You are on page 1of 196

TALLY

The ------ key can be


used to select an existing
company from list of
companies.
Import and Export of data
between Tally and other
programs is possible only
through ---------Program.
The re-order point is the
inventory quantity that
trigger a stock
replacement activity.
A created company's
detail can be modified
through keys
A/An ------------- is the
official notice that the
firm sends to its
customers to advise then
to the amount of money
that is owed.
In tally,all masters have
________main options
In tally,to create a new
column in balance sheet
press _______
In tally,the use of group
behaves like a subledger, option is that we
can summarize many
ledger accounts into one
line statements
In tally, we can alter
ledger details using
either single or multiple
modes but not alble to
delete a ledger from

F1

ALT+F1

Tally
ODBC

Tally IMP

TRUE

false

CTRL+F
1

None of the
above

Tally INI

None of the
above

A
CTRL+F
3

None of the
above

Invoice Bill

A or B

None of the
above

Two

Three

Four

Five

Ctrl+C

Alt+C

Alt+Ctrl+ None of the


C
above

TRUE

FALSE

TRUE

FALSE

F3

ALT+F3

multiple modes.

In tally,a group company


is marked with an
______________

*
Puchas
The systems that work
ing and
together to order,receive, Accoun
and pay for
ts
replenishment of stock
payabl
are --------------e
Tally allows to delete a
ledger from --------alteration mode.
Single

Puchasing
and
Receiving
Multiple

Cash
--------------------- is/are
Flow
useful for management in Statem Fund Flow
the decision making.
ents
Statements
In tally,the group
company must contain at
least _____________
members
Two
Three
To cancel a vourcher
entry in Tally, short-cut
key is ----------Alt+D
Alt+X
The accounting masters
and inventory masters
related to
We press ------------function key to display
the age-wise analysis of
Bills Receivable or Bills
Payable report
In Tally, we press -----------, to print report .

&
Account
s
payable
and
Receivin
g

Puchasing,
Receiving
and Accounts
payable
D

A or B

Mone of the
above

Ratio
Analysis

All of the
above

Four

One

Ctrl+T

Ctrl+D

Create
Informa Alter
tion
Information

Display
Informati All of the
on
above

F4

F5

F6

Alt+P

Ctrl+P

Shift+P

F7
None of the
above

A
2

In Tally, Types of
Accounts and Types of
Vouchers passed during
the period, can be seen
Tally
in ------------- report.
Audit
In the Tally Software, the
------------ directory stores
all data entered by the
user.
Bin
The Ledger Accounts are
unique in Financial
Accounting Packages
Customers can be
permitted to enter their
own data into the firms
computer using the firms
wide area network is an
example of
In Tally, we can
customize the Vouchers
as per our requirements
The number of steps in
Accounts Compilation
are
Each action/transaction
of a firm is described by
a ----------------.
Tally is based on
mercantile accounting
system

Statistics

Data

True

Journal Book

Sub

None of the
above

False

Enterpr
ise
Data
Enterprise
Interch Data ange
Information

TRUE

Electron
ic Data
Intercha All of the
nge.
above

FALSE
2

A
3

data
elemen data
t
record

FALSE TRUE
Display
stock
valuati
Ctrl + N is used to --------- on
Open
-method Calculator

Day
Book

4
Field

5 C
All of the
above

B
B

Change
Period

None of the
above

------------- in Tally
classify the accounts
under different heads so
that summarised
information is possible.
Revenue Account also
known as -------------Account
Method of Voucher
Numbering is/are

Ledger
s

Groups

Journals

Manual Automatic
Balanc
Accounts Receivable are e
Profit &
displayed in
Sheet Loss

None

None of the
above
All of the
above

Journal
Book

All of the
above

To assemble a product
from different items ------------- entry is used
A --------- purchase
orders data flow is
directed to the
purchasing system for
use in closing out the
outstanding purchase
orders in the receiving
system diagram.
Tally provides at least -------- predefined voucher
formats
The value of the
inventory is included in a
ledger accounts as an
asset on the balance
sheet
" The buyers can follow
up with the suppliers to
determine the reasons "
is an example of ----------------

Physical
Stock
Transfer

Reversing
Journal

Issue

None of the
above

Person
al
Nominal

None of the
above

Real

Stock
Journal Journal

Filled

Receipt

11

FALSE
manag
ement
by
objectiv
e

16

18

21 B

TRUE
manageme electroni
nt by
c data
exception analysis

All of the
above

From voucher entry


mode , if we press
__________ then we get
payment voucher in tally F4
Default Cost Category in
Tally is/are -------------A Group Company is
simply a name and an
identify given to the
merged accounts
member companies of
the group.
A ----------- is a primary
document for recording
all financial transactions.
The field can have a
value between
________________ in
FA Package.
The _______ file
maintains data that
describes the supplier
past transaction with the
firm in terms of material
quality in AIS
It is necessary to
manipulate data to
transform it into --------------In tally, to change the
date of the voucher press
______
Tally can maintain
budgets on ----------------

F5

Main
Locatio
n
Primary

True
Ledger
s

0 to 9

F6
Primary
Cost
Categor
y

Alt+f5

All of the
above

False

Reports

Voucher None of the


s
above

1 to 100

10 to 60

None

Suspense

Order

All of the
above

Report

Output

Informat None of the


ion
above

F2

F4

Ctrl+f2

Ctrl+f4

Net
Transa
ctions

Closing
Balance

A and B

None of the
above

Suppli
er

The value of the


inventory is included as
an asset on the balance
sheet
In ratio analysis report of
Tally FA packagewe we
press
________________
function key to the
display of bills receivable
, bills payables report
The accounts payable
system is responsible for
paying the suppliers for
the -----------------

True

F6
Alt + f6
functio function
n key
key

F7
function
key

None of the
above

None of the
above

Sales
Purchases A or B
1-41995 to
1-4-1997
31-31-4-1996 to to 31-3- None of the
1996
31-3-1997 1998
above

What is the default


financial year in Tally6.3
_________________
Tally encrypts and stores
TALLY DATA at the data
directory
True
The Profit & Loss
statement can be
displayed in ---------------- Horizo
format(s).
ntal
Balanc
e sheet
& profit
& loss
profit &
loss
and
trial
Default ledger accounts balanc
in tally are ______
e
Default 'godown' name in Primar
tally is ____________
y

False

False

B
A

Vertical

A or B

Profit &
loss and
trial
balance
Main
location

Cash
and
profit &
loss
A or b

None of the
above

Cash and bank C


None of the
above
B
6

'Tally vault' is a
_________________
To create a sales
voucher in tally , you
have to press _______
A Group Company is ------------------------ given to
the merged accounts of
member companies of
the group.
In tally,"credit note"
voucher type records
entry for
________________
In tally you get currency
symbol option from
_______ menu
------------------ gives the
balance for each day for
the voucher type has
been selected.
For 'stock journal' entry
we press
______________ in tally

Securit
y
mecha
nism
Ledger a/c

Cost
None of the
category above

F5

F8

F9

A and B

None of the
above

a or b

None of the
above

Stock items Regional None of the


units
setting
above

Daybook

Balance
Sheet

None of the
above

Alt + F7

F10

F11

None of the
above

a name an identity
Sales
return
Compa
ny
creatio
n
Trial
Balanc
e
F7
Chang
es in
transac
tions or
vouche
rs

Tally provides the


capability to the
administrator/auditor to
track changes in the
areas is/are
In tally, types of users
are _______________
By pressing -------- key, a
list of inventory reports
can be displayed
straightaway from the
balace sheet report
F9

F7

Purchase
return

Changes in
Ledger
Both A
Masters
and B

F10

F11

1 B

F12

A
7

Projected approximation
of income or expenses is Balanc Profit &
called ______________ . e sheet loss a/c
"Administrator" type user
is also called 'Auditor' of
a company in Tally
You will get company
information , if you press
__________ from
gateway of tally
A constituent(member)
company can be a
member of more than
one group.
Default stock category in
tally is ______
To create a log of the
import activity in a file
_____________ is
located in the same
directory as an
executable program in
tally
In Tally,inventory
valuation method option
is available from
_______

TRUE

Budget

FALSE

F3

Ctrl+F3

TRUE
Main
locatio
n

FALSE

Alt+F3

None of the
above

Primary

Symbol

None of them

Tally.i
mp

Tally.ini

A or b

None

Stock
summ
ary

Stock
journal

Stock
analysis

None of the
above

None

By
In 'comp
pressin
info ->
g F11
During the security
functio creation of control'
n key
a company option

Tally audit feature is


available in a company
__________________
In tally, a group company
can also be a
constituent(member) of
another group company
TRUE

None

FALSE

A
8

Default number of groups


in tally are ________

128
Ledger
During voucher entry ----- Accou
-------- are used.
nts
User designated as ------- Admini
-------- can view audit list. strator
One
compa
ny to
another
compa
ny
created
withon
Tally
Tally supports Importing Packag
of data from ---------------- e
In an accounting
information system,
which of the following
Invent
types of computer files
ory
most likely would be a
subsid
master file?
iary.
Does
not
require
Which of the following is as
an advantage of a
stringe
computer-based system nt a set
for transaction
of
processing over a
internal
manual system? A
control
computer-based system: s.

The memory address


register is used to store

data to
be
transfer
red to
memor

228
Groups

28
SubGroups
Data
Entry

16 C
B or C

TallyVault

Other
programs a
spreadshee
t or a
database
Both A
file.
and B

None of the
above

Cash
disburseme Cash
nts.
receipts.

Payroll
transactions.

Will be
more
Will
efficient
produce a
at
more
produci
accurate
ng
set of
financial
financial
stateme
statements. nts.

Eliminates the
need to
reconcile
control
accounts and
subsidiary
ledgers.

data that
has been
transferred
from
memory

an instruction
that has been
transferred
from memory

Owner

the
address
of a
memory
location

FUNDAMENTALS OF
COMPUTER
Inefficient usage of
excess computer
equipment can be
controlled by
Which of the following is
not the component of a
CPU
A trailer label is used on
a magnetic tape file, it is
the last record and
summarises the file. The
following is an
information not found in
the trailer label

Contin
gency System
Plannin feasibility
g
report

Capacit
y
Plannin
g

Exception
reporting

NIC
Card

RAM

AGP Card

End-of-file and
end-of-reel
code

None of above

None of above

VSAT

Control
totals for
one or
Record Identificati more
Count on Number fields
Storing
Writing
informati
on a
on on
Hard copy is a term used hard
Printed
the hard
to describe...?
board
output
disk
Voice
activat
What do the
ed
Voice
Visual
abbreviations VAB stand broadc answer
audio
for
asting back
board
What control would
prevent the accidental
erasure of customer
File
information from a
Validity Boundary
protecti
magnetic tape
check
protection
on ring
What are the individual
dots which make up a
Colour
picture on the monitor
ed
screen called?
spots
Pixels
Pixies

Limited access
files
C

None of above

10

Header label normally


include all the following
except the
A daisy wheel is a type
of...?
Which approach or
technique is a control
usually associated with
microcomputers

File
Name

Identificatio Reel
n number
Number

Storage
Printer device

Pointing
device

System Physical
Logs
Security

Console
Log
An
inked
ribbon
and
print
head

Electric
ally
An impact printer creates charge
characters by using...?
d ink
Restric
t
The best security control physic
in a microcomputer
al
environment is to
access
What would you NOT
use with a flatbed
plotter?
A pen
A
What do you need for an cartrid
ink jet printer?
ge

An ink pen

None of above

Data
Dictionary

None of above

Require
Use only
user
unremovabl passwor
e media
ds

Make duplicate
copies of files A

Paper

None of above

A cassette

Distributed
policies or
procedures

None of above

Storage
capacity None of above

A drum

Eraser

A ribbon
Centralis
The greatest control
ed
exposure in a
Centralised function
microcomputer
Separa function for for PC
environment is the lack
tion of PC
Dispositi
of
duties acquisition on
A laser printer does NOT A print A laser
An INK
use?
head
beam
RIBBON
The amount of data that
a disk may contain is
known as the disks...?

Batch Total

Volume Size

11

You can ________


protect a floppy disk.
Information on a hard
disk is usually backed-up
using a...?

Magnetic tape is a...?


Hard disks can have a
storage capacity in the
region of...?
Which storage device
has the largest capacity
in Mb?

Read
Magne
tic
tape
Serial
access
mediu
m
1.44M
B
A CDROM

Write

None of above

None of above

20 GB

700MB

None of above

A floppy
disk

Magneti
c tape
storage

None of above

A floppy
disk

Magnetic
tape
storage None of above

In a
drawer

None of above

Where should floppy


disks be stored?

By a
sunny By magnet
window objects

Random
access
medium

PAN drive

A CDROM

How many bits of


information can each
memory cell in a

None of above

Floppy
disk
A
parallel
access
medium

Which storage device


cannot be erased?

The contents of these


chips are lost when the
computer is switched off?
What are responsible for
storing permanent data
and instructions?
Which parts of the
computer perform
arithmetic calculations?
What are small high
speed memory units
used for storing
temporary results?

Read
and
Write

ROM
chips

CDROM
RAM chips chips

None of above

RAM
chips

DRAM
ROM chips chips

None of above

Registers

Logic
bus

None of above

CPUs

Registers

Control
unit

None of above

0 bits

1 bit

8 bits

None of above

ALU

12

computer chip hold?

What type of computer


chips are said to be
volatile?

Software can be divided


into two areas:

RAM
chips
Networ
k
softwar
e and
securit
y
softwar
e

Travel agents use this


computer system when
reserving flights

Superc
ompute Personal
r
computer

Which computers are


used in the weather
forecasting industry?

Notebo
ok
comput Supercom
ers
puters

Business
software
and
games
software
Mainfra
me
compute
r
Jon Von
Neuman
n
compute
rs

Vacuum tube based


electronic computers
are...?

First
genera Second
tion
generation

Hoover
generati
on

None of above

Which generation of
computer was developed
from microchips?
Which generation of
computer uses more
than one
microprocessor?

Second
generat First
ion
generation

Fourth
generati
on
None of above

Second
generat
ion
Secon
d
genera
tion

Third
generation

Fifth
generati
on
None of above

Third
generation

Fifth
generati
on

Which generation of
computer developed
using integrated circuits?

ROM chips

CACHE

Systems
software
and
application
software

None of above

None of the
above

None of above

None of above

None of above

13

Which generation of
computer developed
using solid state
components?

Secon
d
genera Third
tion
generation

Fifth
generati
on

None of above

Analysis,
System
Design,
and
Impleme
ntation
None of above

DATABASES
Specifi
cation,
Design
Name three steps
, and
Programmi
involved in developing an Testin ng, Design,
information system
g
and Testing
_______ is used for
CAAT as database
Oracle
Generalized audit
software perform
auditors to undertake any
past records and not
concurrent auditing
TRUE
Generalized audit
software is a file whose
capabilities for verifying
processing is logic
TRUE
CAAT's are computer
program and data that
auditor uses as part of
the audit procedures to
process data if audit
significance contained in
an entity information
system
TRUE
CAAT do not contains
package programs,
purpose written program,
utility programs or
system management
programs
yes

ACL

JCL

none the
above

FALSE

FALSE

FALSE

no

B
14

Embedded audit routines


are sometimes built into
an entity's computer
system to provide data
for later user by the
auditor
TRUE
SCARF involves
embedding audit
software modules within
an application system to
provide continuous
monitoring
TRUE
Concurrent use auditors
as the member of the
system
TRUE
Regular cross system
verification may minimize
frauds
true
Computer security is
frequently associated
with confidentiality,
integrity and
authentication
true
Data reserve engineering
process metadata to
document system and
abstract business rules
and relationship
true
to
determ
ine the
The first step for
audit
developing CAAT
objecti
is_________
ve
can
bring
the
Using the open database data
connectivity feature in
directl
ACL is ______________ y

FALSE

FALSE

false

false

false

false

review and
evaluate
to obtain
the types of a record extract data
data
layout
from file

can bring
the data
indirectly

all the
above

none of the
above

15

Computer Assisted
Audited Technique
involves the use of
computers through
"Black Box Approach"
White Box Approach
necessary involves
expert knowledge on the
part of Auditor

The transition from


manual system to CIS
environment bring
dramatic changes
including
________________

Auditing with computer


necessarily supports the

CAAT involves an
Auditors' appreciation of
__________
Widespread end use
computing result in
unlimited errors creeping
into system going to
accept handling, thereby
increasing audit risks
For computerized
auditing usage of
sophisticated audit
software would be a

True

False

True
change
in the
method
of
recordi
ng
accoun
ting
transac
tion
docum
ents
driven
approa
ch
hardwa
re and
softwar
e
configu
ration

False

true

false

true

false

use of
accounting
codes

absence
of audit
trails

all the above

unique
risk driven approac
approach
h

none of the
above

processing
options, file checks
data
and
structure
controls

all the above

16

necessity

the
source
of data
availab
le to
Important knowledge
the
needed to begin planning audit
the use of CAAT is
organi
_________
zation
The move towards
paperless EDI would
eliminate much of the
traditional audit trail,
radically changing the
nature of audit evidence true

Computer operation
controls are designed to
provide
________________
Systems development
control, apart from
others, include
authorization, approval,
testing, implementation
and documentation of
new systems software
and system software
modification
A system could be
_________
A system exhibits
'entropy'

the of
by all
concer
ned

source of
data for
material
planing

none of these

false
providing
access to
computer
to all
organizatio
n personnel

true
false
natural/
manopen/close
made
d
true

all the
above

false

use of
any
program
s

none of the
above

A
conceptu
al/physic
al
all of them

D
A
17

Super computer are the


largest and fastest and is
very suitable for
commercial application
including audit work
Assembler language
uses Mnemonic symbols
Operating systems are
devised to optimize the
machine capabilities, the
function
include______________
_
General purpose
software provides a
framework for highly
complex scientific
operation
In batch processing,
transactions are
processed one after
another
The use of computer
assisted audit techniques
is not gaining popularity
not only
________________
On-line processing refers
to grouping of transaction
and processing the same
in one go from start to
finish
Real time refers to the
technique of updating
files with transaction data
immediately after the
occurrence of the event
to which it relates

true

false

true

false

enable
manage
multiple
schedu hardware & user
led
software
resource
jobs
resources
sharing
all the above

true

false

true

false

with
audit
depart
ments

with
production
department all the
s
above

true

false

true

false

none of these

18

In OLRT the CPU should


process the capability of
program interruption
true
Time sharing system
allow access to a CPU
from remote terminals
DSS is defined as a
system that provides
tools to managers to
assist them in solving
structured problems
DSS has the following
components
_________________
Master files contains
current records for
identification and
summarizing
Transaction files contain
relatively permanent
records take product
profile, customer profile,
employee profile etc
Master file configuration
includes ____________
______ is a file
management software
package that lets users
and programmers
organize data into files
and then process those
files
CAATS provide added
value to the clients
because
_______________

false

true

false

true

false

databa
ses

planning
language

true

false

true
false
referen
ce files table files

filex
to
have a
compl
ete
picture
of a

file-o-man

model
base

all the above

B
report
files

none of the
above

file
manage
r

filepet

none of the
above

decentraliz
ed picture
all the
of a system above

19

syste
m

File volatility refers to the


number of addition and
deletions to the file in a
given period of time
File activity is the
proportion of transaction
file records that are
actually used and
accessed in a given
processing run:
File interrogation refers
to the _____ of
information from a file
One -to-one relationship
means a single entity to
a single entity in a
monogamous structure
RDBMS is structured to a
series of 2 dimensional
tables

true

false

true

false

backups

retrieval

true

false

true
serious
ly
affecte
d
databa
se

false

SADB stands for


____________
Controls are present over
many aspects of the
computer system and its
surrounding social
environment
true
In framed checking the
data entry is checked
against an expected
picture or format
true

subject
area
database

deletion

software
and
databas
e

addition

safety and
database

false

false

B
20

Errors are
correlated_________
Field check is exclusive
to a field
_________ law basically
states that there is a
specific probability of the
first digit of a no. being
1,2,3 etc

at the
year
end

on
immediatel quarterly none of the
y
basis
above

true

false

Benfish Benford

Check digit is a group of


nos. added to a code for
determining the accuracy
of other digits in the code true

Hierarchical code means


_________
The validation checks
applied to a field depend
on the field's logical inter
relationships with other
fields in the record
The contents of a field
could determine _______
sign for a ______ field
Batch is the process of
______ together _____
that bear some type of
relationship to one
another
Hash totals means
meaningless totals

consec
utive
nos. or
alphab
ets to
entities

TRUE

Benjami
n

none of the
above

false
blocks of
nos. to the
primary
attribute of
the the
entity

B
random
placeme
nt of
compon
ent

none of the
above

false

valid,
numeri invalid,
c
alphabetic

A
none of
the
above

all the above

groupi
ng,
transa
ction

none of
regrouping, the
events
above

all the above

true

false

21

With OLRT where


interactive data entry is
available, the master file
associated with a
transaction may be
searched for confirming
data
Controls are required for
authorization to ensure
data integrity and detect
possible breaches in
security
Data from client
application are not stored
in the organization's
database through
auditables events and
function
All input records in a
batch are normally of
different types

true

false

true

false

true

false

false

true
increm
ental
design
IDEA stands for
and
____________________ enlarge
_____________
activity
A transaction file is
sorted prior to the update
of master file
true
A sequence check on the
transaction or master
files by an update
program is not required
true

interactive
data
extraction
and
analysis

interactiv
e data
innumer
able
none of the
analysis above

false

false

22

Whenever monetary
transactions are
processed against
master files, the update
program should maintain
a correlation account to
record such transaction
that does not have a
matching master file
record
Internal tables are stored
tables from which certain
values are extracted for
further processing and
storing
For small to medium
sized systems, individual
modules are coded and
individually tested and
then assembled to be
tested as a whole-the
testing strategy is
referred to as
___________________
In systems testing, test
involves_____________
____
Recording transactions in
a controlled manner may
amount to loss of stored
data

true

false

true

false

e-brain
bottom
up
tests

yes

bouncing
ball

bigbang

stub

top-down
tests

hybrid
tests

all the above

no

read
data on provide
Audit software is used by client's information
the auditor to _________ file
to the audit

B
reperform
procedur
es
carried
out by
the
clients
program all the above

D
23

Core image comparison


is a software used by the
auditor to compare
_______ version of a
program with a secure
________ copy
Database analyzer is a
software which provides
detailed information
concerning the operation
of the database

SAS stands for


______________
Embedded code is a
software used by the
auditor to examine
backup data
Embedded code
performs wide variety of
audit task
Core image comparison
is particularly useful
where only executable
versions are distributed
Log analysis is a
software used by auditor
to detect virus

execut
ables, deleted,
master hard

none of
these

all the above

true
syste
m
analysi
s
softwa
re

false

true

false

yes

no

true

false

true

false

system
advanced
software

all the
above

none of the
above

24

On line testing
techniques the auditor
______ data either
_______ or fictitious in
order to see that a
specific program or sever
edit test is doing its work
Mapping software is
used by the auditor to list
unused program
instructions
Mapping software has
very objectives

Modeling is a variety of
software which
________________
On line testing can be
targeted for specific
functions carried out by
programs

manip
ulates, create,
real
false

none of
these

all the above

true

false

yes

no

can enable
the auditor
can be to execute
very
provisions
powerf on a
ul
number of
analytic different
al tool bases

yes

no

can
provide
the
auditors
with
useful
informati
on with
trend s
and
all of the
patterns above

25

provide
s
detaile
d
informa
tion of
Program code analysis
machin
involves _____________ e uses
__________ is a
software of CAAT
IDEA
Snapshot is software
which takes a picture of a
file or data or a
transaction passing
though the system
true
fictitio
us
data
applie
d
agains
t the
Base case system
client
evaluation
progra
includes____________
m
While base testing forces
on finding if there are any
defective execution
policies in a program
true
Black box testing seeks
to determine whether
application output is what
it is supposed to be
true

identifies
program
code which
may be
there for
fraudulent
reason

examina
tion of
source
code of
a
program
with
advice
to
followin
g the
logic of
a
none of the
program above

