You are on page 1of 124

QUESTIONS

TALLY
The ------ key can be used to select an existing company from list of companies.
Import and Export of data between Tally and other programs is possible only
through
The ----------
re-order pointProgram.
is the inventory quantity that trigger a stock replishment
activity.
A created company's detail can be modified through keys
A/An ------------- is the official notice that the firm sends to its customers to advise
then to the amount of money that is owed.
In tally,all masters have ________main options
In tally,to create a new column in balance sheet press _______
In tally,the use of group behaves like a sub-ledger, option is that we can
summarize many ledger accounts into one line statements
In tally, we can alter ledger details using either single or multiple modes but not
alble to delete a ledger from multiple modes.
In tally,a group company is marked with an ______________
The systems that work together to order,receive, and pay for replenishment of
stock are ---------------
Tally allows to delete a ledger from --------- alteration mode.

--------------------- is/are useful for management in the decision making.


In tally,the group company must contain at least _____________ members
To cancel a vourcher entry in Tally, short-cut key is -----------

The accounting masters and inventory masters related to


We press ------------- function key to display the age-wise analysis of Bills
Receivable or Bills Payable report
In Tally, we press ------------, to print report .
In Tally, Types of Accounts and Types of Vouchers passed during the period, can
be seen in ------------- report.
In the Tally Software, the ------------ directory stores all data entered by the user.
The Ledger Accounts are unique in Financial Accounting Packages
Customers can be permitted to enter their own data into the firm’s computer using
the firm’s wide area network is an example of
In Tally, we can customize the Vouchers as per our requirements
The number of steps in Accounts Compilation are
Each action/transaction of a firm is described by a ----------------.
Tally is based on mercantile accounting system

Ctrl + N is used to -----------


------------- in Tally classify the accounts under different heads so that summarised
information is possible.
Revenue Account also known as -------------- Account
Method of Voucher Numbering is/are
Accounts Receivable are displayed in

To assemble a product from different items -------------- entry is used


A --------- purchase orders data flow is directed to the purchasing system for use in
closing out the outstanding purchase orders in the receiving system diagram.
Tally provides at least --------- predefined voucher formats
The value of the inventory is included in a ledger accounts as an asset on the
balance sheet
" The buyers can follow up with the suppliers to determine the reasons " is an
example of -----------------
From voucher entry mode , if we press __________ then we get payment voucher in
tally

Default Cost Category in Tally is/are --------------


A Group Company is simply a name and an identify given to the merged accounts
member companies of the group.
A ----------- is a primary document for recording all financial transactions.
The field can have a value between ________________ in FA Package.
The _______ file maintains data that describes the supplier past transaction with
the firm in terms of material quality in AIS
It is necessary to manipulate data to transform it into ----------------
In tally, to change the date of the voucher press ______
Tally can maintain budgets on ----------------
The value of the inventory is included as an asset on the balance sheet
In ratio analysis report of Tally FA packagewe we press ________________ function
key to the display of bills receivable , bills payables report
The accounts payable system is responsible for paying the suppliers for the
-----------------

What is the default financial year in Tally6.3 _________________


Tally encrypts and stores TALLY DATA at the data directory
The Profit & Loss statement can be displayed in ---------------- format(s).

Default ledger accounts in tally are ______


Default 'godown' name in tally is ____________

'Tally vault' is a _________________


To create a sales voucher in tally , you have to press _______
A Group Company is ------------------------- given to the merged accounts of member
companies of the group.
In tally,"credit note" voucher type records entry for ________________

In tally you get


------------------ currency
gives symbolfor
the balance option
eachfrom _______
day for menu type has been
the voucher
selected.
For 'stock journal' entry we press ______________ in tally

Tally provides the capability to the administrator/auditor to track changes in the


areas is/are
In tally, types of users are _______________
By pressing -------- key, a list of inventory reports can be displayed straightaway
from the balace sheet report
Projected approximation of income or expenses is called ______________ .
"Administrator" type user is also called 'Auditor' of a company in Tally
You will get company information , if you press __________ from gateway of tally
A constituent(member) company can be a member of more than one group.
Default stock category in tally is ______
To create a log of the import activity in a file _____________ is located in the same
directory as an executable program in tally
In Tally,inventory valuation method option is available from _______

Tally audit feature is available in a company __________________


In tally, a group company can also be a constituent(member) of another group
company
Default number of groups in tally are ________

During voucher entry ------------- are used.


User designated as --------------- can view audit list.

Tally supports Importing of data from ----------------


In an accounting information system, which of the following types of computer files
most likely would be a master file?

Which of the following is an advantage of a computer-based system for transaction


processing over a manual system? A computer-based system:

The memory address register is used to store

FUNDAMENTALS OF COMPUTER

Inefficient usage of excess computer equipment can be controlled by


Which of the following is not the component of a CPU
A trailer label is used on a magnetic tape file, it is the last record and summarises
the file. The following is an information not found in the trailer label

Hard copy is a term used to describe...?

What do the abbreviations VAB stand for


What control would prevent the accidental erasure of customer information from a
magnetic tapeindividual dots which make up a picture on the monitor screen
What are the
called?

Header label normally include all the following except the


A daisy wheel is a type of...?
Which approach or technique is a control usually associated with microcomputers

An impact printer creates characters by using...?

The best security control in a microcomputer environment is to


What would you NOT use with a flatbed plotter?
What do you need for an ink jet printer?

The greatest control exposure in a microcomputer environment is the lack of


What do you need for an ink jet printer?
A laser printer does NOT use?

The amount of data that a disk may contain is known as the disks...?
You can ________ protect a floppy disk.
Information on a hard disk is usually backed-up using a...?

Magnetic tape is a...?


Hard disks can have a storage capacity in the region of...?

Which storage device has the largest capacity in Mb?

Which storage device cannot be erased?

Where should floppy disks be stored?


The contents of these chips are lost when the computer is switched off?
What are responsible for storing permanent data and instructions?
Which parts of the computer perform arithmetic calculations?
What are small high speed memory units used for storing temporary results?
How many bits of information can each memory cell in a computer chip hold?
What type of computer chips are said to be volatile?

Software can be divided into two areas:

Travel agents use this computer system when reserving flights

Which computers are used in the weather forecasting industry?

Vacuum tube based electronic computers are...?

Which generation of computer was developed from microchips?

Which generation of computer uses more than one microprocessor?

Which generation of computer developed using integrated circuits?


Which generation of computer developed using solid state components?

DATABASES

Name three steps involved in developing an information system


_______ is used for CAAT as database
Generalized audit software perform auditors to undertake any past records and not
concurrent
Generalizedauditing
audit software is a file whose capabilities for verifying processing is
logic
CAAT's are computer program and data that auditor uses as part of the audit
procedures to process data if audit significance contained in an entity information
system
CAAT do not contains package programs, purpose written program, utility
programs or system management programs
Embedded audit routines are sometimes built into an entity's computer system to
provide data for later user by the auditor
SCARF involves embedding audit software modules within an application system to
provide continuous monitoring
Concurrent use auditors as the member of the system
Regular cross system verification may minimize frauds
Computer security is frequently associated with confidentiality, integrity and
authentication
Data reserve engineering process metadata to document system and abstract
business rules and relationship

The first step for developing CAAT is_________

Using the open database connectivity feature in ACL is ______________


Computer Assisted Audited Technique involves the use of computers through
"Black Box Approach"
White Box Approach necessary involves expert knowledge on the part of Auditor

The transition from manual system to CIS environment bring dramatic changes
including ________________

Auditing with computer necessarily supports the

CAAT involves an Auditors' appreciation of __________


Widespread end use computing result in unlimited errors creeping into system
going
For to accept handling,
computerized auditingthereby increasing
usage of auditaudit
sophisticated risks software would be a
necessity

Important knowledge needed to begin planning the use of CAAT is _________


The move towards paperless EDI would eliminate much of the traditional audit
trail, radically changing the nature of audit evidence

Computer operation controls are designed to provide ________________


Systems development control, apart from others, include authorization, approval,
testing, implementation and documentation of new systems software and system
software modification

A system could be _________


A system exhibits 'entropy'
Super computer are the largest and fastest and is very suitable for commercial
application including audit work
Assembler language uses Mnemonic symbols

Operating systems are devised to optimize the machine capabilities, the function
include_______________
General purpose software provides a framework for highly complex scientific
operation
In batch processing, transactions are processed one after another
The use of computer assisted audit techniques is not gaining popularity not only
________________
On-line processing refers to grouping of transaction and processing the same in
one go from start to finish
Real time refers to the technique of updating files with transaction data
immediately after the occurrence of the event to which it relates
In OLRT the CPU should process the capability of program interruption
Time sharing system allow access to a CPU from remote terminals
DSS is defined as a system that provides tools to managers to assist them in
solving structured problems

DSS has the following components _________________


Master files contains current records for identification and summarizing
Transaction files contain relatively permanent records take product profile,
customer profile, employee profile etc
Master file configuration includes ____________
______ is a file management software package that lets users and programmers
organize data into files and then process those files

CAATS provide added value to the clients because _______________


File volatility refers to the number of addition and deletions to the file in a given
period of time
File activity is the proportion of transaction file records that are actually used and
accessed in a given processing run:
File interrogation refers to the _____ of information from a file
One -to-one relationship means a single entity to a single entity in a monogamous
structure
RDBMS is structured to a series of 2 dimensional tables
SADB stands for ____________
Controls are present over many aspects of the computer system and its
surrounding
In social environment
framed checking the data entry is checked against an expected picture or
format
Errors are correlated_________
Field check is exclusive to a field
_________ law basically states that there is a specific probability of the first digit of
a no. being 1,2,3 etc
Check digit is a group of nos. added to a code for determining the accuracy of
other digits in the code

Hierarchical code means _________


The validation checks applied to a field depend on the field's logical inter
relationships with other fields in the record

The contents of a field could determine _______ sign for a ______ field
Batch is the process of ______ together _____ that bear some type of relationship to
one another
Hash totals means meaningless totals
With OLRT where interactive data entry is available, the master file associated
with a transaction may be searched for confirming data
Controls are required for authorization to ensure data integrity and detect possible
breaches in security
Data from client application are not stored in the organization's database through
auditables events and function
All input records in a batch are normally of different types

IDEA stands for _________________________________


A transaction file is sorted prior to the update of master file
A sequence check on the transaction or master files by an update program is not
required
Whenever monetary transactions are processed against master files, the update
program should maintain a correlation account to record such transaction that
does not have a matching master file record
Internal tables are stored tables from which certain values are extracted for
further processing and storing
For small to medium sized systems, individual modules are coded and individually
tested and then assembled to be tested as a whole-the testing strategy is referred
to as ___________________
In systems testing, test involves_________________
Recording transactions in a controlled manner may amount to loss of stored data

Audit software is used by the auditor to _________


Core image comparison is a software used by the auditor to compare _______
version of a program with a secure ________ copy
Database analyzer is a software which provides detailed information concerning
the operation of the database

SAS stands for ______________


Embedded code is a software used by the auditor to examine backup data
Embedded code performs wide variety of audit task
Core image comparison is particularly useful where only executable versions are
distributed
Log analysis is a software used by auditor to detect virus
On line testing techniques the auditor ______ data either _______ or fictitious in
order to see that a specific program or sever edit test is doing its work
Mapping software is used by the auditor to list unused program instructions
Mapping software has very objectives

Modeling is a variety of software which ________________


On line testing can be targeted for specific functions carried out by programs

Program code analysis involves _____________


__________ is a software of CAAT
Snapshot is software which takes a picture of a file or data or a transaction passing
though the system

Base case system evaluation includes____________


While base testing forces on finding if there are any defective execution policies in
a program
Black box testing seeks to determine whether application output is what it is
supposed to be
In integrated test facility approach the auditor should ensure that the impact of
test transaction is subsequently eliminated from the computer files

Black box testing is _______ based and white box testing is _______ based

Source code review means__________


In formula in flow hypothesis the auditor should expand the extent of substantive
tests to determine how the defects may impact the attainment of the program
objectives
All material application oriented events that occur within the boundary subsystem
should be recorded in the accounting audit trail

In examination of audit trail the following data associated with an event may be
___________-
JCL means_________________
Audit should be periodically analyzed to detect any control weakness of the
system
In an accounting audit trail, intrusion detection system might monitor the amount
of processor time consumed by the user to detect unusual deviation from the
amount processor time requested by the user in the past
A sample size calculator program assists auditors in determining RAND() function

Generalized audit software consists ___________

Specializes audit program may be___________


Generalised audit software could be used by the following in consistencies or
significant fluctuations

Generalized audit software function include____________


In the file reorganization merging capabilities are needed in data from separate
file is to be combined on a separate work file
Auditors cannot use generalised audit software to extract the data needed for
audit purpose

Auditors can combine functional capabilities of generalized audit software to


accomplish the task of __________________

Which of the following is not the feature of GAPs


Which is the example of CAATs

In audit procedures, test data is

Which of the following is not the use of CAATs

Which of the following are called explicitly by another procedure?


