You are on page 1of 150

OPTIONS

QUESTIONS A
TALLY
The ------ key can be used to select an existing company
from list of companies. F1
Import and Export of data between Tally and other
programs is possible only through ---------- Program. Tally ODBC
The re-order point is the inventory quantity that trigger
a stock replishment activity. TRUE
A created company's detail can be modified through
keys F3
A/An ------------- is the official notice that the firm sends
to its customers to advise then to the amount of money
that is owed. Invoice
In tally,all masters have ________main options Two
In tally,to create a new column in balance sheet press
_______ Ctrl+C
In tally,the use of group behaves like a sub-ledger,
option is that we can summarize many ledger accounts
into one line statements TRUE
In tally, we can alter ledger details using either single or
multiple modes but not alble to delete a ledger from
multiple modes. TRUE
In tally,a group company is marked with an
______________ *

The systems that work together to order,receive, and Puchasing and


pay for replenishment of stock are --------------- Accounts payable
Tally allows to delete a ledger from --------- alteration
mode. Single
--------------------- is/are useful for management in the
decision making. Cash Flow Statements
In tally,the group company must contain at least
_____________ members Two
To cancel a vourcher entry in Tally, short-cut key is
----------- Alt+D
The accounting masters and inventory masters related
to Create Information

We press ------------- function key to display the age-wise


analysis of Bills Receivable or Bills Payable report F4
In Tally, we press ------------, to print report . Alt+P
In Tally, Types of Accounts and Types of Vouchers
passed during the period, can be seen in -------------
report. Tally Audit
In the Tally Software, the ------------ directory stores all
data entered by the user. Bin
The Ledger Accounts are unique in Financial Accounting
Packages True
Customers can be permitted to enter their own data into
the firm’s computer using the firm’s wide area network Enterprise Data
is an example of Interchange
In Tally, we can customize the Vouchers as per our
requirements TRUE
The number of steps in Accounts Compilation are 2
Each action/transaction of a firm is described by a
----------------. data element
Tally is based on mercantile accounting system FALSE
Display stock valuation
Ctrl + N is used to ----------- method

------------- in Tally classify the accounts under different


heads so that summarised information is possible. Ledgers
Revenue Account also known as -------------- Account Personal
Method of Voucher Numbering is/are Manual
Accounts Receivable are displayed in Balance Sheet
To assemble a product from different items --------------
entry is used Journal

A --------- purchase orders data flow is directed to the


purchasing system for use in closing out the outstanding
purchase orders in the receiving system diagram. Filled
Tally provides at least --------- predefined voucher
formats 11

The value of the inventory is included in a ledger


accounts as an asset on the balance sheet FALSE

" The buyers can follow up with the suppliers to management by


determine the reasons " is an example of ----------------- objective
From voucher entry mode , if we press __________ then
we get payment voucher in tally F4

Default Cost Category in Tally is/are -------------- Main Location


A Group Company is simply a name and an identify
given to the merged accounts member companies of the
group. True
A ----------- is a primary document for recording all
financial transactions. Ledgers
The field can have a value between ________________ in
FA Package. 0 to 9
The _______ file maintains data that describes the
supplier past transaction with the firm in terms of
material quality in AIS Supplier
It is necessary to manipulate data to transform it into
---------------- Report

In tally, to change the date of the voucher press ______ F2


Tally can maintain budgets on ---------------- Net Transactions
The value of the inventory is included as an asset on the
balance sheet True
In ratio analysis report of Tally FA packagewe we press
________________ function key to the display of bills
receivable , bills payables report F6 function key
The accounts payable system is responsible for paying
the suppliers for the ----------------- Sales
What is the default financial year in Tally6.3
_________________ 1-4-1995 to 31-3-1996
Tally encrypts and stores TALLY DATA at the data
directory True
The Profit & Loss statement can be displayed in
---------------- format(s). Horizontal

Balance sheet & profit


& loss profit & loss and
Default ledger accounts in tally are ______ trial balance
Default 'godown' name in tally is ____________ Primary

'Tally vault' is a _________________ Security mechanism


To create a sales voucher in tally , you have to press
_______ F5

A Group Company is ------------------------- given to the


merged accounts of member companies of the group. a name
In tally,"credit note" voucher type records entry for
________________ Sales return
In tally you get currency symbol option from _______
menu Company creation
------------------ gives the balance for each day for the
voucher type has been selected. Trial Balance

For 'stock journal' entry we press ______________ in tally F7


Changes in
Tally provides the capability to the administrator/auditor transactions or
to track changes in the areas is/are vouchers
In tally, types of users are _______________ 2

By pressing -------- key, a list of inventory reports can be


displayed straightaway from the balace sheet report F9
Projected approximation of income or expenses is called
______________ . Balance sheet
"Administrator" type user is also called 'Auditor' of a
company in Tally TRUE
You will get company information , if you press
__________ from gateway of tally F3
A constituent(member) company can be a member of
more than one group. TRUE
Default stock category in tally is ______ Main location
To create a log of the import activity in a file
_____________ is located in the same directory as an
executable program in tally Tally.imp
In Tally,inventory valuation method option is available
from _______ Stock summary

Tally audit feature is available in a company By pressing F11


__________________ function key
In tally, a group company can also be a
constituent(member) of another group company TRUE
Default number of groups in tally are ________ 128
During voucher entry ------------- are used. Ledger Accounts
User designated as --------------- can view audit list. Administrator
One company to
another company
created withon Tally
Tally supports Importing of data from ---------------- Package
In an accounting information system, which of the
following types of computer files most likely would be a Inventory
master file? subsidiary.

Which of the following is an advantage of a computer- Does not require as


based system for transaction processing over a manual stringent a set of
system? A computer-based system: internal controls.

data to be transferred
The memory address register is used to store to memory

FUNDAMENTALS OF COMPUTER
Inefficient usage of excess computer equipment can be
controlled by Contingency Planning

Which of the following is not the component of a CPU NIC Card

A trailer label is used on a magnetic tape file, it is the


last record and summarises the file. The following is an
information not found in the trailer label Record Count
Writing on a hard
Hard copy is a term used to describe...? board
Voice activated
What do the abbreviations VAB stand for broadcasting
What control would prevent the accidental erasure of
customer information from a magnetic tape Validity check
What are the individual dots which make up a picture on
the monitor screen called? Coloured spots
Header label normally include all the following except
the File Name
A daisy wheel is a type of...? Printer
Which approach or technique is a control usually
associated with microcomputers System Logs
An impact printer creates characters by using...? Electrically charged ink
The best security control in a microcomputer Restrict physical
environment is to access
What would you NOT use with a flatbed plotter? A pen
What do you need for an ink jet printer? A cartridge

The greatest control exposure in a microcomputer


environment is the lack of Separation of duties
What do you need for an ink jet printer? A cartridge
A laser printer does NOT use? A print head
The amount of data that a disk may contain is known as
the disks...? Volume
You can ________ protect a floppy disk. Read
Information on a hard disk is usually backed-up using
a...? Magnetic tape
Serial access
Magnetic tape is a...? medium
Hard disks can have a storage capacity in the region
of...? 1.44MB

Which storage device has the largest capacity in Mb? A CD-ROM

Which storage device cannot be erased? A CD-ROM


Where should floppy disks be stored? By a sunny window
The contents of these chips are lost when the computer
is switched off? ROM chips
What are responsible for storing permanent data and
instructions? RAM chips
Which parts of the computer perform arithmetic
calculations? ALU
What are small high speed memory units used for
storing temporary results? CPUs
How many bits of information can each memory cell in a
computer chip hold? 0 bits

What type of computer chips are said to be volatile? RAM chips

Network software and


Software can be divided into two areas: security software
Travel agents use this computer system when reserving
flights Supercomputer
Which computers are used in the weather forecasting
industry? Notebook computers

Vacuum tube based electronic computers are...? First generation


Which generation of computer was developed from
microchips? Second generation
Which generation of computer uses more than one
microprocessor? Second generation
Which generation of computer developed using
integrated circuits? Second generation
Which generation of computer developed using solid
state components? Second generation

DATABASES

Name three steps involved in developing an information Specification,


system Design, and Testing
_______ is used for CAAT as database Oracle

Generalized audit software perform auditors to


undertake any past records and not concurrent auditing True
Generalized audit software is a file whose capabilities for
verifying processing is logic True
CAAT's are computer program and data that auditor
uses as part of the audit procedures to process data if
audit significance contained in an entity information
system True
CAAT do not contains package programs, purpose
written program, utility programs or system
management programs yes
Embedded audit routines are sometimes built into an
entity's computer system to provide data for later user
by the auditor true
SCARF involves embedding audit software modules
within an application system to provide continuous
monitoring TRUE

Concurrent use auditors as the member of the system TRUE

Regular cross system verification may minimize frauds true


Computer security is frequently associated with
confidentiality, integrity and authentication true
Data reserve engineering process metadata to
document system and abstract business rules and
relationship true
to determine the
The first step for developing CAAT is_________ audit objective
Using the open database connectivity feature in ACL is can bring the data
______________ directly
Computer Assisted Audited Technique involves the use
of computers through "Black Box Approach" True
White Box Approach necessary involves expert
knowledge on the part of Auditor True

change in the method


The transition from manual system to CIS environment of recording accounting
bring dramatic changes including ________________ transaction
documents driven
Auditing with computer necessarily supports the approach
hardware and software
CAAT involves an Auditors' appreciation of __________ configuration
Widespread end use computing result in unlimited errors
creeping into system going to accept handling, thereby
increasing audit risks true
For computerized auditing usage of sophisticated audit
software would be a necessity true
the source of data
Important knowledge needed to begin planning the use available to the
of CAAT is _________ audit organization
The move towards paperless EDI would eliminate much
of the traditional audit trail, radically changing the
nature of audit evidence true

Computer operation controls are designed to provide


________________ the of by all concerned
Systems development control, apart from others,
include authorization, approval, testing, implementation
and documentation of new systems software and
system software modification true

A system could be _________ natural/man-made


A system exhibits 'entropy' true

Super computer are the largest and fastest and is very


suitable for commercial application including audit work true
Assembler language uses Mnemonic symbols true

Operating systems are devised to optimize the machine


capabilities, the function include_______________ scheduled jobs
General purpose software provides a framework for
highly complex scientific operation true
In batch processing, transactions are processed one
after another true
The use of computer assisted audit techniques is not with audit
gaining popularity not only ________________ departments

On-line processing refers to grouping of transaction and


processing the same in one go from start to finish true
Real time refers to the technique of updating files with
transaction data immediately after the occurrence of the
event to which it relates true
In OLRT the CPU should process the capability of
program interruption true
Time sharing system allow access to a CPU from remote
terminals true

DSS is defined as a system that provides tools to


managers to assist them in solving structured problems true
DSS has the following components _________________ databases
Master files contains current records for identification
and summarizing true
Transaction files contain relatively permanent records
take product profile, customer profile, employee profile
etc true
Master file configuration includes ____________ reference files
______ is a file management software package that lets
users and programmers organize data into files and then
process those files filex

CAATS provide added value to the clients because to have a complete


_______________ picture of a system
File volatility refers to the number of addition and
deletions to the file in a given period of time true
File activity is the proportion of transaction file records
that are actually used and accessed in a given
processing run: true
File interrogation refers to the _____ of information from
a file back-ups
One -to-one relationship means a single entity to a
single entity in a monogamous structure true

RDBMS is structured to a series of 2 dimensional tables true


seriously affected
SADB stands for ____________ database

Controls are present over many aspects of the computer


system and its surrounding social environment true
In framed checking the data entry is checked against an
expected picture or format true
Errors are correlated_________ at the year end
Field check is exclusive to a field true

_________ law basically states that there is a specific


probability of the first digit of a no. being 1,2,3 etc Benfish
Check digit is a group of nos. added to a code for
determining the accuracy of other digits in the code true

consecutive nos. or
Hierarchical code means _________ alphabets to entities
The validation checks applied to a field depend on the
field's logical inter relationships with other fields in the
record TRUE
The contents of a field could determine _______ sign for a
______ field valid, numeric
Batch is the process of ______ together _____ that bear grouping,
some type of relationship to one another transaction
Hash totals means meaningless totals true
With OLRT where interactive data entry is available, the
master file associated with a transaction may be
searched for confirming data true

Controls are required for authorization to ensure data


integrity and detect possible breaches in security true
Data from client application are not stored in the
organization's database through auditables events and
function true
All input records in a batch are normally of different
types true

incremental design and


IDEA stands for _________________________________ enlarge activity
A transaction file is sorted prior to the update of master
file true
A sequence check on the transaction or master files by
an update program is not required true

Whenever monetary transactions are processed against


master files, the update program should maintain a
correlation account to record such transaction that does
not have a matching master file record true

Internal tables are stored tables from which certain


values are extracted for further processing and storing true
For small to medium sized systems, individual modules
are coded and individually tested and then assembled to
be tested as a whole-the testing strategy is referred to
as ___________________ e-brain
In systems testing, test involves_________________ bottom up tests
Recording transactions in a controlled manner may
amount to loss of stored data yes

read data on client's


Audit software is used by the auditor to _________ file
Core image comparison is a software used by the
auditor to compare _______ version of a program with a
secure ________ copy executables, master

Database analyzer is a software which provides detailed


information concerning the operation of the database true
system analysis
SAS stands for ______________ software
Embedded code is a software used by the auditor to
examine backup data true

Embedded code performs wide variety of audit task yes


Core image comparison is particularly useful where only
executable versions are distributed true
Log analysis is a software used by auditor to detect virus true
On line testing techniques the auditor ______ data either
_______ or fictitious in order to see that a specific
program or sever edit test is doing its work manipulates, real
Mapping software is used by the auditor to list unused
program instructions true
Mapping software has very objectives yes

can be very powerful


Modeling is a variety of software which ________________ analytical tool
On line testing can be targeted for specific functions
carried out by programs yes

provides detailed
information of machine
Program code analysis involves _____________ uses
__________ is a software of CAAT IDEA
Snapshot is software which takes a picture of a file or
data or a transaction passing though the system true
fictitious data
applied against the
Base case system evaluation includes____________ client program
While base testing forces on finding if there are any
defective execution policies in a program TRUE
Black box testing seeks to determine whether
application output is what it is supposed to be true
In integrated test facility approach the auditor should
ensure that the impact of test transaction is
subsequently eliminated from the computer files true
Black box testing is _______ based and white box testing specification,
is _______ based program
identifying erroneous
Source code review means__________ code
In formula in flow hypothesis the auditor should expand
the extent of substantive tests to determine how the
defects may impact the attainment of the program
objectives true
All material application oriented events that occur within
the boundary subsystem should be recorded in the
accounting audit trail true
In examination of audit trail the following data
associated with an event may be ___________- start and finish time

JCL means_________________ job control language


Audit should be periodically analyzed to detect any
control weakness of the system yes

In an accounting audit trail, intrusion detection system


might monitor the amount of processor time consumed
by the user to detect unusual deviation from the amount
processor time requested by the user in the past true
A sample size calculator program assists auditors in
determining RAND() function true

package computer
p[program for
performing a variety
of data processing
Generalized audit software consists ___________ function

prepared by the
Specializes audit program may be___________ auditor
Generalised audit software could be used by the
following in consistencies or significant fluctuations TRUE

file
Generalized audit software function include____________ access/organizations
In the file reorganization merging capabilities are
needed in data from separate file is to be combined on a
separate work file TRUE
Auditors cannot use generalised audit software to
extract the data needed for audit purpose true
Auditors can combine functional capabilities of
generalized audit software to accomplish the task of examining the quality
__________________ of system process
Wide access to various
Which of the following is not the feature of GAPs data base
Which is the example of CAATs ACL
A sample of
In audit procedures, test data is transactions

Tests of details of
Which of the following is not the use of CAATs transactions
Which of the following are called explicitly by another
procedure? Macros
_________ data type is generally used for fields assigned
as primary keys in a table integer
MS access objects can be published in the web true
In code-builder, got_focuse, click,dbl_click,enter are
examples of _______ actions
_______can be used to automate certain actions in
response to events report
In the macro sheet the macro is selected in the
_____field macro

To build complex expressions_____is used calculator

The three list boxes present at the bottom of the


expression builder are called_____ action list
________option is selected from the view menu to create
macros with conditions conditions

_______report can be created with minimum user input tabular

_______layout of a form displays one record at a time tabular

The table or query name on which we are going to build


our report is selected from the ____ dialogue box create report
______and_____are the two types of auto reports columnar and
available tabular

There are no wizards for creating a database in access true


______option from the insert menu option is chosen to
add an embedded chart create fields
In ms-access, while using SQL, references constraint is
used for creating _______ primary key
_______is used to create a mailing label label wizard

______header is present at the beginning of the report start header

______is present at the bottom of each page in a report report footer

In SQL, having clause is used for _________ for ordering records


______field is added to the macro sheet when we select
grouping option from the view menu condition
______can be used to create toolbars VB Modules
_______query is used to add records from one or more
tables into an existing table add
_______window is used to write VB code in access
application report
Values for other tables, queries are maintained in look
up fields data type true
Visual Basic language is a _____ tool RAD
______ function is used to display a message box SysCmd
Other ms-office applications can be accessed from ms-
access using a concept called ________ OLE
object linking and
OLE stands for_____ embedding
The application that supplies data in OLE is called an
_________ OLE object
If any change made on the object from the client side is
reflected on the server then the object is said to be _____ linked
_______is the file format that works on internet exe
______ is used to convert any ms-access object into html
format form wizard
_______ option in publish to web wizard produces a page
that is static in nature static file
_______query is used to create or change database
objects in a current database append

Currency fields express the amount in _________ dollars

_______is selected from the toolbar to add an OLE object unbound object

To display an OLE object in the form of an icon ____


option is selected from insert object dialogue box display as icon
_______option from the file menu is selected to run
'publish to the web wizard' create html
_____page in an web application is used to navigate to
the rest of the pages in the application startup
______ is fired when an event is triggered is the concept
based on a Visual Basic language bullet
Ms access is a ___________ DBMS
A collection of data stored in different objects is known
as a _________ data group

A blank database can be created using __________ new dialog box

Text type data can be of _____ characters in ACCESS 255

______is a datatype that assigns values automatically automatic number


Tables cannot be imported from other databases true
If two tables having same values for the fields are joined
it is called an ______ inner join
Duplication of records in a field won't be allowed if the
fields are declared a________ primary key

Changes from a master table can be reflected on to the cascade delete related
child table by selecting _____option records
To see more than one record at a time in a form we use
_______ columnar

In SQL, delete command is used to remove _________ table or tables


In MS-Access, filter excluding selection will display only
those record(s) which meet the criteria. true

Properties of the fields are managed by _____ in Dynaset property field


______queries allows us to view data in row by column
manner crosstab queries
The type of queries that can update or delete record(s)
in a table(s) are called __________ action queries
Joining tables without any matching values in the fields
is called ____________ inner join
Primary key uniquely identifies each record true
Which of the following dialog box is/are used in the
creation of form ________ new form dialog box
_______ query wizards are used to generate summary
calculations for a table summary
Properties of a form can be changed by selecting
______from view menu options change properties
Forms that are included in other forms are called
______________ included form
In MS-Access, while using form design view, for creating
a command button for adding a new record, we should
select the _______ category from the command button
wizard Record Navigation

_______ form displays fields in a single horizontal row columnar form


The process of arranging the data in a meaningful order
is known as ___________ filtering

______ are used to select only some particular records


from the table or any other database objects filter
In MS-Access, user may specify criteria for filter in form
view using _________ filter by form

___wildcard character represents any single character *


Records cannot be sorted by a primary key true

A control without a data source is known as ___________ bound control


Set of related option buttons, check boxes and toggle
buttons is known as _____________ button group
The collection of related data and objects is called a
____________ database

Which of the following is control types ____________ bound


In MS-Access, the function that gives the current date is
_____________ CURRDATE()
_____is a control that lists set of data text box

______is a form that summarize large amount of data pivot table


______allows to create a filter by typing the value in a
data sheet data sheet filter

Wizards for toolbox controls are called a __________ button wizard


The wild card representation for any 5 letter word that
starts with ram is ________________ ram*
Look up fields slow up data entry true

____is an access object that displays un-editable data report


_____option from the new object toolbar gives the
easiest way of generating a report autoreport
______ represents data in a pictorial format chart
Changes of one table can be carried over to another
related table true
Hyperlinks are used to jump to any kind of information
or data from a file true
The memo field can have text upto_____ characters in
length 60,000
In MS-Access, columnar layout can be used to view
multiple records in a form true
In MS-Access, alter command may be used in adding a
primary key to a table true
Update query is used to add records from one or more
tables to the end of an existing table true

In ms-access, datasheet view is available in ___________ table


______are used to jump to any kind of information from a
datasheet or a form table
Home page will always be present as a first page of an
application true
Make table queries create a new table from the records
of another table true

In ms-access, to protect a database file from illegal


access, we may set database password. The option of
setting database password is available in _______ menu Insert
Foreign key is a field that uniquely identifies each record
and accept no null values true
Data definition queries are used to create or change
database objects true

The attributes of a composite key are known as ________ alternate keys


OLE object is a data type in access true
Data displayed in forms cannot be edited true
A sub form is used to display one to many relationship
between tables true
We can switch from datasheet view to form view by
selecting view -> form view option true
In MS-Access long integer is a datatype true
In MS-Access, while designing a table for a particular
field, the Required parameter is set to yes. This
validates the field as _______ null