ACL

ALC

ACLL

false

comparison
of source
version of a
programme
d

analyzin
g the
picture
of a file
or data

all the above

false

false

A
26

In integrated test facility


approach the auditor
should ensure that the
impact of test transaction
is subsequently
eliminated from the
computer files
Black box testing is
_______ based and
white box testing is
_______ based

true
specifi
cation,
progra
m
identifyi
ng
errone
ous
code

Source code review


means__________
In formula in flow
hypothesis the auditor
should expand the extent
of substantive tests to
determine how the
defects may impact the
attainment of the
program objectives
true
All material application
oriented events that
occur within the
boundary subsystem
should be recorded in the
accounting audit trail
true

false

file,
hardware

none of
the
above

identifying
ineffective
code

identifyin
g nonstandard
code
all the above

false

false

authenticati
on of
resource
information requeste
support
d
all the above

In examination of audit
trail the following data
associated with an event
may be ___________-

start
and
finish
time

JCL
means______________
___

job
control job
langua connectivity all the
ge
language
above

all the above

none of the
above

A
27

Audit should be
periodically analyzed to
detect any control
weakness of the system yes
In an accounting audit
trail, intrusion detection
system might monitor the
amount of processor time
consumed by the user to
detect unusual deviation
from the amount
processor time requested
by the user in the past
true
A sample size calculator
program assists auditors
in determining RAND()
function
true
packa
ge
compu
ter
p[prog
ram
for
perfor
ming a
variety
of data
proces
Generalized audit
sing
software consists
functio
___________
n

no

false

false

master
list of
mathematic transacti
al concept ons

administered
questionnaire

28

Specializes audit
program may
be___________
Generalised audit
software could be used
by the following in
consistencies or
significant fluctuations
Generalized audit
software function
include____________
In the file reorganization
merging capabilities are
needed in data from
separate file is to be
combined on a separate
work file
Auditors cannot use
generalised audit
software to extract the
data needed for audit
purpose
Auditors can combine
functional capabilities of
generalized audit
software to accomplish
the task of
__________________

prepar
ed by
the
auditor

prepared
by the
entity

true

false

prepared
by an
outside
program
mer
engaged
by the
auditor
all the above

stratificat
file
ion and
access/ statistical/ar frequenc
organiz ithmetic
y
ations operation
analysis all the above

true

false

true
examin
ing the
quality
of
system
proces
s

false

carrying
analytical
review

examinin
g the
quality of
data
all the above

29

Which of the following is


not the feature of GAPs
Which is the example of
CAATs

In audit procedures, test


data is

Which of the following is


not the use of CAATs
Which of the following
are called explicitly by
another procedure?
_________ data type is
generally used for fields
assigned as primary keys
in a table
MS access objects can
be published in the web
In code-builder,
got_focuse,
click,dbl_click,enter are
examples of _______
_______can be used to
automate certain actions
in response to events

Wide
access
to
various
data
base
ACL
A
sampl
e of
transa
ctions
Tests
of
details
of
transac
tions

Can extract
and
Can aid
analyse
in simple
data
selection
High
End
IDEA
CAATs
A special
A utility
purpose
software
written
programme program
Complia
nce tests
of
Analytical
general
review
EDP
procedures controls

Can define
the audit
objectives

All of the
above

None of the
above

All of the
above

Event
Action
Procedur General
Macros Procedures es
Procedures

integer

number

true

false

primary
number

auto number

D
A

actions events

procedur none of the


es
above

report

chart

form

macros

30

In the macro sheet the


macro is selected in the
_____field

macro

expression
elements

To build complex
calculat code
expressions_____is used or
builder
The three list boxes
present at the bottom of
the expression builder
are called_____
________option is
selected from the view
menu to create macros
with conditions
_______report can be
created with minimum
user input
_______layout of a form
displays one record at a
time
The table or query name
on which we are going to
build our report is
selected from the ____
dialogue box
______and_____are the
two types of auto reports
available
There are no wizards for
creating a database in
access
______option from the
insert menu option is
chosen to add an
embedded chart

action
list

macro list

commen
ts
action
expressi
on
builder
expressi
on
element
s list
box

expression
elements

none of the
above

conditi
ons
action

insert

none of the
above

tabular

columnar

auto
report

embedded

columnar

datashe
et

justified

tabular

create
report
link report
colum
nar
and
stable and
tabular unstable
true

false

create
fields

add chart

embedd
ed report new report

dynamic
and
static

none of the
above

chart

insert chart

31

In ms-access, while
using SQL, references
constraint is used for
creating _______
_______is used to create
a mailing label
______header is present
at the beginning of the
report
______is present at the
bottom of each page in a
report

In SQL, having clause is


used for _________
______field is added to
the macro sheet when
we select grouping
option from the view
menu
______can be used to
create toolbars
_______query is used to
add records from one or
more tables into an
existing table
_______window is used
to write VB code in
access application

primary alternate
key
key

foreign
key

none of the
above

label
wizard

chart
wizard

mail
wizard

none of the
above

start
header

group
header

page
header

report header

report
footer

page
footer

group
footer
for
specifyi
ng
conditio
ns with
group
by
clause

none of the
above

none of the
above

conditi
on
group
VB
Module
s
reports

macro
names

none of the
above

forms

macros

add

append

insert

delete

report

macro
sheet

module

none of the
above

for
orderin for
g
updating
records records

Values for other tables,


queries are maintained in
look up fields data type
true

false

A
32

Visual Basic language is


a _____ tool

none of the
above

none of the
message above

CME

none of the
above

object
linking
and
embed on line
ding
execution

on line
editing

none of the
above

OLE
object

OLE client

OLE
server

OLE
communicator

linked

embedded

connecte
d
edited

exe

DLL

BMP

html

form
wizard

report
wizard

query
wizard

publish to
web wizard

static html

dynamic
file

none of the
above

append add

insert

data
definition

dollars rupees

pesos

yen

RAD

RAP

______ function is used


SysCm
to display a message box d
MsgBox
Other ms-office
applications can be
accessed from msaccess using a concept
called ________
OLE
DDE

OLE stands for_____


The application that
supplies data in OLE is
called an _________
If any change made on
the object from the client
side is reflected on the
server then the object is
said to be _____
_______is the file format
that works on internet
______ is used to
convert any ms-access
object into html format
_______ option in
publish to web wizard
produces a page that is
static in nature
_______query is used to
create or change
database objects in a
current database
Currency fields express
the amount in
_________

static
file

RAID

33

_______is selected from


the toolbar to add an
OLE object
To display an OLE object
in the form of an icon
____ option is selected
from insert object
dialogue box
_______option from the
file menu is selected to
run 'publish to the web
wizard'
_____page in an web
application is used to
navigate to the rest of the
pages in the application
______ is fired when an
event is triggered is the
concept based on a
Visual Basic language
Ms access is a
___________
A collection of data
stored in different objects
is known as a
_________

unboun
d
bound
object object

comman
d button list box

displa
y as
icon

display

link

create icon

new

save as
html

none of the
above

home

end

none of the
above

bullet

command

procedu none of the


re
above

DBMS

RDBMS

front end language

data
group

data
collection

A blank database can be


created using
__________
Text type data can be of
_____ characters in
ACCESS
______is a datatype that
assigns values
automatically
Tables cannot be
imported from other
databases

new
dialog
box

new blank
database
dialog box

databas
e
new
databas
e dialog
box

create
html

startup

data storage

database
dialog box

255
64000
235
63500 A
automa
tic
AutoNumb
number er
number automatic field B
true

false

B
34

If two tables having same


values for the fields are
joined it is called an
______
Duplication of records in
a field won't be allowed if
the fields are declared
a________
Changes from a master
table can be reflected on
to the child table by
selecting _____option
To see more than one
record at a time in a form
we use _______
In SQL, delete command
is used to remove
_________
In MS-Access, filter
excluding selection will
display only those
record(s) which meet the
criteria.
Properties of the fields
are managed by _____
in Dynaset
______queries allows us
to view data in row by
column manner
The type of queries that
can update or delete
record(s) in a table(s) are
called __________
Joining tables without
any matching values in
the fields is called
____________

inner
join
primar
y key
cascad
e
delete
related
records

outer join

explicit
join

none of the
above

not null

candidat
e key

no duplicate
key

cascade
change
related
records

cascade
update
related
change all
fields
related records C

column
ar
tabular
table or query or
tables queries

true

both a
and b
record
or
records

none of the
above

none of the
above

false

B
Dynaset
field
propertie
s
properties

propert
y field
crosst
ab
querie
s

field
property

row/column select
queries
queries

update queries A

action
querie
s

change/
row/column delete
queries
queries

update queries A

inner
join

self join

no
match
join

outer join

D
35

Primary key uniquely


identifies each record
Which of the following
dialog box is/are used in
the creation of form
________
_______ query wizards
are used to generate
summary calculations for
a table
Properties of a form can
be changed by selecting
______from view menu
options
Forms that are included
in other forms are called
______________
In MS-Access, while
using form design view,
for creating a command
button for adding a new
record, we should select
the _______ category
from the command
button wizard
_______ form displays
fields in a single
horizontal row
The process of arranging
the data in a meaningful
order is known as
___________
______ are used to
select only some
particular records from
the table or any other
database objects

true
new
form
dialog
box

false

form
form create wizard
dialog box dialog

both 1 and 3

simple

summa
ry
sum

append

change
properti
es
properties

form
propertie
s
new properties B

include
d form sub form

new
form

child form

Record
Form
Navigat Record
Operatio None of the
ion
Operations ns
above

column tabular
ar form form

hierarchi one to many


cal form form

filtering ordering

sorting

querying

filter

pipes

gateways

sorts

36

In MS-Access, user may


specify criteria for filter in
form view using
_________
___wildcard character
represents any single
character
Records cannot be
sorted by a primary key
A control without a data
source is known as
___________
Set of related option
buttons, check boxes
and toggle buttons is
known as
_____________
Which of the following is
control types
____________
In MS-Access, the
function that gives the
current date is
_____________
_____is a control that
lists set of data
______is a form that
summarize large amount
of data
______allows to create a
filter by typing the value
in a data sheet
Wizards for toolbox
controls are called a
__________
The wild card
representation for any 5
letter word that starts
with ram is

filter
by
form

filter by
selection

filter by
menu

None of the
above

true

false

bound
control

unbound
control

data less
control
data control

button
group

option
group

controls
group

record group

unbound

controll
ed

all of the
above

CURR
DATE() TODAY()
text
box
list box

DATE()
combo
box

DAY()

static text

bound

pivot
table
data
sheet
filter
button
wizard

ram*

columnar
form

tabular
form

main form

filter by
input

filter by
form

none of the
above

control
wizard

option
control
wizard

tool wizard

ram??

two of
the
above

none of the
above

B
37

________________

Look up fields slow up


data entry
____is an access object
that displays un-editable
data
_____option from the
new object toolbar gives
the easiest way of
generating a report
______ represents data
in a pictorial format
Changes of one table
can be carried over to
another related table
Hyperlinks are used to
jump to any kind of
information or data from
a file
The memo field can have
text upto_____
characters in length
In MS-Access, columnar
layout can be used to
view multiple records in a
form
In MS-Access, alter
command may be used
in adding a primary key
to a table
Update query is used to
add records from one or
more tables to the end of
an existing table
In ms-access, datasheet
view is available in
___________

true

false

report

form

B
table

ledger

A
A

autore
port

report

module

none of the
above

chart

label

bitmap

report

true

false

true

false

60,000

255

25,000

64,000 D

true

false

true

false

true

false

table

query

form

all of the
above

D
38

______are used to jump


to any kind of information
from a datasheet or a
form
table
Home page will always
be present as a first page
of an application
Make table queries
create a new table from
the records of another
table
In ms-access, to protect
a database file from
illegal access, we may
set database password.
The option of setting
database password is
available in _______
menu
Foreign key is a field that
uniquely identifies each
record and accept no null
values
Data definition queries
are used to create or
change database objects
The attributes of a
composite key are known
as ________
OLE object is a data type
in access
Data displayed in forms
cannot be edited
A sub form is used to
display one to many
relationship between
tables

form

report

hyperlink

true

false

true

false

Insert

Records

true

false

true

false

alternat composite
e keys keys

Tools

none of the
above

candida
te keys

primary key

true

false

true

false

true

false

A
39

We can switch from


datasheet view to form
view by selecting view ->
form view option
In MS-Access long
integer is a datatype
In MS-Access, while
designing a table for a
particular field, the
Required parameter is
set to yes. This validates
the field as _______
Sorting is applied to
select only some
particular records
Filter by form can be
created from a forms
shortcut menu
Advanced filter uses a
filter similar to the query
design window to create
a filter
? Wildcard character
represents any number
of characters
_________ of the
following is/are a type of
chart
A bound control is tied to
a underlying query or
table
A calculated control uses
expression as a source
of data
Text boxes cannot be
bound controls
The default query
invoked by ms-access is

true

false

true

false

zero

none of the
above

null

not null

true

false

true

false

true

false

true

false

B
both 1
and 2

none of the
above

pie

bar

true

false

true

false

true
update
query

false
select
query

B
delete
query

append query

B
40

A control can be bind to


a record using row
source property

true

List box is a control that


offers a list of choices
true
If a table is joined to itself
it is called a
inner
________________
join
A picture box combines
the activities of both a
text box or a list box
Line is a tool box control
Text boxes can be part of
a option group
_____ chart exists as a
separate object
Filtering data is a way of
arranging data in a
meaning full order
Wild card characters are
used for sorting records
Pivot tables are used to
navigate to the other
tables in a database
Reports are used to
represent un-editable
data
In MS -Access, the
records in a table are
sorted based on
_________
Relationship is an
association between
_________
Summary options dialog
box is used to
summarize data

false

false

outer join

self join

table join

true
true

false
false

B
A

true
freesta
nding

false

true

false

true

false

true

false

true
the first
field of
the
table

false

embedded

stand
alone

sub chart

the last
field of the
table

primary
key field

none of the
above

forms

reports

attribute
s

entities

true

false

A
41

______ queries can be


used to delete a group of
records that meet some
specific records
delete

insert

Charts can convert


numerical data in a easily
understandable format
true

false

false

Embedded charts exist


separately
From ms - access, if we
want to view the records
stored in a table in ms excel worksheet, we
need to
Page header is present
at the beginning of each
record
Detail section has a
header and footer
A macro is performed
only when the user
initiates an event
The macro is selected
from the action field of a
macro sheet
A macro can be made to
execute before the
starting of a database
In MS-Access. While
appending records, the
source and the target
table must have similar
structure and fields
We can add our own
functions to the
expression elements list
box of the expression
builder

true

append

use
datashe
et in
forms

add

use
hyperli
nk

use import

true

false

true

false

true

false

true

false

true

false

true

false

true

false

use export

42

_______is the wildcard


character which
represents the presence
of any number of
characters
&
Macros can be used to
add a menu to a
database object
true
_____ header is a unique
feature of reports
page
Chart can either be a
form or a report
Group header will be
present at the design
view of a report even if
the report is not grouped
We can change from the
design view to the form
view without being
prompted for saving the
changes made
Charts can be produced
without the wizard
Macros can be used to
create user defined error
messages
Between and Not
Between is ______ type
of operators
The default data type of
VB is integer

Visual Basic is based on


__________

false
detail

D
A

group

topic

true

false

true

false

true

false

true

false

true

false

relation
al
list
true
action
langua
ge

range

logical

false
structured
query
language

C
B

event procedur
al based
languag none of the
e
above

43

_______is the name of


the database object that
displays data and can be
used to edit data
In access OLE objects
cannot be linked
_____ section is present
for each record in the
report
A ________ sheet lists
all the properties that
pertain to the form or the
controls
Textboxes can also be
an example of unbound
control
In MS-Access, we may
design command buttons
for navigating records
_______are forms that
are included in other
forms
_______ are used to
represent our data in
graphical format
A field with a _______
uniquely identifies each
record
Large amount of data
can be summarized
using ______ tables
_______ are employed
to select only some
particular records from a
database object
______ control need not
have a data source

report

form

true

false

group

record

session

detail

data

property

both a
and b

none of the
above

true

false

true

false

sub
forms
graphs

query

table

B
B

child forms

inner
form

none of the
above

chart

labels

report

number primary key index

identifier

pivot

create

form

none of the
above

filters

queries

sorts

form

bound

forms
none of the
unbound above

A
C

44

______ control combines


the functionality of both a
text box and a drop down
list
MS access is a DBMS
A form can be bind to a
record source using
_____ property of the
form
______ forms displays
field in single row
______ forms are usually
used for tables with one
to many relationship
_______ control uses an
expression as a source
of control
_______ control is tied to
field
_______is the form that
can be created with
minimum input from the
user
______option from the
tool menu is selected for
setting relationships
between tables
______,______and____
_are the buttons
belonging to the options
group
_________allows us to
create a filter from a field
short cut menu

list box
true

button

option button

none of the
above

none of the
above

none of the
above

calculat
ed
bound
calculat
ed
unbound

none of the
unbound above

bound

static

sub
form

auto form

tabular
form

columnar form

connect

relations
hips

none of the
above

command
button,
check and
list boxes

list,
check
and
combo
boxes

option button,
toggle button
and check
boxes

filter by
record

filter by input

form
name

combo box
false

tabular
form

chart form

record
source
data
sheet
form

sub
forms

tabular
form

columna
r form

set
relation
option,
toggle
and
comma
nd
buttons

control

filter by filter by
form
report

B
A

45

________is a database
object which displays
data but cannot be used
to edit data
What term applies to a
collection of related
records in a database?
All of the following terms
are related to
computerized databases
except which one?

What is a database?

form

clipboa
rd
file

search
A way
to
analys
e and
manipu
late
numeri
cal
informa
tion

Informa
tion
about
certain
What does a record
progra
contain?
ms
remote
An RDBMS is a
DBMS
storing
data
offline
at a
Data Warehousing refers separat
to
e site
Unauthorised alteration
of on-line records can be
prevented by employing

report

sort

macro

table

field

layout

field
names

record grab

An
organise
d way of
storing
informati
A tool to
on about
produce
a set of
A way of
high quality similar
maintaining a
documents things
log

It contains
all the data
about one
specific
item
relative
DBMS

A
docume
nt which
contains
text
Relation
al DBMS

backing up
data
regularly

is related uses tape as


to data
opposed to
mining
disk

Compute Database
r
access
matching controls

Key
Computer
verifica sequence
tion
checks

A collection of
files
Reliable
DBMS

B
C

46

What is a report?

Report
s allow
users
to
extract
informa
tion as
hard
copy
(printed
output)

Extracti
ng and
What is the best way to
analysi
analyse and change data ng data

Compil
ers,
What are some popular
interpre
office orientated software ters,
applications?
editors
DEFAU
Which of the following
LT and
constraints can be used NOT
to enforce the
NULL
uniqueness of rows in a
constra
table?
ints
Which of the following
commands is used to
CHAN
change the structure of
GE
table?
TABLE

A tool
which
Reports
allows
provide a
text and
very
graphics
flexible way to be
of creating placed in
and editing docume None of the
documents nts
above

Spreadshe
ets make
data easy
to analyse

None of the
above

None of the
above

IDENTITY
columns

UPDATE
TABLE

Using
queries

FOREIGN
KEY
constraints

Word
processo
rs,
spreads
heets,
databas
es, DTP
PRIMAR
Y KEY
and
UNIQUE
constrain
ts

MODIFY
TABLE

ALTER
TABLE

Network
software,
backup
systems

47

You are creating a client


application that calls
ActiveX DLLs. Which of
the following properties
of the Err object provides
the name of a
component that sends an
error back to the client
Numbe
application?
r
Description
This database holds
personal information.
The user can help to
keep it confidential by
If the database holds
customer names and
addresses, personalised
letters can be created
automatically using
Application software
suited to storing the
survey information
obtained in the table
would be
The characters * and ?
are sometimes used in
search criteria as
Which of the following
field types will generate
the primary key
automatically?

Compon
ent

Source

using a keeping a
passwo backup
rd
copy

keeping
the
original
paper
copy

saving the file


with different
filenames

the
product the primary
code
key

mail
merge

e-mail

A
databa
se

Graphics

browser

e-mail

operators

wildcard
s

engines

Auto ID

AutoNu
mber

Auto Key

bookm
arks
Auto
Primar
y

48

Referential integrity
ensures that the:

records
in a
dynase
t are
consist
ent
with
the
underly
ing
tables.

Tables are related to one foreign


another through a:
key.
the
primary
key of
both
related
A foreign key is:
tables.
You are creating a
banking database to
track customer loans.
The bank will, of course,
have many customers,
each of whom may take
out one or more loans,
while each loan may be
associated with only one
customer (there are no
joint accounts). What is
One-tothe re
one
In a one-to-many
relationship between
Companies and
Employees, which field is Employ
found in both tables?
eeID

main form
and a
subform.

forms in
a
databas
e are
consiste
nt with
the
underlyin
g tables
or
queries.
query
and its
associat
ed
dynaset.

the primary
key of the
related
table.

a field
from an
unrelate
d table.

related
tables in a
database
are
consistent
with one
another.

reports are
consistent with
the underlying
tables or
queries.
B

report and its


related query.

not a primary
key of either
related table.

One-tomany

Many-tomany
Many-to-one

CompanyI
D

Employe
eLastNa CompanyAddr
me
ess

A
49

Which of the following


ensures that records in
related tables are
consistent with one
another? For example, it
ensures that you cannot
add a record with an
invalid foreign key.

The
Tools
menu,
Relatio
nship
Referential
window integrity

In a Customers tables,
what does a plus sign
next to the CustomerID
field mean?

Right-click
the
Double Relationshi
click
p line, then
the
select
Relatio Delete from
nship
the shortcut
line
menu
That
there
are
several
custom
ers
associa That some
ted
of the data
with
is not
that ID viewable

What is required of the


fields that join two
tables?

They
must
both be They
number cannot be
s
text fields

How would you delete a


relationship between
tables in the
Relationships window?

The join
line

The one-tomany
relationship

Select
Undo in
the
Relation
ships
pulldown
menu

Click the
Delete
Relationships
button on the
toolbar

That records
can be added
by clicking on
the plus sign

They must be
the same data
type

That
there are
records
in a
related
table
They
cannot
be
AutoNu
mber
data
types

50

Assume a one-to-many
relationship between the
Customers table and the
Loans table, with
referential integrity in
effect. What happens
when you attempt to
delete a customer ID
from the Customer table
that still has entries in the
Loans table?

Which of the following is


true when viewing a main
form and its associated
subform in the Form
Design view?

Nothin
g,
Access
ignores
the
attempt
ed
comma
nd.

The
subfor
m is
not
visible.
A onetomany
relation
ship
betwee
n
teams
and
players

Which of the following


relationships does not
belong in a database
based on a professional
sports league such as
football or basketball?
Which symbol is used at
the end of the join line in
a related table to signify
the many side of a oneto-many relationship?
#

The
customers
ID is
deleted
from the
Customers
table.

The
custome
rs ID is
deleted
from the
Custome
rs table,
and all
the
related
loans
are
deleted
from the An error
Loans
message is
table.
displayed.

The
subform is
displayed
in
Datasheet
view.

The
subform
is
displaye
d in
Form
view.

The subform is
an object on
the form and
can be moved
or sized like
any other
object.
D

A oneto-many
A one-torelations
many
hip
relationship between
between
coaches
teams and and
coaches
teams

A many-tomany
relationship
between
players and
teams

51

You have created a oneto-many relationship with


referential integrity
between a Customers
table and a Loans table.
From which table can
you delete a record?

The
Customers
table only
when there
are Loan
Either
records
table at associated
any
with that
time
customer

Which of the following is


TRUE related to form
fields?

prompt,
title bar
text,
icon.
Dim
Create
List.
A
check
box
enable
s the
form
user to
choose
from
one of
several
existing
entries.

A text field:

must
be set
for one
word.

The correct order of the


arguments for the
MsgBox statement is:
The first statement in a
procedure named
CreateList is:

The
Loans
table at
any time

Neither table

prompt,
icon, title
bar text.

title bar
text,
prompt,
icon.

title bar text,


icon, prompt.

Sub
CreateList.

CreateLi
st.

Sub.

A dropdown list
enables
A text field the user
enables the to
form user
choose
to choose
from one
from one of of
several
several
existing
existing
entries.
entries.

A drop-down
list enables the
user to enter
text.
C

must be set does not


for multiple have to
must be set for
words.
be set.
two words.
C

52

The purpose of a
database is to:
A database stores:

help
people
keep
track of store data
things. in tables.
relationship
data.
s.

Structured
Question
Language
(SQL)

Structure
d Query
Languag
e (SQL)

Relational
Question
Language
(RQL)

Database
Manageme
nt System

Data
Business Relational
Model
Model
System Manager

A sales contact manager


used by a salesperson is
an example of
_______________

singleuser
databa
se
multiuser
applica database
tion
application

A program whose job is


to create, process and
administer databases is
called the _____
Microsoft Access may
use which of the
following DBMS
engines?

Jet

multiuser
database
application

facts.

A Customer Resource
Management (CRM)
system is an example
of_________
The industry standard
supported by all major
DBMSs that allows
tables to be joined
together is called
__________.

informati
on.
a and b
ecommer
ce
databas
e
applicati
on
a or b
ecommer
ce
databas
e
applicati
on
None of above

A database records:

singleuser
databa
se
applica
tion
Seque
ntial
Query
Langua
ge
(SQL)
Databa
se
Modeli
ng
System

maintain data
create
on different
tables of things in
rows and different
columns. tables.
metadat all of the
a.
above

figures.

