Sie sind auf Seite 1von 160

OPTIONS

QUESTIONS A B C
TALLY
The ------ key can be used to select an existing
company from list of companies. F1 ALT+F1 CTRL+F1

Import and Export of data between Tally and other


programs is possible only through ---------- Program. Tally ODBC Tally IMP Tally INI
The re-order point is the inventory quantity that
trigger a stock replishment activity. TRUE false
A created company's detail can be modified through
keys F3 ALT+F3 CTRL+F3
A/An ------------- is the official notice that the firm
sends to its customers to advise then to the amount
of money that is owed. Invoice Bill A or B
In tally,all masters have ________main options Two Three Four
In tally,to create a new column in balance sheet
press _______ Ctrl+C Alt+C Alt+Ctrl+C
In tally,the use of group behaves like a sub-ledger,
option is that we can summarize many ledger
accounts into one line statements TRUE FALSE
In tally, we can alter ledger details using either
single or multiple modes but not alble to delete a
ledger from multiple modes. TRUE FALSE
In tally,a group company is marked with an
______________ * $ &

Puchasing and Accounts


The systems that work together to order,receive, Accounts Puchasing and payable and
and pay for replenishment of stock are --------------- payable Receiving Receiving
Tally allows to delete a ledger from ---------
alteration mode. Single Multiple A or B
--------------------- is/are useful for management in Cash Flow Fund Flow
the decision making. Statements Statements Ratio Analysis
In tally,the group company must contain at least
_____________ members Two Three Four
To cancel a vourcher entry in Tally, short-cut key is -
---------- Alt+D Alt+X Ctrl+T
The accounting masters and inventory masters Create Display
related to Information Alter Information Information
We press ------------- function key to display the age-
wise analysis of Bills Receivable or Bills Payable
report F4 F5 F6
In Tally, we press ------------, to print report . Alt+P Ctrl+P Shift+P
In Tally, Types of Accounts and Types of Vouchers
passed during the period, can be seen in -------------
report. Tally Audit Statistics Day Book
In the Tally Software, the ------------ directory stores
all data entered by the user. Bin Data Sub
The Ledger Accounts are unique in Financial
Accounting Packages True False
Customers can be permitted to enter their own data
into the firms computer using the firms wide area Enterprise Data Enterprise Data - Electronic Data
network is an example of Interchange Information Interchange.
In Tally, we can customize the Vouchers as per our
requirements TRUE FALSE

The number of steps in Accounts Compilation are 2 3 4


Each action/transaction of a firm is described by a --
--------------. data element data record Field

Tally is based on mercantile accounting system FALSE TRUE

Display stock Open


Ctrl + N is used to ----------- valuation method Calculator Change Period
------------- in Tally classify the accounts under
different heads so that summarised information is
possible. Ledgers Groups Journals
Revenue Account also known as --------------
Account Personal Nominal Real
Method of Voucher Numbering is/are Manual Automatic None

Accounts Receivable are displayed in Balance Sheet Profit & Loss Journal Book
To assemble a product from different items ---------- Physical Stock
---- entry is used Journal Stock Journal Transfer
A --------- purchase orders data flow is directed to
the purchasing system for use in closing out the
outstanding purchase orders in the receiving
system diagram. Filled Receipt Issue
Tally provides at least --------- predefined voucher
formats 11 16 18
The value of the inventory is included in a ledger
accounts as an asset on the balance sheet FALSE TRUE
" The buyers can follow up with the suppliers to
determine the reasons " is an example of -------------- management by management electronic data
--- objective by exception analysis

From voucher entry mode , if we press __________


then we get payment voucher in tally F4 F5 F6
Primary Cost
Default Cost Category in Tally is/are -------------- Main Location Primary Category
A Group Company is simply a name and an identify
given to the merged accounts member companies
of the group. True False
A ----------- is a primary document for recording all
financial transactions. Ledgers Reports Vouchers
The field can have a value between
________________ in FA Package. 0 to 9 1 to 100 10 to 60
The _______ file maintains data that describes the
supplier past transaction with the firm in terms of
material quality in AIS Supplier Suspense Order
It is necessary to manipulate data to transform it
into ---------------- Report Output Information
In tally, to change the date of the voucher press
______ F2 F4 Ctrl+f2

Tally can maintain budgets on ---------------- Net Transactions Closing Balance A and B
The value of the inventory is included as an asset
on the balance sheet True False

In ratio analysis report of Tally FA packagewe we


press ________________ function key to the Alt + f6 function
display of bills receivable , bills payables report F6 function key key F7 function key
The accounts payable system is responsible for
paying the suppliers for the ----------------- Sales Purchases A or B
What is the default financial year in Tally6.3 1-4-1995 to 31-3- 1-4-1996 to 31- 1-4-1997 to 31-3-
_________________ 1996 3-1997 1998
Tally encrypts and stores TALLY DATA at the data
directory True False
The Profit & Loss statement can be displayed in -----
----------- format(s). Horizontal Vertical A or B
Balance sheet &
profit & loss profit
& loss and trial Profit & loss and Cash and profit
Default ledger accounts in tally are ______ balance trial balance & loss

Default 'godown' name in tally is ____________ Primary Main location A or b


Security
'Tally vault' is a _________________ mechanism Ledger a/c Cost category
To create a sales voucher in tally , you have to
press _______ F5 F7 F8
A Group Company is ------------------------- given to
the merged accounts of member companies of the
group. a name an identity A and B
In tally,"credit note" voucher type records entry for
________________ Sales return Purchase return a or b
In tally you get currency symbol option from Company Stock items
_______ menu creation units Regional setting
------------------ gives the balance for each day for the
voucher type has been selected. Trial Balance Daybook Balance Sheet
For 'stock journal' entry we press ______________
in tally F7 Alt + F7 F10
Tally provides the capability to the Changes in
administrator/auditor to track changes in the areas transactions or Changes in
is/are vouchers Ledger Masters Both A and B
In tally, types of users are _______________ 2 3 4
By pressing -------- key, a list of inventory reports
can be displayed straightaway from the balace
sheet report F9 F10 F11
Projected approximation of income or expenses is
called ______________ . Balance sheet Profit & loss a/c Budget
"Administrator" type user is also called 'Auditor' of a
company in Tally TRUE FALSE
You will get company information , if you press
__________ from gateway of tally F3 Ctrl+F3 Alt+F3
A constituent(member) company can be a member
of more than one group. TRUE FALSE
Default stock category in tally is ______ Main location Primary Symbol

To create a log of the import activity in a file


_____________ is located in the same directory
as an executable program in tally Tally.imp Tally.ini A or b
In Tally,inventory valuation method option is
available from _______ Stock summary Stock journal Stock analysis
During the In 'comp info ->
Tally audit feature is available in a company By pressing F11 creation of a security control'
__________________ function key company option
In tally, a group company can also be a
constituent(member) of another group company TRUE FALSE
Default number of groups in tally are ________ 128 228 28
Ledger
During voucher entry ------------- are used. Accounts Groups Sub-Groups

User designated as --------------- can view audit list. Administrator Owner Data Entry

One company to Other programs -


another company a spreadsheet
created withon or a database
Tally supports Importing of data from ---------------- Tally Package file. Both A and B
In an accounting information system, which of the
following types of computer files most likely would Inventory Cash
be a master file? subsidiary. disbursements. Cash receipts.
Will be more
Does not require Will produce a efficient at
Which of the following is an advantage of a as stringent a set more accurate producing
computer-based system for transaction processing of internal set of financial financial
over a manual system? A computer-based system: controls. statements. statements.

data to be data that has the address of


transferred to been transferred a memory
The memory address register is used to store memory from memory location

FUNDAMENTALS OF COMPUTER

Inefficient usage of excess computer equipment Contingency System Capacity


can be controlled by Planning feasibility report Planning
Which of the following is not the component of a
CPU NIC Card VSAT RAM
A trailer label is used on a magnetic tape file, it is
the last record and summarises the file. The Control totals for
following is an information not found in the trailer Identification one or more
label Record Count Number fields
Storing
Writing on a hard information on
Hard copy is a term used to describe...? board Printed output the hard disk
Voice activated Voice answer Visual audio
What do the abbreviations VAB stand for broadcasting back board

What control would prevent the accidental erasure Boundary File protection
of customer information from a magnetic tape Validity check protection ring
What are the individual dots which make up a
picture on the monitor screen called? Coloured spots Pixels Pixies
Header label normally include all the following Identification
except the File Name number Reel Number

A daisy wheel is a type of...? Printer Storage device Pointing device


Which approach or technique is a control usually Physical
associated with microcomputers System Logs Security Console Log

Electrically An inked ribbon


An impact printer creates characters by using...? charged ink An ink pen and print head
Use only
The best security control in a microcomputer Restrict unremovable Require user
environment is to physical access media passwords
What would you NOT use with a flatbed plotter? A pen Paper Eraser
What do you need for an ink jet printer? A cartridge A drum A ribbon
Centralised Centralised
The greatest control exposure in a microcomputer Separation of function for PC function for PC
environment is the lack of duties acquisition Disposition

A laser printer does NOT use? A print head A laser beam An INK RIBBON
The amount of data that a disk may contain is Storage
known as the disks...? Volume Size capacity

You can ________ protect a floppy disk. Read Write Read and Write
Information on a hard disk is usually backed-up
using a...? Magnetic tape PAN drive Floppy disk

Serial access Random access A parallel access


Magnetic tape is a...? medium medium medium
Hard disks can have a storage capacity in the
region of...? 1.44MB 20 GB 700MB
Which storage device has the largest capacity in Magnetic tape
Mb? A CD-ROM A floppy disk storage
Magnetic tape
Which storage device cannot be erased? A CD-ROM A floppy disk storage
By a sunny By magnet
Where should floppy disks be stored? window objects In a drawer
The contents of these chips are lost when the
computer is switched off? ROM chips RAM chips CDROM chips
What are responsible for storing permanent data
and instructions? RAM chips ROM chips DRAM chips
Which parts of the computer perform arithmetic
calculations? ALU Registers Logic bus
What are small high speed memory units used for
storing temporary results? CPUs Registers Control unit
How many bits of information can each memory cell
in a computer chip hold? 0 bits 1 bit 8 bits

What type of computer chips are said to be volatile? RAM chips ROM chips CACHE
Systems
Network software software and
Business
and security application
software and
Software can be divided into two areas: software software games software
Travel agents use this computer system when Personal Mainframe
reserving flights Supercomputer computer computer
Jon Von
Which computers are used in the weather Notebook Supercomputer Neumann
forecasting industry? computers s computers
Second Hoover
Vacuum tube based electronic computers are...? First generation generation generation
Which generation of computer was developed from Second Fourth
microchips? generation First generation generation
Which generation of computer uses more than one Second
microprocessor? generation Third generation Fifth generation
Which generation of computer developed using Second
integrated circuits? generation Third generation Fifth generation
Which generation of computer developed using Second
solid state components? generation Third generation Fifth generation

DATABASES

Specification, Programming, Analysis, System


Name three steps involved in developing an Design, and Design, and Design, and
information system Testing Testing Implementation
_______ is used for CAAT as database Oracle ACL JCL
Generalized audit software perform auditors to
undertake any past records and not concurrent
auditing TRUE FALSE
Generalized audit software is a file whose
capabilities for verifying processing is logic TRUE FALSE
CAAT's are computer program and data that
auditor uses as part of the audit procedures to
process data if audit significance contained in an
entity information system TRUE FALSE
CAAT do not contains package programs, purpose
written program, utility programs or system
management programs yes no
Embedded audit routines are sometimes built into
an entity's computer system to provide data for later
user by the auditor TRUE FALSE
SCARF involves embedding audit software
modules within an application system to provide
continuous monitoring TRUE FALSE
Concurrent use auditors as the member of the
system TRUE false
Regular cross system verification may minimize
frauds true false
Computer security is frequently associated with
confidentiality, integrity and authentication true false
Data reserve engineering process metadata to
document system and abstract business rules and
relationship true false
review and
to determine the evaluate the to obtain a
The first step for developing CAAT is_________ audit objective types of data record layout
Using the open database connectivity feature in can bring the can bring the
ACL is ______________ data directly data indirectly all the above

Computer Assisted Audited Technique involves the


use of computers through "Black Box Approach" True False
White Box Approach necessary involves expert
knowledge on the part of Auditor True False
change in the
method of
The transition from manual system to CIS recording use of
environment bring dramatic changes including accounting accounting absence of audit
________________ transaction codes trails

documents risk driven


Auditing with computer necessarily supports the driven approach approach unique approach
hardware and processing
CAAT involves an Auditors' appreciation of software options, file data checks and
__________ configuration structure controls
Widespread end use computing result in unlimited
errors creeping into system going to accept
handling, thereby increasing audit risks true false

For computerized auditing usage of sophisticated


audit software would be a necessity true false

the source of
data available to source of data
Important knowledge needed to begin planning the the audit for material
use of CAAT is _________ organization planing all the above
The move towards paperless EDI would eliminate
much of the traditional audit trail, radically changing
the nature of audit evidence true false
providing
access to
computer to all
Computer operation controls are designed to the of by all organization use of any
provide ________________ concerned personnel programs

Systems development control, apart from others,


include authorization, approval, testing,
implementation and documentation of new systems
software and system software modification true false
natural/man- conceptual/physi
A system could be _________ made open/closed cal
A system exhibits 'entropy' true false
Super computer are the largest and fastest and is
very suitable for commercial application including
audit work true false
Assembler language uses Mnemonic symbols true false
manage
Operating systems are devised to optimize the hardware & enable multiple
machine capabilities, the function software user resource
include_______________ scheduled jobs resources sharing

General purpose software provides a framework for


highly complex scientific operation true false
In batch processing, transactions are processed
one after another true false

The use of computer assisted audit techniques is with audit with production
not gaining popularity not only ________________ departments departments all the above
On-line processing refers to grouping of transaction
and processing the same in one go from start to
finish true false
Real time refers to the technique of updating files
with transaction data immediately after the
occurrence of the event to which it relates true false
In OLRT the CPU should process the capability of
program interruption true false
Time sharing system allow access to a CPU from
remote terminals true false
DSS is defined as a system that provides tools to
managers to assist them in solving structured
problems true false
DSS has the following components planning
_________________ databases language model base
Master files contains current records for
identification and summarizing true false
Transaction files contain relatively permanent
records take product profile, customer profile,
employee profile etc true false

Master file configuration includes ____________ reference files table files report files
______ is a file management software package that
lets users and programmers organize data into files
and then process those files filex file-o-man file manager
to have a
complete decentralized
CAATS provide added value to the clients because picture of a picture of a
_______________ system system all the above
File volatility refers to the number of addition and
deletions to the file in a given period of time true false
File activity is the proportion of transaction file
records that are actually used and accessed in a
given processing run: true false
File interrogation refers to the _____ of information
from a file back-ups retrieval deletion
One -to-one relationship means a single entity to a
single entity in a monogamous structure true false
RDBMS is structured to a series of 2 dimensional
tables true false

seriously affected subject area software and


SADB stands for ____________ database database database
Controls are present over many aspects of the
computer system and its surrounding social
environment true false
In framed checking the data entry is checked
against an expected picture or format true false
on quarterly
Errors are correlated_________ at the year end immediately basis
Field check is exclusive to a field true false
_________ law basically states that there is a
specific probability of the first digit of a no. being
1,2,3 etc Benfish Benford Benjamin

Check digit is a group of nos. added to a code for


determining the accuracy of other digits in the code true false
blocks of nos. to
consecutive nos. the primary random
or alphabets to attribute of the placement of
Hierarchical code means _________ entities the entity component
The validation checks applied to a field depend on
the field's logical inter relationships with other fields
in the record TRUE false
The contents of a field could determine _______ invalid, none of the
sign for a ______ field valid, numeric alphabetic above

Batch is the process of ______ together _____ that grouping, regrouping, none of the
bear some type of relationship to one another transaction events above
Hash totals means meaningless totals true false

With OLRT where interactive data entry is available,


the master file associated with a transaction may be
searched for confirming data true false
Controls are required for authorization to ensure
data integrity and detect possible breaches in
security true false
Data from client application are not stored in the
organization's database through auditables events
and function true false
All input records in a batch are normally of different
types true false

incremental interactive data interactive data


IDEA stands for design and extraction and innumerable
_________________________________ enlarge activity analysis analysis
A transaction file is sorted prior to the update of
master file true false
A sequence check on the transaction or master files
by an update program is not required true false
Whenever monetary transactions are processed
against master files, the update program should
maintain a correlation account to record such
transaction that does not have a matching master
file record true false
Internal tables are stored tables from which certain
values are extracted for further processing and
storing true false

For small to medium sized systems, individual


modules are coded and individually tested and then
assembled to be tested as a whole-the testing
strategy is referred to as ___________________ e-brain bouncing ball big-bang
In systems testing, test
involves_________________ bottom up tests top-down tests hybrid tests
Recording transactions in a controlled manner may
amount to loss of stored data yes no
re-perform
procedures
provide carried out by
read data on information to the clients
Audit software is used by the auditor to _________ client's file the audit programs
Core image comparison is a software used by the
auditor to compare _______ version of a program executables,
with a secure ________ copy master deleted, hard none of these
Database analyzer is a software which provides
detailed information concerning the operation of the
database true false
system
system analysis advanced
SAS stands for ______________ software software all the above
Embedded code is a software used by the auditor
to examine backup data true false

Embedded code performs wide variety of audit task yes no


Core image comparison is particularly useful where
only executable versions are distributed true false
Log analysis is a software used by auditor to detect
virus true false

On line testing techniques the auditor ______ data


either _______ or fictitious in order to see that a manipulates,
specific program or sever edit test is doing its work real create, false none of these
Mapping software is used by the auditor to list
unused program instructions true false
Mapping software has very objectives yes no
can enable the can provide the
auditor to auditors with
execute useful
can be very provisions on a information with
Modeling is a variety of software which powerful number of trend s and
________________ analytical tool different bases patterns
On line testing can be targeted for specific functions
carried out by programs yes no

examination of
identifies source code of
program code a program with
which may be advice to
provides detailed there for following the
information of fraudulent logic of a
Program code analysis involves _____________ machine uses reason program
__________ is a software of CAAT IDEA ACL ALC

Snapshot is software which takes a picture of a file


or data or a transaction passing though the system true false

fictitious data comparison of


applied against source version analyzing the
Base case system evaluation the client of a picture of a file
includes____________ program programmed or data
While base testing forces on finding if there are any
defective execution policies in a program true false
Black box testing seeks to determine whether
application output is what it is supposed to be true false

In integrated test facility approach the auditor


should ensure that the impact of test transaction is
subsequently eliminated from the computer files true false
Black box testing is _______ based and white box specification, none of the
testing is _______ based program file, hardware above

identifying identifying identifying non-


Source code review means__________ erroneous code ineffective code standard code
In formula in flow hypothesis the auditor should
expand the extent of substantive tests to determine
how the defects may impact the attainment of the
program objectives true false
All material application oriented events that occur
within the boundary subsystem should be recorded
in the accounting audit trail true false
authentication of
In examination of audit trail the following data start and finish information resource
associated with an event may be ___________- time support requested

job control job connectivity


JCL means_________________ language language all the above
Audit should be periodically analyzed to detect any
control weakness of the system yes no
In an accounting audit trail, intrusion detection
system might monitor the amount of processor time
consumed by the user to detect unusual deviation
from the amount processor time requested by the
user in the past true false
A sample size calculator program assists auditors
in determining RAND() function true false

package
computer
p[program for
performing a
variety of data
processing mathematical master list of
Generalized audit software consists ___________ function concept transactions
prepared by an
outside
programmer
prepared by the prepared by the engaged by the
Specializes audit program may be___________ auditor entity auditor

Generalised audit software could be used by the


following in consistencies or significant fluctuations true false
file stratification and
Generalized audit software function access/organizati statistical/arithm frequency
include____________ ons etic operation analysis
In the file reorganization merging capabilities are
needed in data from separate file is to be combined
on a separate work file true false
Auditors cannot use generalised audit software to
extract the data needed for audit purpose true false
Auditors can combine functional capabilities of examining the
generalized audit software to accomplish the task of quality of system carrying examining the
__________________ process analytical review quality of data
Wide access to
various data Can extract and Can aid in
Which of the following is not the feature of GAPs base analyse data simple selection

