertext
and Power Point.
Line color
A popup box
prompts you for
an existing Excel
chart to insert.
always taken
from the first row
of data in the
datasheet.
always taken
from the first
column of data
in the
datasheet.
Side-by-side
column
Stacked column
It automatically
displays in Slide
view.
A dialog box is
displayed
allowing you to
enter the name
of the Excel
worksheet that
should be linked
What happens when you click the Datasheet button to the PowerPoint
on the Microsoft Graph toolbar?
presentation.
A dialog box is
displayed
allowing you to
enter the name
of the Excel
worksheet that
should be
embedded in
the PowerPoint
presentation.
The chart is
deleted.
The chart is
deleted.
The chart is
selected.
The chart is
selected.
The advanced
timeline shows
the sequence in
which objects will
Which of the following best describes the
appear on the
information that appears on the advanced timeline? slide.
Which of the following objects can contain custom
animation effects?
Clips
What type of program allows an object within an
image to be edited without affecting other objects?
Which of the following animation effects can be
added to a slide?
Moderate
what objects do
after they
appear on a
slide.
The advanced
timeline shows
the duration of
the effect
applied to each
object.
Organization
charts
Paint program
Draw program
Fly in
From top
Once data is
Once data is
entered it cannot entered it can
be changed.
be changed.
OLTP.
OLAP.
Drive1.Drive=Dir Dir1.Path =
1.Path
Drive1.Drive
messagebox()
message()
Dir1.Path=File1.P Dir1.Path =
ath
Drive1.Drive
openrecordset
opendatabase
update
append
append
update
movenext
movelast
Cancel
parameter to a
non-zero value
Cancel
parameter to 0
Word 2000
Office 2000
click-n-type
double click
cut
shift+end and
shift+home
web layout,
printlayout
shift+left and
shift+right
normal layout,
web layout
templates
inbox assistant
Tool Tip
marginal stop
page up keys
only
center
model
decrease indent
control tool box
control box
1
printer setup
from the file
menu
border
shading
ctrl+a
ctrl+a
Del
Del
CTRL+SHIFT+F
CTRL+O
ctrl+shift+f
ctrl+o
Excel
Access
1
Valid Signs
Transaction type
VLOOKUP
DDE
OLE
Analysis
translates
program code of
a high level
language to
machine code
Analysis is the
loading of
programs that
perform routines
to control
peripheral
devices
Inputs, outputs,
file design
What areas need to be considered in the SOFTWARE Only hardware
hardware, and
design process?
and software
software
To execute any
What is the function of systems software?
To collect data
programs
Deleted from the Copied from the
Formatting a disk results in all the data being...?
disk
disk
Users operate
the manual
system and
computer system
at the same time
The new system
is introduced
alongside the
existing system
Instructions and
technical
documentation
For technical
support
Users operate
the computer
system from a
given date
The new system
is introduced
and users start
operating it
Log files and
temporary files
To enable any
printer to be
connected to
the network
Operating
systems and
system services
Magnetic tape
storage
Network
systems and
communication
services
CD-ROM
To maintain a
backup copy of
all the
information
To do a
particular task.
Data bus
Auto bus
FDDI
BAD
Data bus
Auto bus
Operating
system routines
Peripherals that that execute in
are connected to supervisor
a computer.
mode.
binary form
A gigabyte represents
were 7 bits
4 bits
More than 1000
mega bytes
32 registers
32 I/O devices
A parity bit is
the contents of these chips are lost when the
computer is switched off?
Clock speed is measured in
CISC machines
1000 kilobytes
RAM
baud
memory capacity
have fewer
instructions than
RISC machines
memory access
time
use more RAM
than RISC
machines
Computer is
Every data from the primary memory will be erased Power is switched improperly shut
if
off
down
a parallel
An RS-232 interface is
interface
a serial interface
For print quality you would expect best results from line printer
dot matrix
printer
ROM
is faster to
access than RAM is non-volatile
A UPS
increased the
storage capacity
of a computer
system
increases the
process speed
smart card
is a form of ATM
card
has more
storage capacity
than an ATM
card
CRT displays
LCD displays
Multiprogramming refers to
having several
programs in RAM
at the same time multitasking
Multitasking refers to
What are small high speed memory units used for
storing temporary results?
A good way to exchange information that changes
rapidly is through
having several
softwares
running at the
same time
ALU
Registers
brochures
magazines
multitasking
multitasking
an operating
system
multiprogrammi
ng
NORMAL
ONLINE LAYOUT
ctrl+m
ctrl+2
ctrl+v or ins
ctrl+c or ins
ctrl+2
ctrl+5
Text Box
Frame
Header and
Footer
Screen Tips
Chart
WordArt
Shading
remove all
picture bullets
dialog box
arrow bullet
dialog box
charts
WordArt
doc1
document1
thesaurus
hyphenation
shift+f7
thesaurus menu
first
second
tab
convert text to
table
end
convert data to
table
row
AutoCorrect
AutoFormat
Mail Merging
basic
Macro
visual basic
shift+f8
shift+f7
online layout
view
email client
outlook express
html
xml
internet
intranet
the field
separators in a
header source
and the data
source can not
be set as
paragraph
it is not possible
to change the
height of only
selected rows of
a table
auto format
option applies to
the entire table
and not only to
the selected
rows or columns
of a table
left
decimal
A new section is
created in order
to change
properties like
number of
columns
In order to type
a header from
the third page of
the document a
section break is
inserted after t
he third page
true
false
true
true
false
false
click -n-type
false
automatically
corrects common
With reference to auto correct which of the following typing, spelling
statements are false
errors
prohibits the
user from
renaming an
auto correct
entry
password
protected
document can
be opened
without
password can not password as
include spaces
read only
left
justified
a document file
can be inserted
in the current
document at
specified
position
true
false
true
false
true
false
Insert Mode
Print all
Enter
closing
Copy
tabbing
database
graphing
Creating and
editing
documents
To analyse
What is a Word Processor used for?
figures
What is a picture that is saved on a diskette and can
be pasted into a document?
subscript
What basic tools would you find in the Edit menu of Clear, replace
a word processor
and select
annotation
Spelling,
grammar and
autocorrect
Text at the
bottom of every
page
Numbers which
appear on every
page
Mouse, printer
and processing
system
keyboard?