SQL Server Oracle

a and b

D
53

Which of the following


are basic components of
an enterprise-class
database system?

The
user
the
databa
se
applica
tion(s)
interact
(s) with
the
DBMS

The
database
application

The
databas
e
manage
ment
system
(DBMS)

All of the
above.

the DBMS
accesses
the
database
data

None of
above

All of above

b and c

the database

All of the
above.

All of the
above.

In an enterprise-class
database system
________ .
In an enterprise-class
database system, the
database application ___ creates creates
.
queries form
In an enterprise-class
database system, reports
are created by
____________________ the
.
user

the
database
application

all the
users'
A database is considered data is
"self-describing" because in one
_______ .
place

it reduces
data
duplication

creates
reports
the
databas
e
manage
ment
system
(DBMS)
it
contains
a
descripti
on of its
own
structure

In an enterprise-class
database system, the
database _________ .

holds
metadata

holds
indexes

holds
user
data

54

A database designed
using spreadsheets from
the Sales department is
a database being
designed
____________________
_____ .
A database designed to
implement requirements
for a reporting application
needed by the Sales
department is a database
being designed _______
.
A database designed to
combine two databases
used by the Sales
department is a database
being designed
____________________
_____ .
Database professionals
use ________________
as specific data sources
for studies and analyses.
Database professionals
use a set of principles
called
________________ to
guide and assess
database design.
A very popular
development technique
used by database
professionals for
database design is
known as
____________________
___ .

as a new
from
systems
existing developme
data
nt project

as a
redesign
of an
existing
databas
e
a and b

from
existing
nondataba
se data

as a new
systems
developme
nt project

as a
redesign
of an
existing
databas
e
a and b

as a new
from
systems
existing developme
data
nt project

as a
redesign
of an
existing
databas
e
a and b

data
marts

data
marts

data
marts

normalizati
on

normalizati
on

normalizati
on

data
models

entityrelationship
data modeling

data
models

entityrelationship
data modeling

data
models

entityrelationship
data modeling

D
55

A very popular
development technique
used by database
professionals to adopt a
database design to new
or changing requirement
is known as _____ .

data
marts

The predecessor(s) of
file
database processing was manag
(were) __________ .
ers

relational data
model

the order
the order of of the
the
rows is
columns is unimport
important
ant

more than one


column can
use the same
name

relation

row

field

field

key

tuple

field

composit
e key
foreign key

field

foreign
key

candidate key

compo
foreign
site key primary key key

surrogate key

All of above

record

record

Normalization is a
Insertio
process used to deal with n
Update
which of the following
anomal anomaly

hierarchical network
models
models

entities
in a
In a relation
column
____________________ vary as
______ .
to kind
An attribute is also
known as a(n)
.
table
A combination of one or
more columns used to
identify particular rows in
a is___ .
record
A combination of two or
more columns used to
identify particular rows in
a relation is________ .
A determinant that
determines all the other
columns in a relation
is______ .
When designing a
database, one of the
candidate keys in a
relation is selected as the
_________ .

normalizati
on

entityrelations
hip data
modeling data migration

Deletion
anomaly

56

modification anomalies?

Modern microcomputer
personal DBMS
products______.

assess
the
existing
tables'
structur
e and
content
are
supplie
d by
several
wellestablis
hed
manufa
cturers

Which of the following


are true about data
mining applications?

They
use
sophisti
cated
mathe
matical
techniq
ues.

When you are given a


set of tables and asked
to create a database to
store their data, the first
step is to ____ .

design the
database
structure

create
one or
more
new
tables

move the data


into the new
database

were
essentially
killed off by
MS Access

have
poor
respons
e time

are not true


DBMS
products

Their report
delivery is
more
difficult
than report
delivery for Noninteg
reporting
rated
None of the
systems.
data
above

57

We have obtained
access to the company's
operational data. We
examine 50 records for
customers with phone
numbers that should use
the current area code of
345. Of these 50
records, we find 10 that
still use an older area
code of 567. This is an
example
We have obtained
access to the company's
operational data. We
have been asked to
produce a report with an
item by item analysis of
sales, but the only sales
figure available is the
total sale value for each
order. This is example
of_____

dirty
data

dirty
data
data
wareho
use
data
are not
stored
in
tables.

A data warehouse
database differs from an
operational database
because:
Which of the following
objects is used to display
a menu?
Form

Which of the following


Forms
objects are NOT found in and
an Access application?
reports

inconsisten
t data

noninteg a "wrong
rated
format"
data
problem

inconsisten
t data

noninteg a "wrong
rated
format"
data
problem

data
data
warehou
warehouse se data
databases are often
do not have denorma
metadata.
lized.
b and c

Table

Report

Query

Queries
and tables

Macros

Spreadsheets

58

It will
be
easier
for the
user to
upgrad
e it if
the
objects
You are developing an
and
Access application that
tables
you expect to upgrade
are in
periodically. Which of the one
following statements is
databa
TRUE?
se.
The
Link
Tables
comma
nd can
be
used to
associa
te the
tables
in one
databa
se with
the
objects
Which of the following
in
statements regarding
another
Access applications is
databa
NOT true?
se.
Which of the following
brings a copy of the table
into the current database
and does not maintain a
tie to the original table?
Import

It is
It will be
advisabl
easier for
e to put
the user to each
upgrade it if object
the objects and
are in one
table into
database
a
and the
separate
tables in
databas
another.
e.

Regardless of
how the
objects and
tables are
stored, the
user will have
to reenter the
data in the
tables when
the application
is upgraded.

All
An
objects
application in an
may
applicati
consist of
on,
multiple
including
databases, the
each with
tables,
multiple
must
objects,
reside
linked to
within
yet another the
database
same
containing databas
only tables. e.

An application
can be created
in such a way
that it objects
such as forms
and reports
can be
changed
without
disturbing the
existing data.
C

Link

Join

Merge

A
59

What makes a database


an application?
What is the Access tool
that is used to create the
user interface?

The purpose of a data


warehouse is to:
___________ means the
result of applying to
specific information
certain specific technical
processes.
__________ is an
algorithm which creates
a digital representation or
"fingerprint" in the form of
a "hash result".
__________ is of
standard length which is
usually much smaller
than the message but
nevertheless
substantially unique to it.
Digital Signature involves
two processes. They are
___________ and
__________.

It
contain
s more
than
one
table

It contains
tables,
reports,
queries,
and forms

It
contains
a user
interface
, or
switchbo It contains
ard
macros

Interface
Menu
Design
Wizard Build Menu Wizard
put key
business
create
informati
backup
on into
s for
centralize
the
mission the
hands or
critical manageabil more
corpora ity of data
decision
te data. collection.
makers.

Digital
Sign

Digital
Certificate

Hash
Functio Digital
n
Signature

Digital
Signatur
e

Switchboard
Manager

store all
corporate
transaction
data in one
single location. C

None of the
above

Digital
Certificat
e
Private Key

Hash
Functio
Hash
n
Hash Value Result

Either B or C

Digital
Signatu Digital
re
Signature
creatio Verification

Either A or B

Both A
and B

60

The Costs of Digital


Signature consists
mainly of the following

Instituti
onal
Overhe
ad and
Subscri
ber
Relying
Party
Cost
Certific
ation
Authori
ty

CA stands for
________________
A Digital Certificate is
issued by a Certification
Authority and is signed
with the CA's Private Key True
A Digital Certificate does
contain Owner's Public
Key, Owner's name,
Expiration date of the
Private Key, Serial
number of the digital
certificate
True
______________ enable
web servers to operate in
a secure mode.
______________ are
used by individuals when
they exchange
messages with other
users or online services.

Server
Certific
ate
Server
Certific
ate

Subscriber
Relying
Party Cost

Institutio
nal
Overhea None of the
d
above

Certified
Authority

Certificat
e
None of the
Authority above

False

False

Developer
Certificate

Personal
Digital
Certificat None of the
e
above

Developer
Certificate

Personal
Digital
certificat None of the
e
above

61

______________ are online databases of


certificates and other
information available for
retrieval and use in
Private
verifying digital
Certific
signatures.
ate
Eviden
ce,
Signing Writings serve
Cerem
the following general
ony,
purposes______,______ Approv
_,_______ and _______ al
The most widely
accepted format for
Digital Certificate is
defined by the CCITT
X.509
True
A certificate may prove to
be unreliable, such as in
situations where the
subscriber misrepresents
his identity to the
certification authority
True
Certific
ate
Revoca
tion
CRL stands for
List
The prospective signer
identified in the digital
Private
certificate holds
Key,
the_________ and is
Subscri
called the ___________ ber
In EDI interface, the
translation service
receives _________ as
Internal
incoming files from the
Format
communication service
File

Repositorie Public
s
Key

Approval,
Evidence

Efficienc
y and
logistics,
Evidenc
e

none of the
above

Evidence,
Ceremony,
Approval,
Efficiency and
Logistics

False

False

Certificate
Resource
List

certificat
e
Revocati None Of The
on Letter Above

Public key,
Recipient

Private
Key,
Recipien None Of The
t
Above

Transmi
External
ssion
Format File File

None of the
above

C
62

The EDI standardisation


for International Trade
and Commerce is
introduced by
__________
In EDI, the transmission
files are composed of
different sets of external
format files which are
grouped into multiple
sets under the name of
________
The ________________
are pre-paid credit cards
that include an
embedded cards
________________ are
another form of credit
payment that lets
customers use digital
online cheques to pay
Web merchants directly

ANSI

UN/EBCDI
C

batch
files

interchange
functional
sets
functions groups

Smart
Card

Embedded
cards

SET

None of the
above

E-cash

Digital
Cash

Smart
Cards

Electronic
cheques

In Active advertisement,
there are two types of
models. They are _____
and ________
The network based
technology is/are
____________
Decryption is a process
employed for scrambling
of plain text for web
based transactions

Billboar
ds and
Junk
Mail

Online
Catalog
and
Billboards

Broadca
st and
Junk
Mail

Online Catalog
and Customer
Endorsements C

EFT

All of the
above

Asymmetric
cryptosystem is based on
__________ and
____________

Login_I
d and
Primary
Passw Key and
ord
Private Key

EDI

E-mail

True

False

UNESC
O

UN/EDIFACT

B
Public
Key and
Passwor Public Key and
d
Private Key
D
63

Value Added Network is


an example of
_________
The advertising
strategies emerging in
the on-line world are
____________
The _________ model
use direct mail, spot
television or cable
television, in active
based advertisement.
The ________ is a form
of mail that is not
targeted to a specific
audience
The __________ model
refers to information that
is placed at a point
where it will be noticed
by customers in the
course of other activities
and does not require
active search
The most beneficial
advantage of ERP
system is
What is the term that
describes spying on
ones business rivals to
gain a competitive
advantage?

What would you NOT be


looking for when spying
on a competitor?

Global
Networ
k
Active
or push
based
adverti
sing

Private
Network
Passive or
pull-based
advertising

Satellite
Area
Network
Glow
sign or
hoarding
strategie
s

None of the
above

All of the
above

Broadc
ast
Junk mail

Billboard Endorsements

E-mail

Directmail

Bulk-mail

Junk mail

Catalo
g

Endorseme
nt
Billboard Broadcast
Low cost
Error
of
checkin Data
operatio Quality
g
Integration n
management

Compe
titive
espion Corporate
age
espionage

Industrial
espionag Economic
e
espionage

Contact
A list of numbers of
compet the
itors
manageme
clients nt group

Researc
h data

A competitors
new project

64

singleuser
databa
An online drugstore such se
as Drugstore.com is an
applica
example of_______
tion
Which of the following is Replyin
an example of
g
unacceptable online
promptl
netiquette?
y
Remov
able
drives
that
can be
locked
up at
night
provide
adequa
te
securit
y when
Which of the following
the
statements is correct
confide
concerning the security
ntiality
of messages in an
of data
electronic data
is the
interchange (EDI)
primary
system?
risk.
The wizard that is used
to import text files
is_________________
The alphabet indicating
the column followed by
the row number is known
an__________

text
import
wizard

multi-user
database
application

ecommer
ce
databas
e
applicati
on

Keeping
messages
short

Including
the
Using all
Subject capital letters

None of above

Encrypti
on
performe
d by a
Message
physicall
authenticati y secure
on in EDI
hardwar
systems
e device
performs
is more
the same
secure
function as than
segregation encryptio
of duties in n
other
performe
information d by
systems.
software.

Security at the
transaction
phase in EDI
systems is not
necessary
because
problems at
that level will
be identified by
the service
provider.
C

convert text
to columns tip
wizard
wizard

function wizard A

cell
referen row
ce
reference

column
referenc
e

none of the
above

A
65

Which of the following


files could not be opened
in excel
_______________
In excel, the dates that
are stored as sequential
numbers known as
________________The command to display
the current date in a cell
is _________________
In excel, absolute
references are
represented by a
________ before the
column and row
addresses
The ________ can be
used to select the
function and assemble
the arguments correctly
Specific parts of
information required by
functions to perform
certain tasks are called
as___________
Which of the following do
not belong to the formula
category in excel
environment__________
The function that in used
to join cell values
together in a single cell
________
The function that is used
to count all the values
that meet specific criteria
_________

text
files

quattropr
o or
xbase
Lotus 1-2-3 files
class files

serial
values

domain
values

range
values

reference
values

=current
date()

none of the
above

# sign

none of the
above

AutoSu
m
AutoFill

function
wizard

none of the
above

variabl
es

arguments

paramet
ers

none of the
above

text

logical

numeric

Boolean

=today(
)
=date()

dollar
sign

' = ' sign

concat
enate

pmt

merge

none of the
above

countif

vlookup

pmt

count

66

The wizard that is used


to create and edit charts
_______________
The function that is used
to calculate the payment
for specific loan terms
____________
The function that is used
to add together all values
that meet specific criteria
is known as
____________
The __________ option
present in the file menu
options is used to specify
major facts of the page to
be printed
The command that is
used to apply a format
automatically
__________
The ____________
makes the information in
a worksheet meaningful
and easy to understand
A particular part of a
work sheet can be
printed by setting the
_________

pivot
table
wizard

chart
wizard

tip wizard

sumif

pmt

countif

none of the
above

averag
e

sum

sumif

countif

print area

print

none of the
above

AutoFill

none of
the
above

page
setup
autofor
mat

borderi
ng

formatting

page
setup

print area

The process of finding or


selecting information is
known as ____________ filtering searching
The option that is used to
cancel the filter process
for a specific column and
display all the records is all
________
option blanks

convert
text to
columns
wizard

shading

none of the
above

print

print preview

sorting

none of the
above

all
blanks

none

A
67

The URL for


encyclopedia Britannica
is_________
_______ maps IP
addresses with the
domain names of the
sites
Internet can be defined
as _______
The most important
service of the ______ is
to manage traffic control
_________is a program
that displays information
about a host connected
to the net
_______ is a program or
a tool that helps in
locating a file anywhere
on the net

www.e
ncy.in

www.eb.co
m

www.enc none of the


ybrit.com above

none of the
above

URL
DNS
internal
networ network of
k
network

FTP
intermed
iate
none of the
network above

applica
tion
transport
layer
layer

physical
layer

session layer

finger
ping
service service

ftp
service

none of the
above

none of the
above

FTP
uniform
researc
h
locator

TELNET

ARCHIE

uniform
resource
locator

unlimited
restore
none of the
locator
above

IN an URL the word


before the color refers to
_______
A ______ always begins
with a slash
Prodigy is run by IBM
and ______
The World Wide Web is
referred to shortly as the
_______

host
comput
er
messa
ge

name of
the
resource

Delphi

Microsoft

none of the
scheme above
comman none of the
d line
above
general
sears
electric

net

web

browser

editor

Gopher and WAIS


enables the user to
______

read the
browse Usenet
r
news

search
for
databas

none of the
above

URL stands for


____________

scheme

C
C
C

68

______ is the program


used to run
CompuServe's regular
services

Compu
Serve
internet
dialer
spy mosaic

none of the
above

Navigating through the


menu of gopher is called
moving around _______

gopheri gopherspac cyberspa none of the


ng
e
ce
above

Alta
vista

The directories that come


with built-in engines are
yahoo,lycos and ______
To use the finger
command,SLIP users
must run a programme
called______
The web maps are called
_______
Directories consists of
_______ levels
The _____ level gives
the broadcast overview
of the net
The huge list of
keywords from important
items is called ______
The two types of search
in veronica are _____
and ______
_______ searches by
keywords
Mosaic displays links in
color whereas _____
does not display links in
color

finger
server
list
no

open text

ftp server
directories
maximum
of five

wincim
or
maccim

excite

none of the
above

web
server
image
list

none of the
above
none of the
above

one

many

B
D

A
C

middle

lower

top

middle and
lower

hotlist
director
y
search,
index
search
infosee
k

directory

index

glossary

menu
index
search,it
search,men em
u search
search

item
search,index
search

excite

lycos

all the above

lynx

all the above

netshar
k
cello

69

______ supports one


button publish

mosaic

Lycos

navigator gold
2.0

internet

IBM

CompuServe

finger
service

ftp

telnet

Hyper
Hyper text text
transmissio transfer
n port
protocol

Hyper text
transfer port

ftp

uucp

none of the
above

telnet

none of the
above

transfer
transfer transmissio communi
control n control
cation
protoco protocol/int protocol/i
l/intern ernet
nternet
none of the
et
protocol
protocol above

three

none of the
above

web
servers

none of the
above

the
the internet the
internet administrati internet
adapter on
access

none of the
above

lynx

SPY MOSAIC is
Micros
distributed by_______
oft
______ is a program that
helps us to log on to
other networks
Usenet
Higher
text
transfer
HTTP is the acronym for protoco
__________
l
______is used to transfer
and copy files over the
internet
iccp
_____ is a program that
helps us to log on to
other networks
yahoo

TCP/IP stands for


________________
Archie servers can be
accessed in_______
different ways in internet
_______is the computer
on the internet that
translates between the
internet domain names
and the internet numeric
address

TIA stands for_____ in


internet

one

ftp

two

domain
ftp
name
servers servers

70

Service indicates the


name of the ________
used to access data,
present on the other end
of the link.
________ is used to link
pages in the world wide
web

browse
r
univers
al
resourc
e
locator

FAQ stands for ______

frequen frequently
t asked asked
query
question

The internet adapter is a


programme that makes
our connection act like a
_____or a ____ account
The step involved in
Communicating between
the web clients and
servers is
______________

WSIRC stands
for______
Two of the important
browsers are_____
and_____
Lynx is a _______
programme that works
with terminals
The huge list of
keywords from important

SLIP,P
PP

connec
tion
wide
search
for
informa
tion
and
researc
h
lynx,mi
nx
world
wide
web
server
glossar
y

protocol

site

organization

uniform
resource
locator

uniform
resource name of the
label
above

franticall
y asked
question

none of the
above

TCP,IP

IP,UDP

none of the
above

response

request

close

windows
sockets
internets
relay chat

world
search
for
informati
on and
research none of the
council
above

mosaic,g none of the


netscape,ie opher
above

world wide
web client

index

none of the
interface above
none of the
hotwords above

B
71

items is called an_____

VERONICA is an
acronym for
_______________

The first freenet is


created at the_____ and
is called______

very
easy
and
rodent
oriente
d net
wide
index
to
comput
erized
archive
s
univers
ity of
berkele
y,berke
ley
freenet

very
organised
network
integration
and
communica
tion
application

verificati
on on
network
integrati
on and
communi none of the
cation
above

university
of
cleveland,cl
eveland
freenet

universit
y of
Californi
a net

none of the
above

dns

none of the
above

telnet
and ftp

none of the
above

wais,win
socks
winsock

none of the
above
none of the
above

books
marks

none of the
above

________ are defined as


ways of communication
protoco
amongst networks
ls
IP address
search
engine
______and_____ are
s,direct ftp and
web searching features
ories
finger
WINWAIS has two
source lists namely____ allsrc,w
and______
insocks wais,allsrc
________ is also called
as WAIS manager
allsrc
waisman
The system of interlinked
documents is known
hot
as_______
links
hyper text

B
B
B

72

The small programmes


that create
animation,multimedia,rea
l-time games and multi
user games are
called______
The information
displayed on the web
page
includes______,_____
and_____
The web pages that
represent online home of
their author are
called______

none of the
above

animatio
graphic programms n,scripts,
s,video ,images,tex executab none of the
s,audio t
les
above

first
page

home page

welcome none of the


page
above

GNN stands for______


_____ is the most
popular internet service

global
networ
k news
yahoo
service

global
networks
navigator
electronic
mail

grand
network
news
search
engines

none of the
above
none of the
above

The online service


offered by navigator gold
2.0 are _______
and_____

Netscape
page
email
starter
and net site,netsca
confere pe page
nce
wizard

yahoo
and
altavista

none of the
above

ftp

archive

Lycos
point
catalog review

all the
above

none of the
above

apple
link

Delphi

fidonet

images applets

_______ is a program or
a tool that helps us find a newsgr
file anywhere on the net oup
telnet
The databases to enable
keyword search using
Lycos are a2z,_______
______ is a large
worldwide bulletin board
service network

bitnet

animatio
n

B
B

73

comput
er
related
abbrevi
ations
and
BABEL consists a
acrony
glossary of _____
m
Dictionaries,encyclopaed encyclo
ias,government and
pedia
other references are
Britanni
found in ______
ca
search
Yahoo,lycos,excite and
engine
webcrawlers are _____
s
Graphi
cal
interpre
ter
GIF is the acronym for
formatti
____________
ng
Joint
Picture
s
JPEG is the acronym for Expert
___________
Group
The Web aids users to
explore the ________
mails
yahoo,i
The three most popular
nfosee
mailer are_____,_____
k,altavi
and______
sta

biographica
l
bookstor none the
information es
above

on-line
reference
works

more
informati
on
galenet

web
directories

databas
e

Graphica
Graphical
l
Graphical
interchange interface Interface
Format
format
format

Jumbled
pictures
expert
graph

Joint
pictures
expert
graph

Joint pictures
experimental
group

documents

net

browsers

eudora,n
netscape,ie etscape none of the
,lynx
and pine above

mails

FONTCOLOR

The World Wide Web


consists of _________

informa
tion
web pages

network
connecti
ons

In Microsoft Internet
Explorer, the color of the
text can be specified
using _________

BACK
GROU
ND

FCOLO
R

channel

COLOR

74

attribute of the font tag.

The interface that


provides effective
communication between
the web browsers and
servers is _________
CGI is the _________
between web browsers
and servers
CGI programs are
invoked based on the
information provided by
the _________
A CGI program is usually
called after a request
made by the _________
A hyperlink can be on
___________
HTML was derived from
_________
SGML is a _________
PINE stands for
_____________
The application that
confirms whether a
document is compliant to
its DTD is _________
Web is a collection of
___________

Comm
unicati
on
gatewa
y
Common
interfac graphical
e
Interface

Commun
ication
Common
graphical Gateway
interface Interface

Networ
k
Interface

Commun
ication
Connection

Current
web
page
Browser

Client

None of the
above

Browse
r/user
Server
text
only
image only

Web
text or
image

Channel
A
neither text nor
image
C

SQL
alphala
nguage
palm is
not
eatable

PLSQL
betalangua
ge

SGML
metalan
guage
pancake
is not
edible

CGI
none of the
above

SGML
Proces
sor
web
sites

palm is not
elm

C
C

none of the
above

SGML
Preprocess SGML
or
Parser

SGML
Composer

images

documents

applets

75

IETF stands for


________

The two major browsers


used to surf the Internet
are ________,_______
Special characters allow
browsers to display
_________________
The keyword for
providing links within or
across documents
is____________
Stringing pages together
using hypertext
technology helps view
pages
_______________
The initial web pages
present in a web site is
the ________ page.
The image format
supported by most
browsers
is________________.