_________ data type is generally used for fields assigned as primary keys in a table
MS access objects can be published in the web
In code-builder, got_focuse, click,dbl_click,enter are examples of _______
_______can be used to automate certain actions in response to events

In the macro sheet the macro is selected in the _____field


To build complex expressions_____is used

The three list boxes present at the bottom of the expression builder are called_____
________option is selected from the view menu to create macros with conditions
_______report can be created with minimum user input
_______layout of a form displays one record at a time
The table or query name on which we are going to build our report is selected from
the ____ dialogue box

______and_____are the two types of auto reports available


There are no wizards for creating a database in access
______option from the insert menu option is chosen to add an embedded chart
In ms-access, while using SQL, references constraint is used for creating _______
_______is used to create a mailing label
______header is present at the beginning of the report
______is present at the bottom of each page in a report

In SQL, having clause is used for _________


______field is added to the macro sheet when we select grouping option from the
view menu
______can be used to create toolbars
_______query is used to add records from one or more tables into an existing table
_______window is used to write VB code in access application
Values for other tables, queries are maintained in look up fields data type
Visual Basic language is a _____ tool
______ function is used to display a message box
Other ms-office applications can be accessed from ms-access using a concept
called ________

OLE stands for_____


The application that supplies data in OLE is called an _________
If any change made on the object from the client side is reflected on the server
then the object is said to be _____
_______is the file format that works on internet
______ is used to convert any ms-access object into html format
_______ option in publish to web wizard produces a page that is static in nature
_______query is used to create or change database objects in a current database
Currency fields express the amount in _________
_______is selected from the toolbar to add an OLE object
To display an OLE object in the form of an icon ____ option is selected from insert
object dialogue box
_______option from the file menu is selected to run 'publish to the web wizard'
_____page in an web application is used to navigate to the rest of the pages in the
application
______ is fired when an event is triggered is the concept based on a Visual Basic
language
Ms access is a ___________
A collection of data stored in different objects is known as a _________

A blank database can be created using __________


Text type data can be of _____ characters in ACCESS
______is a datatype that assigns values automatically
Tables cannot be imported from other databases
If two tablesofhaving
Duplication same
records in a values for the
field won't be fields
allowedareifjoined it is are
the fields called an ______
declared
a________
Changes from a master table can be reflected on to the child table by selecting
_____option
To see more than one record at a time in a form we use _______
In SQL, delete command is used to remove _________
In MS-Access, filter excluding selection will display only those record(s) which
meet the criteria.

Properties of the fields are managed by _____ in Dynaset

______queries allows us to view data in row by column manner


The type of queries that can update or delete record(s) in a table(s) are called
__________
Joining tables without any matching values in the fields is called ____________
Primary key uniquely identifies each record

Which of the following dialog box is/are used in the creation of form ________
_______ query wizards are used to generate summary calculations for a table
Properties of a form can be changed by selecting ______from view menu options
Forms
In that arewhile
MS-Access, included
using inform
otherdesign
forms view,
are called ______________
for creating a command button for
adding a new record, we should select the _______ category from the command
button wizard
_______ form displays fields in a single horizontal row
The process of arranging the data in a meaningful order is known as ___________
______ are used to select only some particular records from the table or any other
database objects
In MS-Access, user may specify criteria for filter in form view using _________
___wildcard character represents any single character
Records cannot be sorted by a primary key
A control without a data source is known as ___________
Set of related option buttons, check boxes and toggle buttons is known as
_____________
The collection of related data and objects is called a ____________
Which of the following is control types ____________
In MS-Access, the function that gives the current date is _____________
_____is a control that lists set of data
______is a form that summarize large amount of data
______allows to create a filter by typing the value in a data sheet

Wizards for toolbox controls are called a __________


The wild card representation for any 5 letter word that starts with ram is
________________
Look up fields slow up data entry
____is an access
_____option from object that
the new displays
object un-editable
toolbar gives thedata
easiest way of generating a
report
______ represents data in a pictorial format
Changes of one table can be carried over to another related table
Hyperlinks are used to jump to any kind of information or data from a file
The memo field can have text upto_____ characters in length
In MS-Access, columnar layout can be used to view multiple records in a form
In MS-Access, alter command may be used in adding a primary key to a table
Update query is used to add records from one or more tables to the end of an
existing table
In ms-access, datasheet view is available in ___________
______are used to jump to any kind of information from a datasheet or a form
Home page will always be present as a first page of an application
Make table queries create a new table from the records of another table
In ms-access, to protect a database file from illegal access, we may set database
password. The option of setting database password is available in _______ menu
Foreign key is a field that uniquely identifies each record and accept no null values
Data definition queries are used to create or change database objects
The attributes of a composite key are known as ________
OLE object is a data type in access
Data displayed in forms cannot be edited
A sub form is used to display one to many relationship between tables
We can switch from datasheet view to form view by selecting view -> form view
option
In MS-Access long integer is a datatype
In MS-Access, while designing a table for a particular field, the Required parameter
is set to yes. This validates the field as _______
Sorting is applied to select only some particular records
Filter by form can be created from a forms shortcut menu
Advanced filter uses a filter similar to the query design window to create a filter
? Wildcard character represents any number of characters
_________ of the following is/are a type of chart
A bound control is tied to a underlying query or table
A calculated control uses expression as a source of data
Text boxes cannot be bound controls
The default query invoked by ms-access is
A control can be bind to a record using row source property
List box is a control that offers a list of choices
If a table is joined to itself it is called a ________________
A picture box combines the activities of both a text box or a list box
Line is a tool box control
Text boxes can be part of a option group
_____ chart exists as a separate object
Filtering data is a way of arranging data in a meaning full order
Wild card characters are used for sorting records
Pivot tables are used to navigate to the other tables in a database
Reports are used to represent un-editable data

In MS -Access, the records in a table are sorted based on _________


Relationship is an association between _________
Summary options dialog box is used to summarize data
______ queries can be used to delete a group of records that meet some specific
records
Charts can convert numerical data in a easily understandable format
Embedded charts exist separately
The chart which cannot exists as a separate entity are _______________
From ms - access, if we want to view the records stored in a table in ms - excel
worksheet, we need to
Page header is present at the beginning of each record
Detail section has a header and footer
A macro is performed only when the user initiates an event
The macro is selected from the action field of a macro sheet
A macro can be made to execute before the starting of a database
In MS-Access. While appending records, the source and the target table must have
similar structure and fields
We can add our own functions to the expression elements list box of the
expression builder
_______is the wildcard character which represents the presence of any number of
characters
Macros can be used to add a menu to a database object
_____ header is a unique feature of reports
Chart can either be a form or a report
Group header will be present at the design view of a report even if the report is
not grouped
We can change from the design view to the form view without being prompted for
saving the changes made
Charts can be produced without the wizard
Macros can be used to create user defined error messages
Between and Not Between is ______ type of operators
The default data type of VB is integer

Visual Basic is based on __________


_______is the name of the database object that displays data and can be used to
edit data
In access OLE objects cannot be linked
_____ section is present for each record in the report
A ________ sheet lists all the properties that pertain to the form or the controls
Textboxes can also be an example of unbound control
In MS-Access, we may design command buttons for navigating records
_______are forms that are included in other forms
_______ are used to represent our data in graphical format
A field with a _______ uniquely identifies each record
Large amount
_______ of data to
are employed can be summarized
select using ______
only some particular tablesfrom a database
records
object
______ control need not have a data source
______ control combines the functionality of both a text box and a drop down list
MS access is a DBMS
A form can be bind to a record source using _____ property of the form
______ forms displays field in single row
______ forms are usually used for tables with one to many relationship
_______ control uses an expression as a source of control
_______ control is tied to field
_______is the from
______option form the
thattool
canmenu
be created with minimum
is selected for settinginput from the between
relationships user
tables

______,______and_____are the buttons belonging to the options group


_________allows us to create a filter from a field short cut menu
________is a database object which displays data but cannot be used to edit data
What term
All of the applies to
following a collection
terms of related
are related records in databases
to computerized a database?
except which
one?

What is a database?

What does a record contain?


An RDBMS is a

Data Warehousing refers to

Unauthorised alteration of on-line records can be prevented by employing

What is a database?

What does a record contain?

What is a report?

What is the best way to analyse and change data

What are some popular office orientated software applications?

Which of the following constraints can be used to enforce the uniqueness of rows
in a table?
Which of the following commands is used to change the structure of table?
An RDBMS is a

Data Warehousing refers to


You are creating a client application that calls ActiveX DLLs. Which of the following
properties of the Err object provides the name of a component that sends an error
back to the client application?

This database holds personal information. The user can help to keep it confidential
by
If the database holds customer names and addresses, personalised letters can be
created automatically using
Application software suited to storing the survey information obtained in the table
would be
The characters * and ? are sometimes used in search criteria as
Which of the following field types will generate the primary key automatically?

Referential integrity ensures that the:

Tables are related to one another through a:

A foreign key is:


You are creating a banking database to track customer loans. The bank will, of
course, have many customers, each of whom may take out one or more loans,
while each loan may be associated with only one customer (there are no joint
accounts). What is the re
In a one-to-many relationship between Companies and Employees, which field is
found in both tables?
Which of the following ensures that records in related tables are consistent with
one another? For example, it ensures that you cannot add a record with an invalid
foreign key.

How would you delete a relationship between tables in the Relationships window?

In a Customers tables, what does a plus sign next to the CustomerID field mean?

What is required of the fields that join two tables?

Assume a one-to-many relationship between the Customers table and the Loans
table, with referential integrity in effect. What happens when you attempt to
delete a customer ID from the Customer table that still has entries in the Loans
table?
Which of the following is true when viewing a main form and its associated
subform in the Form Design view?

Which of the following relationships does not belong in a database based on a


professional sports league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the
“many” side of a one-to-many relationship?

You have created a one-to-many relationship with referential integrity between a


Customers table and a Loans table. From which table can you delete a record?

The correct order of the arguments for the MsgBox statement is:
The first statement in a procedure named CreateList is:

Which of the following is TRUE related to form fields?

A text field:

The purpose of a database is to:


A database stores:
A database records:

A sales contact manager used by a salesperson is an example of _______________

A Customer Resource Management (CRM) system is an example of_________

The industry standard supported by all major DBMSs that allows tables to be
joined together is called __________.

A program whose job is to create, process and administer databases is called the
_____
Microsoft Access may use which of the following DBMS engines?

Which of the following are basic components of an enterprise-class database


system?

In an enterprise-class database system ________ .


In an enterprise-class database system, the database application ___ .

In an enterprise-class database system, reports are created by


____________________ .

A database is considered "self-describing" because _______ .


In an enterprise-class database system, the database _________ .
A database may contain _________________________ .

A database designed using spreadsheets from the Sales department is a database


being designed _________________________ .

A database designed to implement requirements for a reporting application


needed by the Sales department is a database being designed _______ .

A database designed to combine two databases used by the Sales department is a


database being designed _________________________ .
Database professionals use ________________ as specific data sources for studies
and analyses.
Database professionals use a set of principles called ________________ to guide and
assess database design.
A very popular development technique used by database professionals for
database design is known as _______________________ .
A very popular development technique used by database professionals to adopt a
database design to new or changing requirement is known as _____ .