Keyboard,
Mouse, monitor
and printer
clip-art file
10 point
2 inches.
to store a file on
the hard drive
to store a file on
a diskette
Spell Checker
Replace
To give the
original author a
chance to accept
suggested
changes from the
Which of the following statements would NOT be a person who
reason for showing suggested revisions in a Word
entered the
document without changing the original document? revisions
To give the
original author a
chance to reject
suggested
changes from
the person who
entered the
revisions
A red underline
A line appears
appears beneath
through text that text that is to be
is to be deleted. added.
Through the
Tools menu by
choosing Track
Changes
command
The Versions
command will
allow you to save
multiple versions
of a document,
including any
changes that
may have been
made to that
document.
The Versions
command will
allow you to
save only one
version of a
document,
including any
changes that
may have been
made to that
document.
The latest
version is
opened
automatically.
Grammar check
Word displays a
When opening and working with multiple versions of list of the dates
a document, how can you tell which is the most
and times each
recent version?
file was saved.
Various fields are added to a regular document to
create a special document called a form through the
____________ toolbar.
Fields
Which of the following types of fields CANNOT be
inserted into a form?
Check boxes
Tools
Toggle button
Comments
Comments
cannot be
cannot be edited. deleted.
Text at the
bottom of every
page
Numbers which
appear on every
page
Press tab.
Press Return.
text.
graphics.
header/footer.
bibliography.
Copy button
Paste button
Fault Finding
Bug Squashing
Insert
Tools
a section of text
where the first
letter of each
sentence is
a section of white lowercase and
text on a black
the rest are
background.
uppercase.
setting it in
larger type or
typing it all in
font size.
capital letters.
The reverse
technique means
to add dark text
on a light
background.
A pull quote is a
quotation taken
from (pulled)
from another
document.
The width of
each column
The height of
each column
6
One
Press Ctrl+Enter
Which of the following is NOT correct with respect to to create a page
page, column, and section breaks?
break.
10
Two
Press
Ctrl+Shift+Enter
to create a
column break.
2 inches
3 inches
Field
Record
Horizontal
Vertical
Duplicate Value
Combined Value
Cross Tabulate
Filter
Multiprocessing is
To help keep sensitive computer-based information
confidential, the user should
VLOOKUP()
Unusual
Strange
comparison of
exception testing data
True
False
True
False
Limit
Sequence
related to virtual
a form of ROM
reality
same as
same as
multiprogrammi
multitasking
ng
set up a
save the file
password
to calculate
numbers
to read from or
write
information to a
floppy disk
Uses Cobol
106 sec
uses Java
103 sec
a keypad
a mouse
data to be
transferred to
memory
data to be
transferred to or
from memory
data to be
transferred to
the stack
an instruction
that has been
decoded
an instruction
that has been
fetched from
memory
a scroll bar
Algorithm
Compiler
Parity Checking
To find where a file has been saved on disk, the user use the directory search each file
should
search tools
in turn
A series of instructions telling the computer how to
process data or files is defined as a
Network
Program
save copies of
the file with the
To ensure that data is not lost if a computer system same name on
fails, the user should
the system
Having a single CPU alternatively process tasks
Multiprocessing
entered from multiple terminals is called
The place in the CPU where the data and programs
are temporarily stored during processing is called
the
ROM
use different
filenames on the
system
Time sharing
RAM
Firmware
Word Processor
Firmware
Word Processor
Sequential
Operating
System
Tracks and
Sectors
Hashed
Character, field,
database
Valid character
check
ALU
Blocks and
Sectors
Database,
character,
record
Maintenance
diagnostic
program
Sound card.
CD-ROM
viewing an
Multimedia software can be most productively used encyclopaedia
for
CD-ROM.
replaced
To be effective a virus checker should be
regularly
Which one of the following software applications
would be the MOST appropriate for performing
numerical and statistical calculations?
Pictures
Dot matrix
creating the
plans for a
building design.
never updated
Database
Document
processor
make efficient
use of time
1024
duplication of
data
HTML
TCP/IP
access to the
internet is
quicker
a file name
a subdirectory
universal port
serial
up-line provider
service
the program
executable may
not allow it to be
uninstalled
data.
Graphical
representation of
logic
Purchase, sales,
receipt,
payments etc.
files can be
shared
documents.
Rules writte in
procedural
language
To fill the log
register
assist in
maintenance
speed up access
senior executive
support for IT.
IT management
lacks leadership.
input.
output.
The use of
computers to
design state-ofUsing computers
the-art, highto do
quality products. architecture.
specialist or
functional
Application
Service Provider
ensure the
filename is not
lost
detective
controls.
static hashing
B: (a) to (d)
preventive
controls
Interface
Turn the
computer off at
the power point.
detective
controls
organisational
controls
problem logging
unit testing
call lights
data testing
Peripheral
processors.
(b), (c), (d)
Replacement
personal
computers for
user
departments.
architectural
design
Identification of
critical
applications.
Client-server
Star
Client
Bus
Star
Bus
To maintain a
backup copy of
are written all the
information
To do a
particular job
such as editing,
storing
information
Direct
Sequential
Systems analysis
and applications
programming.
A sequential file
on a disk
Data
communications
hardware and
software.
A sequential file
on a tape
interface design
Distributed
systems
Use the
computer to
which they are
Can send data to connected to
a computer and perform all
receive data from processing
a computer
operations
Mixer
Modem
Allows computer
signals to be
send over a
telephone line
Aids in back-up
procedures
Planetary
network
Ring Network
Office
Automation
Executor
systems
A dumb
workstation
Time of day
control locks
RS-232 is a
Type of cable
An intelligent
workstation
Encryption
algorithms
Terminal
Standard
What is a compiler?
