Professional Documents
Culture Documents
F1
ALT+F1
Tally
ODBC
Tally IMP
TRUE
false
CTRL+F
1
None of the
above
Tally INI
None of the
above
A
CTRL+F
3
None of the
above
Invoice Bill
A or B
None of the
above
Two
Three
Four
Five
Ctrl+C
Alt+C
TRUE
FALSE
TRUE
FALSE
F3
ALT+F3
multiple modes.
*
Puchas
The systems that work
ing and
together to order,receive, Accoun
and pay for
ts
replenishment of stock
payabl
are --------------e
Tally allows to delete a
ledger from --------alteration mode.
Single
Puchasing
and
Receiving
Multiple
Cash
--------------------- is/are
Flow
useful for management in Statem Fund Flow
the decision making.
ents
Statements
In tally,the group
company must contain at
least _____________
members
Two
Three
To cancel a vourcher
entry in Tally, short-cut
key is ----------Alt+D
Alt+X
The accounting masters
and inventory masters
related to
We press ------------function key to display
the age-wise analysis of
Bills Receivable or Bills
Payable report
In Tally, we press -----------, to print report .
&
Account
s
payable
and
Receivin
g
Puchasing,
Receiving
and Accounts
payable
D
A or B
Mone of the
above
Ratio
Analysis
All of the
above
Four
One
Ctrl+T
Ctrl+D
Create
Informa Alter
tion
Information
Display
Informati All of the
on
above
F4
F5
F6
Alt+P
Ctrl+P
Shift+P
F7
None of the
above
A
2
In Tally, Types of
Accounts and Types of
Vouchers passed during
the period, can be seen
Tally
in ------------- report.
Audit
In the Tally Software, the
------------ directory stores
all data entered by the
user.
Bin
The Ledger Accounts are
unique in Financial
Accounting Packages
Customers can be
permitted to enter their
own data into the firms
computer using the firms
wide area network is an
example of
In Tally, we can
customize the Vouchers
as per our requirements
The number of steps in
Accounts Compilation
are
Each action/transaction
of a firm is described by
a ----------------.
Tally is based on
mercantile accounting
system
Statistics
Data
True
Journal Book
Sub
None of the
above
False
Enterpr
ise
Data
Enterprise
Interch Data ange
Information
TRUE
Electron
ic Data
Intercha All of the
nge.
above
FALSE
2
A
3
data
elemen data
t
record
FALSE TRUE
Display
stock
valuati
Ctrl + N is used to --------- on
Open
-method Calculator
Day
Book
4
Field
5 C
All of the
above
B
B
Change
Period
None of the
above
------------- in Tally
classify the accounts
under different heads so
that summarised
information is possible.
Revenue Account also
known as -------------Account
Method of Voucher
Numbering is/are
Ledger
s
Groups
Journals
Manual Automatic
Balanc
Accounts Receivable are e
Profit &
displayed in
Sheet Loss
None
None of the
above
All of the
above
Journal
Book
All of the
above
To assemble a product
from different items ------------- entry is used
A --------- purchase
orders data flow is
directed to the
purchasing system for
use in closing out the
outstanding purchase
orders in the receiving
system diagram.
Tally provides at least -------- predefined voucher
formats
The value of the
inventory is included in a
ledger accounts as an
asset on the balance
sheet
" The buyers can follow
up with the suppliers to
determine the reasons "
is an example of ----------------
Physical
Stock
Transfer
Reversing
Journal
Issue
None of the
above
Person
al
Nominal
None of the
above
Real
Stock
Journal Journal
Filled
Receipt
11
FALSE
manag
ement
by
objectiv
e
16
18
21 B
TRUE
manageme electroni
nt by
c data
exception analysis
All of the
above
F5
Main
Locatio
n
Primary
True
Ledger
s
0 to 9
F6
Primary
Cost
Categor
y
Alt+f5
All of the
above
False
Reports
1 to 100
10 to 60
None
Suspense
Order
All of the
above
Report
Output
F2
F4
Ctrl+f2
Ctrl+f4
Net
Transa
ctions
Closing
Balance
A and B
None of the
above
Suppli
er
True
F6
Alt + f6
functio function
n key
key
F7
function
key
None of the
above
None of the
above
Sales
Purchases A or B
1-41995 to
1-4-1997
31-31-4-1996 to to 31-3- None of the
1996
31-3-1997 1998
above
False
False
B
A
Vertical
A or B
Profit &
loss and
trial
balance
Main
location
Cash
and
profit &
loss
A or b
None of the
above
'Tally vault' is a
_________________
To create a sales
voucher in tally , you
have to press _______
A Group Company is ------------------------ given to
the merged accounts of
member companies of
the group.
In tally,"credit note"
voucher type records
entry for
________________
In tally you get currency
symbol option from
_______ menu
------------------ gives the
balance for each day for
the voucher type has
been selected.
For 'stock journal' entry
we press
______________ in tally
Securit
y
mecha
nism
Ledger a/c
Cost
None of the
category above
F5
F8
F9
A and B
None of the
above
a or b
None of the
above
Daybook
Balance
Sheet
None of the
above
Alt + F7
F10
F11
None of the
above
a name an identity
Sales
return
Compa
ny
creatio
n
Trial
Balanc
e
F7
Chang
es in
transac
tions or
vouche
rs
F7
Purchase
return
Changes in
Ledger
Both A
Masters
and B
F10
F11
1 B
F12
A
7
Projected approximation
of income or expenses is Balanc Profit &
called ______________ . e sheet loss a/c
"Administrator" type user
is also called 'Auditor' of
a company in Tally
You will get company
information , if you press
__________ from
gateway of tally
A constituent(member)
company can be a
member of more than
one group.
Default stock category in
tally is ______
To create a log of the
import activity in a file
_____________ is
located in the same
directory as an
executable program in
tally
In Tally,inventory
valuation method option
is available from
_______
TRUE
Budget
FALSE
F3
Ctrl+F3
TRUE
Main
locatio
n
FALSE
Alt+F3
None of the
above
Primary
Symbol
None of them
Tally.i
mp
Tally.ini
A or b
None
Stock
summ
ary
Stock
journal
Stock
analysis
None of the
above
None
By
In 'comp
pressin
info ->
g F11
During the security
functio creation of control'
n key
a company option
None
FALSE
A
8
128
Ledger
During voucher entry ----- Accou
-------- are used.
nts
User designated as ------- Admini
-------- can view audit list. strator
One
compa
ny to
another
compa
ny
created
withon
Tally
Tally supports Importing Packag
of data from ---------------- e
In an accounting
information system,
which of the following
Invent
types of computer files
ory
most likely would be a
subsid
master file?
iary.
Does
not
require
Which of the following is as
an advantage of a
stringe
computer-based system nt a set
for transaction
of
processing over a
internal
manual system? A
control
computer-based system: s.
data to
be
transfer
red to
memor
228
Groups
28
SubGroups
Data
Entry
16 C
B or C
TallyVault
Other
programs a
spreadshee
t or a
database
Both A
file.
and B
None of the
above
Cash
disburseme Cash
nts.
receipts.
Payroll
transactions.
Will be
more
Will
efficient
produce a
at
more
produci
accurate
ng
set of
financial
financial
stateme
statements. nts.
Eliminates the
need to
reconcile
control
accounts and
subsidiary
ledgers.
data that
has been
transferred
from
memory
an instruction
that has been
transferred
from memory
Owner
the
address
of a
memory
location
FUNDAMENTALS OF
COMPUTER
Inefficient usage of
excess computer
equipment can be
controlled by
Which of the following is
not the component of a
CPU
A trailer label is used on
a magnetic tape file, it is
the last record and
summarises the file. The
following is an
information not found in
the trailer label
Contin
gency System
Plannin feasibility
g
report
Capacit
y
Plannin
g
Exception
reporting
NIC
Card
RAM
AGP Card
End-of-file and
end-of-reel
code
None of above
None of above
VSAT
Control
totals for
one or
Record Identificati more
Count on Number fields
Storing
Writing
informati
on a
on on
Hard copy is a term used hard
Printed
the hard
to describe...?
board
output
disk
Voice
activat
What do the
ed
Voice
Visual
abbreviations VAB stand broadc answer
audio
for
asting back
board
What control would
prevent the accidental
erasure of customer
File
information from a
Validity Boundary
protecti
magnetic tape
check
protection
on ring
What are the individual
dots which make up a
Colour
picture on the monitor
ed
screen called?
spots
Pixels
Pixies
Limited access
files
C
None of above
10
File
Name
Identificatio Reel
n number
Number
Storage
Printer device
Pointing
device
System Physical
Logs
Security
Console
Log
An
inked
ribbon
and
print
head
Electric
ally
An impact printer creates charge
characters by using...?
d ink
Restric
t
The best security control physic
in a microcomputer
al
environment is to
access
What would you NOT
use with a flatbed
plotter?
A pen
A
What do you need for an cartrid
ink jet printer?
ge
An ink pen
None of above
Data
Dictionary
None of above
Require
Use only
user
unremovabl passwor
e media
ds
Make duplicate
copies of files A
Paper
None of above
A cassette
Distributed
policies or
procedures
None of above
Storage
capacity None of above
A drum
Eraser
A ribbon
Centralis
The greatest control
ed
exposure in a
Centralised function
microcomputer
Separa function for for PC
environment is the lack
tion of PC
Dispositi
of
duties acquisition on
A laser printer does NOT A print A laser
An INK
use?
head
beam
RIBBON
The amount of data that
a disk may contain is
known as the disks...?
Batch Total
Volume Size
11
Read
Magne
tic
tape
Serial
access
mediu
m
1.44M
B
A CDROM
Write
None of above
None of above
20 GB
700MB
None of above
A floppy
disk
Magneti
c tape
storage
None of above
A floppy
disk
Magnetic
tape
storage None of above
In a
drawer
None of above
By a
sunny By magnet
window objects
Random
access
medium
PAN drive
A CDROM
None of above
Floppy
disk
A
parallel
access
medium
Read
and
Write
ROM
chips
CDROM
RAM chips chips
None of above
RAM
chips
DRAM
ROM chips chips
None of above
Registers
Logic
bus
None of above
CPUs
Registers
Control
unit
None of above
0 bits
1 bit
8 bits
None of above
ALU
12
RAM
chips
Networ
k
softwar
e and
securit
y
softwar
e
Superc
ompute Personal
r
computer
Notebo
ok
comput Supercom
ers
puters
Business
software
and
games
software
Mainfra
me
compute
r
Jon Von
Neuman
n
compute
rs
First
genera Second
tion
generation
Hoover
generati
on
None of above
Which generation of
computer was developed
from microchips?
Which generation of
computer uses more
than one
microprocessor?
Second
generat First
ion
generation
Fourth
generati
on
None of above
Second
generat
ion
Secon
d
genera
tion
Third
generation
Fifth
generati
on
None of above
Third
generation
Fifth
generati
on
Which generation of
computer developed
using integrated circuits?
ROM chips
CACHE
Systems
software
and
application
software
None of above
None of the
above
None of above
None of above
None of above
13
Which generation of
computer developed
using solid state
components?
Secon
d
genera Third
tion
generation
Fifth
generati
on
None of above
Analysis,
System
Design,
and
Impleme
ntation
None of above
DATABASES
Specifi
cation,
Design
Name three steps
, and
Programmi
involved in developing an Testin ng, Design,
information system
g
and Testing
_______ is used for
CAAT as database
Oracle
Generalized audit
software perform
auditors to undertake any
past records and not
concurrent auditing
TRUE
Generalized audit
software is a file whose
capabilities for verifying
processing is logic
TRUE
CAAT's are computer
program and data that
auditor uses as part of
the audit procedures to
process data if audit
significance contained in
an entity information
system
TRUE
CAAT do not contains
package programs,
purpose written program,
utility programs or
system management
programs
yes
ACL
JCL
none the
above
FALSE
FALSE
FALSE
no
B
14
FALSE
FALSE
false
false
false
false
review and
evaluate
to obtain
the types of a record extract data
data
layout
from file
can bring
the data
indirectly
all the
above
none of the
above
15
Computer Assisted
Audited Technique
involves the use of
computers through
"Black Box Approach"
White Box Approach
necessary involves
expert knowledge on the
part of Auditor
CAAT involves an
Auditors' appreciation of
__________
Widespread end use
computing result in
unlimited errors creeping
into system going to
accept handling, thereby
increasing audit risks
For computerized
auditing usage of
sophisticated audit
software would be a
True
False
True
change
in the
method
of
recordi
ng
accoun
ting
transac
tion
docum
ents
driven
approa
ch
hardwa
re and
softwar
e
configu
ration
False
true
false
true
false
use of
accounting
codes
absence
of audit
trails
unique
risk driven approac
approach
h
none of the
above
processing
options, file checks
data
and
structure
controls
16
necessity
the
source
of data
availab
le to
Important knowledge
the
needed to begin planning audit
the use of CAAT is
organi
_________
zation
The move towards
paperless EDI would
eliminate much of the
traditional audit trail,
radically changing the
nature of audit evidence true
Computer operation
controls are designed to
provide
________________
Systems development
control, apart from
others, include
authorization, approval,
testing, implementation
and documentation of
new systems software
and system software
modification
A system could be
_________
A system exhibits
'entropy'
the of
by all
concer
ned
source of
data for
material
planing
none of these
false
providing
access to
computer
to all
organizatio
n personnel
true
false
natural/
manopen/close
made
d
true
all the
above
false
use of
any
program
s
none of the
above
A
conceptu
al/physic
al
all of them
D
A
17
true
false
true
false
enable
manage
multiple
schedu hardware & user
led
software
resource
jobs
resources
sharing
all the above
true
false
true
false
with
audit
depart
ments
with
production
department all the
s
above
true
false
true
false
none of these
18
false
true
false
true
false
databa
ses
planning
language
true
false
true
false
referen
ce files table files
filex
to
have a
compl
ete
picture
of a
file-o-man
model
base
B
report
files
none of the
above
file
manage
r
filepet
none of the
above
decentraliz
ed picture
all the
of a system above
19
syste
m
true
false
true
false
backups
retrieval
true
false
true
serious
ly
affecte
d
databa
se
false
subject
area
database
deletion
software
and
databas
e
addition
safety and
database
false
false
B
20
Errors are
correlated_________
Field check is exclusive
to a field
_________ law basically
states that there is a
specific probability of the
first digit of a no. being
1,2,3 etc
at the
year
end
on
immediatel quarterly none of the
y
basis
above
true
false
Benfish Benford
consec
utive
nos. or
alphab
ets to
entities
TRUE
Benjami
n
none of the
above
false
blocks of
nos. to the
primary
attribute of
the the
entity
B
random
placeme
nt of
compon
ent
none of the
above
false
valid,
numeri invalid,
c
alphabetic
A
none of
the
above
groupi
ng,
transa
ction
none of
regrouping, the
events
above
true
false
21
true
false
true
false
true
false
false
true
increm
ental
design
IDEA stands for
and
____________________ enlarge
_____________
activity
A transaction file is
sorted prior to the update
of master file
true
A sequence check on the
transaction or master
files by an update
program is not required
true
interactive
data
extraction
and
analysis
interactiv
e data
innumer
able
none of the
analysis above
false
false
22
Whenever monetary
transactions are
processed against
master files, the update
program should maintain
a correlation account to
record such transaction
that does not have a
matching master file
record
Internal tables are stored
tables from which certain
values are extracted for
further processing and
storing
For small to medium
sized systems, individual
modules are coded and
individually tested and
then assembled to be
tested as a whole-the
testing strategy is
referred to as
___________________
In systems testing, test
involves_____________
____
Recording transactions in
a controlled manner may
amount to loss of stored
data
true
false
true
false
e-brain
bottom
up
tests
yes
bouncing
ball
bigbang
stub
top-down
tests
hybrid
tests
no
read
data on provide
Audit software is used by client's information
the auditor to _________ file
to the audit
B
reperform
procedur
es
carried
out by
the
clients
program all the above
D
23
execut
ables, deleted,
master hard
none of
these
true
syste
m
analysi
s
softwa
re
false
true
false
yes
no
true
false
true
false
system
advanced
software
all the
above
none of the
above
24
On line testing
techniques the auditor
______ data either
_______ or fictitious in
order to see that a
specific program or sever
edit test is doing its work
Mapping software is
used by the auditor to list
unused program
instructions
Mapping software has
very objectives
Modeling is a variety of
software which
________________
On line testing can be
targeted for specific
functions carried out by
programs
manip
ulates, create,
real
false
none of
these
true
false
yes
no
can enable
the auditor
can be to execute
very
provisions
powerf on a
ul
number of
analytic different
al tool bases
yes
no
can
provide
the
auditors
with
useful
informati
on with
trend s
and
all of the
patterns above
25
provide
s
detaile
d
informa
tion of
Program code analysis
machin
involves _____________ e uses
__________ is a
software of CAAT
IDEA
Snapshot is software
which takes a picture of a
file or data or a
transaction passing
though the system
true
fictitio
us
data
applie
d
agains
t the
Base case system
client
evaluation
progra
includes____________
m