The predecessor(s) of database processing was (were) __________ .

In a relation __________________________ .
An attribute is also known as a(n) .
A combination of one or more columns used to identify particular rows in a is___ .
A combination of two or more columns used to identify particular rows in a relation
is________ .
A determinant that determines all the other columns in a relation is______ .
When designing a database, one of the candidate keys in a relation is selected as
the _________ .
Normalization is a process used to deal with which of the following modification
anomalies?

When you are given a set of tables and asked to create a database to store their
data, the first step is to ____ .

Modern microcomputer personal DBMS products______.


Which of the following are true about data mining applications?
We have obtained access to the company's operational data. We examine 50
records for customers with phone numbers that should use the current area code
of 345. Of these 50 records, we find 10 that still use an older area code of 567.
This is an example
We have obtained access to the company's operational data. We have been asked
to produce a report with an item by item analysis of sales, but the only sales figure
available is the total sale value for each order. This is example of_____

A data warehouse database differs from an operational database because:


Which of the following objects is used to display a menu?

Which of the following objects are NOT found in an Access application?

You are developing an Access application that you expect to upgrade periodically.
Which of the following statements is TRUE?

Which of the following statements regarding Access applications is NOT true?


Which of the following brings a copy of the table into the current database and
does not maintain a tie to the original table?

What makes a database an application?

What is the Access tool that is used to create the user interface?

The purpose of a data warehouse is to:


___________ means the result of applying to specific information certain specific
technical processes.
__________ is an algorithm which creates a digital representation or "fingerprint" in
the form of a "hash result".
__________ is of standard length which is usually much smaller than the message
but nevertheless substantially unique to it.

Digital Signature involves two processes. They are ___________ and __________.

The Costs of Digital Signature consists mainly of the following

CA stands for ________________


A Digital Certificate is issued by a Certification Authority and is signed with the
CA's Private Key
A Digital Certificate does contain Owner's Public Key, Owner's name, Expiration
date of the Private Key, Serial number of the digital certificate

______________ enable web servers to operate in a secure mode.


______________ are used by individuals when they exchange messages with other
users or online services.
______________ are on-line databases of certificates and other information available
for retrieval and use in verifying digital signatures.

Signing Writings serve the following general purposes______,_______,_______ and


_______
The most widely accepted format for Digital Certificate is defined by the CCITT
X.509
A certificate may prove to be unreliable, such as in situations where the subscriber
misrepresents his identity to the certification authority

CRL stands for


The prospective signer identified in the digital certificate holds the_________ and is
called the ___________
In EDI interface, the translation service receives _________ as incoming files from
the communication service
The EDI standardisation for International Trade and Commerce is introduced by
__________
In EDI, the transmission files are composed of different sets of external format files
which are grouped into multiple sets under the name of ________
The ________________ are pre-paid credit cards that include an embedded cards
________________ are another form of credit payment that lets customers use digital
online cheques to pay Web merchants directly

In Active advertisement, there are two types of models. They are _____ and
________
The network based technology is/are ____________
Decryption is a process employed for scrambling of plain text for web based
transactions

Asymmetric cryptosystem is based on __________ and ____________

Value Added Network is an example of _________


The advertising strategies emerging in the on-line world are ____________
The _________ model use direct mail, spot television or cable television, in active
based advertisement.
The ________ is a form of mail that is not targeted to a specific audience
The __________ model refers to information that is placed at a point where it will be
noticed by customers in the course of other activities and does not require active
search

The most beneficial advantage of ERP system is


What is the term that describes spying on one’s business rivals to gain a
competitive advantage?

What would you NOT be looking for when spying on a competitor?

An online drugstore such as Drugstore.com is an example of_______

Which of the following is an example of unacceptable online ‘netiquette’?

Which of the following statements is correct concerning the security of messages


in an electronic data interchange (EDI) system?

The wizard that


alphabet is used to
indicating theimport text
column files is_________________
followed by the row number is known
an__________

Which
In of the
excel, the dates
following
thatfiles
are could
storednot
as be opened numbers
sequential in excel _______________
known as
________________-
The command to display the current date in a cell is _________________
In excel, absolute references are represented by a ________ before the column and
row addresses
The ________ can be used to select the function and assemble the arguments
correctly
Specific parts of information required by functions to perform certain tasks are
called as___________
Which of the following do not belong to the formula category in excel
environment__________
The function that in used to
is used to count
join cell
allvalues together
the values that in a single
meet cellcriteria
specific ________
_________

The wizard
functionthat
thatisisused
usedtotocreate and the
calculate editpayment
charts _______________
for specific loan terms
____________
The function that is used to add together all values that meet specific criteria is
known as ____________
The __________ option present in the file menu options is used to specify major
facts of the page to be printed

The command that is used to apply a format automatically __________


The ____________ makes the information in a worksheet meaningful and easy to
understand
A particular part of a work sheet can be printed by setting the _________
The process of finding or selecting information is known as ____________
The option that is used to cancel the filter process for a specific column and
display all the records is ________

The URL for encyclopedia Britannica is_________


_______ maps IP addresses with the domain names of the sites

Internet can be defined as _______


The most important service of the ______ is to manage traffic control
_________is a program that displays information about a host connected to the net
_______ is a program or a tool that helps in locating a file anywhere on the net

URL stands for ____________

IN an URL the word before the color refers to _______


A ______ always begins with a slash
Prodigy is run by IBM and ______
The World Wide Web is referred to shortly as the _______

Gopher and WAIS enables the user to ______

______ is the program used to run CompuServe's regular services


Navigating through the menu of gopher is called moving around _______
The directories that come with built-in engines are yahoo,lycos and ______
To use the finger command,SLIP users must run a programme called______
The web maps are called _______
Directories consists of _______ levels
The _____ level gives the broadcast overview of the net
The huge list of keywords from important items is called ______

The two types of search in veronica are _____ and ______


_______ searches by keywords
Mosaic displays links in color whereas _____ does not display links in color
______ supports one button publish
SPY MOSAIC is distributed by_______
______ is a program that helps us to log on to other networks

HTTP is the acronym for __________


______is used to transfer and copy files over the internet
_____ is a program that helps us to log on to other networks

TCP/IP stands for ________________


Archie servers can be accessed in_______ different ways in internet
_______is the computer on the internet that translates between the internet domain
names and the internet numeric address

TIA stands for_____ in internet


Service indicates the name of the ________ used to access data, present on the
other end of the link.

HTTP stands for______

________ is used to link pages in the world wide web

FAQ stands for ______


The internet adapter is a programme that makes our connection act like a _____or
a ____ account
The step involved in Communicating between the web clients and servers is
______________

WSIRC stands for______


Two of the important browsers are_____ and_____

Lynx is a _______ programme that works with terminals


The huge list of keywords from important items is called an_____

VERONICA is an acronym for _______________

The first freenet is created at the_____ and is called______


________ are defined as ways of communication amongst networks

______and_____ are web searching features


WINWAIS has two source lists namely____ and______
________ is also called as WAIS manager

HTML stands for_____


The system of interlinked documents is known as_______
The small programmes that create animation,multimedia,real-time games and
multi user games are called______

The information displayed on the web page includes______,_____ and_____


The web pages that represent online home of their author are called______

GNN stands for______


_____ is the most popular internet service

The online service offered by navigator gold 2.0 are _______ and_____
_______ is a program or a tool that helps us find a file anywhere on the net
The databases to enable keyword search using Lycos are a2z,_______
______ is a large worldwide bulletin board service network

BABEL consists a glossary of _____

Dictionaries,encyclopaedias,government and other references are found in ______


Yahoo,lycos,excite and webcrawlers are _____

GIF is the acronym for ____________

JPEG is the acronym for ___________


The Web aids users to explore the ________

The three most popular mailer are_____,_____ and______

The World Wide Web consists of _________


In Microsoft Internet Explorer, the color of the text can be specified using _________
attribute of the font tag.

The interface that provides effective communication between the web browsers
and servers is _________
CGI is the _________ between web browsers and servers
CGI programs are invoked based on the information provided by the _________
A CGI program is usually called after a request made by the _________

URL stands for ________


A hyperlink can be on ___________
HTML was derived from _________
SGML is a _________

PINE stands for _____________


The application that confirms whether a document is compliant to its DTD is
_________
Web is a collection of ___________

IETF stands for ________


The two major browsers used to surf the Internet are ________,_______

Special characters allow browsers to display _________________


The keyword for providing links within or across documents is____________
Stringing pages together using hypertext technology helps view pages
_______________
The initial web pages present in a web site is the ________ page.
The image format supported by most browsers is________________.

The components of a URL are ___________

The mail we send has a mailing address and most of them correspond
to_____,_____ and
Which of the following is not supported by internet explorer _______________

CGI stands for ____________


Host name indicates the domain name of the web ________
The internet is also called as _______________

The internet is similar to _________________


The net drivers______ from one place to another

The net provides interesting services like______,______ and______

The windows internet software available are______,_______,________ and______


________ is the ancestors of the internet

DARPA stands for _______________________________________________


The uuencode files start with a _______

DARPA is broken into ________ and _______

NSFNET is the united states provides service to _____ and_____

HTML stands for ______________________________________


The first international IP network connections were established in 1973 with _____
and_____
A_____ is a set of computers interconnected by transmission paths to exchange
information in internet
A computer that provides a service usable by other computers is called______
A_______ is the representation of physical connectivity of the computers in internet

DTE stands for ____________________


The basic function of the ______ is transmitting the bits over a channel

The point to point channel network is also called as _____ and_____


Accessing files using FTP servers is called_____
The three most commonly used networks are______,______ and______
________ is in between LAN and WAN
_____ can be owed by multiple organisation
Data is transmitted in the form of_____ signals

DTD stands for __________

Modem stands for __________________


______ is the process of the digital signals being converted into a form suitable for
analog transmission

________ and______ are two basic ways of getting connected to the internet

SLIP stands for ________________

PPP stands for _____

Which of the following best describes uploading information?


A characteristic of a communication channel that is the amount of information that
can be passed through it in a given amount of time, expressed in bits per second.
The act of searching through storage to locate information without necessarily
knowing of the existence of the information being sought.
A "recipient" of the certificate desiring to rely upon a Digital Signature created by
the subscriber named in the certificate is called the ____________
The Relying Party can use the ___________ listed in the certificate to verify that the
digital signature was created with the corresponding _________
Digital Signatures are used for a variety of Electronic Transactions like
________________________
To associate with a key pair with a prospective signer, a Certification Authority
issues Digital Certificate

Digital Signatures, if properly implemented and utilized offer promising solutions


to the problems of Imposters, Message Integrity, __________ and _____________
In, Digital Signature, _____________ perform the "ceremonial" function of alerting
the signer to the fact that the signer is consummating a transaction with legal
consequences
A Digital Signature must have the following attributes ________________ and
_____________
"Hash Function" is used in both creating and verifying Digital Signature
___________ provides assurance of the origin or delivery of data in order to protect
the sender against false denial by the recipient that the data has been received, or
to protect the recipient against false denial by the sender that the data was sent.
___________ serves the ceremonial and approval functions of a signature and
establishes the sense of having legally consummated a transaction.
________ is a branch of applied mathematics concerns itself with transforming
messages into seemingly unintelligible forms and back again.
The complementary keys of an asymmetric cryptosystem for Digital Signatures are
arbitarily termed as _________, and ____________
_______ is known only to the signer and is used to create the digital signature.
_______ is ordinarily more widely known and is used by a relying party to verify the
digital signature.
____________ is the art of protecting information by transforming it into an
unreadable format.

Which of the following activities would most likely detect computer-related fraud?

A digital signature is used primarily to determine that a message is:

What is a major disadvantage to using a private key to encrypt data?

Which of the following risks can be minimized by requiring all employees


accessing the information system to use passwords?