Sorting is applied to select only some particular records true


Filter by form can be created from a forms shortcut
menu true
Advanced filter uses a filter similar to the query design
window to create a filter true
? Wildcard character represents any number of
characters true
_________ of the following is/are a type of chart pie

A bound control is tied to a underlying query or table true

A calculated control uses expression as a source of data true


Text boxes cannot be bound controls true
The default query invoked by ms-access is update query
A control can be bind to a record using row source
property true
List box is a control that offers a list of choices true

If a table is joined to itself it is called a ________________ inner join


A picture box combines the activities of both a text box
or a list box true
Line is a tool box control true
Text boxes can be part of a option group true
_____ chart exists as a separate object freestanding
Filtering data is a way of arranging data in a meaning
full order true
Wild card characters are used for sorting records true
Pivot tables are used to navigate to the other tables in a
database true
Reports are used to represent un-editable data true
In MS -Access, the records in a table are sorted based on the first field of the
_________ table
Relationship is an association between _________ forms

Summary options dialog box is used to summarize data true


______ queries can be used to delete a group of records
that meet some specific records delete
Charts can convert numerical data in a easily
understandable format true
Embedded charts exist separately true
The chart which cannot exists as a separate entity are
_______________ freestanding

From ms - access, if we want to view the records stored


in a table in ms - excel worksheet, we need to use hyperlink

Page header is present at the beginning of each record true


Detail section has a header and footer true
A macro is performed only when the user initiates an
event true
The macro is selected from the action field of a macro
sheet true
A macro can be made to execute before the starting of a
database true

In MS-Access. While appending records, the source and


the target table must have similar structure and fields true
We can add our own functions to the expression
elements list box of the expression builder true
_______is the wildcard character which represents the
presence of any number of characters &

Macros can be used to add a menu to a database object true


_____ header is a unique feature of reports page
Chart can either be a form or a report true
Group header will be present at the design view of a
report even if the report is not grouped true

We can change from the design view to the form view


without being prompted for saving the changes made true
Charts can be produced without the wizard true
Macros can be used to create user defined error
messages true

Between and Not Between is ______ type of operators relational


The default data type of VB is integer true

Visual Basic is based on __________ action language


_______is the name of the database object that displays
data and can be used to edit data report
In access OLE objects cannot be linked true

_____ section is present for each record in the report group


A ________ sheet lists all the properties that pertain to
the form or the controls data

Textboxes can also be an example of unbound control true


In MS-Access, we may design command buttons for
navigating records true
_______are forms that are included in other forms sub forms
_______ are used to represent our data in graphical
format graphs

A field with a _______ uniquely identifies each record number


Large amount of data can be summarized using ______
tables pivot
_______ are employed to select only some particular
records from a database object filters
______ control need not have a data source form
______ control combines the functionality of both a text
box and a drop down list list box
MS access is a DBMS true
A form can be bind to a record source using _____
property of the form form name
______ forms displays field in single row tabular form
______ forms are usually used for tables with one to
many relationship sub forms

_______ control uses an expression as a source of control calculated


_______ control is tied to field calculated
_______is the form that can be created with minimum
input from the user sub form
______option from the tool menu is selected for setting
relationships between tables set relation

______,______and_____are the buttons belonging to the option, toggle and


options group command buttons
_________allows us to create a filter from a field short cut
menu filter by form
________is a database object which displays data but
cannot be used to edit data form
What term applies to a collection of related records in a
database? clipboard
All of the following terms are related to computerized
databases except which one? search

A way to analyse and


manipulate numerical
What is a database? information

Information about
What does a record contain? certain programs

An RDBMS is a remote DBMS


storing data offline at a
Data Warehousing refers to separate site
Unauthorised alteration of on-line records can be
prevented by employing Key verification

A way to analyse and


manipulate numerical
What is a database? information

Information about
What does a record contain? certain programs
Reports allow users
to extract
information as hard
copy (printed
What is a report? output)

Extracting and
What is the best way to analyse and change data analysing data
What are some popular office orientated software Compilers,
applications? interpreters, editors

Which of the following constraints can be used to DEFAULT and NOT


enforce the uniqueness of rows in a table? NULL constraints
Which of the following commands is used to change the
structure of table? CHANGE TABLE

An RDBMS is a remote DBMS


storing data offline at a
Data Warehousing refers to separate site
You are creating a client application that calls ActiveX
DLLs. Which of the following properties of the Err object
provides the name of a component that sends an error
back to the client application? Number

This database holds personal information. The user can


help to keep it confidential by using a password

If the database holds customer names and addresses,


personalised letters can be created automatically using the product code
Application software suited to storing the survey
information obtained in the table would be A database
The characters * and ? are sometimes used in search
criteria as bookmarks
Which of the following field types will generate the
primary key automatically? Auto Primary

records in a dynaset
are consistent with the
Referential integrity ensures that the: underlying tables.

Tables are related to one another through a: foreign key.

the primary key of both


A foreign key is: related tables.

You are creating a banking database to track customer


loans. The bank will, of course, have many customers,
each of whom may take out one or more loans, while
each loan may be associated with only one customer
(there are no joint accounts). What is the re One-to-one
In a one-to-many relationship between Companies and
Employees, which field is found in both tables? EmployeeID
Which of the following ensures that records in related
tables are consistent with one another? For example, it
ensures that you cannot add a record with an invalid The Tools menu,
foreign key. Relationship window

How would you delete a relationship between tables in Double click the
the Relationships window? Relationship line

That there are several


In a Customers tables, what does a plus sign next to the customers associated
CustomerID field mean? with that ID

They must both be


What is required of the fields that join two tables? numbers

Assume a one-to-many relationship between the


Customers table and the Loans table, with referential
integrity in effect. What happens when you attempt to Nothing, Access
delete a customer ID from the Customer table that still ignores the attempted
has entries in the Loans table? command.

Which of the following is true when viewing a main form The subform is not
and its associated subform in the Form Design view? visible.

Which of the following relationships does not belong in a A one-to-many


database based on a professional sports league such as relationship between
football or basketball? teams and players
Which symbol is used at the end of the join line in a
related table to signify the “many” side of a one-to-
many relationship? #

You have created a one-to-many relationship with


referential integrity between a Customers table and a
Loans table. From which table can you delete a record? Either table at any time
The correct order of the arguments for the MsgBox prompt, title bar text,
statement is: icon.

The first statement in a procedure named CreateList is: Dim CreateList.

A check box enables


the form user to
choose from one of
several existing
Which of the following is TRUE related to form fields? entries.
must be set for one
A text field: word.

help people keep


The purpose of a database is to: track of things.
A database stores: data.
A database records: facts.

A sales contact manager used by a salesperson is an single-user database


example of _______________ application

A Customer Resource Management (CRM) system is an single-user database


example of_________ application

The industry standard supported by all major DBMSs


that allows tables to be joined together is called Sequential Query
__________. Language (SQL)

A program whose job is to create, process and Database Modeling


administer databases is called the _____ System
Microsoft Access may use which of the following DBMS
engines? Jet

Which of the following are basic components of an


enterprise-class database system? The user
the database
application(s)
interact(s) with the
In an enterprise-class database system ________ . DBMS
In an enterprise-class database system, the database
application ___ . creates queries

In an enterprise-class database system, reports are


created by ____________________ . the user

A database is considered "self-describing" because all the users' data is in


_______ . one place
In an enterprise-class database system, the database
_________ . holds user data

A database may contain _________________________ . tables


A database designed using spreadsheets from the Sales
department is a database being designed
_________________________ . from existing data

A database designed to implement requirements for a


reporting application needed by the Sales department is from existing non-
a database being designed _______ . database data
A database designed to combine two databases used by
the Sales department is a database being designed
_________________________ . from existing data
Database professionals use ________________ as specific
data sources for studies and analyses. data marts

Database professionals use a set of principles called


________________ to guide and assess database design. data marts
A very popular development technique used by
database professionals for database design is known as
_______________________ . data marts

A very popular development technique used by


database professionals to adopt a database design to
new or changing requirement is known as _____ . data marts
The predecessor(s) of database processing was (were)
__________ . file managers

entities in a column
In a relation __________________________ . vary as to kind
An attribute is also known as a(n)
. table
A combination of one or more columns used to identify
particular rows in a is___ . record
A combination of two or more columns used to identify
particular rows in a relation is________ . record
A determinant that determines all the other columns in
a relation is______ . record
When designing a database, one of the candidate keys
in a relation is selected as the _________ . composite key
Normalization is a process used to deal with which of the
following modification anomalies? Insertion anomaly
assess the existing
When you are given a set of tables and asked to create tables' structure and
a database to store their data, the first step is to ____ . content

are supplied by several


well-established
Modern microcomputer personal DBMS products______. manufacturers
They use
sophisticated
Which of the following are true about data mining mathematical
applications? techniques.

We have obtained access to the company's operational


data. We examine 50 records for customers with phone
numbers that should use the current area code of 345.
Of these 50 records, we find 10 that still use an older
area code of 567. This is an example dirty data
We have obtained access to the company's operational
data. We have been asked to produce a report with an
item by item analysis of sales, but the only sales figure
available is the total sale value for each order. This is
example of_____ dirty data

data warehouse data


A data warehouse database differs from an operational are not stored in
database because: tables.
Which of the following objects is used to display a
menu? Form
Which of the following objects are NOT found in an
Access application? Forms and reports

It will be easier for the


You are developing an Access application that you user to upgrade it if the
expect to upgrade periodically. Which of the following objects and tables are
statements is TRUE? in one database.

The Link Tables


command can be used
to associate the tables
in one database with
Which of the following statements regarding Access the objects in another
applications is NOT true? database.
Which of the following brings a copy of the table into the
current database and does not maintain a tie to the
original table? Import

It contains more than


What makes a database an application? one table
What is the Access tool that is used to create the user
interface? Menu Wizard

create backups for


mission critical
The purpose of a data warehouse is to: corporate data.

___________ means the result of applying to specific


information certain specific technical processes. Digital Sign
__________ is an algorithm which creates a digital
representation or "fingerprint" in the form of a "hash
result". Hash Function
__________ is of standard length which is usually much
smaller than the message but nevertheless substantially
unique to it. Hash Function
Digital Signature involves two processes. They are Digital Signature
___________ and __________. creation

Institutional
Overhead and
The Costs of Digital Signature consists mainly of the Subscriber Relying
following Party Cost
Certification
CA stands for ________________ Authority
A Digital Certificate is issued by a Certification Authority
and is signed with the CA's Private Key True
A Digital Certificate does contain Owner's Public Key,
Owner's name, Expiration date of the Private Key, Serial
number of the digital certificate True
______________ enable web servers to operate in a secure
mode. Server Certificate

______________ are used by individuals when they


exchange messages with other users or online services. Server Certificate
______________ are on-line databases of certificates and
other information available for retrieval and use in
verifying digital signatures. Private Certificate

Signing Writings serve the following general Evidence, Ceremony,


purposes______,_______,_______ and _______ Approval
The most widely accepted format for Digital Certificate
is defined by the CCITT X.509 True
A certificate may prove to be unreliable, such as in
situations where the subscriber misrepresents his
identity to the certification authority True
Certificate
CRL stands for Revocation List

The prospective signer identified in the digital certificate Private Key,


holds the_________ and is called the ___________ Subscriber
In EDI interface, the translation service receives
_________ as incoming files from the communication
service Internal Format File
The EDI standardisation for International Trade and
Commerce is introduced by __________ ANSI

In EDI, the transmission files are composed of different


sets of external format files which are grouped into
multiple sets under the name of ________ batch files
The ________________ are pre-paid credit cards that
include an embedded cards Smart Card
________________ are another form of credit payment that
lets customers use digital online cheques to pay Web
merchants directly E-cash
In Active advertisement, there are two types of models. Billboards and Junk
They are _____ and ________ Mail

The network based technology is/are ____________ EDI


Decryption is a process employed for scrambling of plain
text for web based transactions True
Asymmetric cryptosystem is based on __________ and
____________ Login_Id and Password

Value Added Network is an example of _________ Global Network

The advertising strategies emerging in the on-line world Active or push based
are ____________ advertising

The _________ model use direct mail, spot television or


cable television, in active based advertisement. Broadcast
The ________ is a form of mail that is not targeted to a
specific audience E-mail
The __________ model refers to information that is placed
at a point where it will be noticed by customers in the
course of other activities and does not require active
search Catalog

The most beneficial advantage of ERP system is Error checking


What is the term that describes spying on one’s
business rivals to gain a competitive advantage? Competitive espionage

What would you NOT be looking for when spying on a A list of competitor’s
competitor? clients

An online drugstore such as Drugstore.com is an single-user database


example of_______ application
Which of the following is an example of unacceptable
online ‘netiquette’? Replying promptly

Removable drives that


can be locked up at
night provide adequate
Which of the following statements is correct concerning security when the
the security of messages in an electronic data confidentiality of data
interchange (EDI) system? is the primary risk.
The wizard that is used to import text files
is_________________ text import wizard

The alphabet indicating the column followed by the row


number is known an__________ cell reference
Which of the following files could not be opened in excel
_______________ text files
In excel, the dates that are stored as sequential
numbers known as ________________- serial values
The command to display the current date in a cell is
_________________ =today()
In excel, absolute references are represented by a
________ before the column and row addresses dollar sign
The ________ can be used to select the function and
assemble the arguments correctly AutoSum
Specific parts of information required by functions to
perform certain tasks are called as___________ variables
Which of the following do not belong to the formula
category in excel environment__________ text
The function that in used to join cell values together in a
single cell ________ concatenate
The function that is used to count all the values that
meet specific criteria _________ countif
The wizard that is used to create and edit charts
_______________ pivot table wizard
The function that is used to calculate the payment for
specific loan terms ____________ sumif

The function that is used to add together all values that


meet specific criteria is known as ____________ average

The __________ option present in the file menu options is


used to specify major facts of the page to be printed page setup
The command that is used to apply a format
automatically __________ autoformat
The ____________ makes the information in a worksheet
meaningful and easy to understand bordering
A particular part of a work sheet can be printed by
setting the _________ page setup
The process of finding or selecting information is known
as ____________ filtering

The option that is used to cancel the filter process for a


specific column and display all the records is ________ all option

The URL for encyclopedia Britannica is_________ www.ency.in


_______ maps IP addresses with the domain names of the
sites URL

Internet can be defined as _______ internal network


The most important service of the ______ is to manage
traffic control application layer
_________is a program that displays information about a
host connected to the net finger service
_______ is a program or a tool that helps in locating a file
anywhere on the net FTP
uniform research
URL stands for ____________ locator

IN an URL the word before the color refers to _______ host computer
A ______ always begins with a slash message
Prodigy is run by IBM and ______ Delphi

The World Wide Web is referred to shortly as the _______ net

Gopher and WAIS enables the user to ______ browser


______ is the program used to run CompuServe's regular CompuServe internet
services dialer
Navigating through the menu of gopher is called moving
around _______ gophering
The directories that come with built-in engines are
yahoo,lycos and ______ Alta vista
To use the finger command,SLIP users must run a
programme called______ finger server
The web maps are called _______ list
Directories consists of _______ levels no

The _____ level gives the broadcast overview of the net middle
The huge list of keywords from important items is called
______ hotlist

directory search,index
The two types of search in veronica are _____ and ______ search
_______ searches by keywords infoseek
Mosaic displays links in color whereas _____ does not
display links in color netshark
______ supports one button publish lynx
SPY MOSAIC is distributed by_______ Microsoft
______ is a program that helps us to log on to other
networks Usenet

Higher text transfer


HTTP is the acronym for __________ protocol

______is used to transfer and copy files over the internet iccp
_____ is a program that helps us to log on to other
networks yahoo

transfer control
TCP/IP stands for ________________ protocol/internet
Archie servers can be accessed in_______ different ways
in internet one
_______is the computer on the internet that translates
between the internet domain names and the internet
numeric address ftp servers
TIA stands for_____ in internet the internet adapter
Service indicates the name of the ________ used to
access data, present on the other end of the link. browser
hotlink text transfer
HTTP stands for______ protocol
universal resource
________ is used to link pages in the world wide web locator

FAQ stands for ______ frequent asked query


The internet adapter is a programme that makes our
connection act like a _____or a ____ account SLIP,PPP
The step involved in Communicating between the web
clients and servers is ______________ connection
wide search for
information and
WSIRC stands for______ research
Two of the important browsers are_____ and_____ lynx,minx

Lynx is a _______ programme that works with terminals world wide web server
The huge list of keywords from important items is called
an_____ glossary
very easy and
rodent oriented net
wide index to
computerized
VERONICA is an acronym for _______________ archives
university of
The first freenet is created at the_____ and is berkeley,berkeley
called______ freenet
________ are defined as ways of communication amongst
networks protocols

search
______and_____ are web searching features engines,directories

WINWAIS has two source lists namely____ and______ allsrc,winsocks


________ is also called as WAIS manager allsrc

higher text medium


HTML stands for_____ language

The system of interlinked documents is known as_______ hot links


The small programmes that create
animation,multimedia,real-time games and multi user
games are called______ images
The information displayed on the web page graphics,videos,audi
includes______,_____ and_____ o
The web pages that represent online home of their
author are called______ first page
GNN stands for______ global network news
_____ is the most popular internet service yahoo service

The online service offered by navigator gold 2.0 are email and net
_______ and_____ conference
_______ is a program or a tool that helps us find a file
anywhere on the net newsgroup
The databases to enable keyword search using Lycos
are a2z,_______ Lycos catalog
______ is a large worldwide bulletin board service
network apple link
computer related
abbreviations and
BABEL consists a glossary of _____ acronym
Dictionaries,encyclopaedias,government and other encyclopedia
references are found in ______ Britannica
Yahoo,lycos,excite and webcrawlers are _____ search engines

Graphical interpreter
GIF is the acronym for ____________ formatting
Joint Pictures Expert
JPEG is the acronym for ___________ Group
The Web aids users to explore the ________ mails
yahoo,infoseek,altavist
The three most popular mailer are_____,_____ and______ a

The World Wide Web consists of _________ information

In Microsoft Internet Explorer, the color of the text can


be specified using _________ attribute of the font tag. BACKGROUND

The interface that provides effective communication Communication


between the web browsers and servers is _________ gateway interface

CGI is the _________ between web browsers and servers Network


CGI programs are invoked based on the information
provided by the _________ Current web page
A CGI program is usually called after a request made by
the _________ Browser/user
Unknown resonance
URL stands for ________ language
A hyperlink can be on ___________ text only
HTML was derived from _________ SQL
SGML is a _________ alphalanguage

PINE stands for _____________ palm is not eatable


The application that confirms whether a document is
compliant to its DTD is _________ SGML Processor
Web is a collection of ___________ web sites
Internet equipment
IETF stands for ________ training faculty

The two major browsers used to surf the Internet are MS Internet Explorer
________,_______ and Mosaic
Special characters allow browsers to display
_________________ text
The keyword for providing links within or across
documents is____________ hyperlink
Stringing pages together using hypertext technology
helps view pages _______________ in random order
The initial web pages present in a web site is the
________ page. first
The image format supported by most browsers
is________________. .bmp and .gif

Service, hostname and


The components of a URL are ___________ directory path

mail servers,mail
The mail we send has a mailing address and most of clients and alternate
them correspond to_____,_____ and services
Which of the following is not supported by internet
explorer _______________ <center>

communication
CGI stands for ____________ generated information
Host name indicates the domain name of the web
________ Server
The internet is also called as _______________ arpanet

The internet is similar to _________________ LAN


The net drivers______ from one place to another data

The net provides interesting services like______,______ scripting,parsing and


and______ compiling
The windows internet software available
are______,_______,________ and______ nt,windows95,ie,winzip
________ is the ancestors of the internet dnet

defensive
DARPA stands for administrative rank
_______________________________________________ administration network
The uuencode files start with a _______ start
milnet,smaller
DARPA is broken into ________ and _______ arpanet
NSFNET is the united states provides service to _____
and_____ education,research

Higher text
HTML stands for ______________________________________ manipulation language
The first international IP network connections were
established in 1973 with _____ and_____ united states and UK

A_____ is a set of computers interconnected by


transmission paths to exchange information in internet server
A computer that provides a service usable by other
computers is called______ client
A_______ is the representation of physical connectivity of
the computers in internet network card
detailed transaction
DTE stands for ____________________ explanation
The basic function of the ______ is transmitting the bits
over a channel application layer

point to point network


The point to point channel network is also called as _____ and broadcast channel
and_____ network
Accessing files using FTP servers is called_____ file access
The three most commonly used networks
are______,______ and______ PAN,NAN,AAN
________ is in between LAN and WAN VAN
_____ can be owed by multiple organisation LAN
Data is transmitted in the form of_____ signals analog

DTD stands for __________ Data type definition

Modem stands for __________________ Moralize/demoralize

______ is the process of the digital signals being


converted into a form suitable for analog transmission Mapping

________ and______ are two basic ways of getting Satellite link and digital
connected to the internet signals
Standard long internet
SLIP stands for ________________ protocol
Prime prolonged
PPP stands for _____ protocol