While base testing forces
on finding if there are any
defective execution
policies in a program
true
Black box testing seeks
to determine whether
application output is what
it is supposed to be
true
identifies
program
code which
may be
there for
fraudulent
reason
examina
tion of
source
code of
a
program
with
advice
to
followin
g the
logic of
a
none of the
program above
ACL
ALC
ACLL
false
comparison
of source
version of a
programme
d
analyzin
g the
picture
of a file
or data
false
false
A
26
true
specifi
cation,
progra
m
identifyi
ng
errone
ous
code
false
file,
hardware
none of
the
above
identifying
ineffective
code
identifyin
g nonstandard
code
all the above
false
false
authenticati
on of
resource
information requeste
support
d
all the above
In examination of audit
trail the following data
associated with an event
may be ___________-
start
and
finish
time
JCL
means______________
___
job
control job
langua connectivity all the
ge
language
above
none of the
above
A
27
Audit should be
periodically analyzed to
detect any control
weakness of the system yes
In an accounting audit
trail, intrusion detection
system might monitor the
amount of processor time
consumed by the user to
detect unusual deviation
from the amount
processor time requested
by the user in the past
true
A sample size calculator
program assists auditors
in determining RAND()
function
true
packa
ge
compu
ter
p[prog
ram
for
perfor
ming a
variety
of data
proces
Generalized audit
sing
software consists
functio
___________
n
no
false
false
master
list of
mathematic transacti
al concept ons
administered
questionnaire
28
Specializes audit
program may
be___________
Generalised audit
software could be used
by the following in
consistencies or
significant fluctuations
Generalized audit
software function
include____________
In the file reorganization
merging capabilities are
needed in data from
separate file is to be
combined on a separate
work file
Auditors cannot use
generalised audit
software to extract the
data needed for audit
purpose
Auditors can combine
functional capabilities of
generalized audit
software to accomplish
the task of
__________________
prepar
ed by
the
auditor
prepared
by the
entity
true
false
prepared
by an
outside
program
mer
engaged
by the
auditor
all the above
stratificat
file
ion and
access/ statistical/ar frequenc
organiz ithmetic
y
ations operation
analysis all the above
true
false
true
examin
ing the
quality
of
system
proces
s
false
carrying
analytical
review
examinin
g the
quality of
data
all the above
29
Wide
access
to
various
data
base
ACL
A
sampl
e of
transa
ctions
Tests
of
details
of
transac
tions
Can extract
and
Can aid
analyse
in simple
data
selection
High
End
IDEA
CAATs
A special
A utility
purpose
software
written
programme program
Complia
nce tests
of
Analytical
general
review
EDP
procedures controls
Can define
the audit
objectives
All of the
above
None of the
above
All of the
above
Event
Action
Procedur General
Macros Procedures es
Procedures
integer
number
true
false
primary
number
auto number
D
A
actions events
report
chart
form
macros
30
macro
expression
elements
To build complex
calculat code
expressions_____is used or
builder
The three list boxes
present at the bottom of
the expression builder
are called_____
________option is
selected from the view
menu to create macros
with conditions
_______report can be
created with minimum
user input
_______layout of a form
displays one record at a
time
The table or query name
on which we are going to
build our report is
selected from the ____
dialogue box
______and_____are the
two types of auto reports
available
There are no wizards for
creating a database in
access
______option from the
insert menu option is
chosen to add an
embedded chart
action
list
macro list
commen
ts
action
expressi
on
builder
expressi
on
element
s list
box
expression
elements
none of the
above
conditi
ons
action
insert
none of the
above
tabular
columnar
auto
report
embedded
columnar
datashe
et
justified
tabular
create
report
link report
colum
nar
and
stable and
tabular unstable
true
false
create
fields
add chart
embedd
ed report new report
dynamic
and
static
none of the
above
chart
insert chart
31
In ms-access, while
using SQL, references
constraint is used for
creating _______
_______is used to create
a mailing label
______header is present
at the beginning of the
report
______is present at the
bottom of each page in a
report
primary alternate
key
key
foreign
key
none of the
above
label
wizard
chart
wizard
mail
wizard
none of the
above
start
header
group
header
page
header
report header
report
footer
page
footer
group
footer
for
specifyi
ng
conditio
ns with
group
by
clause
none of the
above
none of the
above
conditi
on
group
VB
Module
s
reports
macro
names
none of the
above
forms
macros
add
append
insert
delete
report
macro
sheet
module
none of the
above
for
orderin for
g
updating
records records
false
A
32
none of the
above
none of the
message above
CME
none of the
above
object
linking
and
embed on line
ding
execution
on line
editing
none of the
above
OLE
object
OLE client
OLE
server
OLE
communicator
linked
embedded
connecte
d
edited
exe
DLL
BMP
html
form
wizard
report
wizard
query
wizard
publish to
web wizard
static html
dynamic
file
none of the
above
append add
insert
data
definition
dollars rupees
pesos
yen
RAD
RAP
static
file
RAID
33
unboun
d
bound
object object
comman
d button list box
displa
y as
icon
display
link
create icon
new
save as
html
none of the
above
home
end
none of the
above
bullet
command
DBMS
RDBMS
data
group
data
collection
new
dialog
box
new blank
database
dialog box
databas
e
new
databas
e dialog
box
create
html
startup
data storage
database
dialog box
255
64000
235
63500 A
automa
tic
AutoNumb
number er
number automatic field B
true
false
B
34
inner
join
primar
y key
cascad
e
delete
related
records
outer join
explicit
join
none of the
above
not null
candidat
e key
no duplicate
key
cascade
change
related
records
cascade
update
related
change all
fields
related records C
column
ar
tabular
table or query or
tables queries
true
both a
and b
record
or
records
none of the
above
none of the
above
false
B
Dynaset
field
propertie
s
properties
propert
y field
crosst
ab
querie
s
field
property
row/column select
queries
queries
update queries A
action
querie
s
change/
row/column delete
queries
queries
update queries A
inner
join
self join
no
match
join
outer join
D
35
true
new
form
dialog
box
false
form
form create wizard
dialog box dialog
both 1 and 3
simple
summa
ry
sum
append
change
properti
es
properties
form
propertie
s
new properties B
include
d form sub form
new
form
child form
Record
Form
Navigat Record
Operatio None of the
ion
Operations ns
above
column tabular
ar form form
filtering ordering
sorting
querying
filter
pipes
gateways
sorts
36
filter
by
form
filter by
selection
filter by
menu
None of the
above
true
false
bound
control
unbound
control
data less
control
data control
button
group
option
group
controls
group
record group
unbound
controll
ed
all of the
above
CURR
DATE() TODAY()
text
box
list box
DATE()
combo
box
DAY()
static text
bound
pivot
table
data
sheet
filter
button
wizard
ram*
columnar
form
tabular
form
main form
filter by
input
filter by
form
none of the
above
control
wizard
option
control
wizard
tool wizard
ram??
two of
the
above
none of the
above
B
37
________________
true
false
report
form
B
table
ledger
A
A
autore
port
report
module
none of the
above
chart
label
bitmap
report
true
false
true
false
60,000
255
25,000
64,000 D
true
false
true
false
true
false
table
query
form
all of the
above
D
38
form
report
hyperlink
true
false
true
false
Insert
Records
true
false
true
false
alternat composite
e keys keys
Tools
none of the
above
candida
te keys
primary key
true
false
true
false
true
false
A
39
true
false
true
false
zero
none of the
above
null
not null
true
false
true
false
true
false
true
false
B
both 1
and 2
none of the
above
pie
bar
true
false
true
false
true
update
query
false
select
query
B
delete
query
append query
B
40
true
false
false
outer join
self join
table join
true
true
false
false
B
A
true
freesta
nding
false
true
false
true
false
true
false
true
the first
field of
the
table
false
embedded
stand
alone
sub chart
the last
field of the
table
primary
key field
none of the
above
forms
reports
attribute
s
entities
true
false
A
41
insert
false
false
true
append
use
datashe
et in
forms
add
use
hyperli
nk
use import
true
false
true
false
true
false
true
false
true
false
true
false
true
false
use export
42
false
detail
D
A
group
topic
true
false
true
false
true
false
true
false
true
false
relation
al
list
true
action
langua
ge
range
logical
false
structured
query
language
C
B
event procedur
al based
languag none of the
e
above
43
report
form
true
false
group
record
session
detail
data
property
both a
and b
none of the
above
true
false
true
false
sub
forms
graphs
query
table
B
B
child forms
inner
form
none of the
above
chart
labels
report
identifier
pivot
create
form
none of the
above
filters
queries
sorts
form
bound
forms
none of the
unbound above
A
C
44
list box
true
button
option button
none of the
above
none of the
above
none of the
above
calculat
ed
bound
calculat
ed
unbound
none of the
unbound above
bound
static
sub
form
auto form
tabular
form
columnar form
connect
relations
hips
none of the
above
command
button,
check and
list boxes
list,
check
and
combo
boxes
option button,
toggle button
and check
boxes
filter by
record
filter by input
form
name
combo box
false
tabular
form
chart form
record
source
data
sheet
form
sub
forms
tabular
form
columna
r form
set
relation
option,
toggle
and
comma
nd
buttons
control
filter by filter by
form
report
B
A
45
________is a database
object which displays
data but cannot be used
to edit data
What term applies to a
collection of related
records in a database?
All of the following terms
are related to
computerized databases
except which one?
What is a database?
form
clipboa
rd
file
search
A way
to
analys
e and
manipu
late
numeri
cal
informa
tion
Informa
tion
about
certain
What does a record
progra
contain?
ms
remote
An RDBMS is a
DBMS
storing
data
offline
at a
Data Warehousing refers separat
to
e site
Unauthorised alteration
of on-line records can be
prevented by employing
report
sort
macro
table
field
layout
field
names
record grab
An
organise
d way of
storing
informati
A tool to
on about
produce
a set of
A way of
high quality similar
maintaining a
documents things
log
It contains
all the data
about one
specific
item
relative
DBMS
A
docume
nt which
contains
text
Relation
al DBMS
backing up
data
regularly
Compute Database
r
access
matching controls
Key
Computer
verifica sequence
tion
checks
A collection of
files
Reliable
DBMS
B
C
46
What is a report?
Report
s allow
users
to
extract
informa
tion as
hard
copy
(printed
output)
Extracti
ng and
What is the best way to
analysi
analyse and change data ng data
Compil
ers,
What are some popular
interpre
office orientated software ters,
applications?
editors
DEFAU
Which of the following
LT and
constraints can be used NOT
to enforce the
NULL
uniqueness of rows in a
constra
table?
ints
Which of the following
commands is used to
CHAN
change the structure of
GE
table?
TABLE
A tool
which
Reports
allows
provide a
text and
very
graphics
flexible way to be
of creating placed in
and editing docume None of the
documents nts
above
Spreadshe
ets make
data easy
to analyse
None of the
above
None of the
above
IDENTITY
columns
UPDATE
TABLE
Using
queries
FOREIGN
KEY
constraints
Word
processo
rs,
spreads
heets,
databas
es, DTP
PRIMAR
Y KEY
and
UNIQUE
constrain
ts
MODIFY
TABLE
ALTER
TABLE
Network
software,
backup
systems
47
Compon
ent
Source
using a keeping a
passwo backup
rd
copy
keeping
the
original
paper
copy
the
product the primary
code
key
mail
merge
A
databa
se
Graphics
browser
operators
wildcard
s
engines
Auto ID
AutoNu
mber
Auto Key
bookm
arks
Auto
Primar
y
48
Referential integrity
ensures that the:
records
in a
dynase
t are
consist
ent
with
the
underly
ing
tables.
main form
and a
subform.
forms in
a
databas
e are
consiste
nt with
the
underlyin
g tables
or
queries.
query
and its
associat
ed
dynaset.
the primary
key of the
related
table.
a field
from an
unrelate
d table.
related
tables in a
database
are
consistent
with one
another.
reports are
consistent with
the underlying
tables or
queries.
B
not a primary
key of either
related table.
One-tomany
Many-tomany
Many-to-one
CompanyI
D
Employe
eLastNa CompanyAddr
me
ess
A
49
The
Tools
menu,
Relatio
nship
Referential
window integrity
In a Customers tables,
what does a plus sign
next to the CustomerID
field mean?
Right-click
the
Double Relationshi
click
p line, then
the
select
Relatio Delete from
nship
the shortcut
line
menu
That
there
are
several
custom
ers
associa That some
ted
of the data
with
is not
that ID viewable
They
must
both be They
number cannot be
s
text fields
The join
line
The one-tomany
relationship
Select
Undo in
the
Relation
ships
pulldown
menu
Click the
Delete
Relationships
button on the
toolbar
That records
can be added
by clicking on
the plus sign
They must be
the same data
type
That
there are
records
in a
related
table
They
cannot
be
AutoNu
mber
data
types
50
Assume a one-to-many
relationship between the
Customers table and the
Loans table, with
referential integrity in
effect. What happens
when you attempt to
delete a customer ID
from the Customer table
that still has entries in the
Loans table?
Nothin
g,
Access
ignores
the
attempt
ed
comma
nd.
The
subfor
m is
not
visible.
A onetomany
relation
ship
betwee
n
teams
and
players
The
customers
ID is
deleted
from the
Customers
table.
The
custome
rs ID is
deleted
from the
Custome
rs table,
and all
the
related
loans
are
deleted
from the An error
Loans
message is
table.
displayed.
The
subform is
displayed
in
Datasheet
view.
The
subform
is
displaye
d in
Form
view.
The subform is
an object on
the form and
can be moved
or sized like
any other
object.
D
A oneto-many
A one-torelations
many
hip
relationship between
between
coaches
teams and and
coaches
teams
A many-tomany
relationship
between
players and
teams
51
The
Customers
table only
when there
are Loan
Either
records
table at associated
any
with that
time
customer
prompt,
title bar
text,
icon.
Dim
Create
List.
A
check
box
enable
s the
form
user to
choose
from
one of
several
existing
entries.
A text field:
must
be set
for one
word.
The
Loans
table at
any time
Neither table
prompt,
icon, title
bar text.
title bar
text,
prompt,
icon.
Sub
CreateList.
CreateLi
st.
Sub.
A dropdown list
enables
A text field the user
enables the to
form user
choose
to choose
from one
from one of of
several
several
existing
existing
entries.
entries.
A drop-down
list enables the
user to enter
text.
C
52
The purpose of a
database is to:
A database stores:
help
people
keep
track of store data
things. in tables.
relationship
data.
s.
Structured
Question
Language
(SQL)
Structure
d Query
Languag
e (SQL)
Relational
Question
Language
(RQL)
Database
Manageme
nt System
Data
Business Relational
Model
Model
System Manager
singleuser
databa
se
multiuser
applica database
tion
application
Jet
multiuser
database
application
facts.
A Customer Resource
Management (CRM)
system is an example
of_________
The industry standard
supported by all major
DBMSs that allows
tables to be joined
together is called
__________.
informati
on.
a and b
ecommer
ce
databas
e
applicati
on
a or b
ecommer
ce
databas
e
applicati
on
None of above
A database records:
singleuser
databa
se
applica
tion
Seque
ntial
Query
Langua
ge
(SQL)
Databa
se
Modeli
ng
System
maintain data
create
on different
tables of things in
rows and different
columns. tables.
metadat all of the
a.
above
figures.
a and b
D
53
The
user
the
databa
se
applica
tion(s)
interact
(s) with
the
DBMS
The
database
application
The
databas
e
manage
ment
system
(DBMS)
All of the
above.
the DBMS
accesses
the
database
data
None of
above
All of above
b and c
the database
All of the
above.
All of the
above.
In an enterprise-class
database system
________ .
In an enterprise-class
database system, the
database application ___ creates creates
.
queries form
In an enterprise-class
database system, reports
are created by
____________________ the
.
user
the
database
application
all the
users'
A database is considered data is
"self-describing" because in one
_______ .
place
it reduces
data
duplication
creates
reports
the
databas
e
manage
ment
system
(DBMS)
it
contains
a
descripti
on of its
own
structure
In an enterprise-class
database system, the
database _________ .
holds
metadata
holds
indexes
holds
user
data
54
A database designed
using spreadsheets from
the Sales department is
a database being
designed
____________________
_____ .
A database designed to
implement requirements
for a reporting application
needed by the Sales
department is a database
being designed _______
.
A database designed to
combine two databases
used by the Sales
department is a database
being designed
____________________
_____ .
Database professionals
use ________________
as specific data sources
for studies and analyses.
Database professionals
use a set of principles
called
________________ to
guide and assess
database design.