The acronym for B2B is ___________


The _____________ model is the least intrusive model but requires active search on
the part of the customer
__________ is / are a form of advertisement where people relate their experience
with products and services
The _________ are software agents who communicate with the business merchants
on behalf of the customers

The Pre-purchase preparation phase includes _______________ for a set of products


The _________ phase includes customer service and support to address customer
complaints , product returns and products defects

The ________ allow companies to bypass the need for costly printed catalogs
A ________________ is a basket on the Net that is used to place the items that are
being purchased
EDIFACT is an abbreviation of ________
The __________ allows for protocol conversion and communicates with the bank
using the banks private network or the Internet
In Ecommerce, data extraction, transforming the data into transmittable form,
transmitting the data and downloading the data are the operations employed in
_________
The _________ commerce assists in integrating the customers and suppliers of the
company directly into the organisation
E-cash means______________________
E-commerce is a tool that addresses the desire of firms to cut services cost and
improving the quality of goods. It is a definition of e-commerce from _________

The small denomination digital tokens are called _________


The ____________ is the process of encoding information to prevent it from being
read by unauthorized parties
There are _________ types of data tables
The tables that allows the user to change or rearrange the data, summarize the
data and evaluate the data using changing points of view is known as

The wizard that is used to suggest hints for doing a task


In a chart Y-axis is known as_________
In a chart X-axis is known as_______________
_________ is a set of tables that describe each of the data series
________ is used to differentiate one data series from another
The chart that contains only one data series is _________
The chart that holds the column chart is _________
The chart that display two or more data series on a surface is _________
The chart that is used to display discrete data

_________ are not allowed in a macro name


Which of the following tool cannot be used to view the excel web page_______

The wizard that used to build an interactive table from data existing on sheets
The chart that is used for displaying stock market information
In excel, the subtotal command also generates grand total after the last group
subtotal_________
In advanced filter , the criteria occupying multiple columns but more than one row,
is considered as an ________ criteria.
The stacked bar graphs can be represented in __________
A pie chart can represent only one data series at a time
The ______ generates a summarized report in tabular form in an interactive manner

Which one of the following statements related to stock chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should be
used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC
party needs to won in totality to obtain majority to form the government. Which
one of the following will be the tool that will help the team ?
Which one of the following will be the tool that provides a way to view and
compare the results of all the different variations together on the worksheet ?
A ___________ is an excel file where the user stores his data

Spreadsheets are useful for _______________

Which one of the following is NOT the component of the pivot table ?
Excel allows upto ______ levels of sorting
Filtering rearranges a list to display the required records
The stacked bar graphs can be represented in _____________
The ______ generates a summarised report in tabular form in an interactive manner

Which one of the following statements related to stacked bar chart is NOT TRUE ?
The state government needs to finalize a five years plan to implement 100%
literacy in the state. Which one of the following will be the best tool that should be
used to work out the plan ?
Forecast'99 is a group working on exit poll. It wants to know how many seat ABC
party needs to won in totality to obtain majority to form the government. Which
one of the following will be the tool that will help the team ?

Which following function is used in subtotal option ?______________


A workbook consists of many ________

Which two of the following statements related to pivot table are TRUE ?

Which one of the following is NOT a What-if analysis tool ?

The _________ wizard separates contents in a cell into different cells


A spreadsheet is a grid of rows and columns and is called as a ________

Pick out the window that is not a form of excel ___________


On an Excel sheet the active cell is indicated by…
Cell A4 =2 and A5 = 4. You select both cells and drag the fill handle down to A8.
The contents of cells A6, A7, and A8 are _____.

If a cell shows  ####### , it means that _____.

Which
The gymis not an advantage
teacher has a newofprogram
using computerized spreadsheets?
to calculate physical fitness in terms of
weight and exercise. The use inputs different weights or amounts of exercise to
determine the related physical fitness. This "What if" program is most likely which
of the followin
The difference between the highest and the lowest values.
Spreadsheets can be used for...

To select a column the easiest method is to …


If you press _____, the cell accepts your typing as its contents.
The contents of cell C15 is =AVERAGE(C3:C14). AVERAGE(C3:C14) is known as
All of the following are considered constants EXCEPT:

Which of the following may NOT be included in a formula?


Which of the following is NOT a valid mathematical operator in Excel?

Given the formula =B5*B6+C3/D4^2, which expression would be evaluated first?


Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant?

How can you tell which cell in a worksheet is the active cell?

How can you change the active cell?

Which of the following would you use to change the font size of a cell in Excel?

The command that will save the current workbook with a different file type is:
The command that will print an Excel workbook is found on the ____________ menu.
In the Save As and Open dialog boxes, the ___________ view shows the file size as
well as the date and time a file was last modified.
Which of the following commands will automatically adjust cell references in
formulas?
Which of the following commands will remove cells, rows, or columns from a
worksheet?
Which of the following options is NOT controlled through the Page Setup
command?
Which command enables you to change the margins for a printed worksheet?
All commands are carried out on a rectangular groups of cells known as a:
Which of the following is a valid cell range?

In a copy operation, the cell(s) you are copying from is called the:

In a copy operation, the cell(s) you are copying to is called the:


Which of the following commands is needed to duplicate the contents of a cell in
another?
A cell reference that does not change during a copy operation is known as
Which of the following is considered an absolute cell reference?
Cell E3 contains the function =AVERAGE(A3:D3). If the contents of cell E3 are
copied to cell E4, what will be the contents of cell E4?
Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are
copied to cell E4, what will be the contents of cell E4?
Which of the following commands is needed to transfer the contents of one cell
range to another?

The F4 key is used to:


Which of the following quickly copies the formatting of a selected cell to other
cells?

Which of the following will insert a hyperlink into an Excel worksheet?

Conditional formatting applies formatting to a cell based on:

If you enter a date into a cell, Excel stores the date as:
You created a worksheet on July 30 and entered the =Today() function in cell E17.
You opened that worksheet again on August 31. What will be displayed in cell E17
on August 31?

The number of days between two cells containing dates can be calculated by:
The function key that is used to quickly edit the contents of a cell is:

What will be stored in a cell if 3/4 is entered in it?

A user’s response to the InputBox function can be stored in:


The cell reference for a range of cells that starts in cell B1 and goes over to
column G and down to row 10 is _____.
The teacher has a spreadsheet showing all Year 10 students and their marks in
one Mathematics test. To find the student with the highest mark, which of the
following functions should be used?
Which chart type best shows proportions of a whole?

Which of the following is TRUE regarding chart types?


To select several cells or ranges that are not touching each other, you would _____
while selecting.
Your Institute teachers have set an assignment on ‘Studies’. You are required to
use a spreadsheet to record all that you study on each day for four weeks. You
decide to show each week’s data with an accompanying graph. What is the best
way of doing this
What would be the best method to quickly copy the formula from the active cell to
each cell below it?
To arrange rows in alphabetical order based on column A, you need to use the
command _____.
What can you NOT do with a spreadsheet?

To print just part of a sheet, you would select what you want to print and _____ .
Spreadsheets can be used for...
The formula that will add the value of cell D4 to the value of C2 and then multiply
by the value in B2 is _____.

Which of the functions is not valid for performing addition

The default orientation for the printed page is _____.


Which is not a valid cell address?
The World Wide Web was devised by _________

The useful URL schemes are_____ and______

The other ways of getting connected to the net are_____

BBS stands for______


USENET is a BBS on ____ scale
WINSOCKS is expanded as______
IETF Level 2 HTML DTD supports graphical browsers like _______
The space used by Netscape to store the retrieved page is called______
The principles, means and methods for rendering information unintelligible and for
restoring encrypted information to intelligible form.
A long string of seemingly random bits used with cryptographic algorithms to
create or verify digital signatures and encrypt an decrypt messages and
conversations.
Protected/private character string used to authenticate an identity or to authorize
access to data.
The successful act of bypassing security mechanisms of the system.
A set of rules and formats, semantic and syntactic, that permits entities to
exchange information.
An attempt to get access to a system by posing to be an authorised person.
An action or event that might prejudice security.
According to information Technology Act, 2000, To investigate contraventions the
controller of certifying authority shall exercise the like powers to that of
Malicious software.
None the person who is known as father of Internet
This website is the biggest bookstore on the earth.

When we talk of Data Transmission modes, then ATM stands for


A sequence of bits or characters that identifies the destination and the source of a
transmission.
The means of communicating between networks
A group of computers and other devices dispersed over a relatively limited area
and connected by communication links that enable a device to interact with any
other on the network.

The term HTTP stands for

A NIC is considered as

A hub is a device that can connect

Which of the following is true concerning the function of a switch?

What do routers connect?


What does a router route?
Software which prevents external access to a system is termed
If four computers are connected to a hub and then to the internet, how many IP
addresses are required for these 5 devices?
Which of the following in an OSI layer
When creating a network from just two PCs, what kind of cable would be used to
connect them?

An IP address is a
To construct a simple LAN of 4 computers, you would connect them with
______connect them

What happens to data that is ruined before reaching to receiver


Bluetooth is
Which is not one of the recognized IEEE sub layers?
The most preferred number system to represent a IP address is
A MAC address is of

Protocol is
A ............... is a LAN-based computer with software that acts as a controlling
device for controlling access to at least part, if not all, of a local area network and
its available resources.

What is the biggest disadvantage of the Ring topology?


The .............. of the network concerns how network devices are physically (or
optically) interconnected.
The principal topologies used with LANs are:
What are the various types of bus architecture?
What are the various types of ring architecture?
In a ................., each workstation attaches to a common backplane via its own
physical cable that terminates at the hub
In a ............... , each work station is directly connected to a common
communications channel
Which one of the following is NOT a network topology?
In a .............. , the cable system forms a loop with workstations attached at
various intervals around the loop
The Media Access Control (MAC) is a sub layer of the:

What are the most common LAN technologies used in networking today?
Modem speeds are measured in
LAN speeds are measured in

WAN speeds are


Accessing the Internet from a typical home PC requires the use of

To use the Internet, you


The worldwide web server uses the following standard interface to act as the
middleware:

An NIC
Accessing the Internet from a typical home PC requires the use of
The most widely used network operating system on PC LANs is
JPEG and MPEG

To use the Internet you


A multiplexer is a form of

An ISP

FTP is

Telnet

A firewall is
A proxy server is

A search engine is
To look for information about interest areas on the internet, the user should use a

An ISP

FTP is

Telnet

Which of the following is a true statement about the OSI model layers?

Which of the following is NOT true about the Internet?


The traditional intent and impact of this common type of attack is to prevent or
impair the legitimate use of network resources.

A firewall is

Which of the following is NOT an example of a DoS attack that is popular among
hackers?
A ____________ attack is when a hacker sends a continuous flow of packets to a
system.
One defense option on a large network is to configure a ____________ to disallow
any external traffic.
A proxy server is
Which of the following would be performed on a network server and not normally
on individual workstations?

What can be said about the safety of the Internet?


To secure communication network against wire-tapping the most effective control
is

One way that a virus CANNOT spread throughout a network is:


Which of the following is NOT a means of monitoring employee use of company
technology?
____________ would be used by parents to monitor their children on their home
system.
The formal rules and parameters which are established to permit a microcomputer
to communicate with the mainframe computer as though it was a terminal of the
mainframe are called

The two most common tools used to help with extracting information are:

Which of the following would NOT be considered an example of cyber terrorism?

Which of the following would be a form of cyber terrorism?

Which of the following is a likely target of a cyber terrorist that would cause
considerable loss of life?

An organisation is upgrading its telecommunication lines. Which is the least


important objective while upgradation

A company posts a price list of its products on its website. The advantage to the
customer is that the company can

Which of the following is an easy-to-use service to get information on someone?

Which of the following pieces of information would NOT be found online?


Which of the following is the most common danger on the Internet?

The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in order to
obtain sensitive information is called _________________.
Using the Internet to pursue, harass, or contact another in an unsolicited fashion is
called:
Setting your privacy settings in Internet Explorer to medium is one way to block:

What is the best means of protection from cyber stalking?

Which of the following is not an appropriate control over telecommunications


software
Encryption techniques can be implemented in Hardware-Software
Which protocol would be used to download a free anti-virus program from the
Internet?

The major advantage of the checksum program is when it

Which of the following is a Web browser?