A compiler
converts the
whole of a
A compiler does higher level
a conversion line program code
by line as the
into machine
program is run
code in one step
Local Area
network
Baudot
An interpreter
does the
conversion line
by line as the
program is run
An interpreter is
a representation
of the system
being designed
Financial sector
and engineering
Communicate
with the console
operator
Specification and
design
Demodulator
Middle-level
languages
It is less error
prone
Graphic design
and education
Manage the
paging function
in a virtual
environment
System Analysis
Fiber Optics
Coaxial Cable
System Analysis
defines the
format and type
of data the
program will use
A cache
An interface
Testing to check
The different
for errors before
types of network the system is
to be used
introduced
Star
Packet
10101010
Parity
Retransmission
15
Port
A parity bit is
4
Modem
327
1100101
141
Data Mining
tools
memory access
memory capacity time
30
255
binary form
4C5
4 bits
Basic Coding
Description
1024 bits
10000
1B7
8 bits
Binary Coded
Decimal
1000 bytes
1112
binary form
used to indicate
uppercase letters
Because it
squeaks when
moved
used to detect
errors
Touch screen
BPS
Printing letters
Light pen
MIPS
Tracing
diagrams
OCR
MICR
Touch screen
Hard disk
Refillable ink
100K
Pencil lead
1.44 Mb
hardware
software
Mouse
Keyboard
Mouse
Credit card
Coloured spots
Pixels
Mouse
screen layout
Disk fragmentation
A GUI is
A compiler is
Which printer among the following is fastest
Zipping a file means
Mouse
Optical Mark
Reader
Technology
slower than an
a fast interpreter interpreter
Dot - Matrix
Drum Printer
Printer
encrypting it
decrypting it
Very important
reader user
sequence
Electrically
charged ink
mainframe
technology
10-6 sec
Vital information
resource under
siege
Thermal Paper
LAN technology
10-3 sec
Control figures
system
model
multiprocessing
multithreading
super computers
arithmetic and
logic unit
band printer
data
management
integrated
software
drum printer
my computer
field
assembly
_____ language consists of strings of binary numbers language
recycle bin
file
machine
language
terminator
symbol
processed
symbol
hp vectra
system
word processing
communication
software
multithreading
one
hierarchical
file management database
system
system
multiprocessing
multithreading
redo logging
Code/De-code
Modulation/De
modulation
fixes
locks
multiprocessing
Linear area
networks
multithreading
Local area
networks
task
process
Integrated
system dynamic
networks.
Integrated
Symbolic Digital
networks.
Ethernet
visual basic
Internet
power builder
MAN
WAN
Cells
Bits
System
modulation
transfer protocol
Software Mail
transmission
protocol
Transmission
Transfer Protocol protocol
File server
Printer server
platform
configuration
alpha numeric
alpha beta
space occupied,
price, no. of
users allowed
cost,
performance
their ratio
input
output
multiprocessing
multithreading
interpreter
compiler
input
processor
impact printers
drum printers
operating
control program,
system,
interpreter,
Hardware components in a computer are
bootstrap, kernel, assembler,
_____,____,_____,______
shell
compiler
_______ software are programs that are complex and
application
can be developed or purchased
operating system software
_______ is a set of special instructions used to
communicate effectively with the computer
batch
protocols
_______ converts a high level language into machine
processor
compiler
language
_______ translates assembly language program into
machine language instructions
compiler
interpreter
OPTIONS
C
ANS
CTRL+F1
Tally INI
A
A
CTRL+F3
A or B
Four
C
B
Alt+Ctrl+C
A
&
Accounts
payable and
Receiving
Puchasing,
Receiving and
Accounts payable
A or B
Ratio Analysis
Four
One
Ctrl+T
Display
Information
Ctrl+D
F6
Shift+P
F7
None of the above
C
A
Day Book
Journal Book
Sub
B
A
Electronic Data
Interchange.
All of the above
C
A
4
Field
5 C
All of the above
B
B
Change Period
Journals
Real
None
B
D
Journal Book
Physical Stock
Transfer
Reversing Journal
Issue
18
21 B
B
electronic data
analysis
F6
Primary Cost
Category
Alt+f5
A
Vouchers
10 to 60
None
Order
Information
Ctrl+f2
Ctrl+f4
A and B
C
A
F7 function key
A or B
1-4-1997 to 313-1998
B
A
A or B
A or b
Cost category
F8
F9
A and B
a or b
Regional setting
Balance Sheet
F10
F11
Both A and B
C
1 B
F11
F12
Budget
None
A
Alt+F3
Symbol
None of them
A
B
A or b
None
Stock analysis
In 'comp info ->
security control'
option
None
B
A
16 C
28
Sub-Groups
B or C
Data Entry
TallyVault
Both A and B
Cash receipts.
Payroll transactions.
Will be more
efficient at
producing
financial
statements.
Capacity
Planning
Exception reporting
RAM
AGP Card
None of above
None of above
File protection
ring
Limited access files
Pixies
None of above
Reel Number
Batch Total
Pointing device
None of above
Console Log
An inked
ribbon and
print head
Data Dictionary
None of above
Require user
passwords
Eraser
A ribbon
Centralised
function for PC
Disposition
None of above
Floppy disk
None of above
A parallel access
medium
None of above
700MB
Magnetic tape
storage
Magnetic tape
storage
None of above
None of above
None of above
In a drawer
None of above
CDROM chips
None of above
DRAM chips
None of above
Logic bus
None of above
Control unit
None of above
8 bits
None of above
CACHE
None of above
None of above
None of above
None of above
None of above
None of above
Fifth generation
None of above
Fifth generation
None of above
Business
software and
games software
Mainframe
computer
Jon Von
Neumann
computers
Hoover
generation
Fourth
generation
Fifth
generation
Analysis, System
Design, and
Implementation None of above
JCL
none the above
A
A
A
B
A
A
A
A
A
to obtain a
record layout
B
A
absence of audit
trails
all the above
checks and
controls
none of these
use of any
programs
A
conceptual/physi
cal
all of them
D
A
A
A
enable multiple
user resource
sharing
B
B
none of these
A
A
A
B
model base
D
B
report files
file manager
filepet
A
A
B
deletion
addition
B
A
A
software and
database
A
B
on quarterly
basis
B
A
Benjamin
B
random
placement of
component
A
none of the
above
none of the
above
A
A
B
B
interactive data
innumerable
analysis
B
A
A
big-bang
stub
hybrid tests
D
B
re-perform
procedures
carried out by
the clients
programs
none of these
A
B
A
A
B
none of these
A
A
A
D
A
examination of
source code of
a program with
advice to
following the
logic of a
program
none of the above
ALC
ACLL
C
B
analyzing the