Which of the following best describes uploading storing data on a disk


information? drive

A characteristic of a communication channel that is the


amount of information that can be passed through it in a
given amount of time, expressed in bits per second. Bandwidth
The act of searching through storage to locate
information without necessarily knowing of the
existence of the information being sought. Find
A "recipient" of the certificate desiring to rely upon a
Digital Signature created by the subscriber named in the
certificate is called the ____________ Recipient Party
The Relying Party can use the ___________ listed in the
certificate to verify that the digital signature was
created with the corresponding _________ Public Key

Digital Signatures are used for a variety of Electronic


Transactions like ________________________ E-mail

To associate with a key pair with a prospective signer, a


Certification Authority issues Digital Certificate Not False

Digital Signatures, if properly implemented and utilized


offer promising solutions to the problems of Imposters, Closed System,Formal
Message Integrity, __________ and _____________ Legal requirements
In, Digital Signature, _____________ perform the
"ceremonial" function of alerting the signer to the fact
that the signer is consummating a transaction with legal
consequences Affirmative Act
A Digital Signature must have the following attributes
________________ and _____________ Signer Authentication
"Hash Function" is used in both creating and verifying
Digital Signature Not True

___________ provides assurance of the origin or delivery


of data in order to protect the sender against false
denial by the recipient that the data has been received,
or to protect the recipient against false denial by the Nonrepudiation
sender that the data was sent. Service
___________ serves the ceremonial and approval
functions of a signature and establishes the sense of
having legally consummated a transaction. Affirmative Act
________ is a branch of applied mathematics concerns
itself with transforming messages into seemingly
unintelligible forms and back again. Cryptography
The complementary keys of an asymmetric
cryptosystem for Digital Signatures are arbitarily termed
as _________, and ____________ Private Key
_______ is known only to the signer and is used to create
the digital signature. Private Key

_______ is ordinarily more widely known and is used by a


relying party to verify the digital signature. Private Key
____________ is the art of protecting information by
transforming it into an unreadable format. Decryption
Which of the following activities would most likely detect
computer-related fraud? Using data encryption.
A digital signature is used primarily to determine that a Unaltered in
message is: transmission.
Both sender and
receiver must have
the private key
before this
What is a major disadvantage to using a private key to encryption method
encrypt data? will work.
Which of the following risks can be minimized by
requiring all employees accessing the information
system to use passwords? Collision.
Business-to-
The acronym for B2B is ___________ Business

The _____________ model is the least intrusive model but


requires active search on the part of the customer Billboard

__________ is / are a form of advertisement where people Customer


relate their experience with products and services Endorsements

The _________ are software agents who communicate


with the business merchants on behalf of the customers Intermediaries
The Pre-purchase preparation phase includes
_______________ for a set of products Order Placement
The _________ phase includes customer service and
support to address customer complaints , product Post purchase
returns and products defects interaction

The ________ allow companies to bypass the need for Billboard model of
costly printed catalogs marketing
A ________________ is a basket on the Net that is used to
place the items that are being purchased Online Catalog

EDI For Administration,


Commerce and
EDIFACT is an abbreviation of ________ Transaction
The __________ allows for protocol conversion and
communicates with the bank using the banks private
network or the Internet EDI
In Ecommerce, data extraction, transforming the data
into transmittable form, transmitting the data and
downloading the data are the operations employed in
_________ Compiler
The _________ commerce assists in integrating the
customers and suppliers of the company directly into
the organisation Business-to-Business
E-cash means______________________ Emergency Cash
E-commerce is a tool that addresses the desire of firms
to cut services cost and improving the quality of goods. Communication
It is a definition of e-commerce from _________ Perspective
The small denomination digital tokens are called
_________ Microcash

The ____________ is the process of encoding information


to prevent it from being read by unauthorized parties Decryption
There are _________ types of data tables 1

The tables that allows the user to change or rearrange


the data, summarize the data and evaluate the data
using changing points of view is known as data table

The wizard that is used to suggest hints for doing a task pivot table wizard
In a chart Y-axis is known as_________ series or rank
In a chart X-axis is known as_______________ series or rank
_________ is a set of tables that describe each of the data
series series or rank
________ is used to differentiate one data series from
another series or rank

The chart that contains only one data series is _________ column chart
The chart that holds the column chart is _________ column chart
The chart that display two or more data series on a
surface is _________ column chart
The chart that is used to display discrete data column chart
_________ are not allowed in a macro name spaces
Which of the following tool cannot be used to view the
excel web page_______ excel97
The wizard that used to build an interactive table from
data existing on sheets pivot table wizard
The chart that is used for displaying stock market
information line chart
In excel, the subtotal command also generates grand
total after the last group subtotal_________ true
In advanced filter , the criteria occupying multiple
columns but more than one row, is considered as an
________ criteria. and

The stacked bar graphs can be represented in __________ 3-dimensions

A pie chart can represent only one data series at a time true
The ______ generates a summarized report in tabular
form in an interactive manner Data table
Which one of the following statements related to stock It is also called as high-
chart is NOT TRUE ? low-close chart
The state government needs to finalize a five years plan
to implement 100% literacy in the state. Which one of
the following will be the best tool that should be used to
work out the plan ? Pivot table

Forecast'99 is a group working on exit poll. It wants to


know how many seat ABC party needs to won in totality
to obtain majority to form the government. Which one of
the following will be the tool that will help the team ? Goal seek

Which one of the following will be the tool that provides


a way to view and compare the results of all the
different variations together on the worksheet ? Goal seek
A ___________ is an excel file where the user stores his
data Workbook

Performing
Spreadsheets are useful for _______________ calculations.
Which one of the following is NOT the component of the
pivot table ? Column field
Excel allows upto ______ levels of sorting two

Filtering rearranges a list to display the required records true


The stacked bar graphs can be represented in
_____________ 3-dimensions
The ______ generates a summarised report in tabular
form in an interactive manner Data table

It displays the data


Which one of the following statements related to series one on top of the
stacked bar chart is NOT TRUE ? other.
The state government needs to finalize a five years plan
to implement 100% literacy in the state. Which one of
the following will be the best tool that should be used to
work out the plan ? Pivot table.

Forecast'99 is a group working on exit poll. It wants to


know how many seat ABC party needs to won in totality
to obtain majority to form the government. Which one of
the following will be the tool that will help the team ? Goal seek
Which following function is used in subtotal option ?
______________ Count.
A workbook consists of many ________ databases
It is a tool for
summarizing and
analyzing the data
Which two of the following statements related to pivot records in an
table are TRUE ? interactive manner.
Which one of the following is NOT a What-if analysis tool
? Goal seek.
The _________ wizard separates contents in a cell into
different cells text import wizard
A spreadsheet is a grid of rows and columns and is
called as a ________ worksheet
Pick out the window that is not a form of excel
___________ application window

On an Excel sheet the active cell is indicated by… A dark wide border
Cell A4 =2 and A5 = 4. You select both cells and drag
the fill handle down to A8. The contents of cells A6, A7,
and A8 are _____. 8,16,32

your formula has a


If a cell shows  ####### , it means that _____. syntax error
Which is not an advantage of using computerized ability to generate
spreadsheets? tables

The gym teacher has a new program to calculate


physical fitness in terms of weight and exercise. The use
inputs different weights or amounts of exercise to
determine the related physical fitness. This "What if"
program is most likely which of the followin word processing
The difference between the highest and the lowest
values. Range
Spreadsheets can be used for... Producing graphs

double-click any cell in


To select a column the easiest method is to … the column
If you press _____, the cell accepts your typing as its
contents. ENTER
The contents of cell C15 is =AVERAGE(C3:C14).
AVERAGE(C3:C14) is known as array.

All of the following are considered constants EXCEPT: 100


Which of the following may NOT be included in a
formula? Cell references
Which of the following is NOT a valid mathematical
operator in Excel? ^
Given the formula =B5*B6+C3/D4^2, which expression
would be evaluated first? B5*B6
Which part of the formula +E12/6+(G7*SUM(H9:H11) is
considered a constant? E12

How can you tell which cell in a worksheet is the active It is surrounded by a
cell? heavy border.

By clicking in a
How can you change the active cell? different cell

Which of the following would you use to change the font


size of a cell in Excel? The Standard toolbar

The command that will save the current workbook with a the New command on
different file type is: the File menu.
The command that will print an Excel workbook is found
on the ____________ menu. File
In the Save As and Open dialog boxes, the ___________
view shows the file size as well as the date and time a
file was last modified. Preview
Which of the following commands will automatically
adjust cell references in formulas? Insert
Which of the following commands will remove cells,
rows, or columns from a worksheet? Clear
Which of the following options is NOT controlled through Orientation (portrait or
the Page Setup command? landscape)
Which command enables you to change the margins for
a printed worksheet? Options
All commands are carried out on a rectangular groups of
cells known as a: worksheet.
Which of the following is a valid cell range? 6
In a copy operation, the cell(s) you are copying from is
called the: copy range.
In a copy operation, the cell(s) you are copying to is
called the: paste range.
Which of the following commands is needed to duplicate The Duplicate
the contents of a cell in another? command
A cell reference that does not change during a copy
operation is known as absolute
Which of the following is considered an absolute cell
reference? B4
Cell E3 contains the function =AVERAGE(A3:D3). If the
contents of cell E3 are copied to cell E4, what will be the
contents of cell E4? #DIV/0!
Cell E3 contains the function =AVERAGE($A$3:$D$3). If
the contents of cell E3 are copied to cell E4, what will be
the contents of cell E4? #DIV/0!
Which of the following commands is needed to transfer
the contents of one cell range to another? The Move command

The F4 key is used to: copy and paste cells.


Which of the following quickly copies the formatting of a
selected cell to other cells? the Fill Handle

Select the Insert


Which of the following will insert a hyperlink into an Hyperlink command
Excel worksheet? from the File menu.

Conditional formatting applies formatting to a cell based whether the cell has a
on: formula or a value in it.

text with a two-digit


If you enter a date into a cell, Excel stores the date as: year.
You created a worksheet on July 30 and entered the
=Today() function in cell E17. You opened that
worksheet again on August 31. What will be displayed
in cell E17 on August 31? Jul-30
subtracting the
The number of days between two cells containing dates earlier date from the
can be calculated by: later one.
The function key that is used to quickly edit the contents
of a cell is: the F4 key.

What will be stored in a cell if 3/4 is entered in it? 03-Apr

A user’s response to the InputBox function can be stored


in: a cell on a worksheet.
The cell reference for a range of cells that starts in cell
B1 and goes over to column G and down to row 10 is
_____. B1-G10
The teacher has a spreadsheet showing all Year 10
students and their marks in one Mathematics test. To
find the student with the highest mark, which of the
following functions should be used? AVERAGE

Which chart type best shows proportions of a whole? Combination


Once a bar chart is
chosen it cannot be
changed to a column
Which of the following is TRUE regarding chart types? chart.

To select several cells or ranges that are not touching hold down the CTRL
each other, you would _____ while selecting. key

Your Institute teachers have set an assignment on


‘Studies’. You are required to use a spreadsheet to
record all that you study on each day for four weeks.
You decide to show each week’s data with an
accompanying graph. What is the best way of doing this Use tables
What would be the best method to quickly copy the
formula from the active cell to each cell below it? Paste
To arrange rows in alphabetical order based on column
A, you need to use the command _____. Tools | Sort
What can you NOT do with a spreadsheet? Analyse data

To print just part of a sheet, you would select what you


want to print and _____ . click the Print button
Spreadsheets can be used for... producing graphs

The formula that will add the value of cell D4 to the


value of C2 and then multiply by the value in B2 is _____. (D4+C2)*B2
Which of the functions is not valid for performing
addition 0

The default orientation for the printed page is _____. portrait


Which is not a valid cell address? AD213

The World Wide Web was devised by _________ CERN

The useful URL schemes are_____ and______ yahoo and infoseek

news groups,yahoo and


The other ways of getting connected to the net are_____ infoseek

bulletin board
BBS stands for______ system
USENET is a BBS on ____ scale small
WINSOCKS is expanded as______ windows socks
IETF Level 2 HTML DTD supports graphical browsers like
_______ Mosaic
The space used by Netscape to store the retrieved page
is called______ buffer
The principles, means and methods for rendering
information unintelligible and for restoring encrypted
information to intelligible form. Photography
A long string of seemingly random bits used with
cryptographic algorithms to create or verify digital
signatures and encrypt an decrypt messages and
conversations. Key

Protected/private character string used to authenticate


an identity or to authorize access to data. User-id
The successful act of bypassing security mechanisms of
the system. Penetration
A set of rules and formats, semantic and syntactic, that
permits entities to exchange information. Acts
An attempt to get access to a system by posing to be an
authorised person. Spoofing
An action or event that might prejudice security. Loss
According to information Technology Act, 2000, To
investigate contraventions the controller of certifying
authority shall exercise the like powers to that of Sales - tax authorities
Malicious software. Utility
None the person who is known as father of Internet Tim Berner Lee
This website is the biggest bookstore on the earth. Etrade.com

When we talk of Data Transmission modes, then ATM Automated Tailor


stands for Machine
A sequence of bits or characters that identifies the
destination and the source of a transmission. Acts
The means of communicating between networks Router
A group of computers and other devices dispersed over
a relatively limited area and connected by
communication links that enable a device to interact
with any other on the network. LAN

hyper terminal tracing


The term HTTP stands for program
National Informatics
A NIC is considered as Center
A hub is a device that can connect Only Computers

Which of the following is true concerning the function of Concentrates


a switch? connectivity

What do routers connect? Bridges and Repeaters.


What does a router route? bits
Software which prevents external access to a system is
termed firewall
If four computers are connected to a hub and then to
the internet, how many IP addresses are required for
these 5 devices? One
Which of the following in an OSI layer Physical Layer
When creating a network from just two PCs, what kind of
cable would be used to connect them? RG7U

An IP address is a Physical address


To construct a simple LAN of 4 computers, you would
connect them with ______connect them A cable

What happens to data that is ruined before reaching to Data return to the
receiver sender

Bluetooth is Wireless technology

Which is not one of the recognized IEEE sub layers? Physical Layer
The most preferred number system to represent a IP
address is Binary
A MAC address is of 48 Bits
software that facilitates
connection to the
Protocol is internet
A ............... is a LAN-based computer with software that
acts as a controlling device for controlling access to at
least part, if not all, of a local area network and its
available resources. Novell PC

What is the biggest disadvantage of the Ring topology? There isn't one
The .............. of the network concerns how network
devices are physically (or optically) interconnected. Physiology
The principal topologies used with LANs are: Bus
What are the various types of bus architecture? Linear
What are the various types of ring architecture? Parallel
In a ................., each workstation attaches to a common
backplane via its own physical cable that terminates at
the hub Ring
In a ............... , each work station is directly connected
to a common communications channel Ring

Which one of the following is NOT a network topology? Star


In a .............. , the cable system forms a loop with
workstations attached at various intervals around the
loop Ring

The Media Access Control (MAC) is a sub layer of the: Network Layer
What are the most common LAN technologies used in Ethernet, token ring,
networking today? DecNET
Modem speeds are measured in bps
LAN speeds are measured in bps

usually higher than


WAN speeds are LAN speeds
Accessing the Internet from a typical home PC requires
the use of CD-ROM drive
must use the World
To use the Internet, you Wide Web

The worldwide web server uses the following standard


interface to act as the middleware: key gateway interface

a Novell Interface
An NIC Controller
Accessing the Internet from a typical home PC requires
the use of CD-ROM drive
The most widely used network operating system on PC
LANs is Linux

have to do with
compression of
JPEG and MPEG graphics and video

must use the World


To use the Internet you Wide Web

A multiplexer is a form of Printer


provides access to
An ISP the Internet

FTP is used to send email

Telnet used to send email


used to protect a
computer room from
A firewall is fires and floods
A proxy server is a backup server

A search engine is hardware


To look for information about interest areas on the
internet, the user should use a scanner
provides access to
An ISP the Internet
FTP is used to send email

Telnet used to send email

The layers cannot


Which of the following is a true statement about the OSI communicate with one
model layers? another.

It is one large
Which of the following is NOT true about the Internet? network.
The traditional intent and impact of this common type of
attack is to prevent or impair the legitimate use of
network resources. Password cracking
used to protect a
computer room from
A firewall is fires and floods
Which of the following is NOT an example of a DoS
attack that is popular among hackers? IP flood
A ____________ attack is when a hacker sends a
continuous flow of packets to a system. hack

One defense option on a large network is to configure a


____________ to disallow any external traffic. firewall
A proxy server is a backup server

Which of the following would be performed on a network


server and not normally on individual workstations? Apply security patches

All sites are safe and


What can be said about the safety of the Internet? reliable.
To secure communication network against wire-tapping
the most effective control is Use of identifiers

One way that a virus CANNOT spread throughout a by attaching to an e-


network is: mail.
Which of the following is NOT a means of monitoring
employee use of company technology? Phone
____________ would be used by parents to monitor their
children on their home system. A Trojan horse
The formal rules and parameters which are established
to permit a microcomputer to communicate with the
mainframe computer as though it was a terminal of the
mainframe are called Modems
The two most common tools used to help with extracting cookies and Trojan
information are: horses.

Which of the following would NOT be considered an An attack on a system


example of cyber terrorism? for personal gain
Which of the following would be a form of cyber
terrorism? Economic damage
Crashing the stock
Which of the following is a likely target of a cyber market, as in the
terrorist that would cause considerable loss of life? 1930s

An organisation is upgrading its telecommunication


lines. Which is the least important objective while To carry more network
upgradation capacity
A company posts a price list of its products on its
website. The advantage to the customer is that the
company can set its prices very high
Which of the following is an easy-to-use service to get
information on someone? People Search
Which of the following pieces of information would NOT
be found online? Name of your bank
Which of the following is the most common danger on
the Internet? Virus

The famous Nigerian Fraud scam offered victims the


opportunity to: buy stocks.
The fraud type that sends e-mails that claim to be from
legitimate sites in order to obtain sensitive information
is called _________________. Shill bidding
Using the Internet to pursue, harass, or contact another
in an unsolicited fashion is called: Internet stalking.
Setting your privacy settings in Internet Explorer to
medium is one way to block: pop-ups.
What is the best means of protection from cyber Use a fake e-mail
stalking? address.

Which of the following is not an appropriate control over


telecommunications software Encryption
Encryption techniques can be implemented in Hardware-
Software I only
Which protocol would be used to download a free anti-
virus program from the Internet? irc
The major advantage of the checksum program is when Adds more bytes to
it programs

Which of the following is a Web browser? HTML


A Web page is another name for ----------- Web query.
Domain names must contain a description of the type of
organisation that the domain represents. A very .com is used for
common abbreviation used include: company
A standard language for creating and formatting Web
documents is: round trip HTML.
The Web page format in which all elements of a Web
page are saved as one file is called: XML.

using Internet Explorer


to view a Web page
that is stored on the
hard drive on your
Which of the following requires an Internet connection? computer

Mr Rao wants to find a website that he briefly browsed Click on the Back arrow
over yesterday. After turning on his computer how until the desired site is
would he do this? found
the Refresh
Which of the following is used to update a Web query? command

You download from the internet, a screensaver, a ten-


second sound file and a ten-second music video clip. You
also add a hyperlink. Which of the media elements has
the greatest effect on the file size? Hyperlink
When saving a photograph for use on a website, which
format should you choose? BMP
While researching the Direct taxes assignment, you find
a useful website. What is the most efficient way to
access the site at a later time? Save it to a floppy disk.
A system that uses the Internet for business-to-business
interaction is called a(n): extranet.
A block of text automatically added to the end of an
outgoing email is called an attachment.
_________ refers to the use of Internet technologies for
placing telephone calls. VoIP
Desktop client,
Most client/server applications operate on a three-tiered application, and
architecture consisting of which of the following layers? database.
Which do you NOT need to connect to the Internet? Modem

What does FTP stand for? File Transfer Program


So computers can be
referenced by a
What is the purpose of DNS? name
Which of the following is NOT a properly formatted IP
address? 193.1.2.3
Which of the following is a properly formatted email paul .trigg @ domain.
address? org. uk
The Internet is controlled by whom? The US government

What does IRC stand for? Internet Relay Chat

If you do not pick up your email for a week...? It will be deleted

Hyper Textual Mark-up


What does HTML stand for? Lingo

Receiving messages
automatically from
What is a disadvantage of joining a mailing list? anyone in the group

In Powerpoint2000 ,the built-in professional design


elements are clipart & auto shapes

Selection handles are the 8 small ___________ that


appear around the object, when an object is selected circles

The _______ is an invisible matrix of vertical and


horizontal lines that covers the entire slide workspace square

_______ are drop-down menus that appear when the right


mouse button is clicked on the screen element tool bars
________ and ______ have the ability to add a lot of visual clip gallery & word
impact into the PowerPoint presentation art
_______ is a motion picture or any animation file wave file
In visual basic, when a record pointer reaches to the last
record, _______ property of a recordset object is
automatically set to ______ eof,false
In visual basic, the explorer view of a project is
displayed in ___________ properties window
In visual basic, when a record pointer reaches to the first
record, _______ property of a recordset object is
automatically set to ______ bof,false
In visual basic, _______ is a method to convert a string
into integer. value()