Which is the example of CAATs ACL IDEA High End CAATs


A special
A sample of A utility software purpose written
In audit procedures, test data is transactions programme program
Compliance
Tests of details Analytical review tests of general
Which of the following is not the use of CAATs of transactions procedures EDP controls
Which of the following are called explicitly by Action Event
another procedure? Macros Procedures Procedures
_________ data type is generally used for fields
assigned as primary keys in a table integer number primary number
MS access objects can be published in the web true false
In code-builder, got_focuse, click,dbl_click,enter are
examples of _______ actions events procedures
_______can be used to automate certain actions in
response to events report form chart
In the macro sheet the macro is selected in the expression
_____field macro elements comments
expression
To build complex expressions_____is used calculator code builder builder
expression
The three list boxes present at the bottom of the elements list
expression builder are called_____ action list macro list box
________option is selected from the view menu to
create macros with conditions conditions action insert
_______report can be created with minimum user
input tabular columnar auto report
_______layout of a form displays one record at a
time tabular columnar datasheet
The table or query name on which we are going to
build our report is selected from the ____ dialogue
box create report link report embedded report
______and_____are the two types of auto reports columnar and stable and dynamic and
available tabular unstable static
There are no wizards for creating a database in
access true false
______option from the insert menu option is
chosen to add an embedded chart create fields add chart chart
In ms-access, while using SQL, references
constraint is used for creating _______ primary key alternate key foreign key
_______is used to create a mailing label label wizard chart wizard mail wizard
______header is present at the beginning of the
report start header group header page header
______is present at the bottom of each page in a
report report footer page footer group footer

for specifying
conditions with
for ordering for updating group by
In SQL, having clause is used for _________ records records clause
______field is added to the macro sheet when we
select grouping option from the view menu condition group macro names
______can be used to create toolbars VB Modules reports forms
_______query is used to add records from one or
more tables into an existing table add append insert
_______window is used to write VB code in access
application report macro sheet module
Values for other tables, queries are maintained in
look up fields data type true false
Visual Basic language is a _____ tool RAD RAP RAID

______ function is used to display a message box SysCmd MsgBox message


Other ms-office applications can be accessed from
ms-access using a concept called ________ OLE DDE CME

object linking on line


OLE stands for_____ and embedding execution on line editing
The application that supplies data in OLE is called
an _________ OLE object OLE client OLE server
If any change made on the object from the client
side is reflected on the server then the object is said
to be _____ linked embedded connected
_______is the file format that works on internet exe DLL BMP
______ is used to convert any ms-access object
into html format form wizard report wizard query wizard
_______ option in publish to web wizard produces a
page that is static in nature static file static html dynamic file
_______query is used to create or change
database objects in a current database append add insert

Currency fields express the amount in _________ dollars rupees pesos


_______is selected from the toolbar to add an OLE
object unbound object bound object command button
To display an OLE object in the form of an icon
____ option is selected from insert object dialogue
box display as icon display link
_______option from the file menu is selected to run
'publish to the web wizard' create html new save as html

_____page in an web application is used to


navigate to the rest of the pages in the application startup home end
______ is fired when an event is triggered is the
concept based on a Visual Basic language bullet command procedure
Ms access is a ___________ DBMS RDBMS front end
A collection of data stored in different objects is
known as a _________ data group data collection database
new blank
A blank database can be created using database dialog new database
__________ new dialog box box dialog box
Text type data can be of _____ characters in
ACCESS 255 64000 235
______is a datatype that assigns values automatic
automatically number AutoNumber number

Tables cannot be imported from other databases true false


If two tables having same values for the fields are
joined it is called an ______ inner join outer join explicit join
Duplication of records in a field won't be allowed if
the fields are declared a________ primary key not null candidate key

Changes from a master table can be reflected on to cascade delete cascade change cascade update
the child table by selecting _____option related records related records related fields
To see more than one record at a time in a form we
use _______ columnar tabular both a and b
In SQL, delete command is used to remove record or
_________ table or tables query or queries records

In MS-Access, filter excluding selection will display


only those record(s) which meet the criteria. true false
Properties of the fields are managed by _____ in Dynaset field
Dynaset property field field property properties
______queries allows us to view data in row by crosstab row/column
column manner queries queries select queries
The type of queries that can update or delete row/column change/delete
record(s) in a table(s) are called __________ action queries queries queries
Joining tables without any matching values in the
fields is called ____________ inner join self join no match join
Primary key uniquely identifies each record true false
Which of the following dialog box is/are used in the new form dialog form create form wizard
creation of form ________ box dialog box dialog
_______ query wizards are used to generate
summary calculations for a table summary sum append
Properties of a form can be changed by selecting change
______from view menu options properties properties form properties
Forms that are included in other forms are called
______________ included form sub form new form
In MS-Access, while using form design view, for
creating a command button for adding a new
record, we should select the _______ category from Record Record
the command button wizard Navigation Operations Form Operations
_______ form displays fields in a single horizontal
row columnar form tabular form hierarchical form
The process of arranging the data in a meaningful
order is known as ___________ filtering ordering sorting
______ are used to select only some particular
records from the table or any other database
objects filter sorts pipes
In MS-Access, user may specify criteria for filter in filter by
form view using _________ filter by form selection filter by menu
___wildcard character represents any single
character * $ @
Records cannot be sorted by a primary key true false
A control without a data source is known as unbound
___________ bound control control data less control
Set of related option buttons, check boxes and
toggle buttons is known as _____________ button group option group controls group
Which of the following is control types
____________ bound unbound controlled
In MS-Access, the function that gives the current
date is _____________ CURRDATE() TODAY() DATE()
_____is a control that lists set of data text box list box combo box
______is a form that summarize large amount of
data pivot table columnar form tabular form
______allows to create a filter by typing the value in
a data sheet data sheet filter filter by input filter by form

Wizards for toolbox controls are called a option control


__________ button wizard control wizard wizard
The wild card representation for any 5 letter word
that starts with ram is ________________ ram* ram?? two of the above
Look up fields slow up data entry true false
____is an access object that displays un-editable
data report form table
_____option from the new object toolbar gives the
easiest way of generating a report autoreport report module
______ represents data in a pictorial format chart label bitmap
Changes of one table can be carried over to
another related table true false
Hyperlinks are used to jump to any kind of
information or data from a file true false
The memo field can have text upto_____
characters in length 60,000 255 25,000
In MS-Access, columnar layout can be used to view
multiple records in a form true false
In MS-Access, alter command may be used in
adding a primary key to a table true false
Update query is used to add records from one or
more tables to the end of an existing table true false
In ms-access, datasheet view is available in
___________ table query form
______are used to jump to any kind of information
from a datasheet or a form table form report
Home page will always be present as a first page of
an application true false
Make table queries create a new table from the
records of another table true false
In ms-access, to protect a database file from illegal
access, we may set database password. The option
of setting database password is available in
_______ menu Insert Records Tools
Foreign key is a field that uniquely identifies each
record and accept no null values true false
Data definition queries are used to create or change
database objects true false
The attributes of a composite key are known as
________ alternate keys composite keys candidate keys
OLE object is a data type in access true false
Data displayed in forms cannot be edited true false
A sub form is used to display one to many
relationship between tables true false
We can switch from datasheet view to form view by
selecting view -> form view option true false
In MS-Access long integer is a datatype true false
In MS-Access, while designing a table for a
particular field, the Required parameter is set to
yes. This validates the field as _______ null not null zero
Sorting is applied to select only some particular
records true false
Filter by form can be created from a forms shortcut
menu true false
Advanced filter uses a filter similar to the query
design window to create a filter true false
? Wildcard character represents any number of
characters true false
_________ of the following is/are a type of chart pie bar both 1 and 2

A bound control is tied to a underlying query or table true false


A calculated control uses expression as a source of
data true false
Text boxes cannot be bound controls true false
The default query invoked by ms-access is update query select query delete query
A control can be bind to a record using row source
property true false
List box is a control that offers a list of choices true false
If a table is joined to itself it is called a
________________ inner join outer join self join
A picture box combines the activities of both a text
box or a list box true false
Line is a tool box control true false
Text boxes can be part of a option group true false
_____ chart exists as a separate object freestanding embedded stand alone
Filtering data is a way of arranging data in a
meaning full order true false

Wild card characters are used for sorting records true false
Pivot tables are used to navigate to the other tables
in a database true false
Reports are used to represent un-editable data true false
In MS -Access, the records in a table are sorted the first field of the last field of
based on _________ the table the table primary key field

Relationship is an association between _________ forms reports attributes


Summary options dialog box is used to summarize
data true false
______ queries can be used to delete a group of
records that meet some specific records delete insert append
Charts can convert numerical data in a easily
understandable format true false
Embedded charts exist separately true false
From ms - access, if we want to view the records
stored in a table in ms - excel worksheet, we need use datasheet in
to use hyperlink use import forms
Page header is present at the beginning of each
record true false
Detail section has a header and footer true false
A macro is performed only when the user initiates
an event true false
The macro is selected from the action field of a
macro sheet true false
A macro can be made to execute before the
starting of a database true false
In MS-Access. While appending records, the
source and the target table must have similar
structure and fields true false

We can add our own functions to the expression


elements list box of the expression builder true false

_______is the wildcard character which represents


the presence of any number of characters & # ?
Macros can be used to add a menu to a database
object true false
_____ header is a unique feature of reports page detail group
Chart can either be a form or a report true false
Group header will be present at the design view of a
report even if the report is not grouped true false
We can change from the design view to the form
view without being prompted for saving the changes
made true false
Charts can be produced without the wizard true false
Macros can be used to create user defined error
messages true false
Between and Not Between is ______ type of
operators relational list range
The default data type of VB is integer true false

event -
structured query procedural
Visual Basic is based on __________ action language language based language
_______is the name of the database object that
displays data and can be used to edit data report form query
In access OLE objects cannot be linked true false
_____ section is present for each record in the
report group record session
A ________ sheet lists all the properties that
pertain to the form or the controls data property both a and b
Textboxes can also be an example of unbound
control true false
In MS-Access, we may design command buttons
for navigating records true false

_______are forms that are included in other forms sub forms child forms inner form
_______ are used to represent our data in graphical
format graphs chart labels
A field with a _______ uniquely identifies each
record number primary key index
Large amount of data can be summarized using
______ tables pivot create form
_______ are employed to select only some
particular records from a database object filters queries sorts
______ control need not have a data source form bound unbound
______ control combines the functionality of both a
text box and a drop down list list box combo box button
MS access is a DBMS true false
A form can be bind to a record source using _____
property of the form form name control record source
______ forms displays field in single row tabular form chart form data sheet form
______ forms are usually used for tables with one
to many relationship sub forms tabular form columnar form
_______ control uses an expression as a source of
control calculated bound unbound
_______ control is tied to field calculated unbound bound
_______is the form that can be created with
minimum input from the user sub form auto form tabular form
______option from the tool menu is selected for
setting relationships between tables set relation connect relationships
option, toggle command
______,______and_____are the buttons belonging and command button, check list, check and
to the options group buttons and list boxes combo boxes
_________allows us to create a filter from a field
short cut menu filter by form filter by report filter by record
________is a database object which displays data
but cannot be used to edit data form report macro
What term applies to a collection of related records
in a database? clipboard file field
All of the following terms are related to
computerized databases except which one? search sort field names
An organised
A way to analyse A tool to way of storing
and manipulate produce high information
numerical quality about a set of
What is a database? information documents similar things
It contains all
the data about A document
Information about one specific which contains
What does a record contain? certain programs item text

An RDBMS is a remote DBMS relative DBMS Relational DBMS


storing data
offline at a backing up data is related to data
Data Warehousing refers to separate site regularly mining
Computer
Unauthorised alteration of on-line records can be sequence Computer
prevented by employing Key verification checks matching
Reports allow Reports provide A tool which
users to extract a very flexible allows text and
information as way of creating graphics to be
hard copy and editing placed in
What is a report? (printed output) documents documents

Spreadsheets
Extracting and make data easy
What is the best way to analyse and change data analysing data to analyse Using queries

Word
Compilers, Network processors,
What are some popular office orientated software interpreters, software, spreadsheets,
applications? editors backup systems databases, DTP
DEFAULT and PRIMARY KEY
Which of the following constraints can be used to NOT NULL FOREIGN KEY and UNIQUE
enforce the uniqueness of rows in a table? constraints constraints constraints
Which of the following commands is used to
change the structure of table? CHANGE TABLE MODIFY TABLE ALTER TABLE

You are creating a client application that calls


ActiveX DLLs. Which of the following properties of
the Err object provides the name of a component
that sends an error back to the client application? Number Description Component
keeping the
This database holds personal information. The user keeping a original paper
can help to keep it confidential by using a password backup copy copy
If the database holds customer names and
addresses, personalised letters can be created
automatically using the product code the primary key mail merge
Application software suited to storing the survey
information obtained in the table would be A database Graphics browser
The characters * and ? are sometimes used in
search criteria as bookmarks operators wildcards
Which of the following field types will generate the
primary key automatically? Auto Primary Auto ID AutoNumber
forms in a
records in a database are
dynaset are related tables in consistent with
consistent with a database are the underlying
the underlying consistent with tables or
Referential integrity ensures that the: tables. one another. queries.
query and its
main form and a associated
Tables are related to one another through a: foreign key. subform. dynaset.
the primary key the primary key
of both related of the related a field from an
A foreign key is: tables. table. unrelated table.
You are creating a banking database to track
customer loans. The bank will, of course, have
many customers, each of whom may take out one
or more loans, while each loan may be associated
with only one customer (there are no joint
accounts). What is the re One-to-one One-to-many Many-to-many

In a one-to-many relationship between Companies EmployeeLastNa


and Employees, which field is found in both tables? EmployeeID CompanyID me
Which of the following ensures that records in
related tables are consistent with one another? For The Tools menu,
example, it ensures that you cannot add a record Relationship Referential
with an invalid foreign key. window integrity The join line

Right-click the
Relationship Select Undo in
line, then select the
How would you delete a relationship between tables Double click the Delete from the Relationships
in the Relationships window? Relationship line shortcut menu pull-down menu
That there are
several
customers That some of That there are
In a Customers tables, what does a plus sign next associated with the data is not records in a
to the CustomerID field mean? that ID viewable related table
They cannot be
They must both They cannot be AutoNumber
What is required of the fields that join two tables? be numbers text fields data types

The customers
ID is deleted
Assume a one-to-many relationship between the from the
Customers table and the Loans table, with The customers Customers table,
referential integrity in effect. What happens when Nothing, Access ID is deleted and all the
you attempt to delete a customer ID from the ignores the from the related loans are
Customer table that still has entries in the Loans attempted Customers deleted from the
table? command. table. Loans table.

Which of the following is true when viewing a main The subform is The subform is
form and its associated subform in the Form Design The subform is displayed in displayed in
view? not visible. Datasheet view. Form view.
A one-to-many
A one-to-many A one-to-many relationship
Which of the following relationships does not relationship relationship between
belong in a database based on a professional between teams between teams coaches and
sports league such as football or basketball? and players and coaches teams
Which symbol is used at the end of the join line in a
related table to signify the many side of a one-to-
many relationship? # M
The Customers
table only when
You have created a one-to-many relationship with there are Loan
referential integrity between a Customers table and records
a Loans table. From which table can you delete a Either table at associated with The Loans table
record? any time that customer at any time
The correct order of the arguments for the MsgBox prompt, title bar prompt, icon, title bar text,
statement is: text, icon. title bar text. prompt, icon.
The first statement in a procedure named
CreateList is: Dim CreateList. Sub CreateList. CreateList.

A check box A text field


enables the form enables the A drop-down list
user to choose form user to enables the user
from one of choose from to choose from
Which of the following is TRUE related to form several existing one of several one of several
fields? entries. existing entries. existing entries.
must be set for must be set for does not have to
A text field: one word. multiple words. be set.
create tables of
help people keep store data in rows and
The purpose of a database is to: track of things. tables. columns.
A database stores: data. relationships. metadata.
A database records: facts. figures. information.
single-user multiuser e-commerce
A sales contact manager used by a salesperson is database database database
an example of _______________ application application application
single-user multiuser e-commerce
A Customer Resource Management (CRM) system database database database
is an example of_________ application application application

The industry standard supported by all major Structured


DBMSs that allows tables to be joined together is Sequential Query Question Structured Query
called __________. Language (SQL) Language (SQL) Language (SQL)
Database
A program whose job is to create, process and Database Management Data Business
administer databases is called the _____ Modeling System System Model System
Microsoft Access may use which of the following
DBMS engines? Jet SQL Server Oracle
The database
Which of the following are basic components of an The database management
enterprise-class database system? The user application system (DBMS)
the database
application(s) the DBMS
interact(s) with accesses the
In an enterprise-class database system ________ . the DBMS database data None of above
In an enterprise-class database system, the
database application ___ . creates queries creates form creates reports
the database
In an enterprise-class database system, reports are the database management
created by ____________________ . the user application system (DBMS)
it contains a
A database is considered "self-describing" because all the users' data it reduces data description of its
_______ . is in one place duplication own structure
In an enterprise-class database system, the
database _________ . holds user data holds metadata holds indexes
as a new
A database designed using spreadsheets from the systems as a redesign of
Sales department is a database being designed from existing development an existing
_________________________ . data project database
A database designed to implement requirements for as a new
a reporting application needed by the Sales systems as a redesign of
department is a database being designed _______ from existing non- development an existing
. database data project database
as a new
A database designed to combine two databases systems as a redesign of
used by the Sales department is a database being from existing development an existing
designed _________________________ . data project database

Database professionals use ________________ as


specific data sources for studies and analyses. data marts normalization data models
Database professionals use a set of principles
called ________________ to guide and assess
database design. data marts normalization data models

A very popular development technique used by


database professionals for database design is
known as _______________________ . data marts normalization data models
A very popular development technique used by
database professionals to adopt a database design entity-
to new or changing requirement is known as _____ relationship data
. data marts normalization modeling
The predecessor(s) of database processing was hierarchical
(were) __________ . file managers models network models
entities in a the order of the the order of the
column vary as columns is rows is
In a relation __________________________ . to kind important unimportant
An attribute is also known as a(n)
. table relation row
A combination of one or more columns used to
identify particular rows in a is___ . record field key
A combination of two or more columns used to
identify particular rows in a relation is________ . record field composite key
A determinant that determines all the other columns
in a relation is______ . record field foreign key

When designing a database, one of the candidate


keys in a relation is selected as the _________ . composite key primary key foreign key
Normalization is a process used to deal with which Insertion Deletion
of the following modification anomalies? anomaly Update anomaly anomaly
assess the
When you are given a set of tables and asked to existing tables' design the
create a database to store their data, the first step structure and database create one or
is to ____ . content structure more new tables
are supplied by
several well- were essentially
Modern microcomputer personal DBMS established killed off by MS have poor
products______. manufacturers Access response time

Their report
delivery is more
They use difficult than
sophisticated report delivery
Which of the following are true about data mining mathematical for reporting Nonintegrated
applications? techniques. systems. data
We have obtained access to the company's
operational data. We examine 50 records for
customers with phone numbers that should use the
current area code of 345. Of these 50 records, we
find 10 that still use an older area code of 567. This inconsistent nonintegrated
is an example dirty data data data

We have obtained access to the company's


operational data. We have been asked to produce
a report with an item by item analysis of sales, but
the only sales figure available is the total sale value inconsistent nonintegrated
for each order. This is example of_____ dirty data data data

data warehouse
data warehouse databases do data warehouse
A data warehouse database differs from an data are not not have data are often
operational database because: stored in tables. metadata. denormalized.
Which of the following objects is used to display a
menu? Form Table Report
Which of the following objects are NOT found in an Forms and Queries and
Access application? reports tables Macros

It will be easier
It will be easier for the user to
for the user to upgrade it if the It is advisable to
upgrade it if the objects are in put each object
You are developing an Access application that you objects and one database and table into a
expect to upgrade periodically. Which of the tables are in one and the tables in separate
following statements is TRUE? database. another. database.
An application
may consist of
The Link Tables multiple
command can be databases, each
used to associate with multiple All objects in an
the tables in one objects, linked application,
database with to yet another including the
the objects in database tables, must
Which of the following statements regarding Access another containing only reside within the
applications is NOT true? database. tables. same database.
Which of the following brings a copy of the table
into the current database and does not maintain a
tie to the original table? Import Link Merge
It contains
tables, reports, It contains a user
It contains more queries, and interface, or
What makes a database an application? than one table forms switchboard
What is the Access tool that is used to create the Interface Design
user interface? Menu Wizard Build Menu Wizard

put key business


create backups information into
for mission centralize the the hands or
critical corporate manageability of more decision
The purpose of a data warehouse is to: data. data collection. makers.
___________ means the result of applying to
specific information certain specific technical Digital
processes. Digital Sign Certificate Digital Signature
__________ is an algorithm which creates a digital
representation or "fingerprint" in the form of a "hash
result". Hash Function Digital Signature Digital Certificate
__________ is of standard length which is usually
much smaller than the message but nevertheless
substantially unique to it. Hash Function Hash Value Hash Result