picture of a file
or data
A
A
A
A
none of the
above
A
resource
requested
A
A
A
B
master list of
transactions
administered
questionnaire
prepared by an
outside
programmer
engaged by the
auditor
A
stratification and
frequency
analysis
all the above
B
B
examining the
quality of data
D
D
auto number
D
A
procedures
chart
macros
comments
expression
builder
expression
elements list
box
action
expression elements
insert
auto report
embedded
datasheet
justified
D
A
B
chart
insert chart
foreign key
mail wizard
C
A
page header
report header
group footer
for specifying
conditions with
group by
clause
none of the above
macro names
forms
C
D
insert
delete
module
RAID
A
A
message
CME
on line editing
OLE server
OLE communicator
connected
BMP
A
D
query wizard
edited
html
publish to web
wizard
dynamic file
insert
data definition
pesos
yen
link
create icon
save as html
end
procedure
front end
C
A
database
data storage
new database
dialog box
235
number
63500 A
automatic field
B
B
explicit join
candidate key
no duplicate key
cascade
update related change all related
fields
records
both a and b
record or
records
B
Dynaset field
properties
properties
select queries
change/delete
queries
update queries
update queries
no match join
outer join
D
A
form wizard
dialog
both 1 and 3
append
simple
form properties
new properties
new form
child form
sorting
querying
pipes
gateways
filter by menu
D
B
controls group
record group
controlled
DATE()
combo box
DAY()
static text
C
B
tabular form
main form
filter by form
option control
wizard
tool wizard
B
B
table
ledger
module
bitmap
A
A
A
A
25,000
64,000 D
B
A
B
form
report
hyperlink
D
A
A
Tools
C
B
A
C
A
B
A
A
B
zero
B
B
B
A
both 1 and 2
B
C
A
delete query
append query
A
B
B
B
A
self join
stand alone
table join
sub chart
B
A
B
D
B
B
B
A
attributes
entities
A
append
add
A
A
B
use datasheet in
forms
use export
D
B
B
B
A
A
group
topic
A
C
A
B
A
B
A
range
logical
C
B
query
table
B
B
session
detail
both a and b
B
A
A
inner form
labels
report
index
identifier
form
sorts
unbound
forms
none of the above
A
C
button
option button
B
A
record source
data sheet form
C
A
columnar form
unbound
bound
A
C
tabular form
columnar form
relationships
filter by record
filter by input
macro
table
field
layout
field names
record grab
An organised
way of storing
information
about a set of
similar things
A way of maintaining
a log
A document
which contains
text
A collection of files
Database access
controls
A tool which
allows text and
graphics to be
placed in
documents
Using queries
Word processors,
spreadsheets,
databases, DTP None of the above
PRIMARY KEY
and UNIQUE
constraints
IDENTITY columns
ALTER TABLE
UPDATE TABLE
Component
keeping the
original paper
copy
Source
mail merge
browser
wildcards
engines
AutoNumber
Auto Key
forms in a
database are
consistent with
the underlying
tables or queries.
query and its
associated
dynaset.
a field from an
unrelated table.
Many-to-many
Many-to-one
EmployeeLastNa
me
CompanyAddress
The one-to-many
relationship
Select Undo in
Click the Delete
the Relationships Relationships button
pull-down menu on the toolbar
The customers
ID is deleted
from the
Customers table,
and all the
related loans are
deleted from the An error message is
Loans table.
displayed.
The subform is
displayed in
Form view.
The subform is an
object on the form
and can be moved or
sized like any other
object.
D
A one-to-many
relationship
A many-to-many
between coaches relationship between
and teams
players and teams
Neither table
title bar text, icon,
prompt.
CreateList.
Sub.
A drop-down list
enables the user
to choose from
one of several
existing entries.
does not have to
be set.
create tables of
rows and
columns.
metadata.
information.
e-commerce
database
application
e-commerce
database
application
A drop-down list
enables the user to
enter text.
must be set for two
words.
maintain data on
different things in
different tables.
all of the above
a and b
C
C
A
D
D
a or b
None of above
Data Business
Model System
Relational Model
Manager
Oracle
The database
management
system (DBMS)
a and b
None of above
All of above
creates reports
b and c
the database
management
system (DBMS)
the database
it contains a
description of its
own structure
All of the above.
holds indexes
as a redesign of
an existing
database
a and b
as a redesign of
an existing
database
a and b
as a redesign of
an existing
database
a and b
data models
entity-relationship
data modeling
data models
entity-relationship
data modeling
data models
entity-relationship
data modeling
entityrelationship data
modeling
data migration
network models
the order of the
rows is
unimportant
row
field
key
tuple
composite key
foreign key
foreign key
candidate key
foreign key
Deletion
anomaly
surrogate key
All of above
create one or
move the data into
more new tables the new database
have poor
response time
Nonintegrated
data
nonintegrated
data
a "wrong format"
problem
nonintegrated
data
a "wrong format"
problem
data warehouse
data are often
denormalized.
b and c
Report
Query
Macros
Spreadsheets
All objects in an
application,
including the
tables, must
reside within the
same database.
An application can be
created in such a way
that it objects such as
forms and reports can
be changed without
disturbing the
existing data.
C
Merge
Join
It contains a user
interface, or
switchboard
It contains macros
C
Interface Design
Wizard
Switchboard Manager D
put key business
information into
the hands or
store all corporate
more decision
transaction data in
makers.
one single location.
Hash Result
Either B or C
Both A and B
Either A or B
Institutional
Overhead
Certificate
Authority
B
Personal Digital
Certificate
Personal Digital
certificate
Public Key
Efficiency and
logistics,
Evidence
Evidence, Ceremony,
Approval, Efficiency
and Logistics
D
A
A
certificate
Revocation
Letter
Private Key,
Recipient
UNESCO
UN/EDIFACT
functions
functional groups
SET
Smart Cards
Broadcast and
Junk Mail
Electronic cheques
Online Catalog and
Customer
Endorsements
EFT
B
Public Key and
Password
Satellite Area
Network
Glow sign or
hoarding
strategies
Billboard
Endorsements
Direct-mail
Junk mail
Billboard
Low cost of
operation
Broadcast
Quality management
Economic espionage
A competitors new
project
None of above
Including the
Subject
Encryption
performed by a
physically secure
hardware device
is more secure
than encryption
performed by
software.