In visual basic, in a shape control, a vb statement gives


Shape1.Shape = 2. What type of shape should we get? circle
In visual basic, a timer event is only available in timer
control. true
In visual basic, vbred or vbgreen or vbblue are the
property values of a backcolor of any object true
In visual basic, _______ is a property of a textbox control
to set a color of a text. fontcolor
In visual basic, _______ property of a textbox control is
set to _______ to underline a text underline,true
In visual basic, _______ property of a textbox control is
used to change the size of text. textsize
In visual basic, the interval property of a timer control is one- millionth of a
given in ________ second
In visual basic, _______ property of listbox control counts
the number of items in the list count
In visual basic, the properties of various controls can be
set using __________ form layout window

In visual basic, vbinformation, vbcritical, vbexclaimation


are the values of _______ in a messagebox function. title
In visual basic, ________ is a function which displays a
message and it also allows the user to enter values in a
form object msgbox()

In visual basic, using a data control, ________ is a


recordset type which allows to add a new record and
also to update existing record in a recordsourse object opendynaset

In visual basic, while closing a form _______ event of a


form object is triggered earlier to terminate event. load
In visual basic, to give a backcolor or to bring in a
picture to a command button can only be done if we set
the style property to ______ standard
In visual basic, a method RGB(255,0,0) will generate
_______ color blue
In visual basic, a method RGB(255,255,255) will
generate _______ color red
In visual basic, if a user uses a shortcut key ctrl+R
_________ becomes visible. properties window
In visual basic, if a user uses a function key F4 _________
becomes visible. properties window
In visual basic, when a textbox control receives the
focus ________ event is triggered. change
In visual basic, a form is a ________ object. child
Microsoft visual basic is a Rapid Application
Development tool. true
In visual basic, when a form object appears on the
screen _________ event is triggered. load
In visual basic, to display text on a label object _________
property is used text

In visual basic, _______ object is used to access the


database and also to manage the data in the database. opendatabase
In visual basic, when a checkbox control is checked
_______ property is automatically assigned with 1. enabled
In visual basic, _______ keyword is used to declare a
variable dime
What is the extension of the Visual Basic project file that
stores the design of a user control. .ctx
Which event of a text box would you use for validating
the data entered by the user? Validate
Which of the following statements forces inline error
handling? On Error GoTo linelabel
The _______ method resets the contents of bound
controls to their original values when the user clicks on
the cancel button. UpdateControls

To deactivate the Form UnLoad event, you make the Cancel parameter to
following change in the function definiton: a non-zero value

How many root nodes can a TreeView control have? 1

Consists of several
A project group is a Project which: Programs
Procedures declared in a _____ are local whereas Form window,
procedures declared in a ______ are available to the standard or code
whole application. module
How can you keep the user from exiting a form by Place code in the
clicking the Close button? Terminate event
The _______ property enables Visual Basic to draw
complete images in memory before displaying them on
the Screen. AutoRedraw = True

You want to display the code and the description of an Msgbox err.no &
error. What would be the correct syntax? err.text

To display images to
What is the purpose of the Image List Control? the user
Which method would you use to get a free or unused
File identifier while opening any file: FreeFile
Which property procedure is used to retrieve the value
of a property? Retrieve
Which of the following can be shown to the user using Common messages
the Common Dialog control in VB? passed to Windows
Which of the following are not properties of Command
Button: Caption
Which events enable you to determine which key was
pressed by the user? Click and KeyPress
In order to access a file in Non-textual format, you have
to open file in: Ascii Format

Visual Basic displays information depending upon the CurrentX and


current value of two properties of the form, called: CurrentY
Which of the following procedure types will execute
when you assign a value to a property of an object? Property Get
In order to overlap the controls (say a command button)
during design time, we use the ‘Send To Back’ or ‘Bring
To Front’ option from the Edit menu. To change it
dynamically (i.e.during program execution) we need to Background color
change: property
Which property of the ProgressBar determines how
much of the bar is filled? Min
The ______ function can be used to run any .com, .exe,
.bat or .pif file from a Visual Basic program. Shell
The caption and the name properties of the command
button: Are one and the same
You try to initialize a new Object variable with the
following line but receive an error. What could be the You do not need to use
possible cause? Set MyVar = New Classname the Set command here

Which of the following will perform a direct execution of


a Command object? The Open method

The vb Critical symbol displays: A warning query icon

vbYesNo is an example of a(n): statement.

MsgBox statement
returns a value, while
The primary difference between the MsgBox statement the InputBox function
and the InputBox function is the: does not.
Which of the following is TRUE about a protected form
(i.e., a form where the Protect Form button on the Forms
toolbar is toggled on and is assumed to remain in that Data cannot be
position)? entered into the form.
Which event is triggered when the user moves to
another open form? Unload
The user can use ______ to remove the undesirable part
of the image clipping tool

The power presentation has a _____ for a set of


compatible colors color palette
The set three colors used for graphs and for secondary
slide items is called as ascent

There are ______ types of charts available in PowerPoint 10


_______ charts are useful while showing variations over a
period of time column
_______ are the individual pages of a presentation images
A PIE Chart is a ____ diagram that depicts the
relationship between a whole and its parts circular

Each individual piece of data in a series is called a/an entity


PowerPoint launches an OLE-compatible application Microsoft
called organization chart
When the user double-clicks on an organization chart the organization chart
object in PowerPoint is expanded
The _____ are used for selecting, editing and viewing
objects in the chart box tools

used to mange
Manager box tool in organizational chart window is organizational chart

The custom drawing tools are _______ by default turned on


Click on the box tool ______ to draw three boxes once
There are ____ default fields available in all boxes of the
organizational chart two
The _____ tool is used in the same way as we use a pen
to draw a table native tool
A/An _______ consists of smaller printed version of the
slides autolayouts
The size of the object can be changed using the ______
tool zoom
_______ is the process through which the slides in the
current presentation are included in another
presentation or application importing
________ can be used to create charts as well as
worksheets Microsoft excel
PowerPoint can import text files that have been saved in
______ format .ppt(PowerPoint)
PowerPoint outlines can have _____ outline levels nine

When a file is saved with _____ extension, the graphics


and text are also saved along with the slide .rtf(rich text format)

not displayed during


The hidden slide is the slide show
____ effect is used to introduce a slide during a slide DTS(digital track
show sound)
A _____ is a special effect that determines how the
objects appear on the slide build
The notes page is formatted based on the notes master
Pick the odd man out of the following outline view
When a new presentation is opened ,powerpoint creates
slides that have a width of _____ and a height of ______
with the landscape orientation 15 inches,10 inches
The default orientation for notes ,handouts and outlines
is ____ orientation portrait
Build effect is also called as ______ animation
Graphics for web pages are automatically stored in ____
format gif

A _______ is used to jump to any slide in the presentation hyperlink


The ______ language has been incorporated into
PowerPoint visual c++
In PowerPoint _____ is a series of commands that are
executed in sequence macro
while creating a .exe
The macro will be activated file
Developers can easily add ____ to PowerPoint 2000 by
using the programming interface virus checkers
______ determines the order in which order in which the
slides will be displayed during the show slide show
_______ is used to organize and develop the contents of a
presentation slide pane
If we save the presentation file as a metafile, it can be
opened using internet explorer

PowerPoint creates a
With reference to autocontent wizard for creating a new sample presentation to
presentation, which of the following statements are not which user can add
true words and pictures

user can insert objects


like clip-arts, pictures
stored in a separate
Which of the following statement is not TRUE files to the slides

in outline view, drag


With reference to changing the order of slides, which of the slide icon to a new
the following statement is not true location

the slide that holds the


formatted placeholders
for the titles, main text
and any background
items that user wants
to appear on the slides
is called a master
Which of the following definitions are not true templates

with notes pages view


user can prepare
speaker notes and
Which of the following statements are not true handouts
the slide that holds the
formatted placeholders
for the titles, main text
and any background
items that user wants
to appear on the slides
is called a master
Which of the following definitions are not true template
The options available in the common task toolbar does
not include slide layout

data to be graphed
With reference to chart, which of the following resides in a datasheet
statements are not true window
The format of the text entered in a title, subtitle, or
bulleted-list object is determined by the format settings
in a special slide called -------- the master slide

PowerPoint provides a _________ that searches the entire


presentation i.e., all the text objects in all the slides,
outlines, notes and handouts for spelling errors office assistant
PowerPoint's drawing toolbar contains _______ drawing
tools 10
Click _______ on the rectangle drawing tools enables us
to draw multiple rectangles once

An example of the components of a multimedia text, graphics and


presentation could include email address.
Which of the following formatting elements can be
applied to a PowerPoint diagram using the AutoFormat
tool? the Line style
Which of the following formatting elements can be
applied to a PowerPoint diagram using the Format
AutoShape command? Fill color

What happens when you double click a blank graph Excel is started so that
placeholder in a PowerPoint presentation? you can create a chart.

always taken from the


first row of data in the
The legend in a Microsoft Graph chart is: datasheet.
Suppose you are creating a Microsoft Graph of quarterly
sales by region. Which would be the best chart type if
you want to emphasize the total sales of each region? Side-by-side column

Which of the following actions will enable you to insert a Pull down the Insert
graph into a PowerPoint presentation? menu and select Chart.

If you are editing a slide containing a Microsoft Graph, It automatically


how do you display the underlying datasheet? displays in Slide view.
How do you deselect a chart that has been placed onto
a PowerPoint slide after you have finished creating the
chart? Single click the chart.

A dialog box is
displayed allowing you
to enter the name of
the Excel worksheet
that should be linked to
What happens when you click the Datasheet button on the PowerPoint
the Microsoft Graph toolbar? presentation.

What happens if you single click a chart that is not The chart is
currently active? selected.
What happens if you double click a chart that is not
currently active? The chart is selected.

a slide one bullet item


Using custom animation effects, you can build: at a time.
Which of the following animation effects can be added to
a slide? Subtle

Which of the following animations effects can be added


to a slide? Enter and exit
Which keyboard key is used to select more than one
picture on a slide? Enter

the way objects appear


Custom animation can be used to affect ONLY: on a slide.

The advanced timeline


shows the sequence in
Which of the following best describes the information which objects will
that appears on the advanced timeline? appear on the slide.
Which of the following objects can contain custom
animation effects? Clips
What type of program allows an object within an image
to be edited without affecting other objects? Paint program
Which of the following animation effects can be added to
a slide? Fly in

Once data is entered it


Which of the following is TRUE regarding the Datasheet? cannot be changed.
Graphical software tools that provide complex analysis
of stored data are: OLTP.

You can change the


appearance of a whole
diagram, but not
Which of the following statements is TRUE regarding individual shapes of a
PowerPoint diagrams? diagram.
Which keyboard key combination is used to undo the
previous command(s)? [Enter+A]

Microsoft visual basic project file has _______ file


extension. .vbg
In visual basic, _______ method is used to add an item in
a combobox add
In visual basic, _______ method is used to load picture
during runtime in an image control load
In visual basic, to populate a drive list box with a
directory list box __________ statement is used Drive1.Drive=Dir1.Path
In visual basic, to display a message in the run time
_________ function is used messagebox()
In visual basic, to populate a directory list box with a file
list box ________ statement is used Dir1.Path=File1.Path
In visual basic, ________ is a property of a recordset
object which counts the number of rows in a
recordsourse object openrecordset

In visual basic, using a data control, a record can only be


added from the last record. Adding a new record is only
possible using _______ method of a recordset object. update
In visual basic, using a data control, a record is saved to
a recordsource object using _______ method of a
recordset object. append
In visual basic, using a data control, to navigate to the
previous record ________ method of a recordset object is
used. movenext

To deactivate the Form UnLoad event, you make the


following change in the function definiton:Private Sub
Query_Unload(Cancel as Integer,UnloadMode as Integer) Cancel parameter to
To prevent the Form from closing, you will set the: a non-zero value

_______ is a word processing that is a member of the


office 2000 family Word 2000
The feature that enables user to type anywhere in a
document without pressing or tab click-n-type

The______ feature allows the user to copy and paste upto


12 items at the same time in an application office clipboard
______ and _____ key combination will extend the shift+end and
selection by one character on the left and right shift+home
web layout,
_____and_____ are improved layout in Word 2000 printlayout

The easiest way to create a document in word is wizard


In Office2000 environment the tool that makes work
easier for us is_____ office assistant
A short description of a tool bar button called the ______
is displayed when the mouse pointer is allowed to stay
for a second on the button Screen Tip
The _____ helps us to keep track of the margin of the
page tab stop
The keys that are used to navigate between headers
and footers are up arrow keys only
Pick out the element from the following that dose not
form the type of tabs for the Word 2000 left
_______are blueprints or patterns for documents of a
certain type template
The______ is used for quickly setting paragraph indention
using the mouse increase indent
Word art is text with special effect
AutoShapes in word can be created by accessing the
_____ drawing toolbar
By default, a document consists of_____ section 1
The dialog box that is used to determine the documents page setup from the
margins is file

________ is a box surrounding a page on all slides or a


line that sets off a paragraph on one or more slides border
The key that is used to perform a task to select all t he
text in the documents is ctrl+a
The key that is used to indent a paragraph is ctrl+a
The key that is used to change the font from the current
positioned in a document is CTRL+SHIFT+F
The key that is used to change the style of the
document that is from that normal to heading1 or
heading1 to other document styles. ctrl+shift+f
'Set mapping' Check control that follows a text-type
validation, we use ----------------- application for data
analysis. Excel
Excel can import data from other databases for the data
analysis. True

A System Auditor can uses CAAT tools to analyze data False


In the case of the ---------- control, it is ensured that the
data in combination with other fields are reasonable as
per standard set by an organisation. Valid Signs

--------------- function searches for a value in the leftmost


column of a table and then returns a value in the same
row from a column that we specify in a table HLOOKUP
Most of the tools use in Data Analysis depends on DDE

Analysis translates
program code of a high
level language to
How do you define analysis of an information system? machine code

What areas need to be considered in the SOFTWARE Only hardware and


design process? software

What is the function of systems software? To collect data


Deleted from the
Formatting a disk results in all the data being...? disk
Users operate the
manual system and
computer system at
What is Direct Implementation? the same time
The new system is
introduced
alongside the
What is parallel running? existing system
Instructions and
What documents are produced during the development technical
of a system? documentation

What are User Guides are used for? For technical support

Operating systems
Systems software can be categorised into: and system services

Which storage device cannot be erased? Magnetic tape storage


To maintain a backup
copy of all the
Application software are programs that are written information
Which bus carries information between processors and
peripherals? Data bus
Convert the decimal number 2989 to Hexadecimal FDDI
Which bus controls the sequencing of read/write
operations? Data bus

Peripherals that are


connected to a
What are utilities? computer.
Numbers are stored and transmitted inside a computer
in binary form

The original ASCII codes were 7 bits


A Nibble corresponds to 4 bits
More than 1000
A gigabyte represents mega bytes

A 32-bit processor has 32 registers


used to indicate
A parity bit is uppercase letters
he contents of these chips are lost when the computer is
switched off? ROM
Clock speed is measured in bits per second

Cache memory enhances memory capacity


have fewer instructions
CISC machines than RISC machines
Which parts of the computer perform arithmetic
calculations? ALU

Every data from the primary memory will be erased if Power is switched off
An RS-232 interface is a parallel interface
For print quality you would expect best results from line printer

is faster to access than


ROM RAM

increased the storage


capacity of a computer
A UPS system

smart card is a form of ATM card


Laptop computers use CRT displays
having several
programs in RAM at
Multiprogramming refers to the same time
having several
softwares running at
Multitasking refers to the same time
What are small high speed memory units used for
storing temporary results? ALU
A good way to exchange information that changes
rapidly is through brochures

Multiprogramming is a prerequisite for multitasking


Timesharing is the same as multitasking
______ is the default view in Word used for typing Editing
and Formatting the Text NORMAL
The short-cut-key that is used to indent a paragraph
spacing in the documents is ctrl+m

The short-cut-key that is used to paste the selected text ctrl+v or ins
The short-cut-key that is used for paragraph
spacing(1.5) ctrl+2
The box that separate text from the document and
allows it to behave like an independent object is known
as Text Box
The object that is used to provide information like the
title of the book, name of the chapter, page number etc. Header and Footer
The object that helps us analyzing data statistically is
known as Chart
To highlight certain parts of a page to set it apart from
the rest of the page we make use of the following
features Borders
To clear all the tabs in a document the option that is
clicked from the tabs dialog clear
The dialog box that is used to incorporate picture bullets picture bullets
into our documents or web pages is dialog box
The object that composes of set of tools which helps to
create and work on different shapes like rectangles,
circles, flowcharts etc. charts
When word is opened a new document called_____ is
displayed, where the user starts typing the content right
way doc1
______ is an online dictionary maintained by word to
obtain synonyms for words thesaurus
The thesaurus is invoked by pressing_______ shift+f7
When a new table is created the insertion point flashes
in the _____ first
By pressing the _____ key inserts a blank row after the
last row in the table tab
The ______ option enables us to convert text into a table
format convert text to table

A table consists of ______ that contain text or graphics row


The _______ option in word allows the user to
automatically correct misspell words as and when they
are typed AutoCorrect
______ is a facility that enables recording and replaying
of a sequence of keystroke Mail Merging
In Word Macros are written in _____ basic
In Word 2000 the macro dialog box is activated with the
help of ____ key combination shift+f8
________shows how a document would look like when
published on the web or on an intranet web layout view
______ is a software for sending and receiving e-mail
messages email client

________is the coding system used to create web pages html


The network that makes information easily accessible
across various networks is _______ internet
field name must be
listed in the same
order as the
Which of the following statements are false with corresponding
reference to the use of a header row source for a mail information in the data
merge source

it is not possible to
change the height of
With reference TO TABLE WHICH OF THE FOLLOWING only selected rows of a
STATEMENT ARE false table
The alignment available for tabs does not include left

A new section is
created in order to
Which of the following statements related to a Section change properties like
Break are True number of columns
The user can set a spelling checker to skip the marked
part of the next true

New option under the file menu of word creates a new


blank document that is based on the normal templates true
The user can split the screen only into two parts true
The features that enables the user to type text graphics
tables anywhere in the document without pressing enter
or tab drag & drop
The user can modify the picture from the clip art true

automatically corrects
With reference to auto correct which of the following common typing,
statements are false spelling errors

With the reference to password protected documents password can not


which of the following statements are false include spaces
The alignment available for tabs does not include left
a .ppt file can not not
be inserted at specified
position in the current
Which of the following statements are False document
Drop Cap tool does not work for the contents in the
table format true
The user can split the screen only into two parts in MS-
Word true
The special symbols that are inserted using "insert
symbol" option of the word can not be printed by the
printer as they are not standard keyboard symbols true
The "format columns" option allows to create columnar
text up 12 columns only. true
The document that makes the user to organize and
maintain a long document, such as multipart report or a
book consisting of chapters Master Document
The view that enables us to view how objects will be
positioned on the page when it is printed Print Layout View
The mode that is initialized or toggled to if the user is in
a position to overwrite the text in the word Insert Mode

Veena is entering a paragraph in a word processing


program. When the cursor gets to the end of a line, what
is the best way to get the cursor to the next line? press the return key
How are data organized in a spreadsheet? layers and planes
Which key moves the cursor to the beginning of the next
line of text? tab
Veena typed the following sentence: "The girl was very
beautiful." In which word processing utility could she
find a synonym for "beautiful"? grammar checker

send a public message


Using an electronic bulletin board, Seema can do all of to friends interested in
the following except which one? one topic
Aryan has created a ten-page story, but only wants to
print the first two pages. What printer command should
he select? Print all
What process should be used to recall a document
saved previously? Enter
Which is used to indent text within a document? closing
Desktop publishing is a more sophisticated form of
which of the following types of software? database

What is a Word Processor used for? To analyse figures


What is a picture that is saved on a diskette and can be
pasted into a document? subscript
What is a Word Processor used for? To analyse figures
What basic tools would you find in the Edit menu of a Clear, replace and
word processor select

Text at the bottom of


What is a header in a document? every page

Mouse, printer and


processing system
What hardware is essential for a word? keyboard?
The user could take a picture from a magazine and
insert it into the document by using a Browser
Clear, replace and
What basic tools would you find in the Edit Toolbars
Assume you are creating a two-column newsletter.
Which type size is the most reasonable for the text in
the columns? 6 point
Given the default left and right margins, and ½-inch
spacing between columns, the width of each column in a
two-column document will be: 2½ inches.

Assume you have made all appropriate selections in the


Columns dialog box in Word, but cannot see any You are not in Print
columns on the screen. What is the most likely cause? Layout view.

While word processing, in which of the following to store a file on the


situations would Tom use the "Copy" command? hard drive
Data about a set of
What does a document contain? similar things

Before submitting your work you want to find any words


spelt incorrectly. Which of the following would you use? Thesaurus

What command in a word-processing program can be


used to change the word ‘him’ to ‘her’, and also the
word ‘he’ to ‘she’ in the given phrase? “On a cold and
still night, the only sound that could be heard was the
owl that had ade its home in the nest outs Paste

What edit commands would you use to insert a


paragraph from one document into another document,
while still keeping the paragraph in the first document? Copy, then paste
To give the original
author a chance to
accept suggested
Which of the following statements would NOT be a changes from the
reason for showing suggested revisions in a Word person who entered
document without changing the original document? the revisions

A line appears through


Which statement is NOT true regarding revisions made text that is to be
in a Word document? deleted.