Digital Signature involves two processes. They are Digital Signature Digital Signature
___________ and __________. creation Verification Both A and B
Institutional
Overhead and
Subscriber Subscriber
The Costs of Digital Signature consists mainly of Relying Party Relying Party Institutional
the following Cost Cost Overhead
Certification Certified Certificate
CA stands for ________________ Authority Authority Authority

A Digital Certificate is issued by a Certification


Authority and is signed with the CA's Private Key True False

A Digital Certificate does contain Owner's Public


Key, Owner's name, Expiration date of the Private
Key, Serial number of the digital certificate True False
______________ enable web servers to operate in Developer Personal Digital
a secure mode. Server Certificate Certificate Certificate
______________ are used by individuals when they
exchange messages with other users or online Developer Personal Digital
services. Server Certificate Certificate certificate
______________ are on-line databases of
certificates and other information available for Private
retrieval and use in verifying digital signatures. Certificate Repositories Public Key

Evidence, Efficiency and


Signing Writings serve the following general Ceremony, Approval, logistics,
purposes______,_______,_______ and _______ Approval Evidence Evidence
The most widely accepted format for Digital
Certificate is defined by the CCITT X.509 True False

A certificate may prove to be unreliable, such as in


situations where the subscriber misrepresents his
identity to the certification authority True False
certificate
Certificate Certificate Revocation
CRL stands for Revocation List Resource List Letter
The prospective signer identified in the digital
certificate holds the_________ and is called the Private Key, Public key, Private Key,
___________ Subscriber Recipient Recipient
In EDI interface, the translation service receives
_________ as incoming files from the Internal Format External Format Transmission
communication service File File File
The EDI standardisation for International Trade and
Commerce is introduced by __________ ANSI UN/EBCDIC UNESCO
In EDI, the transmission files are composed of
different sets of external format files which are
grouped into multiple sets under the name of
________ batch files interchange sets functions
The ________________ are pre-paid credit cards Embedded
that include an embedded cards Smart Card cards SET
________________ are another form of credit
payment that lets customers use digital online
cheques to pay Web merchants directly E-cash Digital Cash Smart Cards

In Active advertisement, there are two types of Billboards and Online Catalog Broadcast and
models. They are _____ and ________ Junk Mail and Billboards Junk Mail
The network based technology is/are
____________ EDI E-mail EFT

Decryption is a process employed for scrambling of


plain text for web based transactions True False

Asymmetric cryptosystem is based on __________ Login_Id and Primary Key and Public Key and
and ____________ Password Private Key Password
Satellite Area
Value Added Network is an example of _________ Global Network Private Network Network
Active or push Passive or pull- Glow sign or
The advertising strategies emerging in the on-line based based hoarding
world are ____________ advertising advertising strategies
The _________ model use direct mail, spot
television or cable television, in active based
advertisement. Broadcast Junk mail Billboard
The ________ is a form of mail that is not targeted
to a specific audience E-mail Bulk-mail Direct-mail
The __________ model refers to information that is
placed at a point where it will be noticed by
customers in the course of other activities and does
not require active search Catalog Endorsement Billboard
Low cost of
The most beneficial advantage of ERP system is Error checking Data Integration operation

What is the term that describes spying on ones Competitive Corporate Industrial
business rivals to gain a competitive advantage? espionage espionage espionage
Contact
A list of numbers of the
What would you NOT be looking for when spying on competitors management
a competitor? clients group Research data
single-user multi-user e-commerce
An online drugstore such as Drugstore.com is an database database database
example of_______ application application application

Which of the following is an example of Replying Keeping Including the


unacceptable online netiquette? promptly messages short Subject

Removable Message
drives that can authentication in Encryption
be locked up at EDI systems performed by a
night provide performs the physically secure
adequate same function hardware device
security when the as segregation is more secure
Which of the following statements is correct confidentiality of of duties in other than encryption
concerning the security of messages in an data is the information performed by
electronic data interchange (EDI) system? primary risk. systems. software.

The wizard that is used to import text files text import convert text to
is_________________ wizard columns wizard tip wizard
The alphabet indicating the column followed by the column
row number is known an__________ cell reference row reference reference
Which of the following files could not be opened in quattropro or
excel _______________ text files Lotus 1-2-3 xbase files
In excel, the dates that are stored as sequential
numbers known as ________________- serial values domain values range values
The command to display the current date in a cell is
_________________ =today() =date() =currentdate()

In excel, absolute references are represented by a


________ before the column and row addresses dollar sign ' = ' sign # sign
The ________ can be used to select the function
and assemble the arguments correctly AutoSum AutoFill function wizard

Specific parts of information required by functions


to perform certain tasks are called as___________ variables arguments parameters

Which of the following do not belong to the formula


category in excel environment__________ text logical numeric
The function that in used to join cell values together
in a single cell ________ concatenate pmt merge
The function that is used to count all the values that
meet specific criteria _________ countif vlookup pmt
The wizard that is used to create and edit charts convert text to
_______________ pivot table wizard chart wizard columns wizard
The function that is used to calculate the payment
for specific loan terms ____________ sumif pmt countif
The function that is used to add together all values
that meet specific criteria is known as
____________ average sum sumif
The __________ option present in the file menu
options is used to specify major facts of the page to
be printed page setup print area print
The command that is used to apply a format none of the
automatically __________ autoformat AutoFill above
The ____________ makes the information in a
worksheet meaningful and easy to understand bordering formatting shading
A particular part of a work sheet can be printed by
setting the _________ page setup print area print
The process of finding or selecting information is
known as ____________ filtering searching sorting
The option that is used to cancel the filter process
for a specific column and display all the records is
________ all option blanks all blanks
www.encybrit.co
The URL for encyclopedia Britannica is_________ www.ency.in www.eb.com m
_______ maps IP addresses with the domain
names of the sites URL DNS FTP
network of intermediate
Internet can be defined as _______ internal network network network
The most important service of the ______ is to
manage traffic control application layer transport layer physical layer
_________is a program that displays information
about a host connected to the net finger service ping service ftp service
_______ is a program or a tool that helps in locating
a file anywhere on the net FTP TELNET ARCHIE

uniform research uniform unlimited restore


URL stands for ____________ locator resource locator locator
IN an URL the word before the color refers to name of the
_______ host computer resource scheme
A ______ always begins with a slash message scheme command line
Prodigy is run by IBM and ______ Delphi Microsoft sears
The World Wide Web is referred to shortly as the
_______ net web browser
read the Usenet search for
Gopher and WAIS enables the user to ______ browser news database
______ is the program used to run CompuServe's CompuServe wincim or
regular services internet dialer spy mosaic maccim
Navigating through the menu of gopher is called
moving around _______ gophering gopherspace cyberspace
The directories that come with built-in engines are
yahoo,lycos and ______ Alta vista open text excite
To use the finger command,SLIP users must run a
programme called______ finger server ftp server web server
The web maps are called _______ list directories image list

Directories consists of _______ levels no maximum of five one


The _____ level gives the broadcast overview of
the net middle lower top
The huge list of keywords from important items is
called ______ hotlist directory index
directory index menu
The two types of search in veronica are _____ and search,index search,menu search,item
______ search search search
_______ searches by keywords infoseek excite lycos
Mosaic displays links in color whereas _____ does
not display links in color netshark cello lynx
______ supports one button publish lynx mosaic Lycos
SPY MOSAIC is distributed by_______ Microsoft internet IBM
______ is a program that helps us to log on to other
networks Usenet finger service ftp
Hyper text
Higher text transmission Hyper text
HTTP is the acronym for __________ transfer protocol port transfer protocol
______is used to transfer and copy files over the
internet iccp ftp uucp
_____ is a program that helps us to log on to other
networks yahoo ftp telnet
transmission transfer
control communication
transfer control protocol/internet protocol/internet
TCP/IP stands for ________________ protocol/internet protocol protocol
Archie servers can be accessed in_______
different ways in internet one two three
_______is the computer on the internet that
translates between the internet domain names and domain name
the internet numeric address ftp servers servers web servers
the internet the internet the internet
TIA stands for_____ in internet adapter administration access

Service indicates the name of the ________ used


to access data, present on the other end of the link. browser protocol site
________ is used to link pages in the world wide universal uniform uniform resource
web resource locator resource locator label

frequent asked frequently asked frantically asked


FAQ stands for ______ query question question

The internet adapter is a programme that makes


our connection act like a _____or a ____ account SLIP,PPP TCP,IP IP,UDP
The step involved in Communicating between the
web clients and servers is ______________ connection response request
windows
wide search for sockets world search for
information and internets relay information and
WSIRC stands for______ research chat research council

Two of the important browsers are_____ and_____ lynx,minx netscape,ie mosaic,gopher


Lynx is a _______ programme that works with world wide web world wide web
terminals server client interface
The huge list of keywords from important items is
called an_____ glossary index hotwords
very easy and very organised
rodent oriented network verification on
net wide index to integration and network
computerized communication integration and
VERONICA is an acronym for _______________ archives application communication
university of university of
The first freenet is created at the_____ and is berkeley,berkeley cleveland,clevel university of
called______ freenet and freenet California net
________ are defined as ways of communication
amongst networks protocols IP address dns
search
engines,directori
______and_____ are web searching features es ftp and finger telnet and ftp
WINWAIS has two source lists namely____
and______ allsrc,winsocks wais,allsrc wais,winsocks
________ is also called as WAIS manager allsrc waisman winsock
The system of interlinked documents is known
as_______ hot links hyper text books marks
The small programmes that create
animation,multimedia,real-time games and multi
user games are called______ images applets animation
The information displayed on the web page graphics,videos,a programms,ima animation,scripts
includes______,_____ and_____ udio ges,text ,executables
The web pages that represent online home of their
author are called______ first page home page welcome page

global network global networks grand network


GNN stands for______ news navigator news
_____ is the most popular internet service yahoo service electronic mail search engines
Netscape page
starter
The online service offered by navigator gold 2.0 are email and net site,netscape yahoo and
_______ and_____ conference page wizard altavista
_______ is a program or a tool that helps us find a
file anywhere on the net newsgroup telnet ftp
The databases to enable keyword search using
Lycos are a2z,_______ Lycos catalog point review all the above
______ is a large worldwide bulletin board service
network apple link bitnet Delphi

computer related
abbreviations biographical
BABEL consists a glossary of _____ and acronym information bookstores

Dictionaries,encyclopaedias,government and other encyclopedia on-line


references are found in ______ Britannica reference works more information

Yahoo,lycos,excite and webcrawlers are _____ search engines web directories database
Graphical Graphical
interpreter interchange Graphical
GIF is the acronym for ____________ formatting Format interface format
Jumbled
Joint Pictures pictures expert Joint pictures
JPEG is the acronym for ___________ Expert Group graph expert graph
The Web aids users to explore the ________ mails documents net
The three most popular mailer are_____,_____ yahoo,infoseek,al eudora,netscape
and______ tavista netscape,ie,lynx and pine
network
The World Wide Web consists of _________ information web pages connections
In Microsoft Internet Explorer, the color of the text
can be specified using _________ attribute of the
font tag. BACKGROUND COLOR FCOLOR
The interface that provides effective communication Common Communication
between the web browsers and servers is Communication graphical graphical
_________ gateway interface Interface interface
CGI is the _________ between web browsers and
servers Network Interface Communication
CGI programs are invoked based on the Current web
information provided by the _________ page Browser Client
A CGI program is usually called after a request
made by the _________ Browser/user Server Web

A hyperlink can be on ___________ text only image only text or image


HTML was derived from _________ SQL PLSQL SGML
SGML is a _________ alphalanguage betalanguage metalanguage
palm is not pancake is not
PINE stands for _____________ eatable palm is not elm edible
The application that confirms whether a document SGML
is compliant to its DTD is _________ SGML Processor Preprocessor SGML Parser
Web is a collection of ___________ web sites images applets
International
Internet Engineering Internet
equipment trainers and Engineering
IETF stands for ________ training faculty faculty Task Force
MS Internet
MS Internet Netscape Explorer and
The two major browsers used to surf the Internet Explorer and Navigator and Netscape
are ________,_______ Mosaic Mosaic Navigator
Special characters allow browsers to display data from a
_________________ text database symbols
The keyword for providing links within or across
documents is____________ hyperlink hypertext hotword

Stringing pages together using hypertext technology in sequential in user-defined


helps view pages _______________ in random order order order
The initial web pages present in a web site is the
________ page. first start home
The image format supported by most browsers
is________________. .bmp and .gif .bmp and .jpeg .gif and .jpeg
Service, service,hostnam
hostname and e,port,directory- service,port and
The components of a URL are ___________ directory path path directory path

mail servers,mail mail mailing lists,mail


clients and vendors,mail server robots
The mail we send has a mailing address and most alternate identification and gateways to
of them correspond to_____,_____ and services and password other services
Which of the following is not supported by internet
explorer _______________ <center> <font size=n> <hr size=n>
communication common classified
generated gateway general
CGI stands for ____________ information interface instructions
Host name indicates the domain name of the web
________ Server Client Browser
The internet is also called as _______________ arpanet the net intranet
peer-to-peer
The internet is similar to _________________ LAN connectivity wan

The net drivers______ from one place to another data parcel packets
email,file
The net provides interesting services scripting,parsing news,cooking retrived,internet
like______,______ and______ and compiling and fine arts tools

The windows internet software available nt,windows95,ie, mosaic,gopher, communicator,ie


are______,_______,________ and______ winzip eudora,trumpnet ,lynx,winsock
________ is the ancestors of the internet dnet arpanet ARPANET
defensive
defensive advanced
administrative dedicated and research
DARPA stands for rank registered projects
_________________________________________ administration projects administration
______ network administration net
The uuencode files start with a _______ start begin first
milnet,smaller
DARPA is broken into ________ and _______ arpanet mailnet,inet intranet,extranet
NSFNET is the united states provides service to education,resear music and cooking and
_____ and_____ ch dance dining
The first international IP network connections were united states and united states &
established in 1973 with _____ and_____ UK england,norway Russia
A_____ is a set of computers interconnected by
transmission paths to exchange information in
internet server client network
A computer that provides a service usable by other
computers is called______ client stand-alone servers
A_______ is the representation of physical network network
connectivity of the computers in internet network card topology redirectors
detailed
transaction data terminal data target
DTE stands for ____________________ explanation equipment equipment
The basic function of the ______ is transmitting the
bits over a channel application layer physical layer network layer

point to point packet


network and switching,store smart network
The point to point channel network is also called as broadcast and forward and dumb
_____ and_____ channel network network network

Accessing files using FTP servers is called_____ file access anonymous ftp file transfer
The three most commonly used networks
are______,______ and______ PAN,NAN,AAN KAN,RAN,VAN LAN,WAN,MAN
________ is in between LAN and WAN VAN MAN TAN
_____ can be owed by multiple organisation LAN MAN WAN
Data is transmitted in the form of_____ signals analog digital non-digital
Data type Define type of Document type
DTD stands for __________ definition data definition
Moralize/demoral Modulation/dem Manipulate/dem
Modem stands for __________________ ize odulation anipulate
______ is the process of the digital signals being
converted into a form suitable for analog
transmission Mapping Modulation Manipulation
Dedicated
________ and______ are two basic ways of getting Satellite link and access and dial
connected to the internet digital signals up access Cable and wires

Standard long Stream line Serial line


SLIP stands for ________________ internet protocol internet protocol protocol

Prime prolonged Point to point Pillar to pillar


PPP stands for _____ protocol protocol protocol
sending
Which of the following best describes uploading storing data on a information to a storing data on
information? disk drive host computer the hard drive
A characteristic of a communication channel that is
the amount of information that can be passed
through it in a given amount of time, expressed in
bits per second. Bandwidth Speed Size
The act of searching through storage to locate
information without necessarily knowing of the
existence of the information being sought. Find Save Browse

A "recipient" of the certificate desiring to rely upon a


Digital Signature created by the subscriber named
in the certificate is called the ____________ Recipient Party Relying Party Either A or B

The Relying Party can use the ___________ listed


in the certificate to verify that the digital signature
was created with the corresponding _________ Public Key Private Key Both A and B
Digital Signatures are used for a variety of
Electronic Transactions like Electronic Electronic Fund
________________________ E-mail Commerce Transfers
To associate with a key pair with a prospective
signer, a Certification Authority issues Digital
Certificate Not False Not True
Digital Signatures, if properly implemented and Closed
utilized offer promising solutions to the problems of System,Formal
Imposters, Message Integrity, __________ and Legal Formal Legal
_____________ requirements Requirements Open System
In, Digital Signature, _____________ perform the
"ceremonial" function of alerting the signer to the
fact that the signer is consummating a transaction Signer
with legal consequences Affirmative Act Efficiency authentication

A Digital Signature must have the following Signer Document


attributes ________________ and _____________ Authentication Authentication Both A and B
"Hash Function" is used in both creating and
verifying Digital Signature Not True Not False
___________ provides assurance of the origin or
delivery of data in order to protect the sender
against false denial by the recipient that the data
has been received, or to protect the recipient
against false denial by the sender that the data was Nonrepudiation
sent. Service Digital signature Digital certificate
________ is a branch of applied mathematics
concerns itself with transforming messages into
seemingly unintelligible forms and back again. Cryptography Public Key Private Key

The complementary keys of an asymmetric


cryptosystem for Digital Signatures are arbitarily
termed as _________, and ____________ Private Key Public Key Both A and B
_______ is known only to the signer and is used to
create the digital signature. Private Key Public Key Both A and B

_______ is ordinarily more widely known and is


used by a relying party to verify the digital signature. Private Key Public Key Both A and B
____________ is the art of protecting information
by transforming it into an unreadable format. Decryption Cipher Encryption

Conducting fraud-
Which of the following activities would most likely Using data Performing awareness
detect computer-related fraud? encryption. validity checks. training.
Received by the
A digital signature is used primarily to determine Unaltered in Not intercepted intended
that a message is: transmission. en route. recipient.

The private key


Both sender and The private key is used by the
receiver must cannot be sender for
have the private broken into encryption but
key before this fragments and not by the
What is a major disadvantage to using a private key encryption distributed to the receiver for
to encrypt data? method will work. receiver. decryption.