A Web page is another name for -----------


Domain names must contain a description of the type of organisation that the
domain represents. A very common abbreviation used include:

A standard language for creating and formatting Web documents is:


The Web page format in which all elements of a Web page are saved as one file is
called:

Which of the following requires an Internet connection?

Mr Rao wants to find a website that he briefly browsed over yesterday. After
turning on his computer how would he do this?

Which of the following is used to update a Web query?


You download from the internet, a screensaver, a ten-second sound file and a ten-
second music video clip. You also add a hyperlink. Which of the media elements
has the greatest effect on the file size?
When saving a photograph for use on a website, which format should you choose?

While researching the Direct taxes assignment, you find a useful website. What is
the most efficient way to access the site at a later time?

A system that uses the Internet for business-to-business interaction is called a(n):
A block of text automatically added to the end of an outgoing email is called
_________ refers to the use of Internet technologies for placing telephone calls.

Most client/server applications operate on a three-tiered architecture consisting of


which of the following layers?
Which do you NOT need to connect to the Internet?

What does FTP stand for?

What is the purpose of DNS?


Which of the following is NOT a properly formatted IP address?

Which of the following is a properly formatted email address?

The Internet is controlled by whom?

What does IRC stand for?

If you do not pick up your email for a week...?

What does HTML stand for?

What is a disadvantage of joining a mailing list?

In Powerpoint2000 ,the built-in professional design elements are


Selection handles are the 8 small ___________ that appear around the object, when
an object is selected
The _______ is an invisible matrix of vertical and horizontal lines that covers the
entire slide workspace
_______ are drop-down menus that appear when the right mouse button is clicked
on the screen element
________ and ______ have the ability to add a lot of visual impact into the
PowerPoint presentation
_______ is a motion picture or any animation file
In visual basic, when a record pointer reaches to the last record, _______ property
of a recordset object is automatically set to ______

In visual basic, the explorer view of a project is displayed in ___________


In visual basic, when a record pointer reaches to the first record, _______ property
of a recordset object is automatically set to ______
In visual basic, _______ is a method to convert a string into integer.
In visual basic, in a shape control, a vb statement gives Shape1.Shape = 2. What
type of shape should we get?
In visual basic, a timer event is only available in timer control.
In visual basic, vbred or vbgreen or vbblue are the property values of a backcolor
of any object
In visual basic, _______ is a property of a textbox control to set a color of a text.
In visual basic, _______ property of a textbox control is set to _______ to underline a
text
In visual basic, _______ property of a textbox control is used to change the size of
text.

In visual basic, the interval property of a timer control is given in ________


In visual basic, _______ property of listbox control counts the number of items in
the list

In visual basic, the properties of various controls can be set using __________
In visual basic, vbinformation, vbcritical, vbexclaimation are the values of _______
in a messagebox function.
In visual basic, ________ is a function which displays a message and it also allows
the user to enter values in a form object
In visual basic, using a data control, ________ is a recordset type which allows to
add a new record and also to update existing record in a recordsourse object
In visual basic, while closing a form _______ event of a form object is triggered
earlier to terminate event.
In visual basic, to give a backcolor or to bring in a picture to a command button
can only be done if we set the style property to ______
In visual basic, a method RGB(255,0,0) will generate _______ color
In visual basic, a method RGB(255,255,255) will generate _______ color

In visual basic, if a user uses a shortcut key ctrl+R _________ becomes visible.

if a user
In visual basic, when uses a function
a textbox key F4 _________
control receives the focus becomes visible.
________ event is
triggered.
In visual basic, a form is a ________ object.
Microsoft
In visualwhen
visual basic, basicaisform
a Rapid Application
object Development
appears on the screen tool.
_________ event is
triggered.
In visual basic, to display text on a label object _________ property is used
In visual basic, _______ object is used to access the database and also to manage
the data in the database.
In visual basic, when a checkbox control is checked _______ property is
automatically assigned with 1.
In visual basic, _______ keyword is used to declare a variable
What is the extension of the Visual Basic project file that stores the design of a
user control.
Which event of a text box would you use for validating the data entered by the
user?

Which of the following statements forces inline error handling?


The _______ method resets the contents of bound controls to their original values
when the user clicks on the cancel button.

To deactivate the Form UnLoad event, you make the following change in the
function definiton:
How many root nodes can a TreeView control have?

A project group is a Project which:


Procedures declared in a _____ are local whereas procedures declared in a ______
are available to the whole application.

How can you keep the user from exiting a form by clicking the Close button?
The _______ property enables Visual Basic to draw complete images in memory
before displaying them on the Screen.

You want to display the code and the description of an error. What would be the
correct syntax?

What is the purpose of the Image List Control?


Which method would you use to get a free or unused File identifier while opening
any file:
Which property procedure is used to retrieve the value of a property?

Which of the following can be shown to the user using the Common Dialog control
in VB?
Which of the following are not properties of Command Button:

Which events enable you to determine which key was pressed by the user?
In order to access a file in Non-textual format, you have to open file in:
Visual Basic displays information depending upon the current value of two
properties of the form, called:
Which of the following procedure types will execute when you assign a value to a
property of an object?
In order to overlap the controls (say a command button) during design time, we
use the ‘Send To Back’ or ‘Bring To Front’ option from the Edit menu. To change it
dynamically (i.e.during program execution) we need to change:
Which property of the ProgressBar determines how much of the bar is filled?
The ______ function can be used to run any .com, .exe, .bat or .pif file from a Visual
Basic program.

The caption and the name properties of the command button:

You try to initialize a new Object variable with the following line but receive an
error. What could be the possible cause? Set MyVar = New Classname

Which of the following will perform a direct execution of a Command object?

The vb Critical symbol displays:


vbYesNo is an example of a(n):
The primary difference between the MsgBox statement and the InputBox function
is the:
Which of the following is TRUE about a protected form (i.e., a form where the
Protect Form button on the Forms toolbar is toggled on and is assumed to remain
in that position)?
Which event is triggered when the user moves to another open form?
The user can use ______ to remove the undesirable part of the image
The power presentation has a _____ for a set of compatible colors
The set three colors used for graphs and for secondary slide items is called as
There are ______ types of charts available in PowerPoint
_______ charts are useful while showing variations over a period of time
_______ are the individual pages of a presentation
A PIE Chart is a ____ diagram that depicts the relationship between a whole and its
parts
Each individual piece of data in a series is called a/an

PowerPoint launches an OLE-compatible application called

When the user double-clicks on an organization chart object in PowerPoint

The _____ are used for selecting, editing and viewing objects in the chart

Manager box tool in organizational chart window is

The custom drawing tools are _______ by default


Click on the box tool ______ to draw three boxes
There are ____ default fields available in all boxes of the organizational chart
The _____ tool is used in the same way as we use a pen to draw a table
A/An _______ consists of smaller printed version of the slides
The size of the object can be changed using the ______ tool
_______ is the process through which the slides in the current presentation are
included in another presentation or application
________ can be used to create charts as well as worksheets

PowerPoint can import text files that have been saved in ______ format
PowerPoint outlines can have _____ outline levels
When a file is saved with _____ extension, the graphics and text are also saved
along with the slide

The hidden slide is

____ effect is used to introduce a slide during a slide show


A _____ is a special effect that determines how the objects appear on the slide
The notes page is formatted based on the
Pick the odd man out of the following
When a new presentation is opened ,powerpoint creates slides that have a width
of _____ and a height of ______ with the landscape orientation
The default orientation for notes ,handouts and outlines is ____ orientation
Build effect is also called as ______
Graphics for web pages are automatically stored in ____ format
A _______ is used to jump to any slide in the presentation

The ______ language has been incorporated into PowerPoint


In PowerPoint _____ is a series of commands that are executed in sequence

The macro will be activated


Developers can easily add ____ to PowerPoint 2000 by using the programming
interface
______ determines the order in which order in which the slides will be displayed
during the show
_______ is used to organize and develop the contents of a presentation
If we save the presentation file as a metafile, it can be opened using

With reference to autocontent wizard for creating a new presentation, which of the
following statements are not true

Which of the following statement is not TRUE

With reference to changing the order of slides, which of the following statement is
not true

Which of the following definitions are not true


Which of the following statements are not true

Which of the following definitions are not true


The options available in the common task toolbar does not include

With reference to chart, which of the following statements are not true
The format of the text entered in a title, subtitle, or bulleted-list object is
determined by the format settings in a special slide called --------
PowerPoint provides a _________ that searches the entire presentation i.e., all the
text objects in all the slides, outlines, notes and handouts for spelling errors
PowerPoint's drawing toolbar contains _______ drawing tools
Click _______ on the rectangle drawing tools enables us to draw multiple rectangles

An example of the components of a multimedia presentation could include

Which of the following formatting elements can be applied to a PowerPoint


diagram using the AutoFormat tool?
Which of the following formatting elements can be applied to a PowerPoint
diagram using the Format AutoShape command?

What happens when you double click a blank graph placeholder in a PowerPoint
presentation?

The legend
Suppose youinare
a Microsoft
creating Graph chart Graph
a Microsoft is: of quarterly sales by region. Which
would be the best chart type if you want to emphasize the total sales of each
region?
Which of the following actions will enable you to insert a graph into a PowerPoint
presentation?

If you are editing a slide containing a Microsoft Graph, how do you display the
underlying datasheet?
How do you deselect a chart that has been placed onto a PowerPoint slide after
you have finished creating the chart?

What happens when you click the Datasheet button on the Microsoft Graph
toolbar?

What happens if you single click a chart that is not currently active?

What happens if you double click a chart that is not currently active?

Using custom animation effects, you can build:

Which of the following animation effects can be added to a slide?

Which of the following animations effects can be added to a slide?


Which keyboard key is used to select more than one picture on a slide?

Custom animation can be used to affect ONLY:


Which of the following best describes the information that appears on the
advanced timeline?

Which of the following objects can contain custom animation effects?


What type of program allows an object within an image to be edited without
affecting other objects?

Which of the following animation effects can be added to a slide?

Which of the following is TRUE regarding the Datasheet?


Graphical software tools that provide complex analysis of stored data are:

Which of the following statements is TRUE regarding PowerPoint diagrams?


Which keyboard key combination is used to undo the previous command(s)?
Microsoft visual basic project file has _______ file extension.
In visual basic, _______ method is used to add an item in a combobox
In visual basic, _______ method is used to load picture during runtime in an image
control
In visual basic, to populate a drive list box with a directory list box __________
statement is used
In visual basic, to display a message in the run time _________ function is used
In visual basic, to populate a directory list box with a file list box ________
statement is used
In visual basic, ________ is a property of a recordset object which counts the
number
In visual of rowsusing
basic, in a recordsourse object
a data control, a record can only be added from the last
record. Adding a new record is only possible using _______ method of a recordset
object.
In visual basic, using a data control, a record is saved to a recordsource object
using _______ method of a recordset object.
In visual basic, using a data control, to navigate to the previous record ________
method of a recordset object is used.
To deactivate the Form UnLoad event, you make the following change in the
function definiton:Private Sub Query_Unload(Cancel as Integer,UnloadMode as
Integer) To prevent the Form from closing, you will set the:
_______ is a word
The feature processing
that enables that
user is a member
to type anywhere of in
the office 2000without
a document family pressing or
tab
The______ feature allows the user to copy and paste upto 12 items at the same
time in an application
______ and _____ key combination will extend the selection by one character on the
left and right

_____and_____ are improved layout in Word 2000

The easiest way to create a document in word is

In Office2000 environment the tool that makes work easier for us is_____
A short description of a tool bar button called the ______ is displayed when the
mouse pointer is allowed to stay for a second on the button
The _____ helps us to keep track of the margin of the page

The keys that are used to navigate between headers and footers are
Pick out the element from the following that dose not form the type of tabs for the
Word 2000
_______are blueprints or patterns for documents of a certain type
The______ is used for quickly setting paragraph indention using the mouse
Word art is text with
AutoShapes in word can be created by accessing the _____
By default, a document consists of_____ section

The dialog box that is used to determine the documents margins is


________ is a box surrounding a page on all slides or a line that sets off a paragraph
on one or more slides
The key that is used to perform a task to select all t he text in the documents is
indent athe
The key that is used to change paragraph is the current positioned in a document
font from
is
The key that is used to change the style of the document that is from that normal
to heading1 or heading1 to other document styles.
'Set mapping' Check control that follows a text-type validation, we use
----------------- application for data analysis.
Excel can import data from other databases for the data analysis.
A System Auditor can uses CAAT tools to analyze data
In the case of the ---------- control, it is ensured that the data in combination with
other fields are reasonable as per standard set by an organisation.
--------------- function searches for a value in the leftmost column of a table and then
returns a value in the same row from a column that we specify in a table
Most of the tools use in Data Analysis depends on

How do you define analysis of an information system?