The components of a
URL are ___________

Internet
equipm
ent
training
faculty

Internation
al
Engineerin
g trainers
and faculty

Internet
Engineer
ing Task
Force
MS
Internet
Explorer
MS
and
Internet
Netscap
Explore Netscape
e
r and
Navigator
Navigato
Mosaic and Mosaic r

None of the
above

None of the
above

text

data from a
database
symbols

video

hyperli
nk

hypertext

hotword

hotlink

in userdefined
order

none of the
above

B
C

in
in
random sequential
order
order
first

start

home

none of the
above

.bmp
and .gif
Service
,
hostna
me and
director
y path

.bmp and
.jpeg

.gif and
.jpeg

.wmf and .bmp C

service,hos
tname,port,
directorypath

service,p
ort and
directory service,hostna
path
me and port

B
76

mail
servers
,mail
clients
and
alternat
e
service
s

mailing
lists,mail
server
mail
robots
vendors,ma and
il
gateway
identificatio s to
n and
other
none of the
password
services above

<hr
size=n>

The mail we send has a


mailing address and
most of them correspond
to_____,_____ and
Which of the following is
not supported by internet
explorer
<center <font
_______________
>
size=n>
commu
nicatio
n
generat
ed
common
CGI stands for
informa gateway
____________
tion
interface
Host name indicates the
domain name of the web
________
Server Client
The internet is also
called as
_______________
arpanet the net

The internet is similar to


_________________
The net drivers______
from one place to
another
The net provides
interesting services
like______,______
and______

LAN
data
scriptin
g,parsi
ng and
compili
ng

<l1
type=shape>

classifie
d
general
instructio none of the
ns
above

Browser

User

intranet

none of the
above

peer-topeer
connectivity wan

none of the
above

parcel

packets

none of the
above

news,cooki
ng and fine
arts

email,file
retrived,i
nternet
none of the
tools
above

C
77

The windows internet


software available
are______,_______,___
_____ and______
________ is the
ancestors of the internet

nt,wind
communi
ows95,i mosaic,gop cator,ie,l
e,winzi her,eudora, ynx,wins all of the
p
trumpnet
ock
above
ARPAN none of the
dnet
arpanet
ET
above
defensi
ve
defensiv
admini
e
strative dedicated
advance
rank
and
d
DARPA stands for
admini registered
research
____________________ stration projects
projects
____________________ networ administrati administr none of the
_______
k
on
ation net above
The uuencode files start
none of the
with a _______
start
begin
first
above
milnet,
DARPA is broken into
smaller
intranet, none of the
________ and _______ arpanet mailnet,inet extranet above
NSFNET is the united
states provides service to
_____ and_____
The first international IP
network connections
were established in 1973
with _____ and_____
A_____ is a set of
computers
interconnected by
transmission paths to
exchange information in
internet
A computer that provides
a service usable by other
computers is
called______

B
B

C
B
A

educati
on,rese music and
arch
dance

cooking
and
dining

none of the
above

united
states england,no
and UK rway

united
states &
Russia

none of the
above

network

none of the
above

stand-alone servers

none of the
above

server

client

client

78

A_______ is the
representation of
physical connectivity of
the computers in internet

network
topology

network
redirecto none of the
rs
above

data
terminal
equipment

data
target
equipme none of the
nt
above

physical
layer

network
layer

none of the
above

packet
switching,st
ore and
forward
network

smart
network
and
dumb
network

none of the
above

file
access

anonymous file
ftp
transfer

none of the
above

PAN,N
AN,AA
N

KAN,RAN,
VAN

VAN

MAN

LAN

MAN

analog

digital

networ
k card
detaile
d
transac
tion
DTE stands for
explan
____________________ ation
The basic function of the
______ is transmitting
the bits over a channel

The point to point


channel network is also
called as _____
and_____
Accessing files using
FTP servers is
called_____
The three most
commonly used networks
are______,______
and______
________ is in between
LAN and WAN
_____ can be owed by
multiple organisation
Data is transmitted in the
form of_____ signals

applica
tion
layer
point to
point
networ
k and
broadc
ast
channe
l
networ
k

LAN,WA none of the


N,MAN
above
none of t he
TAN
above
none of the
WAN
above
nonnone of the
digital
above

C
B
C
B

79

DTD stands for


__________
Modem stands for
__________________
______ is the process of
the digital signals being
converted into a form
suitable for analog
transmission
________ and______
are two basic ways of
getting connected to the
internet

SLIP stands for


________________

PPP stands for _____


Which of the following
best describes uploading
information?
A characteristic of a
communication channel
that is the amount of
information that can be
passed through it in a
given amount of time,
expressed in bits per
second.

Data
type
definiti
on

Docume
Define type nt type
Document type
of data
definition data
C

Moraliz Modulation/ Manipula


e/demo demodulati te/dema none of the
ralize
on
nipulate above

Mappin
g
Satellit
e link
and
digital
signals
Standa
rd long
internet
protoco
l
Prime
prolong
ed
protoco
l
storing
data on
a disk
drive

Modulation

Manipula none of the


tion
above

Dedicated
access and Cable
dial up
and
access
wires

none of the
above

Stream line Serial


internet
line
protocol
protocol

none of the
above

Point to
point
protocol

Pillar to
pillar
protocol

none of the
above

sending
information
to a host
computer

storing
data on
the hard
drive

receiving
information
from a host
computer

Size

Channel

Bandwi
dth
Speed

80

The act of searching


through storage to locate
information without
necessarily knowing of
the existence of the
information being sought.
A "recipient" of the
certificate desiring to rely
upon a Digital Signature
created by the subscriber
named in the certificate
is called the
____________
The Relying Party can
use the ___________
listed in the certificate to
verify that the digital
signature was created
with the corresponding
_________
Digital Signatures are
used for a variety of
Electronic Transactions
like
____________________
____
To associate with a key
pair with a prospective
signer, a Certification
Authority issues Digital
Certificate
Digital Signatures, if
properly implemented
and utilized offer
promising solutions to
the problems of
Imposters, Message
Integrity, __________
and _____________

Find

Save

Recipie
nt
Relying
Party
Party

Public
Key

Browse

Retrieve

Either A
or B

Neither A nor
B

Both B and A

Both A
Private Key and B

E-mail

Electronic
Commerce

Not
False

Not True

Closed
System
,Formal
Legal
require
ments

Formal
Legal
Requireme
nts

Electroni
c Fund
Transfer
s
All The Above

Open
System

Formal Legal
Requirements,
Open System

D
81

In, Digital Signature,


_____________ perform
the "ceremonial" function
of alerting the signer to
the fact that the signer is
consummating a
transaction with legal
consequences
A Digital Signature must
have the following
attributes
________________ and
_____________
"Hash Function" is used
in both creating and
verifying Digital
Signature
___________ provides
assurance of the origin or
delivery of data in order
to protect the sender
against false denial by
the recipient that the data
has been received, or to
protect the recipient
against false denial by
the sender that the data
was sent.
________ is a branch of
applied mathematics
concerns itself with
transforming messages
into seemingly
unintelligible forms and
back again.

Affirma
tive Act Efficiency

Signer
authentic None of the
ation
above

Signer Document
Authen Authenticati Both A
tication on
and B
Not
True

Neither A nor
B

Not False

Nonrep
udiatio
n
Digital
Service signature

Digital
certificat
e

Private Key

Crypto
graphy

Private
Key

None of the
above

Public Key

82

The complementary keys


of an asymmetric
cryptosystem for Digital
Signatures are arbitarily
termed as _________,
and ____________
_______ is known only to
the signer and is used to
create the digital
signature.
_______ is ordinarily
more widely known and
is used by a relying party
to verify the digital
signature.

Private
Key
Private
Key

Private
Key

Public Key

Both A
and B

Either A or B

Public Key

Both A
and B

Either A or B

Public Key

Both A
and B

Either A or B

Cryptography

Reviewing the
systemsaccess log.

____________ is the art


of protecting information
by transforming it into an
unreadable format.

Decryp
tion
Cipher

Which of the following


activities would most
likely detect computerrelated fraud?

Using
data
Performing
encrypt validity
ion.
checks.

Encrypti
on
Conducti
ng fraudawarene
ss
training.

A digital signature is
used primarily to
determine that a
message is:

Unalter
ed in
Not
transmi intercepted
ssion.
en route.

Receive
d by the Sent to the
intended correct
recipient. address.

83

Both
sender
and
receive
r must
have
the
private
key
before
this
encrypt
ion
method
will
work.

The private
key cannot
be broken
into
fragments
and
distributed
to the
receiver.

What is a major
disadvantage to using a
private key to encrypt
data?
Which of the following
risks can be minimized
by requiring all
employees accessing the
information system to
Collisio Data entry
use passwords?
n.
errors.
Busine
ss-toThe acronym for B2B is
Busine Business___________
ss
to-Backend
The _____________
model is the least
intrusive model but
requires active search on Billboar On-line
the part of the customer d
Catalog
__________ is / are a
form of advertisement
Custo
where people relate their mer
experience with products Endors
and services
ements Billboard

The
private
key is
used by
the
sender
for
encryptio
n but not
by the
receiver
for
decryptio
n.

The private
key is used by
the receiver for
decryption but
not by the
sender for
encryption.
A

Failure
of server
duplicati
ng
Firewall
function. vulnerability.

Backend
-toBusiness- toBusiness Billboard

Endorse
ments

Broadcast

Catalog

Broadcast

84

The _________ are


software agents who
communicate with the
business merchants on
behalf of the customers
The Pre-purchase
preparation phase
includes
_______________ for a
set of products
The _________ phase
includes customer
service and support to
address customer
complaints , product
returns and products
defects

Interme
diaries portals

.COM

Domains

Order
Placem
ent
Service

Search
and
discover
y

None of the
above

Prepurchas
Purchase
e
consummat preparati Search and
ion
on
discovery

Online
catalog

Endorse
ment
model of
marketin None of the
g
above

Shopping
cart

Billboard Pulling cart

EDI For
EDI For
Administ
Administrati ration,
on,
Commer
Consumer ce and
and
Transpor None of the
Transport
t
above

Post
purcha
se
interact
ion
Billboar
d
The ________ allow
model
companies to bypass the of
need for costly printed
marketi
catalogs
ng
A ________________ is
a basket on the Net that Online
is used to place the items Catalo
that are being purchased g
EDI
For
Admini
stration
,
Comm
erce
and
EDIFACT is an
Transa
abbreviation of ________ ction

85

The __________ allows


for protocol conversion
and communicates with
the bank using the banks
private network or the
Internet
In Ecommerce, data
extraction, transforming
the data into
transmittable form,
transmitting the data and
downloading the data are
the operations employed
in _________
The _________
commerce assists in
integrating the customers
and suppliers of the
company directly into the
organisation
E-cash
means______________
________
E-commerce is a tool
that addresses the desire
of firms to cut services
cost and improving the
quality of goods. It is a
definition of e-commerce
from _________
The small denomination
digital tokens are called
_________
The ____________ is
the process of encoding
information to prevent it
from being read by
unauthorized parties

EDI

Compil
er
Busine
ss-toBusine
ss
Emerg
ency
Cash

TCP/IP

EFT

Gateway

Interpreter

Assembl
er
EDI

BusinesstoConsumer

Consum
er-toCustomer-toBusiness Company

Electronic
Cash

Euro
Cash

Endorsed
Cash

Comm
unicati
on
Business
Service
Perspe Process
Perspect None of the
ctive
Perspective ive
above
Microc
ash

Micro
Transaction TT(Tiny
s
token)

Decryp
tion
SSL

Encrypti
on

E-token

Subscription

C
86

There are _________


types of data tables
The tables that allows
the user to change or
rearrange the data,
summarize the data and
evaluate the data using
changing points of view
is known as
The wizard that is used
to suggest hints for doing
a task
In a chart Y-axis is
known as_________
In a chart X-axis is
known
as_______________
_________ is a set of
tables that describe each
of the data series
________ is used to
differentiate one data
series from another
The chart that contains
only one data series is
_________
The chart that holds the
column chart is
_________
The chart that display
two or more data series
on a surface is
_________
The chart that is used to
display discrete data
_________ are not
allowed in a macro name

data
table

4 B

filtered
table

index
table

pivot table

chart
wizard

convert
text to
columns
wizard

tip wizard

category

legend

data marker

series
or rank

category

legend

data marker

series
or rank

category

legend

data marker

series
or rank

category

legend

data marker

pivot
table
wizard
series
or rank

column
chart
bar chart

pie chart surface chart

column
chart
bar chart

pie chart surface chart

pie chart surface chart

pie chart surface chart


none of the
symbols above

column
chart
bar chart
column
chart
bar chart
wild card
spaces characters

A
87

Which of the following


tool cannot be used to
view the excel web
page_______
The wizard that used to
build an interactive table
from data existing on
sheets
The chart that is used for
displaying stock market
information
In excel, the subtotal
command also generates
grand total after the last
group
subtotal_________
In advanced filter , the
criteria occupying
multiple columns but
more than one row, is
considered as an
________ criteria.
The stacked bar graphs
can be represented in
__________
A pie chart can represent
only one data series at a
time
The ______ generates a
summarized report in
tabular form in an
interactive manner

excel9
7

internet
explorer

Netscap
e

word 2000

chart
wizard

convert
text to
columns
wizard

tip wizard

line
chart

bar chart

stock
chart

pie chart

true

false

and

or

pivot
table
wizard

3Multidimens 4dimensio
ions
dimensions ns

true

false

Data
table

Pivot table

88

Which one of the


following statements
related to stock chart is
NOT TRUE ?
The state government
needs to finalize a five
years plan to implement
100% literacy in the
state. Which one of the
following will be the best
tool that should be used
to work out the plan ?
Forecast'99 is a group
working on exit poll. It
wants to know how many
seat ABC party needs to
won in totality to obtain
majority to form the
government. Which one
of the following will be
the tool that will help the
team ?
Which one of the
following will be the tool
that provides a way to
view and compare the
results of all the different
variations together on the
worksheet ?
A ___________ is an
excel file where the user
stores his data

It is
also
called
as
highlowclose
chart

It shows
trends over
time

It is often
used to
display
share
market
prices
over a
period of
time

Pivot
table

Scenario
manager

Solver

Data table.

Goal
seek

Scenario
manager

Pivot
table

Data table.

Goal
seek

Pivot table

Solver

Data table.

Worksheet

Spreads
heet

none of the
above

Workb
ook

It is also used
for indicating
fluctuations in
temperature
changes

89

Spreadsheets are useful


for _______________
Which one of the
following is NOT the
component of the pivot
table ?
Excel allows upto
______ levels of sorting
Filtering rearranges a list
to display the required
records
The stacked bar graphs
can be represented in
_____________
The ______ generates a
summarised report in
tabular form in an
interactive manner

Which one of the


following statements
related to stacked bar
chart is NOT TRUE ?
Which following function
is used in subtotal option
?______________

Perfor
ming
Performing
calculat database
ions.
operations

Performi
ng text
formattin All of the
g.
above

Colum
n field

Row field.

Source
table
name.

two

three

true

false

Pivot table
item.

B
B

3Multidimens 4dimensio
ions
dimensions ns

Data
table

Pivot table

It
display
s the
data
series
one on
top of
the
other.

It is useful
when
several
component
s are
changing
and the
user is
interested
in the sum
of the
component
s.

It can be
represen
ted in 3dimensio
ns

Count.

Standard
deviation

SumIf

A
90

A workbook consists of
many ________

databa
ses

records

tables

It is a
tool for
summa
rizing
and
analyzi
ng the
data
records
in an
interact
ive
manner
.

It is a tool
that
provides a
way to view
and
compare
the results
of all the
different
variations
together on
the
worksheet

It
summari
zes the
data by
using
analytica
l
functions
.

Scenario
manager

solver

Which two of the


following statements
related to pivot table are
TRUE ?
Which one of the
following is NOT a What- Goal
if analysis tool ?
seek.
The _________ wizard
separates contents in a
cell into different cells

text
import
wizard

A spreadsheet is a grid
of rows and columns and
is called as a ________
Pick out the window that
is not a form of excel
___________

worksh
eet
workbook
applica
tion
document
window window

On an Excel sheet the


active cell is indicated
by
Cell A4 =2 and A5 = 4.
You select both cells and
drag the fill handle down
to A8. The contents of
cells A6, A7, and A8 are
_____.

A dark
wide
border

convert text
to columns tip
wizard
wizard

A dotted
border

8,16,32 2,4,2

tables

worksheets

A
Pivot table

function wizard B

database

modal
window

A
C

No
border

A blinking
border

2,2,2

6,8,10

D
91

the row is
your
too short to
formula show the
has a
number at
If a cell shows ####### , syntax the current
it means that _____.
error
font size
ability
Which is not an
to
advantage of using
generat
computerized
e
speed of
spreadsheets?
tables calculation
The gym teacher has a
new program to calculate
physical fitness in terms
of weight and exercise.
The use inputs different
weights or amounts of
exercise to determine the
related physical fitness.
This "What if" program is word
most likely which of the
proces
followin
sing
graphical
The difference between
the highest and the
lowest values.
Range Address
Produci
Spreadsheets can be
ng
Writing
used for...
graphs letters

To select a column the


easiest method is to

drag from
the top cell
double- in the
click
column to
any cell the last cell
in the
in the
column column

the
column
is too
narrow
to show
all the
digits of
the
number

either b or c

flexibility
of
moving
entries

cost of initial
set-up

databas
e

spreadsheet

Gap

Rows

Drawing
pictures

Document
filing

click the
column
heading

click the
column label

C
92

If you press _____, the


cell accepts your typing
as its contents.
The contents of cell C15
is =AVERAGE(C3:C14).
AVERAGE(C3:C14) is
known as
All of the following are
considered constants
EXCEPT:
Which of the following
may NOT be included in
a formula?
Which of the following is
NOT a valid
mathematical operator in
Excel?

CTRL +
ENTER ENTER

TAB

INSERT

array.

constant. formula.

function.

(201)555100 1212.
Cell
referen
ces
Functions

#VALUE Tom
!
McKenzie.
Numeric
constant
s
Text constants

D4^2

It is impossible
to determine.
C

Given the formula


=B5*B6+C3/D4^2, which
expression would be
evaluated first?
B5*B6 C3/D4
Which part of the formula
+E12/6+(G7*SUM(H9:H1
1) is considered a
constant?
E12
It is
surroun
ded by
How can you tell which
a
cell in a worksheet is the heavy It is
active cell?
border. blinking.

C
D

SUM(H9 G7*SUM(H9:H
6 :H11)
11)
B
It is
displaye
d in
reverse
video.

The phrase
active cell
appears in the
Status bar.

93

How can you change the


active cell?

The
Standa
rd
toolbar
the
New
The command that will
comma
save the current
nd on
workbook with a different the File
file type is:
menu.
The command that will
print an Excel workbook
is found on the
____________ menu.
File
In the Save As and Open
dialog boxes, the
___________ view
shows the file size as
well as the date and time Previe
a file was last modified.
w

Edit

View

Window

Details

List

Properties

Delete

Both
Insert
and
Delete

Clear

By using
By
the arrow
clicking keys to
in a
move to a
differen different
t cell
cell

Which of the following


would you use to change
the font size of a cell in
Excel?

Which of the following


commands will
automatically adjust cell
references in formulas?

the Save
command
on the File
menu.

By either
clicking
in a
different
cell or
using the
arrow
keys to
move to
a
different
cell
The Cell
Format
comman
d on the
Edit
menu
the Save
As
comman
d on the
File
menu.

Insert

The
Formatting
toolbar

By typing the
reference of
the cell you
want to move
to in the
formula bar

The Font Size


command on
the Tools
menu.

the File Type


command on
the File menu.

94

Which of the following


commands will remove
cells, rows, or columns
from a worksheet?

Clear
Delete
Orienta
tion
Which of the following
(portrai
options is NOT controlled t or
through the Page Setup landsc Headers
command?
ape)
and footers
Which command enables
you to change the
margins for a printed
Option
worksheet?
s
Page Setup
All commands are
carried out on a
rectangular groups of
worksh
cells known as a:
eet.
range.
Which of the following is
a valid cell range?
6 D12, G25
In a copy operation, the
cell(s) you are copying
from is called the:
In a copy operation, the
cell(s) you are copying to
is called the:

Remove

Fonts

Margins

View

Edit

group.

cell group.

D12:G25 D

copy
range.

destination
range.

clipboard
.
source range.

paste
range.
The
Duplica
te
comma
nd

destination
range.

clipboard
.
source range.

The
Paste
Both the Copy
comman and Paste
d
commands

mixed

constant

B$4

$B$4

Which of the following


commands is needed to
duplicate the contents of
The Copy
a cell in another?
command
A cell reference that
does not change during a
copy operation is known absolut
as
e
relative
Which of the following is
considered an absolute
cell reference?

Both
Clear
and
Delete

B4

$B4

95

Cell E3 contains the


function
=AVERAGE(A3:D3). If
the contents of cell E3
are copied to cell E4,
what will be the contents
of cell E4?
Cell E3 contains the
function
=AVERAGE($A$3:$D$3)
. If the contents of cell
E3 are copied to cell E4,
what will be the contents
of cell E4?
Which of the following
commands is needed to
transfer the contents of
one cell range to
another?

The F4 key is used to:


Which of the following
quickly copies the
formatting of a selected
cell to other cells?

#DIV/0! #DIV/0!

#DIV/0!

#DIV/0!

#DIV/0! #DIV/0!

#DIV/0!

#DIV/0!

The
Move
comma The Cut
nd
command

The
Paste
comman
d
cycle
through
absolute,
relative,
and
mixed
cell
referenc
es.
the
Formatti
ng
toolbar
Rightclick a
cell and
click the
Edit
Hyperlin
k
comman

Both the Cut


and Paste
commands

cycle through
open
applications.

Conditional
formatting

Double-click a
cell and click
the Insert
Hyperlink
command.

copy
and
paste
cells.

the Fill
Handle
Select
the
Insert
Hyperli
nk
Which of the following
comma
will insert a hyperlink into nd from
an Excel worksheet?
the File

edit cells.
the Format
Painter
Click the
Insert
Hyperlink
button on
the
Standard
toolbar.

96

Conditional formatting
applies formatting to a
cell based on:

menu.

d.

whethe
r the
cell has
a
formula
or a
value
the cell
in it.
address.

whether
the cell
has an
absolute
or a
relative
cell
referenc
e.

the value in
the cell

text with a
four-digit
year.

an
integer.

text with either


a two-digit or
four-digit year,
depending on
the format.

Aug-31

It is impossible
to determine
from the
29/03/20 information
08
given.
B

adding the
earlier date
to the later
one.

subtracti
ng the
later
date
from the
earlier
one.

text
with a
twodigit
year.

If you enter a date into a


cell, Excel stores the
date as:
You created a worksheet
on July 30 and entered
the =Today() function in
cell E17. You opened
that worksheet again on
August 31. What will be
displayed in cell E17 on
August 31?
Jul-30
subtrac
ting the
earlier
date
The number of days
from
between two cells
the
containing dates can be later
calculated by:
one.

adding the
later date to
the earlier one. A
97

The function key that is


used to quickly edit the
contents of a cell is:

What will be stored in a


cell if 3/4 is entered in it?
A users response to the
InputBox function can be
stored in:
The cell reference for a
range of cells that starts
in cell B1 and goes over
to column G and down to
row 10 is _____.
The teacher has a
spreadsheet showing all
Year 10 students and
their marks in one
Mathematics test. To find
the student with the
highest mark, which of
the following functions
should be used?
Which chart type best
shows proportions of a
whole?

Which of the following is


TRUE regarding chart
types?

the F4
key.

the F2 key.

the Esc
key.

March 4
of the
current
0.75 year

03-Apr

the F1 key.

Either 3/4 or
.75, depending
on the cell
formatting
C

a cell
on a
worksh
eet.
a variable.

either a cell on
a
a worksheet or
constant. a variable.
D

B1G10

B1;G10

B1:G10

MAX

SUM

Scatter

B1.G10

AVERA
GE
COUNT
Combi
nation
Once a
bar
chart is
chosen
it
cannot
be
change
d to a

Line

Pie
Once a
pie chart
Once a
has
column
been
chart is
chosen it
chosen it
cannot
cannot be
be
changed to changed
a bar chart. to line

Once a line
chart has been
chosen it can
be changed to
a pie chart.
D
98

column
chart.

To select several cells or


ranges that are not
touching each other, you
would _____ while
selecting.
Your Institute teachers
have set an assignment
on Studies. You are
required to use a
spreadsheet to record all
that you study on each
day for four weeks. You
decide to show each
weeks data with an
accompanying graph.
What is the best way of
doing this
What would be the best
method to quickly copy
the formula from the
active cell to each cell
below it?
To arrange rows in
alphabetical order based
on column A, you need
to use the command
_____.
What can you NOT do
with a spreadsheet?

hold
down
the
CTRL
key

chart.

hold down
the SHIFT
key

hold
down the hold down
ALT key CTRL + SHIFT A

Use
tables

Create four
separate
files

Transfer
informati
on to a
databas Use multiple
e
sheets

Paste

Fill Down

Fill Right Paste Special

Data | Sort
Calculate
data

Edit |
Data |
Sort
Create
forms

Tools |
Sort
Analys
e data

none of the
choices
None of the
above

C
99

To print just part of a


sheet, you would select
what you want to print
and _____ .
The formula that will add
the value of cell D4 to the
value of C2 and then
multiply by the value in
B2 is _____.

click
the
Print
button

(D4+C
2)*B2

Which of the functions is


not valid for performing
addition
The default orientation
for the printed page is
_____.
Which is not a valid cell
address?
The World Wide Web
was devised by
_________

press the
PRINT
SCREEN
key

select
Print
selection
on Page
Setup |
Sheet
and then
print

D4+C2*B2

#VALUE
!
=(B2*(D4+C2)

=A3SUM:B
3SUM:C3S
0 UM

REF!

portrait

landscape

AD213

ZA1

CERN

ECRN

CARN

newsgro
ups and
search
engines
applicati
news
on
groups, bulletin
servers,
yahoo boards,mail proxy
The other ways of getting and
s call and
servers
connected to the net
infosee wireless
and web
are_____
k
system
servers

None of the
above

whatever
was last
used
vertical
None of the
A0
above

yahoo
and
The useful URL schemes infosee mailto and
are_____ and______
k
files

BBS stands for______

select Print
selection in the
Print dialog
and then print D

bulletin business
bulletin
board
broadcastin broadca
system g system
sting

NET

none of the
above

none of the
above

none of the
above

100

system

USENET is a BBS on
____ scale

small

large

WINSOCKS is expanded window windows


as______
s socks sockets
IETF Level 2 HTML DTD
supports graphical
browsers like _______
The space used by
Netscape to store the
retrieved page is
called______
The principles, means
and methods for
rendering information
unintelligible and for
restoring encrypted
information to intelligible
form.
A long string of
seemingly random bits
used with cryptographic
algorithms to create or
verify digital signatures
and encrypt an decrypt
messages and
conversations.
Protected/private
character string used to
authenticate an identity
or to authorize access to
data.
The successful act of
bypassing security
mechanisms of the
system.