Which of the following risks can be minimized by Failure of server


requiring all employees accessing the information Data entry duplicating
system to use passwords? Collision. errors. function.
Business-to- Business-to- Backend-to-
The acronym for B2B is ___________ Business Backend Business
The _____________ model is the least intrusive
model but requires active search on the part of the
customer Billboard On-line Catalog Endorsements
__________ is / are a form of advertisement where
people relate their experience with products and Customer
services Endorsements Billboard Catalog
The _________ are software agents who
communicate with the business merchants on
behalf of the customers Intermediaries portals .COM
The Pre-purchase preparation phase includes Search and
_______________ for a set of products Order Placement Service discovery

The _________ phase includes customer service


and support to address customer complaints , Post purchase Purchase Pre-purchase
product returns and products defects interaction consummation preparation
Endorsement
The ________ allow companies to bypass the need Billboard model model of
for costly printed catalogs of marketing Online catalog marketing

A ________________ is a basket on the Net that is


used to place the items that are being purchased Online Catalog Shopping cart Billboard
EDI For EDI For EDI For
Administration, Administration, Administration,
Commerce and Consumer and Commerce and
EDIFACT is an abbreviation of ________ Transaction Transport Transport
The __________ allows for protocol conversion and
communicates with the bank using the banks
private network or the Internet EDI TCP/IP EFT
In Ecommerce, data extraction, transforming the
data into transmittable form, transmitting the data
and downloading the data are the operations
employed in _________ Compiler Interpreter Assembler
The _________ commerce assists in integrating the
customers and suppliers of the company directly Business-to- Business-to- Consumer-to-
into the organisation Business Consumer Business

E-cash means______________________ Emergency Cash Electronic Cash Euro Cash


E-commerce is a tool that addresses the desire of
firms to cut services cost and improving the quality Business
of goods. It is a definition of e-commerce from Communication Process Service
_________ Perspective Perspective Perspective
The small denomination digital tokens are called Micro
_________ Microcash Transactions TT(Tiny token)
The ____________ is the process of encoding
information to prevent it from being read by
unauthorized parties Decryption SSL Encryption
There are _________ types of data tables 1 2 3
The tables that allows the user to change or
rearrange the data, summarize the data and
evaluate the data using changing points of view is
known as data table filtered table index table
The wizard that is used to suggest hints for doing a convert text to
task pivot table wizard chart wizard columns wizard
In a chart Y-axis is known as_________ series or rank category legend
In a chart X-axis is known as_______________ series or rank category legend
_________ is a set of tables that describe each of
the data series series or rank category legend
________ is used to differentiate one data series
from another series or rank category legend
The chart that contains only one data series is
_________ column chart bar chart pie chart

The chart that holds the column chart is _________ column chart bar chart pie chart
The chart that display two or more data series on a
surface is _________ column chart bar chart pie chart
The chart that is used to display discrete data column chart bar chart pie chart
wild card
_________ are not allowed in a macro name spaces characters symbols
Which of the following tool cannot be used to view
the excel web page_______ excel97 internet explorer Netscape
The wizard that used to build an interactive table convert text to
from data existing on sheets pivot table wizard chart wizard columns wizard
The chart that is used for displaying stock market
information line chart bar chart stock chart

In excel, the subtotal command also generates


grand total after the last group subtotal_________ true false
In advanced filter , the criteria occupying multiple
columns but more than one row, is considered as
an ________ criteria. and or
The stacked bar graphs can be represented in
__________ 3-dimensions 4-dimensions Multi-dimensions
A pie chart can represent only one data series at a
time true false
The ______ generates a summarized report in
tabular form in an interactive manner Data table Pivot table
It is often used to
display share
It is also called market prices
Which one of the following statements related to as high-low-close It shows trends over a period of
stock chart is NOT TRUE ? chart over time time
The state government needs to finalize a five years
plan to implement 100% literacy in the state. Which
one of the following will be the best tool that should Scenario
be used to work out the plan ? Pivot table manager Solver
Forecast'99 is a group working on exit poll. It wants
to know how many seat ABC party needs to won in
totality to obtain majority to form the government.
Which one of the following will be the tool that will Scenario
help the team ? Goal seek manager Pivot table
Which one of the following will be the tool that
provides a way to view and compare the results of
all the different variations together on the worksheet
? Goal seek Pivot table Solver
A ___________ is an excel file where the user
stores his data Workbook Worksheet Spreadsheet
Performing
Performing database Performing text
Spreadsheets are useful for _______________ calculations. operations formatting.
Which one of the following is NOT the component Source table
of the pivot table ? Column field Row field. name.
Excel allows upto ______ levels of sorting two three N
Filtering rearranges a list to display the required
records true false
The stacked bar graphs can be represented in
_____________ 3-dimensions 4-dimensions Multi-dimensions
The ______ generates a summarised report in
tabular form in an interactive manner Data table Pivot table
It is useful when
several
components are
changing and
It displays the the user is
data series one interested in the It can be
Which one of the following statements related to on top of the sum of the represented in 3-
stacked bar chart is NOT TRUE ? other. components. dimensions
Which following function is used in subtotal option Standard
?______________ Count. deviation SumIf
A workbook consists of many ________ databases records tables
It is a tool that
provides a way
to view and
It is a tool for compare the
summarizing and results of all the
analyzing the different It summarizes
data records in variations the data by using
Which two of the following statements related to an interactive together on the analytical
pivot table are TRUE ? manner. worksheet functions.
Which one of the following is NOT a What-if Scenario
analysis tool ? Goal seek. manager solver

The _________ wizard separates contents in a cell text import convert text to
into different cells wizard columns wizard tip wizard
A spreadsheet is a grid of rows and columns and is
called as a ________ worksheet workbook tables
Pick out the window that is not a form of excel application document
___________ window window modal window
A dark wide
On an Excel sheet the active cell is indicated by border A dotted border No border
Cell A4 =2 and A5 = 4. You select both cells and
drag the fill handle down to A8. The contents of
cells A6, A7, and A8 are _____. 8,16,32 2,4,2 2,2,2
the row is too
short to show the column is too
the number at narrow to show
your formula has the current font all the digits of
If a cell shows ####### , it means that _____. a syntax error size the number
Which is not an advantage of using computerized ability to speed of flexibility of
spreadsheets? generate tables calculation moving entries
The gym teacher has a new program to calculate
physical fitness in terms of weight and exercise.
The use inputs different weights or amounts of
exercise to determine the related physical fitness.
This "What if" program is most likely which of the
followin word processing graphical database
The difference between the highest and the lowest
values. Range Address Gap
Producing
Spreadsheets can be used for... graphs Writing letters Drawing pictures
drag from the
top cell in the
column to the
double-click any last cell in the click the column
To select a column the easiest method is to cell in the column column heading
If you press _____, the cell accepts your typing as
its contents. ENTER CTRL + ENTER TAB

The contents of cell C15 is =AVERAGE(C3:C14).


AVERAGE(C3:C14) is known as array. function. constant.
All of the following are considered constants
EXCEPT: 100 (201)555-1212. #VALUE!
Which of the following may NOT be included in a Numeric
formula? Cell references Functions constants
Which of the following is NOT a valid mathematical
operator in Excel? ^ / *
Given the formula =B5*B6+C3/D4^2, which
expression would be evaluated first? B5*B6 C3/D4 D4^2
Which part of the formula
+E12/6+(G7*SUM(H9:H11) is considered a
constant? E12 6 SUM(H9:H11)
It is surrounded
How can you tell which cell in a worksheet is the by a heavy It is displayed in
active cell? border. It is blinking. reverse video.

By either clicking
in a different cell
By using the or using the
arrow keys to arrow keys to
By clicking in a move to a move to a
How can you change the active cell? different cell different cell different cell

The Cell Format


Which of the following would you use to change the The Standard The Formatting command on the
font size of a cell in Excel? toolbar toolbar Edit menu
the New the Save the Save As
The command that will save the current workbook command on the command on command on the
with a different file type is: File menu. the File menu. File menu.
The command that will print an Excel workbook is
found on the ____________ menu. File Edit View
In the Save As and Open dialog boxes, the
___________ view shows the file size as well as
the date and time a file was last modified. Preview Details List

Which of the following commands will automatically Both Insert and


adjust cell references in formulas? Insert Delete Delete
Which of the following commands will remove cells, Both Clear and
rows, or columns from a worksheet? Clear Delete Delete
Orientation
Which of the following options is NOT controlled (portrait or Headers and
through the Page Setup command? landscape) footers Fonts
Which command enables you to change the
margins for a printed worksheet? Options Page Setup View
All commands are carried out on a rectangular
groups of cells known as a: worksheet. range. group.
Which of the following is a valid cell range? 6 D12, G25 D12:G25
In a copy operation, the cell(s) you are copying from destination
is called the: copy range. range. clipboard.
In a copy operation, the cell(s) you are copying to is destination
called the: paste range. range. clipboard.
Which of the following commands is needed to The Duplicate The Copy The Paste
duplicate the contents of a cell in another? command command command
A cell reference that does not change during a copy
operation is known as absolute relative mixed
Which of the following is considered an absolute
cell reference? B4 $B4 B$4

Cell E3 contains the function =AVERAGE(A3:D3).


If the contents of cell E3 are copied to cell E4, what
will be the contents of cell E4? #DIV/0! #DIV/0! #DIV/0!
Cell E3 contains the function
=AVERAGE($A$3:$D$3). If the contents of cell E3
are copied to cell E4, what will be the contents of
cell E4? #DIV/0! #DIV/0! #DIV/0!

Which of the following commands is needed to The Move The Cut The Paste
transfer the contents of one cell range to another? command command command
cycle through
absolute,
relative, and
copy and paste mixed cell
The F4 key is used to: cells. edit cells. references.
Which of the following quickly copies the formatting the Format the Formatting
of a selected cell to other cells? the Fill Handle Painter toolbar

Select the Insert Click the Insert Right-click a cell


Hyperlink Hyperlink button and click the Edit
Which of the following will insert a hyperlink into an command from on the Standard Hyperlink
Excel worksheet? the File menu. toolbar. command.

whether the cell


whether the cell has an absolute
Conditional formatting applies formatting to a cell has a formula or or a relative cell
based on: a value in it. the cell address. reference.

If you enter a date into a cell, Excel stores the date text with a two- text with a four-
as: digit year. digit year. an integer.

You created a worksheet on July 30 and entered


the =Today() function in cell E17. You opened that
worksheet again on August 31. What will be
displayed in cell E17 on August 31? Jul-30 Aug-31 29/03/2008

subtracting the adding the subtracting the


The number of days between two cells containing earlier date from earlier date to later date from
dates can be calculated by: the later one. the later one. the earlier one.
The function key that is used to quickly edit the
contents of a cell is: the F4 key. the F2 key. the Esc key.

March 4 of the
What will be stored in a cell if 3/4 is entered in it? 03-Apr 0.75 current year

A users response to the InputBox function can be a cell on a


stored in: worksheet. a variable. a constant.
The cell reference for a range of cells that starts in
cell B1 and goes over to column G and down to row
10 is _____. B1-G10 B1.G10 B1;G10

The teacher has a spreadsheet showing all Year 10


students and their marks in one Mathematics test.
To find the student with the highest mark, which of
the following functions should be used? AVERAGE COUNT MAX
Which chart type best shows proportions of a
whole? Combination Line Pie

Once a bar chart Once a column Once a pie chart


is chosen it chart is chosen has been chosen
cannot be it cannot be it cannot be
Which of the following is TRUE regarding chart changed to a changed to a changed to line
types? column chart. bar chart. chart.
To select several cells or ranges that are not
touching each other, you would _____ while hold down the hold down the hold down the
selecting. CTRL key SHIFT key ALT key
Your Institute teachers have set an assignment on
Studies. You are required to use a spreadsheet to
record all that you study on each day for four
weeks. You decide to show each weeks data with Transfer
an accompanying graph. What is the best way of Create four information to a
doing this Use tables separate files database

What would be the best method to quickly copy the


formula from the active cell to each cell below it? Paste Fill Down Fill Right

To arrange rows in alphabetical order based on


column A, you need to use the command _____. Tools | Sort Data | Sort Edit | Data | Sort
What can you NOT do with a spreadsheet? Analyse data Calculate data Create forms
select Print
selection on
press the Page Setup |
To print just part of a sheet, you would select what click the Print PRINT Sheet and then
you want to print and _____ . button SCREEN key print
The formula that will add the value of cell D4 to the
value of C2 and then multiply by the value in B2 is
_____. (D4+C2)*B2 D4+C2*B2 #VALUE!
Which of the functions is not valid for performing =A3SUM:B3SU
addition 0 M:C3SUM REF!
The default orientation for the printed page is whatever was
_____. portrait landscape last used
Which is not a valid cell address? AD213 ZA1 A0

The World Wide Web was devised by _________ CERN ECRN CARN

yahoo and newsgroups and


The useful URL schemes are_____ and______ infoseek mailto and files search engines
bulletin application
news boards,mails servers,proxy
The other ways of getting connected to the net groups,yahoo call and wireless servers and web
are_____ and infoseek system servers
business bulletin
bulletin board broadcasting broadcasting
BBS stands for______ system system system
USENET is a BBS on ____ scale small large very small
windows
WINSOCKS is expanded as______ windows socks sockets windows stocks
IETF Level 2 HTML DTD supports graphical
browsers like _______ Mosaic Yahoo PINE
The space used by Netscape to store the retrieved
page is called______ buffer cache built-in

The principles, means and methods for rendering


information unintelligible and for restoring encrypted
information to intelligible form. Photography Digital Signature Cryptography
A long string of seemingly random bits used with
cryptographic algorithms to create or verify digital
signatures and encrypt an decrypt messages and
conversations. Key Lock Hash Function
Protected/private character string used to
authenticate an identity or to authorize access to
data. User-id Password Name
The successful act of bypassing security
mechanisms of the system. Penetration Retrieval Cryptography

A set of rules and formats, semantic and syntactic,


that permits entities to exchange information. Acts Regulations Address
An attempt to get access to a system by posing to
be an authorised person. Spoofing Imposting Unauthorising
An action or event that might prejudice security. Loss Threat Exposure

According to information Technology Act, 2000, To


investigate contraventions the controller of certifying Sales - tax Income - tax Judge of a civil
authority shall exercise the like powers to that of authorities authorities court

Malicious software. Utility Pirated software Virus


Charles
None the person who is known as father of Internet Tim Berner Lee Hoffman Bubbage

This website is the biggest bookstore on the earth. Etrade.com Amazon .com Dell .com
Asynchronous
When we talk of Data Transmission modes, then Automated Tailor Any Time Transmission
ATM stands for Machine Money mode

A sequence of bits or characters that identifies the


destination and the source of a transmission. Acts Regulations Address

The means of communicating between networks Router Gateway Port


A group of computers and other devices dispersed
over a relatively limited area and connected by
communication links that enable a device to interact
with any other on the network. LAN WAN CAN

hyper terminal hypertext tracing hypertext


The term HTTP stands for tracing program program transfer protocol
National
Informatics Network New Information
A NIC is considered as Center Interface card Card
Can not
A hub is a device that can connect Only Computers computers Only printers

Combines
connectivity of a Switches data
hub with the from incoming
Which of the following is true concerning the Concentrates traffic regulation ports to outgoing
function of a switch? connectivity of a bridge ports.
Bridges and Two or more Bridges and
What do routers connect? Repeaters. networks Hubs
What does a router route? bits frames Packets
Software which prevents external access to a
system is termed firewall gateway router
If four computers are connected to a hub and then
to the internet, how many IP addresses are required
for these 5 devices? One Two Four

Which of the following in an OSI layer Physical Layer Data-Link Layer Network Layer

When creating a network from just two PCs, what


kind of cable would be used to connect them? RG7U Coaxial cable Fiber
A memory
An IP address is a Physical address Logical address address
To construct a simple LAN of 4 computers, you
would connect them with ______connect them A cable Hub Router

It continue on to
What happens to data that is ruined before Data return to the It gets destroyed target device
reaching to receiver sender bit by bit. with corrupt data
Wireless Wired Ultra violet
Bluetooth is technology Technology technology
Which is not one of the recognized IEEE sub
layers? Physical Layer Data Link Layer Network Layer
The most preferred number system to represent a
IP address is Binary ASCII Octal
A MAC address is of 48 Bits 48 Bytes 48 KB
software that
facilitates a list of rules for software that
connection to the transferring data allows file
Protocol is internet over a network copying
A ............... is a LAN-based computer with software
that acts as a controlling device for controlling
access to at least part, if not all, of a local area
network and its available resources. Novell PC Client Server
If the hub goes
If one node down, it brings
goes down, it down all of the
What is the biggest disadvantage of the Ring brings down the nodes on that
topology? There isn't one entire ring section

The .............. of the network concerns how network


devices are physically (or optically) interconnected. Physiology Topology Both A and B
The principal topologies used with LANs are: Bus Star Ring
What are the various types of bus architecture? Linear Parallel Both A and B
What are the various types of ring architecture? Parallel Circular Linear
In a ................., each workstation attaches to a
common backplane via its own physical cable that
terminates at the hub Ring Bus Star

In a ............... , each work station is directly


connected to a common communications channel Ring Bus Star
Which one of the following is NOT a network
topology? Star Bus Linear
In a .............. , the cable system forms a loop with
workstations attached at various intervals around
the loop Ring Bus Star
The Media Access Control (MAC) is a sub layer of
the: Network Layer Transport Layer Physical Layer
What are the most common LAN technologies used Ethernet, token Ethernet, token Ethernet,
in networking today? ring, DecNET ring, FDDI DecNET, FDDI
Modem speeds are measured in bps kbps mbps
LAN speeds are measured in bps Kbps Mbps
measured in depend on the
usually higher bytes per transmission
WAN speeds are than LAN speeds second medium
Accessing the Internet from a typical home PC
requires the use of CD-ROM drive a modem Windows 95

must use the must use must have a


To use the Internet, you World Wide Web electronic mail LAN account
common
The worldwide web server uses the following key gateway uniform gateway
standard interface to act as the middleware: interface resource locator interface
interfaces a
a Novell Interface used to control a modem to a
An NIC Controller printer computer
Accessing the Internet from a typical home PC Windows
requires the use of CD-ROM drive a modem package
The most widely used network operating system on
PC LANs is Linux Novell Netware Windows NT
have to do with
compression of
graphics and have to do with
JPEG and MPEG video Web pages the Internet

A multiplexer is a form of Printer modem bridge

provides access is a CPU is a CPU


An ISP to the Internet register functional unit

used to send used to browse is part of


FTP is email the Web Netscape
uses wireless
used to send communication is part of
Telnet email medium Netscape
used to protect a
computer room
from fires and a screen saver
A firewall is floods a form of virus program

A proxy server is a backup server an email server a poor file server


IR system for
A search engine is hardware the Internet browser
To look for information about interest areas on the
internet, the user should use a scanner CD-ROM clip-art file

provides access is a CPU is a CPU


An ISP to the Internet register functional unit

used to send used to browse is part of


FTP is email the Web Netscape

used to send uses telephone is part of


Telnet email lines Netscape
Any layer can
communicate
The layers Any layer can only with the
cannot communicate layer directly
Which of the following is a true statement about the communicate directly with any above or below
OSI model layers? with one another. other layer. it.
It is made up of
many networks
connected into
transmission It works the
Which of the following is NOT true about the It is one large lines called same way as a
Internet? network. backbones. local network.
The traditional intent and impact of this common
type of attack is to prevent or impair the legitimate Password
use of network resources. cracking System intrusion Denial of Service
Flood a Web Virus that
Which of the following is NOT an example of a DoS server with initiates a ping
attack that is popular among hackers? IP flood requests flood
A ____________ attack is when a hacker sends a
continuous flow of packets to a system. hack packet flood
One defense option on a large network is to
configure a ____________ to disallow any external
traffic. firewall router switch

A proxy server is a backup server an email server a poor file server


Which of the following would be performed on a
network server and not normally on individual Apply security Update virus Backup data on
workstations? patches definitions a daily basis

There are safe Only large name-


All sites are safe and unsafe recognizable
What can be said about the safety of the Internet? and reliable. sites. sites are safe.

To secure communication network against wire- Use of Use of logical


tapping the most effective control is Use of identifiers passwords access methods
by attaching
One way that a virus CANNOT spread throughout a by attaching to through an FTP itself to a
network is: an e-mail. port. document.

Which of the following is NOT a means of


monitoring employee use of company technology? Phone E-mail Web traffic
____________ would be used by parents to monitor
their children on their home system. A Trojan horse Adware A worm

The formal rules and parameters which are


established to permit a microcomputer to
communicate with the mainframe computer as
though it was a terminal of the mainframe are called Modems Protocols Multiplexors

The two most common tools used to help with cookies and Trojan horses cookies and key
extracting information are: Trojan horses. and key loggers. loggers.

An attack on a An attack with


Which of the following would NOT be considered an system for the purpose of Giving out
example of cyber terrorism? personal gain gaining publicity disinformation
Which of the following would be a form of cyber Economic Disruption in Disruption in
terrorism? damage communication supply lines

Crashing the Shutdown of


Which of the following is a likely target of a cyber stock market, as military security Contaminating
terrorist that would cause considerable loss of life? in the 1930s systems water systems

An organisation is upgrading its telecommunication To improve To improve


lines. Which is the least important objective while To carry more network system response
upgradation network capacity services time
stop its
A company posts a price list of its products on its limit access to competitors
website. The advantage to the customer is that the set its prices very computer seeing their
company can high owners only prices
Which of the following is an easy-to-use service to Yahoo People USA People
get information on someone? People Search Search Search
Which of the following pieces of information would Name of your
NOT be found online? bank Date of birth Personal assets
Which of the following is the most common danger
on the Internet? Virus Fraud Adware

The famous Nigerian Fraud scam offered victims invest without purchase off-
the opportunity to: buy stocks. risk. shore property.

The fraud type that sends e-mails that claim to be


from legitimate sites in order to obtain sensitive
information is called _________________. Shill bidding Phishing Siphoning
Using the Internet to pursue, harass, or contact
another in an unsolicited fashion is called: Internet stalking. cyber stalking. virtual stalking.
Setting your privacy settings in Internet Explorer to
medium is one way to block: pop-ups. cookies. spam.

What is the best means of protection from cyber Use a fake e- Never use your Use a proxy
stalking? mail address. real identity. server.
Message
sequence
Which of the following is not an appropriate control Physical number
over telecommunications software Encryption Security controls checking
Encryption techniques can be implemented in
Hardware-Software I only II only Both I & II
Which protocol would be used to download a free
anti-virus program from the Internet? irc ftp www

The major advantage of the checksum program is Adds more bytes Verifies integrity Increases boot
when it to programs of files up time

Which of the following is a Web browser? HTML Internet Explorer Microsoft Excel

HTML round trip HTML


A Web page is another name for ----------- Web query. document. document.