Through the Edit menu


How are suggested changes entered for review on an by choosing Track
initial Word document? Changes command

The Versions
command will allow
you to save multiple
versions of a
document, including
any changes that
may have been
Which of the following is TRUE about saving a document made to that
using the Versions command? document.

What happens when you open a document that has All versions are opened
been saved using the Versions command? automatically.
You have used the word ‘discover’ four times in an
English essay you have created using a word processing
program. You would like to find another word of similar
meaning to use instead of ‘discover’. Which of the
following would you use to do this? Dictionary
Word displays a list
When opening and working with multiple versions of a of the dates and
document, how can you tell which is the most recent times each file was
version? saved.
Various fields are added to a regular document to create
a special document called a form through the
____________ toolbar. Fields
Which of the following types of fields CANNOT be
inserted into a form? Check boxes

Which of the following is TRUE related to editing Comments cannot be


comments in a Word document? edited.
Text at the bottom of
What is a header in a document? every page
In your English essay you notice that the paragraph at
the bottom of page 1 continues on to page 2. You would
like to make this paragraph start on page 2.What would
be the best way to do this? Press tab.
Tables in a document help you to easily arrange all of
the following EXCEPT: text.
To identify a document, it is helpful to include the file
name on each page as a header/footer.
Which of the following tools will copy the formatting of
selected text to other places? Copy button
What is the name of the process of determining the
cause of errors in a macro? Fault Finding
Drop caps are added to a Word document using the
___________ menu. Insert

a section of white
text on a black
A reverse in a newsletter is: background.
setting it in larger
A pull quote is best emphasized by: type or font size.

The reverse technique


means to add dark text
Which of the following definitions is CORRECT? on a light background.

Pertaining to newsletters, which of the following cannot The width of each


be changed using the Columns command dialog box? column
As related to type size, how many points are there to
the inch? 6

Assume you are working on a newsletter in which the


masthead extends across the top of the entire first
page. The rest of the newsletter has two columns. What
is the minimum number of sections in the newsletter? One

Which of the following is NOT correct with respect to Press Ctrl+Enter to


page, column, and section breaks? create a page break.
Which of the following would be the most appropriate
font for a newsletter headline? A serif font at 10 points
Which of the following is the default Word column width? 2 inches

Sequence Check is a --------------- level control check. Field


Analyse data over two or more periods is called
----------------------- analysis Horizontal

We use Hash Total to identify ------------ within a series


where there is a definite relation between items Duplicate Value
Analyse fields by arranging them into rows and columns
is called Cross Tabulate
--------------------- function searches for a value in the
leftmost column of a table and then returns a value in
the same row from a column that we specify in the
table. RAND()
To import data from Access to Excel ,it is not possible to
link between Access and Excel sheet TRUE
The GAP detection options can be used to test for
completeness of data. TRUE
Exception testing can be used to identify -----------------
items Unusual
Data validity test represents exception testing
Year end ledger, inventory files or transaction files can
be tested for cut-off , to ensure that the data has been
provided is for the correct audit period True

In Range Check , the data may not be in proper


sequence but should be within a predetermined range True
In ---------------- Check data entry follow a particular
sequence and also a predetermined range. Limit

Virtual memory is related to virtual reality

Multiprocessing is same as multitasking


To help keep sensitive computer-based information
confidential, the user should save the file

What is the function of a disk drive? to calculate numbers


A 4GL is Uses Cobol
A nanosecond is 106 sec
What small, hand-held device is used to move the cursor
to a specific location on the screen? a keypad

data to be transferred
The memory address register is used to store to memory
data to be transferred
The memory data register is used to store to or from memory

an instruction that has


The instruction register stores been decoded
Which of the following is used to indicate the location on
the computer monitor? a cursor
A mathematical procedure that can be explicitly coded
in a set of computer language instructions that
manipulate data. Formula
Which of the following translates a program written in
high-level language into machine language for
execution? Assembler
Detecting errors in real memory is a function of Memory protection
To find where a file has been saved on disk, the user use the directory
should search tools
A series of instructions telling the computer how to
process data or files is defined as a Network
save copies of the file
To ensure that data is not lost if a computer system with the same name on
fails, the user should the system
Having a single CPU alternatively process tasks entered
from multiple terminals is called Multiprocessing

The place in the CPU where the data and programs are
temporarily stored during processing is called the ROM

All are examples of computer software except Firmware


Computer manufactures are now installing software
programs permanently inside the computer. It is known
as Firmware
Which of the following file organisation forms most
efficiently allows access to a record Sequential
The part of the computer system controlling data
manipulation is called the Operating System
For direct access storage devices the recording area is
divided into Tracks and Sectors
Character, field,
The data hierarchy from the largest to the smallest is database
Which of the following hardware or software system
controls provides a detailed record of all activities
performed by a computer system Valid character check
Which one of the following parts of a computer is
necessary to enable it to play music? Sound card.

An educational CD-ROM on Indian Poets contains 1000


pages of text, 500 colour pictures, 15 minutes of sound
and 1 minute of video. Which of the four different media
listed takes up most space on the CD-ROM? Text
Which one of the following printers is suitable for
printing sprocket fed carbon copies? Laser

viewing an
encyclopaedia CD-
Multimedia software can be most productively used for ROM.
To be effective a virus checker should be replaced regularly
Which one of the following software applications would
be the MOST appropriate for performing numerical and
statistical calculations? Database

get into the system


Passwords enable users to quickly
How many bytes do 4 Kilobytes represent? 512
Back up of the data files will help to prevent loss of confidentiality
Which one of the following is the MOST common internet
protocol? TCP/IP

access to the internet


The advantage of a PC network is that is quicker
The term A:\ refers to a file name

UPS stands for universal port serial

The main problem associated with uninstalling software orphan files can be left
is that on the system
You are conducting research for a Income Tax
assignment. The raw facts you collect are called data.

Graphical
A flow chart is the representation of logic

Purchase, sales,
A voucher entry in Tally is done for receipt, payments etc.

Passwords are applied to files in order to assist in maintenance


Each of the following is an enabler of IT-business senior executive
alignment except: support for IT.
The basic systems model is used to describe virtually all
information systems and it consists of the following
elements: input.

The use of computers


to design state-of-the-
art, high-quality
What is a computer-aided design system? products.
A(n) __________ offers a solution package for an entire
industry. specialist or functional
File extensions are used in order to name the file
Information systems controls include all of the following
EXCEPT: preventive controls.
Hashing for disk files is called external hashing
Components of expert systems include: a) inference
engine; b) user interface; c) knowledge base; d) fuzzy
logic A: (a) , (b), (d)
Black box testing and white box testing are part of: corrective controls
What is the term used to describe the point of
interaction between a computer and any other entity,
such as a printer or human operator? Component
The advantages of CASE tools are: a) reusability; b)
maintainability; c) portability; d) flexibility (a), (c), (d)

Which of the following is an acceptable way to shut


down the computer? Press the reset button.
Yesterday, in your music class you saved your
compositions as MP3 files. Today, you cannot remember
where you saved them. Which is the best way to locate
the files? Create the files again.

Components of an information system model are: a)


applications architecture; b) functional architecture; c)
technology architecture; d) information architecture (a), (c), (d)

Benchmarks form part of: detective controls


Continuity controls include: a) record counts; b) date
checks; c) label checks; d) run-to-run totals (a), (c), (d)

Which is not part of help desk documentation: problem logging


Testing of individual modules is known as: unit testing
Design phase of CASE tools includes: a) data
architecture; b) decision architecture; c) interface
architecture; d) presentation architecture (b), (c), (d)

Which is part of installation testing: benchmark testing

The computer operating system performs scheduling,


resource allocation, and data retrieval functions based
on a set of instructions provided by the: Multiplexer.
Which of the following falls under multimedia data: a)
text; b) images; c) video; d) audio (a) to (d)
Which of the following procedures should be included in Replacement personal
the disaster recovery plan for an Information Technology computers for user
department? departments.

Designing relationships among components is part of: architectural design


Several Computers connected together is called: Client-server
Which network topology uses a Hub? Star
Which of the following topologies is used for Ethernet? Star

To maintain a backup
copy of are written all
Application software are programs the information

Which type of file search method requires a computer


first read all locations preceding the desired one Direct

Which of the following areas of responsibility are Systems analysis and


normally assigned to a systems programmer in a applications
computer system environment? programming.
Which of the following is recommended when many A sequential file on a
searches for data are required disk

It is unlikely that a magnetic tape containing several Tapes can only be read
thousand blocked records can be used on two machines by the machine on
of different architecture directly because which they are written
Which component of the CPU has the most influence on
its cost versus performance Data path part

Which of the following terms applies to network used to


connect computers with other computers, peripherals
and workstations that are in fairly close proximity Distributed systems

Can send data to a


Intelligent terminals differ from dumb terminals in that computer and receive
they data from a computer
A computer is to be linked to 8 terminals using a single
communication link. To permit simultaneous terminal
operations, communication path will require which of the
following Mixer
Allows computer
signals to be send over
A modem is a device that a telephone line
A LAN includes 20 PCs, each directly connected to the
central shared pool of disk drives and printers. This type
of network is called a Planetary network
A computer based system for sending, forwarding,
receiving and storing messages is called an Office Automation
If a workstation contains a processor, monitor, screen
manipulation device, printer, storage and
communication capabilities, it is said to be A dumb workstation
Time of day control
Terminal hardware controls include locks

RS-232 is a Type of cable


A compiler does a
conversion line by line
What is a compiler? as the program is run

Feasibility study,
system design, and
What are the stages in the compilation process? testing
Which of the following is not a data transmission coding
scheme CRC

An interpreter does the


conversion line by line
What is the definition of an interpreter? as the program is run

A device used in data communications to divide a


transmission signal into several sub-bands is known as a Modem
Third generation languages such as COBOL, C, and
FORTRAN are referred to as High-level languages

Serial Communication is used over long distance It is faster than parallel


because it communication

In what areas is the COBOL programming language Financial sector and


used? engineering

Communicate with the


The primary function of a front-end processor is to console operator
Specification and
What is the first stage in program development? design
Which of the following is not used for data transmission
within a local area network Fiber Optics

The design of the


screen the user will see
and use to enter or
What is System Analysis? display data
A device to device hardware communication link is
called A cache

The different types of


What will a good software provider consider? network to be used
The topology of a network can be each of the following
except Star
What is the 8-bit binary value of the decimal number
85? 10101010
Which is the most common data transmission error
checking method Parity
What is the decimal value of the binary number 1111? 15
Which of the following devices merges communication
signals onto a single line Port
What is the decimal value of the octal number 215? 327

Which tool is used to help an organization build and use


business intelligence? Data warehouse

Cache memory enhances memory capacity


What is the decimal value of the hexadecimal number
FF? 30
Numbers are stored and transmitted inside a computer
in binary form
What is the hexadecimal value of the decimal number
1476? 4C5
A byte corresponds to 4 bits
Basic Coding
What does EBCDIC coding of numbers mean? Description
A Kb corresponds to 1024 bits
What is the binary sum of 01011 and 00101? 10000
Information is stored and transmitted inside a computer
in binary form
Where would you find the letters QWERTY? Mouse
used to indicate
A parity bit is uppercase letters
Because it squeaks
How did the computer mouse get its name? when moved
Clock speed is measured in bits per second
What are you most likely to use when playing a
computer game? Touch screen
CPU performance may be measured in BPS

A digitising tablet can be used for? Printing letters


In processing cheques which of the following I/O
techniques have banks traditionally used OCR
Which of the following is a pointing device used for
computer input? Touch screen
increased the storage
capacity of a computer
A UPS system

What does a light pen contain? Refillable ink


The capacity of a 3.5” floppy is around 100K
What general term describes the physical equipment of
a computer system, such as its video screen, keyboard,
and storage devices? hardware
Where would you find the letters QUERTY? Mouse
What are you most likely to use when playing a
computer game? Touch screen
A digitising tablet can be used for? Printing letters
Which of the following is a pointing device used for
computer input? Touch screen

What input device could tell you the price of a product Mouse
Where would you find a magnetic strip? Credit card
Writing on a hard
Hard copy is a term used to describe...? board
What are the individual dots which make up a picture on
the monitor screen Called Coloured spots
A daisy wheel is a type of...? Printer
What input device can be used for marking a multiple-
choice test? Mouse
Laptop computers use CRT displays

QWERTY is used with reference to screen layout


What input device could tell you the price of a bar of
chocolate? Mouse
A GUI is hardware
Where would you find a magnetic strip? Credit card
having several
programs in RAM at the
Multiprogramming refers to same time
having several
programs in RAM at the
Multitasking refers to same time

Multiprogramming is a prerequisite for multitasking


First - generation
UNIVAC Computer belongs to the computers.
Timesharing is the same as multitasking
Name the first Indian Super Computer? Vishwajeet

Disk fragmentation is caused by wear

The technology which is used to check answer sheets of


multiple-choice questions in civil services or similar Bar code Reader
examinations is: - Technology

A compiler is a fast interpreter


Which printer among the following is fastest Drum Printer
“Zipping” a file means encrypting it

Very important reader


What does acronym VIRUS stands for user sequence

An impact printer creates characters by using...? Electrically charged ink


A client-server system is based on mainframe technology
A nanosecond is 10-6 sec
A procedural control used to minimize the possibility of
data or program file destruction through operator error
is the use of Limit checks
_______ software enables users to send and receive data
to/from remote computers application
A _____ is a running instance of an application project
Splitting of CPU's time for different tasks _______
prevents time slicing multiprocessing

______ computers are used in large organizations for


large scale jobs which have large storage capacities mainframes

_______ is responsible for all calculations and logical


operations that have to be performed on the data control unit
______ printer use laser light band printer
______ software enhances the user to enter ,store,
manipulate and print any text data management
______ software enables users to send and receive data
to/from remote computers integrated software

_______ is the temporary storage place for deleted files my computer


_____ is a collection of related fields field

_____ language consists of strings of binary numbers assembly language


______ symbol is used to represent processes like
assigning a value to a variable or adding a number terminator symbol

_______ is an example for micro computer PC-at


_________capability supports concurrent users doing
different tasks multiprocessing

The ______ do not have processing power of their own


and has only a screen, keyboard and the necessary
hardware to communicate with the host. For this reason,
the terminals are referred as_______________ "dumb terminals"
A______is nothing but a PC with a network operating
system wan
_____system is responsible for handling the screen and
user I/O processing host
The______ handles data processing and disk access in a
Client/Server architecture host
Both the DBMS and the application resides on the same
component in a ____system PC
When all the processing is done by the mainframe itself,
the type of processing is sometimes called as server processing

DBMS models can be grouped under____ categories four


file management
______is the most advantageous database system system
A new user initiates a new process of execution at the
background,while the user can continue his query
process as usual in the foreground. This situation is
referred to as ______ multiprocessing
The process of data being automatically written to a
duplicate database is called______ repairing

Modem stands for __________ . Code/De-code


Multiple changes to the same record or a field are
prevented by the DBMS through______ fixes

_________allows an application to multitask within itself multiprocessing

LAN stands for __________ . Linear area networks


New process of execution is referred to as______ task

Integrated system
ISDN stands for _______. dynamic networks.

_____________ is the Worlds largest computer network . Ethernet


_______is/are a popular front end tool visual basic

When LAN connected together ,it is called __________ . MAN

Transfer control
protocol/Internet
TCP/IP stands for _________ . protocol
Data is broken into small unit called __________ . Cells

System modulation
SMTP stands for __________ . transfer protocol
The __________ protocol is a network protocol to be built
for the World Wide Web . Transfer Protocol
Aggregate transfer
ATM stands for __________ . mode
The computer which can receive data from other
computers on the network and print it is _______ File server
The hardware and the software requirements together
form the_____ platform
ATM, Asynchronous transfer mode is a __________
technology. MAN and WAN
__________ is designed telephone system ISDN

Internal Services
Expansion of ISDN is ________ Digital Network

Expansion of WBT is ______________ Web based Training


_________ connects LANs. Bridges
Collection of instruction is called a _____ procedure
Combination of alphabetic and numeric data is called
_____ data alpha numeric

Computers can be classified based on ______,______and space occupied, price,


_______ no. of users allowed
_________ are used in large organizations for large scale
jobs mini computers

_______ is responsible for feeding data into the computer input


_______ is the capability of the o/s to run numerous
applications simultaneously multiprocessing
_______ involves conversion of raw data into some
meaningful information interpreter
_______ is responsible for obtaining the processed data
from the computer input
_______ printers use light to produce the dots needed to
form pages of characters impact printers

Hardware components in a computer are operating system,


_____,____,_____,______ bootstrap, kernel, shell
_______ software are programs that are complex and can
be developed or purchased operating system
_______ is a set of special instructions used to
communicate effectively with the computer batch
_______ converts a high level language into machine
language processor
_______ translates assembly language program into
machine language instructions compiler
B C D ANS

ALT+F1 CTRL+F1 None of the above A

Tally IMP Tally INI None of the above A

false A

ALT+F3 CTRL+F3 None of the above B

Bill A or B None of the above C


Three Four Five B

Alt+C Alt+Ctrl+C None of the above B

FALSE A

FALSE A

$ & ^ A

Puchasing and Accounts payable Puchasing, Receiving


Receiving and Receiving and Accounts payable D

Multiple A or B Mone of the above A

Fund Flow Statements Ratio Analysis All of the above D

Three Four One A

Alt+X Ctrl+T Ctrl+D B

Alter Information Display Information All of the above D

F5 F6 F7 C
Ctrl+P Shift+P None of the above A

Statistics Day Book Journal Book B

Data Sub None of the above B

False A
Enterprise Data - Electronic Data
Information Interchange. All of the above C

FALSE A
3 4 5 C

data record Field All of the above B


TRUE B

Open Calculator Change Period None of the above B

Groups Journals None of the above B


Nominal Real None of the above B
Automatic None All of the above D
Profit & Loss Journal Book All of the above A
Physical Stock
Stock Journal Transfer Reversing Journal B

Receipt Issue None of the above A

16 18 21 B

TRUE B

management by electronic data


exception analysis All of the above B

F5 F6 Alt+f5 B
Primary Cost
Primary Category All of the above C

False A

Reports Vouchers None of the above C

1 to 100 10 to 60 None A

Suspense Order All of the above A

Output Information None of the above C

F4 Ctrl+f2 Ctrl+f4 A
Closing Balance A and B None of the above C
False A

Alt + f6 function key F7 function key None of the above A

Purchases A or B None of the above B


1-4-1996 to 31-3- 1-4-1997 to 31-3-
1997 1998 None of the above B

False A

Vertical A or B None of the above C

Profit & loss and trial Cash and profit &


balance loss Cash and bank C
Main location A or b None of the above B

Ledger a/c Cost category None of the above A

F7 F8 F9 C

an identity A and B None of the above C

Purchase return a or b None of the above A

Stock items units Regional setting None of the above A

Daybook Balance Sheet None of the above B

Alt + F7 F10 F11 B

Changes in Ledger
Masters Both A and B None of the above C
3 4 1 B

F10 F11 F12 A

Profit & loss a/c Budget None C

FALSE A

Ctrl+F3 Alt+F3 None of the above C

FALSE A
Primary Symbol None of them B
Tally.ini A or b None A

Stock journal Stock analysis None of the above A


In 'comp info ->
During the creation security control'
of a company option None B

FALSE A
228 28 16 C
Groups Sub-Groups B or C A
Owner Data Entry TallyVault A

Other programs - a
spreadsheet or a
database file. Both A and B None of the above C

Cash disbursements. Cash receipts. Payroll transactions. A


Will be more
efficient at Eliminates the need to
Will produce a more producing reconcile control
accurate set of financial accounts and subsidiary
financial statements. statements. ledgers. C
data that has been an instruction that has
transferred from the address of a been transferred from
memory memory location memory C

System feasibility
report Capacity Planning Exception reporting C

VSAT RAM AGP Card B

Identification Control totals for End-of-file and end-of-


Number one or more fields reel code B
Storing information
Printed output on the hard disk None of above B
Visual audio
Voice answer back board None of above C
File protection
Boundary protection ring Limited access files C

Pixels Pixies None of above B

Identification number Reel Number Batch Total D


Storage device Pointing device None of above A

Physical Security Console Log Data Dictionary B


An inked ribbon
An ink pen and print head None of above C
Use only unremovable Require user Make duplicate copies of
media passwords files A
Paper Eraser None of above C
A drum A ribbon A cassette A

Centralised function Centralised function Distributed policies or


for PC acquisition for PC Disposition procedures A
A drum A ribbon None of above A
A laser beam An INK RIBBON None of above C

Size Storage capacity None of above C


Write Read and Write None of above B

PAN drive Floppy disk None of above A


Random access A parallel access
medium medium None of above A

20 GB 700MB None of above B


Magnetic tape
A floppy disk storage None of above C
Magnetic tape
A floppy disk storage None of above A
By magnet objects In a drawer None of above C

RAM chips CDROM chips None of above B

ROM chips DRAM chips None of above B

Registers Logic bus None of above A

Registers Control unit None of above B

1 bit 8 bits None of above B

ROM chips CACHE None of above A


Systems software
and application Business software
software and games software None of the above B
Mainframe
Personal computer computer None of above B
Jon Von Neumann
Supercomputers computers None of above B

Second generation Hoover generation None of above A

First generation Fourth generation None of above C

Third generation Fifth generation None of above C


Third generation Fifth generation None of above B

Third generation Fifth generation None of above A

Analysis, System
Programming, Design, Design, and
and Testing Implementation None of above A
ACL JCL none the above A