A very popular
development technique
used by database
professionals for
database design is
known as
____________________
___ .
as a new
from
systems
existing developme
data
nt project
as a
redesign
of an
existing
databas
e
a and b
from
existing
nondataba
se data
as a new
systems
developme
nt project
as a
redesign
of an
existing
databas
e
a and b
as a new
from
systems
existing developme
data
nt project
as a
redesign
of an
existing
databas
e
a and b
data
marts
data
marts
data
marts
normalizati
on
normalizati
on
normalizati
on
data
models
entityrelationship
data modeling
data
models
entityrelationship
data modeling
data
models
entityrelationship
data modeling
D
55
A very popular
development technique
used by database
professionals to adopt a
database design to new
or changing requirement
is known as _____ .
data
marts
The predecessor(s) of
file
database processing was manag
(were) __________ .
ers
relational data
model
the order
the order of of the
the
rows is
columns is unimport
important
ant
relation
row
field
field
key
tuple
field
composit
e key
foreign key
field
foreign
key
candidate key
compo
foreign
site key primary key key
surrogate key
All of above
record
record
Normalization is a
Insertio
process used to deal with n
Update
which of the following
anomal anomaly
hierarchical network
models
models
entities
in a
In a relation
column
____________________ vary as
______ .
to kind
An attribute is also
known as a(n)
.
table
A combination of one or
more columns used to
identify particular rows in
a is___ .
record
A combination of two or
more columns used to
identify particular rows in
a relation is________ .
A determinant that
determines all the other
columns in a relation
is______ .
When designing a
database, one of the
candidate keys in a
relation is selected as the
_________ .
normalizati
on
entityrelations
hip data
modeling data migration
Deletion
anomaly
56
modification anomalies?
Modern microcomputer
personal DBMS
products______.
assess
the
existing
tables'
structur
e and
content
are
supplie
d by
several
wellestablis
hed
manufa
cturers
They
use
sophisti
cated
mathe
matical
techniq
ues.
design the
database
structure
create
one or
more
new
tables
were
essentially
killed off by
MS Access
have
poor
respons
e time
Their report
delivery is
more
difficult
than report
delivery for Noninteg
reporting
rated
None of the
systems.
data
above
57
We have obtained
access to the company's
operational data. We
examine 50 records for
customers with phone
numbers that should use
the current area code of
345. Of these 50
records, we find 10 that
still use an older area
code of 567. This is an
example
We have obtained
access to the company's
operational data. We
have been asked to
produce a report with an
item by item analysis of
sales, but the only sales
figure available is the
total sale value for each
order. This is example
of_____
dirty
data
dirty
data
data
wareho
use
data
are not
stored
in
tables.
A data warehouse
database differs from an
operational database
because:
Which of the following
objects is used to display
a menu?
Form
inconsisten
t data
noninteg a "wrong
rated
format"
data
problem
inconsisten
t data
noninteg a "wrong
rated
format"
data
problem
data
data
warehou
warehouse se data
databases are often
do not have denorma
metadata.
lized.
b and c
Table
Report
Query
Queries
and tables
Macros
Spreadsheets
58
It will
be
easier
for the
user to
upgrad
e it if
the
objects
You are developing an
and
Access application that
tables
you expect to upgrade
are in
periodically. Which of the one
following statements is
databa
TRUE?
se.
The
Link
Tables
comma
nd can
be
used to
associa
te the
tables
in one
databa
se with
the
objects
Which of the following
in
statements regarding
another
Access applications is
databa
NOT true?
se.
Which of the following
brings a copy of the table
into the current database
and does not maintain a
tie to the original table?
Import
It is
It will be
advisabl
easier for
e to put
the user to each
upgrade it if object
the objects and
are in one
table into
database
a
and the
separate
tables in
databas
another.
e.
Regardless of
how the
objects and
tables are
stored, the
user will have
to reenter the
data in the
tables when
the application
is upgraded.
All
An
objects
application in an
may
applicati
consist of
on,
multiple
including
databases, the
each with
tables,
multiple
must
objects,
reside
linked to
within
yet another the
database
same
containing databas
only tables. e.
An application
can be created
in such a way
that it objects
such as forms
and reports
can be
changed
without
disturbing the
existing data.
C
Link
Join
Merge
A
59
It
contain
s more
than
one
table
It contains
tables,
reports,
queries,
and forms
It
contains
a user
interface
, or
switchbo It contains
ard
macros
Interface
Menu
Design
Wizard Build Menu Wizard
put key
business
create
informati
backup
on into
s for
centralize
the
mission the
hands or
critical manageabil more
corpora ity of data
decision
te data. collection.
makers.
Digital
Sign
Digital
Certificate
Hash
Functio Digital
n
Signature
Digital
Signatur
e
Switchboard
Manager
store all
corporate
transaction
data in one
single location. C
None of the
above
Digital
Certificat
e
Private Key
Hash
Functio
Hash
n
Hash Value Result
Either B or C
Digital
Signatu Digital
re
Signature
creatio Verification
Either A or B
Both A
and B
60
Instituti
onal
Overhe
ad and
Subscri
ber
Relying
Party
Cost
Certific
ation
Authori
ty
CA stands for
________________
A Digital Certificate is
issued by a Certification
Authority and is signed
with the CA's Private Key True
A Digital Certificate does
contain Owner's Public
Key, Owner's name,
Expiration date of the
Private Key, Serial
number of the digital
certificate
True
______________ enable
web servers to operate in
a secure mode.
______________ are
used by individuals when
they exchange
messages with other
users or online services.
Server
Certific
ate
Server
Certific
ate
Subscriber
Relying
Party Cost
Institutio
nal
Overhea None of the
d
above
Certified
Authority
Certificat
e
None of the
Authority above
False
False
Developer
Certificate
Personal
Digital
Certificat None of the
e
above
Developer
Certificate
Personal
Digital
certificat None of the
e
above
61
Repositorie Public
s
Key
Approval,
Evidence
Efficienc
y and
logistics,
Evidenc
e
none of the
above
Evidence,
Ceremony,
Approval,
Efficiency and
Logistics
False
False
Certificate
Resource
List
certificat
e
Revocati None Of The
on Letter Above
Public key,
Recipient
Private
Key,
Recipien None Of The
t
Above
Transmi
External
ssion
Format File File
None of the
above
C
62
ANSI
UN/EBCDI
C
batch
files
interchange
functional
sets
functions groups
Smart
Card
Embedded
cards
SET
None of the
above
E-cash
Digital
Cash
Smart
Cards
Electronic
cheques
In Active advertisement,
there are two types of
models. They are _____
and ________
The network based
technology is/are
____________
Decryption is a process
employed for scrambling
of plain text for web
based transactions
Billboar
ds and
Junk
Mail
Online
Catalog
and
Billboards
Broadca
st and
Junk
Mail
Online Catalog
and Customer
Endorsements C
EFT
All of the
above
Asymmetric
cryptosystem is based on
__________ and
____________
Login_I
d and
Primary
Passw Key and
ord
Private Key
EDI
True
False
UNESC
O
UN/EDIFACT
B
Public
Key and
Passwor Public Key and
d
Private Key
D
63
Global
Networ
k
Active
or push
based
adverti
sing
Private
Network
Passive or
pull-based
advertising
Satellite
Area
Network
Glow
sign or
hoarding
strategie
s
None of the
above
All of the
above
Broadc
ast
Junk mail
Billboard Endorsements
Directmail
Bulk-mail
Junk mail
Catalo
g
Endorseme
nt
Billboard Broadcast
Low cost
Error
of
checkin Data
operatio Quality
g
Integration n
management
Compe
titive
espion Corporate
age
espionage
Industrial
espionag Economic
e
espionage
Contact
A list of numbers of
compet the
itors
manageme
clients nt group
Researc
h data
A competitors
new project
64
singleuser
databa
An online drugstore such se
as Drugstore.com is an
applica
example of_______
tion
Which of the following is Replyin
an example of
g
unacceptable online
promptl
netiquette?
y
Remov
able
drives
that
can be
locked
up at
night
provide
adequa
te
securit
y when
Which of the following
the
statements is correct
confide
concerning the security
ntiality
of messages in an
of data
electronic data
is the
interchange (EDI)
primary
system?
risk.
The wizard that is used
to import text files
is_________________
The alphabet indicating
the column followed by
the row number is known
an__________
text
import
wizard
multi-user
database
application
ecommer
ce
databas
e
applicati
on
Keeping
messages
short
Including
the
Using all
Subject capital letters
None of above
Encrypti
on
performe
d by a
Message
physicall
authenticati y secure
on in EDI
hardwar
systems
e device
performs
is more
the same
secure
function as than
segregation encryptio
of duties in n
other
performe
information d by
systems.
software.
Security at the
transaction
phase in EDI
systems is not
necessary
because
problems at
that level will
be identified by
the service
provider.
C
convert text
to columns tip
wizard
wizard
function wizard A
cell
referen row
ce
reference
column
referenc
e
none of the
above
A
65
text
files
quattropr
o or
xbase
Lotus 1-2-3 files
class files
serial
values
domain
values
range
values
reference
values
=current
date()
none of the
above
# sign
none of the
above
AutoSu
m
AutoFill
function
wizard
none of the
above
variabl
es
arguments
paramet
ers
none of the
above
text
logical
numeric
Boolean
=today(
)
=date()
dollar
sign
concat
enate
pmt
merge
none of the
above
countif
vlookup
pmt
count
66
pivot
table
wizard
chart
wizard
tip wizard
sumif
pmt
countif
none of the
above
averag
e
sum
sumif
countif
print area
none of the
above
AutoFill
none of
the
above
page
setup
autofor
mat
borderi
ng
formatting
page
setup
print area
convert
text to
columns
wizard
shading
none of the
above
print preview
sorting
none of the
above
all
blanks
none
A
67
www.e
ncy.in
www.eb.co
m
none of the
above
URL
DNS
internal
networ network of
k
network
FTP
intermed
iate
none of the
network above
applica
tion
transport
layer
layer
physical
layer
session layer
finger
ping
service service
ftp
service
none of the
above
none of the
above
FTP
uniform
researc
h
locator
TELNET
ARCHIE
uniform
resource
locator
unlimited
restore
none of the
locator
above
host
comput
er
messa
ge
name of
the
resource
Delphi
Microsoft
none of the
scheme above
comman none of the
d line
above
general
sears
electric
net
web
browser
editor
read the
browse Usenet
r
news
search
for
databas
none of the
above
scheme
C
C
C
68
Compu
Serve
internet
dialer
spy mosaic
none of the
above
Alta
vista
finger
server
list
no
open text
ftp server
directories
maximum
of five
wincim
or
maccim
excite
none of the
above
web
server
image
list
none of the
above
none of the
above
one
many
B
D
A
C
middle
lower
top
middle and
lower
hotlist
director
y
search,
index
search
infosee
k
directory
index
glossary
menu
index
search,it
search,men em
u search
search
item
search,index
search
excite
lycos
lynx
netshar
k
cello
69
mosaic
Lycos
navigator gold
2.0
internet
IBM
CompuServe
finger
service
ftp
telnet
Hyper
Hyper text text
transmissio transfer
n port
protocol
Hyper text
transfer port
ftp
uucp
none of the
above
telnet
none of the
above
transfer
transfer transmissio communi
control n control
cation
protoco protocol/int protocol/i
l/intern ernet
nternet
none of the
et
protocol
protocol above
three
none of the
above
web
servers
none of the
above
the
the internet the
internet administrati internet
adapter on
access
none of the
above
lynx
SPY MOSAIC is
Micros
distributed by_______
oft
______ is a program that
helps us to log on to
other networks
Usenet
Higher
text
transfer
HTTP is the acronym for protoco
__________
l
______is used to transfer
and copy files over the
internet
iccp
_____ is a program that
helps us to log on to
other networks
yahoo
one
ftp
two
domain
ftp
name
servers servers
70
browse
r
univers
al
resourc
e
locator
frequen frequently
t asked asked
query
question
WSIRC stands
for______
Two of the important
browsers are_____
and_____
Lynx is a _______
programme that works
with terminals
The huge list of
keywords from important
SLIP,P
PP
connec
tion
wide
search
for
informa
tion
and
researc
h
lynx,mi
nx
world
wide
web
server
glossar
y
protocol
site
organization
uniform
resource
locator
uniform
resource name of the
label
above
franticall
y asked
question
none of the
above
TCP,IP
IP,UDP
none of the
above
response
request
close
windows
sockets
internets
relay chat
world
search
for
informati
on and
research none of the
council
above
world wide
web client
index
none of the
interface above
none of the
hotwords above
B
71
VERONICA is an
acronym for
_______________
very
easy
and
rodent
oriente
d net
wide
index
to
comput
erized
archive
s
univers
ity of
berkele
y,berke
ley
freenet
very
organised
network
integration
and
communica
tion
application
verificati
on on
network
integrati
on and
communi none of the
cation
above
university
of
cleveland,cl
eveland
freenet
universit
y of
Californi
a net
none of the
above
dns
none of the
above
telnet
and ftp
none of the
above
wais,win
socks
winsock
none of the
above
none of the
above
books
marks
none of the
above
B
B
B
72
none of the
above
animatio
graphic programms n,scripts,
s,video ,images,tex executab none of the
s,audio t
les
above
first
page
home page
global
networ
k news
yahoo
service
global
networks
navigator
electronic
mail
grand
network
news
search
engines
none of the
above
none of the
above
Netscape
page
email
starter
and net site,netsca
confere pe page
nce
wizard
yahoo
and
altavista
none of the
above
ftp
archive
Lycos
point
catalog review
all the
above
none of the
above
apple
link
Delphi
fidonet
images applets
_______ is a program or
a tool that helps us find a newsgr
file anywhere on the net oup
telnet
The databases to enable
keyword search using
Lycos are a2z,_______
______ is a large
worldwide bulletin board
service network
bitnet
animatio
n
B
B
73
comput
er
related
abbrevi
ations
and
BABEL consists a
acrony
glossary of _____
m
Dictionaries,encyclopaed encyclo
ias,government and
pedia
other references are
Britanni
found in ______
ca
search
Yahoo,lycos,excite and
engine
webcrawlers are _____
s
Graphi
cal
interpre
ter
GIF is the acronym for
formatti
____________
ng
Joint
Picture
s
JPEG is the acronym for Expert
___________
Group
The Web aids users to
explore the ________
mails
yahoo,i
The three most popular
nfosee
mailer are_____,_____
k,altavi
and______
sta
biographica
l
bookstor none the
information es
above
on-line
reference
works
more
informati
on
galenet
web
directories
databas
e
Graphica
Graphical
l
Graphical
interchange interface Interface
Format
format
format
Jumbled
pictures
expert
graph
Joint
pictures
expert
graph
Joint pictures
experimental
group
documents
net
browsers
eudora,n
netscape,ie etscape none of the
,lynx
and pine above
mails
FONTCOLOR
informa
tion
web pages
network
connecti
ons
In Microsoft Internet
Explorer, the color of the
text can be specified
using _________
BACK
GROU
ND
FCOLO
R
channel
COLOR
74
Comm
unicati
on
gatewa
y
Common
interfac graphical
e
Interface
Commun
ication
Common
graphical Gateway
interface Interface
Networ
k
Interface
Commun
ication
Connection
Current
web
page
Browser
Client
None of the
above
Browse
r/user
Server
text
only
image only
Web
text or
image
Channel
A
neither text nor
image
C
SQL
alphala
nguage
palm is
not
eatable
PLSQL
betalangua
ge
SGML
metalan
guage
pancake
is not
edible
CGI
none of the
above
SGML
Proces
sor
web
sites
palm is not
elm
C
C
none of the
above
SGML
Preprocess SGML
or
Parser
SGML
Composer
images
documents
applets
75
The components of a
URL are ___________
Internet
equipm
ent
training
faculty
Internation
al
Engineerin
g trainers
and faculty
Internet
Engineer
ing Task
Force
MS
Internet
Explorer
MS
and
Internet
Netscap
Explore Netscape
e
r and
Navigator
Navigato
Mosaic and Mosaic r
None of the
above
None of the
above
text
data from a
database
symbols
video
hyperli
nk
hypertext
hotword
hotlink
in userdefined
order
none of the
above
B
C
in
in
random sequential
order
order
first
start
home
none of the
above
.bmp
and .gif
Service
,
hostna
me and
director
y path
.bmp and
.jpeg
.gif and
.jpeg
service,hos
tname,port,
directorypath
service,p
ort and
directory service,hostna
path
me and port
B
76
mail
servers
,mail
clients
and
alternat
e
service
s
mailing
lists,mail
server
mail
robots
vendors,ma and
il
gateway
identificatio s to
n and
other
none of the
password
services above
<hr
size=n>
LAN
data
scriptin
g,parsi
ng and
compili
ng
<l1
type=shape>
classifie
d
general
instructio none of the
ns
above
Browser
User
intranet
none of the
above
peer-topeer
connectivity wan
none of the
above
parcel
packets
none of the
above
news,cooki
ng and fine
arts
email,file
retrived,i
nternet
none of the
tools
above
C
77
nt,wind
communi
ows95,i mosaic,gop cator,ie,l
e,winzi her,eudora, ynx,wins all of the
p
trumpnet
ock
above
ARPAN none of the
dnet
arpanet
ET
above
defensi
ve
defensiv
admini
e
strative dedicated
advance
rank
and
d
DARPA stands for
admini registered
research
____________________ stration projects
projects
____________________ networ administrati administr none of the
_______
k
on
ation net above
The uuencode files start
none of the
with a _______
start
begin
first
above
milnet,
DARPA is broken into
smaller
intranet, none of the
________ and _______ arpanet mailnet,inet extranet above
NSFNET is the united
states provides service to
_____ and_____
The first international IP
network connections
were established in 1973
with _____ and_____
A_____ is a set of
computers
interconnected by
transmission paths to
exchange information in
internet
A computer that provides
a service usable by other
computers is
called______
B
B
C
B
A
educati
on,rese music and
arch
dance
cooking
and
dining
none of the
above
united
states england,no
and UK rway
united
states &
Russia
none of the
above
network
none of the
above
stand-alone servers
none of the
above
server
client
client
78
A_______ is the
representation of
physical connectivity of
the computers in internet
network
topology
network
redirecto none of the
rs
above
data
terminal
equipment
data
target
equipme none of the
nt
above
physical
layer
network
layer
none of the
above
packet
switching,st
ore and
forward
network
smart
network
and
dumb
network
none of the
above
file
access
anonymous file
ftp
transfer
none of the
above
PAN,N
AN,AA
N
KAN,RAN,
VAN
VAN
MAN
LAN
MAN
analog
digital
networ
k card
detaile
d
transac
tion
DTE stands for
explan
____________________ ation
The basic function of the
______ is transmitting
the bits over a channel
applica
tion
layer
point to
point
networ
k and
broadc
ast
channe
l
networ
k
C
B
C
B
79
Data
type
definiti
on
Docume
Define type nt type
Document type
of data
definition data
C
Mappin
g
Satellit
e link
and
digital
signals
Standa
rd long
internet
protoco
l
Prime
prolong
ed
protoco
l
storing
data on
a disk
drive
Modulation
Dedicated
access and Cable
dial up
and
access
wires
none of the
above
none of the
above
Point to
point
protocol
Pillar to
pillar
protocol
none of the
above
sending
information
to a host
computer
storing
data on
the hard
drive
receiving
information
from a host
computer
Size
Channel
Bandwi
dth
Speed
80
Find
Save
Recipie
nt
Relying
Party
Party
Public
Key
Browse
Retrieve
Either A
or B
Neither A nor
B
Both B and A
Both A
Private Key and B
Electronic
Commerce
Not
False
Not True
Closed
System
,Formal
Legal
require
ments
Formal
Legal
Requireme
nts
Electroni
c Fund
Transfer
s
All The Above
Open
System
Formal Legal
Requirements,
Open System
D
81
Affirma
tive Act Efficiency
Signer
authentic None of the
ation
above
Signer Document
Authen Authenticati Both A
tication on
and B
Not
True
Neither A nor
B
Not False
Nonrep
udiatio
n
Digital
Service signature
Digital
certificat
e
Private Key
Crypto
graphy
Private
Key
None of the
above
Public Key
82
Private
Key
Private
Key
Private
Key
Public Key
Both A
and B
Either A or B
Public Key
Both A
and B
Either A or B
Public Key
Both A
and B
Either A or B
Cryptography
Reviewing the
systemsaccess log.