What areas need to be considered in the SOFTWARE design process?

What is the function of systems software?

Formatting a disk results in all the data being...?

What is Direct Implementation?

What is parallel running?

What documents are produced during the development of a system?

What are User Guides are used for?

Systems software can be categorised into:

Which storage device cannot be erased?

Application software are programs that are written


Which bus carries information between processors and peripherals?
Convert the decimal number 2989 to Hexadecimal
Which bus controls the sequencing of read/write operations?

What are utilities?


Numbers are stored and transmitted inside a computer in

The original ASCII codes


A Nibble corresponds to

A gigabyte represents

A 32-bit processor has


A parity bit is
he contents of these chips are lost when the computer is switched off?
Clock speed is measured in

Cache memory enhances

CISC machines
Which parts of the computer perform arithmetic calculations?

Every data from the primary memory will be erased if


An RS-232 interface is

For print quality you would expect best results from

ROM

A UPS

smart card
Laptop computers use

Multiprogramming refers to

Multitasking refers to
What are small high speed memory units used for storing temporary results?
A good way to exchange information that changes rapidly is through

Multiprogramming is a prerequisite for

Timesharing is the same as


______ is the default view in Word used for typing Editing and Formatting the Text
The short-cut-key that is used to indent a paragraph spacing in the documents is
The short-cut-key that is used to paste the selected text
The short-cut-key that is used for paragraph spacing(1.5)
The box that separate text from the document and allows it to behave like an
independent object is known as
The object that is used to provide information like the title of the book, name of
the chapter, page number etc.
The object that helps us analyzing data statistically is known as
To highlight certain parts of a page to set it apart from the rest of the page we
make use of the following features
To clear all the tabs in a document the option that is clicked from the tabs dialog
The dialog box that is used to incorporate picture bullets into our documents or
web pages is
The object that composes of set of tools which helps to create and work on
different shapes like rectangles, circles, flowcharts etc.
When word is opened a new document called_____ is displayed, where the user
starts typing the content right way
______ is an online dictionary maintained by word to obtain synonyms for words
The thesaurus is invoked by pressing_______
When a new table is created the insertion point flashes in the _____
By pressing the _____ key inserts a blank row after the last row in the table

The ______ option enables us to convert text into a table format


A table consists of ______ that contain text or graphics
The _______ option in word allows the user to automatically correct misspell words
as and when they are typed
______ is a facility that enables recording and replaying of a sequence of keystroke
Macros
In Word 2000 theare written
macro in _____
dialog box is activated with the help of ____ key
combination
________shows how a document would look like when published on the web or on
an intranet

______ is a software for sending and receiving e-mail messages


________is the coding system used to create web pages
The network that makes information easily accessible across various networks is
_______

Which of the following statements are false with reference to the use of a header
row source for a mail merge

With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false


The alignment available for tabs does not include

Which of the following statements related to a Section Break are True


The user can set a spelling checker to skip the marked part of the next
New option under the file menu of word creates a new blank document that is
based on the normal templates
The user can split the screen only into two parts
The features that enables the user to type text graphics tables anywhere in the
document without pressing enter or tab
The user can modify the picture from the clip art

With reference to auto correct which of the following statements are false

With the reference to password protected documents which of the following


statements are false
The alignment available for tabs does not include

Which of the following statements are False


Drop Cap tool does not work for the contents in the table format
The user can split the screen only into two parts in MS-Word
The special symbols that are inserted using "insert symbol" option of the word can
not be printed by the printer as they are not standard keyboard symbols
The "format columns" option allows to create columnar text up 12 columns only.
The document that makes the user to organize and maintain a long document,
such as multipart report or a book consisting of chapters
The view that enables us to view how objects will be positioned on the page when
it is printed
The mode that is initialized or toggled to if the user is in a position to overwrite the
text in the word
Veena is entering a paragraph in a word processing program. When the cursor
gets to the end of a line, what is the best way to get the cursor to the next line?
How are data organized in a spreadsheet?
Which key moves the cursor to the beginning of the next line of text?
Veena typed the following sentence: "The girl was very beautiful." In which word
processing utility could she find a synonym for "beautiful"?

Using an electronic bulletin board, Seema can do all of the following except which
one?
Aryan has created a ten-page story, but only wants to print the first two pages.
What printer command should he select?
What process should be used to recall a document saved previously?
Which is used to indent text within a document?
Desktop publishing is a more sophisticated form of which of the following types of
software?

What is a Word Processor used for?


What is a picture that is saved on a diskette and can be pasted into a document?

What is a Word Processor used for?

What basic tools would you find in the Edit menu of a word processor

What is a header in a document?

What hardware is essential for a word?


The user could take a picture from a magazine and insert it into the document by
using a

What basic tools would you find in the Edit


Assume you are creating a two-column newsletter. Which type size is the most
reasonable for the text in the columns?
Given the default left and right margins, and ½-inch spacing between columns, the
width of each column in a two-column document will be:

Assume you have made all appropriate selections in the Columns dialog box in
Word, but cannot see any columns on the screen. What is the most likely cause?

While word processing, in which of the following situations would Tom use the
"Copy" command?

What does a document contain?


Before submitting your work you want to find any words spelt incorrectly. Which of
the following
What command would
in ayou use?
word-processing program can be used to change the word
‘him’ to ‘her’, and also the word ‘he’ to ‘she’ in the given phrase? “On a cold and
still night, the only sound that could be heard was the owl that had ade its home in
the nest outs
What edit commands would you use to insert a paragraph from one document into
another document, while still keeping the paragraph in the first document?
Which of the following statements would NOT be a reason for showing suggested
revisions in a Word document without changing the original document?

Which statement is NOT true regarding revisions made in a Word document?

How are suggested changes entered for review on an initial Word document?

Which of the following is TRUE about saving a document using the Versions
command?

What happens when you open a document that has been saved using the Versions
command?
You have used the word ‘discover’ four times in an English essay you have created
using a word processing program. You would like to find another word of similar
meaning to use instead of ‘discover’. Which of the following would you use to do
this?

When opening and working with multiple versions of a document, how can you tell
which is the most recent version?
Various fields are added to a regular document to create a special document
called a form through the ____________ toolbar.
Which of the following types of fields CANNOT be inserted into a form?

Which of the following is TRUE related to editing comments in a Word document?


What is a header in a document?
In your English essay you notice that the paragraph at the bottom of page 1
continues on to page 2. You would like to make this paragraph start on page
2.What would be the best way to do this?
Tables in a document help you to easily arrange all of the following EXCEPT:
To identify a document, it is helpful to include the file name on each page as a
Which of the following tools will copy the formatting of selected text to other
places?
What is the name of the process of determining the cause of errors in a macro?
Drop caps are added to a Word document using the ___________ menu.

A reverse in a newsletter is:

A pull quote is best emphasized by:

Which of the following definitions is CORRECT?


Pertaining to newsletters, which of the following cannot be changed using the
Columns command dialog box?
As related to type size, how many points are there to the inch?
Assume you are working on a newsletter in which the masthead extends across
the top of the entire first page. The rest of the newsletter has two columns. What
is the minimum number of sections in the newsletter?

Which of the following is NOT correct with respect to page, column, and section
breaks?
Which of the following would be the most appropriate font for a newsletter
headline?

Which of the following is the default Word column width?


Sequence Check is a --------------- level control check.
Analyse data over two or more periods is called ----------------------- analysis
We use Hash Total to identify ------------ within a series where there is a definite
relation between items
Analyse fields by arranging them into rows and columns is called
--------------------- function searches for a value in the leftmost column of a table and
then returns a value in the same row from a column that we specify in the table.
To import data from Access to Excel ,it is not possible to link between Access and
Excel sheet
The GAP detection options can be used to test for completeness of data.
Exception testing can be used to identify ----------------- items

Data validity test represents


Year end ledger, inventory files or transaction files can be tested for cut-off , to
ensure that the data has been provided is for the correct audit period
In Range Check , the data may not be in proper sequence but should be within a
predetermined range
In ---------------- Check data entry follow a particular sequence and also a
predetermined range.

Virtual memory is

Multiprocessing is

To help keep sensitive computer-based information confidential, the user should

What is the function of a disk drive?


A 4GL is
A nanosecond is
What small, hand-held device is used to move the cursor to a specific location on
the screen?

The memory address register is used to store

The memory data register is used to store

The instruction register stores


Which of the following is used to indicate the location on the computer monitor?
A mathematical procedure that can be explicitly coded in a set of computer
language instructions that manipulate data.
Which of the following translates a program written in high-level language into
machine language for execution?

Detecting errors in real memory is a function of

To find where
A series a file hastelling
of instructions been saved on disk, how
the computer the user shoulddata or files is defined
to process
as a
To ensure that data is not lost if a computer system fails, the user should
Having a single CPU alternatively process tasks entered from multiple terminals is
called
The place in the CPU where the data and programs are temporarily stored during
processing is called the

All are examples of computer software except


Computer manufactures are now installing software programs permanently inside
the computer.
Which It is known
of the following file as
organisation forms most efficiently allows access to a
record
The part of the computer system controlling data manipulation is called the

For direct access storage devices the recording area is divided into

The data hierarchy from the largest to the smallest is

Which of the following hardware or software system controls provides a detailed


record of allofactivities
Which one performed
the following byaacomputer
parts of computerissystem
necessary to enable it to play
music?
An educational CD-ROM on Indian Poets contains 1000 pages of text, 500 colour
pictures, 15 minutes of sound and 1 minute of video. Which of the four different
media one
Which listed
oftakes up most printers
the following space on is the CD-ROM?
suitable for printing sprocket fed carbon
copies?

Multimedia software can be most productively used for


To be effective a virus checker should be
Which one of the following software applications would be the MOST appropriate
for performing numerical and statistical calculations?

Passwords enable users to


How many bytes do 4 Kilobytes represent?

Back up of the data files will help to prevent


Which one of the following is the MOST common internet protocol?

The advantage of a PC network is that


The term A:\ refers to

UPS stands for

The main problem associated with uninstalling software is that


You are conducting research for a Income Tax assignment. The raw facts you
collect are called

A flow chart is the

A voucher entry in Tally is done for

Passwords are applied to files in order to

Each of the following is an enabler of IT-business alignment except:


The basic systems model is used to describe virtually all information systems and
it consists of the following elements:

What is a computer-aided design system?

A(n) __________ offers a solution package for an entire industry.

File extensions are used in order to

Information systems controls include all of the following EXCEPT:


Hashing for disk files is called
Components of expert systems include: a) inference engine; b) user interface; c)
knowledge base; d) fuzzy logic

Black box testing and white box testing are part of:
What is the term used to describe the point of interaction between a computer and
any other entity, such as a printer or human operator?
The advantages of CASE tools are: a) reusability; b) maintainability; c) portability;
d) flexibility

Which of the
Yesterday, in following is an
your music acceptable
class way
you saved to compositions
your shut down theascomputer?
MP3 files. Today,
you cannot remember where you saved them. Which is the best way to locate the
files?
Components of an information system model are: a) applications architecture; b)
functional architecture; c) technology architecture; d) information architecture

Benchmarks form part of:


Continuity controls include: a) record counts; b) date checks; c) label checks; d)
run-to-run totals

Which is not part of help desk documentation:


Testing of individual modules is known as:
Design phase of CASE tools includes: a) data architecture; b) decision architecture;
c) interface architecture; d) presentation architecture

Which is part of installation testing:


The computer operating system performs scheduling, resource allocation, and
data retrieval functions based on a set of instructions provided by the:
Which of the following falls under multimedia data: a) text; b) images; c) video; d)
audio

Which of the following procedures should be included in the disaster recovery plan
for an Information Technology department?