False A

False B

False A

no B

false A

false A

false A

false A

false A

false A
review and evaluate to obtain a record
the types of data layout extract data from file A
can bring the data
indirectly all the above none of the above A

False B

FALSE A

use of accounting absence of audit


codes trails all the above D

risk driven approach unique approach none of the above B


processing options, file
data structure checks and controls all the above D

false A

false A

source of data for


material planing all the above none of these A

false A

providing access to
computer to all
organization personnel use of any programs none of the above D

false A

open/closed conceptual/physical all of them D


false A

false
false A

manage hardware & enable multiple user


software resources resource sharing all the above D

false B

false B
with production
departments all the above none of these A

false A

false A

false A

false A

false B
planning language model base all the above D

false B

false B
table files report files none of the above D

file-o-man file manager filepet C

decentralized picture
of a system all the above none of the above A

false A

false B

retrieval deletion addition B

false A

false A
subject area software and
database database safety and database B

false A

false B
immediately on quarterly basis none of the above B
false A

Benford Benjamin none of the above B

false B
blocks of nos. to the
primary attribute of random placement
the the entity of component none of the above D

false A

invalid, alphabetic none of the above all the above A

regrouping, events none of the above all the above A


false A
false A

false A

false B

false B
interactive data interactive data
extraction and innumerable
analysis analysis none of the above B

false A

false A

false B

false A

bouncing ball big-bang stub C


top-down tests hybrid tests all the above D

no B
re-perform
procedures carried
provide information to out by the clients
the audit programs all the above D

deleted, hard none of these all the above A

false A
system advanced
software all the above none of the above A

false B

no A

false A
false B

create, false none of these all the above A

false A
no A

can enable the auditor can provide the


to execute provisions auditors with useful
on a number of information with
different bases trend s and patterns all of the above D

no A

examination of
source code of a
identifies program program with
code which may be advice to
there for fraudulent following the logic
reason of a program none of the above C
ACL ALC ACLL B

false A
comparison of source analyzing the
version of a picture of a file or
programmed data all the above A

false A

false A

false A

file, hardware none of the above all the above A


identifying ineffective identifying non-
code standard code all the above D

false A

false A
authentication of
information support resource requested all the above D
job connectivity
language all the above none of the above A
no A

false A

false B

master list of administered


mathematical concept transactions questionnaire A

prepared by an
outside programmer
engaged by the
prepared by the entity auditor all the above D

false A

statistical/arithmetic stratification and


operation frequency analysis all the above D

false B

false B

carrying analytical examining the


review quality of data all the above D
Can extract and Can aid in simple Can define the audit
analyse data selection objectives D
IDEA High End CAATs All of the above D
A utility software A special purpose
programme written program None of the above A

Analytical review Compliance tests of


procedures general EDP controls All of the above D

Action Procedures Event Procedures General Procedures D

number primary number auto number D


false A

events procedures none of the above B

form chart macros D


expression elements comments action D
expression
code builder builder expression elements C

expression
macro list elements list box none of the above C

action insert none of the above A

columnar auto report embedded C

columnar datasheet justified B

link report embedded report new report D

stable and unstable dynamic and static none of the above A

false B

add chart chart insert chart C

alternate key foreign key none of the above C


chart wizard mail wizard none of the above A

group header page header report header D

page footer group footer none of the above B

for specifying
conditions with
for updating records group by clause none of the above C

group macro names none of the above C


reports forms macros D

append insert delete B

macro sheet module none of the above C

false A
RAP RAID none of the above A
MsgBox message none of the above B

DDE CME none of the above A

on line execution on line editing none of the above A

OLE client OLE server OLE communicator C


embedded connected edited A
DLL BMP html D

report wizard query wizard publish to web wizard D

static html dynamic file none of the above B

add insert data definition D

rupees pesos yen A

bound object command button list box B

display link create icon A

new save as html none of the above C

home end none of the above B

command procedure none of the above C


RDBMS front end language A

data collection database data storage C


new blank database new database dialog
dialog box box database dialog box A

64000 235 63500 A

AutoNumber number automatic field B


false B

outer join explicit join none of the above A

not null candidate key no duplicate key A

cascade change cascade update change all related


related records related fields records C

tabular both a and b none of the above B

query or queries record or records none of the above C

false B
Dynaset field
field property properties properties B

row/column queries select queries update queries A


change/delete
row/column queries queries update queries A

self join no match join outer join D


false A

form create dialog box form wizard dialog both 1 and 3 D

sum append simple D

properties form properties new properties B

sub form new form child form B

Record Operations Form Operations None of the above B

tabular form hierarchical form one to many form B

ordering sorting querying C

sorts pipes gateways A

filter by selection filter by menu None of the above A

$ @ ? D
false B

unbound control data less control data control B

option group controls group record group B

form collection none of the above A

unbound controlled all of the above C

TODAY() DATE() DAY() C


list box combo box static text B

columnar form tabular form main form A

filter by input filter by form none of the above C


option control
control wizard wizard tool wizard C

ram?? two of the above none of the above B


false B

form table ledger A


report module none of the above A
label bitmap report A

false A

false A

255 25,000 64,000 D

false B

false A

false B

query form all of the above D

form report hyperlink D

false A

false A

Records Tools none of the above C

false 1B

false A

composite keys candidate keys primary key C


false A
false B

false A

false A
false B

not null zero none of the above B

false B

false B

false A

false B
bar both 1 and 2 none of the above C

false A

false A
false B
select query delete query append query B

false B
false A

outer join self join table join C

false B
false A
false B
embedded stand alone sub chart D

false B
false B

false B
false A
the last field of the
table primary key field none of the above C
reports attributes entities D

false A

insert append add A

false A
false B

embedded stand alone sub chart B

use datasheet in
use import forms use export D

false B
false B

false B

false A

false A

false A
false A

# ? * D

false A
detail group topic C
false A

false B

false A
false B

false A

list range logical C


false B

structured query event - procedural


language based language none of the above C

form query table B


false B

record session detail D

property both a and b none of the above B

false A

false A
child forms inner form none of the above A

chart labels report B

primary key index identifier B

create form none of the above A

queries sorts forms A


bound unbound none of the above C

combo box button option button B


false A

control record source none of the above C


chart form data sheet form none of the above A
tabular form columnar form none of the above A

bound unbound none of the above A


unbound bound static C

auto form tabular form columnar form B

connect relationships none of the above C


option button, toggle
command button, list, check and button and check
check and list boxes combo boxes boxes D

filter by report filter by record filter by input D

report macro table B

file field layout B

sort field names record grab D


An organised way
of storing
information about
A tool to produce high a set of similar A way of maintaining a
quality documents things log C
It contains all the
data about one A document which
specific item contains text A collection of files B

relative DBMS Relational DBMS Reliable DBMS C


backing up data is related to data uses tape as opposed to
regularly mining disk C
Computer sequence Database access
checks Computer matching controls D
An organised way
of storing
information about
A tool to produce high a set of similar
qualitydocuments things None of the above C
It contains all the
data about one A document which
specific item contains text None of the above B

A tool which allows


Reports provide a very text and graphics to
flexible way of creating be placed in
and editing documents documents None of the above A

Spreadsheets make
data easy to analyse Using queries None of the above C
Word processors,
Network software, spreadsheets,
backup systems databases, DTP None of the above C
PRIMARY KEY and
FOREIGN KEY UNIQUE
constraints constraints IDENTITY columns C

MODIFY TABLE ALTER TABLE UPDATE TABLE C

relative DBMS Relational DBMS Reliable DBMS C


backing up data is related to data uses tape as opposed to
regularly mining disk C

Description Component Source D

keeping the original saving the file with


keeping a backup copy paper copy different filenames A

the primary key mail merge e-mail C

Graphics browser e-mail A

operators wildcards engines C

Auto ID AutoNumber Auto Key C

related tables in a forms in a database


database are are consistent with reports are consistent
consistent with one the underlying with the underlying
another. tables or queries. tables or queries. B

main form and a query and its report and its related
subform. associated dynaset. query. A

the primary key of a field from an not a primary key of


the related table. unrelated table. either related table. B

One-to-many Many-to-many Many-to-one B

CompanyID EmployeeLastName CompanyAddress A


The one-to-many
Referential integrity The join line relationship B
Right-click the
Relationship line,
then select Delete Select Undo in the Click the Delete
from the shortcut Relationships pull- Relationships button on
menu down menu the toolbar B

That there are That records can be


That some of the data records in a added by clicking on the
is not viewable related table plus sign C
They cannot be
They cannot be text AutoNumber data They must be the
fields types same data type D
The customer’s ID is
deleted from the
Customers table,
and all the related
The customer’s ID is loans are deleted
deleted from the from the Loans An error message is
Customers table. table. displayed. D
The subform is an
object on the form
The subform is The subform is and can be moved or
displayed in Datasheet displayed in Form sized like any other
view. view. object. D

A one-to-many
A one-to-many relationship A many-to-many
relationship between between coaches relationship between
teams and coaches and teams players and teams C

M ¥ * C
The Customers table
only when there are
Loan records
associated with that The Loans table
customer at any time Neither table C
prompt, icon, title title bar text, title bar text, icon,
bar text. prompt, icon. prompt. B

Sub CreateList. CreateList. Sub. B

A drop-down list
A text field enables the enables the user
form user to choose to choose from
from one of several one of several A drop-down list enables
existing entries. existing entries. the user to enter text. C
must be set for does not have to must be set for two
multiple words. be set. words. C
maintain data on
create tables of different things in
store data in tables. rows and columns. different tables. A
relationships. metadata. all of the above D
figures. information. a and b D

multiuser database e-commerce


application database application a or b A

multiuser database e-commerce


application database application None of above B

Structured Question Structured Query Relational Question


Language (SQL) Language (SQL) Language (RQL) C
Database
Management Data Business Model Relational Model
System System Manager B

SQL Server Oracle a and b D


The database
The database management
application system (DBMS) All of the above. D

the DBMS accesses the


database data None of above All of above A

creates form creates reports b and c D


the database
the database management
application system (DBMS) the database B

it contains a
it reduces data description of its
duplication own structure All of the above. C

holds metadata holds indexes All of the above. D

metadata stored procedures All of the above. D

as a new systems as a redesign of an


development project existing database a and b A

as a new systems
development as a redesign of an
project existing database a and b B
as a redesign of
as a new systems an existing
development project database a and b C
entity-relationship
normalization data models data modeling A

entity-relationship data
normalization data models modeling B

entity-relationship
normalization data models data modeling D

entity-relationship
normalization data modeling data migration D

hierarchical models network models relational data model A


the order of the
the order of the rows is more than one column
columns is important unimportant can use the same name C

relation row field D

field key tuple C

field composite key foreign key C

field foreign key candidate key D

primary key foreign key surrogate key B

Update anomaly Deletion anomaly All of above D

design the database create one or more move the data into the
structure new tables new database A

were essentially
killed off by MS have poor response are not true DBMS
Access time products B
Their report delivery is
more difficult than
report delivery for
reporting systems. Nonintegrated data None of the above A

a "wrong format"
inconsistent data nonintegrated data problem B
a "wrong format"
inconsistent data nonintegrated data problem D

data warehouse data warehouse


databases do not have data are often
metadata. denormalized. b and c C

Table Report Query A

Queries and tables Macros Spreadsheets D

It will be easier for Regardless of how the


the user to upgrade objects and tables are
it if the objects are It is advisable to put stored, the user will
in one database and each object and have to reenter the data
the tables in table into a separate in the tables when the
another. database. application is upgraded. B
An application may An application can be
consist of multiple All objects in an created in such a way
databases, each with application, that it objects such as
multiple objects, linked including the forms and reports can
to yet another tables, must be changed without
database containing reside within the disturbing the existing
only tables. same database. data. C

Link Merge Join A


It contains tables, It contains a user
reports, queries, and interface, or
forms switchboard It contains macros C
Interface Design
Build Menu Wizard Switchboard Manager D

put key business


centralize the information into store all corporate
manageability of data the hands or more transaction data in one
collection. decision makers. single location. C

Digital Certificate Digital Signature None of the above C

Digital Signature Digital Certificate Private Key A

Hash Value Hash Result Either B or C D


Digital Signature
Verification Both A and B Either A or B C

Subscriber Relying Institutional


Party Cost Overhead None of the above A

Certified Authority Certificate Authority None of the above A

False A

False B
Personal Digital
Developer Certificate Certificate None of the above A

Personal Digital
Developer Certificate certificate None of the above C

Repositories Public Key none of the above B

Evidence, Ceremony,
Efficiency and Approval, Efficiency
Approval, Evidence logistics, Evidence and Logistics D

False A

False A
Certificate Resource certificate
List Revocation Letter None Of The Above A

Private Key,
Public key, Recipient Recipient None Of The Above A

External Format File Transmission File None of the above C

UN/EBCDIC UNESCO UN/EDIFACT D

interchange sets functions functional groups D

Embedded cards SET None of the above A

Digital Cash Smart Cards Electronic cheques D


Online Catalog and Broadcast and Online Catalog and
Billboards Junk Mail Customer Endorsements C

E-mail EFT All of the above D

False B
Primary Key and Public Key and Public Key and
Private Key Password Private Key D
Satellite Area
Private Network Network None of the above B

Passive or pull-based Glow sign or


advertising hoarding strategies All of the above D

Junk mail Billboard Endorsements A

Bulk-mail Direct-mail Junk mail D

Endorsement Billboard Broadcast C


Low cost of
Data Integration operation Quality management B
Industrial
Corporate espionage espionage Economic espionage C

Contact numbers of
the management A competitor’s new
group Research data project B
e-commerce
multi-user database database
application application None of above C
Keeping messages Including the Using all capital
short Subject letters D

Encryption
Message performed by a Security at the
authentication in EDI physically secure transaction phase in EDI
systems performs the hardware device systems is not necessary
same function as is more secure because problems at
segregation of duties than encryption that level will be
in other information performed by identified by the service
systems. software. provider. C
convert text to
columns wizard tip wizard function wizard A

row reference column reference none of the above A


quattropro or xbase
Lotus 1-2-3 files class files D

domain values range values reference values D

=date() =currentdate() none of the above A

' = ' sign # sign none of the above A

AutoFill function wizard none of the above C

arguments parameters none of the above B

logical numeric Boolean D

pmt merge none of the above A

vlookup pmt count A


convert text to
chart wizard columns wizard tip wizard B

pmt countif none of the above B

sum sumif countif C

print area print none of the above A

AutoFill none of the above A

formatting shading none of the above B

print area print print preview B

searching sorting none of the above A

blanks all blanks none A

www.eb.com www.encybrit.com none of the above B

DNS FTP none of the above B


intermediate
network of network network none of the above B

transport layer physical layer session layer D

ping service ftp service none of the above A

TELNET ARCHIE none of the above C


uniform resource unlimited restore
locator locator none of the above A

name of the resource scheme none of the above C


scheme command line none of the above C
Microsoft sears general electric C

web browser editor B


search for
read the Usenet news database none of the above C

spy mosaic wincim or maccim none of the above C

gopherspace cyberspace none of the above B

open text excite none of the above B

ftp server web server none of the above A


directories image list none of the above C
maximum of five one many B

lower top middle and lower D

directory index glossary C

index search,menu menu search,item item search,index


search search search C
excite lycos all the above D

cello lynx all the above C


mosaic Lycos navigator gold 2.0 C
internet IBM CompuServe D

finger service ftp telnet D

Hyper text Hyper text


transmission port transfer protocol Hyper text transfer port C

ftp uucp none of the above b

ftp telnet none of the above C


transfer
transmission control communication
protocol/internet protocol/internet
protocol protocol none of the above B

two three none of the above C

domain name
servers web servers none of the above B
the internet
administration the internet access none of the above A

protocol site organization B


hyper text transfer higher type transfer
protocol protocol none of the above B
uniform resource uniform resource
locator label name of the above B
frequently asked frantically asked
question question none of the above B

TCP,IP IP,UDP none of the above A

response request close A


world search for
windows sockets information and
internets relay chat research council none of the above B
netscape,ie mosaic,gopher none of the above B
world wide web
client interface none of the above B

index hotwords none of the above B

very organised
network integration verification on
and communication network integration
application and communication none of the above A
university of
cleveland,cleveland university of
freenet California net none of the above B

IP address dns none of the above A

ftp and finger telnet and ftp none of the above A

wais,allsrc wais,winsocks none of the above B


waisman winsock none of the above B

hyper transfer markup hyper text


language markup language none of the above C

hyper text books marks none of the above B

applets animation none of the above B


programms,images,tex animation,scripts,ex
t ecutables none of the above A

home page welcome page none of the above B


global networks
navigator grand network news none of the above B
electronic mail search engines none of the above B
Netscape page
starter
site,netscape page
wizard yahoo and altavista none of the above B

telnet ftp archive D

point review all the above none of the above D

bitnet Delphi fidonet A

biographical
information bookstores none the above A
on-line reference
works more information galenet A
web directories database channel B

Graphical Graphical interface Graphical Interface


interchange Format format format B
Jumbled pictures Joint pictures expert Joint pictures
expert graph graph experimental group A
documents net browsers C
eudora,netscape
netscape,ie,lynx and pine none of the above C

web pages network connections mails B

COLOR FCOLOR FONTCOLOR B

Common graphical Communication Common Gateway


Interface graphical interface Interface D

Interface Communication Connection B

Browser Client None of the above B

Server Web Channel A


Uniform resource
locator United relay limited None of the above B
image only text or image neither text nor image C
PLSQL SGML CGI C
betalanguage metalanguage none of the above C
pancake is not
palm is not elm edible none of the above B

SGML Preprocessor SGML Parser SGML Composer C


images applets documents A
International Internet
Engineering trainers Engineering Task
and faculty Force None of the above C
MS Internet
Explorer and
Netscape Navigator Netscape
and Mosaic Navigator None of the above C

data from a database symbols video C

hypertext hotword hotlink B


in user-defined
in sequential order order none of the above B

start home none of the above C

.bmp and .jpeg .gif and .jpeg .wmf and .bmp C

service,hostname,p service,port and service,hostname and


ort,directory-path directory path port B

mailing lists,mail
mail vendors,mail server robots and
identification and gateways to other
password services none of the above C

<font size=n> <hr size=n> <l1 type=shape> D

common gateway classified general


interface instructions none of the above B

Client Browser User A


the net intranet none of the above B
peer-to-peer
connectivity wan none of the above B
parcel packets none of the above A
email,file
news,cooking and fine retrived,internet
arts tools none of the above C
mosaic,gopher,eudo communicator,ie,lyn
ra,trumpnet x,winsock all of the above B
arpanet ARPANET none of the above B

defensive
advanced
dedicated and research projects
registered projects administration
administration net none of the above C
begin first none of the above B

mailnet,inet intranet,extranet none of the above A


music and dance cooking and dining none of the above A

Hotlink text markup Hyper transfer meta Hyper text markup


language language Language D
united states &
england,norway Russia none of the above B

client network none of the above C

stand-alone servers none of the above C

network topology network redirectors none of the above B


data terminal data target
equipment equipment none of the above B

physical layer network layer none of the above B

packet
switching,store and smart network and
forward network dumb network none of the above B
anonymous ftp file transfer none of the above B

KAN,RAN,VAN LAN,WAN,MAN none of the above C


MAN TAN none of t he above B
MAN WAN none of the above C
digital non-digital none of the above B
Document type
Define type of data definition Document type data C
Modulation/demodul Manipulate/demanip
ation ulate none of the above B

Modulation Manipulation none of the above B

Dedicated access
and dial up access Cable and wires none of the above B
Stream line internet Serial line
protocol protocol none of the above C
Point to point Pillar to pillar
protocol protocol none of the above B

sending information storing data on the receiving information


to a host computer hard drive from a host computer B

Speed Size Channel A


Save Browse Retrieve C

Relying Party Either A or B Neither A nor B B

Private Key Both A and B Both B and A C

Electronic Fund
Electronic Commerce Transfers All The Above D

Not True A

Formal Legal
Formal Legal Requirements, Open
Requirements Open System System D

Signer
Efficiency authentication None of the above A
Document
Authentication Both A and B Neither A nor B C

Not False B

Digital signature Digital certificate Private Key A

Efficiency Either A or B Neither A nor B. A

Public Key Private Key None of the above A

Public Key Both A and B Either A or B C

Public Key Both A and B Either A or B A

Public Key Both A and B Either A or B B

Cipher Encryption Cryptography C


Performing validity Conducting fraud- Reviewing the
checks. awareness training. systems-access log. D
Not intercepted en Received by the Sent to the correct
route. intended recipient. address. A

The private key cannot The private key is The private key is used
be broken into used by the sender by the receiver for
fragments and for encryption but decryption but not by
distributed to the not by the receiver the sender for
receiver. for decryption. encryption. A

Failure of server
Data entry errors. duplicating function. Firewall vulnerability. D

Business-to-Backend Backend-to-Business Business- to-Billboard A

On-line Catalog Endorsements Broadcast B

Billboard Catalog Broadcast A

portals .COM Domains A


Search and
Service discovery None of the above C

Purchase Pre-purchase
consummation preparation Search and discovery A

Endorsement model
Online catalog of marketing None of the above B

Shopping cart Billboard Pulling cart B


EDI For
EDI For Administration, Administration,
Consumer and Commerce and
Transport Transport None of the above C