Domain names must contain a description of the


type of organisation that the domain represents. A .com is used for .co in used for .con is used for
very common abbreviation used include: company company companies
the World Wide
A standard language for creating and formatting Web
Web documents is: round trip HTML. Consortium HTML.
The Web page format in which all elements of a
Web page are saved as one file is called: XML. HTML. DHTML.
clicking a
using Internet hyperlink that
Explorer to view updating the references a
a Web page that values that are document that is
is stored on the obtained stored in the
Which of the following requires an Internet hard drive on through a Web floppy drive on
connection? your computer query your computer
Click on the Back
Mr Rao wants to find a website that he briefly arrow until the Click on Go to Go to the History
browsed over yesterday. After turning on his desired site is or Search in page and look
computer how would he do this? found the browser for the site
the Insert
Which of the following is used to update a Web the Refresh Hyperlink the Update
query? command command command
You download from the internet, a screensaver, a
ten-second sound file and a ten-second music
video clip. You also add a hyperlink. Which of the
media elements has the greatest effect on the file
size? Hyperlink Screensaver Sound
When saving a photograph for use on a website,
which format should you choose? BMP GIF JPEG
While researching the Direct taxes assignment, you Write it down on Add it to
find a useful website. What is the most efficient way Save it to a a piece of Favourites or
to access the site at a later time? floppy disk. paper. Bookmarks.
A system that uses the Internet for business-to- privileged
business interaction is called a(n): extranet. intranet. network.
A block of text automatically added to the end of an
outgoing email is called an attachment. a signature. a footer.
_________ refers to the use of Internet
technologies for placing telephone calls. VoIP IPT IPP

Most client/server applications operate on a three- Desktop client, Desktop client, Desktop server,
tiered architecture consisting of which of the application, and software, and application, and
following layers? database. hardware. database.

Which do you NOT need to connect to the Internet? Modem CD-ROM Telephone line
File
File Transfer Transmission File Transfer
What does FTP stand for? Program Protocol Protocol
So computers
can be
referenced by a So IP addresses So email is
What is the purpose of DNS? name can be shorter delivered faster
Which of the following is NOT a properly formatted
IP address? 193.1.2.3 45.1.1.1 143.215.12.19
Which of the following is a properly formatted email paul .trigg @ paul.trigg@dom
address? domain. org. uk ain.org.uk paul.domain.uk
The US Scientists in
The Internet is controlled by whom? government Switzerland No-one
International
Internet Relay Relay of Internet Remote
What does IRC stand for? Chat Characters Conversations
It will be waiting A letter will be
for you to collect sent to you in the
If you do not pick up your email for a week...? It will be deleted it post
Receiving
messages People
automatically discussing a
from anyone in topic of interest High volumes of
What is a disadvantage of joining a mailing list? the group globally email

autolayouts and
In Powerpoint2000 ,the built-in professional design clipart & auto presentation slide view &
elements are shapes templates outline view
Selection handles are the 8 small ___________
that appear around the object, when an object is
selected circles points squares
The _______ is an invisible matrix of vertical and
horizontal lines that covers the entire slide
workspace square image grid
_______ are drop-down menus that appear when
the right mouse button is clicked on the screen
element tool bars short cut menus auto shapes

________ and ______ have the ability to add a lot clip gallery & slide show &
of visual impact into the PowerPoint presentation word art view show fonts & images
_______ is a motion picture or any animation file wave file media clip .video file
In visual basic, when a record pointer reaches to
the last record, _______ property of a recordset
object is automatically set to ______ eof,false movelast,true movelast,false
In visual basic, the explorer view of a project is properties form layout
displayed in ___________ window window toolbox
In visual basic, when a record pointer reaches to
the first record, _______ property of a recordset
object is automatically set to ______ bof,false movefirst,true movefirst,false
In visual basic, _______ is a method to convert a
string into integer. value() int() number()
In visual basic, in a shape control, a vb statement
gives Shape1.Shape = 2. What type of shape
should we get? circle rectangle square
In visual basic, a timer event is only available in
timer control. true false

In visual basic, vbred or vbgreen or vbblue are the


property values of a backcolor of any object true false
In visual basic, _______ is a property of a textbox
control to set a color of a text. fontcolor color forecolor
In visual basic, _______ property of a textbox fontunderline,tru textunderline,tru
control is set to _______ to underline a text underline,true e e
In visual basic, _______ property of a textbox
control is used to change the size of text. textsize size foresize
In visual basic, the interval property of a timer one- millionth of one-hundredth one-thousandth
control is given in ________ a second of a second of a second
In visual basic, _______ property of listbox control
counts the number of items in the list count recordcount itemcount
In visual basic, the properties of various controls form layout prperties
can be set using __________ window window project explorer
In visual basic, vbinformation, vbcritical,
vbexclaimation are the values of _______ in a
messagebox function. title prompt vbmsgboxstyle
In visual basic, ________ is a function which
displays a message and it also allows the user to
enter values in a form object msgbox() textbox label
In visual basic, using a data control, ________ is a
recordset type which allows to add a new record
and also to update existing record in a recordsourse
object opendynaset opensnapshot dbopensnapshot
In visual basic, while closing a form _______ event
of a form object is triggered earlier to terminate
event. load activate unload
In visual basic, to give a backcolor or to bring in a
picture to a command button can only be done if we
set the style property to ______ standard opaque transparent
In visual basic, a method RGB(255,0,0) will
generate _______ color blue red green
In visual basic, a method RGB(255,255,255) will
generate _______ color red green blue
In visual basic, if a user uses a shortcut key ctrl+R properties form layout
_________ becomes visible. window window toolbox
In visual basic, if a user uses a function key F4 properties form layout
_________ becomes visible. window window toolbox
In visual basic, when a textbox control receives the
focus ________ event is triggered. change lostfocus text
In visual basic, a form is a ________ object. child parent container
Microsoft visual basic is a Rapid Application
Development tool. true false
In visual basic, when a form object appears on the
screen _________ event is triggered. load unload initialize
In visual basic, to display text on a label object
_________ property is used text name caption
In visual basic, _______ object is used to access
the database and also to manage the data in the
database. opendatabase dbengine openrecordset

In visual basic, when a checkbox control is checked


_______ property is automatically assigned with 1. enabled visible value
In visual basic, _______ keyword is used to declare
a variable dime dim var

What is the extension of the Visual Basic project file


that stores the design of a user control. .ctx .ctl .ctr
Which event of a text box would you use for
validating the data entered by the user? Validate Validation Check
Which of the following statements forces inline error On Error GoTo On Error GoTo
handling? linelabel Inline On Error Stop
The _______ method resets the contents of bound
controls to their original values when the user clicks
on the cancel button. UpdateControls PaintPicture Refresh
Cancel UnloadMode
To deactivate the Form UnLoad event, you make parameter to a Cancel parameter to a
the following change in the function definiton: non-zero value parameter to 0 non-zero value
How many root nodes can a TreeView control
have? 1 2 3
Consists of
Consists of Consists of Various Forms
several several And Code
A project group is a Project which: Programs Applications Modules
Procedures declared in a _____ are local whereas Form window, Project window,
procedures declared in a ______ are available to standard or code view code Class module,
the whole application. module window code module
Place code in Place code in
How can you keep the user from exiting a form by Place code in the the Unload the Deactivate
clicking the Close button? Terminate event event event
The _______ property enables Visual Basic to draw
complete images in memory before displaying them AutoRedraw = AutoRedraw =
on the Screen. True False Refresh
Msgbox Msgbox
You want to display the code and the description of Msgbox err.no & err.number & error.number &
an error. What would be the correct syntax? err.text err.text error.text

To display To help in
images to the creating a To allow the
What is the purpose of the Image List Control? user ToolBar editing of icons
Which method would you use to get a free or
unused File identifier while opening any file: FreeFile GetFileNum GetFile
Which property procedure is used to retrieve the
value of a property? Retrieve Get GetProperty
Common
messages
Which of the following can be shown to the user passed to Windows
using the Common Dialog control in VB? Windows Open dialog box explorer
Which of the following are not properties of
Command Button: Caption Visible Multi-Line
Which events enable you to determine which key Click and Click, KeyUp KeyUp and
was pressed by the user? KeyPress and KeyDown KeyDown
In order to access a file in Non-textual format, you
have to open file in: Ascii Format Binary Format Input Mode
Visual Basic displays information depending upon
the current value of two properties of the form, CurrentX and ScaleLeft and ScaleHeight and
called: CurrentY ScaleTop ScaleTop

Which of the following procedure types will execute


when you assign a value to a property of an object? Property Get Property Assign Property Let
In order to overlap the controls (say a command
button) during design time, we use the Send To
Back or Bring To Front option from the Edit menu.
To change it dynamically (i.e.during program Background color
execution) we need to change: property Caption property ZOrder property
Which property of the ProgressBar determines how
much of the bar is filled? Min Max Value

The ______ function can be used to run any .com,


.exe, .bat or .pif file from a Visual Basic program. Shell Substr SetAttr

The caption and the name properties of the Are one and the Can be different Are actually not
command button: same at times properties

You do not have


You try to initialize a new Object variable with the You do not need the permission
following line but receive an error. What could be to use the Set to access the MyVar has not
the possible cause? Set MyVar = New Classname command here class been declared
The
Which of the following will perform a direct The Open The Exec ExecProcedure
execution of a Command object? method method method
A warning query A critical An exclamation
The vb Critical symbol displays: icon message icon icon
intrinsic
vbYesNo is an example of a(n): statement. variable. constant.
InputBox
function can be
MsgBox InputBox created with the
statement function returns macro recorder,
returns a value, a value, while while the
while the the MsgBox MsgBox
The primary difference between the MsgBox InputBox function statement does statement
statement and the InputBox function is the: does not. not. cannot.
Which of the following is TRUE about a protected
form (i.e., a form where the Protect Form button on Data cannot be
the Forms toolbar is toggled on and is assumed to entered into the The form can be Data can be
remain in that position)? form. modified. entered.
Which event is triggered when the user moves to
another open form? Unload QueryUnload Deactivate
The user can use ______ to remove the
undesirable part of the image clipping tool cropping tool cutting tool
The power presentation has a _____ for a set of
compatible colors color palette color box color scheme
The set three colors used for graphs and for
secondary slide items is called as ascent tricolor scheme color palette
There are ______ types of charts available in
PowerPoint 10 28 18
_______ charts are useful while showing variations
over a period of time column bar pie

_______ are the individual pages of a presentation images images and text slides
A PIE Chart is a ____ diagram that depicts the
relationship between a whole and its parts circular radar doughnut
Each individual piece of data in a series is
called a/an entity data point data
Microsoft
PowerPoint launches an OLE-compatible organization
application called chart clip art auto shapes

the organization the chart is the chart window


When the user double-clicks on an organization chart is made available opens displaying
chart object in PowerPoint expanded for editing a chart template
The _____ are used for selecting, editing and general purpose custom drawing
viewing objects in the chart box tools tools tools

used to mange used to create a


organizational accessed only manager box for
Manager box tool in organizational chart window is chart by manager an existing box
not available in
The custom drawing tools are _______ by default turned on turned off the tool bar

Click on the box tool ______ to draw three boxes once twice thrice
There are ____ default fields available in all boxes
of the organizational chart two four five
The _____ tool is used in the same way as we use
a pen to draw a table native tool draw tool standard tool
A/An _______ consists of smaller printed version of
the slides autolayouts handlayouts slide view
The size of the object can be changed using the
______ tool zoom reduce/enlarge preview
_______ is the process through which the slides in
the current presentation are included in another
presentation or application importing exporting copying
________ can be used to create charts as well as
worksheets Microsoft excel auto shapes clip art
PowerPoint can import text files that have been .rtf(rich text
saved in ______ format .ppt(PowerPoint) format) .doc(document)

PowerPoint outlines can have _____ outline levels nine only one six
When a file is saved with _____ extension, the
graphics and text are also saved along with the .rtf(rich text .wmf(windows
slide format) metafile) .txt(plain text)
not displayed displayed only
during the slide during the slide displayed only in
The hidden slide is show show outline view
____ effect is used to introduce a slide during a DTS(digital track
slide show sound) 3D(3 dimension) both a and b
A _____ is a special effect that determines how the
objects appear on the slide build transition slide show
The notes page is formatted based on the notes master slide master master slide
Pick the odd man out of the following outline view slide view view show
When a new presentation is opened ,powerpoint
creates slides that have a width of _____ and a 15 inches,10 10 inches,7.5 7.5 inches,5
height of ______ with the landscape orientation inches inches inches
The default orientation for notes ,handouts and
outlines is ____ orientation portrait landscape a or b
Build effect is also called as ______ animation view show transition
Graphics for web pages are automatically stored in
____ format gif jpeg png
A _______ is used to jump to any slide in the
presentation hyperlink hypertext action button
The ______ language has been incorporated into visual basic for Microsoft visual
PowerPoint visual c++ application interdev
In PowerPoint _____ is a series of commands that
are executed in sequence macro batch file templates
while creating a during slide when the slide
The macro will be activated .exe file transition show is run
Developers can easily add ____ to PowerPoint
2000 by using the programming interface virus checkers spell checkers header files

______ determines the order in which order in


which the slides will be displayed during the show slide show custom show both a and b
_______ is used to organize and develop the
contents of a presentation slide pane notes pane properties pane
If we save the presentation file as a metafile, it can
be opened using internet explorer paint shop pro paint shop pro

PowerPoint
creates a sample
presentation to contains sample
With reference to autocontent wizard for creating a which user can it is the quickest presentations for
new presentation, which of the following statements add words and way to create a a variety of
are not true pictures presentation topics

user can insert user can insert


user can insert only pre-drawn, picture to the
objects like clip- pre-colored master slide
arts, pictures graphic images which gets
stored in a reflected in a reflected in all
separate files to clip arts to the the slides using
Which of the following statement is not TRUE the slides slides that master slide
in outline view, in slide sorter in notes pages
drag the slide view, drag the view, drag the
With reference to changing the order of slides, icon to a new slide to a new slide icon to a
which of the following statement is not true location location new location
the slide that
holds the
formatted
placeholders for
the titles, main
text and any design templates
background transition means is the template
items that user applying special whose format
wants to appear effects to the and color
on the slides is crossover scheme user
called a master between the applies to a
Which of the following definitions are not true templates slides presentation
in outline view,
user can see the
miniatures of all
with notes pages slides in a
view user can presentation, user should
prepare speaker complete with select the slide
notes and text and view to add the
Which of the following statements are not true handouts graphics text to the slide

the slide that


holds the
formatted
placeholders for
the titles, main
text and any design template
background transition means is the template
items that user applying special whose format
wants to appear effects to the and color
on the slides is crossover scheme user
called a master between the applies to a
Which of the following definitions are not true template slides presentation
The options available in the common task toolbar
does not include slide layout customize new slide
by default,
doughnut chart
data to be is displayed
graphed resides based on the
With reference to chart, which of the following in a datasheet data in the data is plotted in
statements are not true window datasheet a chart window
The format of the text entered in a title, subtitle, or
bulleted-list object is determined by the format
settings in a special slide called -------- the master slide the slide master the header slide
PowerPoint provides a _________ that searches
the entire presentation i.e., all the text objects in all
the slides, outlines, notes and handouts for spelling grammar
errors office assistant spell checker checker
PowerPoint's drawing toolbar contains _______
drawing tools 10 12 102
Click _______ on the rectangle drawing tools
enables us to draw multiple rectangles once twice three
text, graphics text, hypertext CD-ROM, digital
An example of the components of a multimedia and email and Power camera and
presentation could include address. Point. sound.
Which of the following formatting elements can be
applied to a PowerPoint diagram using the the Font and the
AutoFormat tool? the Line style the Line color text alignment
Which of the following formatting elements can be
applied to a PowerPoint diagram using the Format
AutoShape command? Fill color Line color Line thickness
A popup box
prompts you for Microsoft Graph
Excel is started an existing is started so that
What happens when you double click a blank graph so that you can Excel chart to you can create a
placeholder in a PowerPoint presentation? create a chart. insert. graph.

taken from the


first column or
row of data in
the datasheet,
always taken always taken depending on
from the first row from the first whether the data
of data in the column of data series are in
The legend in a Microsoft Graph chart is: datasheet. in the datasheet. rows or columns.
Suppose you are creating a Microsoft Graph of
quarterly sales by region. Which would be the best
chart type if you want to emphasize the total sales Side-by-side
of each region? column Stacked column Pie chart

Pull down the


Click the Insert Insert menu and
Pull down the Chart button on select the
Which of the following actions will enable you to Insert menu and the Standard appropriate
insert a graph into a PowerPoint presentation? select Chart. toolbar. Object.
Click the chart
object, then
click the View
Datasheet
If you are editing a slide containing a Microsoft It automatically button on the Pull down the
Graph, how do you display the underlying displays in Slide Standard Edit menu, then
datasheet? view. toolbar. select Object.
How do you deselect a chart that has been placed
onto a PowerPoint slide after you have finished Single click the Double click the Click outside the
creating the chart? chart. chart. chart.
A dialog box is A dialog box is
displayed displayed
allowing you to allowing you to
enter the name enter the name
of the Excel of the Excel
worksheet that worksheet that
should be linked should be
to the embedded in The datasheet is
What happens when you click the Datasheet button PowerPoint the PowerPoint saved as a
on the Microsoft Graph toolbar? presentation. presentation. separate file.

What happens if you single click a chart that is not The chart is The chart is The chart is
currently active? selected. deleted. doubled in size.
What happens if you double click a chart that is not The chart is The chart is The chart is
currently active? selected. deleted. doubled in size.

a slide one bullet bullet items one bullet items one


Using custom animation effects, you can build: item at a time. letter at a time. word at a time.
Which of the following animation effects can be
added to a slide? Subtle Moderate Exciting
Both enter and
exit, and fly in
Which of the following animations effects can be Fly in from top from top or
added to a slide? Enter and exit or bottom bottom
Which keyboard key is used to select more than
one picture on a slide? Enter Shift Alt

what objects do
the way objects after they
appear on a appear on a the way objects
Custom animation can be used to affect ONLY: slide. slide. exit a slide.

The advanced
timeline shows
the sequence in
The advanced The advanced which objects will
timeline shows timeline shows appear on the
the sequence in the duration of slide and the
which objects will the effect duration of the
Which of the following best describes the appear on the applied to each effect applied to
information that appears on the advanced timeline? slide. object. each object.
Which of the following objects can contain custom Organization
animation effects? Clips charts Text
What type of program allows an object within an
image to be edited without affecting other objects? Paint program Draw program Filtering program
Which of the following animation effects can be
added to a slide? Fly in From top Dissolve in

Once data is Once data is Data cannot be


Which of the following is TRUE regarding the entered it cannot entered it can entered into
Datasheet? be changed. be changed. Datasheet.
Graphical software tools that provide complex
analysis of stored data are: OLTP. OLAP. OLST.