Security at the
transaction phase in
EDI systems is not
necessary because
problems at that level
will be identified by
the service provider. C
tip wizard
function wizard
Industrial
espionage
Research data
e-commerce
database
application
range values
reference values
=currentdate()
# sign
function wizard
parameters
numeric
Boolean
merge
pmt
convert text to
columns wizard
count
tip wizard
countif
sumif
countif
print
none of the
above
shading
print preview
sorting
all blanks
none
www.encybrit.co
m
none of the above
FTP
intermediate
network
physical layer
session layer
ftp service
ARCHIE
unlimited restore
locator
none of the above
scheme
command line
sears
C
C
C
browser
editor
search for
database
wincim or
maccim
cyberspace
excite
web server
image list
A
C
one
many
top
index
menu
search,item
search
lycos
glossary
item search,index
search
all the above
C
D
lynx
Lycos
IBM
C
C
D
ftp
telnet
Hyper text
Hyper text transfer
transfer protocol port
uucp
telnet
transfer
communication
protocol/internet
protocol
none of the above
three
web servers
the internet
access
site
organization
uniform resource
label
name of the above
frantically asked
question
none of the above
IP,UDP
request
close
mosaic,gopher
interface
hotwords
verification on
network
integration and
communication
university of
California net
dns
wais,winsocks
winsock
B
B
books marks
animation
none of the above
animation,scripts
,executables
none of the above
welcome page
grand network
news
search engines
B
B
yahoo and
altavista
ftp
archive
Delphi
fidonet
bookstores
database
channel
Graphical
interface format
Graphical Interface
format
Joint pictures
expert graph
net
eudora,netscape
and pine
network
connections
Joint pictures
experimental group
browsers
A
C
mails
FCOLOR
Communication
graphical
interface
FONTCOLOR
Common Gateway
Interface
Communication
Connection
Client
Web
Channel
neither text nor
image
CGI
none of the above
SGML Composer
text or image
SGML
metalanguage
pancake is not
edible
SGML Parser
C
C
C
applets
documents
Internet
Engineering Task
Force
None of the above
MS Internet
Explorer and
Netscape
Navigator
symbols
video
hotword
hotlink
in user-defined
order
home
service,port and
directory path
service,hostname and
port
B
mailing lists,mail
server robots
and gateways to
other services
none of the above
<hr size=n>
classified
general
instructions
<l1 type=shape>
Browser
intranet
User
none of the above
A
B
wan
packets
none of the above
email,file
retrived,internet
none of the above
tools
communicator,ie,
lynx,winsock
all of the above
ARPANET
none of the above
B
B
defensive
advanced
research projects
administration
net
none of the above
first
none of the above
C
B
network
servers
network
redirectors
data target
equipment
network layer
smart network
and dumb
network
file transfer
LAN,WAN,MAN
TAN
WAN
non-digital
Document type
definition
Manipulate/dema
nipulate
none
none
none
none
C
B
C
B
of
of
of
of
the above
t he above
the above
the above
A
B
Manipulation
Serial line
protocol
Pillar to pillar
protocol
storing data on
the hard drive
receiving information
from a host computer B
Size
Channel
Browse
Retrieve
Either A or B
Neither A nor B
Both A and B
Both B and A
Electronic Fund
Transfers
Open System
Formal Legal
Requirements, Open
System
Signer
authentication
Both A and B
Neither A nor B
C
B
Private Key
Both A and B
Either A or B
Both A and B
Either A or B
Both A and B
Either A or B
Encryption
Cryptography
Reviewing the
systems-access log.
Conducting
fraud-awareness
training.
Received by the
intended
recipient.
The private key
is used by the
sender for
encryption but
not by the
receiver for
decryption.
Failure of server
duplicating
function.
Backend-toBusiness
Firewall vulnerability.
Endorsements
Broadcast
Catalog
Broadcast
.COM
Search and
discovery
Domains
Pre-purchase
preparation
Endorsement
model of
marketing
Business- to-Billboard A
Billboard
Pulling cart
EDI For
Administration,
Commerce and
Transport
EFT
Gateway
Assembler
EDI
Consumer-toBusiness
Customer-toCompany
Euro Cash
Endorsed Cash
Service
Perspective
TT(Tiny token)
E-token
Encryption
Subscription
3
C
4 B
index table
convert text to
columns wizard
legend
legend
pivot table
tip wizard
data marker
data marker
D
A
B
legend
data marker
legend
data marker
pie chart
surface chart
pie chart
surface chart
pie chart
pie chart
surface chart
surface chart
D
A
symbols
Netscape
convert text to
columns wizard
word 2000
tip wizard
stock chart
pie chart
B
Multi-dimensions
A
A
B
It is often used to
display share
market prices
over a period of
time
Solver
Data table.
Pivot table
Data table.
Solver
Data table.
Spreadsheet
C
B
Performing text
formatting.
Source table
name.
N
B
Multi-dimensions
A
B
It can be
represented in 3dimensions
SumIf
tables
worksheets
It summarizes
the data by using
analytical
functions.
A
D
solver
Pivot table
tip wizard
function wizard
tables
database
modal window
No border
A blinking border
2,2,2
6,8,10
database
spreadsheet
Gap
Rows
INSERT
constant.
formula.
#VALUE!
Numeric
constants
Tom McKenzie.
Text constants
\
It is impossible to
determine.
It is displayed in
reverse video.
G7*SUM(H9:H11)
The phrase active
cell appears in the
Status bar.
By either clicking
in a different cell
or using the
arrow keys to
move to a
different cell
By typing the
reference of the cell
you want to move to
in the formula bar
View
Window
List
Properties
Clear
Remove
D4^2
SUM(H9:H11)
Fonts
Margins
View
Edit
group.
D12:G25
cell group.
D
B
C
clipboard.
source range.
clipboard.
The Paste
command
source range.
Both the Copy and
Paste commands
mixed
constant
B$4
$B$4
#DIV/0!
#DIV/0!
#DIV/0!
#DIV/0!
The Paste
command
cycle through
absolute,
relative, and
mixed cell
references.
the Formatting
toolbar
C
B
Right-click a cell
and click the Edit Double-click a cell
Hyperlink
and click the Insert
command.
Hyperlink command.
an integer.
29/03/2008
It is impossible to
determine from the
information given.
subtracting the
later date from
the earlier one.
a constant.
the F1 key.
B
Either 3/4 or .75,
depending on the cell
formatting
C
either a cell on a
worksheet or a
variable.