TCP/IP EFT Gateway D

Interpreter Assembler EDI D

Business-to- Consumer-to-
Consumer Business Customer-to-Company B
Electronic Cash Euro Cash Endorsed Cash B
Business Process Service
Perspective Perspective None of the above C

Micro Transactions TT(Tiny token) E-token A

SSL Encryption Subscription C


2 3 4 B

filtered table index table pivot table D


convert text to
chart wizard columns wizard tip wizard D
category legend data marker A
category legend data marker B

category legend data marker C

category legend data marker D

bar chart pie chart surface chart C


bar chart pie chart surface chart B

bar chart pie chart surface chart D


bar chart pie chart surface chart A
wild card characters symbols none of the above A

internet explorer Netscape word 2000 A


convert text to
chart wizard columns wizard tip wizard A

bar chart stock chart pie chart C

false A

or B

4-dimensions Multi-dimensions A

false A

Pivot table B
It is often used to
display share It is also used for
It shows trends over market prices over a indicating fluctuations in
time period of time temperature changes B

Scenario manager Solver Data table. C

Scenario manager Pivot table Data table. A

Pivot table Solver Data table. D

Worksheet Spreadsheet none of the above A

Performing database Performing text


operations formatting. All of the above D
Source table
Row field. name. Pivot table item. C
three N B

false B

4-dimensions Multi-dimensions A

Pivot table B
It is useful when
several components
are changing and
the user is
interested in the It can be
sum of the represented in 3-
components. dimensions B

Scenario manager Solver Data table C

Scenario manager Pivot table Data table A

Standard deviation SumIf A


records tables worksheets D
It is a tool that
provides a way to view
and compare the
results of all the
different variations It summarizes the
together on the data by using
worksheet analytical functions. A

Scenario manager solver Pivot table D


convert text to
columns wizard tip wizard function wizard B

workbook tables database A

document window modal window C

A dotted border No border A blinking border A

2,4,2 2,2,2 6,8,10 D

the column is too


the row is too short to narrow to show all
show the number at the digits of the
the current font size number either b or c C
flexibility of moving
speed of calculation entries cost of initial set-up D

graphical database spreadsheet D

Address Gap Rows A


Writing letters Drawing pictures Document filing A

drag from the top cell


in the column to the click the column
last cell in the column heading click the column label C

CTRL + ENTER TAB INSERT A

function. constant. formula. B

(201)555-1212. #VALUE! Tom McKenzie. C

Functions Numeric constants Text constants D

/ * \ D
It is impossible to
C3/D4 D4^2 determine. C

6 SUM(H9:H11) G7*SUM(H9:H11) B
The phrase “active cell”
It is displayed in appears in the Status
It is blinking. reverse video. bar. A

By either clicking
in a different cell By typing the reference
By using the arrow or using the arrow of the cell you want to
keys to move to a keys to move to a move to in the formula
different cell different cell bar C
The Cell Format
The Formatting command on the The Font Size command
toolbar Edit menu on the Tools menu. B
the Save As
the Save command on command on the the File Type command
the File menu. File menu. on the File menu. C

Edit View Window A

Details List Properties B


Both Insert and
Delete Delete Clear C
Both Clear and
Delete Delete Remove B

Headers and footers Fonts Margins C

Page Setup View Edit B

range. group. cell group. B


D12, G25 D12:G25 D C

destination range. clipboard. source range. D

destination range. clipboard. source range. B


Both the Copy and
The Copy command The Paste command Paste commands D

relative mixed constant A

$B4 B$4 $B$4 D

#DIV/0! #DIV/0! #DIV/0! B


#DIV/0! #DIV/0! #DIV/0! C
Both the Cut and
The Cut command The Paste command Paste commands D
cycle through
absolute, relative,
and mixed cell cycle through open
edit cells. references. applications. C
the Formatting
the Format Painter toolbar Conditional formatting B
Click the Insert
Hyperlink button on Right-click a cell and Double-click a cell and
the Standard click the Edit click the Insert Hyperlink
toolbar. Hyperlink command. command. B
whether the cell has
an absolute or a
relative cell
the cell address. reference. the value in the cell D

text with either a two-


digit or four-digit year,
text with a four-digit depending on the
year. an integer. format. C

It is impossible to
determine from the
Aug-31 29/03/2008 information given. B
subtracting the later
adding the earlier date date from the earlier adding the later date to
to the later one. one. the earlier one. A

the F2 key. the Esc key. the F1 key. B


Either 3/4 or .75,
March 4 of the depending on the cell
0.75 current year formatting C
either a cell on a
worksheet or a
a variable. a constant. variable. D

B1.G10 B1;G10 B1:G10 D

COUNT MAX SUM C

Line Pie Scatter C


Once a column chart is Once a pie chart has Once a line chart has
chosen it cannot be been chosen it been chosen it can be
changed to a bar cannot be changed changed to a pie
chart. to line chart. chart. D

hold down the SHIFT hold down the ALT


key key hold down CTRL + SHIFT A

Create four separate Transfer information


files to a database Use multiple sheets D

Fill Down Fill Right Paste Special B

Data | Sort Edit | Data | Sort none of the choices B


Calculate data Create forms None of the above C

select Print selection


on  Page Setup  | select Print selection
press the PRINT  Sheet  and then in the Print dialog
SCREEN key print and then print D
writing letters drawing pictures None of the above A

D4+C2*B2 #VALUE! =(B2*(D4+C2) C


=A3SUM:B3SUM:C3
SUM REF! None of the above B
whatever was last
landscape used vertical A
ZA1 A0 None of the above C

ECRN CARN NET A


newsgroups and
mailto and files search engines none of the above B
application
bulletin servers,proxy
boards,mails call servers and web
and wireless system servers none of the above B

business broadcasting bulletin


system broadcasting system none of the above A
large very small none of the above B
windows sockets windows stocks none of the above B

Yahoo PINE Lynx A

cache built-in none of the above B


Digital Signature Cryptography Message Digest C

Lock Hash Function Formula A

Password Name Address B

Retrieval Cryptography Password Cracker A

Regulations Address Protocols D

Imposting Unauthorising Approving A


Threat Exposure Hacking B

Income - tax
authorities Judge of a civil court Police officer of IPS rank. B
Pirated software Virus Cracker C
Hoffman Charles Bubbage Howard Aiken A
Amazon .com Dell .com Msn .com B
Asynchronous
Transmission
Any Time Money mode None of above C

Regulations Address Protocols C


Gateway Port Pin B

WAN CAN PAN A

hypertext tracing hypertext transfer hypertext tracing


program protocol protocol C
Network Interface New Information
card Card None of the above B
Can not computers Only printers None of the above D
Combines
connectivity of a
hub with the traffic Switches data from
regulation of a incoming ports to
bridge outgoing ports. All of Above B
Two or more
networks Bridges and Hubs Hubs and nodes B
frames Packets None of the above C

gateway router virus checker A


Two Four None of the above C
Data-Link Layer Network Layer All of the above D

Coaxial cable Fiber Twisted pair B

Logical address A memory address None of the above B

Hub Router None of the above B


It continue on to
It gets destroyed bit target device with
by bit. corrupt data None of the above B
Ultra violet
Wired Technology technology None of the above A

Data Link Layer Network Layer All of the above D

ASCII Octal None of the above A


48 Bytes 48 KB 48 MB A
a list of rules for a gateway calling
transferring data software that allows program for internet
over a network file copying bridging B

Client Server Network PC C

If the hub goes


If one node goes down, it brings down If the hub goes down, it
down, it brings all of the nodes on brings down all of the
down the entire ring that section nodes on all of the rings B

Topology Both A and B None of the above B


Star Ring All of above D
Parallel Both A and B None A
Circular Linear Both A and B B

Bus Star Mesh C

Bus Star Mesh B

Bus Linear Ring C

Bus Star Mesh A

Transport Layer Physical Layer Data Link Layer D


Ethernet, token Ethernet, DecNET, Ethernet, token ring,
ring, FDDI FDDI ARCnet B
kbps mbps mips B
Kbps Mbps Mips C

depend on the
measured in bytes per transmission limited by modem
second medium speeds C

a modem Windows 95 Netscape B


must use electronic must have a LAN
mail account All of the above A

uniform resource common gateway application protocol


locator interface interface C

used to control a interfaces a modem connects a computer


printer to a computer to a network D

a modem Windows package Netscape B

Novell Netware Windows NT None of the above C

have to do with Web


pages the Internet none of the previous A
use appropriate
must use electronic must have a LAN communications
mail account software A

modem bridge none of the previous D


is a CPU functional
is a CPU register unit make of processor A

is a protocol for the


used to browse the transfer of files
Web is part of Netscape between computers D
uses wireless
communication
medium is part of Netscape None of the above D

a screen saver
a form of virus program none of the previous D
an email server a poor file server none D
IR system for the
Internet browser none of the previous C

CD-ROM clip-art file search engine D


is a CPU functional
is a CPU register unit make of processor A
is a protocol for the
used to browse the transfer of files
Web is part of Netscape between computers D
is a protocol that
allows for remote
uses telephone lines is part of Netscape login D

Any layer can


communicate only
Any layer can with the layer Any layer can
communicate directly directly above or communicate only with
with any other layer. below it. the layer above it. C

It is made up of many
networks connected It works the same Individual computers can
into transmission lines way as a local connect to it using an
called backbones. network. ISP. A

System intrusion Denial of Service Port sniffing C

a screen saver
a form of virus program none of the previous D
Flood a Web server Virus that initiates a
with requests ping flood UDP flood A

packet flood traffic C

router switch hub B


an email server a poor file server none of the above D

Update virus Backup data on a


definitions daily basis Limit logging on access C
Only large name-
There are safe and recognizable sites ActiveX-enabled sites
unsafe sites. are safe. are safe. B
Use of logical access Use of encryption
Use of passwords methods methods D
by scanning the
through an FTP by attaching itself to computer for a
port. a document. connection. B

E-mail Web traffic Application updates D

Adware A worm Spyware D

Protocols Multiplexors LAN B


Trojan horses and key cookies and key
loggers. loggers. key loggers and worms. C
An attack with the
purpose of gaining Giving out Changing the content
publicity disinformation of a Web page D
Disruption in Disruption in supply All of the above are
communication lines correct. D

Shutdown of military Contaminating Shutdown of nuclear


security systems water systems plant safety systems D

To obtain an accurate
inventory of network
related equipment
To improve network To improve system and parts and
services response time network nodes D
update its prices as
limit access to stop its competitors soon as they are
computer owners only seeing their prices changed D
Yahoo People
Search USA People Search Lycos Search B

Date of birth Personal assets Criminal records A

Fraud Adware Spyware B


make large amounts
of money by parking
purchase off-shore funds in their bank
invest without risk. property. account. D

Phishing Siphoning Hoaxing B

cyber stalking. virtual stalking. Web stalking. B

cookies. spam. viruses. B


Never use your real Use anti-spyware
identity. Use a proxy server. software. B

Physical Security Message sequence


controls number checking Logical access controls B

II only Both I & II Neither I or II C

ftp www telnet C


Verifies integrity of Increases boot up Misleads a program
files time recompilation B
both HTML and Internet
Internet Explorer Microsoft Excel Explorer B
round trip HTML
HTML document. document. Web browser. B

.co in used for .con is used for


company companies None of the above A
the World Wide Web
Consortium HTML. one way HTML. C

HTML. DHTML. MHTML D

clicking a hyperlink
that references a
updating the values document that is
that are obtained stored in the floppy viewing an Excel
through a Web drive on your worksheet that you have
query computer saved as a Web page. B

Go to the History
Click on ‘Go to’ or page and look for Go to the Bookmarks or
‘Search’ in the browser the site Favorites page C
the Insert Hyperlink the Update the External Data
command command command A

Screensaver Sound Video C

GIF JPEG TIFF C


Add it to Cut and paste it to a
Write it down on a ‘Favourites’ or word processor
piece of paper. ‘Bookmarks’. document. C

intranet. privileged network. network topology A

a signature. a footer. an encryption. B

IPT IPP PoIP A


Desktop client, Desktop server,
software, and application, and Desktop server,
hardware. database. software, and hardware. A
CD-ROM Telephone line None of the above B
File Transmission File Transfer
Protocol Protocol None of the above C

So IP addresses can be So email is delivered


shorter faster None of the above A

45.1.1.1 143.215.12.19 None of the above D


paul.trigg@domain.
org.uk paul.domain.uk None of the above B
Scientists in
Switzerland No-one None of the above C
International Relay of Internet Remote
Characters Conversations None of the above A
It will be waiting for A letter will be sent
you to collect it to you in the post None of the above A

Hyperlink Text Marking Hyper Text Mark-


Language up Language None of the above C

People discussing a
topic of interest High volumes of
globally email None of the above C

autolayouts and
presentation slide view & outline
templates view none of the above B

points squares icons C

image grid guide C

short cut menus auto shapes all the above B


slide show & view
show fonts & images none the above A
media clip .video file all the above B

movelast,true movelast,false eof,true D

form layout window toolbox project explorer D

movefirst,true movefirst,false bof,true D

int() number() val() D

rectangle square oval D

false A

false A

color forecolor none of the above C

fontunderline,true textunderline,true none of the above B


size foresize fontsize D
one-hundredth of a one-thousandth of one-ten thousandth of a
second a second second C

recordcount itemcount listcount D

prperties window project explorer toolbox B

prompt vbmsgboxstyle none of the above C

textbox label inputbox() D

opensnapshot dbopensnapshot dbopendynaset D

activate unload initialze C

opaque transparent graphical D

red green black B

green blue white D


project explorer
form layout window toolbox window D

form layout window toolbox project explorer window A

lostfocus text gotfocus D


parent container none of the above C

false A

unload initialize activate D

name caption none of the above C

dbengine openrecordset none of the above B

visible value style C

dim var none of the above B

.ctl .ctr .ocx B


Validation Check Audit A

On Error GoTo Inline On Error Stop On Error Resume Next D

PaintPicture Refresh Resize A


UnloadMode
parameter to a non- UnloadMode parameter
Cancel parameter to 0 zero value to a zero value A

2 3 None of the above D

Consists of Various
Consists of several Forms And Code Consists of several
Applications Modules Projects D

Project window, view Class module, code


code window module None of the above A
Place code in the Place code in the
Unload event Deactivate event None of the above B

AutoRedraw = False Refresh PaintPicture A


Msgbox
Msgbox err.number & error.number & Msgbox error.number
err.text error.text & error.description D
To provide a
repository for images
To help in creating a To allow the editing used by other
ToolBar of icons controls D

GetFileNum GetFile GetBytes A

Get GetProperty Value B

Open dialog box Windows explorer Input box D

Visible Multi-Line Font C


Click, KeyUp and KeyPress, KeyUp and
KeyDown KeyUp and KeyDown KeyDown D

Binary Format Input Mode Output mode B

ScaleHeight and
ScaleLeft and ScaleTop ScaleTop x and y A

Property Assign Property Let Property Set C


Caption property ZOrder property AutoRedraw property C

Max Value CurrentVal B

Substr SetAttr CStr A


Can be different at Are actually not
times properties None of the above B
You do not have the
permission to access MyVar has not
the class been declared None of the above C

The ExecProcedure
The Exec method method None of the above D
A critical message
icon An exclamation icon None of the above B

variable. intrinsic constant. built-in procedure. C

InputBox function MsgBox statement can


InputBox function can be created with be created with the
returns a value, the macro recorder, macro recorder, while
while the MsgBox while the MsgBox the InputBox function
statement does not. statement cannot. cannot. B

The form can be Data can be A new check box can be


modified. entered. added. C

QueryUnload Deactivate Terminate C

cropping tool cutting tool scribble drawing tool A

color box color scheme color guide C

tricolor scheme color palette primary color scheme A

28 18 36 C

bar pie linear A


images and text slides slide sorter views C

radar doughnut all the above A

data point data stream B

clip art auto shapes track changes A


the chart window
the chart is made opens displaying
available for editing a chart template none of the above C
custom drawing
general purpose tools tools standard drawing tools C

used to create a used to store the other


accessed only by manager box for tools of the
manager an existing box organizational chart C
not available in the
turned off tool bar available in the tool bar B
twice thrice any of the above C

four five eight B

draw tool standard tool all the above B

handlayouts slide view none of these B

reduce/enlarge preview none of the above B

exporting copying moving B

auto shapes clip art drawing tools A

.rtf(rich text format) .doc(document) .html(hypertext format) B


only one six twelve C

.wmf(windows
metafile) .txt(plain text) .doc(document) B

displayed only during displayed only in


the slide show outline view none of the above A

3D(3 dimension) both a and b transition D

transition slide show view show A


slide master master slide master notes A
slide view view show slide sorter view C

10 inches,7.5 inches 7.5 inches,5 inches none the above B

landscape a or b none of the above A


view show transition b or c A

jpeg png none of the above D

hypertext action button all the above D


visual basic for Microsoft visual
application interdev all the above B

batch file templates add-ins A


when the slide
during slide transition show is run none of the above C

spell checkers header files all the above A

custom show both a and b none of the above B

notes pane properties pane outline pane D

paint shop pro paint shop pro power point 2000 D

it is the quickest way contains sample


to create a presentations for a provides suggested
presentation variety of topics content and design D
user can insert only user can insert
pre-drawn, pre- picture to the
colored graphic master slide which user can insert picture to
images reflected in gets reflected in all the title slide which gets
a clip arts to the the slides using that reflected in all the slides
slides master slide using that title slide B
in notes pages
in slide sorter view, view, drag the I slide view, drag the
drag the slide to a new slide icon to a slide icon to a new
location new location location C

the slide that holds


transition means design templates is the formatted
applying special the template whose placeholders for the
effects to the format and color title and sub-title for
crossover between the scheme user applies the presentation is
slides to a presentation called a title template D
in outline view, user
can see the
miniatures of all
slides in a
presentation, user should select the slides can be
complete with text the slide view to add reordered in the outline
and graphics the text to the slide view B
the slide that holds
transition means design template is the formatted
applying special the template whose placeholders for the
effects to the format and color title and subtitle for
crossover between the scheme user applies the presentation is
slides to a presentation called a title template D

customize new slide set up show B


by default,
doughnut chart is
displayed based on user can add data labels
the data in the data is plotted in a and gridlines to the
datasheet chart window chart B

the slide master the header slide the format slide B

spell checker grammar checker none of the above B

12 102 22 B

twice three four times B


text, hypertext,
text, hypertext and CD-ROM, digital Power Point, video
Power Point. camera and sound. and sound. D
Line style, Line color,
the Font and the text font, and text
the Line color text alignment alignment D

Fill color, Line color,


Line color Line thickness and Line thickness D
Microsoft Graph is
A popup box prompts started so that
you for an existing you can create a The graph placeholder is
Excel chart to insert. graph. deleted. C

taken from the


first column or
row of data in the
datasheet,
depending on
always taken from the whether the data
first column of data in series are in rows
the datasheet. or columns. entered by the user. C
Stacked column Pie chart Line chart B

Pull down the Insert


menu and select
Chart, click the Insert
Chart button on the
Standard toolbar, or
Click the Insert Chart Pull down the Insert pull down the Insert
button on the Standard menu and select the menu and select the
toolbar. appropriate Object. appropriate Object. D

Click the chart


object, then click You cannot display the
the View Datasheet Pull down the Edit underlying datasheet
button on the menu, then select once the slide is
Standard toolbar. Object. finished. B

Click outside the Change to Slide Sorter


Double click the chart. chart. view. C

A dialog box is
displayed allowing you
to enter the name of
the Excel worksheet The datasheet
that should be window is toggled
embedded in the The datasheet is from closed to open
PowerPoint saved as a separate (or from open to
presentation. file. closed). D
The application that
The chart is doubled created the chart is
The chart is deleted. in size. started. A
The chart is doubled Microsoft Graph will
The chart is deleted. in size. restart. D
a slide one bullet
item at a time, build
bullet items a letter
at a time, and build
bullet items one letter bullet items one bullet items a word at
at a time. word at a time. a time. D
Subtle, Moderate, or
Moderate Exciting Exciting D
Both enter and
exit, and fly in Neither enter nor exit;
Fly in from top or from top or neither fly in from top
bottom bottom nor bottom C
Shift Alt Ctrl B

Custom animation can


be used to affect the
way objects appear
on a slide, to what
objects do after they
appear on a slide, and
what objects do after the way objects exit to the way objects
they appear on a slide. a slide. exit a slide. D

The advanced
timeline shows
the sequence in The advanced timeline
which objects will shows neither the
appear on the sequence in which
The advanced timeline slide and the objects will appear on
shows the duration of duration of the the slide, nor the
the effect applied to effect applied to duration of the effect
each object. each object. applied to each object. C
Clips, organization
Organization charts Text charts, and text D

Draw program Filtering program Animation program A


Fly in, From top, and
From top Dissolve in Dissolve in D
Once data is Data cannot be
entered it can be entered into There is no such thing as
changed. Datasheet. a Datasheet. B

OLAP. OLST. OLIP. B


You can change
both the
appearance of a You cannot change
whole diagram and the style of the
the individual connecting lines in You cannot change the
shapes of a an Organization color of the boxes in an
diagram. chart. Organization chart. B