Mosaic Yahoo

buffer

cache

very
small

none of the
above

windows none of the


stocks
above

PINE

Lynx

built-in

none of the
above

Photog Digital
raphy
Signature

Cryptogr Message
aphy
Digest

Key

Hash
Function Formula

User-id Password

Name

Penetr
ation

Cryptogr Password
aphy
Cracker

Lock

Retrieval

Address

A
101

A set of rules and


formats, semantic and
syntactic, that permits
entities to exchange
information.
An attempt to get access
to a system by posing to
be an authorised person.
An action or event that
might prejudice security.
According to information
Technology Act, 2000,
To investigate
contraventions the
controller of certifying
authority shall exercise
the like powers to that of

Acts

Spoofin
g
Imposting
Loss

Threat

Sales tax
Income authorit tax
ies
authorities

Malicious software.

Utility

None the person who is


known as father of
Internet
This website is the
biggest bookstore on the
earth.

Tim
Berner
Lee
Etrade.
com
Autom
ated
Tailor
Machin
e

When we talk of Data


Transmission modes,
then ATM stands for
A sequence of bits or
characters that identifies
the destination and the
source of a transmission. Acts
The means of
communicating between
networks
Router

Regulation
s

Address
Unautho
rising
Exposur
e

Protocols

Approving

Hacking

Judge of
a civil
Police officer
court
of IPS rank.

Pirated
software

Virus

Hoffman

Charles
Bubbage Howard Aiken

Amazon
.com

Cracker

Any Time
Money

Dell
.com
Asynchr
onous
Transmi
ssion
mode

Regulation
s

Address

Protocols

Gateway

Port

Pin

Msn .com

None of above

102

A group of computers
and other devices
dispersed over a
relatively limited area
and connected by
communication links that
enable a device to
interact with any other on
the network.
LAN
hyper
termina
l
tracing
The term HTTP stands
progra
for
m
Nation
al
Informa
tics
A NIC is considered as
Center
A hub is a device that
can connect

Which of the following is


true concerning the
function of a switch?
What do routers
connect?
What does a router
route?

WAN

CAN

hypertext
tracing
program

hypertex hypertext
t transfer tracing
protocol protocol

Network
Interface
card

New
Informati None of the
on Card above

Only
printers

None of the
above

Combines
connectivity
of a hub
Conce with the
ntrates traffic
connec regulation
tivity
of a bridge
Bridges
and
Two or
Repeat more
ers.
networks

Switches
data
from
incoming
ports to
outgoing
ports.
All of Above

Bridges
and
Hubs

bits

Packets

Only
Compu Can not
ters
computers

frames

PAN

Hubs and
nodes
None of the
above

C
103

Software which prevents


external access to a
system is termed
If four computers are
connected to a hub and
then to the internet, how
many IP addresses are
required for these 5
devices?

firewall

One
Physic
al
Layer

Which of the following in


an OSI layer
When creating a network
from just two PCs, what
kind of cable would be
used to connect them?
RG7U
Physic
al
addres
An IP address is a
s
To construct a simple
LAN of 4 computers, you
would connect them with
______connect them
A cable

What happens to data


that is ruined before
reaching to receiver

Bluetooth is
Which is not one of the
recognized IEEE sub
layers?

gateway

router

virus checker

Two

Four

None of the
above

Data-Link
Layer

Network
Layer

All of the
above

Coaxial
cable

Fiber

Twisted pair

Logical
address

A
memory
address

None of the
above

None of the
above

None of the
above

None of the
above

All of the
above

Hub

Router
It
continue
on to
target
Data
device
return
It gets
with
to the
destroyed
corrupt
sender bit by bit.
data
Wireles
Ultra
s
violet
technol Wired
technolo
ogy
Technology gy
Physic
al
Data Link
Network
Layer
Layer
Layer

104

The most preferred


number system to
represent a IP address is Binary
A MAC address is of
48 Bits
softwar
e that
facilitat
es
connec
tion to
the
Protocol is
internet
A ............... is a LANbased computer with
software that acts as a
controlling device for
controlling access to at
least part, if not all, of a
local area network and
Novell
its available resources.
PC

What is the biggest


disadvantage of the Ring
topology?
The .............. of the
network concerns how
network devices are
physically (or optically)
interconnected.
The principal topologies
used with LANs are:
What are the various
types of bus

There
isn't
one

ASCII
48 Bytes

Octal
48 KB

None of the
above
48 MB

a list of
rules for
transferring
data over a
network

software
that
allows
file
copying

a gateway
calling
program for
internet
bridging

Server
If the
hub
goes
down, it
brings
If one node down all
goes down, of the
it brings
nodes
down the
on that
entire ring
section

Network PC

Client

A
A

If the hub goes


down, it brings
down all of the
nodes on all of
the rings
B

Physiol
ogy
Topology

Both A
and B

None of the
above

Bus

Star

All of above

Linear

Parallel

Ring
Both A
and B

None

A
105

architecture?
What are the various
types of ring
architecture?
Parallel Circular
In a ................., each
workstation attaches to a
common backplane via
its own physical cable
that terminates at the
hub
Ring
Bus
In a ............... , each
work station is directly
connected to a common
communications channel
Which one of the
following is NOT a
network topology?
In a .............. , the cable
system forms a loop with
workstations attached at
various intervals around
the loop
The Media Access
Control (MAC) is a sub
layer of the:
What are the most
common LAN
technologies used in
networking today?
Modem speeds are
measured in
LAN speeds are
measured in

Linear

Both A and B

Star

Mesh

Ring

Bus

Star

Mesh

Star

Bus

Linear

Ring

Ring

Bus

Star

Mesh

Networ
k Layer
Ethern
et,
token
ring,
DecNE
T

Transport
Layer

Physical
Layer

Data Link
Layer

Ethernet,
token ring,
FDDI

Ethernet, Ethernet,
DecNET, token ring,
FDDI
ARCnet

bps

kbps

mbps

mips

bps

Kbps

Mbps

Mips

106

WAN speeds are


Accessing the Internet
from a typical home PC
requires the use of

To use the Internet, you


The worldwide web
server uses the following
standard interface to act
as the middleware:

An NIC
Accessing the Internet
from a typical home PC
requires the use of
The most widely used
network operating
system on PC LANs is

JPEG and MPEG


usually
higher
than
measured
LAN
in bytes per
speeds second
CDROM
drive
must
use the
World
Wide
Web
key
gatewa
y
interfac
e
a
Novell
Interfac
e
Control
ler
CDROM
drive

depend
on the
transmis
sion
medium

limited by
modem
speeds

a modem

Windows
95
Netscape

must use
electronic
mail

must
have a
LAN
account

All of the
above

application
protocol
interface

connects a
computer to a
network

uniform
resource
locator

used to
control a
printer

common
gateway
interface
interface
sa
modem
to a
compute
r

a modem

Windows
package Netscape

Novell
Netware

Windows None of the


NT
above

the
Internet

Linux
have to
do with
compre
ssion
of
graphic have to do
s and
with Web
video
pages

none of the
previous

107

A multiplexer is a form of

An ISP

Printer modem
provide
s
access
to the
is a CPU
Internet register

used to used to
send
browse the
email
Web

FTP is

Telnet

A firewall is
A proxy server is

A search engine is
To look for information
about interest areas on
the internet, the user
should use a

bridge

none of the
previous

is a CPU
functiona make of
l unit
processor

is a protocol
for the transfer
is part of of files
Netscap between
e
computers

uses
wireless
used to communica is part of
send
tion
Netscap
email
medium
e
used to
protect
a
comput
er
room
from
fires
a screen
and
a form of
saver
floods virus
program
a
a poor
backup an email
file
server server
server

None of the
above

none of the
previous

none

IR system
hardwa for the
re
Internet

browser

none of the
previous

scanne
r
CD-ROM

clip-art
file

search engine

108

provide
s
access
to the
is a CPU
Internet register

is a CPU
functiona make of
l unit
processor

FTP is

used to used to
send
browse the
email
Web

is a protocol
for the transfer
is part of of files
Netscap between
e
computers

Telnet

used to uses
send
telephone
email
lines

is part of is a protocol
Netscap that allows for
e
remote login

Which of the following is


a true statement about
the OSI model layers?

The
layers
cannot
commu
nicate
with
one
another
.

Any
layer can
communi
Any layer
cate only
can
with the
communica layer
te directly
directly
with any
above or
other layer. below it.

Any layer can


communicate
only with the
layer above it.

It is
one
large
networ
k.

It is made
up of many
networks
connected
into
transmissio
n lines
called
backbones.

Individual
computers can
connect to it
using an ISP.
A

An ISP

Which of the following is


NOT true about the
Internet?

It works
the
same
way as a
local
network.

109

The traditional intent and


impact of this common
type of attack is to
prevent or impair the
legitimate use of network
resources.

Passw
ord
crackin System
g
intrusion

Denial of
Service Port sniffing

Virus
Flood a
that
Web server initiates
with
a ping
IP flood requests
flood

Which of the following is


NOT an example of a
DoS attack that is
popular among hackers?
A ____________ attack
is when a hacker sends a
continuous flow of
packets to a system.
hack
One defense option on a
large network is to
configure a
____________ to
disallow any external
traffic.
firewall
a
backup
A proxy server is
server
Which of the following
Apply
would be performed on a securit
network server and not
y
normally on individual
patche
workstations?
s
All
sites
are
safe
What can be said about
and
the safety of the
reliable
Internet?
.

UDP flood

packet

flood

traffic

router

switch
a poor
file
server

hub

none of the
above

Limit logging
on access

ActiveXenabled sites
are safe.

an email
server
Update
virus
definitions

There are
safe and
unsafe
sites.

Backup
data on
a daily
basis
Only
large
namerecogniz
able
sites are
safe.

110

To secure
communication network
against wire-tapping the
most effective control is
One way that a virus
CANNOT spread
throughout a network is:
Which of the following is
NOT a means of
monitoring employee use
of company technology?
____________ would be
used by parents to
monitor their children on
their home system.
The formal rules and
parameters which are
established to permit a
microcomputer to
communicate with the
mainframe computer as
though it was a terminal
of the mainframe are
called
The two most common
tools used to help with
extracting information
are:

Which of the following


would NOT be
considered an example
of cyber terrorism?

through an
FTP port.

Use of
logical
access
methods
by
attaching
itself to a
docume
nt.

Phone

E-mail

Web
traffic

Application
updates

A
Trojan
horse

Adware

A worm

Spyware

Use of
identifi
ers
by
attachi
ng to
an email.

Use of
passwords

Modem
s
Protocols
cookies
and
Trojan
horses.
An
attack
on a
system
for
person
al gain

Use of
encryption
methods

by scanning
the computer
for a
connection.

Multiplex
ors
LAN

Trojan
horses and
key
loggers.

cookies
and key
loggers.

An attack
with the
purpose of
gaining
publicity

Giving
out
Changing the
disinform content of a
ation
Web page

key loggers
and worms.

111

Econo
Which of the following
mic
would be a form of cyber damag
terrorism?
e
Crashi
ng the
stock
Which of the following is market,
a likely target of a cyber
as in
terrorist that would cause the
considerable loss of life? 1930s

An organisation is
upgrading its
telecommunication lines.
Which is the least
important objective while
upgradation
A company posts a price
list of its products on its
website. The advantage
to the customer is that
the company can
Which of the following is
an easy-to-use service to
get information on
someone?
Which of the following
pieces of information
would NOT be found
online?
Which of the following is
the most common
danger on the Internet?

Disruption
in
communica
tion

Disruptio
n in
All of the
supply
above are
lines
correct.

Shutdown
of military
security
systems

Contami
nating
water
systems

Shutdown of
nuclear plant
safety systems D

To
carry
more
networ
k
To improve
capacit network
y
services

To obtain an
accurate
inventory of
network
related
equipment and
parts and
network nodes D

set its
prices
very
high

update its
prices as soon
as they are
changed

Lycos Search

To
improve
system
respons
e time
stop its
limit access competit
to
ors
computer
seeing
owners
their
only
prices

Yahoo
People People
Search Search

USA
People
Search

Name
of your
bank

Date of
birth

Personal Criminal
assets
records

Virus

Fraud

Adware

Spyware

112

The famous Nigerian


Fraud scam offered
victims the opportunity
to:
The fraud type that
sends e-mails that claim
to be from legitimate
sites in order to obtain
sensitive information is
called
_________________.
Using the Internet to
pursue, harass, or
contact another in an
unsolicited fashion is
called:
Setting your privacy
settings in Internet
Explorer to medium is
one way to block:
What is the best means
of protection from cyber
stalking?
Which of the following is
not an appropriate
control over
telecommunications
software
Encryption techniques
can be implemented in
Hardware-Software
Which protocol would be
used to download a free
anti-virus program from
the Internet?

buy
stocks.

make large
amounts of
purchas money by
e offparking funds
invest
shore
in their bank
without risk. property. account.

Shill
bidding Phishing

Siphonin
g
Hoaxing

Internet
stalking cyber
.
stalking.

virtual
stalking.

Web stalking.

cookies.

spam.

viruses.

Never use
your real
identity.

Use antispyware
software.

Physical
Encrypt Security
ion
controls

Use a
proxy
server.
Message
sequenc
e
number
checking

I only

II only

Both I &
II

Neither I or II

irc

ftp

www

telnet

popups.
Use a
fake email
addres
s.

Logical access
controls
B

113

Adds
more
bytes
The major advantage of to
the checksum program is progra
when it
ms
Which of the following is
a Web browser?

Verifies
integrity of
files

HTML

Internet
Explorer

A Web page is another


name for ----------Domain names must
contain a description of
the type of organisation
that the domain
represents. A very
common abbreviation
used include:

Web
query.

HTML
document.

A standard language for


creating and formatting
Web documents is:
The Web page format in
which all elements of a
Web page are saved as
one file is called:

round
trip
HTML.

XML.

.com is
used
for
.co in used
compa for
ny
company

Increase Misleads a
s boot
program
up time
recompilation
both HTML
Microsoft and Internet
Excel
Explorer
round
trip
HTML
docume
nt.
Web browser.

.con is
used for
compani
es

None of the
above

the World
Wide Web
Consortium HTML.

one way
HTML.

HTML.

MHTML

DHTML.

114

Which of the following


requires an Internet
connection?

Mr Rao wants to find a


website that he briefly
browsed over yesterday.
After turning on his
computer how would he
do this?

using
Internet
Explore
r to
view a
Web
page
that is
stored
on the
hard
drive
on your
comput
er
Click
on the
Back
arrow
until
the
desired
site is
found
the
Refres
h
comma
nd

Which of the following is


used to update a Web
query?
You download from the
internet, a screensaver, a
ten-second sound file
and a ten-second music
video clip. You also add
a hyperlink. Which of the
media elements has the
greatest effect on the file Hyperli
size?
nk

updating
the values
that are
obtained
through a
Web query

clicking
a
hyperlink
that
referenc
es a
docume
nt that is
stored in
the
floppy
drive on
your
compute
r

Go to
the
History
Click on
page
Go to or
and look
Search in for the
the browser site

viewing an
Excel
worksheet that
you have
saved as a
Web page.

Go to the
Bookmarks or
Favorites page C

the Insert
Hyperlink
command

the
Update
the External
comman Data
d
command

Screensav
er

Sound

Video

115

When saving a
photograph for use on a
website, which format
should you choose?
While researching the
Direct taxes assignment,
you find a useful website.
What is the most efficient
way to access the site at
a later time?
A system that uses the
Internet for business-tobusiness interaction is
called a(n):
A block of text
automatically added to
the end of an outgoing
email is called
_________ refers to the
use of Internet
technologies for placing
telephone calls.

BMP
Save it
to a
floppy
disk.

JPEG

TIFF

Write it
down on a
piece of
paper.

Add it to
Favourit
es or
Bookma
rks.

Cut and paste


it to a word
processor
document.

privilege
d
network.

network
topology

a signature. a footer.

an encryption.

IPT

IPP

PoIP

Desktop
client,
software,
and
hardware.

Desktop
server,
applicati
on, and
databas
e.

Desktop
server,
software, and
hardware.

CD-ROM

Telepho
ne line

None of the
above

File
File
Transmissi Transfer
on Protocol Protocol

None of the
above

extrane
t.
intranet.
an
attach
ment.

VoIP
Deskto
p
client,
Most client/server
applica
applications operate on a tion,
three-tiered architecture and
consisting of which of the databa
following layers?
se.
Which do you NOT need
to connect to the
Internet?
Modem
File
Transfe
r
What does FTP stand
Progra
for?
m

GIF

116

What is the purpose of


DNS?
Which of the following is
NOT a properly
formatted IP address?

So
comput
ers can
be
referen
ced by
a name

So IP
addresses
can be
shorter

So email
is
delivered None of the
faster
above

45.1.1.1

143.215. None of the


12.19
above

Which of the following is


a properly formatted
email address?

193.1.2
.3
paul
.trigg
@
domain
. org.
uk

paul.trigg@
domain.org paul.do
.uk
main.uk

None of the
above

The Internet is controlled


by whom?

The US Scientists
govern in
ment
Switzerland No-one

None of the
above

None of the
above

None of the
above

None of the
above

What does IRC stand


for?

Internet Internation
Relay
al Relay of
Chat
Characters

It will be
It will
waiting for
If you do not pick up your be
you to
email for a week...?
deleted collect it
Receivi
ng
messa
ges
automa
tically
People
from
discussing
anyone a topic of
What is a disadvantage
in the
interest
of joining a mailing list?
group
globally

Internet
Remote
Convers
ations
A letter
will be
sent to
you in
the post

High
volumes
of email

117

In Powerpoint2000 ,the
built-in professional
design elements are
Selection handles are the
8 small ___________
that appear around the
object, when an object is
selected
The _______ is an
invisible matrix of vertical
and horizontal lines that
covers the entire slide
workspace
_______ are drop-down
menus that appear when
the right mouse button is
clicked on the screen
element
________ and ______
have the ability to add a
lot of visual impact into
the PowerPoint
presentation
_______ is a motion
picture or any animation
file
In visual basic, when a
record pointer reaches to
the last record, _______
property of a recordset
object is automatically
set to ______
In visual basic, the
explorer view of a project
is displayed in
___________

autolayouts
clipart and
& auto presentatio
shapes n templates

slide
view &
outline
view

none of the
above

circles

points

squares

icons

square

image

grid

guide

tool
bars

short cut
menus

auto
shapes

all the above

clip
gallery
& word
art

slide show
& view
show

fonts &
images

none the
above

media clip

.video
file

all the above

wave
file

eof,fals movelast,tr
e
ue

movelast
,false
eof,true

properti
es
form layout
window window

project
explorer

toolbox

118

In visual basic, when a


record pointer reaches to
the first record, _______
property of a recordset
object is automatically
bof,fals movefirst,tr
set to ______
e
ue
In visual basic, _______
is a method to convert a
string into integer.
In visual basic, in a
shape control, a vb
statement gives
Shape1.Shape = 2. What
type of shape should we
get?
In visual basic, a timer
event is only available in
timer control.
In visual basic, vbred or
vbgreen or vbblue are
the property values of a
backcolor of any object
In visual basic, _______
is a property of a textbox
control to set a color of a
text.
In visual basic, _______
property of a textbox
control is set to _______
to underline a text
In visual basic, _______
property of a textbox
control is used to change
the size of text.
In visual basic, the
interval property of a
timer control is given in
________

movefirst
,false
bof,true

value()

int()

number() val()

circle

rectangle

square

true

false

true

false

oval

fontcol
or

color

none of the
forecolor above

underli
ne,true

fontunderlin textunde none of the


e,true
rline,true above

textsize size

foresize

fontsize

onemilliont oneh of a
hundredth
second of a second

onethousan
dth of a
second

one-ten
thousandth of
a second

C
119

In visual basic, _______


property of listbox control
counts the number of
items in the list
In visual basic, the
properties of various
controls can be set using
__________
In visual basic,
vbinformation, vbcritical,
vbexclaimation are the
values of _______ in a
messagebox function.
In visual basic, ________
is a function which
displays a message and
it also allows the user to
enter values in a form
object
In visual basic, using a
data control, ________
is a recordset type which
allows to add a new
record and also to
update existing record in
a recordsourse object
In visual basic, while
closing a form _______
event of a form object is
triggered earlier to
terminate event.
In visual basic, to give a
backcolor or to bring in a
picture to a command
button can only be done
if we set the style
property to ______

itemcoun
t
listcount

form
layout prperties
window window

project
explorer

title

prompt

vbmsgbo none of the


xstyle
above

msgbo
x()

textbox

label

count

recordcoun
t

toolbox

inputbox()

opendy opensnaps
naset
hot

dbopens dbopendynase
napshot t
D

load

unload

initialze

transpar
ent

graphical

activate

standar
d
opaque

120

In visual basic, a method


RGB(255,0,0) will
generate _______ color
In visual basic, a method
RGB(255,255,255) will
generate _______ color
In visual basic, if a user
uses a shortcut key
ctrl+R _________
becomes visible.
In visual basic, if a user
uses a function key F4
_________ becomes
visible.
In visual basic, when a
textbox control receives
the focus ________
event is triggered.
In visual basic, a form is
a ________ object.
Microsoft visual basic is
a Rapid Application
Development tool.
In visual basic, when a
form object appears on
the screen _________
event is triggered.
In visual basic, to display
text on a label object
_________ property is
used
In visual basic, _______
object is used to access
the database and also to
manage the data in the
database.

blue

red

green

black

red

green

blue

white

toolbox

project
explorer
window

toolbox

project
explorer
window

text
containe
r

gotfocus
none of the
above

properti
es
form layout
window window
properti
es
form layout
window window

change lostfocus
child

parent

true

false

load

unload

text

name

openda
tabase dbengine

D
C
A

initialize

activate

caption

none of the
above

openrec
ordset

none of the
above

121

In visual basic, when a


checkbox control is
checked _______
property is automatically
assigned with 1.
In visual basic, _______
keyword is used to
declare a variable

enable
d
dime

What is the extension of


the Visual Basic project
file that stores the design
of a user control.
.ctx
Which event of a text box
would you use for
validating the data
Validat
entered by the user?
e
On
Error
Which of the following
GoTo
statements forces inline
linelab
error handling?
el
The _______ method
resets the contents of
bound controls to their
original values when the Update
user clicks on the cancel Control
button.
s
Cancel
parame
To deactivate the Form
ter to a
UnLoad event, you make nonthe following change in
zero
the function definiton:
value
How many root nodes
can a TreeView control
have?
1

visible

value

style

dim

var

none of the
above

.ctl

.ctr

.ocx

Validation

Check

Audit

On Error
On Error On Error
GoTo Inline Stop
Resume Next

PaintPictur
e

Resize

UnloadMode
parameter to a
zero value

Cancel
parameter
to 0
2

Refresh
UnloadM
ode
paramet
er to a
non-zero
value

None of the
3 above

122

Consist
s of
several
A project group is a
Progra
Project which:
ms
Form
window
Procedures declared in a ,
_____ are local whereas standar
procedures declared in a d or
______ are available to
code
the whole application.
module
Place
code in
How can you keep the
the
user from exiting a form
Termin
by clicking the Close
ate
button?
event
The _______ property
enables Visual Basic to
draw complete images in
memory before
AutoRe
displaying them on the
draw =
Screen.
True

Consists of
several
Application
s

Consists
of
Various
Forms
And
Consists of
Code
several
Modules Projects

Project
window,
view code
window

Class
module,
code
module

None of the
above

Place code
in the
Unload
event

Place
code in
the
Deactiva None of the
te event above

AutoRedra
w = False

Refresh

PaintPicture

Msgbox
error.number &
error.descriptio
n
D

You want to display the


code and the description
of an error. What would
be the correct syntax?