D
B1;G10
B1:G10
MAX
SUM
Pie
Scatter
Transfer
information to a
database
Fill Right
Paste Special
March 4 of the
current year
B
C
select Print
selection on
Page Setup |
select Print selection
Sheet and then in the Print dialog and
print
then print
D
#VALUE!
=(B2*(D4+C2)
REF!
whatever was
last used
A0
vertical
None of the above
A
C
CARN
NET
newsgroups and
search engines
none of the above
application
servers,proxy
servers and web
servers
none of the above
bulletin
broadcasting
system
none of the above
very small
none of the above
A
B
windows stocks
PINE
Lynx
built-in
Cryptography
Message Digest
Hash Function
Formula
Name
Address
Cryptography
Password Cracker
Address
Protocols
Unauthorising
Exposure
Approving
Hacking
A
B
Judge of a civil
court
Virus
Cracker
Dell .com
Asynchronous
Transmission
mode
Msn .com
None of above
Address
Protocols
Port
Pin
CAN
PAN
hypertext
hypertext tracing
transfer protocol protocol
New Information
Card
None of the above
Only printers
Switches data
from incoming
ports to outgoing
ports.
All of Above
Bridges and
Hubs
Hubs and nodes
Packets
None of the above
router
virus checker
Four
Network Layer
B
C
Fiber
A memory
address
Twisted pair
Router
It continue on to
target device
with corrupt data None of the above
Ultra violet
technology
None of the above
Network Layer
Octal
48 KB
A
A
software that
allows file
copying
a gateway calling
program for internet
bridging
Server
Network PC
Both A and B
Ring
Both A and B
Linear
B
D
A
B
Star
Mesh
Star
Mesh
Linear
Ring
Star
Mesh
Physical Layer
Ethernet,
DecNET, FDDI
mbps
Mbps
depend on the
transmission
medium
B
B
C
limited by modem
speeds
Windows 95
Netscape
D
B
Windows NT
the Internet
bridge
is part of
Netscape
make of processor
is a protocol for the
transfer of files
between computers
is part of
Netscape
a screen saver
program
is a CPU
functional unit
browser
clip-art file
search engine
is a CPU
functional unit
make of processor
is part of
Netscape
It works the
same way as a
local network.
Individual computers
can connect to it
using an ISP.
is part of
Netscape
flood
traffic
switch
hub
Use of encryption
methods
by scanning the
computer for a
connection.
Web traffic
Application updates
A worm
Spyware
Multiplexors
LAN
Giving out
disinformation
Disruption in
supply lines
Contaminating
water systems
Shutdown of nuclear
plant safety systems
To obtain an accurate
inventory of network
To improve
related equipment
system response and parts and
time
network nodes
D
stop its
competitors
seeing their
prices
USA People
Search
Lycos Search
Personal assets
Criminal records
Adware
Spyware
Siphoning
Hoaxing
virtual stalking.
Web stalking.
spam.
viruses.
Use a proxy
server.
Use anti-spyware
software.
Message
sequence
Logical access
number checking controls
Both I & II
Neither I or II
www
telnet
Increases boot
up time
Microsoft Excel
Misleads a program
recompilation
both HTML and
Internet Explorer
Web browser.
HTML.
DHTML.
MHTML
clicking a
hyperlink that
references a
document that is
stored in the
floppy drive on
your computer
viewing an Excel
worksheet that you
have saved as a Web
page.
B
B
B
Go to the History
page and look
Go to the Bookmarks
for the site
or Favorites page
the Update
command
Sound
Video
JPEG
Add it to
Favourites or
Bookmarks.
TIFF
Cut and paste it to a
word processor
document.
privileged
network.
network topology
a footer.
an encryption.
IPP
PoIP
Desktop server,
application, and
database.
Desktop server,
software, and
hardware.
Telephone line
File Transfer
Protocol
So email is
delivered faster
143.215.12.19
paul.domain.uk
No-one
High volumes of
email
squares
icons
grid
guide
auto shapes
Internet Remote
Conversations
A letter will be
sent to you in
the post
A
B
movelast,false
eof,true
toolbox
project explorer
movefirst,false
bof,true
number()
val()
square
oval
D
A
A
forecolor
none of the above
textunderline,tru
none of the above
e
C
B
foresize
one-thousandth
of a second
fontsize
D
one-ten thousandth of
a second
C
itemcount
listcount
project explorer
toolbox
vbmsgboxstyle
label
inputbox()
dbopensnapshot dbopendynaset
unload
initialze
transparent
graphical
green
black
blue
toolbox
white
project explorer
window
project explorer
window
text
container
gotfocus
none of the above
D
C
toolbox
D
A
A
initialize
activate
caption
openrecordset
value
style
var
.ctr
.ocx
Check
Audit
On Error Stop
Refresh
UnloadMode
parameter to a
non-zero value
Resize
UnloadMode
parameter to a zero
value
Consists of
Various Forms
And Code
Modules
Consists of several
Projects
Class module,
code module
Refresh
Msgbox
error.number &
error.text
PaintPicture
Msgbox error.number
& error.description
D
To allow the
editing of icons
To provide a
repository for images
used by other
controls
D
GetFile
GetBytes
GetProperty
Value
Windows
explorer
Input box
Multi-Line
KeyUp and
KeyDown
Font
KeyPress, KeyUp and
KeyDown
Input Mode
Output mode
ScaleHeight and
ScaleTop
x and y
Property Let
Property Set
ZOrder property
AutoRedraw property C
Value
CurrentVal
SetAttr
CStr
The
ExecProcedure
method
An exclamation
icon
intrinsic
constant.
built-in procedure.
InputBox
function can be
created with the
macro recorder,
while the
MsgBox
statement
cannot.
MsgBox statement
can be created with
the macro recorder,
while the InputBox
function cannot.
Data can be
entered.