You can change


both the
You can change appearance of a You cannot
the appearance whole diagram change the style
of a whole and the of the connecting
diagram, but not individual lines in an
Which of the following statements is TRUE individual shapes shapes of a Organization
regarding PowerPoint diagrams? of a diagram. diagram. chart.
Which keyboard key combination is used to undo
the previous command(s)? [Enter+A] [Shift+Z] [Alt+Z]
Microsoft visual basic project file has _______ file
extension. .vbg .vbp .frm
In visual basic, _______ method is used to add an
item in a combobox add additem loaditem
In visual basic, _______ method is used to load
picture during runtime in an image control load loadpicture addpicture

In visual basic, to populate a drive list box with a Drive1.Drive=Dir Dir1.Path = File1.Path =
directory list box __________ statement is used 1.Path Drive1.Drive Dir1.Path
In visual basic, to display a message in the run time
_________ function is used messagebox() message() msgbox()
In visual basic, to populate a directory list box with a Dir1.Path=File1. Dir1.Path = File1.Path =
file list box ________ statement is used Path Drive1.Drive Dir1.Path
In visual basic, ________ is a property of a
recordset object which counts the number of rows
in a recordsourse object openrecordset opendatabase recordcount
In visual basic, using a data control, a record can
only be added from the last record. Adding a new
record is only possible using _______ method of a
recordset object. update append addnew
In visual basic, using a data control, a record is
saved to a recordsource object using _______
method of a recordset object. append update additem
In visual basic, using a data control, to navigate to
the previous record ________ method of a
recordset object is used. movenext movelast moveprevious
To deactivate the Form UnLoad event, you make
the following change in the function definiton:Private
Sub Query_Unload(Cancel as Integer,UnloadMode Cancel UnloadMode
as Integer) To prevent the Form from closing, you parameter to a Cancel parameter to a
will set the: non-zero value parameter to 0 non-zero value
_______ is a word processing that is a member of
the office 2000 family Word 2000 Office 2000 Office 97
The feature that enables user to type anywhere in a
document without pressing or tab click-n-type double click drag & drop
The______ feature allows the user to copy and
paste upto 12 items at the same time in an
application office clipboard cut select

______ and _____ key combination will extend the


shift+end and shift+left and ctr+end and
selection by one character on the left and right
shift+home shift+right ctr+home
web layout, normal layout, web layout, page
_____and_____ are improved layout in Word 2000 printlayout web layout layout
click from start
program,
MSWord from
The easiest way to create a document in word is wizard templates the task menu
In Office2000 environment the tool that makes work document
easier for us is_____ office assistant inbox assistant assistant

A short description of a tool bar button called the


______ is displayed when the mouse pointer is
allowed to stay for a second on the button Screen Tip Tool Tip Icon Tip
The _____ helps us to keep track of the margin of
the page tab stop marginal stop ruler
The keys that are used to navigate between up arrow keys page up keys home and end
headers and footers are only only keys only
Pick out the element from the following that does
not form the type of tabs for the Word 2000 left center decimal
_______are blueprints or patterns for documents of
a certain type template model dialogs/alerts
The______ is used for quickly setting paragraph
indention using the mouse increase indent decrease indent both A and B
Word art is text with special effect control tool box design wizard
AutoShapes in word can be created by accessing
the _____ drawing toolbar control box database

By default, a document consists of_____ section 1 2 0


printer setup
The dialog box that is used to determine the page setup from from the file print preview
documents margins is the file menu from the file
________ is a box surrounding a page on all slides
or a line that sets off a paragraph on one or more
slides border shading style box
The key that is used to perform a task to select all t
he text in the documents is ctrl+a Del ctrl+f
The key that is used to indent a paragraph is ctrl+a Del ctrl+f
The key that is used to change the font from the
current positioned in a document is CTRL+SHIFT+F CTRL+O CTRL+SHIFT+S
The key that is used to change the style of the
document that is from that normal to heading1 or
heading1 to other document styles. ctrl+shift+f ctrl+o ctrl+shift+s
Set mapping' Check control that follows a text-type
validation, we use ----------------- application for data
analysis. Excel Access Both
Excel can import data from other databases for the
data analysis. TRUE FALSE
A System Auditor can uses CAAT tools to analyze
data FALSE TRUE

In the case of the ---------- control, it is ensured that


the data in combination with other fields are
reasonable as per standard set by an organisation. Valid Signs Transaction type Limit Check
--------------- function searches for a value in the
leftmost column of a table and then returns a value
in the same row from a column that we specify in a
table HLOOKUP VLOOKUP A or B

Most of the tools use in Data Analysis depends on DDE OLE ODBC

Analysis is the
Analysis loading of This involves
translates programs that looking at a
program code of perform routines system and
a high level to control finding out how
How do you define analysis of an information language to peripheral information is
system? machine code devices being handled
Inputs, outputs,
file design Maintenance,
What areas need to be considered in the Only hardware hardware, and reliability, and
SOFTWARE design process? and software software upgradeability
To execute any To maintain
What is the function of systems software? To collect data programs security
Deleted from the Copied from the Saved to the
Formatting a disk results in all the data being...? disk disk disk

Users operate
the manual Users operate
system and the computer Users operate
computer system system from a the manual
What is Direct Implementation? at the same time given date system

The new system The new system


is introduced is introduced Users continue
alongside the and users start operating the old
What is parallel running? existing system operating it system
Instructions and User Guide and
What documents are produced during the technical Log files and technical
development of a system? documentation temporary files documentation
User guides
To enable any cover how to run
printer to be the system,
For technical connected to the enter data, save,
What are User Guides are used for? support network print, etc.
Network
Operating systems and Database
systems and communication systems and
Systems software can be categorised into: system services services backup services
Magnetic tape
Which storage device cannot be erased? storage CD-ROM floppy disk
To maintain a To help
backup copy of someone who is
all the To do a applying for
Application software are programs that are writteninformation particular task. employment
Which bus carries information between processors
and peripherals? Data bus Auto bus Address bus

Convert the decimal number 2989 to Hexadecimal FDDI BAD TED


Which bus controls the sequencing of read/write
operations? Data bus Auto bus Address bus

Operating Data structures


system routines that are part of
Peripherals that that execute in the kernel of an
are connected to supervisor operating
What are utilities? a computer. mode. system.
Numbers are stored and transmitted inside a
computer in binary form ASCII code form decimal form
represented 256
The original ASCII codes were 7 bits 8 bits characters
A Nibble corresponds to 4 bits 8 bits 16 bits
More than 1000
A gigabyte represents mega bytes 1000 kilobytes 230 bytes

A 32-bit processor has 32 registers 32 I/O devices 32 Mb of RAM

used to indicate used to detect is the first bit in a


A parity bit is uppercase letters errors byte
the contents of these chips are lost when the
computer is switched off? ROM RAM DRAM
Clock speed is measured in bits per second baud bytes

memory access secondary


Cache memory enhances memory capacity time storage capacity
have fewer use more RAM
instructions than than RISC have medium
CISC machines RISC machines machines clock speeds
Data is not
Computer is saved before
Every data from the primary memory will be erased Power is improperly shut computer is shut
if switched off down down
a parallel
An RS-232 interface is interface a serial interface printer interface
dot matrix
For print quality you would expect best results from line printer printer ink-jet printer
is faster to stores more
access than information than
ROM RAM is non-volatile RAM

increased the provides backup


storage capacity power in the
of a computer increases the event of a power
A UPS system process speed cut
has more
storage capacity is an access
is a form of ATM than an ATM card for a
smart card card card security system

Laptop computers use CRT displays LCD displays SSGA displays

having several writing programs


programs in RAM in multiple
Multiprogramming refers to at the same time multitasking languages
having several the ability to run
softwares 2 or more writing programs
running at the programs in multiple
Multitasking refers to same time concurrently languages
What are small high speed memory units used for
storing temporary results? ALU Registers Variables
A good way to exchange information that changes
rapidly is through brochures magazines CD-ROM

to run more than


an operating one program at
Multiprogramming is a prerequisite for multitasking system the same time
multiprogrammi
Timesharing is the same as multitasking ng multiuser
______ is the default view in Word used for typing ONLINE
Editing and Formatting the Text NORMAL LAYOUT PAGELAYOUT
The short-cut-key that is used to indent a paragraph
spacing in the documents is ctrl+m ctrl+2 ctrl+end
The short-cut-key that is used to paste the selected
text ctrl+v or ins ctrl+c or ins ctrl+x or ins
The short-cut-key that is used for paragraph
spacing(1.5) ctrl+2 ctrl+5 ctrl+1
The box that separate text from the document and
allows it to behave like an independent object is
known as Text Box Frame AutoShape
The object that is used to provide information like
the title of the book, name of the chapter, page Header and
number etc. Footer Screen Tips Page Layout
The object that helps us analyzing data statistically
is known as Chart WordArt Auto Shapes
To highlight certain parts of a page to set it apart
from the rest of the page we make use of the
following features Borders Shading WordArt
To clear all the tabs in a document the option that is
clicked from the tabs dialog clear remove all remove

The dialog box that is used to incorporate picture picture bullets arrow bullet circle bullet
bullets into our documents or web pages is dialog box dialog box dialog box
The object that composes of set of tools which
helps to create and work on different shapes like
rectangles, circles, flowcharts etc. charts WordArt AutoShapes
When word is opened a new document called_____
is displayed, where the user starts typing the
content right way doc1 document1 new document
______ is an online dictionary maintained by word
to obtain synonyms for words thesaurus hyphenation mail merge

The thesaurus is invoked by pressing_______ shift+f7 thesaurus menu shift+f8


When a new table is created the insertion point
flashes in the _____ first second first row
By pressing the _____ key inserts a blank row after
the last row in the table tab end enter
The ______ option enables us to convert text into a convert text to convert data to table auto format
table format table table option
A table consists of ______ that contain text or
graphics row rows & columns records
The _______ option in word allows the user to
automatically correct misspell words as and when
they are typed AutoCorrect AutoFormat style gallery
______ is a facility that enables recording and
replaying of a sequence of keystroke Mail Merging Macro Data Source
In Word Macros are written in _____ basic visual basic vj++
In Word 2000 the macro dialog box is activated with
the help of ____ key combination shift+f8 shift+f7 alt+f8

________shows how a document would look like online layout


when published on the web or on an intranet web layout view view browser
______ is a software for sending and receiving e- micro soft
mail messages email client outlook express outlook
________is the coding system used to create web
pages html xml sgml
The network that makes information easily
accessible across various networks is _______ internet intranet arpanet
field names in
field name must the field the header
be listed in the separators in a source must
same order as header source match any
the and the data merge fields
Which of the following statements are false with corresponding source can not you've inserted
reference to the use of a header row source for a information in the be set as in the main
mail merge data source paragraph document
auto format by default cell
option applies to height and
it is not possible the entire table weight option
to change the and not only to applies to all the
height of only the selected rows and
With reference TO TABLE WHICH OF THE selected rows of rows or columns columns of a
FOLLOWING STATEMENT ARE false a table of a table table

The alignment available for tabs does not include left decimal justified

In order to type If a header is


A new section is a header from inserted in the
created in order the third page of second section
to change the document a then the same
properties like section break is header is
Which of the following statements related to a number of inserted after t applicable to the
Section Break are True columns he third page first section
The user can set a spelling checker to skip the
marked part of the next true false
New option under the file menu of word creates a
new blank document that is based on the normal
templates true false
The user can split the screen only into two parts true false
The features that enables the user to type text
graphics tables anywhere in the document without
pressing enter or tab drag & drop click -n-type Double Click
The user can modify the picture from the clip art true false

prohibits the
automatically user from automatically
corrects common renaming an corrects the
With reference to auto correct which of the following typing, spelling auto correct grammatically
statements are false errors entry errors
password
protected
document can
be opened
With the reference to password protected password can without password are
documents which of the following statements are not include password as not case
false spaces read only sensitive

The alignment available for tabs does not include left justified hanging
a document file
a .ppt file can not can be inserted a multiple
not be inserted at in the current documents files
specified position document at can be inserted
in the current specified in the single
Which of the following statements are False document position document
Drop Cap tool does not work for the contents in the
table format true false

The special symbols that are inserted using "insert


symbol" option of the word can not be printed by the
printer as they are not standard keyboard symbols true false
The "format columns" option allows to create
columnar text up 12 columns only. true false
The document that makes the user to organize and
maintain a long document, such as multipart report Master Hyperlink
or a book consisting of chapters Document Child Document Document
The view that enables us to view how objects will be
positioned on the page when it is printed Print Layout View Page Layout Outline Layout

The mode that is initialized or toggled to if the user Type Over


is in a position to overwrite the text in the word Insert Mode mode Remove
Veena is entering a paragraph in a word processing
program. When the cursor gets to the end of a line,
what is the best way to get the cursor to the next press the return press the tab press the escape
line? key key key
lines and
How are data organized in a spreadsheet? layers and planes spaces height and width
Which key moves the cursor to the beginning of the backspace/
next line of text? tab enter/return delete
Veena typed the following sentence: "The girl was
very beautiful." In which word processing utility grammar
could she find a synonym for "beautiful"? checker spell checker thesaurus

send a public
message to send private
Using an electronic bulletin board, Seema can do friends interested send pictures to messages to a
all of the following except which one? in one topic a friend friend
Aryan has created a ten-page story, but only wants
to print the first two pages. What printer command From ___ To
should he select? Print all ____ Page setup
What process should be used to recall a document
saved previously? Enter Copy Retrieve
Which is used to indent text within a document? closing tabbing spacing
Desktop publishing is a more sophisticated form of
which of the following types of software? database graphing word processing
Creating and
To analyse editing Storing
What is a Word Processor used for? figures documents information
What is a picture that is saved on a diskette and
can be pasted into a document? subscript annotation clip art
Spelling,
What basic tools would you find in the Edit menu of Clear, replace grammar and Cut, copy, paste
a word processor and select autocorrect and clear

Text at the Numbers which Text which


bottom of every appear on every appear at the top
What is a header in a document? page page of every page
Mouse, printer
and processing Keyboard, Monitor,
system Mouse, monitor keyboard and
What hardware is essential for a word? keyboard? and printer mouse
The user could take a picture from a magazine and
insert it into the document by using a Browser clip-art file microphone
Assume you are creating a two-column newsletter.
Which type size is the most reasonable for the text
in the columns? 6 point 10 point 15 point
Given the default left and right margins, and -inch
spacing between columns, the width of each
column in a two-column document will be: 2 inches. 2 inches. 3 inches.

Assume you have made all appropriate selections You have not You have not
in the Columns dialog box in Word, but cannot see You are not in inserted a specified
any columns on the screen. What is the most likely Print Layout column section continuous
cause? view. break.. section breaks.

to move a
section of text
from the original
While word processing, in which of the following to store a file on to store a file on location to
situations would Tom use the "Copy" command? the hard drive a diskette another location

Data about a set A set of different


What does a document contain? of similar things Mainly text graphics
Before submitting your work you want to find any
words spelt incorrectly. Which of the following Grammar
would you use? Thesaurus Spell Checker Checker
What command in a word-processing program can
be used to change the word him to her, and also
the word he to she in the given phrase? On a
cold and still night, the only sound that could be
heard was the owl that had ade its home in the nest
outs Paste Replace Select all
What edit commands would you use to insert a
paragraph from one document into another
document, while still keeping the paragraph in the Delete, then
first document? Copy, then paste Cut, then paste paste
To give the To give the
original author a original author a To complicate
chance to accept chance to reject the revision
suggested suggested process and to
changes from the changes from force the author
Which of the following statements would NOT be a person who the person who to spend more
reason for showing suggested revisions in a Word entered the entered the time making
document without changing the original document? revisions revisions corrections
A vertical line
outside the left
A red underline margin signifies
appears a change has
A line appears beneath text been made at
Which statement is NOT true regarding revisions through text that that is to be that point in the
made in a Word document? is to be deleted. added. document.

Through the Edit Through the


menu by Tools menu by
choosing Track choosing Track Through tools on
How are suggested changes entered for review on Changes Changes the Reviewing
an initial Word document? command command toolbar
The Versions
The Versions command will
command will allow you to The Versions
allow you to save save only one command will
multiple versions version of a allow you to save
of a document, document, only one version
including any including any of a document
changes that changes that without any
may have been may have been changes that
Which of the following is TRUE about saving a made to that made to that were just made
document using the Versions command? document. document. to the document.

The latest The first and


All versions are version is second versions
What happens when you open a document that has opened opened are opened
been saved using the Versions command? automatically. automatically. automatically.

You have used the word discover four times in an


English essay you have created using a word
processing program. You would like to find another
word of similar meaning to use instead of discover.
Which of the following would you use to do this? Dictionary Grammar check Spell check
The most recent Word will show
Word displays a version will the name of the
When opening and working with multiple versions list of the dates appear at the person who
of a document, how can you tell which is the most and times each bottom of the saved each
recent version? file was saved. list. version.
Various fields are added to a regular document to
create a special document called a form through
the ____________ toolbar. Fields Tools Forms
Which of the following types of fields CANNOT be
inserted into a form? Check boxes Toggle button Text fields
Comments can
be edited or
Comments deleted by right
Which of the following is TRUE related to editing Comments cannot be clicking the
comments in a Word document? cannot be edited. deleted. highlighted text.

Text at the Numbers which Text which


bottom of every appear on every appear at the top
What is a header in a document? page page of every page

In your English essay you notice that the paragraph


at the bottom of page 1 continues on to page 2. You
would like to make this paragraph start on page
2.What would be the best way to do this? Press tab. Press Return. Copy and paste.
Tables in a document help you to easily arrange all
of the following EXCEPT: text. graphics. forms.
To identify a document, it is helpful to include the
file name on each page as a header/footer. bibliography. find/search.
Which of the following tools will copy the formatting Format Painter
of selected text to other places? Copy button Paste button button
What is the name of the process of determining the
cause of errors in a macro? Fault Finding Bug Squashing Error Injecting
Drop caps are added to a Word document using
the ___________ menu. Insert Tools Format

a section of text
where the first the guidelines
letter of each used to establish
sentence is where different
a section of white lowercase and elements of the
text on a black the rest are newsletter will
A reverse in a newsletter is: background. uppercase. go.
underlining the
setting it in larger typing it all in text of the pull
A pull quote is best emphasized by: type or font size. capital letters. quote.

A dropped cap is
a word that
The reverse A pull quote is a starts with a
technique means quotation taken lowercase letter
to add dark text from (pulled) when it should
on a light from another have a capital
Which of the following definitions is CORRECT? background. document. letter.
Pertaining to newsletters, which of the following
cannot be changed using the Columns command The width of The height of The number of
dialog box? each column each column columns
As related to type size, how many points are there
to the inch? 6 10 12
Assume you are working on a newsletter in which
the masthead extends across the top of the entire
first page. The rest of the newsletter has two
columns. What is the minimum number of sections
in the newsletter? One Two Three
Press
Press Ctrl+Enter Ctrl+Shift+Enter Press Enter to
Which of the following is NOT correct with respect to create a page to create a create a section
to page, column, and section breaks? break. column break. break.

Which of the following would be the most A serif font at 10 A sans serif font A serif font at 20
appropriate font for a newsletter headline? points at 10 points points

Which of the following is the default Word column


width? 2 inches 3 inches 4 inches
Sequence Check is a --------------- level control
check. Field Record Both
Analyse data over two or more periods is called ------
----------------- analysis Horizontal Vertical A or B
We use Hash Total to identify ------------ within a
series where there is a definite relation between
items Duplicate Value Combined Value Gaps
Analyse fields by arranging them into rows and
columns is called Cross Tabulate Filter Merge
--------------------- function searches for a value in the
leftmost column of a table and then returns a value
in the same row from a column that we specify in
the table. RAND() VLOOKUP() HLOOKUP()

To import data from Access to Excel ,it is not


possible to link between Access and Excel sheet TRUE FALSE
The GAP detection options can be used to test for
completeness of data. TRUE FALSE
Exception testing can be used to identify ---------------
-- items Unusual Strange A or B
comparison of duplicates
Data validity test represents exception testing data testing

Year end ledger, inventory files or transaction files


can be tested for cut-off , to ensure that the data
has been provided is for the correct audit period True False
In Range Check , the data may not be in proper
sequence but should be within a predetermined
range True False

In ---------------- Check data entry follow a particular


sequence and also a predetermined range. Limit Sequence Range
related to virtual
Virtual memory is reality a form of ROM a form of VRAM
same as
same as multiprogrammi
Multiprocessing is multitasking ng multiuser
To help keep sensitive computer-based information set up a make a backup
confidential, the user should save the file password copy

to read from or
to calculate write information to print sheets of
What is the function of a disk drive? numbers to a floppy disk paper

A 4GL is Uses Cobol uses Java uses C++


A nanosecond is 106 sec 103 sec 1012 sec
What small, hand-held device is used to move the
cursor to a specific location on the screen? a keypad a mouse a frog

data to be data that has


transferred to been transferred the address of a
The memory address register is used to store memory from memory memory location

data to be data to be
transferred to or transferred to the address of a
The memory data register is used to store from memory the stack memory location
an instruction
an instruction that has been an instruction
that has been fetched from that has been
The instruction register stores decoded memory executed
Which of the following is used to indicate the
location on the computer monitor? a cursor a scroll bar a light pen
A mathematical procedure that can be explicitly
coded in a set of computer language instructions
that manipulate data. Formula Algorithm Program
Which of the following translates a program written
in high-level language into machine language for Artificial
execution? Assembler Compiler Intelligence
Memory
Detecting errors in real memory is a function of protection Parity Checking Range checking

To find where a file has been saved on disk, the use the directory search each file use the backup
user should search tools in turn facility
A series of instructions telling the computer how to
process data or files is defined as a Network Program System
save copies of
the file with the use different keep a record of
To ensure that data is not lost if a computer system same name on filenames on the computer
fails, the user should the system system failures
Having a single CPU alternatively process tasks Multiprogrammin
entered from multiple terminals is called Multiprocessing Time sharing g
The place in the CPU where the data and programs
are temporarily stored during processing is called
the ROM RAM Floppy Disk
Telephone
All are examples of computer software except Firmware Word Processor modem
Computer manufactures are now installing software
programs permanently inside the computer. It is Telephone
known as Firmware Word Processor modem
Which of the following file organisation forms most
efficiently allows access to a record Sequential Hashed Indexed
The part of the computer system controlling data Operating
manipulation is called the System ALU CPU
For direct access storage devices the recording Tracks and Blocks and
area is divided into Sectors Sectors Files and Tracks
Database,
The data hierarchy from the largest to the smallest Character, field, character,
is database record File, record, field
Which of the following hardware or software system Maintenance
controls provides a detailed record of all activities Valid character diagnostic
performed by a computer system check program Systems logs
Which one of the following parts of a computer is
necessary to enable it to play music? Sound card. CD-ROM MIDI interface
An educational CD-ROM on Indian Poets contains
1000 pages of text, 500 colour pictures, 15 minutes
of sound and 1 minute of video. Which of the four
different media listed takes up most space on the
CD-ROM? Text Pictures Sound
Which one of the following printers is suitable for
printing sprocket fed carbon copies? Laser Dot matrix Ink-jet

viewing an creating the presenting an


Multimedia software can be most productively used encyclopaedia plans for a order for stock to
for CD-ROM. building design. a warehouse.
replaced updated
To be effective a virus checker should be regularly never updated regularly

Which one of the following software applications


would be the MOST appropriate for performing Document Graphics
numerical and statistical calculations? Database processor package
retain
get into the make efficient confidentiality of
Passwords enable users to system quickly use of time files
How many bytes do 4 Kilobytes represent? 512 1024 4096
loss of duplication of
Back up of the data files will help to prevent confidentiality data virus infection
Which one of the following is the MOST common
internet protocol? TCP/IP HTML IPX/SPX
access to the printer can do
internet is files can be 1000s of pages
The advantage of a PC network is that quicker shared a day

The term A:\ refers to a file name a subdirectory the root directory

universal port up-line provider uninterruptable


UPS stands for serial service power supply
the system
the program requires a
orphan files can executable may network
The main problem associated with uninstalling be left on the not allow it to be administrator to
software is that system uninstalled uninstall it

You are conducting research for a Income Tax


assignment. The raw facts you collect are called data. documents. information.
Graphical Rules writte in
representation of procedural Logical Steps in
A flow chart is the logic language any language
Purchase, sales,
receipt, To fill the log It is mandatory in
A voucher entry in Tally is done for payments etc. register tally
prevent
assist in speed up unauthorised
Passwords are applied to files in order to maintenance access access

IT management
Each of the following is an enabler of IT-business senior executive lacks IT understands
alignment except: support for IT. leadership. the business
The basic systems model is used to describe
virtually all information systems and it consists of
the following elements: input. output. processing.