Msgbo
x err.no Msgbox
&
err.number
err.text & err.text

Msgbox
error.nu
mber &
error.text

What is the purpose of


the Image List Control?

To
display
images To help in
to the
creating a
user
ToolBar

To provide a
To allow repository for
the
images used
editing of by other
icons
controls

123

Which method would you


use to get a free or
unused File identifier
while opening any file:
Which property
procedure is used to
retrieve the value of a
property?

FreeFil
e

GetFileNu
m

GetFile

GetBytes

Retriev
e
Get
Comm
on
messa
ges
Which of the following
passed
can be shown to the user to
using the Common
Windo Open
Dialog control in VB?
ws
dialog box
Which of the following
are not properties of
Captio
Command Button:
n
Visible

GetProp
erty

Value

Which events enable you


to determine which key
was pressed by the
user?
In order to access a file
in Non-textual format,
you have to open file in:
Visual Basic displays
information depending
upon the current value of
two properties of the
form, called:
Which of the following
procedure types will
execute when you assign
a value to a property of
an object?

Windows
explorer Input box

MultiLine

Font

Click
and
Click,
KeyPre KeyUp and
ss
KeyDown

KeyUp
and
KeyDow
n

KeyPress,
KeyUp and
KeyDown

Ascii
Binary
Format Format

Input
Mode

Output mode

Current
X and
ScaleLeft
Current and
Y
ScaleTop

ScaleHei
ght and
ScaleTo
p
x and y

Propert Property
y Get
Assign

Property
Let

Property Set

124

In order to overlap the


controls (say a command
button) during design
time, we use the Send
To Back or Bring To
Front option from the
Edit menu. To change it
dynamically (i.e.during
program execution) we
need to change:
Which property of the
ProgressBar determines
how much of the bar is
filled?

Backgr
ound
color
propert Caption
y
property

ZOrder
property

AutoRedraw
property

Min

Max

Value

CurrentVal

The ______ function can


be used to run any .com,
.exe, .bat or .pif file from
a Visual Basic program.

Shell

Substr

The caption and the


name properties of the
command button:

Are
one
Can be
and the different at
same
times

SetAttr
CStr
Are
actually
not
propertie None of the
s
above

You do
You try to initialize a new not
Object variable with the
need to
following line but receive use the
an error. What could be
Set
the possible cause? Set comma
MyVar = New Classname nd here
Which of the following
will perform a direct
The
execution of a Command Open
object?
method
A
warnin
The vb Critical symbol
g query
displays:
icon

You do not
have the
permission
to access
the class

MyVar
has not
been
None of the
declared above

The Exec
method

The
ExecPro
cedure
method

None of the
above

A critical
message
icon

An
exclamat None of the
ion icon above

B
125

vbYesNo is an example
of a(n):

The primary difference


between the MsgBox
statement and the
InputBox function is the:
Which of the following is
TRUE about a protected
form (i.e., a form where
the Protect Form button
on the Forms toolbar is
toggled on and is
assumed to remain in
that position)?
Which event is triggered
when the user moves to
another open form?
The user can use
______ to remove the
undesirable part of the
image

statem
ent.
MsgBo
x
statem
ent
returns
a
value,
while
the
InputB
ox
functio
n does
not.

InputBox
function
can be
created
InputBox
with the
function
macro
returns a
recorder,
value, while while the
the
MsgBox
MsgBox
stateme
statement
nt
does not.
cannot.

MsgBox
statement can
be created
with the macro
recorder, while
the InputBox
function
cannot.
B

Data
cannot
be
entered The form
into the can be
form.
modified.

Data can A new check


be
box can be
entered. added.

QueryUnlo
Unload ad

Deactiva
te
Terminate

clipping cropping
tool
tool

cutting
tool

scribble
drawing tool

color box

color
scheme

color guide

tricolor
scheme

color
palette

primary color
scheme

The power presentation


has a _____ for a set of
color
compatible colors
palette
The set three colors used
for graphs and for
secondary slide items is
called as
ascent

variable.

intrinsic built-in
constant. procedure.

126

There are ______ types


of charts available in
PowerPoint
_______ charts are
useful while showing
variations over a period
of time
_______ are the
individual pages of a
presentation
A PIE Chart is a ____
diagram that depicts the
relationship between a
whole and its parts
Each individual piece
of data in a series is
called a/an
PowerPoint launches an
OLE-compatible
application called

When the user doubleclicks on an organization


chart object in
PowerPoint
The _____ are used for
selecting, editing and
viewing objects in the
chart

Manager box tool in


organizational chart
window is

10

28

column bar

18

pie

images and
images text
slides

36 C

linear

slide sorter
views

doughnu
t
all the above

entity data point


Micros
oft
organiz
ation
chart
clip art

data

stream

auto
shapes

track changes

the
organiz
ation
chart is
expand
ed

the chart is
made
available
for editing

the chart
window
opens
displayin
g a chart none of the
template above

box
tools

general
purpose
tools

circular radar

used to
mange
organiz accessed
ational only by
chart
manager

custom
drawing
tools
used to
create a
manager
box for
an
existing
box

standard
drawing tools

used to store
the other tools
of the
organizational
chart

C
127

The custom drawing


tools are _______ by
default
Click on the box tool
______ to draw three
boxes
There are ____ default
fields available in all
boxes of the
organizational chart
The _____ tool is used in
the same way as we use
a pen to draw a table
A/An _______ consists
of smaller printed version
of the slides
The size of the object
can be changed using
the ______ tool
_______ is the process
through which the slides
in the current
presentation are included
in another presentation
or application
________ can be used to
create charts as well as
worksheets
PowerPoint can import
text files that have been
saved in ______ format
PowerPoint outlines can
have _____ outline levels

turned
on

turned off

not
available
in the
available in the
tool bar tool bar
B

once

twice

thrice

any of the
above

two

four

five

eight

draw tool

standard
tool
all the above

slide
view

none of these

reduce/enla
rge
preview

none of the
above

exporting

copying

moving

auto
shapes

clip art

drawing tools

native
tool

autolay handlayout
outs
s
zoom

importi
ng
Micros
oft
excel

.ppt(Po
werPoi .rtf(rich text
nt)
format)

.doc(doc .html(hypertext
ument)
format)
B

nine

six

only one

When a file is saved with


_____ extension, the
.rtf(rich .wmf(windo
graphics and text are
text
ws
.txt(plain
also saved along with the format) metafile)
text)

twelve

.doc(document
)
B
128

slide

not
display
ed
during
the
slide
The hidden slide is
show
DTS(di
____ effect is used to
gital
introduce a slide during a track
slide show
sound)
A _____ is a special
effect that determines
how the objects appear
on the slide
build
The notes page is
notes
formatted based on the
master
Pick the odd man out of
the following
When a new
presentation is opened
,powerpoint creates
slides that have a width
of _____ and a height of
______ with the
landscape orientation
The default orientation
for notes ,handouts and
outlines is ____
orientation
Build effect is also called
as ______

outline
view

displayed
only during
the slide
show

displaye
d only in
outline
view

none of the
above

3D(3
dimension)

both a
and b

transition

transition
slide
master

slide
show
master
slide

view show

master notes

slide view

view
show

slide sorter
view

7.5
inches,5
inches

none the
above

a or b

none of the
above

15
inches, 10
10
inches,7.5
inches inches

portrait landscape
animati
on
view show

transition b or c

129

Graphics for web pages


are automatically stored
in ____ format
A _______ is used to
jump to any slide in the
presentation

gif
hyperli
nk

The ______ language


has been incorporated
visual
into PowerPoint
c++
In PowerPoint _____ is a
series of commands that
are executed in
sequence
macro
while
creatin
ga
The macro will be
.exe
activated
file
Developers can easily
add ____ to PowerPoint virus
2000 by using the
checke
programming interface
rs
______ determines the
order in which order in
which the slides will be
displayed during the
slide
show
show
_______ is used to
organize and develop the
contents of a
slide
presentation
pane
If we save the
presentation file as a
internet
metafile, it can be
explore
opened using
r

jpeg

png

none of the
above

hypertext

action
button

all the above

visual basic Microsoft


for
visual
application interdev all the above

batch file

template
s
add-ins

when the
slide
during slide show is none of the
transition
run
above

spell
checkers

header
files

all the above

custom
show

both a
and b

none of the
above

notes pane

propertie
s pane
outline pane

paint shop
pro

paint
power point
shop pro 2000

130

Power
Point
creates
a
sample
present
ation to
which
user
With reference to
can
autocontent wizard for
add
creating a new
words
presentation, which of
and
the following statements picture
are not true
s
user
can
insert
objects
like
cliparts,
picture
s
stored
in a
separat
e files
Which of the following
to the
statement is not TRUE
slides
in
outline
view,
drag
the
With reference to
slide
changing the order of
icon to
slides, which of the
a new
following statement is not locatio
true
n

it is the
quickest
way to
create a
presentatio
n

contains
sample
presenta
tions for
a variety
of topics
user can
insert
picture
to the
master
user can
slide
insert only which
pre-drawn, gets
pre-colored reflected
graphic
in all the
images
slides
reflected in using
a clip arts
that
to the
master
slides
slide
in notes
pages
in slide
view,
sorter view, drag the
drag the
slide
slide to a
icon to a
new
new
location
location

provides
suggested
content and
design

user can insert


picture to the
title slide which
gets reflected
in all the slides
using that title
slide
B

I slide view,
drag the slide
icon to a new
location

C
131

Which of the following


definitions are not true

the
slide
that
holds
the
formatt
ed
placeh
olders
for the
titles,
main
text
and
any
backgr
ound
items
that
user
wants
to
appear
on the
slides
is
called
a
master
templat
es

transition
means
applying
special
effects to
the
crossover
between
the slides

design
template
s is the
template
whose
format
and
color
scheme
user
applies
to a
presenta
tion

the slide that


holds the
formatted
placeholders
for the title and
sub-title for the
presentation is
called a title
template
D

132

Which of the following


statements are not true

Which of the following


definitions are not true

with
notes
pages
view
user
can
prepar
e
speake
r notes
and
handou
ts
the
slide
that
holds
the
formatt
ed
placeh
olders
for the
titles,
main
text
and
any
backgr
ound
items
that
user
wants
to
appear
on the
slides

in outline
view, user
can see the
miniatures
of all slides
in a
presentatio
n, complete
with text
and
graphics

user
should
select
the slide
view to
add the
text to
the slide

the slides can


be reordered
in the outline
view

transition
means
applying
special
effects to
the
crossover
between
the slides

design
template
is the
template
whose
format
and
color
scheme
user
applies
to a
presenta
tion

the slide that


holds the
formatted
placeholders
for the title and
subtitle for the
presentation is
called a title
template
D

133

is
called
a
master
templat
e

The options available in


the common task toolbar
does not include

slide
layout
data to
be
graphe
d
resides
in a
datash
eet
window

With reference to chart,


which of the following
statements are not true
The format of the text
entered in a title, subtitle,
or bulleted-list object is
determined by the format the
settings in a special slide master
called -------slide

customize

new
slide

set up show

by default,
doughnut
chart is
displayed
based on
the data in
the
datasheet

data is
plotted in
a chart
window

user can add


data labels
and gridlines
to the chart

the slide
master

the
header
slide

the format
slide

B
134

PowerPoint provides a
_________ that searches
the entire presentation
i.e., all the text objects in
all the slides, outlines,
notes and handouts for
spelling errors
PowerPoint's drawing
toolbar contains _______
drawing tools
Click _______ on the
rectangle drawing tools
enables us to draw
multiple rectangles
An example of the
components of a
multimedia presentation
could include
Which of the following
formatting elements can
be applied to a
PowerPoint diagram
using the AutoFormat
tool?
Which of the following
formatting elements can
be applied to a
PowerPoint diagram
using the Format
AutoShape command?

office
assista
nt

spell
checker

10

once
text,
graphic
s and
email
addres
s.

the
Line
style

Fill
color

grammar none of the


checker above
12

twice

102

B
22 B

text,
hypertext
and Power
Point.

three
CDROM,
digital
camera
and
sound.

four times

the Line
color

the Font
and the
text
alignmen
t

Line style, Line


color, text font,
and text
alignment
D

Line color

Line
thicknes
s

Fill color, Line


color, and Line
thickness
D

text, hypertext,
Power Point,
video and
sound.
D

135

What happens when you


double click a blank
graph placeholder in a
PowerPoint
presentation?

Excel
is
started
so that
you
can
create
a chart.

always
taken
from
the first
row of
data in
the
The legend in a Microsoft datash
Graph chart is:
eet.
Suppose you are
creating a Microsoft
Graph of quarterly sales
by region. Which would
be the best chart type if
you want to emphasize
Sidethe total sales of each
by-side
region?
column

A popup
box
prompts
you for an
existing
Excel chart
to insert.

always
taken from
the first
column of
data in the
datasheet.

Microsoft
Graph is
started
so that
you can
create a
graph.
taken
from the
first
column
or row of
data in
the
datashe
et,
dependi
ng on
whether
the data
series
are in
rows or
columns.

Stacked
column

Pie chart Line chart

The graph
placeholder is
deleted.

entered by the
user.

136

Pull
down
the
Which of the following
Insert
actions will enable you to menu
insert a graph into a
and
PowerPoint
select
presentation?
Chart.

If you are editing a slide


containing a Microsoft
Graph, how do you
display the underlying
datasheet?
How do you deselect a
chart that has been
placed onto a
PowerPoint slide after
you have finished
creating the chart?

Pull down the


Insert menu
and select
Pull
Chart, click the
down the Insert Chart
Insert
button on the
menu
Standard
Click the
and
toolbar, or pull
Insert Chart select
down the
button on
the
Insert menu
the
appropri and select the
Standard
ate
appropriate
toolbar.
Object.
Object.
D

Click the
chart
object, then
It
click the
automa View
tically
Datasheet
display button on
s in
the
Slide
Standard
view.
toolbar.

Pull
down the
Edit
menu,
then
select
Object.

You cannot
display the
underlying
datasheet
once the slide
is finished.

Single
click
the
chart.

Click
outside
the
chart.

Change to
Slide Sorter
view.

Double
click the
chart.

137

What happens when you


click the Datasheet
button on the Microsoft
Graph toolbar?

A
dialog
box is
display
ed
allowin
g you
to enter
the
name
of the
Excel
worksh
eet that
should
be
linked
to the
Power
Point
present
ation.

The
What happens if you
chart is
single click a chart that is selecte
not currently active?
d.
The
What happens if you
chart is
double click a chart that
selecte
is not currently active?
d.

A dialog
box is
displayed
allowing
you to
enter the
name of
the Excel
worksheet
that should
be
embedded
in the
PowerPoint
presentatio
n.

The
datashe
et is
saved as
a
separate
file.

The
chart is
The chart is doubled
deleted.
in size.
The
chart is
The chart is doubled
deleted.
in size.

The datasheet
window is
toggled from
closed to open
(or from open
to closed).

The
application that
created the
chart is
started.
A
Microsoft
Graph will
restart.

138

Using custom animation


effects, you can build:
Which of the following
animation effects can be
added to a slide?

a slide
one
bullet
item at
a time.

Moderate

Subtle,
Moderate, or
Exciting

Neither enter
nor exit;
neither fly in
from top nor
bottom

Which of the following


animations effects can
be added to a slide?

Enter
and
exit

Fly in from
top or
bottom

Exciting
Both
enter
and exit,
and fly in
from top
or
bottom

Which keyboard key is


used to select more than
one picture on a slide?

Enter

Shift

Alt

Ctrl

the way
objects
exit a
slide.

Custom
animation can
be used to
affect the way
objects appear
on a slide, to
what objects
do after they
appear on a
slide, and to
the way
objects exit a
slide.
D

Custom animation can


be used to affect ONLY:

Subtle

bullet
items
bullet items one
one letter
word at
at a time.
a time.

a slide one
bullet item at a
time, build
bullet items a
letter at a time,
and build bullet
items a word
at a time.
D

the
way
objects
appear
on a
slide.

what
objects do
after they
appear on
a slide.

139

Which of the following


best describes the
information that appears
on the advanced
timeline?
Which of the following
objects can contain
custom animation
effects?
What type of program
allows an object within
an image to be edited
without affecting other
objects?
Which of the following
animation effects can be
added to a slide?

Which of the following is


TRUE regarding the
Datasheet?

The
advanc
ed
timelin
e
shows
the
sequen
ce in
which
objects
will
appear
on the
slide.

The
advanced
timeline
shows the
duration of
the effect
applied to
each
object.

The
advance
d
timeline
shows
the
sequenc
e in
which
objects
will
appear
on the
slide and
the
duration
of the
effect
applied
to each
object.

The advanced
timeline shows
neither the
sequence in
which objects
will appear on
the slide, nor
the duration of
the effect
applied to
each object.
C

Clips

Organizatio
n charts
Text

Clips,
organization
charts, and
text

Paint
progra
m

Draw
program

Animation
program

Fly in, From


top, and
Dissolve in

Filtering
program

Dissolve
Fly in
From top
in
Once
Data
data is
cannot
entered Once data be
it
is entered it entered
cannot can be
into
be
changed.
Datashe

There is no
such thing as a
Datasheet.
B
140

change
d.

Graphical software tools


that provide complex
analysis of stored data
are:

Which of the following


statements is TRUE
regarding PowerPoint
diagrams?
Which keyboard key
combination is used to
undo the previous
command(s)?
Microsoft visual basic
project file has _______
file extension.

OLTP.
You
can
change
the
appear
ance of
a
whole
diagra
m, but
not
individu
al
shapes
of a
diagra
m.

OLAP.

OLST.

OLIP.

You can
change
both the
appearanc
e of a
whole
diagram
and the
individual
shapes of a
diagram.

You
cannot
change
the style
of the
connecti
ng lines
in an
Organiza
tion
chart.

You cannot
change the
color of the
boxes in an
Organization
chart.

[Enter+
A]
[Shift+Z]

[Alt+Z]

[Ctrl+Z]

.vbg

.frm

.frx

loaditem

none of the
above

In visual basic, _______


method is used to add an
item in a combobox
add

et.

.vbp

additem

141

In visual basic, _______


method is used to load
picture during runtime in
an image control
In visual basic, to
populate a drive list box
with a directory list box
__________ statement is
used
In visual basic, to display
a message in the run
time _________ function
is used
In visual basic, to
populate a directory list
box with a file list box
________ statement is
used
In visual basic, ________
is a property of a
recordset object which
counts the number of
rows in a recordsourse
object
In visual basic, using a
data control, a record
can only be added from
the last record. Adding a
new record is only
possible using _______
method of a recordset
object.
In visual basic, using a
data control, a record is
saved to a recordsource
object using _______
method of a recordset
object.

none of the
above

Drive1.
Drive= Dir1.Path =
Dir1.Pa Drive1.Driv
th
e

File1.Pat
h=
Dir1.Pat none of the
h
above

messa
gebox() message()

msgbox( none of the


)
above

load

loadpicture

addpictu
re

File1.Pat
Dir1.Pa Dir1.Path = h =
th=File Drive1.Driv Dir1.Pat File1.pattern=
1.Path e
h
Dir1.path

openre opendatab
cordset ase

recordco
unt
count

update

append

addnew

additem

append update

additem

addnew

142

In visual basic, using a


data control, to navigate
to the previous record
________ method of a
recordset object is used.
To deactivate the Form
UnLoad event, you make
the following change in
the function
definiton:Private Sub
Query_Unload(Cancel as
Integer,UnloadMode as
Integer) To prevent the
Form from closing, you
will set the:
_______ is a word
processing that is a
member of the office
2000 family
The feature that enables
user to type anywhere in
a document without
pressing or tab
The______ feature
allows the user to copy
and paste upto 12 items
at the same time in an
application
______ and _____ key
combination will extend
the selection by one
character on the left and
right
_____and_____ are
improved layout in Word
2000

moven
ext

movelast

Cancel
parame
ter to a
nonCancel
zero
parameter
value
to 0
Word
2000

movepre
vious
movefirst

UnloadM
ode
paramet
er to a
UnloadMode
non-zero parameter to a
value
zero value

Office 2000 Office 97 Back Office

click-ndrag &
type
double click drop

none of the
above

office
clipboa
rd
cut

select

none of the
above

shift+e
nd and
shift+h
ome

ctr+end
and
ctr+hom
e

none of the
above

none of the
above

shift+left
and
shift+right

web
web
layout, normal
layout,
printlay layout, web page
out
layout
layout

143

The easiest way to


create a document in
word is
In Office2000
environment the tool that
makes work easier for us
is_____
A short description of a
tool bar button called the
______ is displayed
when the mouse pointer
is allowed to stay for a
second on the button
The _____ helps us to
keep track of the margin
of the page

wizard
office
assista
nt

inbox
assistant

docume
nt
none of the
assistant above

Icon Tip

Document Tip

none of the
above

up and down
arrow

rotation

Screen
Tip
Tool Tip

tab
stop
up
The keys that are used to arrow
navigate between
keys
headers and footers are only
Pick out the element
from the following that
does not form the type of
tabs for the Word 2000
left
_______are blueprints or
patterns for documents
templat
of a certain type
e
The______ is used for
quickly setting paragraph increas
indention using the
e
mouse
indent
special
Word art is text with
effect

templates

click
from
start
program,
MSWord
from the
task
none of the
menu
above

marginal
stop
page up
keys only

ruler
home
and end
keys
only

center

decimal

model

dialogs/a none of the


lerts
above

decrease
indent
control tool
box

both A
and B
design
wizard

none of the
above

pictures

A
144

AutoShapes in word can


be created by accessing
the _____

drawin
g
toolbar

By default, a document
consists of_____ section
The dialog box that is
used to determine the
documents margins is
________ is a box
surrounding a page on all
slides or a line that sets
off a paragraph on one or
more slides
The key that is used to
perform a task to select
all t he text in the
documents is
The key that is used to
indent a paragraph is
The key that is used to
change the font from the
current positioned in a
document is
The key that is used to
change the style of the
document that is from
that normal to heading1
or heading1 to other
document styles.
Set mapping' Check
control that follows a
text-type validation, we
use ----------------application for data
analysis.
Excel can import data
from other databases for
the data analysis.

control box

1
page
setup
from
the file

databas
e

forms

A
11 A

printer
setup from
the file
menu

print
preview
from the
file

none of the
above

border

shading

none of the
style box above

ctrl+a

Del

ctrl+f

ctrl+m

ctrl+a

Del

ctrl+f

ctrl+m

CTRL+
SHIFT
+F
CTRL+O

CTRL+S CTRL+SHIFT+
HIFT+S P
A

ctrl+shi
ft+f
ctrl+o

ctrl+shift
+s

ctrl+shift+p

Both

None of the
above

Excel
TRUE

Access
FALSE

A
145

A System Auditor can


uses CAAT tools to
analyze data
In the case of the ---------control, it is ensured that
the data in combination
with other fields are
reasonable as per
standard set by an
organisation.
--------------- function
searches for a value in
the leftmost column of a
table and then returns a
value in the same row
from a column that we
specify in a table
Most of the tools use in
Data Analysis depends
on

FALSE

Transaction Limit
type
Check

Reasonablene
ss

VLOOKUP

A or B

None of the
above

OLE

ODBC

How do you define


analysis of an
information system?

DDE
Analysi
s
translat
es
progra
m code
of a
high
level
langua
ge to
machin
e code

All of the
above

Analysis is
the loading
of
programs
that
perform
routines to
control
peripheral
devices

This
involves
looking
at a
system
and
finding
out how
informati
on is
being
handled None of above

What areas need to be


considered in the
SOFTWARE design
process?

Inputs,
Only
outputs, file
hardwa design
re and hardware,
softwar and
e
software

Mainten
ance,
reliability
, and
upgrade
ability
None of above

Valid
Signs

TRUE

HLOO
KUP

146

What is the function of


systems software?
Formatting a disk results
in all the data being...?

What is Direct
Implementation?

What is parallel running?

What documents are


produced during the
development of a
system?

To
collect
data
Delete
d from
the
disk
Users
operate
the
manual
system
and
comput
er
system
at the
same
time
The
new
system
is
introdu
ced
alongsi
de the
existing
system
Instruct
ions
and
technic
al
docum
entatio
n

To execute
any
programs

To
maintain
security

Copied
from the
disk

Saved to Transferred
the disk from the disk

Users
operate the
computer
system
from a
given date

Users
operate
the
manual
system

None of above

The new
system is
introduced
and users
start
operating it

Users
continue
operatin
g the old
system
None of above

Log files
and
temporary
files

User
Guide
and
technical
docume
ntation
None of above

None of the
above

147

User
guides
cover
how to
run the
system,
enter
data,
save,
print,
etc.