Deactivate
Terminate
cutting tool
color scheme
color guide
color palette
36 C
pie
linear
slides
doughnut
data
stream
auto shapes
track changes
C
C
not available in
the tool bar
thrice
five
eight
standard tool
slide view
none of these
preview
copying
moving
clip art
.doc(document)
drawing tools
.html(hypertext
format)
six
twelve
.txt(plain text)
.doc(document)
displayed only in
outline view
none of the above
both a and b
transition
slide show
master slide
view show
view show
master notes
slide sorter view
A
A
C
7.5 inches,5
inches
a or b
transition
A
A
png
action button
Microsoft visual
interdev
templates
when the slide
show is run
add-ins
header files
both a and b
properties pane
outline pane
contains sample
presentations for
a variety of
provides suggested
topics
content and design
in notes pages
view, drag the
slide icon to a
new location
design templates
is the template
whose format
and color
scheme user
applies to a
presentation
user should
select the slide
view to add the
text to the slide
design template
is the template
whose format
and color
scheme user
applies to a
presentation
new slide
set up show
grammar
checker
102
22 B
three
CD-ROM, digital
camera and
sound.
four times
B
text, hypertext, Power
Point, video and
sound.
D
Line style, Line color,
the Font and the text font, and text
alignment
text alignment
D
Line thickness
Microsoft Graph
is started so that The graph
you can create a placeholder is
graph.
deleted.
Pie chart
Line chart
The datasheet
window is toggled
The datasheet is from closed to open
saved as a
(or from open to
separate file.
closed).
The application that
created the chart is
The chart is
doubled in size. started.
The chart is
Microsoft Graph will
doubled in size. restart.
A
D
Exciting
Alt
Ctrl
Custom animation
can be used to affect
the way objects
appear on a slide, to
what objects do after
they appear on a
slide, and to the way
objects exit a slide.
The advanced
timeline shows
the sequence in
which objects
will appear on
the slide and the
duration of the
effect applied to
each object.
Text
The advanced
timeline shows
neither the sequence
in which objects will
appear on the slide,
nor the duration of
the effect applied to
each object.
C
Clips, organization
charts, and text
D
A
D
Data cannot be
entered into
Datasheet.
OLST.
OLIP.
You cannot
change the style
of the
connecting lines
in an
Organization
chart.
[Alt+Z]
[Ctrl+Z]
.frm
.frx
loaditem
addpicture
File1.Path =
Dir1.Path
msgbox()
File1.Path =
Dir1.Path
recordcount
count
addnew
additem
additem
addnew
moveprevious
movefirst
UnloadMode
parameter to a
non-zero value
UnloadMode
parameter to a zero
value
Office 97
Back Office
select
ctr+end and
ctr+home
none of the above
web layout, page
layout
none of the above
B
A
Icon Tip
Document Tip
ruler
home and end
keys only
decimal
rotation
dialogs/alerts
both A and B
design wizard
C
A
database
forms
11 A
print preview
from the file
style box
ctrl+f
ctrl+f
ctrl+m
ctrl+m
A
D
CTRL+SHIFT+S
CTRL+SHIFT+P
ctrl+shift+s
ctrl+shift+p
Both
B
A
Limit Check
Reasonableness
A or B
ODBC
This involves
looking at a
system and
finding out how
information is
being handled
None of above
None of above
Maintenance,
reliability, and
upgradeability
To maintain
security
Users operate
the manual
system
None of above
Users continue
operating the old
system
None of above
User Guide and
technical
documentation
None of above
User guides
cover how to run
the system,
enter data, save,
print, etc.
None of above
D
A
Database
systems and
backup services
floppy disk
Hard disk
To help someone
who is applying
for employment None of the above
Address bus
Control Bus
TED
MAD
Address bus
Control Bus
Data structures
that are part of
the kernel of an
operating
system.
decimal form
represented 256
characters
16 bits
alphanumeric form
represented 127
characters
32 bits
230 bytes
32 Mb of RAM
1024 bytes
a 32-bit bus or 32-bit
registers
DRAM
bytes
CROM
Hertz
A
D
A
A
secondary
secondary storage
storage capacity access time
have medium
clock speeds
printer interface
a modem interface
ink-jet printer
laser printer.
stores more
information than is used for cache
memory
RAM
provides backup
power in the
event of a power
cut
none of the previous
is an access card
for a security
contains a
system
microprocessor
SSGA displays
writing programs
in multiple
languages
none of the previous
writing programs
in multiple
languages
none of the previous
Variables
Logic Bus
CD-ROM
multiuser
PAGELAYOUT
ONLINE DOCUMENT
ctrl+end
ctrl+home
ctrl+x or ins
ctrl+v or Del
ctrl+1
AutoShape
Border
Page Layout
Auto Shapes
File
WordArt
Bullets
remove
clear all
circle bullet
dialog box
AutoShapes
files
new document
default document
mail merge
none of t he above
shift+f8
tools+spelling menu
first row
enter
none of the above
table auto format
option
none of the above
records
style gallery
Data Source
vj++
B
B
alt+f8
alt+f5
browser
micro soft
outlook
hotmail
sgml
vb script
arpanet
LAN
field names in
the header
source must
match any
merge fields
you've inserted
in the main
document
by default cell
height and
weight option
applies to all the
rows and
columns of a
table
justified
top
If a header is
inserted in the
second section
then the same
header is
applicable to the
first section
A section is a portion
of a document in
which certain page
formatting option can
be set
D
A
A
A
Double Click
B
A
automatically
corrects the
grammatically
errors
top
a multiple
documents files
can be inserted
in the single
document
B
A
Hyperlink
Document
Outline Layout
Remove
thesaurus
outliner
send private
messages to a
friend
send a package to a
friend
Page setup
Print preview
Retrieve
spacing
Save
sorting
C
B
word processing
spreadsheet
Storing
information
clip art
clipboard
Font, Paragraph,
Bullet and Numbering C
Text which
appear at the top Designated area on
of every page
the document
Monitor,
keyboard and
mouse
microphone
digital scanner
15 point
25 point
3 inches.
impossible to
determine.
to move a
section of text
from the original
location to
another location
to leave an original
section of text in
place while pasting a
copy elsewhere
A set of different
graphics
None of the above
Grammar
Checker
Select all
AutoCorrect
Delete, then
paste
To complicate
the revision
process and to
force the author
to spend more
time making
corrections
To allow multiple
people to work on one
document in
collaboration with one
another
C
A vertical line
outside the left
margin signifies
a change has
been made at
that point in the
document.
Comments are
enclosed in a text box
at the right of the
document.
D
The Versions
command will
allow you to save
only one version
of a document
without any
changes that
were just made
to the document.
The Versions
command will allow
you to save only two
versions of a
document: one
version of the original
and one version of
any changes made to
the document.