Designing relationships among components is part of:

Several Computers connected together is called:


Which network topology uses a Hub?
Which of the following topologies is used for Ethernet?

Application software are programs


Which type of file search method requires a computer first read all locations
preceding the desired one

Which of the following areas of responsibility are normally assigned to a systems


programmer in a computer system environment?

Which of the following is recommended when many searches for data are required

It is unlikely that a magnetic tape containing several thousand blocked records can
be used on two machines of different architecture directly because
Which component of the CPU has the most influence on its cost versus
performance
Which of the following terms applies to network used to connect computers with
other computers, peripherals and workstations that are in fairly close proximity

Intelligent terminals differ from dumb terminals in that they


A computer is to be linked to 8 terminals using a single communication link. To
permit simultaneous terminal operations, communication path will require which of
the following
A modem is a device that
A LAN includes 20 PCs, each directly connected to the central shared pool of disk
drives and printers. This type of network is called a
A computer based system for sending, forwarding, receiving and storing
messages is called an
If a workstation contains a processor, monitor, screen manipulation device, printer,
storage and communication capabilities, it is said to be

Terminal hardware controls include

RS-232 is a

What is a compiler?

What are the stages in the compilation process?


Which of the following is not a data transmission coding scheme

What is the definition of an interpreter?

A device used in data communications to divide a transmission signal into several


sub-bands is known as a

Third generation languages such as COBOL, C, and FORTRAN are referred to as

Serial Communication is used over long distance because it

In what areas is the COBOL programming language used?

The primary function of a front-end processor is to

What is the first stage in program development?


Which of the following is not used for data transmission within a local area network
What is System Analysis?
A device to device hardware communication link is called

What will a good software provider consider?


The topology of a network can be each of the following except
What is the 8-bit binary value of the decimal number 85?

Which is the most common data transmission error checking method


What is the decimal value of the binary number 1111?
Which of the following devices merges communication signals onto a single line
What is the decimal value of the octal number 215?

Which tool is used to help an organization build and use business intelligence?

Cache memory enhances


What is the decimal value of the hexadecimal number FF?
Numbers are stored and transmitted inside a computer in
What is the hexadecimal value of the decimal number 1476?
A byte corresponds to

What does EBCDIC coding of numbers mean?


A Kb corresponds to
What is the binary sum of 01011 and 00101?
Information is stored and transmitted inside a computer in
Where would you find the letters QWERTY?

A parity bit is

How did the computer mouse get its name?


Clock speed is measured in
What are you most likely to use when playing a computer game?
CPU performance may be measured in

A digitising tablet can be used for?


In processing cheques which of the following I/O techniques have banks
traditionally used
Which of the following is a pointing device used for computer input?

A UPS
What does a light pen contain?
The capacity of a 3.5” floppy is around
What general term describes the physical equipment of a computer system, such
as its video screen, keyboard, and storage devices?
Where would you find the letters QUERTY?
What are you most likely to use when playing a computer game?

A digitising tablet can be used for?


Which of the following is a pointing device used for computer input?

What input device could tell you the price of a product


Where would you find a magnetic strip?

Hard copy is a term used to describe...?


What are the individual dots which make up a picture on the monitor screen Called
A daisy wheel is a type of...?

What input device can be used for marking a multiple-choice test?


Laptop computers use

QWERTY is used with reference to

What input device could tell you the price of a bar of chocolate?

A GUI is
Where would you find a magnetic strip?

Multiprogramming refers to

Multitasking refers to

Multiprogramming is a prerequisite for

UNIVAC Computer belongs to the

Timesharing is the same as


Name the first Indian Super Computer?

Disk fragmentation

The technology which is used to check answer sheets of multiple-choice questions


in civil services or similar examinations is: -
A compiler is

Which printer among the following is fastest


“Zipping” a file means

What does acronym VIRUS stands for

An impact printer creates characters by using...?

A client-server system is based on


A nanosecond is
A procedural control used to minimize the possibility of data or program file
destruction through operator error is the use of
_______ software enables users to send and receive data to/from remote computers
A _____ is a running instance of an application
Splitting of CPU's time for different tasks _______ prevents time slicing
______ computers are used in large organizations for large scale jobs which have
large storage capacities
_______ is responsible for all calculations and logical operations that have to be
performed on the data
______ printer use laser light

______ software enhances the user to enter ,store, manipulate and print any text

______ software enables users to send and receive data to/from remote computers

_______ is the temporary storage place for deleted files


_____ is a collection of related fields

_____ language consists of strings of binary numbers


______ symbol is used to represent processes like assigning a value to a variable or
adding a number

_______ is an example for micro computer


_________capability supports concurrent users doing different tasks
The ______ do not have processing power of their own and has only a screen,
keyboard and the necessary hardware to communicate with the host. For this
reason, the terminals are referred as_______________

A______is nothing but a PC with a network operating system


_____system is responsible for handling the screen and user I/O processing
The______ handles data processing and disk access in a Client/Server architecture
Both the DBMS and the application resides on the same component in a
____system
When all the processing is done by the mainframe itself, the type of processing is
sometimes called as
DBMS models can be grouped under____ categories

______is the most advantageous database system


A new user initiates a new process of execution at the background,while the user
can continue his query process as usual in the foreground. This situation is
referred to as ______
The process of data being automatically written to a duplicate database is
called______

Modem stands for __________ .


Multiple changes to the same record or a field are prevented by the DBMS
through______
_________allows an application to multitask within itself

LAN stands for __________ .


New process of execution is referred to as______

ISDN stands for _______.


_____________ is the Worlds largest computer network .
_______is/are a popular front end tool
When LAN connected together ,it is called __________ .

TCP/IP stands for _________ .


Data is broken into small unit called __________ .

SMTP stands for __________ .

The __________ protocol is a network protocol to be built for the World Wide Web .

ATM stands for __________ .


The computer which can receive data from other computers on the network and
print it is _______
The hardware and the software requirements together form the_____
ATM, Asynchronous transfer mode is a __________ technology.
__________ is designed telephone system

Expansion of ISDN is ________

Expansion of WBT is ______________


_________ connects LANs.
Collection of instruction is called a _____
Combination of alphabetic and numeric data is called _____ data
Computers can be classified based on ______,______and _______
_________ are used in large organizations for large scale jobs
_______ is responsible for feeding data into the computer
_______ is the capability of the o/s to run numerous applications simultaneously
_______ involves conversion of raw data into some meaningful information
_______ is responsible for obtaining the processed data from the computer

_______ printers use light to produce the dots needed to form pages of characters

Hardware components in a computer are _____,____,_____,______


_______ software are programs that are complex and can be developed or
purchased
_______ is a set of special instructions used to communicate effectively with the
computer
_______ converts a high level language into machine language
_______ translates assembly language program into machine language instructions
OPTIONS
A B C D ANS

F1 ALT+F1 CTRL+F1 None of the above A

Tally ODBC Tally IMP Tally INI None of the above A


TRUE false A
F3 ALT+F3 CTRL+F3 None of the above B

Invoice Bill A or B None of the above C


Two Three Four Five B
Ctrl+C Alt+C Alt+Ctrl+C None of the above B

TRUE FALSE A

TRUE FALSE A
* $ & ^ A
Puchasing and Puchasing and Accounts payable Puchasing, Receiving
Accounts payable Receiving and Receiving and Accounts payable D
Single Multiple A or B Mone of the above A
Cash Flow Fund Flow
Statements Statements Ratio Analysis All of the above D
Two Three Four One A
Alt+D Alt+X Ctrl+T Ctrl+D B
Create Alter Display
Information Information Information All of the above D

F4 F5 F6 F7 C
Alt+P Ctrl+P Shift+P None of the above A

Tally Audit Statistics Day Book Journal Book B


Bin Data Sub None of the above B
True False A
Enterprise Data Enterprise Data Electronic Data
Interchange - Information Interchange. All of the above C
TRUE FALSE A
2 3 4 5 C
data element data record Field All of the above B
FALSE TRUE B
Display stock
valuation method Open Calculator Change Period None of the above B

Ledgers Groups Journals None of the above B


Personal Nominal Real None of the above B
Manual Automatic None All of the above D
Balance Sheet Profit & Loss Journal Book All of the above A
Physical Stock
Journal Stock Journal Transfer Reversing Journal B
Filled Receipt Issue None of the above A
11 16 18 21 B

FALSE TRUE B
management by management by electronic data
objective exception analysis All of the above B

F4 F5 F6 Alt+f5 B
Primary Cost
Main Location Primary Category All of the above C

True False A
Ledgers Reports Vouchers None of the above C
0 to 9 1 to 100 10 to 60 None A

Supplier Suspense Order All of the above A


Report Output Information None of the above C
F2 F4 Ctrl+f2 Ctrl+f4 A
Net TransactionsClosing Balance A and B None of the above C
True False A
Alt + f6 function
F6 function key key F7 function key None of the above A

Sales Purchases A or B None of the above B


1-4-1995 to 31-3- 1-4-1996 to 1-4-1997 to 31-3-
1996 31-3-1997 1998 None of the above B
True False A
Horizontal Vertical A or B None of the above C
Balance sheet &
profit & loss profit
& loss and trial Profit & loss and Cash and profit
balance trial balance & loss Cash and bank C
Primary Main location A or b None of the above B
Security
mechanism Ledger a/c Cost category None of the above A
F5 F7 F8 F9 C

a name an identity A and B None of the above C


Sales return Purchase return a or b None of the above A
Company Stock items
creation units Regional setting None of the above A
Trial Balance Daybook Balance Sheet None of the above B
F7 Alt + F7 F10 F11 B
Changes in
transactions or Changes in
vouchers Ledger Masters Both A and B None of the above C
2 3 4 1 B

F9 F10 F11 F12 A


Balance sheet Profit & loss a/c Budget None C
TRUE FALSE A
F3 Ctrl+F3 Alt+F3 None of the above C
TRUE FALSE A
Main location Primary Symbol None of them B

Tally.imp Tally.ini A or b None A


Stock summary Stock journal Stock analysis None of the above A
During the In 'comp info ->
By pressing F11 creation of a security control'
function key company option None B

TRUE FALSE A
128 228 28 16 C
Ledger
Accounts Groups Sub-Groups B or C A
Administrator Owner Data Entry TallyVault A
One company to Other programs
another company - a spreadsheet
created withon or a database
Tally Package file. Both A and B None of the above C
Inventory Cash
subsidiary. disbursements. Cash receipts. Payroll transactions. A
Will be more
Does not require Will produce a efficient at Eliminates the need to
as stringent a set more accurate producing reconcile control
of internal set of financial financial accounts and
controls. statements. statements. subsidiary ledgers. C
data to be data that has the address of an instruction that has
transferred to been transferred a memory been transferred from
memory from memory location memory C