Decryp
tion
Cipher
Using
data
Performing
encrypt validity
ion.
checks.
Encrypti
on
Conducti
ng fraudawarene
ss
training.
A digital signature is
used primarily to
determine that a
message is:
Unalter
ed in
Not
transmi intercepted
ssion.
en route.
Receive
d by the Sent to the
intended correct
recipient. address.
83
Both
sender
and
receive
r must
have
the
private
key
before
this
encrypt
ion
method
will
work.
The private
key cannot
be broken
into
fragments
and
distributed
to the
receiver.
What is a major
disadvantage to using a
private key to encrypt
data?
Which of the following
risks can be minimized
by requiring all
employees accessing the
information system to
Collisio Data entry
use passwords?
n.
errors.
Busine
ss-toThe acronym for B2B is
Busine Business___________
ss
to-Backend
The _____________
model is the least
intrusive model but
requires active search on Billboar On-line
the part of the customer d
Catalog
__________ is / are a
form of advertisement
Custo
where people relate their mer
experience with products Endors
and services
ements Billboard
The
private
key is
used by
the
sender
for
encryptio
n but not
by the
receiver
for
decryptio
n.
The private
key is used by
the receiver for
decryption but
not by the
sender for
encryption.
A
Failure
of server
duplicati
ng
Firewall
function. vulnerability.
Backend
-toBusiness- toBusiness Billboard
Endorse
ments
Broadcast
Catalog
Broadcast
84
Interme
diaries portals
.COM
Domains
Order
Placem
ent
Service
Search
and
discover
y
None of the
above
Prepurchas
Purchase
e
consummat preparati Search and
ion
on
discovery
Online
catalog
Endorse
ment
model of
marketin None of the
g
above
Shopping
cart
EDI For
EDI For
Administ
Administrati ration,
on,
Commer
Consumer ce and
and
Transpor None of the
Transport
t
above
Post
purcha
se
interact
ion
Billboar
d
The ________ allow
model
companies to bypass the of
need for costly printed
marketi
catalogs
ng
A ________________ is
a basket on the Net that Online
is used to place the items Catalo
that are being purchased g
EDI
For
Admini
stration
,
Comm
erce
and
EDIFACT is an
Transa
abbreviation of ________ ction
85
EDI
Compil
er
Busine
ss-toBusine
ss
Emerg
ency
Cash
TCP/IP
EFT
Gateway
Interpreter
Assembl
er
EDI
BusinesstoConsumer
Consum
er-toCustomer-toBusiness Company
Electronic
Cash
Euro
Cash
Endorsed
Cash
Comm
unicati
on
Business
Service
Perspe Process
Perspect None of the
ctive
Perspective ive
above
Microc
ash
Micro
Transaction TT(Tiny
s
token)
Decryp
tion
SSL
Encrypti
on
E-token
Subscription
C
86
data
table
4 B
filtered
table
index
table
pivot table
chart
wizard
convert
text to
columns
wizard
tip wizard
category
legend
data marker
series
or rank
category
legend
data marker
series
or rank
category
legend
data marker
series
or rank
category
legend
data marker
pivot
table
wizard
series
or rank
column
chart
bar chart
column
chart
bar chart
column
chart
bar chart
column
chart
bar chart
wild card
spaces characters
A
87
excel9
7
internet
explorer
Netscap
e
word 2000
chart
wizard
convert
text to
columns
wizard
tip wizard
line
chart
bar chart
stock
chart
pie chart
true
false
and
or
pivot
table
wizard
3Multidimens 4dimensio
ions
dimensions ns
true
false
Data
table
Pivot table
88
It is
also
called
as
highlowclose
chart
It shows
trends over
time
It is often
used to
display
share
market
prices
over a
period of
time
Pivot
table
Scenario
manager
Solver
Data table.
Goal
seek
Scenario
manager
Pivot
table
Data table.
Goal
seek
Pivot table
Solver
Data table.
Worksheet
Spreads
heet
none of the
above
Workb
ook
It is also used
for indicating
fluctuations in
temperature
changes
89
Perfor
ming
Performing
calculat database
ions.
operations
Performi
ng text
formattin All of the
g.
above
Colum
n field
Row field.
Source
table
name.
two
three
true
false
Pivot table
item.
B
B
3Multidimens 4dimensio
ions
dimensions ns
Data
table
Pivot table
It
display
s the
data
series
one on
top of
the
other.
It is useful
when
several
component
s are
changing
and the
user is
interested
in the sum
of the
component
s.
It can be
represen
ted in 3dimensio
ns
Count.
Standard
deviation
SumIf
A
90
A workbook consists of
many ________
databa
ses
records
tables
It is a
tool for
summa
rizing
and
analyzi
ng the
data
records
in an
interact
ive
manner
.
It is a tool
that
provides a
way to view
and
compare
the results
of all the
different
variations
together on
the
worksheet
It
summari
zes the
data by
using
analytica
l
functions
.
Scenario
manager
solver
text
import
wizard
A spreadsheet is a grid
of rows and columns and
is called as a ________
Pick out the window that
is not a form of excel
___________
worksh
eet
workbook
applica
tion
document
window window
A dark
wide
border
convert text
to columns tip
wizard
wizard
A dotted
border
8,16,32 2,4,2
tables
worksheets
A
Pivot table
function wizard B
database
modal
window
A
C
No
border
A blinking
border
2,2,2
6,8,10
D
91
the row is
your
too short to
formula show the
has a
number at
If a cell shows ####### , syntax the current
it means that _____.
error
font size
ability
Which is not an
to
advantage of using
generat
computerized
e
speed of
spreadsheets?
tables calculation
The gym teacher has a
new program to calculate
physical fitness in terms
of weight and exercise.
The use inputs different
weights or amounts of
exercise to determine the
related physical fitness.
This "What if" program is word
most likely which of the
proces
followin
sing
graphical
The difference between
the highest and the
lowest values.
Range Address
Produci
Spreadsheets can be
ng
Writing
used for...
graphs letters
drag from
the top cell
double- in the
click
column to
any cell the last cell
in the
in the
column column
the
column
is too
narrow
to show
all the
digits of
the
number
either b or c
flexibility
of
moving
entries
cost of initial
set-up
databas
e
spreadsheet
Gap
Rows
Drawing
pictures
Document
filing
click the
column
heading
click the
column label
C
92
CTRL +
ENTER ENTER
TAB
INSERT
array.
constant. formula.
function.
(201)555100 1212.
Cell
referen
ces
Functions
#VALUE Tom
!
McKenzie.
Numeric
constant
s
Text constants
D4^2
It is impossible
to determine.
C
C
D
SUM(H9 G7*SUM(H9:H
6 :H11)
11)
B
It is
displaye
d in
reverse
video.
The phrase
active cell
appears in the
Status bar.
93
The
Standa
rd
toolbar
the
New
The command that will
comma
save the current
nd on
workbook with a different the File
file type is:
menu.
The command that will
print an Excel workbook
is found on the
____________ menu.
File
In the Save As and Open
dialog boxes, the
___________ view
shows the file size as
well as the date and time Previe
a file was last modified.
w
Edit
View
Window
Details
List
Properties
Delete
Both
Insert
and
Delete
Clear
By using
By
the arrow
clicking keys to
in a
move to a
differen different
t cell
cell
the Save
command
on the File
menu.
By either
clicking
in a
different
cell or
using the
arrow
keys to
move to
a
different
cell
The Cell
Format
comman
d on the
Edit
menu
the Save
As
comman
d on the
File
menu.
Insert
The
Formatting
toolbar
By typing the
reference of
the cell you
want to move
to in the
formula bar
94
Clear
Delete
Orienta
tion
Which of the following
(portrai
options is NOT controlled t or
through the Page Setup landsc Headers
command?
ape)
and footers
Which command enables
you to change the
margins for a printed
Option
worksheet?
s
Page Setup
All commands are
carried out on a
rectangular groups of
worksh
cells known as a:
eet.
range.
Which of the following is
a valid cell range?
6 D12, G25
In a copy operation, the
cell(s) you are copying
from is called the:
In a copy operation, the
cell(s) you are copying to
is called the:
Remove
Fonts
Margins
View
Edit
group.
cell group.
D12:G25 D
copy
range.
destination
range.
clipboard
.
source range.
paste
range.
The
Duplica
te
comma
nd
destination
range.
clipboard
.
source range.
The
Paste
Both the Copy
comman and Paste
d
commands
mixed
constant
B$4
$B$4
Both
Clear
and
Delete
B4
$B4
95
#DIV/0! #DIV/0!
#DIV/0!
#DIV/0!
#DIV/0! #DIV/0!
#DIV/0!
#DIV/0!
The
Move
comma The Cut
nd
command
The
Paste
comman
d
cycle
through
absolute,
relative,
and
mixed
cell
referenc
es.
the
Formatti
ng
toolbar
Rightclick a
cell and
click the
Edit
Hyperlin
k
comman
cycle through
open
applications.
Conditional
formatting
Double-click a
cell and click
the Insert
Hyperlink
command.
copy
and
paste
cells.
the Fill
Handle
Select
the
Insert
Hyperli
nk
Which of the following
comma
will insert a hyperlink into nd from
an Excel worksheet?
the File
edit cells.
the Format
Painter
Click the
Insert
Hyperlink
button on
the
Standard
toolbar.
96
Conditional formatting
applies formatting to a
cell based on:
menu.
d.
whethe
r the
cell has
a
formula
or a
value
the cell
in it.
address.
whether
the cell
has an
absolute
or a
relative
cell
referenc
e.
the value in
the cell
text with a
four-digit
year.
an
integer.
Aug-31
It is impossible
to determine
from the
29/03/20 information
08
given.
B
adding the
earlier date
to the later
one.
subtracti
ng the
later
date
from the
earlier
one.
text
with a
twodigit
year.
adding the
later date to
the earlier one. A
97
the F4
key.
the F2 key.
the Esc
key.
March 4
of the
current
0.75 year
03-Apr
the F1 key.
Either 3/4 or
.75, depending
on the cell
formatting
C
a cell
on a
worksh
eet.
a variable.
either a cell on
a
a worksheet or
constant. a variable.
D
B1G10
B1;G10
B1:G10
MAX
SUM
Scatter
B1.G10
AVERA
GE
COUNT
Combi
nation
Once a
bar
chart is
chosen
it
cannot
be
change
d to a
Line
Pie
Once a
pie chart
Once a
has
column
been
chart is
chosen it
chosen it
cannot
cannot be
be
changed to changed
a bar chart. to line
Once a line
chart has been
chosen it can
be changed to
a pie chart.
D
98
column
chart.
hold
down
the
CTRL
key
chart.
hold down
the SHIFT
key
hold
down the hold down
ALT key CTRL + SHIFT A
Use
tables
Create four
separate
files
Transfer
informati
on to a
databas Use multiple
e
sheets
Paste
Fill Down
Data | Sort
Calculate
data
Edit |
Data |
Sort
Create
forms
Tools |
Sort
Analys
e data
none of the
choices
None of the
above
C
99
click
the
Print
button
(D4+C
2)*B2
press the
PRINT
SCREEN
key
select
Print
selection
on Page
Setup |
Sheet
and then
print
D4+C2*B2
#VALUE
!
=(B2*(D4+C2)
=A3SUM:B
3SUM:C3S
0 UM
REF!
portrait
landscape
AD213
ZA1
CERN
ECRN
CARN
newsgro
ups and
search
engines
applicati
news
on
groups, bulletin
servers,
yahoo boards,mail proxy
The other ways of getting and
s call and
servers
connected to the net
infosee wireless
and web
are_____
k
system
servers
None of the
above
whatever
was last
used
vertical
None of the
A0
above
yahoo
and
The useful URL schemes infosee mailto and
are_____ and______
k
files
select Print
selection in the
Print dialog
and then print D
bulletin business
bulletin
board
broadcastin broadca
system g system
sting
NET
none of the
above
none of the
above
none of the
above
100
system
USENET is a BBS on
____ scale
small
large
Mosaic Yahoo
buffer
cache
very
small
none of the
above
PINE
Lynx
built-in
none of the
above
Photog Digital
raphy
Signature
Cryptogr Message
aphy
Digest
Key
Hash
Function Formula
User-id Password
Name
Penetr
ation
Cryptogr Password
aphy
Cracker
Lock
Retrieval
Address
A
101
Acts
Spoofin
g
Imposting
Loss
Threat
Sales tax
Income authorit tax
ies
authorities
Malicious software.
Utility
Tim
Berner
Lee
Etrade.
com
Autom
ated
Tailor
Machin
e
Regulation
s
Address
Unautho
rising
Exposur
e
Protocols
Approving
Hacking
Judge of
a civil
Police officer
court
of IPS rank.
Pirated
software
Virus
Hoffman
Charles
Bubbage Howard Aiken
Amazon
.com
Cracker
Any Time
Money
Dell
.com
Asynchr
onous
Transmi
ssion
mode
Regulation
s
Address
Protocols
Gateway
Port
Pin
Msn .com
None of above
102
A group of computers
and other devices
dispersed over a
relatively limited area
and connected by
communication links that
enable a device to
interact with any other on
the network.
LAN
hyper
termina
l
tracing
The term HTTP stands
progra
for
m
Nation
al
Informa
tics
A NIC is considered as
Center
A hub is a device that
can connect
WAN
CAN
hypertext
tracing
program
hypertex hypertext
t transfer tracing
protocol protocol
Network
Interface
card
New
Informati None of the
on Card above
Only
printers
None of the
above
Combines
connectivity
of a hub
Conce with the
ntrates traffic
connec regulation
tivity
of a bridge
Bridges
and
Two or
Repeat more
ers.
networks
Switches
data
from
incoming
ports to
outgoing
ports.