None of above

Databas
e
systems
and
backup
services

None of the
above

CD-ROM

floppy
disk

Hard disk

To do a
particular
task.

To help
someon
e who is
applying
for
employm None of the
ent
above

Auto bus

Address
bus

Control Bus

BAD

TED

MAD

Auto bus

Address
bus

Control Bus

To enable
any printer
For
to be
technic connected
What are User Guides
al
to the
are used for?
support network
Operati
ng
Network
system systems
s and
and
system communica
Systems software can be service tion
categorised into:
s
services
Magnet
Which storage device
ic tape
cannot be erased?
storage
To
maintai
na
backup
copy of
all the
Application software are informa
programs that are written tion
Which bus carries
information between
processors and
Data
peripherals?
bus
Convert the decimal
number 2989 to
Hexadecimal
FDDI
Which bus controls the
sequencing of read/write
operations?

Data
bus

148

What are utilities?


Numbers are stored and
transmitted inside a
computer in

Periph
erals
that are
connec
ted to a
comput
er.

Operating
system
routines
that
execute in
supervisor
mode.

binary
form

ASCII code decimal


form
form
represen
ted 256
characte
8 bits
rs
8 bits
16 bits

were 7
The original ASCII codes bits
A Nibble corresponds to 4 bits
More
than
1000
mega
A gigabyte represents
bytes

A 32-bit processor has

A parity bit is

32
register
s
used to
indicat
e
upperc
ase
letters

Shells,
compilers and
other useful
system
programs.

alphanumeric
form

represented
127 characters A
32 bits
A

1000
kilobytes

230
bytes

32 I/O
devices

32 Mb of a 32-bit bus or
RAM
32-bit registers D

used to
detect
errors

is the
first bit in is the last bit in
a byte
a byte
B

the contents of these


chips are lost when the
computer is switched off? ROM
RAM
Clock speed is measured bits per
in
second baud

Data
structure
s that
are part
of the
kernel of
an
operatin
g
system.

1024 bytes

DRAM

CROM

bytes

Hertz

149

Cache memory
enhances

CISC machines

Every data from the


primary memory will be
erased if

memor
y
capacit
y
have
fewer
instruct
ions
than
RISC
machin
es

seconda
ry
memory
storage
access time capacity

secondary
storage access
time
B

use more
RAM than
RISC
machines

use variable
size
instructions

Power
is
switche
d off
a
parallel
interfac
e

Computer
is
improperly
shut down

have
medium
clock
speeds
Data is
not
saved
before
compute
r is shut
down

All of the
above

a serial
interface

printer
a modem
interface interface

dot matrix
printer

ink-jet
printer

is nonvolatile

stores
more
informati
on than is used for
RAM
cache memory B

An RS-232 interface is
For print quality you
would expect best results line
from
printer
is
faster
to
access
than
ROM
RAM
increas
ed the
storage
capacit
y of a
comput
er
A UPS
system

provides
backup
power in
the
increases
event of
the process a power
speed
cut

laser printer.

none of the
previous

C
150

smart card
Laptop computers use

Multiprogramming refers
to

Multitasking refers to
What are small high
speed memory units
used for storing
temporary results?
A good way to exchange
information that changes
rapidly is through

Multiprogramming is a
prerequisite for

is a
form of
ATM
card
CRT
display
s
having
several
progra
ms in
RAM at
the
same
time
having
several
softwar
es
running
at the
same
time

ALU

has more
storage
capacity
than an
ATM card

is an
access
card for
a
security
system

contains a
microprocesso
r

LCD
displays

SSGA
displays

none of the
previous

multitaskin
g

writing
program
s in
multiple
languag
es

none of the
previous

the ability
to run 2 or
more
programs
concurrentl
y

writing
program
s in
multiple
languag
es

none of the
previous

Registers

Variable
s

Logic Bus

brochur
es
magazines

multita
sking

an
operating
system

CDROM
e-mail
to run
more
than one
program
at the
same
none of the
time
above

C
151

Timesharing is the same


as
______ is the default
view in Word used for
typing Editing and
Formatting the Text
The short-cut-key that is
used to indent a
paragraph spacing in the
documents is
The short-cut-key that is
used to paste the
selected text
The short-cut-key that is
used for paragraph
spacing(1.5)
The box that separate
text from the document
and allows it to behave
like an independent
object is known as
The object that is used to
provide information like
the title of the book,
name of the chapter,
page number etc.
The object that helps us
analyzing data
statistically is known as
To highlight certain parts
of a page to set it apart
from the rest of the page
we make use of the
following features
To clear all the tabs in a
document the option that
is clicked from the tabs
dialog

multita
sking

multiprogra
mming

none of the
multiuser previous

NORM
AL

ONLINE
LAYOUT

PAGELA ONLINE
YOUT
DOCUMENT

ctrl+m

ctrl+2

ctrl+end

ctrl+home

ctrl+v
or ins

ctrl+x or
ctrl+c or ins ins

ctrl+v or Del

ctrl+5

ctrl+1

none of the
above

Frame

AutoSha
pe
Border

Header
and
Screen
Footer Tips

Page
Layout

none of the
above

Chart

WordArt

Auto
Shapes

File

Border
s

Shading

WordArt

Bullets

clear

remove all

remove

clear all

ctrl+2

Text
Box

152

The dialog box that is


used to incorporate
picture bullets into our
documents or web pages
is
The object that
composes of set of tools
which helps to create
and work on different
shapes like rectangles,
circles, flowcharts etc.
When word is opened a
new document
called_____ is displayed,
where the user starts
typing the content right
way
______ is an online
dictionary maintained by
word to obtain synonyms
for words
The thesaurus is invoked
by pressing_______
When a new table is
created the insertion
point flashes in the
_____
By pressing the _____
key inserts a blank row
after the last row in the
table
The ______ option
enables us to convert
text into a table format
A table consists of
______ that contain text
or graphics

picture
bullets
dialog
box

charts

doc1

circle
bullet
arrow bullet dialog
dialog box box

tab

WordArt

document1

new
docume
nt

second

end

convert convert
text to data to
table
table
row

AutoSha
pes
files

thesaur hyphenatio
us
n
thesaurus
shift+f7 menu

first

none dialog
box

rows &
columns

mail
merge

default
document

shift+f8

none of t he
above
tools+spelling
menu

first row

last cell of the t


able
A

enter
table
auto
format
option
records

A
A

none of the
above

none of the
above

none of the
above

B
153

The _______ option in


word allows the user to
automatically correct
misspell words as and
when they are typed
______ is a facility that
enables recording and
replaying of a sequence
of keystroke
In Word Macros are
written in _____
In Word 2000 the macro
dialog box is activated
with the help of ____ key
combination
________shows how a
document would look like
when published on the
web or on an intranet
______ is a software for
sending and receiving email messages
________is the coding
system used to create
web pages
The network that makes
information easily
accessible across
various networks is
_______

AutoCo
style
rrect
AutoFormat gallery

none of the
above

Mail
Mergin
g

Macro

none of the
above

basic

visual basic vj++

visual FoxPro

alt+f5

none of the
above

hotmail

shift+f8 shift+f7

Data
Source

alt+f8

web
layout
view

online
layout view

email
client

outlook
express

browser
micro
soft
outlook

html

xml

sgml

vb script

arpanet

LAN

internet intranet

154

field
name
must
be
listed in
the
same
order
as the
corresp
onding
Which of the following
informa
statements are false with tion in
reference to the use of a the
header row source for a
data
mail merge
source

With reference TO
TABLE WHICH OF THE
FOLLOWING
STATEMENT ARE false
The alignment available
for tabs does not include

the field
separators
in a header
source and
the data
source can
not be set
as
paragraph

field
names in
the
header
source
must
match
any
merge
fields
you've
inserted
in the
main
docume
nt

the number of
fields names in
the header
source must
be the same
as the number
of data fields in
the data
source
B

by
default
it is not auto format cell
possibl option
height
e to
applies to
and
change the entire
weight
the
table and
option
height not only to applies
of only the
to all the
selecte selected
rows and
d rows rows or
columns
of a
columns of of a
table
a table
table

delete cells
option allows
to delete the
entire row or a
column or shift
cells up or
shifts cells left

left

top

decimal

justified

155

Which of the following


statements related to a
Section Break are True
The user can set a
spelling checker to skip
the marked part of the
next
New option under the file
menu of word creates a
new blank document that
is based on the normal
templates
The user can split the
screen only into two
parts
The features that
enables the user to type
text graphics tables
anywhere in the
document without
pressing enter or tab
The user can modify the
picture from the clip art

A new
section
is
created
in order
to
change
properti
es like
number
of
column
s

If a
header
is
In order to inserted
type a
in the
header
second
from the
section
third page
then the
of the
same
document a header
section
is
break is
applicabl
inserted
e to the
after t he
first
third page
section

true

false

true

false

true

false

drag &
drop

click -ntype

true

false

Double
Click

A section is a
portion of a
document in
which certain
page
formatting
option can be
set

none of the
above

B
A

156

With reference to auto


correct which of the
following statements are
false

With the reference to


password protected
documents which of the
following statements are
false
The alignment available
for tabs does not include

Which of the following


statements are False

automa
tically
correct
s
commo
n
typing,
spelling
errors

prohibits
the user
from
renaming
an auto
correct
entry

password
protected
document
can be
passwo opened
rd can without
not
password
include as read
spaces only
left
a .ppt
file can
not not
be
inserte
d at
specifie
d
positio
n in the
current
docum
ent

justified

with t he caps
lock key
accidentally
turned on
reverses the
automati case of the
cally
letters that
corrects were
the
capitalized
grammat incorrectly and
ically
then turns off
errors
the caps lock

passwor
d are not
case
sensitive

password can
be upto 15
characters
long

hanging

top

an .xls data
can not be
inserted at
specified
position in the
current
document

a
multiple
docume
a document nts files
file can be can be
inserted in inserted
the current in the
document
single
at specified docume
position
nt

157

Drop Cap tool does not


work for the contents in
the table format
The special symbols that
are inserted using "insert
symbol" option of the
word can not be printed
by the printer as they are
not standard keyboard
symbols
The "format columns"
option allows to create
columnar text up 12
columns only.
The document that
makes the user to
organize and maintain a
long document, such as
multipart report or a book
consisting of chapters
The view that enables us
to view how objects will
be positioned on the
page when it is printed
The mode that is
initialized or toggled to if
the user is in a position
to overwrite the text in
the word
Veena is entering a
paragraph in a word
processing program.
When the cursor gets to
the end of a line, what is
the best way to get the
cursor to the next line?
How are data organized
in a spreadsheet?

true

false

true

false

true

false

Master
Docum Child
ent
Document

Hyperlin
k
Docume
nt

none of the
above

Print
Layout
View

Page
Layout

Outline
Layout

none of the
above

Insert
Mode

Type Over
mode

Remove

none of the
above

just keep
typing

rows and
columns

press
the
return
key
layers
and
planes

press the
tab key
lines and
spaces

press
the
escape
key
height
and
width

158

Which key moves the


cursor to the beginning of
the next line of text?
Veena typed the
following sentence: "The
girl was very beautiful."
In which word processing
utility could she find a
synonym for "beautiful"?

tab

gramm
ar
checke
r
send a
public
messa
ge to
friends
Using an electronic
interest
bulletin board, Seema
ed in
can do all of the following one
except which one?
topic
Aryan has created a tenpage story, but only
wants to print the first
two pages. What printer
command should he
select?
Print all
What process should be
used to recall a
document saved
previously?
Enter
Which is used to indent
text within a document?
closing
Desktop publishing is a
more sophisticated form
of which of the following databa
types of software?
se

What is a Word
Processor used for?

To
analys
e
figures

backspa
ce/
enter/return delete

shift

spell
checker

thesauru
s
outliner

send
pictures to
a friend

send
private
message send a
s to a
package to a
friend
friend

From ___
To ____

Page
setup

Print preview

Copy

Retrieve

Save

tabbing

spacing

sorting

graphing

word
processi
ng

spreadsheet

Creating
and editing
documents

Storing
informati None of the
on
above

B
159

What is a picture that is


saved on a diskette and
can be pasted into a
document?

What basic tools would


you find in the Edit menu
of a word processor

What is a header in a
document?

What hardware is
essential for a word?
The user could take a
picture from a magazine
and insert it into the
document by using a
Assume you are creating
a two-column newsletter.
Which type size is the
most reasonable for the
text in the columns?
Given the default left and
right margins, and -inch
spacing between
columns, the width of
each column in a twocolumn document will be:

subscri
pt
annotation

clip art

clipboard

Font,
Paragraph,
Bullet and
Numbering

Designated
area on the
document

Numbers
which
appear on
every page

Cut,
copy,
paste
and
clear
Text
which
appear
at the
top of
every
page

Keyboard,
Mouse,
monitor
and printer

Monitor,
keyboar
d and
mouse

None of the
above

Browse
r
clip-art file

microph
one

digital scanner

6 point

15 point

25 point

Clear,
replace
and
select
Text at
the
bottom
of
every
page
Mouse,
printer
and
proces
sing
system
keyboa
rd?

Spelling,
grammar
and
autocorrect

10 point

2
inches. 2 inches.

impossible to
3 inches. determine.

B
160

Word cannot
Assume you have made
You
display
all appropriate selections
have not columns
in the Columns dialog
You
You have
specified during editing;
box in Word, but cannot
are not not inserted continuo you will see
see any columns on the in Print a column
us
them only
screen. What is the most Layout section
section
when you print
likely cause?
view.
break..
breaks.
the document. A
to move
a section
of text
from the to leave an
to store
original
original section
While word processing,
a file
location of text in place
in which of the following
on the to store a
to
while pasting a
situations would Tom use hard
file on a
another copy
the "Copy" command?
drive
diskette
location elsewhere
D
Data
about a
set of
A set of
What does a document
similar
different None of the
contain?
things Mainly text graphics above
B
Before submitting your
work you want to find any
words spelt incorrectly.
Gramma
Which of the following
Thesau Spell
r
Find and
would you use?
rus
Checker
Checker Replace
B
What command in a
word-processing
program can be used to
change the word him to
her, and also the word
he to she in the given
phrase? On a cold and
still night, the only sound
that could be heard was
the owl that had ade its
home in the nest outs
Paste
Replace
Select all AutoCorrect
B

161

What edit commands


would you use to insert a
paragraph from one
document into another
document, while still
Copy,
keeping the paragraph in then
the first document?
paste
To give
the
original
author
a
chance
to
accept
sugges
ted
change
s from
Which of the following
the
statements would NOT
person
be a reason for showing who
suggested revisions in a entered
Word document without
the
changing the original
revisio
document?
ns

Which statement is NOT


true regarding revisions
made in a Word
document?

Cut, then
paste

Delete,
then
paste

To
complica
te the
To give the revision
original
process
author a
and to
chance to
force the
reject
author to
suggested spend
changes
more
from the
time
person who making
entered the correctio
revisions
ns
A
vertical
line
outside
the left
A line
margin
appear
signifies
s
A red
a
through underline
change
text
appears
has
that is beneath
been
to be
text that is made at
deleted to be
that
.
added.
point in

Insert, then
paste

To allow
multiple people
to work on one
document in
collaboration
with one
another
C

Comments are
enclosed in a
text box at the
right of the
document.
D
162

the
docume
nt.

How are suggested


changes entered for
review on an initial Word
document?

Throug
h the
Edit
menu
by
choosi
ng
Track
Chang
es
comma
nd

Through
the Tools
menu by
choosing
Track
Changes
command

Through
tools on
the
Reviewin
g toolbar

Both through
the Tools
menu and the
Reviewing
toolbar

163

Which of the following is


TRUE about saving a
document using the
Versions command?

The
Version
s
comma
nd will
allow
you to
save
multipl
e
version
s of a
docum
ent,
includin
g any
change
s that
may
have
been
made
to that
docum
ent.

What happens when you


open a document that
has been saved using
the Versions command?

The first
and
All
second
version The latest
versions
s are
version is
are
opened opened
opened
automa automatical automati
tically. ly.
cally.

The
Versions
comman
d will
allow
The
you to
Versions
save
command
only one
will allow
version
you to save of a
only one
docume
version of a nt
document, without
including
any
any
changes
changes
that
that may
were just
have been made to
made to
the
that
docume
document. nt.

The Versions
command will
allow you to
save only two
versions of a
document: one
version of the
original and
one version of
any changes
made to the
document.
A

The previous
version is
opened
automatically.

164

You have used the word


discover four times in an
English essay you have
created using a word
processing program. You
would like to find another
word of similar meaning
to use instead of
discover. Which of the
following would you use Diction
to do this?
ary
Word
display
s a list
of the
dates
When opening and
and
working with multiple
times
versions of a document, each
how can you tell which is file was
the most recent version? saved.
Various fields are added
to a regular document to
create a special
document called a form
through the
____________ toolbar.
Fields
Which of the following
types of fields CANNOT
be inserted into a form?

Check
boxes

Grammar
check

Spell
check

Thesaurus

The most
recent
version will
appear at
the bottom
of the list.

Word will
show the
name of
the
person
who
saved
each
version.

Word is not
able to tell the
most recent
version of a
document.

Tools

Forms

Insert

Toggle
button

Text
fields

A drop-down
list

165

Which of the following is


TRUE related to editing
comments in a Word
document?

What is a header in a
document?
In your English essay
you notice that the
paragraph at the bottom
of page 1 continues on to
page 2. You would like to
make this paragraph
start on page 2.What
would be the best way to
do this?
Tables in a document
help you to easily
arrange all of the
following EXCEPT:
To identify a document, it
is helpful to include the
file name on each page
as a
Which of the following
tools will copy the
formatting of selected
text to other places?

Comm
ents
cannot
be
edited.

Comments
cannot be
deleted.

Text at
the
bottom
of
every
page

Numbers
which
appear on
every page

Commen
ts can be
edited or
deleted
by right
clicking
the
highlight
ed text.
Text
which
appear
at the
top of
every
page

Press
tab.

text.

Comments can
be edited or
deleted by left
clicking the
highlighted
text.
C

None of the
above

Press
Return.

Copy
and
paste.

Insert page
break.

graphics.

forms.

numbers.

header/ bibliograph
footer. y.

find/sear
ch.
macro.

Copy
button

Format
Painter
button

Paste
button

This action is
not possible.

166

What is the name of the


process of determining
the cause of errors in a
macro?

Fault
Bug
Finding Squashing

Drop caps are added to a


Word document using
the ___________ menu. Insert

A reverse in a newsletter
is:

A pull quote is best


emphasized by:

Tools

Error
Injecting

Debugging

Format

Edit

an enlarged
capital letter at
the beginning
of a
paragraph.

changing the
color.

the
a section of guideline
text where s used to
a
the first
establish
section letter of
where
of
each
different
white
sentence is elements
text on lowercase
of the
a black and the
newslett
backgr rest are
er will
ound.
uppercase. go.
setting
it in
underlini
larger
ng the
type or typing it all text of
font
in capital
the pull
size.
letters.
quote.

167

The
reverse
techniq
ue
means
to add
dark
text on
a light
Which of the following
backgr
definitions is CORRECT? ound.
Pertaining to newsletters,
which of the following
The
cannot be changed using width
the Columns command
of each
dialog box?
column
As related to type size,
how many points are
there to the inch?
6
Assume you are working
on a newsletter in which
the masthead extends
across the top of the
entire first page. The rest
of the newsletter has two
columns. What is the
minimum number of
sections in the
newsletter?
One
Press
Ctrl+En
Which of the following is ter to
NOT correct with respect create
to page, column, and
a page
section breaks?
break.

A pull
quote is a
quotation
taken from
(pulled)
from
another
document.

A
dropped
cap is a
word
that
starts
with a
lowercas
e letter
when it
should
have a
capital
letter.

A grid is a set
of horizontal
and vertical
lines that
determine the
placement of
elements in a
newsletter or
other
document.

The height
of each
column

The
number
of
columns

The tab
spacing within
each column

10

12

72 D

Two

Three

Four

Press
Ctrl+Shift+
Enter to
create a
column
break.

Press
Enter to
create a
section
break.

Press
Shift+Enter to
force a line
break.

C
168

Which of the following


would be the most
appropriate font for a
newsletter headline?

A serif
font at
10
points

Which of the following is


the default Word column 2
width?
inches
Sequence Check is a -------------- level control
check.
Field
Analyse data over two or
more periods is called ---------------------- analysis
We use Hash Total to
identify ------------ within
a series where there is a
definite relation between
items
Analyse fields by
arranging them into rows
and columns is called
--------------------- function
searches for a value in
the leftmost column of a
table and then returns a
value in the same row
from a column that we
specify in the table.
To import data from
Access to Excel ,it is not
possible to link between
Access and Excel sheet

Horizo
ntal

A sans serif A serif


A sans serif
font at 10
font at
font at 45
points
20 points points

3 inches
Record

Vertical

Duplica
te
Combined
Value
Value
Cross
Tabulat
e
Filter

4 inches

It depends on
the left and
right margins,
and how many
columns are
specified.

Both

None of the
above

A or B

None of the
Above

Gaps

All of the
above

Merge

None of the
above

None of the
above

RAND( VLOOKUP( HLOOK


)
)
UP()

TRUE

FALSE

169

The GAP detection


options can be used to
test for completeness of
data.
Exception testing can be
used to identify ---------------- items
Data validity test
represents
Year end ledger,
inventory files or
transaction files can be
tested for cut-off , to
ensure that the data has
been provided is for the
correct audit period
In Range Check , the
data may not be in
proper sequence but
should be within a
predetermined range
In ---------------- Check
data entry follow a
particular sequence and
also a predetermined
range.

TRUE

FALSE

Unusu
al
Strange
A or B
excepti
on
comparison duplicate
testing of data
s testing

None of the
above

All of the
above

True

False

True

False

Sequence

Range

Both B & C

Virtual memory is

Limit
related
to
virtual
reality

a form of
ROM

a form of none of the


VRAM
previous

Multiprocessing is

same
as
multita
sking

same as
multiprogra
mming

involves using
more than one
processor at
multiuser the same time

set up a
password

make a
backup
copy

To help keep sensitive


computer-based
information confidential,

save
the file

use a virus
protection
program

170

the user should

What is the function of a


disk drive?
A 4GL is
A nanosecond is
What small, hand-held
device is used to move
the cursor to a specific
location on the screen?

to read
to
from or
calculat write
e
information
number to a floppy
s
disk
Uses
Cobol
106
sec

The memory data


register is used to store

a
keypad
data to
be
transfer
red to
memor
y
data to
be
transfer
red to
or from
memor
y

The instruction register


stores

an
instruct
ion that
has
been
decode
d

The memory address


register is used to store

to display
to print
information or
sheets of pictures on a
paper
screen

uses Java

uses
C++

103 sec

1012 sec 109 sec

none of the
previous.

a mouse

a frog

a message
pad

data that
has been
transferred
from
memory

the
address
of a
memory
location

an instruction
that has been
transferred
from memory.

the
address
data to be
of a
transferred memory
to the stack location

an instruction
that has been
transferred
from memory

an
instruction
that has
been
fetched
from
memory

the address of
the next
instruction to
be executed

an
instructio
n that
has
been
executed

171

Which of the following is


used to indicate the
location on the computer
monitor?
A mathematical
procedure that can be
explicitly coded in a set
of computer language
instructions that
manipulate data.
Which of the following
translates a program
written in high-level
language into machine
language for execution?
Detecting errors in real
memory is a function of

a
cursor

a scroll bar

a light
pen

Formul
a

Algorithm

Program Data

Compiler

Artificial
Intelligen
ce
Parity Checker B

Parity
Checking

Range
checking Validation

use the
backup
facility

use find and


replace

System

Modem

Assem
bler
Memor
y
protecti
on
use the
director
y
search
tools

To find where a file has


search
been saved on disk, the
each file in
user should
turn
A series of instructions
telling the computer how
to process data or files is Networ
defined as a
k
Program
save
copies
of the
file with
the
use
To ensure that data is
same
different
not lost if a computer
name
filenames
system fails, the user
on the on the
should
system system

a magic
marker

keep a
record of backup to a
compute secure
r failures medium

172

Having a single CPU


alternatively process
tasks entered from
multiple terminals is
called
The place in the CPU
where the data and
programs are temporarily
stored during processing
is called the
All are examples of
computer software
except
Computer manufactures
are now installing
software programs
permanently inside the
computer. It is known as
Which of the following file
organisation forms most
efficiently allows access
to a record

Multipr
ocessin Time
g
sharing

Firmwa Word
re
Processor

Floppy
Disk
Telepho
ne
modem

Firmwa Word
re
Processor

Telepho
ne
modem

Shareware

Seque
ntial

Indexed

Random

CPU

Primary
Storage

ROM

RAM

Hashed

The part of the computer Operati


system controlling data
ng
manipulation is called the System ALU
For direct access storage Tracks
devices the recording
and
area is divided into
Sectors
Charac
ter,
The data hierarchy from field,
the largest to the
databa
smallest is
se
Which of the following
hardware or software
system controls provides Valid
a detailed record of all
charact
activities performed by a er
computer system
check

Multipro
grammin
g
Multiplexing

Magnetic Disk

Shareware

Blocks and
Sectors

Files and Schema and


Tracks
subschema

Database,
character,
record

File,
record,
field

Element, field,
file

Maintenanc
e
diagnostic
Systems
program
logs
Parity check

C
173

Which one of the


following parts of a
computer is necessary to
enable it to play music?
An educational CD-ROM
on Indian Poets contains
1000 pages of text, 500
colour pictures, 15
minutes of sound and 1
minute of video. Which of
the four different media
listed takes up most
space on the CD-ROM?
Which one of the
following printers is
suitable for printing
sprocket fed carbon
copies?