The use of Software that


computers to generates
design state-of- Using innovated
the-art, high- computers to do designs and
What is a computer-aided design system? quality products. architecture. artistic patterns.

A(n) __________ offers a solution package for an specialist or Application


entire industry. functional Service Provider enterprise
ensure the
filename is not
File extensions are used in order to name the file lost identify the file
Information systems controls include all of the preventive detective corrective
following EXCEPT: controls. controls. controls.

Hashing for disk files is called external hashing static hashing dynamic hashing
Components of expert systems include: a)
inference engine; b) user interface; c) knowledge
base; d) fuzzy logic A: (a) , (b), (d) B: (a) to (d) C: (a), (b), (c)
corrective preventive detective
Black box testing and white box testing are part of: controls controls controls
What is the term used to describe the point of
interaction between a computer and any other
entity, such as a printer or human operator? Component Interface Settings

The advantages of CASE tools are: a) reusability;


b) maintainability; c) portability; d) flexibility (a), (c), (d) (b), (c), (d) (a) to (d)
Turn the Select the Shut
Which of the following is an acceptable way to shut Press the reset computer off at Down option
down the computer? button. the power point. from a menu.
Yesterday, in your music class you saved your
compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the Create the files Ask the person Use the Find or
best way to locate the files? again. next to you. Search feature.
Components of an information system model are:
a) applications architecture; b) functional
architecture; c) technology architecture; d)
information architecture (a), (c), (d) (a), (b), (c) (a) to (d)
organisational preventive
Benchmarks form part of: detective controls controls controls
Continuity controls include: a) record counts; b)
date checks; c) label checks; d) run-to-run totals (a), (c), (d) (a), (b), (c) (a) to (d)

program change
Which is not part of help desk documentation: problem logging call lights requests
Testing of individual modules is known as: unit testing data testing thread testing

Design phase of CASE tools includes: a) data


architecture; b) decision architecture; c) interface
architecture; d) presentation architecture (b), (c), (d) (a), (b), (d) (a), (b), (c)
benchmark specifications parallel
Which is part of installation testing: testing matching operations
The computer operating system performs
scheduling, resource allocation, and data retrieval
functions based on a set of instructions provided by Peripheral
the: Multiplexer. processors. Concentrator.
Which of the following falls under multimedia data:
a) text; b) images; c) video; d) audio (a) to (d) (b), (c), (d) (a), (b), (c)
Replacement
personal
Which of the following procedures should be computers for Identification ofPhysical security
included in the disaster recovery plan for an user critical of warehouse
Information Technology department? departments. applications. facilities.
Designing relationships among components is part architectural procedural
of: design interface design design
Computer
Several Computers connected together is called: Client-server Client network
Which network topology uses a Hub? Star Bus Mesh
Which of the following topologies is used for
Ethernet? Star Bus Ring
To do a
To maintain a particular job To help
backup copy of such as editing, someone who is
are written all the storing applying for
Application software are programs information information employment
Which type of file search method requires a
computer first read all locations preceding the
desired one Direct Sequential Binary
Data
Which of the following areas of responsibility are Systems analysis communications Operating
normally assigned to a systems programmer in a and applications hardware and systems and
computer system environment? programming. software. compilers.
Which of the following is recommended when many A sequential file A sequential file A direct access
searches for data are required on a disk on a tape file on a disk
Tapes can only Information
be read by the formats
It is unlikely that a magnetic tape containing several machine on commonly vary
thousand blocked records can be used on two which they are Parity errors will between
machines of different architecture directly because written result architectures
Which component of the CPU has the most Address
influence on its cost versus performance Data path part Control Unit calculation part
Which of the following terms applies to network
used to connect computers with other computers,
peripherals and workstations that are in fairly close Distributed Local Area Wide area
proximity systems network network
Use the
computer to
which they are
Can send data to connected to Generally require
a computer and perform all a keyboard for
Intelligent terminals differ from dumb terminals in receive data from processing data entry and a
that they a computer operations CRT for display

A computer is to be linked to 8 terminals using a


single communication link. To permit simultaneous
terminal operations, communication path will
require which of the following Mixer Modem Multiplexor

Allows computer
signals to be
send over a Aids in back-up Packs data in a
A modem is a device that telephone line procedures disk file

A LAN includes 20 PCs, each directly connected to


the central shared pool of disk drives and printers. Planetary
This type of network is called a network Ring Network Loop Network

A computer based system for sending, forwarding, Office Executor Electronic


receiving and storing messages is called an Automation systems mailing
If a workstation contains a processor, monitor,
screen manipulation device, printer, storage and A dumb An intelligent A personal
communication capabilities, it is said to be workstation workstation computer
Time of day Encryption
Terminal hardware controls include control locks algorithms Parity checks
Terminal Communication
RS-232 is a Type of cable Standard protocol
A compiler
converts the A compiler is a
whole of a general purpose
A compiler does higher level language
a conversion line program code providing very
by line as the into machine efficient
What is a compiler? program is run code in one step execution

Lexical analysis,
Feasibility study, Implementation CONVERSION,
system design, and and code
What are the stages in the compilation process? and testing documentation generation
Which of the following is not a data transmission
coding scheme CRC Baudot ASCII
An interpreter is
a general
An interpreter purpose
does the An interpreter is language
conversion line a representation providing very
by line as the of the system efficient
What is the definition of an interpreter? program is run being designed execution
A device used in data communications to divide a Frequency
transmission signal into several sub-bands is division
known as a Modem Demodulator multiplexor
Third generation languages such as COBOL, C, High-level Middle-level Low-level
and FORTRAN are referred to as languages languages languages
It is faster than
Serial Communication is used over long distance parallel It is less error It is less prone to
because it communication prone attenuation
Accounting
systems,
In what areas is the COBOL programming Financial sector Graphic design commercial
language used? and engineering and education sector

Manage the Relieve the main


Communicate paging function CPU of repetitive
with the console in a virtual communication
The primary function of a front-end processor is to operator environment tasks
Specification and
What is the first stage in program development? design System Analysis Testing
Which of the following is not used for data
transmission within a local area network Fiber Optics Coaxial Cable Common carrier

The design of the System Analysis System Analysis


screen the user defines the involves creating
will see and use format and type a formal model
to enter or of data the of the problem to
What is System Analysis? display data program will use be solved
A device to device hardware communication link is
called A cache An interface A buffer
Testing to check
The different for errors before Hardware,
types of network the system is Software and
What will a good software provider consider? to be used introduced size of program.
The topology of a network can be each of the
following except Star Packet Ring
What is the 8-bit binary value of the decimal
number 85? 10101010 1100101 1010101
Which is the most common data transmission error Cyclic
checking method Parity Retransmission Redundancy
What is the decimal value of the binary number
1111? 15 4 64
Which of the following devices merges
communication signals onto a single line Port Modem Multiplexor
What is the decimal value of the octal number
215? 327 141 97
Data
Which tool is used to help an organization build and Data Mining management
use business intelligence? Data warehouse tools systems

memory access secondary


Cache memory enhances memory capacity time storage capacity
What is the decimal value of the hexadecimal
number FF? 30 255 256
Numbers are stored and transmitted inside a
computer in binary form ASCII code form decimal form
What is the hexadecimal value of the decimal
number 1476? 4C5 1B7 5C4
A byte corresponds to 4 bits 8 bits 16 bits
Basic Coding Binary Coded
What does EBCDIC coding of numbers mean? Description Decimal Bit Code Design
A Kb corresponds to 1024 bits 1000 bytes 210 bits
What is the binary sum of 01011 and 00101? 10000 1112 1110
Information is stored and transmitted inside a
computer in binary form ASCII code form decimal form

used to indicate used to detect is the first bit in a


A parity bit is uppercase letters errors byte
Because it
squeaks when Its moves like a
How did the computer mouse get its name? moved mouse It has ears
What are you most likely to use when playing a
computer game? Touch screen Light pen Joystick
CPU performance may be measured in BPS MIPS MHz
Tracing Reading bar
A digitising tablet can be used for? Printing letters diagrams codes
In processing cheques which of the following I/O barcode
techniques have banks traditionally used OCR MICR scanning
Which of the following is a pointing device used for
computer input? Touch screen Hard disk CD-ROM drive
Light sensitive
What does a light pen contain? Refillable ink Pencil lead elements
The capacity of a 3.5 floppy is around 100K 1.44 Mb 5 Mb
What general term describes the physical
equipment of a computer system, such as its video
screen, keyboard, and storage devices? hardware software output

Where would you find the letters QUERTY? Mouse Keyboard Numeric Keypad
What input device could tell you the price of a Optical mark
product Mouse Bar code reader reader
Where would you find a magnetic strip? Credit card Mouse Speakers
What are the individual dots which make up a
picture on the monitor screen Called Coloured spots Pixels Pixies
What input device can be used for marking a Optical mark
multiple-choice test? Mouse Bar code reader reader
mouse button
QWERTY is used with reference to screen layout layout keyboard layout
What input device could tell you the price of a bar of Optical mark
chocolate? Mouse Bar code reader reader
language software
A GUI is hardware interpreter interface
Second - Third -
First - generation generation generation
UNIVAC Computer belongs to the computers. computers. computers.
Name the first Indian Super Computer? Vishwajeet Deep Blue Param
is caused by caused by is due to bad
Disk fragmentation wear overuse disk blocks
Magnetic Ink
The technology which is used to check answer Optical Mark Character
sheets of multiple-choice questions in civil services Bar code Reader Reader Recognition
or similar examinations is: - Technology Technology Technology
converts a
slower than an program to
A compiler is a fast interpreter interpreter machine code
Dot - Matrix
Which printer among the following is fastest Drum Printer Printer Desk - jet Printer
Zipping a file means encrypting it decrypting it compressing it
Virtual
Very important Vital information information
reader user resource under reader & user
What does acronym VIRUS stands for sequence siege system
Electrically
An impact printer creates characters by using...? charged ink Thermal Paper An ink pen
mainframe
A client-server system is based on technology LAN technology WAN technology
A nanosecond is 10-6 sec 10-3 sec 10-12 sec
A procedural control used to minimize the possibility
of data or program file destruction through operator External file
error is the use of Limit checks Control figures labels
_______ software enables users to send and
receive data to/from remote computers application system operating system
A _____ is a running instance of an application project model pilot project
Splitting of CPU's time for different tasks _______
prevents time slicing multiprocessing multithreading multiplexing
______ computers are used in large organizations
for large scale jobs which have large storage super
capacities mainframes computers micro computers
_______ is responsible for all calculations and
logical operations that have to be performed on the arithmetic and central
data control unit logic unit processing unit
non impact
______ printer use laser light band printer drum printer printer
______ software enhances the user to enter ,store, data electronic
manipulate and print any text management word processing spreadsheet
______ software enables users to send and receive integrated communication
data to/from remote computers software software idea processor
_______ is the temporary storage place for deleted Microsoft
files my computer recycle bin exchange
_____ is a collection of related fields field file record
_____ language consists of strings of binary assembly machine high level
numbers language language language

______ symbol is used to represent processes like terminator processed connector


assigning a value to a variable or adding a number symbol symbol symbol
hp vectra fazitsu vp200
_______ is an example for micro computer PC-at system series
_________capability supports concurrent users
doing different tasks multiprocessing multithreading multiplexing
The ______ do not have processing power of their
own and has only a screen, keyboard and the
necessary hardware to communicate with the host.
For this reason, the terminals are referred
as_______________ "dumb terminals" dumb servers dummy terminals
distributed
A______is nothing but a PC with a network computing
operating system wan system windows NT
_____system is responsible for handling the screen
and user I/O processing host server back end
The______ handles data processing and disk
access in a Client/Server architecture host server back end
Both the DBMS and the application resides on the distributed
same component in a ____system PC LAN computing

When all the processing is done by the mainframe server host


itself, the type of processing is sometimes called as processing processing dumb processing
DBMS models can be grouped under____
categories four one two
hierarchical
file management database network
______is the most advantageous database system system system database system
A new user initiates a new process of execution at
the background,while the user can continue his
query process as usual in the foreground. This
situation is referred to as ______ multiprocessing multithreading multiplexing
The process of data being automatically written to a disk
duplicate database is called______ repairing redo logging defragmentation

Modulation/De Module/De-
Modem stands for __________ . Code/De-code modulation module
Multiple changes to the same record or a field are
prevented by the DBMS through______ fixes locks constraints
_________allows an application to multitask within
itself multiprocessing multithreading multiplexing
Linear area Local area Local array of
LAN stands for __________ . networks networks networks.

New process of execution is referred to as______ task process thread

Integrated Integrated Integrated


system dynamic Symbolic Digital Services Digital
ISDN stands for _______. networks. networks. network.
_____________ is the Worlds largest computer
network . Ethernet Internet ARPANET
_______is/are a popular front end tool visual basic power builder SQL * plus
When LAN connected together ,it is called
__________ . MAN WAN GAN

Data is broken into small unit called __________ . Cells Bits Packets

System Software Mail Simple Mail


modulation transmission transfer
SMTP stands for __________ . transfer protocol protocol protocol
The __________ protocol is a network protocol to Transmission
be built for the World Wide Web . Transfer Protocol protocol Hyper text

The computer which can receive data from other


computers on the network and print it is _______ File server Printer server Receiver
The hardware and the software requirements
together form the_____ platform configuration package
ATM, Asynchronous transfer mode is a
__________ technology. MAN and WAN LAN and WAN LAN and MAN
__________ is designed telephone system ISDN ATM Internet
Web based Web based Web based
Expansion of WBT is ______________ Training Technology Transport
_________ connects LANs. Bridges Routers Protocol
Collection of instruction is called a _____ procedure batch command
Combination of alphabetic and numeric data is
called _____ data alpha numeric alpha beta numerous alpha

space occupied, cost, size,


Computers can be classified based on price, no. of performance performance,
______,______and _______ users allowed their ratio cost
_______ is responsible for feeding data into the
computer input output feed
_______ is the capability of the o/s to run numerous
applications simultaneously multiprocessing multithreading multiplexing
_______ involves conversion of raw data into some
meaningful information interpreter compiler converter
_______ is responsible for obtaining the processed
data from the computer input processor ram
non-impact
_______ printers use light to produce the dots desktop
needed to form pages of characters impact printers drum printers printers

operating control program,


system, interpreter, monitor,
Hardware components in a computer are bootstrap, kernel,
assembler, program,
_____,____,_____,______ shell compiler keyboard, bus
_______ software are programs that are complex application
and can be developed or purchased operating system software windows 95
_______ is a set of special instructions used to
communicate effectively with the computer batch protocols software's
_______ converts a high level language into
machine language processor compiler assembler
_______ translates assembly language program
into machine language instructions compiler interpreter assembler
NS
D ANS

None of the above A

None of the above A

None of the above B

None of the above C


Five B

None of the above B

^ A

Puchasing,
Receiving and
Accounts payable D

Mone of the above A

All of the above D

One A

Ctrl+D B

All of the above D

F7 C
None of the above A

Journal Book B

None of the above B

A
All of the above C

5C

All of the above B

None of the above B

None of the above B

None of the above B


All of the above D

All of the above A

Reversing Journal B

None of the above A

21 B

All of the above B

Alt+f5 B

All of the above C

None of the above C

None A

All of the above A


None of the above C

Ctrl+f4 A

None of the above C

None of the above A

None of the above B

None of the above B

None of the above C

Cash and bank C

None of the above B

None of the above A

F9 C

None of the above C

None of the above A

None of the above A

None of the above B

F11 B

None of the above C


1B

F12 A

None C

A
None of the above C

A
None of them B

None A

None of the above A

None B

A
16 C

B or C A

TallyVault A

None of the above C

Payroll transactions. A

Eliminates the need


to reconcile control
accounts and
subsidiary ledgers. C

an instruction that has


been transferred from
memory C

Exception reporting C

AGP Card B

End-of-file and end-of-


reel code B

None of above B
None of above C

Limited access files C

None of above B

Batch Total D

None of above A

Data Dictionary B

None of above C

Make duplicate
copies of files A
None of above C
A cassette A

Distributed policies or
procedures A

None of above C

None of above C

None of above B

None of above A

None of above A

None of above B

None of above C

None of above A

None of above C

None of above B

None of above B

None of above A

None of above B
None of above B

None of above A

None of the above B

None of above B

None of above B

None of above A

None of above C

None of above C

None of above B

None of above A

None of above A
none the above A

A
A

extract data from file A

none of the above A

all the above D

none of the above B

all the above D

none of these A

none of the above D

all of them D
A

A
A

all the above D

none of these A

all the above D

none of the above D

filepet C

none of the above A

B
addition B

safety and database B

none of the above B


A

none of the above B

none of the above D

all the above A

all the above A


A

none of the above B


A

stub C

all the above D

all the above D

all the above A

none of the above A

all the above A

A
A
all of the above D

none of the above C


ACLL B

all the above A

all the above A

all the above D

all the above D

none of the above A


A

administered
questionnaire A

all the above D

all the above D

all the above D

Can define the audit


objectives D

All of the above D

None of the above A

All of the above D

General Procedures D

auto number D
A

none of the above B

macros D

action D

expression elements C

none of the above C

none of the above A

embedded C

justified B

new report D

none of the above A

insert chart C

none of the above C


none of the above A

report header D

none of the above B

none of the above C

none of the above C


macros D

delete B

none of the above C

A
none of the above A

none of the above B


none of the above A

none of the above A

OLE communicator C

edited A
html D
publish to web
wizard D

none of the above B

data definition D

yen A

list box B

create icon A

none of the above C

none of the above B

none of the above C


language A

data storage C

database dialog box A

63500 A

automatic field B

none of the above A

no duplicate key A

change all related


records C
none of the above B

none of the above C

properties B

update queries A

update queries A

outer join D
A

both 1 and 3 D

simple D

new properties B

child form B

None of the above B

one to many form B

querying C

gateways A

None of the above A

? D
B

data control B

record group B

all of the above C

DAY() C
static text B

main form A
none of the above C

tool wizard C

none of the above B


B

ledger A

none of the above A


report A

64,000 D

all of the above D

hyperlink D

none of the above C

primary key C
A
B

A
B
none of the above B

B
none of the above C

A
B
append query B

B
A

table join C

B
A
B
sub chart D

B
A

none of the above C

entities D

add A

A
B

use export D

B
B
B

* D

A
topic C
A

A
B

logical C
B

none of the above C

table B
B

detail D

none of the above B

none of the above A

report B

identifier B
none of the above A

forms A
none of the above C

option button B
A

none of the above C


none of the above A

none of the above A

none of the above A


static C

columnar form B

none of the above C


option button, toggle
button and check
boxes D

filter by input D

table B

layout B

record grab D

A way of maintaining
a log C

A collection of files B

Reliable DBMS C

uses tape as
opposed to disk C

Database access
controls D
None of the above A

None of the above C

None of the above C

IDENTITY columns C

UPDATE TABLE C

Source D

saving the file with


different filenames A

e-mail C

e-mail A

engines C

Auto Key C

reports are consistent


with the underlying
tables or queries. B

report and its related


query. A

not a primary key of


either related table. B
Many-to-one B

CompanyAddress A

The one-to-many
relationship B

Click the Delete


Relationships button
on the toolbar B

That records can be


added by clicking on
the plus sign C

They must be the


same data type D

An error message is
displayed. D
The subform is an
object on the form
and can be moved or
sized like any other
object. D