All of Above
Bridges
and
Hubs
bits
Packets
Only
Compu Can not
ters
computers
frames
PAN
Hubs and
nodes
None of the
above
C
103
firewall
One
Physic
al
Layer
Bluetooth is
Which is not one of the
recognized IEEE sub
layers?
gateway
router
virus checker
Two
Four
None of the
above
Data-Link
Layer
Network
Layer
All of the
above
Coaxial
cable
Fiber
Twisted pair
Logical
address
A
memory
address
None of the
above
None of the
above
None of the
above
None of the
above
All of the
above
Hub
Router
It
continue
on to
target
Data
device
return
It gets
with
to the
destroyed
corrupt
sender bit by bit.
data
Wireles
Ultra
s
violet
technol Wired
technolo
ogy
Technology gy
Physic
al
Data Link
Network
Layer
Layer
Layer
104
There
isn't
one
ASCII
48 Bytes
Octal
48 KB
None of the
above
48 MB
a list of
rules for
transferring
data over a
network
software
that
allows
file
copying
a gateway
calling
program for
internet
bridging
Server
If the
hub
goes
down, it
brings
If one node down all
goes down, of the
it brings
nodes
down the
on that
entire ring
section
Network PC
Client
A
A
Physiol
ogy
Topology
Both A
and B
None of the
above
Bus
Star
All of above
Linear
Parallel
Ring
Both A
and B
None
A
105
architecture?
What are the various
types of ring
architecture?
Parallel Circular
In a ................., each
workstation attaches to a
common backplane via
its own physical cable
that terminates at the
hub
Ring
Bus
In a ............... , each
work station is directly
connected to a common
communications channel
Which one of the
following is NOT a
network topology?
In a .............. , the cable
system forms a loop with
workstations attached at
various intervals around
the loop
The Media Access
Control (MAC) is a sub
layer of the:
What are the most
common LAN
technologies used in
networking today?
Modem speeds are
measured in
LAN speeds are
measured in
Linear
Both A and B
Star
Mesh
Ring
Bus
Star
Mesh
Star
Bus
Linear
Ring
Ring
Bus
Star
Mesh
Networ
k Layer
Ethern
et,
token
ring,
DecNE
T
Transport
Layer
Physical
Layer
Data Link
Layer
Ethernet,
token ring,
FDDI
Ethernet, Ethernet,
DecNET, token ring,
FDDI
ARCnet
bps
kbps
mbps
mips
bps
Kbps
Mbps
Mips
106
An NIC
Accessing the Internet
from a typical home PC
requires the use of
The most widely used
network operating
system on PC LANs is
usually
higher
than
measured
LAN
in bytes per
speeds second
CDROM
drive
must
use the
World
Wide
Web
key
gatewa
y
interfac
e
a
Novell
Interfac
e
Control
ler
CDROM
drive
depend
on the
transmis
sion
medium
limited by
modem
speeds
a modem
Windows
95
Netscape
must use
electronic
mail
must
have a
LAN
account
All of the
above
application
protocol
interface
connects a
computer to a
network
uniform
resource
locator
used to
control a
printer
common
gateway
interface
interface
sa
modem
to a
compute
r
a modem
Windows
package Netscape
Novell
Netware
the
Internet
Linux
have to
do with
compre
ssion
of
graphic have to do
s and
with Web
video
pages
none of the
previous
107
A multiplexer is a form of
An ISP
Printer modem
provide
s
access
to the
is a CPU
Internet register
used to used to
send
browse the
email
Web
FTP is
Telnet
A firewall is
A proxy server is
A search engine is
To look for information
about interest areas on
the internet, the user
should use a
bridge
none of the
previous
is a CPU
functiona make of
l unit
processor
is a protocol
for the transfer
is part of of files
Netscap between
e
computers
uses
wireless
used to communica is part of
send
tion
Netscap
email
medium
e
used to
protect
a
comput
er
room
from
fires
a screen
and
a form of
saver
floods virus
program
a
a poor
backup an email
file
server server
server
None of the
above
none of the
previous
none
IR system
hardwa for the
re
Internet
browser
none of the
previous
scanne
r
CD-ROM
clip-art
file
search engine
108
provide
s
access
to the
is a CPU
Internet register
is a CPU
functiona make of
l unit
processor
FTP is
used to used to
send
browse the
email
Web
is a protocol
for the transfer
is part of of files
Netscap between
e
computers
Telnet
used to uses
send
telephone
email
lines
is part of is a protocol
Netscap that allows for
e
remote login
The
layers
cannot
commu
nicate
with
one
another
.
Any
layer can
communi
Any layer
cate only
can
with the
communica layer
te directly
directly
with any
above or
other layer. below it.
It is
one
large
networ
k.
It is made
up of many
networks
connected
into
transmissio
n lines
called
backbones.
Individual
computers can
connect to it
using an ISP.
A
An ISP
It works
the
same
way as a
local
network.
109
Passw
ord
crackin System
g
intrusion
Denial of
Service Port sniffing
Virus
Flood a
that
Web server initiates
with
a ping
IP flood requests
flood
UDP flood
packet
flood
traffic
router
switch
a poor
file
server
hub
none of the
above
Limit logging
on access
ActiveXenabled sites
are safe.
an email
server
Update
virus
definitions
There are
safe and
unsafe
sites.
Backup
data on
a daily
basis
Only
large
namerecogniz
able
sites are
safe.
110
To secure
communication network
against wire-tapping the
most effective control is
One way that a virus
CANNOT spread
throughout a network is:
Which of the following is
NOT a means of
monitoring employee use
of company technology?
____________ would be
used by parents to
monitor their children on
their home system.
The formal rules and
parameters which are
established to permit a
microcomputer to
communicate with the
mainframe computer as
though it was a terminal
of the mainframe are
called
The two most common
tools used to help with
extracting information
are:
through an
FTP port.
Use of
logical
access
methods
by
attaching
itself to a
docume
nt.
Phone
Web
traffic
Application
updates
A
Trojan
horse
Adware
A worm
Spyware
Use of
identifi
ers
by
attachi
ng to
an email.
Use of
passwords
Modem
s
Protocols
cookies
and
Trojan
horses.
An
attack
on a
system
for
person
al gain
Use of
encryption
methods
by scanning
the computer
for a
connection.
Multiplex
ors
LAN
Trojan
horses and
key
loggers.
cookies
and key
loggers.
An attack
with the
purpose of
gaining
publicity
Giving
out
Changing the
disinform content of a
ation
Web page
key loggers
and worms.
111
Econo
Which of the following
mic
would be a form of cyber damag
terrorism?
e
Crashi
ng the
stock
Which of the following is market,
a likely target of a cyber
as in
terrorist that would cause the
considerable loss of life? 1930s
An organisation is
upgrading its
telecommunication lines.
Which is the least
important objective while
upgradation
A company posts a price
list of its products on its
website. The advantage
to the customer is that
the company can
Which of the following is
an easy-to-use service to
get information on
someone?
Which of the following
pieces of information
would NOT be found
online?
Which of the following is
the most common
danger on the Internet?
Disruption
in
communica
tion
Disruptio
n in
All of the
supply
above are
lines
correct.
Shutdown
of military
security
systems
Contami
nating
water
systems
Shutdown of
nuclear plant
safety systems D
To
carry
more
networ
k
To improve
capacit network
y
services
To obtain an
accurate
inventory of
network
related
equipment and
parts and
network nodes D
set its
prices
very
high
update its
prices as soon
as they are
changed
Lycos Search
To
improve
system
respons
e time
stop its
limit access competit
to
ors
computer
seeing
owners
their
only
prices
Yahoo
People People
Search Search
USA
People
Search
Name
of your
bank
Date of
birth
Personal Criminal
assets
records
Virus
Fraud
Adware
Spyware
112
buy
stocks.
make large
amounts of
purchas money by
e offparking funds
invest
shore
in their bank
without risk. property. account.
Shill
bidding Phishing
Siphonin
g
Hoaxing
Internet
stalking cyber
.
stalking.
virtual
stalking.
Web stalking.
cookies.
spam.
viruses.
Never use
your real
identity.
Use antispyware
software.
Physical
Encrypt Security
ion
controls
Use a
proxy
server.
Message
sequenc
e
number
checking
I only
II only
Both I &
II
Neither I or II
irc
ftp
www
telnet
popups.
Use a
fake email
addres
s.
Logical access
controls
B
113
Adds
more
bytes
The major advantage of to
the checksum program is progra
when it
ms
Which of the following is
a Web browser?
Verifies
integrity of
files
HTML
Internet
Explorer
Web
query.
HTML
document.
round
trip
HTML.
XML.
.com is
used
for
.co in used
compa for
ny
company
Increase Misleads a
s boot
program
up time
recompilation
both HTML
Microsoft and Internet
Excel
Explorer
round
trip
HTML
docume
nt.
Web browser.
.con is
used for
compani
es
None of the
above
the World
Wide Web
Consortium HTML.
one way
HTML.
HTML.
MHTML
DHTML.
114
using
Internet
Explore
r to
view a
Web
page
that is
stored
on the
hard
drive
on your
comput
er
Click
on the
Back
arrow
until
the
desired
site is
found
the
Refres
h
comma
nd
updating
the values
that are
obtained
through a
Web query
clicking
a
hyperlink
that
referenc
es a
docume
nt that is
stored in
the
floppy
drive on
your
compute
r
Go to
the
History
Click on
page
Go to or
and look
Search in for the
the browser site
viewing an
Excel
worksheet that
you have
saved as a
Web page.
Go to the
Bookmarks or
Favorites page C
the Insert
Hyperlink
command
the
Update
the External
comman Data
d
command
Screensav
er
Sound
Video
115
When saving a
photograph for use on a
website, which format
should you choose?
While researching the
Direct taxes assignment,
you find a useful website.
What is the most efficient
way to access the site at
a later time?
A system that uses the
Internet for business-tobusiness interaction is
called a(n):
A block of text
automatically added to
the end of an outgoing
email is called
_________ refers to the
use of Internet
technologies for placing
telephone calls.
BMP
Save it
to a
floppy
disk.
JPEG
TIFF
Write it
down on a
piece of
paper.
Add it to
Favourit
es or
Bookma
rks.
privilege
d
network.
network
topology
a signature. a footer.
an encryption.
IPT
IPP
PoIP
Desktop
client,
software,
and
hardware.
Desktop
server,
applicati
on, and
databas
e.
Desktop
server,
software, and
hardware.
CD-ROM
Telepho
ne line
None of the
above
File
File
Transmissi Transfer
on Protocol Protocol
None of the
above
extrane
t.
intranet.
an
attach
ment.
VoIP
Deskto
p
client,
Most client/server
applica
applications operate on a tion,
three-tiered architecture and
consisting of which of the databa
following layers?
se.
Which do you NOT need
to connect to the
Internet?
Modem
File
Transfe
r
What does FTP stand
Progra
for?
m
GIF
116
So
comput
ers can
be
referen
ced by
a name
So IP
addresses
can be
shorter
So email
is
delivered None of the
faster
above
45.1.1.1
193.1.2
.3
paul
.trigg
@
domain
. org.
uk
paul.trigg@
domain.org paul.do
.uk
main.uk
None of the
above
The US Scientists
govern in
ment
Switzerland No-one
None of the
above
None of the
above
None of the
above
None of the
above
Internet Internation
Relay
al Relay of
Chat
Characters
It will be
It will
waiting for
If you do not pick up your be
you to
email for a week...?
deleted collect it
Receivi
ng
messa
ges
automa
tically
People
from
discussing
anyone a topic of
What is a disadvantage
in the
interest
of joining a mailing list?
group
globally
Internet
Remote
Convers
ations
A letter
will be
sent to
you in
the post
High
volumes
of email
117
In Powerpoint2000 ,the
built-in professional
design elements are
Selection handles are the
8 small ___________
that appear around the
object, when an object is
selected
The _______ is an
invisible matrix of vertical
and horizontal lines that
covers the entire slide
workspace
_______ are drop-down
menus that appear when
the right mouse button is
clicked on the screen
element
________ and ______
have the ability to add a
lot of visual impact into
the PowerPoint
presentation
_______ is a motion
picture or any animation
file
In visual basic, when a
record pointer reaches to
the last record, _______
property of a recordset
object is automatically
set to ______
In visual basic, the
explorer view of a project
is displayed in
___________
autolayouts
clipart and
& auto presentatio
shapes n templates
slide
view &
outline
view
none of the
above
circles
points
squares
icons
square
image
grid
guide
tool
bars
short cut
menus
auto
shapes
clip
gallery
& word
art
slide show
& view
show
fonts &
images
none the
above
media clip
.video
file
wave
file
eof,fals movelast,tr
e
ue
movelast
,false
eof,true
properti
es
form layout
window window
project
explorer
toolbox
118
movefirst
,false
bof,true
value()
int()
number() val()
circle
rectangle
square
true
false
true
false
oval
fontcol
or
color
none of the
forecolor above
underli
ne,true
textsize size
foresize
fontsize
onemilliont oneh of a
hundredth
second of a second
onethousan
dth of a
second
one-ten
thousandth of
a second
C
119
itemcoun
t
listcount
form
layout prperties
window window
project
explorer
title
prompt
msgbo
x()
textbox
label
count
recordcoun
t
toolbox
inputbox()
opendy opensnaps
naset
hot
dbopens dbopendynase
napshot t
D
load
unload
initialze
transpar
ent
graphical
activate
standar
d
opaque
120
blue
red
green
black
red
green
blue
white
toolbox
project
explorer
window
toolbox
project
explorer
window
text
containe
r
gotfocus
none of the
above
properti
es
form layout
window window
properti
es
form layout
window window
change lostfocus
child
parent
true
false
load
unload
text
name
openda
tabase dbengine
D
C
A
initialize
activate
caption
none of the
above
openrec
ordset
none of the
above
121
enable
d
dime
visible
value
style
dim
var
none of the
above
.ctl
.ctr
.ocx
Validation
Check
Audit
On Error
On Error On Error
GoTo Inline Stop
Resume Next
PaintPictur
e
Resize
UnloadMode
parameter to a
zero value
Cancel
parameter
to 0
2
Refresh
UnloadM
ode
paramet
er to a
non-zero
value
None of the
3 above
122
Consist
s of
several
A project group is a
Progra
Project which:
ms
Form
window
Procedures declared in a ,
_____ are local whereas standar
procedures declared in a d or
______ are available to
code
the whole application.
module
Place
code in
How can you keep the
the
user from exiting a form
Termin
by clicking the Close
ate
button?
event
The _______ property
enables Visual Basic to
draw complete images in
memory before
AutoRe
displaying them on the
draw =
Screen.
True
Consists of
several
Application
s
Consists
of
Various
Forms
And
Consists of
Code
several
Modules Projects
Project
window,
view code
window
Class
module,
code
module
None of the
above
Place code
in the
Unload
event
Place
code in
the
Deactiva None of the
te event above
AutoRedra
w = False
Refresh
PaintPicture
Msgbox
error.number &
error.descriptio
n
D
Msgbo
x err.no Msgbox
&
err.number
err.text & err.text
Msgbox
error.nu
mber &
error.text
To
display
images To help in
to the
creating a
user
ToolBar
To provide a
To allow repository for
the
images used
editing of by other
icons
controls
123
FreeFil
e
GetFileNu
m
GetFile
GetBytes
Retriev
e
Get
Comm
on
messa
ges
Which of the following
passed
can be shown to the user to
using the Common
Windo Open
Dialog control in VB?
ws
dialog box
Which of the following
are not properties of
Captio
Command Button:
n
Visible
GetProp
erty
Value
Windows
explorer Input box
MultiLine
Font
Click
and
Click,
KeyPre KeyUp and
ss
KeyDown
KeyUp
and
KeyDow
n
KeyPress,
KeyUp and
KeyDown
Ascii
Binary
Format Format
Input
Mode
Output mode
Current
X and
ScaleLeft
Current and
Y
ScaleTop
ScaleHei
ght and
ScaleTo
p
x and y
Propert Property
y Get
Assign
Property
Let
Property Set
124
Backgr
ound
color
propert Caption
y
property
ZOrder
property
AutoRedraw
property
Min
Max
Value
CurrentVal
Shell
Substr
Are
one
Can be
and the different at
same
times
SetAttr
CStr
Are
actually
not
propertie None of the
s
above
You do
You try to initialize a new not
Object variable with the
need to
following line but receive use the
an error. What could be
Set
the possible cause? Set comma
MyVar = New Classname nd here
Which of the following
will perform a direct
The
execution of a Command Open
object?
method
A
warnin
The vb Critical symbol
g query
displays:
icon
You do not
have the
permission
to access
the class
MyVar
has not
been
None of the
declared above
The Exec
method
The
ExecPro
cedure
method
None of the
above
A critical
message
icon
An
exclamat None of the
ion icon above
B
125
vbYesNo is an example
of a(n):
statem
ent.
MsgBo
x
statem
ent
returns
a
value,
while
the
InputB
ox
functio
n does
not.