A
Spell check
Thesaurus
Forms
Insert
Text fields
A drop-down list
Comments can
be edited or
deleted by right
clicking the
highlighted text.
Comments can be
edited or deleted by
left clicking the
highlighted text.
Text which
appear at the top
of every page
None of the above
forms.
numbers.
find/search.
Format Painter
button
macro.
This action is not
possible.
Error Injecting
Debugging
Format
Edit
the guidelines
used to establish
where different
elements of the
newsletter will
go.
underlining the
text of the pull
quote.
an enlarged capital
letter at the
beginning of a
paragraph.
A dropped cap is
a word that
starts with a
lowercase letter
when it should
have a capital
letter.
A grid is a set of
horizontal and
vertical lines that
determine the
placement of
elements in a
newsletter or other
document.
The number of
columns
12
72 D
Three
Four
Press Enter to
create a section
break.
Press Shift+Enter to
force a line break.
4 inches
Both
A or B
Gaps
Merge
HLOOKUP()
A
A
A or B
duplicates
testing
Range
Both B & C
a form of VRAM
multiuser
make a backup
copy
to display information
to print sheets of or pictures on a
paper
screen
B
uses C++
1012 sec
a frog
a message pad
an instruction that
the address of a has been transferred
memory location from memory.
an instruction that
the address of a has been transferred
memory location from memory
an instruction
that has been
executed
a light pen
a magic marker
Program
Data
Artificial
Intelligence
Parity Checker
Range checking
Validation
System
Modem
keep a record of
computer
backup to a secure
failures
medium
Multiprogrammin
Multiplexing
g
Floppy Disk
Telephone
modem
D
D
Magnetic Disk
Shareware
Telephone
modem
Shareware
Indexed
Random
CPU
Primary Storage
Schema and
subschema
Systems logs
Parity check
MIDI interface
Serial interface
Sound
Video
Ink-jet
Drum
recording current
stock in a
presenting an
supermarket and
order for stock to answering customer
a warehouse.
queries.
updated
regularly
updated once a year
A
C
Graphics
package
Spreadsheet
D
retain
confidentiality of
files
simplify file structures C
4096
8192 C
virus infection
loss of data
IPX/SPX
NetBEUI
A
printer can do
1000s of pages a the operating system
day
is easy to use
B
the root directory the hard drive
uninterruptable
power supply
the system
requires a
network
administrator to
uninstall it
information.
text.
Logical Steps in
any language
It is mandatory
in tally
prevent
unauthorised
access
allow encryption
IT understands
the business
processing.
Software that
generates
innovated
designs and
artistic patterns. None of the above
enterprise
local
D
D
general controls
Settings
Control
(a) to (d)
(a) to (d)
preventive
controls
corrective controls
(a) to (d)
program change
requests
resolution procedures C
thread testing
loop testing
A
(a) to (d)
Concentrator.
Cross-training of
operating personnel.
data design
Hub
Ring
C
A
Physical security
of warehouse
facilities.
procedural
design
Computer
network
Mesh
Ring
system walkthroughs B
To help someone
who is applying To Store data in an
for employment organised manner
Binary
Indexed
Operating
systems and
compilers.
A direct access
file on a disk
Computer operations. C
A direct access file on
a tape
C
Information
formats
commonly vary
between
architectures
Address
calculation part
Wide area
network
Protocol
Generally require
a keyboard for
data entry and a
CRT for display
Multiplexor
Time sharing
computer
Packs data in a
disk file
Speeds up online
printing
Loop Network
Star Network
Electronic
mailing
Instant post-office
A personal
computer
A mainframe PC
Parity checks
Communication
protocol
All of them
Device interconnect
standard
A compiler is a
general purpose
language
providing very
efficient
execution
None of the above
Lexical analysis,
CONVERSION,
and code
generation
ASCII
EBCDIC
An interpreter is
a general
purpose
language
providing very
efficient
execution
Frequency
division
multiplexor
Low-level
languages
Time Division
Multiplexor
It is less prone to
attenuation
Uses only one path
Accounting
systems,
commercial
sector
Testing
Common carrier
Telephone Lines
System Analysis
involves creating
a formal model
of the problem to
be solved
None of the above
A buffer
An online protocol
Hardware,
Software and
size of program.
Ring
Bus
1010101 None of the above
Cyclic
Redundancy
Hash Count
64 None of the above
Multiplexor
Acoustic coupler
97 None of the above
Data
management
systems
All of them
B
C
A
A
C
B
secondary
secondary storage
storage capacity access time
decimal form
alphanumeric form
5C4
16 bits
A
B
D
A
A
decimal form
alphanumeric form
It has ears
Joystick
MHz
Reading bar
codes
barcode
scanning
C
B
voice recognition
CD-ROM drive
Light sensitive
elements
5 Mb
C
B
output
input
Pixies
Optical mark
reader
Pickers
an operating system
Fifth - generation
computers.
Arjun
A
C
Image Scanning
Technology
keyboard layout
Optical mark
reader
software
interface
Third generation
computers.
Param
is due to bad
disk blocks
Magnetic Ink
Character
Recognition
Technology
converts a
program to
machine code
B
A
A
C
Virtual
information
reader & user
system
None of above
An inked ribbon and
An ink pen
print head
Unix operating
WAN technology system
10-12 sec
10-9 sec
External file
labels
D
B
D
C
D
D
multiplexing
multitasking
B
C
input/output symbol
IBM-PC
multiplexing
dummy
terminals
dummy servers
windows NT
LAN
back end
front end
back end
distributed
computing
front end
centralized
idea processor
Microsoft
exchange
record
high level
language
connector
symbol
fazitsu vp200
series
two
many
network
relational database
database system system
D
multiplexing
disk
defragmentation disk mirroring
Module/Demodule
constraints
traps
multiplexing
Local array of
networks.
thread
client-server
Integrated
Services
Digital
network.
ARPANET
SQL * plus
B
D
GAN
Packets
Simple Mail
transfer
protocol
Hyper text
Receiver
package
system
B
A
numerous alpha
A
B
D
size,
performance,
cost
input, output,
performance ratios
feed
write
multiplexing
multitasking
converter
process
ram
non-impact
desktop
printers
output
thermal printers
monitor,
program,
keyboard, bus
CPU, memory,
input, output
windows 95
interpreter
software's
procedures
assembler
coder
assembler
processor