A many-to-many
relationship between
players and teams C

* C
Neither table C
title bar text, icon,
prompt. B

Sub. B

A drop-down list
enables the user to
enter text. C
must be set for two
words. C
maintain data on
different things in
different tables. A
all of the above D
a and b D

a or b A

None of above B

Relational Question
Language (RQL) C

Relational Model
Manager B

a and b D

All of the above. D

All of above A

b and c D
the database B

All of the above. C

All of the above. D

a and b A

a and b B

a and b C

entity-relationship
data modeling A

entity-relationship
data modeling B

entity-relationship
data modeling D

data migration D

relational data model A


more than one
column can use the
same name C

field D

tuple C

foreign key C

candidate key D

surrogate key B

All of above D
move the data into
the new database A

are not true DBMS


products B

None of the above A

a "wrong format"
problem B

a "wrong format"
problem D

b and c C

Query A

Spreadsheets D

Regardless of how
the objects and tables
are stored, the user
will have to reenter
the data in the tables
when the application
is upgraded. B
An application can be
created in such a way
that it objects such as
forms and reports can
be changed without
disturbing the existing
data. C

Join A

It contains macros C

Switchboard Manager D

store all corporate


transaction data in
one single location. C

None of the above C

Private Key A

Either B or C D

Either A or B C

None of the above A

None of the above A

B
None of the above A

None of the above C

none of the above B

Evidence, Ceremony,
Approval, Efficiency
and Logistics D

None Of The Above A

None Of The Above A

None of the above C

UN/EDIFACT D

functional groups D

None of the above A

Electronic cheques D
Online Catalog and
Customer
Endorsements C

All of the above D

Public Key and


Private Key D

None of the above B


All of the above D

Endorsements A

Junk mail D

Broadcast C

Quality management B

Economic espionage C

A competitors new
project B

None of above C

Using all capital


letters D

Security at the
transaction phase in
EDI systems is not
necessary because
problems at that level
will be identified by
the service provider. C

function wizard A

none of the above A

class files D

reference values D

none of the above A

none of the above A


none of the above C

none of the above B

Boolean D

none of the above A

count A

tip wizard B

none of the above B

countif C

none of the above A

none of the above B

print preview B

none of the above A

none A

none of the above B

none of the above B

none of the above B

session layer D

none of the above A

none of the above C

none of the above A

none of the above C


none of the above C
general electric C
editor B

none of the above C

none of the above C

none of the above C

none of the above B

none of the above A


none of the above C

many B

middle and lower D

glossary C

item search,index
search C
all the above D

all the above C


navigator gold 2.0 C
CompuServe D

telnet D

Hyper text transfer


port C

none of the above C

none of the above C

none of the above B

none of the above C

none of the above B

none of the above A

organization B
name of the above B

none of the above B

none of the above A

close A

none of the above B

none of the above B

none of the above B

none of the above B

none of the above A

none of the above B

none of the above A

none of the above A

none of the above B


none of the above B

none of the above B

none of the above B

none of the above A

none of the above B

none of the above B


none of the above B
none of the above B

archive D

none of the above D

fidonet A

none the above A

galenet A

channel B

Graphical Interface
format B

Joint pictures
experimental group A
browsers C

none of the above C

mails B

FONTCOLOR B

Common Gateway
Interface D

Connection B

None of the above B

Channel A

neither text nor image C


CGI C
none of the above C

none of the above B

SGML Composer C
documents A
None of the above C

None of the above C

video C

hotlink B

none of the above B

none of the above C

.wmf and .bmp C

service,hostname
and port B

none of the above C

<l1 type=shape> D

none of the above B

User A
none of the above B

none of the above B

none of the above A

none of the above C

all of the above B


none of the above B

none of the above C


none of the above B

none of the above A

none of the above A

none of the above B

none of the above C

none of the above C

none of the above B

none of the above B

none of the above B

none of the above B

none of the above B

none of the above C


none of t he above B
none of the above C
none of the above B

Document type data C

none of the above B

none of the above B

none of the above B

none of the above C

none of the above B

receiving information
from a host computer B
Channel A

Retrieve C

Neither A nor B B

Both B and A C

All The Above D

Formal Legal
Requirements, Open
System D

None of the above A

Neither A nor B C

Private Key A

None of the above A

Either A or B C

Either A or B A

Either A or B B
Cryptography C

Reviewing the
systems-access log. D

Sent to the correct


address. A

The private key is


used by the receiver
for decryption but not
by the sender for
encryption. A

Firewall vulnerability. D

Business- to-Billboard A

Broadcast B

Broadcast A

Domains A

None of the above C

Search and discovery A

None of the above B

Pulling cart B

None of the above C

Gateway D
EDI D

Customer-to-
Company B

Endorsed Cash B

None of the above C

E-token A

Subscription C
4B

pivot table D

tip wizard D
data marker A
data marker B

data marker C

data marker D

surface chart C

surface chart B

surface chart D
surface chart A

none of the above A

word 2000 A

tip wizard A

pie chart C

B
A

It is also used for


indicating fluctuations
in temperature
changes B

Data table. C

Data table. A

Data table. D

none of the above A

All of the above D

Pivot table item. C


B

A
worksheets D
A

Pivot table D

function wizard B

database A

A blinking border A

6,8,10 D

either b or c C

cost of initial set-up D

spreadsheet D

Rows A

Document filing A

click the column label C

INSERT A

formula. B

Tom McKenzie. C
Text constants D

\ D
It is impossible to
determine. C

G7*SUM(H9:H11) B
The phrase active
cell appears in the
Status bar. A

By typing the
reference of the cell
you want to move to
in the formula bar C

The Font Size


command on the
Tools menu. B
the File Type
command on the File
menu. C

Window A

Properties B

Clear C

Remove B

Margins C

Edit B

cell group. B
D C

source range. D

source range. B
Both the Copy and
Paste commands D

constant A
$B$4 D

#DIV/0! B

#DIV/0! C

Both the Cut and


Paste commands D

cycle through open


applications. C

Conditional formatting B

Double-click a cell
and click the Insert
Hyperlink command. B

the value in the cell D


text with either a two-
digit or four-digit year,
depending on the
format. C

It is impossible to
determine from the
information given. B

adding the later date


to the earlier one. A

the F1 key. B
Either 3/4 or .75,
depending on the cell
formatting C
either a cell on a
worksheet or a
variable. D
B1:G10 D

SUM C

Scatter C

Once a line chart has


been chosen it can be
changed to a pie
chart. D

hold down CTRL +


SHIFT A

Use multiple sheets D

Paste Special B

none of the choices B


None of the above C

select Print selection


in the Print dialog and
then print D

=(B2*(D4+C2) C

None of the above B

vertical A
None of the above C

NET A

none of the above B


none of the above B

none of the above A


none of the above B

none of the above B

Lynx A

none of the above B

Message Digest C

Formula A

Address B

Password Cracker A

Protocols D

Approving A
Hacking B

Police officer of IPS


rank. B

Cracker C

Howard Aiken A

Msn .com B

None of above C

Protocols C

Pin B
PAN A

hypertext tracing
protocol C

None of the above B

None of the above D

All of Above B

Hubs and nodes B


None of the above C

virus checker A

None of the above C

All of the above D

Twisted pair B

None of the above B

None of the above B

None of the above B

None of the above A

All of the above D

None of the above A


48 MB A

a gateway calling
program for internet
bridging B
Network PC C

If the hub goes down,


it brings down all of
the nodes on all of
the rings B

None of the above B


All of above D
None A
Both A and B B

Mesh C

Mesh B

Ring C

Mesh A

Data Link Layer D


Ethernet, token ring,
ARCnet B
mips B
Mips C

limited by modem
speeds C

Netscape B

All of the above A

application protocol
interface C

connects a computer
to a network D

Netscape B

None of the above C


none of the previous A

none of the previous D

make of processor A
is a protocol for the
transfer of files
between computers D

None of the above D

none of the previous D

none D

none of the previous C

search engine D

make of processor A
is a protocol for the
transfer of files
between computers D
is a protocol that
allows for remote
login D

Any layer can


communicate only
with the layer above
it. C

Individual computers
can connect to it
using an ISP. A

Port sniffing C

UDP flood A
traffic C

hub B

none of the above D

Limit logging on
access C

ActiveX-enabled sites
are safe. B

Use of encryption
methods D
by scanning the
computer for a
connection. B

Application updates D

Spyware D

LAN B

key loggers and


worms. C

Changing the content


of a Web page D
All of the above are
correct. D

Shutdown of nuclear
plant safety systems D

To obtain an accurate
inventory of network
related equipment
and parts and
network nodes D
update its prices as
soon as they are
changed D

Lycos Search B

Criminal records A

Spyware B
make large amounts
of money by parking
funds in their bank
account. D

Hoaxing B

Web stalking. B

viruses. B

Use anti-spyware
software. B

Logical access
controls B

Neither I or II C

telnet C

Misleads a program
recompilation B
both HTML and
Internet Explorer B

Web browser. B

None of the above A

one way HTML. C

MHTML D
viewing an Excel
worksheet that you
have saved as a Web
page. B

Go to the Bookmarks
or Favorites page C

the External Data


command A

Video C

TIFF C
Cut and paste it to a
word processor
document. C

network topology A

an encryption. B

PoIP A

Desktop server,
software, and
hardware. A

None of the above B

None of the above B

None of the above A

None of the above D

None of the above B

None of the above C

None of the above A


None of the above A

None of the above C

none of the above B

icons C

guide C

all the above B

none the above A


all the above B

eof,true D

project explorer D

bof,true D

val() D

oval D

none of the above C

none of the above B

fontsize D
one-ten thousandth of
a second C
listcount D

toolbox B

none of the above C

inputbox() D

dbopendynaset D

initialze C

graphical D

black B

white D
project explorer
window D
project explorer
window A

gotfocus D
none of the above C

activate D

none of the above C

none of the above B

style C

none of the above B

.ocx B

Audit A
On Error Resume
Next D
Resize A
UnloadMode
parameter to a zero
value A

None of the above D

Consists of several
Projects D

None of the above A

None of the above B

PaintPicture A

Msgbox error.number
& error.description D
To provide a
repository for images
used by other
controls D

GetBytes A

Value B

Input box D

Font C
KeyPress, KeyUp and
KeyDown D

Output mode B

x and y A

Property Set C
AutoRedraw property C

CurrentVal B

CStr A

None of the above B

None of the above C

None of the above D

None of the above B

built-in procedure. C

MsgBox statement
can be created with
the macro recorder,
while the InputBox
function cannot. B

A new check box can


be added. C

Terminate C

scribble drawing tool A

color guide C

primary color scheme A

36 C

linear A

slide sorter views C


all the above A

stream B

track changes A

none of the above C


standard drawing
tools C

used to store the


other tools of the
organizational chart C
available in the tool
bar B

any of the above C

eight B

all the above B

none of these B

none of the above B

moving B

drawing tools A
.html(hypertext
format) B

twelve C

.doc(document) B

none of the above A

transition D

view show A
master notes A
slide sorter view C
none the above B

none of the above A


b or c A

none of the above D

all the above D

all the above B

add-ins A

none of the above C

all the above A

none of the above B

outline pane D

power point 2000 D

provides suggested
content and design D

user can insert


picture to the title
slide which gets
reflected in all the
slides using that title
slide B

I slide view, drag the


slide icon to a new
location C
the slide that holds
the formatted
placeholders for the
title and sub-title for
the presentation is
called a title template D

the slides can be


reordered in the
outline view B

the slide that holds


the formatted
placeholders for the
title and subtitle for
the presentation is
called a title template D

set up show B

user can add data


labels and gridlines to
the chart B

the format slide B

none of the above B

22 B
four times B
text, hypertext, Power
Point, video and
sound. D
Line style, Line color,
text font, and text
alignment D

Fill color, Line color,


and Line thickness D

The graph
placeholder is
deleted. C

entered by the user. C

Line chart B

Pull down the Insert


menu and select
Chart, click the Insert
Chart button on the
Standard toolbar, or
pull down the Insert
menu and select the
appropriate Object. D

You cannot display


the underlying
datasheet once the
slide is finished. B

Change to Slide
Sorter view. C
The datasheet
window is toggled
from closed to open
(or from open to
closed). D
The application that
created the chart is
started. A
Microsoft Graph will
restart. D
a slide one bullet item
at a time, build bullet
items a letter at a
time, and build bullet
items a word at a
time. D
Subtle, Moderate, or
Exciting D

Neither enter nor exit;


neither fly in from top
nor bottom C

Ctrl B

Custom animation
can be used to affect
the way objects
appear on a slide, to
what objects do after
they appear on a
slide, and to the way
objects exit a slide. D

The advanced
timeline shows
neither the sequence
in which objects will
appear on the slide,
nor the duration of the
effect applied to each
object. C
Clips, organization
charts, and text D
Animation program A
Fly in, From top, and
Dissolve in D

There is no such
thing as a Datasheet. B

OLIP. B

You cannot change


the color of the boxes
in an Organization
chart. B

[Ctrl+Z] D

.frx B

none of the above B

none of the above B

none of the above B

none of the above C


File1.pattern=Dir1.pat
h C

count C

additem C

addnew B

movefirst C
UnloadMode
parameter to a zero
value A

Back Office A

none of the above A

none of the above A

none of the above B

none of the above A

none of the above A

none of the above A

Document Tip A

none of the above B

up and down arrow D

rotation D

none of the above B

none of the above C


pictures A

forms A

11 A

none of the above A

none of the above A

ctrl+m A
ctrl+m D
CTRL+SHIFT+P A

ctrl+shift+p C

None of the above B

Reasonableness D

None of the above B

All of the above C

None of above C

None of above B

None of the above D


Transferred from the
disk A

None of above B

None of above A

None of above C
None of above C

None of the above A

Hard disk B

None of the above B

Control Bus A

MAD B

Control Bus D

Shells, compilers and


other useful system
programs. D

alphanumeric form A
represented 127
characters A
32 bits A

1024 bytes A
a 32-bit bus or 32-bit
registers D

is the last bit in a byte B

CROM A
Hertz D

secondary storage
access time B

use variable size


instructions D

All of the above D


a modem interface B

laser printer. D

is used for cache


memory B

none of the previous C

contains a
microprocessor C

none of the previous B

none of the previous A

none of the previous D

Logic Bus B

e-mail D

none of the above C

none of the previous C


ONLINE
DOCUMENT A

ctrl+home B

ctrl+v or Del A

none of the above B

Border A

none of the above A

File A
Bullets D

clear all D

none dialog box A

files C

default document B

none of t he above A

tools+spelling menu A

last cell of the t able A

none of the above A

none of the above A

none of the above B

none of the above A

none of the above B


visual FoxPro B

alt+f5 A

none of the above A

hotmail A

vb script A

LAN A

the number of fields


names in the header
source must be the
same as the number
of data fields in the
data source B
delete cells option
allows to delete the
entire row or a
column or shift cells
up or shifts cells left C

top A

A section is a portion
of a document in
which certain page
formatting option can
be set D

A
A

none of the above B


A

with t he caps lock


key accidentally
turned on reverses
the case of the letters
that were capitalized
incorrectly and then
turns off the caps lock B

password can be upto


15 characters long B

top A
an .xls data can not
be inserted at
specified position in
the current document B

none of the above A

none of the above B

none of the above A

just keep typing D

rows and columns D

shift B

outliner C

send a package to a
friend D

Print preview B

Save C
sorting B

spreadsheet C

None of the above B

clipboard C
Font, Paragraph,
Bullet and Numbering C

Designated area on
the document C

None of the above B

digital scanner D

25 point B

impossible to
determine. B

Word cannot display


columns during
editing; you will see
them only when you
print the document. A

to leave an original
section of text in
place while pasting a
copy elsewhere D

None of the above B

Find and Replace B

AutoCorrect B

Insert, then paste A


To allow multiple
people to work on
one document in
collaboration with one
another C

Comments are
enclosed in a text box
at the right of the
document. D

Both through the


Tools menu and the
Reviewing toolbar D

The Versions
command will allow
you to save only two
versions of a
document: one
version of the original
and one version of
any changes made to
the document. A

The previous version


is opened
automatically. B

Thesaurus A

Word is not able to


tell the most recent
version of a
document. A

Insert C
A drop-down list B

Comments can be
edited or deleted by
left clicking the
highlighted text. C

None of the above C

Insert page break. D

numbers. C

macro. A
This action is not
possible. C

Debugging D

Edit C

an enlarged capital
letter at the beginning
of a paragraph. A

changing the color. A

A grid is a set of
horizontal and vertical
lines that determine
the placement of
elements in a
newsletter or other
document. D

The tab spacing


within each column D

72 D
Four B

Press Shift+Enter to
force a line break. C

A sans serif font at 45


points D
It depends on the left
and right margins,
and how many
columns are
specified. D

None of the above A

None of the Above A

All of the above C

None of the above A

None of the above B

None of the above C

All of the above D

Both B & C B

none of the previous D


involves using more
than one processor at
the same time D
use a virus protection
program B

to display information
or pictures on a
screen B

none of the previous. D


109 sec D

a message pad B

an instruction that has


been transferred from
memory. C

an instruction that has


been transferred from
memory A

the address of the


next instruction to be
executed D

a magic marker A

Data B

Parity Checker B

Validation B

use find and replace A

Modem B

backup to a secure
medium D

Multiplexing D

Magnetic Disk B

Shareware C
Shareware A

Random C

Primary Storage B
Schema and
subschema A

Element, field, file C

Parity check C

Serial interface A

Video D

Drum B
recording current
stock in a
supermarket and
answering customer
queries. A

updated once a year C

Spreadsheet D

simplify file structures C


8192 C

loss of data D

NetBEUI A

the operating system


is easy to use B

the hard drive D

uniform page source C


the system always
requires a re-boot
and defrag afterwards A

text. A

None of the above A

None of the bove A

allow encryption C

None of the above B

All of the above D

None of the above A

local B

identify the file type D


All of the above are
parts of IS controls. D

extensible hashing A

D: (b), (c), (d) C

general controls C

Control B

(a), (b), (c) C


Pull the power cord
from the back of the
computer. C

Put your hand up and


ask the teacher C

(b), (c), (d) C

corrective controls C

(b), (c), (d) C

resolution procedures C
loop testing A

(a) to (d) D

system walkthroughs B

Job control language. D

(a), (c), (d) A

Cross-training of
operating personnel. B

data design A

Hub C
Ring A

All of the above D

To Store data in an
organised manner B

Indexed B
Computer operations. C
A direct access file on
a tape C

Data record can


never be blocked
together C

Input output channel A

Protocol B

Are required with a


microprocessor which
permits some data
processing such as
input validation D

Time sharing
computer C

Speeds up online
printing A

Star Network D

Instant post-office C

A mainframe PC B

All of them C
Device interconnect
standard D
None of the above B

None of the above D

EBCDIC A

None of the above A

Time Division
Multiplexor C

None of the above C

Uses only one path D

None of the above C

Reduce competition
between the
input/output devices C

None of the above B

Telephone Lines C

None of the above C

An online protocol B
None of the above B

Bus B

None of the above C

Hash Count A

None of the above A

Acoustic coupler C

None of the above B

All of them B

secondary storage
access time B

None of the above B

alphanumeric form A

None of the above A


32 bits B

None of the above D


210 bytes A
None of the above A

alphanumeric form A

is the last bit in a byte B

None of the above D

None of the above C


VLSI B

None of the above B

voice recognition B

None of the above A


None of the above C
1 Gb B

input A

Printer B

Keyboard B
Printer A

Pickers B

None of the above C


word processing
software C

None of the above B

an operating system C

Fifth - generation
computers. A
Arjun C

none of the previous C

Image Scanning
Technology B

none of the previous C

Thermal Printer A
transmitting it C

None of above B
An inked ribbon and
print head D
Unix operating
system B
10-9 sec D

Cross footing tests C

communication D
process D
multitasking D

none of the above A

none of the above B

none of the above C

none of the above B

none of the above B

none of the above B


none of the above C

none of the above B

input/output symbol B

IBM-PC B

none of the above D

dummy servers A

LAN D

front end D

front end C

centralized A

data processing B

many A

relational database
system D

none of the above B


disk mirroring D

None of the above B

traps B

none of the above B

None of the above B

client-server C

None of the above. C

None of the above. B


all of the above D

None of the above. B

None of the above. C

None of the above. C

None of the above. C

None of the above. B

system A

LAN WAN and MAN B


Intranet A
Web based
Transaction A
Repeaters B
program D

number and alpha A

input, output,
performance ratios C

write A
multitasking D

process D

output D

thermal printers C

CPU, memory,
input, output D

interpreter B

procedures C

coder B

processor C

Das könnte Ihnen auch gefallen