InputBox
function
can be
created
InputBox
with the
function
macro
returns a
recorder,
value, while while the
the
MsgBox
MsgBox
stateme
statement
nt
does not.
cannot.
MsgBox
statement can
be created
with the macro
recorder, while
the InputBox
function
cannot.
B
Data
cannot
be
entered The form
into the can be
form.
modified.
QueryUnlo
Unload ad
Deactiva
te
Terminate
clipping cropping
tool
tool
cutting
tool
scribble
drawing tool
color box
color
scheme
color guide
tricolor
scheme
color
palette
primary color
scheme
variable.
intrinsic built-in
constant. procedure.
126
10
28
column bar
18
pie
images and
images text
slides
36 C
linear
slide sorter
views
doughnu
t
all the above
data
stream
auto
shapes
track changes
the
organiz
ation
chart is
expand
ed
the chart is
made
available
for editing
the chart
window
opens
displayin
g a chart none of the
template above
box
tools
general
purpose
tools
circular radar
used to
mange
organiz accessed
ational only by
chart
manager
custom
drawing
tools
used to
create a
manager
box for
an
existing
box
standard
drawing tools
used to store
the other tools
of the
organizational
chart
C
127
turned
on
turned off
not
available
in the
available in the
tool bar tool bar
B
once
twice
thrice
any of the
above
two
four
five
eight
draw tool
standard
tool
all the above
slide
view
none of these
reduce/enla
rge
preview
none of the
above
exporting
copying
moving
auto
shapes
clip art
drawing tools
native
tool
autolay handlayout
outs
s
zoom
importi
ng
Micros
oft
excel
.ppt(Po
werPoi .rtf(rich text
nt)
format)
.doc(doc .html(hypertext
ument)
format)
B
nine
six
only one
twelve
.doc(document
)
B
128
slide
not
display
ed
during
the
slide
The hidden slide is
show
DTS(di
____ effect is used to
gital
introduce a slide during a track
slide show
sound)
A _____ is a special
effect that determines
how the objects appear
on the slide
build
The notes page is
notes
formatted based on the
master
Pick the odd man out of
the following
When a new
presentation is opened
,powerpoint creates
slides that have a width
of _____ and a height of
______ with the
landscape orientation
The default orientation
for notes ,handouts and
outlines is ____
orientation
Build effect is also called
as ______
outline
view
displayed
only during
the slide
show
displaye
d only in
outline
view
none of the
above
3D(3
dimension)
both a
and b
transition
transition
slide
master
slide
show
master
slide
view show
master notes
slide view
view
show
slide sorter
view
7.5
inches,5
inches
none the
above
a or b
none of the
above
15
inches, 10
10
inches,7.5
inches inches
portrait landscape
animati
on
view show
transition b or c
129
gif
hyperli
nk
jpeg
png
none of the
above
hypertext
action
button
batch file
template
s
add-ins
when the
slide
during slide show is none of the
transition
run
above
spell
checkers
header
files
custom
show
both a
and b
none of the
above
notes pane
propertie
s pane
outline pane
paint shop
pro
paint
power point
shop pro 2000
130
Power
Point
creates
a
sample
present
ation to
which
user
With reference to
can
autocontent wizard for
add
creating a new
words
presentation, which of
and
the following statements picture
are not true
s
user
can
insert
objects
like
cliparts,
picture
s
stored
in a
separat
e files
Which of the following
to the
statement is not TRUE
slides
in
outline
view,
drag
the
With reference to
slide
changing the order of
icon to
slides, which of the
a new
following statement is not locatio
true
n
it is the
quickest
way to
create a
presentatio
n
contains
sample
presenta
tions for
a variety
of topics
user can
insert
picture
to the
master
user can
slide
insert only which
pre-drawn, gets
pre-colored reflected
graphic
in all the
images
slides
reflected in using
a clip arts
that
to the
master
slides
slide
in notes
pages
in slide
view,
sorter view, drag the
drag the
slide
slide to a
icon to a
new
new
location
location
provides
suggested
content and
design
I slide view,
drag the slide
icon to a new
location
C
131
the
slide
that
holds
the
formatt
ed
placeh
olders
for the
titles,
main
text
and
any
backgr
ound
items
that
user
wants
to
appear
on the
slides
is
called
a
master
templat
es
transition
means
applying
special
effects to
the
crossover
between
the slides
design
template
s is the
template
whose
format
and
color
scheme
user
applies
to a
presenta
tion
132
with
notes
pages
view
user
can
prepar
e
speake
r notes
and
handou
ts
the
slide
that
holds
the
formatt
ed
placeh
olders
for the
titles,
main
text
and
any
backgr
ound
items
that
user
wants
to
appear
on the
slides
in outline
view, user
can see the
miniatures
of all slides
in a
presentatio
n, complete
with text
and
graphics
user
should
select
the slide
view to
add the
text to
the slide
transition
means
applying
special
effects to
the
crossover
between
the slides
design
template
is the
template
whose
format
and
color
scheme
user
applies
to a
presenta
tion
133
is
called
a
master
templat
e
slide
layout
data to
be
graphe
d
resides
in a
datash
eet
window
customize
new
slide
set up show
by default,
doughnut
chart is
displayed
based on
the data in
the
datasheet
data is
plotted in
a chart
window
the slide
master
the
header
slide
the format
slide
B
134
PowerPoint provides a
_________ that searches
the entire presentation
i.e., all the text objects in
all the slides, outlines,
notes and handouts for
spelling errors
PowerPoint's drawing
toolbar contains _______
drawing tools
Click _______ on the
rectangle drawing tools
enables us to draw
multiple rectangles
An example of the
components of a
multimedia presentation
could include
Which of the following
formatting elements can
be applied to a
PowerPoint diagram
using the AutoFormat
tool?
Which of the following
formatting elements can
be applied to a
PowerPoint diagram
using the Format
AutoShape command?
office
assista
nt
spell
checker
10
once
text,
graphic
s and
email
addres
s.
the
Line
style
Fill
color
twice
102
B
22 B
text,
hypertext
and Power
Point.
three
CDROM,
digital
camera
and
sound.
four times
the Line
color
the Font
and the
text
alignmen
t
Line color
Line
thicknes
s
text, hypertext,
Power Point,
video and
sound.
D
135
Excel
is
started
so that
you
can
create
a chart.
always
taken
from
the first
row of
data in
the
The legend in a Microsoft datash
Graph chart is:
eet.
Suppose you are
creating a Microsoft
Graph of quarterly sales
by region. Which would
be the best chart type if
you want to emphasize
Sidethe total sales of each
by-side
region?
column
A popup
box
prompts
you for an
existing
Excel chart
to insert.
always
taken from
the first
column of
data in the
datasheet.
Microsoft
Graph is
started
so that
you can
create a
graph.
taken
from the
first
column
or row of
data in
the
datashe
et,
dependi
ng on
whether
the data
series
are in
rows or
columns.
Stacked
column
The graph
placeholder is
deleted.
entered by the
user.
136
Pull
down
the
Which of the following
Insert
actions will enable you to menu
insert a graph into a
and
PowerPoint
select
presentation?
Chart.
Click the
chart
object, then
It
click the
automa View
tically
Datasheet
display button on
s in
the
Slide
Standard
view.
toolbar.
Pull
down the
Edit
menu,
then
select
Object.
You cannot
display the
underlying
datasheet
once the slide
is finished.
Single
click
the
chart.
Click
outside
the
chart.
Change to
Slide Sorter
view.
Double
click the
chart.
137
A
dialog
box is
display
ed
allowin
g you
to enter
the
name
of the
Excel
worksh
eet that
should
be
linked
to the
Power
Point
present
ation.
The
What happens if you
chart is
single click a chart that is selecte
not currently active?
d.
The
What happens if you
chart is
double click a chart that
selecte
is not currently active?
d.
A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that should
be
embedded
in the
PowerPoint
presentatio
n.
The
datashe
et is
saved as
a
separate
file.
The
chart is
The chart is doubled
deleted.
in size.
The
chart is
The chart is doubled
deleted.
in size.
The datasheet
window is
toggled from
closed to open
(or from open
to closed).
The
application that
created the
chart is
started.
A
Microsoft
Graph will
restart.
138
a slide
one
bullet
item at
a time.
Moderate
Subtle,
Moderate, or
Exciting
Neither enter
nor exit;
neither fly in
from top nor
bottom
Enter
and
exit
Fly in from
top or
bottom
Exciting
Both
enter
and exit,
and fly in
from top
or
bottom
Enter
Shift
Alt
Ctrl
the way
objects
exit a
slide.
Custom
animation can
be used to
affect the way
objects appear
on a slide, to
what objects
do after they
appear on a
slide, and to
the way
objects exit a
slide.
D
Subtle
bullet
items
bullet items one
one letter
word at
at a time.
a time.
a slide one
bullet item at a
time, build
bullet items a
letter at a time,
and build bullet
items a word
at a time.
D
the
way
objects
appear
on a
slide.
what
objects do
after they
appear on
a slide.
139
The
advanc
ed
timelin
e
shows
the
sequen
ce in
which
objects
will
appear
on the
slide.
The
advanced
timeline
shows the
duration of
the effect
applied to
each
object.
The
advance
d
timeline
shows
the
sequenc
e in
which
objects
will
appear
on the
slide and
the
duration
of the
effect
applied
to each
object.
The advanced
timeline shows
neither the
sequence in
which objects
will appear on
the slide, nor
the duration of
the effect
applied to
each object.
C
Clips
Organizatio
n charts
Text
Clips,
organization
charts, and
text
Paint
progra
m
Draw
program
Animation
program
Filtering
program
Dissolve
Fly in
From top
in
Once
Data
data is
cannot
entered Once data be
it
is entered it entered
cannot can be
into
be
changed.
Datashe
There is no
such thing as a
Datasheet.
B
140
change
d.
OLTP.
You
can
change
the
appear
ance of
a
whole
diagra
m, but
not
individu
al
shapes
of a
diagra
m.
OLAP.
OLST.
OLIP.
You can
change
both the
appearanc
e of a
whole
diagram
and the
individual
shapes of a
diagram.
You
cannot
change
the style
of the
connecti
ng lines
in an
Organiza
tion
chart.
You cannot
change the
color of the
boxes in an
Organization
chart.
[Enter+
A]
[Shift+Z]
[Alt+Z]
[Ctrl+Z]
.vbg
.frm
.frx
loaditem
none of the
above
et.
.vbp
additem
141
none of the
above
Drive1.
Drive= Dir1.Path =
Dir1.Pa Drive1.Driv
th
e
File1.Pat
h=
Dir1.Pat none of the
h
above
messa
gebox() message()
load
loadpicture
addpictu
re
File1.Pat
Dir1.Pa Dir1.Path = h =
th=File Drive1.Driv Dir1.Pat File1.pattern=
1.Path e
h
Dir1.path
openre opendatab
cordset ase
recordco
unt
count
update
append
addnew
additem
append update
additem
addnew
142
moven
ext
movelast
Cancel
parame
ter to a
nonCancel
zero
parameter
value
to 0
Word
2000
movepre
vious
movefirst
UnloadM
ode
paramet
er to a
UnloadMode
non-zero parameter to a
value
zero value
click-ndrag &
type
double click drop
none of the
above
office
clipboa
rd
cut
select
none of the
above
shift+e
nd and
shift+h
ome
ctr+end
and
ctr+hom
e
none of the
above
none of the
above
shift+left
and
shift+right
web
web
layout, normal
layout,
printlay layout, web page
out
layout
layout
143
wizard
office
assista
nt
inbox
assistant
docume
nt
none of the
assistant above
Icon Tip
Document Tip
none of the
above
up and down
arrow
rotation
Screen
Tip
Tool Tip
tab
stop
up
The keys that are used to arrow
navigate between
keys
headers and footers are only
Pick out the element
from the following that
does not form the type of
tabs for the Word 2000
left
_______are blueprints or
patterns for documents
templat
of a certain type
e
The______ is used for
quickly setting paragraph increas
indention using the
e
mouse
indent
special
Word art is text with
effect
templates
click
from
start
program,
MSWord
from the
task
none of the
menu
above
marginal
stop
page up
keys only
ruler
home
and end
keys
only
center
decimal
model
decrease
indent
control tool
box
both A
and B
design
wizard
none of the
above
pictures
A
144
drawin
g
toolbar
By default, a document
consists of_____ section
The dialog box that is
used to determine the
documents margins is
________ is a box
surrounding a page on all
slides or a line that sets
off a paragraph on one or
more slides
The key that is used to
perform a task to select
all t he text in the
documents is
The key that is used to
indent a paragraph is
The key that is used to
change the font from the
current positioned in a
document is
The key that is used to
change the style of the
document that is from
that normal to heading1
or heading1 to other
document styles.
Set mapping' Check
control that follows a
text-type validation, we
use ----------------application for data
analysis.
Excel can import data
from other databases for
the data analysis.
control box
1
page
setup
from
the file
databas
e
forms
A
11 A
printer
setup from
the file
menu
print
preview
from the
file
none of the
above
border
shading
none of the
style box above
ctrl+a
Del
ctrl+f
ctrl+m
ctrl+a
Del
ctrl+f
ctrl+m
CTRL+
SHIFT
+F
CTRL+O
CTRL+S CTRL+SHIFT+
HIFT+S P
A
ctrl+shi
ft+f
ctrl+o
ctrl+shift
+s
ctrl+shift+p
Both
None of the
above
Excel
TRUE
Access
FALSE
A
145
FALSE
Transaction Limit
type
Check
Reasonablene
ss
VLOOKUP
A or B
None of the
above
OLE
ODBC
DDE
Analysi
s
translat
es
progra
m code
of a
high
level
langua
ge to
machin
e code
All of the
above
Analysis is
the loading
of
programs
that
perform
routines to
control
peripheral
devices
This
involves
looking
at a
system
and
finding
out how
informati
on is
being
handled None of above
Inputs,
Only
outputs, file
hardwa design
re and hardware,
softwar and
e
software
Mainten
ance,
reliability
, and
upgrade
ability
None of above
Valid
Signs
TRUE
HLOO
KUP
146
What is Direct
Implementation?
To
collect
data
Delete
d from
the
disk
Users
operate
the
manual
system
and
comput
er
system
at the
same
time
The
new
system
is
introdu
ced
alongsi
de the
existing
system
Instruct
ions
and
technic
al
docum
entatio
n
To execute
any
programs
To
maintain
security
Copied
from the
disk
Saved to Transferred
the disk from the disk
Users
operate the
computer
system
from a
given date
Users
operate
the
manual
system
None of above
The new
system is
introduced
and users
start
operating it
Users
continue
operatin
g the old
system
None of above
Log files
and
temporary
files
User
Guide
and
technical
docume
ntation
None of above
None of the
above
147
User
guides
cover
how to
run the
system,
enter
data,
save,
print,
etc.
None of above
Databas
e
systems
and
backup
services
None of the
above
CD-ROM
floppy
disk
Hard disk
To do a
particular
task.
To help
someon
e who is
applying
for
employm None of the
ent
above
Auto bus
Address
bus
Control Bus
BAD
TED
MAD
Auto bus
Address
bus
Control Bus
To enable
any printer
For
to be
technic connected
What are User Guides
al
to the
are used for?
support network
Operati
ng
Network
system systems
s and
and
system communica
Systems software can be service tion
categorised into:
s
services
Magnet
Which storage device
ic tape
cannot be erased?
storage
To
maintai
na
backup
copy of
all the
Application software are informa
programs that are written tion
Which bus carries
information between
processors and
Data
peripherals?
bus
Convert the decimal
number 2989 to
Hexadecimal
FDDI
Which bus controls the
sequencing of read/write
operations?
Data
bus
148
Periph
erals
that are
connec
ted to a
comput
er.
Operating
system
routines
that
execute in
supervisor
mode.
binary
form
were 7
The original ASCII codes bits
A Nibble corresponds to 4 bits
More
than
1000
mega
A gigabyte represents
bytes
A parity bit is
32
register
s
used to
indicat
e
upperc
ase
letters
Shells,
compilers and
other useful
system
programs.
alphanumeric
form
represented
127 characters A
32 bits
A
1000
kilobytes
230
bytes
32 I/O
devices
32 Mb of a 32-bit bus or
RAM
32-bit registers D
used to
detect
errors
is the
first bit in is the last bit in
a byte
a byte
B
Data
structure
s that
are part
of the
kernel of
an
operatin
g
system.
1024 bytes
DRAM
CROM
bytes
Hertz
149
Cache memory
enhances
CISC machines
memor
y
capacit
y
have
fewer
instruct
ions
than
RISC
machin
es
seconda
ry
memory
storage
access time capacity
secondary
storage access
time
B
use more
RAM than
RISC
machines
use variable
size
instructions
Power
is
switche
d off
a
parallel
interfac
e
Computer
is
improperly
shut down
have
medium
clock
speeds
Data is
not
saved
before
compute
r is shut
down
All of the
above
a serial
interface
printer
a modem
interface interface
dot matrix
printer
ink-jet
printer
is nonvolatile
stores
more
informati
on than is used for
RAM
cache memory B
An RS-232 interface is
For print quality you
would expect best results line
from
printer
is
faster
to
access
than
ROM
RAM
increas
ed the
storage
capacit
y of a
comput
er
A UPS
system
provides
backup
power in
the
increases
event of
the process a power
speed
cut
laser printer.
none of the
previous
C
150
smart card
Laptop computers use
Multiprogramming refers
to
Multitasking refers to
What are small high
speed memory units
used for storing
temporary results?