Multimedia software can


be most productively
used for

Sound
card.

CD-ROM

MIDI
interface Serial interface A

Text

Pictures

Sound

Video

Laser

Dot matrix

Ink-jet

Drum

recording
current stock
in a
supermarket
and answering
customer
queries.

updated once
a year

presenti
viewing
ng an
an
order for
encyclo creating the stock to
paedia plans for a a
CDbuilding
warehou
ROM.
design.
se.
replace
d
regularl never
updated
y
updated
regularly

To be effective a virus
checker should be
Which one of the
following software
applications would be the
MOST appropriate for
performing numerical
and statistical
Databa Document
calculations?
se
processor

Graphics
package Spreadsheet

174

Passwords enable users


to
How many bytes do 4
Kilobytes represent?
Back up of the data files
will help to prevent
Which one of the
following is the MOST
common internet
protocol?

The advantage of a PC
network is that

The term A:\ refers to

UPS stands for

get into
the
make
system efficient
quickly use of time
512

1024

4096

loss of
confide duplication
ntiality of data

virus
infection

TCP/IP HTML
access
to the
internet
is
files can be
quicker shared

IPX/SPX
printer
can do
1000s of
pages a
day

a file
name

a
subdirector
y

univers up-line
al port provider
serial
service
the
orphan program
files
executable
can be may not
left on allow it to
the
be
system uninstalled

The main problem


associated with
uninstalling software is
that
You are conducting
research for a Income
Tax assignment. The raw
facts you collect are
data.

retain
confident
iality of
simplify file
files
structures

8192 C

loss of data

NetBEUI

the operating
system is easy
to use
B

the root
directory the hard drive
uninterru
ptable
power
supply
the
system
requires
a
network
administr
ator to
uninstall
it

uniform page
source

the system
always
requires a reboot and
defrag
afterwards

informati
documents. on.
text.

A
175

called

Graphi
cal
represe
ntation
A flow chart is the
of logic
Purcha
se,
sales,
receipt,
A voucher entry in Tally
payme
is done for
nts etc.
assist
in
Passwords are applied to mainte
files in order to
nance
senior
executi
Each of the following is
ve
an enabler of IT-business support
alignment except:
for IT.
The basic systems model
is used to describe
virtually all information
systems and it consists
of the following elements: input.
The
use of
comput
ers to
design
stateof-theart,
highWhat is a computerquality
aided design system?
product

Logical
Rules writte Steps in
in
any
procedural languag
language
e

None of the
above

None of the
bove

allow
encryption

speed up
access

It is
mandato
ry in tally
prevent
unauthor
ised
access

IT
manageme
nt lacks
leadership.

IT
understa
nds the
None of the
business above

output.

processi
ng.

To fill the
log register

All of the
above

Software
that
generate
s
innovate
Using
d
computers designs
to do
and
architecture artistic
None of the
.
patterns. above

A
176

s.

speciali
A(n) __________ offers
st or
Application
a solution package for an functio Service
entire industry.
nal
Provider

File extensions are used


in order to
Information systems
controls include all of the
following EXCEPT:

name
the file
prevent
ive
control
s.
externa
l
hashin
g

Hashing for disk files is


called
Components of expert
systems include: a)
inference engine; b) user
interface; c) knowledge
A: (a) ,
base; d) fuzzy logic
(b), (d)
correcti
Black box testing and
ve
white box testing are part control
of:
s
What is the term used to
describe the point of
interaction between a
computer and any other
entity, such as a printer
Compo
or human operator?
nent

enterpris
e
local

identify
the file

identify the file


type

detective
controls.

correctiv
e
controls.

All of the
above are
parts of IS
controls.

static
hashing

dynamic
hashing

extensible
hashing

D: (b), (c), (d)

ensure the
filename is
not lost

C: (a),
B: (a) to (d) (b), (c)
preventive
controls

detective general
controls controls

Interface

Settings

Control

177

The advantages of CASE


tools are: a) reusability;
b) maintainability; c)
(a), (c),
portability; d) flexibility
(d)
(b), (c), (d)

Press
Which of the following is the
an acceptable way to
reset
shut down the computer? button.
Yesterday, in your music
class you saved your
compositions as MP3
files. Today, you cannot
remember where you
Create
saved them. Which is the the
best way to locate the
files
files?
again.
Components of an
information system
model are: a)
applications architecture;
b) functional architecture;
c) technology
architecture; d)
(a), (c),
information architecture
(d)
detecti
ve
control
Benchmarks form part of: s
Continuity controls
include: a) record counts;
b) date checks; c) label
checks; d) run-to-run
(a), (c),
totals
(d)
Which is not part of help
desk documentation:

Turn the
computer
off at the
power
point.

(a) to (d) (a), (b), (c)

Select
the Shut
Down
option
from a
menu.

Use the
Ask the
Find or
person next Search
to you.
feature.

(a), (b), (c)

Pull the power


cord from the
back of the
computer.

Put your hand


up and ask the
teacher
C

(a) to (d) (b), (c), (d)

preventiv
organisatio e
corrective
nal controls controls controls

(a), (b), (c)

(a) to (d) (b), (c), (d)

program
change
resolution
requests procedures

proble
m
logging call lights

178

Testing of individual
modules is known as:
Design phase of CASE
tools includes: a) data
architecture; b) decision
architecture; c) interface
architecture; d)
presentation architecture
Which is part of
installation testing:
The computer operating
system performs
scheduling, resource
allocation, and data
retrieval functions based
on a set of instructions
provided by the:
Which of the following
falls under multimedia
data: a) text; b) images;
c) video; d) audio

Which of the following


procedures should be
included in the disaster
recovery plan for an
Information Technology
department?
Designing relationships
among components is
part of:
Several Computers
connected together is
called:
Which network topology
uses a Hub?

unit
testing

thread
data testing testing

loop testing

(b), (c),
(d)
(a), (b), (d)

(a), (b),
(c)

(a) to (d)

bench
mark
testing

specificatio
ns
matching

parallel
operatio
ns

system
walkthroughs

Multipl
exer.

Peripheral Concentr Job control


processors. ator.
language.

(a) to
(d)
Replac
ement
person
al
comput
ers for
user
depart
ments.
archite
ctural
design

(a), (b),
(c)

(b), (c), (d)

(a), (c), (d)

Physical
security
Identificatio of
n of critical warehou Cross-training
application se
of operating
s.
facilities. personnel.

interface
design

Clientserver

Client

procedur
al design data design
Compute
r
network Hub

Star

Bus

Mesh

Ring

C
A
179

Which of the following


topologies is used for
Ethernet?

Application software are


programs
Which type of file search
method requires a
computer first read all
locations preceding the
desired one

Star
To
maintai
na
backup
copy of
are
written
all the
informa
tion

Direct
System
s
Which of the following
analysi
areas of responsibility
s and
are normally assigned to applica
a systems programmer in tions
a computer system
progra
environment?
mming.
A
Which of the following is sequen
recommended when
tial file
many searches for data
on a
are required
disk
Tapes
can
It is unlikely that a
only be
magnetic tape containing read by
several thousand
the
blocked records can be
machin
used on two machines of e on
different architecture
which
directly because
they

All of the
above

To help
To do a
someon
particular
e who is
job such as applying
editing,
for
storing
employm
information ent

To Store data
in an
organised
manner

Sequential

Binary

Indexed

Data
communica
tions
hardware
and
software.

Operatin
g
systems
and
compiler Computer
s.
operations.

A
sequential
file on a
tape

A direct
access
file on a
disk

A direct
access file on
a tape

Parity
errors will
result

Informati
on
formats
commonl
y vary
between
architect
ures

Data record
can never be
blocked
together

Bus

Ring

180

are
written

Which component of the


CPU has the most
influence on its cost
versus performance
Which of the following
terms applies to network
used to connect
computers with other
computers, peripherals
and workstations that are
in fairly close proximity

Data
path
part

Input output
channel

Wide
area
network

Protocol

Use the
computer
to which
they are
connected
to perform
all
processing
operations

Generall
y require
a
keyboar
d for
data
entry
and a
CRT for
display

Are required
with a
microprocesso
r which permits
some data
processing
such as input
validation
D

Modem

Multiplex Time sharing


or
computer

Distribu
ted
system Local Area
s
network

Can
send
data to
a
comput
er and
receive
data
Intelligent terminals differ from a
from dumb terminals in
comput
that they
er
A computer is to be
linked to 8 terminals
using a single
communication link. To
permit simultaneous
terminal operations,
communication path will
require which of the
following
Mixer

Address
calculati
Control Unit on part

C
181

Allows
comput
er
signals
to be
send
over a Aids in
telepho back-up
A modem is a device that ne line procedures
A LAN includes 20 PCs,
each directly connected
to the central shared pool Planeta
of disk drives and
ry
printers. This type of
networ Ring
network is called a
k
Network
A computer based
system for sending,
forwarding, receiving and Office
storing messages is
Autom Executor
called an
ation
systems
If a workstation contains
a processor, monitor,
screen manipulation
device, printer, storage
A
and communication
dumb
An
capabilities, it is said to
workst intelligent
be
ation
workstation
Time of
day
Terminal hardware
control Encryption
controls include
locks
algorithms

RS-232 is a

Type of Terminal
cable
Standard

Packs
data in a Speeds up
disk file online printing

Loop
Network

Star Network

Electroni Instant postc mailing office

A
personal
compute A mainframe
r
PC

Parity
checks

All of them

Commun Device
ication
interconnect
protocol standard

182

A
compil
er does
a
conver
sion
line by
line as
the
progra
m is
run

A
compiler
A compiler is a
converts
general
the whole
purpose
of a higher languag
level
e
program
providing
code into
very
machine
efficient
code in one executio
What is a compiler?
step
n
Lexical
Feasibi
analysis,
lity
CONVE
study,
RSION,
system Implementa and
design, tion and
code
What are the stages in
and
documentat generati
the compilation process? testing ion
on
Which of the following is
not a data transmission
coding scheme

What is the definition of


an interpreter?

CRC
An
interpre
ter
does
the
conver
sion
line by
line as
the
progra
m is
run

Baudot

ASCII

None of the
above

None of the
above

EBCDIC

An
interpret
er is a
general
An
purpose
interpreter languag
is a
e
representat providing
ion of the
very
system
efficient
being
executio None of the
designed
n
above

183

A device used in data


communications to divide
a transmission signal into
several sub-bands is
known as a
Third generation
languages such as
COBOL, C, and
FORTRAN are referred
to as

Lowlevel
languag
es

None of the
above

Uses only one


path

None of the
above

Relieve
Manage
the main
the paging CPU of
function in repetitive
a virtual
communi
environmen cation
t
tasks

Reduce
competition
between the
input/output
devices

System
Analysis

Testing

None of the
above

Coaxial
Cable

Common Telephone
carrier
Lines

Demodulat
Modem or

Highlevel
langua
ges
It is
faster
than
parallel
Serial Communication is commu
used over long distance
nicatio
because it
n
Financi
al
sector
In what areas is the
and
COBOL programming
engine
language used?
ering
Comm
unicate
with
the
consol
e
The primary function of a operato
front-end processor is to r
Specifi
cation
What is the first stage in and
program development?
design
Which of the following is
not used for data
transmission within a
Fiber
local area network
Optics

Frequen
cy
division
multiplex Time Division
or
Multiplexor

Middlelevel
languages

It is less
error prone

Graphic
design and
education

It is less
prone to
attenuati
on
Accounti
ng
systems,
commer
cial
sector

C
184

The
design
of the
screen
the
user
will see
and
use to
enter
or
display
data

System
Analysis
System
involves
Analysis
creating
defines the a formal
format and model of
type of data the
the
problem
program
to be
None of the
will use
solved
above

An
interface

A buffer

The
differen
t types
of
networ
k to be
used

Testing to
check for
errors
before the
system is
introduced

Hardwar
e,
Software
and size
of
None of the
program. above

Star

Packet

Ring

What is System
Analysis?
A device to device
hardware communication A
link is called
cache

What will a good


software provider
consider?
The topology of a
network can be each of
the following except
What is the 8-bit binary
value of the decimal
number 85?
Which is the most
common data
transmission error
checking method
What is the decimal
value of the binary
number 1111?
Which of the following
devices merges
communication signals

101010
10

Parity

Bus

None of the
1100101 1010101 above

Cyclic
Retransmis Redunda
sion
ncy
Hash Count

None of the
64 above

15

Port

An online
protocol

Modem

Multiplex Acoustic
or
coupler

C
185

onto a single line

What is the decimal


value of the octal number
215?
Which tool is used to
help an organization
build and use business
intelligence?
Cache memory
enhances
What is the decimal
value of the hexadecimal
number FF?
Numbers are stored and
transmitted inside a
computer in
What is the hexadecimal
value of the decimal
number 1476?
A byte corresponds to
What does EBCDIC
coding of numbers
mean?

327

None of the
97 above

141

Data
Data
Data
manage
wareho Mining
ment
use
tools
systems
memor
seconda
y
ry
capacit memory
storage
y
access time capacity
30
binary
form
4C5
4 bits
Basic
Coding
Descrip
tion
1024
bits

255

secondary
storage access
time
B

None of the
256 above

ASCII code decimal


form
form

alphanumeric
form

1B7
8 bits

5C4
16 bits

None of the
above
32 bits

A
B

Binary
Coded
Decimal

Bit Code None of the


Design
above

A Kb corresponds to
1000 bytes 210 bits
What is the binary sum of
01011 and 00101?
10000
1112
1110
Information is stored and
transmitted inside a
binary ASCII code decimal
computer in
form
form
form

All of them

210 bytes
None of the
above
alphanumeric
form

A
A
A

186

A parity bit is

How did the computer


mouse get its name?
What are you most likely
to use when playing a
computer game?
CPU performance may
be measured in

used to
indicat
e
upperc
ase
letters
Becaus
e it
squeak
s when
moved

used to
detect
errors

is the
first bit in is the last bit in
a byte
a byte
B

Its moves
like a
mouse

It has
ears

None of the
above

None of the
above

VLSI

None of the
above

barcode voice
scanning recognition

CDROM
drive

None of the
above

Refillab
le ink
Pencil lead

Light
sensitive None of the
elements above

100K

5 Mb

1 Gb

output

input

Touch
screen

Light pen

Joystick

BPS

MIPS

MHz
Reading
bar
codes

A digitising tablet can be Printing Tracing


used for?
letters diagrams
In processing cheques
which of the following I/O
techniques have banks
traditionally used
OCR
MICR
Which of the following is
a pointing device used
for computer input?
What does a light pen
contain?
The capacity of a 3.5
floppy is around
What general term
describes the physical
equipment of a computer
system, such as its video
screen, keyboard, and
storage devices?

Touch
screen

Hard disk

1.44 Mb

hardwa
re
software

187

Where would you find the


letters QUERTY?
Mouse

Keyboard

Numeric
Keypad

Printer

Bar code
reader

Optical
mark
reader

Keyboard

Credit
card

Mouse

Speaker
s

Printer

Colour
ed
spots

Pixels

Pixies

Pickers

What input device can be


used for marking a
multiple-choice test?
Mouse

Bar code
reader

Optical
mark
reader

None of the
above

QWERTY is used with


reference to

mouse
button
layout

keyboar
d layout

word
processing
software

Bar code
reader

Optical
mark
reader

None of the
above

What input device could


tell you the price of a
product
Where would you find a
magnetic strip?
What are the individual
dots which make up a
picture on the monitor
screen Called

Mouse

screen
layout

What input device could


tell you the price of a bar
of chocolate?

Mouse

A GUI is

hardwa language
re
interpreter

software an operating
interface system

First generat
ion
comput
ers.
Vishwa
jeet
is
caused
by
wear

Second generation
computers.

Third generati
on
Fifth compute generation
rs.
computers.

Deep Blue

Param

Arjun

caused by
overuse

is due to
bad disk
blocks

none of the
previous

UNIVAC Computer
belongs to the
Name the first Indian
Super Computer?

Disk fragmentation

188

Magnetic
Ink
The technology which is
Characte
used to check answer
Bar
r
sheets of multiple-choice code
Optical
Recognit
questions in civil services Reader Mark
ion
or similar examinations
Techno Reader
Technol
is: logy
Technology ogy
converts
a
program
a fast
slower than to
interpre an
machine
A compiler is
ter
interpreter code

Image
Scanning
Technology

none of the
previous

Desk Which printer among the Drum


Dot - Matrix jet
Thermal
following is fastest
Printer Printer
Printer
Printer
encrypt decrypting compres
Zipping a file means
ing it
it
sing it
transmitting it
Very
importa
Virtual
nt
informati
reader Vital
on
user
information reader &
What does acronym
sequen resource
user
VIRUS stands for
ce
under siege system
None of above
Electric
ally
An inked
An impact printer creates charge Thermal
An ink
ribbon and
characters by using...?
d ink
Paper
pen
print head
mainfra
me
WAN
A client-server system is technol LAN
technolo Unix operating
based on
ogy
technology gy
system
10-6
10-12
A nanosecond is
sec
10-3 sec
sec
10-9 sec

A
C

B
D

189

A procedural control
used to minimize the
possibility of data or
program file destruction
through operator error is
the use of
_______ software
enables users to send
and receive data to/from
remote computers
A _____ is a running
instance of an application
Splitting of CPU's time
for different tasks
_______ prevents time
slicing
______ computers are
used in large
organizations for large
scale jobs which have
large storage capacities
_______ is responsible
for all calculations and
logical operations that
have to be performed on
the data
______ printer use laser
light
______ software
enhances the user to
enter ,store, manipulate
and print any text
______ software enables
users to send and
receive data to/from
remote computers
_______ is the
temporary storage place

Limit
checks

Control
figures

External
file
labels

Cross footing
tests

applica
tion
system

operatin
g system communication D

project

pilot
project

model

process

multipr
ocessin multithreadi multiplex
g
ng
ing
multitasking

micro
compute none of the
rs
above

central
processi
ng unit

none of the
above

none of the
above

none of the
above

mainfra super
mes
computers

control
unit
band
printer
data
manag
ement
integrat
ed
softwar
e
my
comput

arithmetic
and logic
unit
drum
printer
word
processing

non
impact
printer
electroni
c
spreads
heet

communica idea
tion
processo
software
r
Microsoft
recycle bin exchang

none of the
above
none of the
above

B
B
190

for deleted files

er

_____ is a collection of
related fields

field
assem
_____ language consists bly
of strings of binary
langua
numbers
ge
______ symbol is used
to represent processes
like assigning a value to termina
a variable or adding a
tor
number
symbol
_______ is an example
for micro computer
_________capability
supports concurrent
users doing different
tasks
The ______ do not have
processing power of their
own and has only a
screen, keyboard and
the necessary hardware
to communicate with the
host. For this reason, the
terminals are referred
as_______________
A______is nothing but a
PC with a network
operating system
_____system is
responsible for handling
the screen and user I/O
processing

PC-at

file

none of the
above

machine
language

record
high
level
languag
e

none of the
above

processed
symbol

connecto input/output
r symbol symbol

hp vectra
system

fazitsu
vp200
series

IBM-PC

multipr
ocessin multithreadi multiplex none of the
g
ng
ing
above

"dumb
termina dumb
ls"
servers

dummy
dummy
terminals servers

wan

distributed
computing
system

windows
NT
LAN

host

server

back end front end

191

The______ handles data


processing and disk
access in a Client/Server
architecture
Both the DBMS and the
application resides on
the same component in a
____system
When all the processing
is done by the mainframe
itself, the type of
processing is sometimes
called as
DBMS models can be
grouped under____
categories
______is the most
advantageous database
system
A new user initiates a
new process of execution
at the background,while
the user can continue his
query process as usual
in the foreground. This
situation is referred to as
______
The process of data
being automatically
written to a duplicate
database is
called______
Modem stands for
__________ .

host

server

PC

LAN

back
end
front end
distribute
d
computin
g
centralized

server
proces
sing

host
processin
g

dumb
processi
ng

data
processing

four

one

two

many

file
manag hierarchical network relational
ement database
databas database
system system
e system system

multipr
ocessin multithrea
g
ding

multiplex none of the


ing
above

repairin redo
g
logging

disk
defragm
entation

Modulatio Module/
Code/D n/Demodul Dee-code ation
module

disk mirroring D
None of the
above

192

Multiple changes to the


same record or a field
are prevented by the
DBMS through______
_________allows an
application to multitask
within itself
LAN stands for
__________ .
New process of
execution is referred to
as______

ISDN stands for


_______.
_____________ is the
Worlds largest computer
network .
_______is/are a popular
front end tool
When LAN connected
together ,it is called
__________ .
Data is broken into small
unit called __________ .

SMTP stands for


__________ .

fixes
multipr
ocessin
g
Linear
area
networ
ks

locks

task
Integrat
ed
system
dynami
c
networ
ks.
Ethern
et
visual
basic

multithrea
ding

constrain
ts
traps

none of the
above

Local area
networks

multiplex
ing
Local
array of
networks
.

None of the
above

process

thread

client-server

Integrated
Symbolic
Digital
networks.

Integrat
ed
Service
s Digital
network None of the
.
above.

Internet
power
builder

ARPAN
ET
SQL *
plus

None of the
above.
all of the
above
None of the
above.
None of the
above.

MAN

WAN

GAN

Cells
System
modula
tion
transfer
protoco
l

Bits

Packets

Software
Mail
transmissio
n protocol

Simple
Mail
transfer None of the
protocol above.

B
D
B
C

193

The __________
protocol is a network
protocol to be built for the
World Wide Web .
The computer which can
receive data from other
computers on the
network and print it is
_______
The hardware and the
software requirements
together form the_____
ATM, Asynchronous
transfer mode is a
__________ technology.
__________ is designed
telephone system

Expansion of WBT is
______________
_________ connects
LANs.
Collection of instruction
is called a _____
Combination of
alphabetic and numeric
data is called _____ data

Computers can be
classified based on
______,______and
_______
_______ is responsible
for feeding data into the
computer

Transfe
r
Protoc Transmissi
ol
on protocol

Hyper
text

None of the
above.

File
server

Printer
server

None of the
Receiver above.

platfor
m

configuratio
n
package

MAN
and
WAN

LAN and
WAN

LAN and LAN WAN and


MAN
MAN

ISDN

ATM

Internet

system

Intranet

Web
based
Trainin Web based
g
Technology

Web
based
Transpor Web based
t
Transaction

Bridges
proced
ure
alpha
numeri
c
space
occupi
ed,
price,
no. of
users
allowed

Routers
batch

Protocol Repeaters
comman
d
program

alpha beta

numerou number and


s alpha
alpha

size,
cost,
perform
performanc ance,
e their ratio cost

input, output,
performance
ratios

input

output

write

feed

A
B
D
A

194

_______ is the capability


of the o/s to run
numerous applications
simultaneously
_______ involves
conversion of raw data
into some meaningful
information
_______ is responsible
for obtaining the
processed data from the
computer

multipr
ocessin multithreadi multiplex
g
ng
ing
multitasking

interpre
ter
compiler

converte
r
process

input

processor

ram

output

drum
printers

nonimpact
desktop thermal
printers printers

control
program,
interpreter,
assembler,
compiler

monitor,
program, CPU,
keyboar memory,
d, bus
input, output

_______ printers use


light to produce the dots
needed to form pages of
characters

impact
printers
operati
ng
system
,
Hardware components in bootstr
a computer are
ap,
_____,____,_____,____ kernel,
__
shell
_______ software are
programs that are
operati
complex and can be
ng
developed or purchased system
_______ is a set of
special instructions used
to communicate
effectively with the
computer
batch
_______ converts a high
level language into
proces
machine language
sor
_______ translates
assembly language
program into machine

compil
er

application windows
software
95
interpreter

protocols

softwar
e's

procedures

compiler

assembl
er

coder

interpreter

assembl
er
processor

C
195

language instructions

196

You might also like