[Shift+Z] [Alt+Z] [Ctrl+Z] D

.vbp .frm .frx B

additem loaditem none of the above B

loadpicture addpicture none of the above B


Dir1.Path = File1.Path =
Drive1.Drive Dir1.Path none of the above B
message() msgbox() none of the above C
Dir1.Path = File1.Path =
Drive1.Drive Dir1.Path File1.pattern=Dir1.path C

opendatabase recordcount count C

append addnew additem C

update additem addnew B

movelast moveprevious movefirst C

UnloadMode
parameter to a non- UnloadMode parameter
Cancel parameter to 0 zero value to a zero value A

Office 2000 Office 97 Back Office A

double click drag & drop none of the above A

cut select none of the above A


shift+left and ctr+end and
shift+right ctr+home none of the above B
normal layout, web web layout, page
layout layout none of the above A

click from start


program, MSWord
templates from the task menu none of the above A

inbox assistant document assistant none of the above A

Tool Tip Icon Tip Document Tip A

marginal stop ruler none of the above B


home and end keys
page up keys only only up and down arrow D

center decimal rotation D

model dialogs/alerts none of the above B


decrease indent both A and B none of the above C
control tool box design wizard pictures A

control box database forms A


2 0 11 A
printer setup from the print preview from
file menu the file none of the above A

shading style box none of the above A

Del ctrl+f ctrl+m A


Del ctrl+f ctrl+m D

CTRL+O CTRL+SHIFT+S CTRL+SHIFT+P A

ctrl+o ctrl+shift+s ctrl+shift+p C

Access Both None of the above B

False A

True B

Transaction type Limit Check Reasonableness D

VLOOKUP A or B None of the above B


OLE ODBC All of the above C
This involves
Analysis is the loading looking at a
of programs that system and
perform routines to finding out how
control peripheral information is
devices being handled None of above C

Inputs, outputs, file Maintenance,


design hardware, reliability, and
and software upgradeability None of above B
To execute any
programs To maintain security None of the above D
Transferred from the
Copied from the disk Saved to the disk disk A
Users operate the
computer system Users operate the
from a given date manual system None of above B

The new system is Users continue


introduced and users operating the old
start operating it system None of above A
User Guide and
Log files and technical
temporary files documentation None of above C
User guides cover
how to run the
To enable any printer system, enter
to be connected to the data, save, print,
network etc. None of above C
Network systems and
communication Database systems
services and backup services None of the above A

CD-ROM floppy disk Hard disk B


To help someone
To do a particular who is applying for
task. employment None of the above B

Auto bus Address bus Control Bus A


BAD TED MAD B

Auto bus Address bus Control Bus D


Data structures that
Operating system are part of the Shells, compilers and
routines that execute kernel of an other useful system
in supervisor mode. operating system. programs. D

ASCII code form decimal form alphanumeric form A


represented 256 represented 127
8 bits characters characters A
8 bits 16 bits 32 bits A

1000 kilobytes 230 bytes 1024 bytes A


a 32-bit bus or 32-bit
32 I/O devices 32 Mb of RAM registers D
used to detect is the first bit in a
errors byte is the last bit in a byte B

RAM DRAM CROM A


baud bytes Hertz D
secondary storage secondary storage
memory access time capacity access time B
use more RAM than have medium clock use variable size
RISC machines speeds instructions D

Registers Variables Logic Bus A


Data is not saved
Computer is before computer is
improperly shut down shut down All of the above D
a serial interface printer interface a modem interface B
dot matrix printer ink-jet printer laser printer. D
stores more
information than is used for cache
is non-volatile RAM memory B
provides backup
power in the
increases the process event of a power
speed cut none of the previous C
has more storage is an access card
capacity than an ATM for a security contains a
card system microprocessor C
LCD displays SSGA displays none of the previous B

writing programs in
multitasking multiple languages none of the previous A
the ability to run 2 or
more programs writing programs in
concurrently multiple languages none of the previous D

Registers Variables Logic Bus B

magazines CD-ROM e-mail D

to run more than


one program at
an operating system the same time none of the above C
multiprogramming multiuser none of the previous C

ONLINE LAYOUT PAGELAYOUT ONLINE DOCUMENT A

ctrl+2 ctrl+end ctrl+home B

ctrl+c or ins ctrl+x or ins ctrl+v or Del A

ctrl+5 ctrl+1 none of the above B

Frame AutoShape Border A


Screen Tips Page Layout none of the above A

WordArt Auto Shapes File A

Shading WordArt Bullets D

remove all remove clear all D


circle bullet dialog
arrow bullet dialog box box none dialog box A

WordArt AutoShapes files C

document1 new document default document B

hyphenation mail merge none of t he above A


thesaurus menu shift+f8 tools+spelling menu A

second first row last cell of the t able A

end enter none of the above A


table auto format
convert data to table option none of the above A

rows & columns records none of the above B

AutoFormat style gallery none of the above A

Macro Data Source none of the above B


visual basic vj++ visual FoxPro B

shift+f7 alt+f8 alt+f5 A

online layout view browser none of the above A

outlook express micro soft outlook hotmail A

xml sgml vb script A

intranet arpanet LAN A


field names in the the number of fields
the field separators header source must names in the header
in a header source match any merge source must be the
and the data source fields you've same as the number of
can not be set as inserted in the main data fields in the data
paragraph document source B

auto format option by default cell delete cells option


applies to the entire height and weight allows to delete the
table and not only to option applies to entire row or a column
the selected rows or all the rows and or shift cells up or shifts
columns of a table columns of a table cells left C
decimal justified top A

In order to type a If a header is


header from the third inserted in the A section is a portion
page of the document second section then of a document in
a section break is the same header is which certain page
inserted after t he applicable to the formatting option can
third page first section be set D

false A

false A
false A

click -n-type Double Click none of the above B


false A
with t he caps lock key
accidentally turned on
reverses the case of the
automatically letters that were
prohibits the user corrects the capitalized incorrectly
from renaming an grammatically and then turns off the
auto correct entry errors caps lock B

password protected
document can be
opened without
password as read password are not password can be upto 15
only case sensitive characters long B
justified hanging top A
a document file can a multiple an .xls data can not be
be inserted in the documents files can inserted at specified
current document at be inserted in the position in the current
specified position single document document B

false A

false A

false B

false A

Child Document Hyperlink Document none of the above A

Page Layout Outline Layout none of the above B

Type Over mode Remove none of the above A

press the escape


press the tab key key just keep typing D
lines and spaces height and width rows and columns D

enter/return backspace/ delete shift B

spell checker thesaurus outliner C

send private
send pictures to a messages to a send a package to a
friend friend friend D

From ___ To ____ Page setup Print preview B

Copy Retrieve Save C


tabbing spacing sorting B

graphing word processing spreadsheet C

Creating and editing


documents Storing information None of the above B

annotation clip art clipboard C


Creating and editing
documents Storing information Making Calculations B
Spelling, grammar and Cut, copy, paste Font, Paragraph, Bullet
autocorrect and clear and Numbering C

Text which appear


Numbers which appear at the top of Designated area on the
on every page every page document C

Keyboard, Mouse, Monitor, keyboard


monitor and printer and mouse None of the above B

clip-art file microphone digital scanner D


Spelling, grammar and Cut, copy, paste
autocorrect and clear None of the above C

10 point 15 point 25 point B

2¾ inches. 3 inches. impossible to determine. B


Word cannot display
columns during editing;
You have not inserted You have not you will see them only
a column section specified continuous when you print the
break.. section breaks. document. A

to move a section of to leave an original


text from the section of text in
to store a file on a original location to place while pasting a
diskette another location copy elsewhere D
A set of different
Mainly text graphics None of the above B

Spell Checker Grammar Checker Find and Replace B

Replace Select all AutoCorrect B

Cut, then paste Delete, then paste Insert, then paste A


To give the original To complicate the
author a chance to revision process To allow multiple people
reject suggested and to force the to work on one
changes from the author to spend document in
person who entered more time making collaboration with one
the revisions corrections another C
A vertical line
outside the left
margin signifies a Comments are
A red underline change has been enclosed in a text box
appears beneath text made at that point at the right of the
that is to be added. in the document. document. D
Through the Tools
menu by choosing Both through the
Track Changes Through tools on the Tools menu and the
command Reviewing toolbar Reviewing toolbar D

The Versions The Versions


command will allow command will allow The Versions command
you to save only one you to save only one will allow you to save
version of a document, version of a only two versions of a
including any changes document without document: one version
that may have been any changes that of the original and one
made to that were just made to version of any changes
document. the document. made to the document. A

The latest version is The first and second


opened versions are opened The previous version is
automatically. automatically. opened automatically. B

Grammar check Spell check Thesaurus A


Word will show the
The most recent name of the person Word is not able to tell
version will appear at who saved each the most recent version
the bottom of the list. version. of a document. A

Tools Forms Insert C

Toggle button Text fields A drop-down list B


Comments can be
edited or deleted Comments can be edited
by right clicking or deleted by left
Comments cannot be the highlighted clicking the highlighted
deleted. text. text. C
Text which appear
Numbers which appear at the top of
on every page every page None of the above C

Press Return. Copy and paste. Insert page break. D

graphics. forms. numbers. C

bibliography. find/search. macro. A


Format Painter This action is not
Paste button button possible. C

Bug Squashing ss Debugging D

Tools Format Edit C


a section of text where the guidelines used
the first letter of each to establish where
sentence is lowercase different elements an enlarged capital
and the rest are of the newsletter letter at the beginning of
uppercase. will go. a paragraph. A
typing it all in capital underlining the text
letters. of the pull quote. changing the color. A

A grid is a set of
A dropped cap is a horizontal and vertical
A pull quote is a word that starts with lines that determine the
quotation taken from a lowercase letter placement of elements
(pulled) from another when it should have in a newsletter or other
document. a capital letter. document. D

The height of each The number of The tab spacing


column columns within each column D

10 12 72 D

Two Three Four B

Press Ctrl+Shift+Enter Press Enter to


to create a column create a section Press Shift+Enter to
break. break. force a line break. C
A sans serif font at 10 A serif font at 20 A sans serif font at 45
points points points D
It depends on the left
and right margins,
and how many
columns are
3½ inches 4 inches specified. D

Record Both None of the above A

Vertical A or B None of the Above A

Combined Value Gaps All of the above C

Filter Merge None of the above A

VLOOKUP() HLOOKUP() None of the above B

FALSE A

FALSE A

Strange A or B None of the above C


comparison of data duplicates testing All of the above D

False A

False A

Sequence Range Both B & C B

a form of ROM a form of VRAM none of the previous D


involves using more
same as than one processor at
multiprogramming multiuser the same time D
use a virus protection
set up a password make a backup copy program B
to read from or write
information to a floppy to print sheets of to display information or
disk paper pictures on a screen B
uses Java uses C++ none of the previous. D
103 sec 1012 sec 109 sec D

a mouse a frog a message pad B


data that has been an instruction that has
transferred from the address of a been transferred from
memory memory location memory. C
an instruction that has
data to be transferred the address of a been transferred from
to the stack memory location memory A
an instruction that has the address of the next
been fetched from an instruction that instruction to be
memory has been executed executed D

a scroll bar a light pen a magic marker A

Algorithm Program Data B

Compiler Artificial Intelligence Parity Checker B


Parity Checking Range checking Validation B
use the backup
search each file in turn facility use find and replace A

Program System Modem B

use different filenames keep a record of backup to a secure


on the system computer failures medium D

Time sharing Multiprogramming Multiplexing D

RAM Floppy Disk Magnetic Disk B

Word Processor Telephone modem Shareware C

Word Processor Telephone modem Shareware A

Hashed Indexed Random C

ALU CPU Primary Storage B

Blocks and Sectors Files and Tracks Schema and subschema A


Database, character,
record File, record, field Element, field, file C

Maintenance
diagnostic program Systems logs Parity check C

CD-ROM MIDI interface Serial interface A

Pictures Sound Video D


Dot matrix Ink-jet Drum B

recording current stock


presenting an order in a supermarket and
creating the plans for a for stock to a answering customer
building design. warehouse. queries. A
never updated updated regularly updated once a year C

Document processor Graphics package Spreadsheet D

make efficient use of retain confidentiality


time of files simplify file structures C
1024 4096 8192 C
duplication of data virus infection loss of data D

HTML IPX/SPX NetBEUI A

printer can do 1000s the operating system is


files can be shared of pages a day easy to use B
a subdirectory the root directory the hard drive D
up-line provider uninterruptable
service power supply uniform page source C
the program the system requires
executable may not a network the system always
allow it to be administrator to requires a re-boot and
uninstalled uninstall it defrag afterwards A

documents. information. text. A

Rules writte in Logical Steps in any


procedural language language None of the above A

It is mandatory in
To fill the log register tally None of the bove A

prevent
speed up access unauthorised access allow encryption C
IT management lacks IT understands the
leadership. business None of the above B

output. processing. All of the above D

Software that
generates innovated
Using computers to do designs and artistic
architecture. patterns. None of the above A
Application Service
Provider enterprise local B
ensure the filename is
not lost identify the file identify the file type D
All of the above are
detective controls. corrective controls. parts of IS controls. D
static hashing dynamic hashing extensible hashing A

B: (a) to (d) C: (a), (b), (c) D: (b), (c), (d) C


preventive controls detective controls general controls C

Interface Settings Control B

(b), (c), (d) (a) to (d) (a), (b), (c) C


Select the ‘Shut Pull the power cord from
Turn the computer off Down’ option from a the back of the
at the power point. menu. computer. C

Ask the person next to Use the Find or Put your hand up and
you. Search feature. ask the teacher C

(a), (b), (c) (a) to (d) (b), (c), (d) C

organisational controls preventive controls corrective controls C

(a), (b), (c) (a) to (d) (b), (c), (d) C


program change
call lights requests resolution procedures C
data testing thread testing loop testing A

(a), (b), (d) (a), (b), (c) (a) to (d) D


specifications
matching parallel operations system walkthroughs B

Peripheral processors. Concentrator. Job control language. D

(b), (c), (d) (a), (b), (c) (a), (c), (d) A

Identification of critical Physical security of Cross-training of


applications. warehouse facilities. operating personnel. B

interface design procedural design data design A


Client Computer network Hub C
Bus Mesh Ring A
Bus Ring All of the above D

To do a particular job To help someone


such as editing, storing who is applying for To Store data in an
information employment organised manner B

Sequential Binary Indexed B

Data communications
hardware and Operating systems
software. and compilers. Computer operations. C
A sequential file on a A direct access file A direct access file on a
tape on a disk tape C
Information formats
commonly vary
between Data record can never
Parity errors will result architectures be blocked together C
Address calculation
Control Unit part Input output channel A

Local Area network Wide area network Protocol B

Use the computer to Are required with a


which they are Generally require a microprocessor which
connected to perform keyboard for data permits some data
all processing entry and a CRT for processing such as input
operations display validation D

Modem Multiplexor Time sharing computer C

Aids in back-up Packs data in a disk Speeds up online


procedures file printing A

Ring Network Loop Network Star Network D

Executor systems Electronic mailing Instant post-office C

An intelligent
workstation A personal computer A mainframe PC B

Encryption algorithms Parity checks All of them C


Communication Device interconnect
Terminal Standard protocol standard D
A compiler converts A compiler is a
the whole of a higher general purpose
level program code language providing
into machine code in very efficient
one step execution None of the above B

Lexical analysis,
Implementation and CONVERSION, and
documentation code generation None of the above D

Baudot ASCII EBCDIC A


An interpreter is a
general purpose
An interpreter is a language providing
representation of the very efficient
system being designed execution None of the above A

Frequency division Time Division


Demodulator multiplexor Multiplexor C

Middle-level languages Low-level languages None of the above C

It is less prone to
It is less error prone attenuation Uses only one path D

Graphic design and Accounting systems,


education commercial sector None of the above C
Relieve the main
Manage the paging CPU of repetitive Reduce competition
function in a virtual communication between the
environment tasks input/output devices C

System Analysis Testing None of the above B

Coaxial Cable Common carrier Telephone Lines C


System Analysis
System Analysis involves creating a
defines the format and formal model of the
type of data the problem to be
program will use solved None of the above C

An interface A buffer An online protocol B


Testing to check for
errors before the Hardware, Software
system is introduced and size of program. None of the above B

Packet Ring Bus B

1100101 1010101 None of the above C

Retransmission Cyclic Redundancy Hash Count A


4 64 None of the above A

Modem Multiplexor Acoustic coupler C


141 97 None of the above B

Data management
Data Mining tools systems All of them B
secondary storage secondary storage
memory access time capacity access time B

255 256 None of the above B

ASCII code form decimal form alphanumeric form A

1B7 5C4 None of the above A


8 bits 16 bits 32 bits B

Binary Coded Decimal Bit Code Design None of the above D


1000 bytes 210 bits 210 bytes A
1112 1110 None of the above A

ASCII code form decimal form alphanumeric form A


Keyboard Numeric Keypad None of the above A
is the first bit in a
used to detect errors byte is the last bit in a byte B

Its moves like a mouse It has ears None of the above D


baud bytes Hertz D

Light pen Joystick None of the above C


MIPS MHz VLSI B

Tracing diagrams Reading bar codes None of the above B

MICR barcode scanning voice recognition B

Hard disk CD-ROM drive None of the above A


provides backup
increases the process power in the event
speed of a power cut none of the previous C
Light sensitive
Pencil lead elements None of the above C
1.44 Mb 5 Mb 1 Gb B

software output input A


Keyboard Numeric Keypad Printer B

Light pen Joystick Scanner C


Tracing Diagrams Reading Bar Codes Digital Signatures B

Hard disk Keyboard CD ROM Drive A

Bar code reader Optical mark reader Keyboard B


Mouse Speakers Printer A
Storing information
Printed output on the hard disk Back-up on a Cartridge B

Pixels Pixies Pickers B


Storage device Pointing device CD-ROM A

Bar code reader Optical mark reader None of the above


LCD displays SSGA displays none of the previous B
word processing
mouse button layout keyboard layout software C

Bar code reader Optical mark reader None of the above B


language interpreter software interface an operating system C
Speakers Smart card None of the above A

writing programs in
multitasking multiple languages none of the previous A
The ability to run 2 or
more programs writing programs in
concurrently multiple languages none of the previous B
To run more than
one program at the
an operating system same time none of the above C
Second - generation Third - generation Fifth - generation
computers. computers. computers. A
multiprogramming Multi-user none of the previous A
Deep Blue Param Arjun C
is due to bad disk
caused by overuse blocks none of the previous C
Magnetic Ink
Character
Optical Mark Reader Recognition Image Scanning
Technology Technology Technology B

slower than an converts a program


interpreter to machine code none of the previous C
Dot - Matrix Printer Desk - jet Printer Thermal Printer A
decrypting it compressing it transmitting it C
Virtual information
Vital information reader & user
resource under siege system None of above B
An inked ribbon and
Thermal Paper An ink pen print head D
LAN technology WAN technology Unix operating system B
10-3 sec 10-12 sec 10-9 sec D

Control figures External file labels Cross footing tests C

system operating system communication D


model pilot project process D

multithreading multiplexing multitasking D

super computers micro computers none of the above A

arithmetic and logic central processing


unit unit none of the above B
drum printer non impact printer none of the above C
electronic
word processing spreadsheet none of the above B
communication
software idea processor none of the above B

recycle bin Microsoft exchange none of the above B


file record none of the above C

machine language high level language none of the above B

processed symbol connector symbol input/output symbol B

hp vectra system fazitsu vp200 series IBM-PC B

multithreading multiplexing none of the above D

dumb servers dummy terminals dummy servers A


distributed computing
system windows NT LAN D

server back end front end D

server back end front end C


distributed
LAN computing centralized A

host processing dumb processing data processing B

one two many A


hierarchical database network database relational database
system system system D

multithreading multiplexing none of the above B


disk
redo logging defragmentation disk mirroring D
Modulation/Demodulati
on Module/De-module None of the above B

locks constraints traps B

multithreading multiplexing none of the above B


Local array of
Local area networks networks. None of the above B
process thread client-server C

Integrated Symbolic Integrated Services


Digital networks. Digital network. None of the above. C

Internet ARPANET None of the above. B


power builder SQL * plus all of the above D

WAN GAN None of the above. B


Transfer
communication Transmission control
protocol/Internet protocol/Internet
protocol protocol None of the above. C
Bits Packets None of the above. C

Software Mail Simple Mail transfer


transmission protocol protocol None of the above. C

Transmission protocol Hyper text None of the above. C


Asynchronous transfer
mode Area transfer mode None of the above. B

Printer server Receiver None of the above. B

configuration package system A

LAN and WAN LAN and MAN LAN WAN and MAN B
ATM Internet Intranet A

Internal Services Integrated Services


Design Network Digital Network None of the above. C
Web based
Web based Technology Transport Web based Transaction A
Routers Protocol Repeaters B
batch command program D
alpha beta numerous alpha number and alpha A

cost, performance size, performance, input, output,


their ratio cost performance ratios C

microprocessors PCs mainframes D

output feed write A

multithreading multiplexing multitasking D

compiler converter process D

processor ram output D


non-impact desktop
drum printers printers thermal printers C
control program,
interpreter, assembler, monitor, program, CPU, memory, input,
compiler keyboard, bus output D

application software windows 95 interpreter B

protocols software's procedures C

compiler assembler coder B

interpreter assembler processor C

You might also like