A good way to exchange
information that changes
rapidly is through
Multiprogramming is a
prerequisite for
is a
form of
ATM
card
CRT
display
s
having
several
progra
ms in
RAM at
the
same
time
having
several
softwar
es
running
at the
same
time
ALU
has more
storage
capacity
than an
ATM card
is an
access
card for
a
security
system
contains a
microprocesso
r
LCD
displays
SSGA
displays
none of the
previous
multitaskin
g
writing
program
s in
multiple
languag
es
none of the
previous
the ability
to run 2 or
more
programs
concurrentl
y
writing
program
s in
multiple
languag
es
none of the
previous
Registers
Variable
s
Logic Bus
brochur
es
magazines
multita
sking
an
operating
system
CDROM
e-mail
to run
more
than one
program
at the
same
none of the
time
above
C
151
multita
sking
multiprogra
mming
none of the
multiuser previous
NORM
AL
ONLINE
LAYOUT
PAGELA ONLINE
YOUT
DOCUMENT
ctrl+m
ctrl+2
ctrl+end
ctrl+home
ctrl+v
or ins
ctrl+x or
ctrl+c or ins ins
ctrl+v or Del
ctrl+5
ctrl+1
none of the
above
Frame
AutoSha
pe
Border
Header
and
Screen
Footer Tips
Page
Layout
none of the
above
Chart
WordArt
Auto
Shapes
File
Border
s
Shading
WordArt
Bullets
clear
remove all
remove
clear all
ctrl+2
Text
Box
152
picture
bullets
dialog
box
charts
doc1
circle
bullet
arrow bullet dialog
dialog box box
tab
WordArt
document1
new
docume
nt
second
end
convert convert
text to data to
table
table
row
AutoSha
pes
files
thesaur hyphenatio
us
n
thesaurus
shift+f7 menu
first
none dialog
box
rows &
columns
mail
merge
default
document
shift+f8
none of t he
above
tools+spelling
menu
first row
enter
table
auto
format
option
records
A
A
none of the
above
none of the
above
none of the
above
B
153
AutoCo
style
rrect
AutoFormat gallery
none of the
above
Mail
Mergin
g
Macro
none of the
above
basic
visual FoxPro
alt+f5
none of the
above
hotmail
shift+f8 shift+f7
Data
Source
alt+f8
web
layout
view
online
layout view
email
client
outlook
express
browser
micro
soft
outlook
html
xml
sgml
vb script
arpanet
LAN
internet intranet
154
field
name
must
be
listed in
the
same
order
as the
corresp
onding
Which of the following
informa
statements are false with tion in
reference to the use of a the
header row source for a
data
mail merge
source
With reference TO
TABLE WHICH OF THE
FOLLOWING
STATEMENT ARE false
The alignment available
for tabs does not include
the field
separators
in a header
source and
the data
source can
not be set
as
paragraph
field
names in
the
header
source
must
match
any
merge
fields
you've
inserted
in the
main
docume
nt
the number of
fields names in
the header
source must
be the same
as the number
of data fields in
the data
source
B
by
default
it is not auto format cell
possibl option
height
e to
applies to
and
change the entire
weight
the
table and
option
height not only to applies
of only the
to all the
selecte selected
rows and
d rows rows or
columns
of a
columns of of a
table
a table
table
delete cells
option allows
to delete the
entire row or a
column or shift
cells up or
shifts cells left
left
top
decimal
justified
155
A new
section
is
created
in order
to
change
properti
es like
number
of
column
s
If a
header
is
In order to inserted
type a
in the
header
second
from the
section
third page
then the
of the
same
document a header
section
is
break is
applicabl
inserted
e to the
after t he
first
third page
section
true
false
true
false
true
false
drag &
drop
click -ntype
true
false
Double
Click
A section is a
portion of a
document in
which certain
page
formatting
option can be
set
none of the
above
B
A
156
automa
tically
correct
s
commo
n
typing,
spelling
errors
prohibits
the user
from
renaming
an auto
correct
entry
password
protected
document
can be
passwo opened
rd can without
not
password
include as read
spaces only
left
a .ppt
file can
not not
be
inserte
d at
specifie
d
positio
n in the
current
docum
ent
justified
with t he caps
lock key
accidentally
turned on
reverses the
automati case of the
cally
letters that
corrects were
the
capitalized
grammat incorrectly and
ically
then turns off
errors
the caps lock
passwor
d are not
case
sensitive
password can
be upto 15
characters
long
hanging
top
an .xls data
can not be
inserted at
specified
position in the
current
document
a
multiple
docume
a document nts files
file can be can be
inserted in inserted
the current in the
document
single
at specified docume
position
nt
157
true
false
true
false
true
false
Master
Docum Child
ent
Document
Hyperlin
k
Docume
nt
none of the
above
Print
Layout
View
Page
Layout
Outline
Layout
none of the
above
Insert
Mode
Type Over
mode
Remove
none of the
above
just keep
typing
rows and
columns
press
the
return
key
layers
and
planes
press the
tab key
lines and
spaces
press
the
escape
key
height
and
width
158
tab
gramm
ar
checke
r
send a
public
messa
ge to
friends
Using an electronic
interest
bulletin board, Seema
ed in
can do all of the following one
except which one?
topic
Aryan has created a tenpage story, but only
wants to print the first
two pages. What printer
command should he
select?
Print all
What process should be
used to recall a
document saved
previously?
Enter
Which is used to indent
text within a document?
closing
Desktop publishing is a
more sophisticated form
of which of the following databa
types of software?
se
What is a Word
Processor used for?
To
analys
e
figures
backspa
ce/
enter/return delete
shift
spell
checker
thesauru
s
outliner
send
pictures to
a friend
send
private
message send a
s to a
package to a
friend
friend
From ___
To ____
Page
setup
Print preview
Copy
Retrieve
Save
tabbing
spacing
sorting
graphing
word
processi
ng
spreadsheet
Creating
and editing
documents
Storing
informati None of the
on
above
B
159
What is a header in a
document?
What hardware is
essential for a word?
The user could take a
picture from a magazine
and insert it into the
document by using a
Assume you are creating
a two-column newsletter.
Which type size is the
most reasonable for the
text in the columns?
Given the default left and
right margins, and -inch
spacing between
columns, the width of
each column in a twocolumn document will be:
subscri
pt
annotation
clip art
clipboard
Font,
Paragraph,
Bullet and
Numbering
Designated
area on the
document
Numbers
which
appear on
every page
Cut,
copy,
paste
and
clear
Text
which
appear
at the
top of
every
page
Keyboard,
Mouse,
monitor
and printer
Monitor,
keyboar
d and
mouse
None of the
above
Browse
r
clip-art file
microph
one
digital scanner
6 point
15 point
25 point
Clear,
replace
and
select
Text at
the
bottom
of
every
page
Mouse,
printer
and
proces
sing
system
keyboa
rd?
Spelling,
grammar
and
autocorrect
10 point
2
inches. 2 inches.
impossible to
3 inches. determine.
B
160
Word cannot
Assume you have made
You
display
all appropriate selections
have not columns
in the Columns dialog
You
You have
specified during editing;
box in Word, but cannot
are not not inserted continuo you will see
see any columns on the in Print a column
us
them only
screen. What is the most Layout section
section
when you print
likely cause?
view.
break..
breaks.
the document. A
to move
a section
of text
from the to leave an
to store
original
original section
While word processing,
a file
location of text in place
in which of the following
on the to store a
to
while pasting a
situations would Tom use hard
file on a
another copy
the "Copy" command?
drive
diskette
location elsewhere
D
Data
about a
set of
A set of
What does a document
similar
different None of the
contain?
things Mainly text graphics above
B
Before submitting your
work you want to find any
words spelt incorrectly.
Gramma
Which of the following
Thesau Spell
r
Find and
would you use?
rus
Checker
Checker Replace
B
What command in a
word-processing
program can be used to
change the word him to
her, and also the word
he to she in the given
phrase? On a cold and
still night, the only sound
that could be heard was
the owl that had ade its
home in the nest outs
Paste
Replace
Select all AutoCorrect
B
161
Cut, then
paste
Delete,
then
paste
To
complica
te the
To give the revision
original
process
author a
and to
chance to
force the
reject
author to
suggested spend
changes
more
from the
time
person who making
entered the correctio
revisions
ns
A
vertical
line
outside
the left
A line
margin
appear
signifies
s
A red
a
through underline
change
text
appears
has
that is beneath
been
to be
text that is made at
deleted to be
that
.
added.
point in
Insert, then
paste
To allow
multiple people
to work on one
document in
collaboration
with one
another
C
Comments are
enclosed in a
text box at the
right of the
document.
D
162
the
docume
nt.
Throug
h the
Edit
menu
by
choosi
ng
Track
Chang
es
comma
nd
Through
the Tools
menu by
choosing
Track
Changes
command
Through
tools on
the
Reviewin
g toolbar
Both through
the Tools
menu and the
Reviewing
toolbar
163
The
Version
s
comma
nd will
allow
you to
save
multipl
e
version
s of a
docum
ent,
includin
g any
change
s that
may
have
been
made
to that
docum
ent.
The first
and
All
second
version The latest
versions
s are
version is
are
opened opened
opened
automa automatical automati
tically. ly.
cally.
The
Versions
comman
d will
allow
The
you to
Versions
save
command
only one
will allow
version
you to save of a
only one
docume
version of a nt
document, without
including
any
any
changes
changes
that
that may
were just
have been made to
made to
the
that
docume
document. nt.
The Versions
command will
allow you to
save only two
versions of a
document: one
version of the
original and
one version of
any changes
made to the
document.
A
The previous
version is
opened
automatically.
164
Check
boxes
Grammar
check
Spell
check
Thesaurus
The most
recent
version will
appear at
the bottom
of the list.
Word will
show the
name of
the
person
who
saved
each
version.
Word is not
able to tell the
most recent
version of a
document.
Tools
Forms
Insert
Toggle
button
Text
fields
A drop-down
list
165
What is a header in a
document?
In your English essay
you notice that the
paragraph at the bottom
of page 1 continues on to
page 2. You would like to
make this paragraph
start on page 2.What
would be the best way to
do this?
Tables in a document
help you to easily
arrange all of the
following EXCEPT:
To identify a document, it
is helpful to include the
file name on each page
as a
Which of the following
tools will copy the
formatting of selected
text to other places?
Comm
ents
cannot
be
edited.
Comments
cannot be
deleted.
Text at
the
bottom
of
every
page
Numbers
which
appear on
every page
Commen
ts can be
edited or
deleted
by right
clicking
the
highlight
ed text.
Text
which
appear
at the
top of
every
page
Press
tab.
text.
Comments can
be edited or
deleted by left
clicking the
highlighted
text.
C
None of the
above
Press
Return.
Copy
and
paste.
Insert page
break.
graphics.
forms.
numbers.
header/ bibliograph
footer. y.
find/sear
ch.
macro.
Copy
button
Format
Painter
button
Paste
button
This action is
not possible.
166
Fault
Bug
Finding Squashing
A reverse in a newsletter
is:
Tools
Error
Injecting
Debugging
Format
Edit
an enlarged
capital letter at
the beginning
of a
paragraph.
changing the
color.
the
a section of guideline
text where s used to
a
the first
establish
section letter of
where
of
each
different
white
sentence is elements
text on lowercase
of the
a black and the
newslett
backgr rest are
er will
ound.
uppercase. go.
setting
it in
underlini
larger
ng the
type or typing it all text of
font
in capital
the pull
size.
letters.
quote.
167
The
reverse
techniq
ue
means
to add
dark
text on
a light
Which of the following
backgr
definitions is CORRECT? ound.
Pertaining to newsletters,
which of the following
The
cannot be changed using width
the Columns command
of each
dialog box?
column
As related to type size,
how many points are
there to the inch?
6
Assume you are working
on a newsletter in which
the masthead extends
across the top of the
entire first page. The rest
of the newsletter has two
columns. What is the
minimum number of
sections in the
newsletter?
One
Press
Ctrl+En
Which of the following is ter to
NOT correct with respect create
to page, column, and
a page
section breaks?
break.
A pull
quote is a
quotation
taken from
(pulled)
from
another
document.
A
dropped
cap is a
word
that
starts
with a
lowercas
e letter
when it
should
have a
capital
letter.
A grid is a set
of horizontal
and vertical
lines that
determine the
placement of
elements in a
newsletter or
other
document.
The height
of each
column
The
number
of
columns
The tab
spacing within
each column
10
12
72 D
Two
Three
Four
Press
Ctrl+Shift+
Enter to
create a
column
break.
Press
Enter to
create a
section
break.
Press
Shift+Enter to
force a line
break.
C
168
A serif
font at
10
points
Horizo
ntal
3 inches
Record
Vertical
Duplica
te
Combined
Value
Value
Cross
Tabulat
e
Filter
4 inches
It depends on
the left and
right margins,
and how many
columns are
specified.
Both
None of the
above
A or B
None of the
Above
Gaps
All of the
above
Merge
None of the
above
None of the
above
TRUE
FALSE
169
TRUE
FALSE
Unusu
al
Strange
A or B
excepti
on
comparison duplicate
testing of data
s testing
None of the
above
All of the
above
True
False
True
False
Sequence
Range
Both B & C
Virtual memory is
Limit
related
to
virtual
reality
a form of
ROM
Multiprocessing is
same
as
multita
sking
same as
multiprogra
mming
involves using
more than one
processor at
multiuser the same time
set up a
password
make a
backup
copy
save
the file
use a virus
protection
program
170
to read
to
from or
calculat write
e
information
number to a floppy
s
disk
Uses
Cobol
106
sec
a
keypad
data to
be
transfer
red to
memor
y
data to
be
transfer
red to
or from
memor
y
an
instruct
ion that
has
been
decode
d
to display
to print
information or
sheets of pictures on a
paper
screen
uses Java
uses
C++
103 sec
none of the
previous.
a mouse
a frog
a message
pad
data that
has been
transferred
from
memory
the
address
of a
memory
location
an instruction
that has been
transferred
from memory.
the
address
data to be
of a
transferred memory
to the stack location
an instruction
that has been
transferred
from memory
an
instruction
that has
been
fetched
from
memory
the address of
the next
instruction to
be executed
an
instructio
n that
has
been
executed
171
a
cursor
a scroll bar
a light
pen
Formul
a
Algorithm
Program Data
Compiler
Artificial
Intelligen
ce
Parity Checker B
Parity
Checking
Range
checking Validation
use the
backup
facility
System
Modem
Assem
bler
Memor
y
protecti
on
use the
director
y
search
tools
a magic
marker
keep a
record of backup to a
compute secure
r failures medium
172
Multipr
ocessin Time
g
sharing
Firmwa Word
re
Processor
Floppy
Disk
Telepho
ne
modem
Firmwa Word
re
Processor
Telepho
ne
modem
Shareware
Seque
ntial
Indexed
Random
CPU
Primary
Storage
ROM
RAM
Hashed
Multipro
grammin
g
Multiplexing
Magnetic Disk
Shareware
Blocks and
Sectors
Database,
character,
record
File,
record,
field
Element, field,
file
Maintenanc
e
diagnostic
Systems
program
logs
Parity check
C
173
Sound
card.
CD-ROM
MIDI
interface Serial interface A
Text
Pictures
Sound
Video
Laser
Dot matrix
Ink-jet
Drum
recording
current stock
in a
supermarket
and answering
customer
queries.
updated once
a year
presenti
viewing
ng an
an
order for
encyclo creating the stock to
paedia plans for a a
CDbuilding
warehou
ROM.
design.
se.
replace
d
regularl never
updated
y
updated
regularly
To be effective a virus
checker should be
Which one of the
following software
applications would be the
MOST appropriate for
performing numerical
and statistical
Databa Document
calculations?
se
processor
Graphics
package Spreadsheet
174
The advantage of a PC
network is that
get into
the
make
system efficient
quickly use of time
512
1024
4096
loss of
confide duplication
ntiality of data
virus
infection
TCP/IP HTML
access
to the
internet
is
files can be
quicker shared
IPX/SPX
printer
can do
1000s of
pages a
day
a file
name
a
subdirector
y
univers up-line
al port provider
serial
service
the
orphan program
files
executable
can be may not
left on allow it to
the
be
system uninstalled
retain
confident
iality of
simplify file
files
structures
8192 C
loss of data
NetBEUI
the operating
system is easy
to use
B
the root
directory the hard drive
uninterru
ptable
power
supply
the
system
requires
a
network
administr
ator to
uninstall
it
uniform page
source
the system
always
requires a reboot and
defrag
afterwards
informati
documents. on.
text.
A
175
called
Graphi
cal
represe
ntation
A flow chart is the
of logic
Purcha
se,
sales,
receipt,
A voucher entry in Tally
payme
is done for
nts etc.
assist
in
Passwords are applied to mainte
files in order to
nance
senior
executi
Each of the following is
ve
an enabler of IT-business support
alignment except:
for IT.
The basic systems model
is used to describe
virtually all information
systems and it consists
of the following elements: input.
The
use of
comput
ers to
design
stateof-theart,
highWhat is a computerquality
aided design system?
product
Logical
Rules writte Steps in
in
any
procedural languag
language
e
None of the
above
None of the
bove
allow
encryption
speed up
access
It is
mandato
ry in tally
prevent
unauthor
ised
access
IT
manageme
nt lacks
leadership.
IT
understa
nds the
None of the
business above
output.
processi
ng.
To fill the
log register
All of the
above
Software
that
generate
s
innovate
Using
d
computers designs
to do
and
architecture artistic
None of the
.
patterns. above
A
176
s.
speciali
A(n) __________ offers
st or
Application
a solution package for an functio Service
entire industry.
nal
Provider
name
the file
prevent
ive
control
s.
externa
l
hashin
g
enterpris
e
local
identify
the file
detective
controls.
correctiv
e
controls.
All of the
above are
parts of IS
controls.
static
hashing
dynamic
hashing
extensible
hashing
ensure the
filename is
not lost
C: (a),
B: (a) to (d) (b), (c)
preventive
controls
detective general
controls controls
Interface
Settings
Control
177
Press
Which of the following is the
an acceptable way to
reset
shut down the computer? button.
Yesterday, in your music
class you saved your
compositions as MP3
files. Today, you cannot
remember where you
Create
saved them. Which is the the
best way to locate the
files
files?
again.
Components of an
information system
model are: a)
applications architecture;
b) functional architecture;
c) technology
architecture; d)
(a), (c),
information architecture
(d)
detecti
ve
control
Benchmarks form part of: s
Continuity controls
include: a) record counts;
b) date checks; c) label
checks; d) run-to-run
(a), (c),
totals
(d)
Which is not part of help
desk documentation:
Turn the
computer
off at the
power
point.
Select
the Shut
Down
option
from a
menu.
Use the
Ask the
Find or
person next Search
to you.
feature.
preventiv
organisatio e
corrective
nal controls controls controls
program
change
resolution
requests procedures
proble
m
logging call lights
178
Testing of individual
modules is known as:
Design phase of CASE
tools includes: a) data
architecture; b) decision
architecture; c) interface
architecture; d)
presentation architecture
Which is part of
installation testing:
The computer operating
system performs
scheduling, resource
allocation, and data
retrieval functions based
on a set of instructions
provided by the:
Which of the following
falls under multimedia
data: a) text; b) images;
c) video; d) audio
unit
testing
thread
data testing testing
loop testing
(b), (c),
(d)
(a), (b), (d)
(a), (b),
(c)
(a) to (d)
bench
mark
testing
specificatio
ns
matching
parallel
operatio
ns
system
walkthroughs
Multipl
exer.
(a) to
(d)
Replac
ement
person
al
comput
ers for
user
depart
ments.
archite
ctural
design
(a), (b),
(c)
Physical
security
Identificatio of
n of critical warehou Cross-training
application se
of operating
s.
facilities. personnel.
interface
design
Clientserver
Client
procedur
al design data design
Compute
r
network Hub
Star
Bus
Mesh
Ring
C
A
179
Star
To
maintai
na
backup
copy of
are
written
all the
informa
tion
Direct
System
s
Which of the following
analysi
areas of responsibility
s and
are normally assigned to applica
a systems programmer in tions
a computer system
progra
environment?
mming.
A
Which of the following is sequen
recommended when
tial file
many searches for data
on a
are required
disk
Tapes
can
It is unlikely that a
only be
magnetic tape containing read by
several thousand
the
blocked records can be
machin
used on two machines of e on
different architecture
which
directly because
they
All of the
above
To help
To do a
someon
particular
e who is
job such as applying
editing,
for
storing
employm
information ent
To Store data
in an
organised
manner
Sequential
Binary
Indexed
Data
communica
tions
hardware
and
software.
Operatin
g
systems
and
compiler Computer
s.
operations.
A
sequential
file on a
tape
A direct
access
file on a
disk
A direct
access file on
a tape
Parity
errors will
result
Informati
on
formats
commonl
y vary
between
architect
ures
Data record
can never be
blocked
together
Bus
Ring
180
are
written
Data
path
part
Input output
channel
Wide
area
network
Protocol
Use the
computer
to which
they are
connected
to perform
all
processing
operations
Generall
y require
a
keyboar
d for
data
entry
and a
CRT for
display
Are required
with a
microprocesso
r which permits
some data
processing
such as input
validation
D
Modem
Distribu
ted
system Local Area
s
network
Can
send
data to
a
comput
er and
receive
data
Intelligent terminals differ from a
from dumb terminals in
comput
that they
er
A computer is to be
linked to 8 terminals
using a single
communication link. To
permit simultaneous
terminal operations,
communication path will
require which of the
following
Mixer
Address
calculati
Control Unit on part
C
181
Allows
comput
er
signals
to be
send
over a Aids in
telepho back-up
A modem is a device that ne line procedures
A LAN includes 20 PCs,
each directly connected
to the central shared pool Planeta
of disk drives and
ry
printers. This type of
networ Ring
network is called a
k
Network
A computer based
system for sending,
forwarding, receiving and Office
storing messages is
Autom Executor
called an
ation
systems
If a workstation contains
a processor, monitor,
screen manipulation
device, printer, storage
A
and communication
dumb
An
capabilities, it is said to
workst intelligent
be
ation
workstation
Time of
day
Terminal hardware
control Encryption
controls include
locks
algorithms
RS-232 is a
Type of Terminal
cable
Standard
Packs
data in a Speeds up
disk file online printing
Loop
Network
Star Network
A
personal
compute A mainframe
r
PC
Parity
checks
All of them
Commun Device
ication
interconnect
protocol standard
182
A
compil
er does
a
conver
sion
line by
line as
the
progra
m is
run
A
compiler
A compiler is a
converts
general
the whole
purpose
of a higher languag
level
e
program
providing
code into
very
machine
efficient
code in one executio
What is a compiler?
step
n
Lexical
Feasibi
analysis,
lity
CONVE
study,
RSION,
system Implementa and
design, tion and
code
What are the stages in
and
documentat generati
the compilation process? testing ion
on
Which of the following is
not a data transmission
coding scheme
CRC
An
interpre
ter
does
the
conver
sion
line by
line as
the
progra
m is
run
Baudot
ASCII
None of the
above
None of the
above
EBCDIC
An
interpret
er is a
general
An
purpose
interpreter languag
is a
e
representat providing
ion of the
very
system
efficient
being
executio None of the
designed
n
above
183
Lowlevel
languag
es
None of the
above
None of the
above
Relieve
Manage
the main
the paging CPU of
function in repetitive
a virtual
communi
environmen cation
t
tasks
Reduce
competition
between the
input/output
devices
System
Analysis
Testing
None of the
above
Coaxial
Cable
Common Telephone
carrier
Lines
Demodulat
Modem or
Highlevel
langua
ges
It is
faster
than
parallel
Serial Communication is commu
used over long distance
nicatio
because it
n
Financi
al
sector
In what areas is the
and
COBOL programming
engine
language used?
ering
Comm
unicate
with
the
consol
e
The primary function of a operato
front-end processor is to r
Specifi
cation
What is the first stage in and
program development?
design
Which of the following is
not used for data
transmission within a
Fiber
local area network
Optics
Frequen
cy
division
multiplex Time Division
or
Multiplexor
Middlelevel
languages
It is less
error prone
Graphic
design and
education
It is less
prone to
attenuati
on
Accounti
ng
systems,
commer
cial
sector
C
184
The
design
of the
screen
the
user
will see
and
use to
enter
or
display
data
System
Analysis
System
involves
Analysis
creating
defines the a formal
format and model of
type of data the
the
problem
program
to be
None of the
will use
solved
above
An
interface
A buffer
The
differen
t types
of
networ
k to be
used
Testing to
check for
errors
before the
system is
introduced
Hardwar
e,
Software
and size
of
None of the
program. above
Star
Packet
Ring
What is System
Analysis?
A device to device
hardware communication A
link is called
cache
101010
10
Parity
Bus
None of the
1100101 1010101 above
Cyclic
Retransmis Redunda
sion
ncy
Hash Count
None of the
64 above
15
Port
An online
protocol
Modem
Multiplex Acoustic
or
coupler
C
185
327
None of the
97 above
141
Data
Data
Data
manage
wareho Mining
ment
use
tools
systems
memor
seconda
y
ry
capacit memory
storage
y
access time capacity
30
binary
form
4C5
4 bits
Basic
Coding
Descrip
tion
1024
bits
255
secondary
storage access
time
B
None of the
256 above
alphanumeric
form
1B7
8 bits
5C4
16 bits
None of the
above
32 bits
A
B
Binary
Coded
Decimal
A Kb corresponds to
1000 bytes 210 bits
What is the binary sum of
01011 and 00101?
10000
1112
1110
Information is stored and
transmitted inside a
binary ASCII code decimal
computer in
form
form
form
All of them
210 bytes
None of the
above
alphanumeric
form
A
A
A
186
A parity bit is
used to
indicat
e
upperc
ase
letters
Becaus
e it
squeak
s when
moved
used to
detect
errors
is the
first bit in is the last bit in
a byte
a byte
B
Its moves
like a
mouse
It has
ears
None of the
above
None of the
above
VLSI
None of the
above
barcode voice
scanning recognition
CDROM
drive
None of the
above
Refillab
le ink
Pencil lead
Light
sensitive None of the
elements above
100K
5 Mb
1 Gb
output
input
Touch
screen
Light pen
Joystick
BPS
MIPS
MHz
Reading
bar
codes
Touch
screen
Hard disk
1.44 Mb
hardwa
re
software
187
Keyboard
Numeric
Keypad
Printer
Bar code
reader
Optical
mark
reader
Keyboard
Credit
card
Mouse
Speaker
s
Printer
Colour
ed
spots
Pixels
Pixies
Pickers
Bar code
reader
Optical
mark
reader
None of the
above
mouse
button
layout
keyboar
d layout
word
processing
software
Bar code
reader
Optical
mark
reader
None of the
above
Mouse
screen
layout
Mouse
A GUI is
hardwa language
re
interpreter
software an operating
interface system
First generat
ion
comput
ers.
Vishwa
jeet
is
caused
by
wear
Second generation
computers.
Third generati
on
Fifth compute generation
rs.
computers.
Deep Blue
Param
Arjun
caused by
overuse
is due to
bad disk
blocks
none of the
previous
UNIVAC Computer
belongs to the
Name the first Indian
Super Computer?
Disk fragmentation
188
Magnetic
Ink
The technology which is
Characte
used to check answer
Bar
r
sheets of multiple-choice code
Optical
Recognit
questions in civil services Reader Mark
ion
or similar examinations
Techno Reader
Technol
is: logy
Technology ogy
converts
a
program
a fast
slower than to
interpre an
machine
A compiler is
ter
interpreter code
Image
Scanning
Technology
none of the
previous
A
C
B
D
189
A procedural control
used to minimize the
possibility of data or
program file destruction
through operator error is
the use of
_______ software
enables users to send
and receive data to/from
remote computers
A _____ is a running
instance of an application
Splitting of CPU's time
for different tasks
_______ prevents time
slicing
______ computers are
used in large
organizations for large
scale jobs which have
large storage capacities
_______ is responsible
for all calculations and
logical operations that
have to be performed on
the data
______ printer use laser
light
______ software
enhances the user to
enter ,store, manipulate
and print any text
______ software enables
users to send and
receive data to/from
remote computers
_______ is the
temporary storage place
Limit
checks
Control
figures
External
file
labels
Cross footing
tests
applica
tion
system
operatin
g system communication D
project
pilot
project
model
process
multipr
ocessin multithreadi multiplex
g
ng
ing
multitasking
micro
compute none of the
rs
above
central
processi
ng unit
none of the
above
none of the
above
none of the
above
mainfra super
mes
computers
control
unit
band
printer
data
manag
ement
integrat
ed
softwar
e
my
comput
arithmetic
and logic
unit
drum
printer
word
processing
non
impact
printer
electroni
c
spreads
heet
communica idea
tion
processo
software
r
Microsoft
recycle bin exchang
none of the
above
none of the
above
B
B
190
er
_____ is a collection of
related fields
field
assem
_____ language consists bly
of strings of binary
langua
numbers
ge
______ symbol is used
to represent processes
like assigning a value to termina
a variable or adding a
tor
number
symbol
_______ is an example
for micro computer
_________capability
supports concurrent
users doing different
tasks
The ______ do not have
processing power of their
own and has only a
screen, keyboard and
the necessary hardware
to communicate with the
host. For this reason, the
terminals are referred
as_______________
A______is nothing but a
PC with a network
operating system
_____system is
responsible for handling
the screen and user I/O
processing
PC-at
file
none of the
above
machine
language
record
high
level
languag
e
none of the
above
processed
symbol
connecto input/output
r symbol symbol
hp vectra
system
fazitsu
vp200
series
IBM-PC
multipr
ocessin multithreadi multiplex none of the
g
ng
ing
above
"dumb
termina dumb
ls"
servers
dummy
dummy
terminals servers
wan
distributed
computing
system
windows
NT
LAN
host
server
191
host
server
PC
LAN
back
end
front end
distribute
d
computin
g
centralized
server
proces
sing
host
processin
g
dumb
processi
ng
data
processing
four
one
two
many
file
manag hierarchical network relational
ement database
databas database
system system
e system system
multipr
ocessin multithrea
g
ding
repairin redo
g
logging
disk
defragm
entation
Modulatio Module/
Code/D n/Demodul Dee-code ation
module
disk mirroring D
None of the
above
192
fixes
multipr
ocessin
g
Linear
area
networ
ks
locks
task
Integrat
ed
system
dynami
c
networ
ks.
Ethern
et
visual
basic
multithrea
ding
constrain
ts
traps
none of the
above
Local area
networks
multiplex
ing
Local
array of
networks
.
None of the
above
process
thread
client-server
Integrated
Symbolic
Digital
networks.
Integrat
ed
Service
s Digital
network None of the
.
above.
Internet
power
builder
ARPAN
ET
SQL *
plus
None of the
above.
all of the
above
None of the
above.
None of the
above.
MAN
WAN
GAN
Cells
System
modula
tion
transfer
protoco
l
Bits
Packets
Software
Mail
transmissio
n protocol
Simple
Mail
transfer None of the
protocol above.
B
D
B
C
193
The __________
protocol is a network
protocol to be built for the
World Wide Web .
The computer which can
receive data from other
computers on the
network and print it is
_______
The hardware and the
software requirements
together form the_____
ATM, Asynchronous
transfer mode is a
__________ technology.
__________ is designed
telephone system
Expansion of WBT is
______________
_________ connects
LANs.
Collection of instruction
is called a _____
Combination of
alphabetic and numeric
data is called _____ data
Computers can be
classified based on
______,______and
_______
_______ is responsible
for feeding data into the
computer
Transfe
r
Protoc Transmissi
ol
on protocol
Hyper
text
None of the
above.
File
server
Printer
server
None of the
Receiver above.
platfor
m
configuratio
n
package
MAN
and
WAN
LAN and
WAN
ISDN
ATM
Internet
system
Intranet
Web
based
Trainin Web based
g
Technology
Web
based
Transpor Web based
t
Transaction
Bridges
proced
ure
alpha
numeri
c
space
occupi
ed,
price,
no. of
users
allowed
Routers
batch
Protocol Repeaters
comman
d
program
alpha beta
size,
cost,
perform
performanc ance,
e their ratio cost
input, output,
performance
ratios
input
output
write
feed
A
B
D
A
194
multipr
ocessin multithreadi multiplex
g
ng
ing
multitasking
interpre
ter
compiler
converte
r
process
input
processor
ram
output
drum
printers
nonimpact
desktop thermal
printers printers
control
program,
interpreter,
assembler,
compiler
monitor,
program, CPU,
keyboar memory,
d, bus
input, output
impact
printers
operati
ng
system
,
Hardware components in bootstr
a computer are
ap,
_____,____,_____,____ kernel,
__
shell
_______ software are
programs that are
operati
complex and can be
ng
developed or purchased system
_______ is a set of
special instructions used
to communicate
effectively with the
computer
batch
_______ converts a high
level language into
proces
machine language
sor
_______ translates
assembly language
program into machine
compil
er
application windows
software
95
interpreter
protocols
softwar
e's
procedures
compiler
assembl
er
coder
interpreter
assembl
er
processor
C
195
language instructions
196