Contingency System Capacity


Planning feasibility report
Planning Exception reporting
NIC Card VSAT RAM
Control totals for AGP Card
Identification one or more End-of-file and end-of-
Record Count Number fields reel code
Storing
Writing on a hard information on
board Printed output the hard disk None of above
Voice activated Voice answer Visual audio
broadcasting back board None of above
Boundary File protection
Validity check protection ring Limited access files
Coloured spots Pixels Pixies None of above
Identification
File Name number Reel Number Batch Total
Printer Storage device Pointing device None of above
Physical
System Logs Security Console
An inkedLog Data Dictionary
Electrically ribbon and
charged ink An ink pen print head None of above C
Use only
Restrict unremovable Require user Make duplicate copies
physical access media passwords of files A
A pen Paper Eraser None of above C
A cartridge A drum A ribbon A cassette A
Centralised Centralised
Separation of function for PC function for PC Distributed policies or
duties acquisition Disposition procedures A
A cartridge A drum A ribbon None of above A
A print head A laser beam An INK RIBBON None of above C
Storage
Volume Size capacity None of above C
Read Write Read and Write None of above B
Magnetic tape PAN drive Floppy disk None of above A
Serial access Random access A parallel access
medium medium medium None of above A
1.44MB 20 GB 700MB None of above B
Magnetic tape
A CD-ROM A floppy disk storage None of above C
Magnetic tape
A CD-ROM A floppy disk storage None of above A
By a sunny By magnet
window objects In a drawer None of above C
ROM chips RAM chips CDROM chips None of above B
RAM chips ROM chips DRAM chips None of above B
ALU Registers Logic bus None of above A
CPUs Registers Control unit None of above B
0 bits 1 bit 8 bits None of above B
RAM chips ROM chips CACHE None of above A
Systems
Network software software and Business
and security application software and
software software games software None of the above B
Personal Mainframe
Supercomputer computer computer
Jon Von None of above B
Notebook Supercompute Neumann
computers rs computers None of above B
First Second Hoover
generation generation generation None of above A
Second Fourth
generation First generation generation None of above C
Second Fifth
generation Third generation generation None of above C
Second Third
generation generation Fifth generation None of above B
Second
generation Third generation Fifth generation None of above A

Specification, Programming, Analysis, System


Design, and Design, and Design, and
Testing Testing Implementation None of above A
Oracle ACL JCL none the above A

True False A
True False B

True False A

yes no B

true false A

true false A
true false A
true false A

true false A

true false A
to determine review and
the audit evaluate the to obtain a
objective types of data record layout extract data from file A
can bring the can bring the
data directly data indirectly all the above none of the above A

True False B
True False A
change in the
method of
recording use of
accounting accounting absence of audit
transaction codes trails all the above D
documents driven risk driven
approach approach unique approach none of the above B
hardware and processing
software options, file data checks and
configuration structure controls all the above D

true false A
true false A
the source of
data available source of data
to the audit for material
organization planing all the above none of these A
true false A
providing access
to computer to
the of by all all organization use of any
concerned personnel programs none of the above D

true false A
natural/man- conceptual/physi
made open/closed cal all of them D
true false A

true false A
true false A
manage
hardware & enable multiple
software user resource
scheduled jobs resources sharing all the above D
true false B
true false B
with audit with production
departments departments all the above none of these A

true false A

true false A
true false A
true false A

true false B
planning
databases language model base all the above D
true false B

true false B
reference files table files report files none of the above D

filex file-o-man file manager filepet C


to have a decentralized
complete picture picture of a
of a system system all the above none of the above A

true false A

true false B
back-ups retrieval deletion addition B

true false A
true false A
seriously affected subject area software and
database database database safety and database B

true false A
true false on quarterly B
at the year end immediately basis none of the above B
true false A

Benfish Benford Benjamin none of the above B

true false B
blocks of nos. to
consecutive nos. the primary random
or alphabets to attribute of the placement of
entities the entity component none of the above D

true false A
invalid, none of the
valid, numeric alphabetic above all the above A
grouping, regrouping, none of the
transaction events above all the above A
true false A

true false A

true false A

true false B
true false B
incremental interactive data interactive data
design and extraction and innumerable
enlarge activity analysis analysis none of the above B
true false A

true false A

true false B

true false A

e-brain bouncing ball big-bang stub C


bottom up tests top-down tests hybrid tests all the above D
yes no re-perform B
procedures
provide carried out by
read data on information to the clients
client's file the audit programs all the above D
executables,
master deleted, hard none of these all the above A
true false A
system
system analysis advanced
software software all the above none of the above A
true false B
yes no A

true false A
true false B

manipulates, real create, false none of these all the above A


true false A
yes no A
can enable the can provide the
auditor to auditors with
execute useful
can be very provisions on a information with
powerful number of trend s and
analytical tool different bases patterns all of the above D
yes no examination of A
identifies source code of a
program code program with
which may be advice to
provides detailed there for following the
information of fraudulent logic of a
machine uses reason program none of the above C
IDEA ACL ALC ACLL B

true
fictitious data false
comparison of A
applied against source version analyzing the
the client of a picture of a file or
program programmed data all the above A

true false A

true false A

true false A
specification, none of the
program file, hardware above all the above A
identifying identifying identifying non-
erroneous code ineffective code standard code all the above D

true false A

true false A
authentication
start and finish of information resource
time support requested all the above D
job control job connectivity
language language all the above none of the above A
yes no A

true false A
true
package false B
computer
p[program for
performing a
variety of data
processing mathematical master list of administered
function concept transactions questionnaire A
prepared by an
outside
programmer
prepared by the prepared by the engaged by the
auditor entity auditor all the above D

true false A
file stratification and
access/organizati statistical/arithm frequency
ons etic operation analysis all the above D

true false B

true false B
examining the carrying
quality of system analytical examining the
process review quality of data all the above D
Wide access to Can extract and Can aid in simple Can define the audit
various data base analyse data selection objectives D
ACL IDEA
A utility High End CAATs All of the above D
A sample of software A special purpose
transactions programme written program None of the above A
Analytical Compliance tests
Tests of details of review of general EDP
transactions procedures controls All of the above D
Action
Macros Procedures Event Procedures General Procedures D
integer number primary number auto number D
true false A
actions events procedures none of the above B
report form chart macros D
expression
macro elements comments
expression action D
calculator code builder builder expression elements C
expression
action list macro list elements list box none of the above C
conditions action insert none of the above A
tabular columnar auto report embedded C
tabular columnar datasheet justified B

create report link report embedded report new report D


columnar and stable and dynamic and
tabular unstable static none of the above A
true false B
create fields add chart chart insert chart C
primary key alternate key foreign key none of the above C
label wizard chart wizard mail wizard none of the above A
start header group header page header report header D
report footer page footer group footer none of the above B
for specifying
for ordering for updating conditions with
records records group by clause none of the above C

condition group macro names none of the above C


VB Modules reports forms macros D
add append insert delete B
report macro sheet module none of the above C
true false A
RAD RAP RAID none of the above A
SysCmd MsgBox message none of the above B

OLE DDE CME none of the above A


object linking and on line
embedding execution on line editing none of the above A
OLE object OLE client OLE server OLE communicator C

linked embedded connected edited A


exe DLL BMP html D
form wizard report wizard query wizard publish to web wizard D
static file static html dynamic file none of the above B
append add insert data definition D
dollars rupees pesos yen A
unbound object bound object command button list box B

display as icon display link create icon A


create html new save as html none of the above C

startup home end none of the above B

bullet command procedure none of the above C


DBMS RDBMS front end language A
data group data collection database data storage C
new blank
database dialog new database
new dialog box box dialog box database dialog box A
255
automatic 64000 235 63500 A
number AutoNumber number automatic field B
true false B
inner join outer join explicit join none of the above A
primary key not null candidate key no duplicate key A
cascade delete cascade change cascade update change all related
related records related records related fields records C
columnar tabular both a and b none of the above B
table or tables query or queries record or records none of the above C

true false B
Dynaset field
property field field property properties properties B
row/column
crosstab queries queries select queries update queries A
row/column change/delete
action queries queries queries update queries A
inner join self join no match join outer join D
true false A
new form dialog form create form wizard
box dialog box dialog both 1 and 3 D
summary
change sum append simple D
properties properties form properties new properties B
included form sub form new form child form B
Record Record
Navigation Operations Form Operations None of the above B
columnar form tabular form hierarchical form one to many form B
filtering ordering sorting querying C

filter sorts
filter by pipes gateways A
filter by form selection filter by menu None of the above A
* $ @ ? D
true false B
bound control unbound control data less control data control B

button group option group controls group record group B


database form collection none of the above A
bound unbound controlled all of the above C
CURRDATE() TODAY() DATE() DAY() C
text box list box combo box static text B
pivot table columnar form tabular form main form A
data sheet filter filter by input filter by form none of the above C
option control
button wizard control wizard wizard tool wizard C

ram* ram?? two of the above none of the above B


true false B
report form table ledger A
autoreport report module none of the above A
chart label bitmap report A
true false A
true false A
60,000 255 25,000 64,000 D
true false B
true false A

true false B
table query form all of the above D
table form report hyperlink D
true false A
true false A

Insert Records Tools none of the above C


true false B
true false A
alternate keys composite keys candidate keys primary key C
true false A
true false B
true false A

true false A
true false B

null not null zero none of the above B


true false B
true false B
true false A
true false B
pie bar both 1 and 2 none of the above C
true false A
true false A
true false B
update query select query delete query append query B
true false B
true false A
inner join outer join self join table join C
true false B
true false A
true false B
freestanding embedded stand alone sub chart D
true false B
true false B
true false B
true false A
the first field of the last field of
the table the table primary key field none of the above C
forms reports attributes entities D
true false A
delete insert append add A
true false A
true false B
freestanding embedded stand alone sub chart B
use datasheet in
use hyperlink use import forms use export D
true false B
true false B
true false B
true false A
true false A

true false A

true false A

& # ? * D
true false A
page detail group topic C
true false A

true false B

true false A
true false B
true false A
relational list range logical C
true false event - B
structured query procedural based
action language language language none of the above C

report form query table B


true false B
group record session detail D
data property both a and b none of the above B
true false A
true false A
sub forms child forms inner form none of the above A
graphs chart labels report B
number primary key index identifier B
pivot create form none of the above A
filters queries sorts forms A
form bound unbound none of the above C
list box combo box button option button B
true false A
form name control record source none of the above C
tabular form chart form data sheet form none of the above A
sub forms tabular form columnar form none of the above A
calculated bound unbound none of the above A
calculated unbound bound static C
sub form auto form tabular form columnar form B
set relation connect relationships none of the above C
option, toggle command option button, toggle
and command button, check list, check and button and check
buttons and list boxes combo boxes boxes D
filter by form filter by reportfilter by record filter by input D
form report macro table B
clipboard file field layout B
search sort field names record grab D
An organised way
A way to analyse A tool to of storing
and manipulate produce high information
numerical quality about a set of A way of maintaining
information documents
It contains all similar things a log C
the data about A document
Information about one specific which contains
certain programs item text A collection of files B
remote DBMS
storing data relative DBMS Relational DBMS Reliable DBMS C
offline at a backing up data is related to data uses tape as opposed
separate site regularly
Computer mining to disk C
sequence Computer Database access
Key verification checks matching controls D
An organised way
A way to analyse A tool to of storing
and manipulate produce high information
numerical qualitydocument about a set of
information s
It contains all similar things None of the above C
the data about A document
Information about one specific which contains
certain programs item text None of the above B
Reports allow Reports provide A tool which
users to extract a very flexible allows text and
information as way of creating graphics to be
hard copy and editing placed in
(printed output) documents documents None of the above A
Spreadsheets
Extracting and make data easy
analysing data to analyse Using queries None of the above C
Compilers, Network Word processors,
interpreters, software, spreadsheets,
editors backup systems databases, DTP None of the above C
DEFAULT and PRIMARY KEY and
NOT NULL FOREIGN KEY UNIQUE
constraints constraints constraints IDENTITY columns C
CHANGE TABLE MODIFY TABLE ALTER TABLE UPDATE TABLE C
remote DBMS
storing data relative DBMS Relational DBMS Reliable DBMS C
offline at a backing up data is related to data uses tape as opposed
separate site regularly mining to disk C
Number Description Component Source D
keeping the
keeping a original paper saving the file with
using a password backup copy copy different filenames A

the product code the primary key mail merge e-mail C

A database Graphics browser e-mail A


bookmarks operators wildcards engines C
Auto Primary Auto ID AutoNumber Auto Key C
records in a forms in a
dynaset are related tables in database are
consistent with a database are consistent with reports are consistent
the underlying consistent with the underlying with the underlying
tables. one another. tables or queries. tables or queries. B
query and its
main form and a associated report and its related
foreign key. subform. dynaset. query. A
the primary key the primary key
of both related of the related a field from an not a primary key of
tables. table. unrelated table. either related table. B

One-to-one One-to-many Many-to-many Many-to-one B


EmployeeLastNa
EmployeeID CompanyID me CompanyAddress A
The Tools menu,
Relationship Referential The one-to-many
window integrity The join line relationship B
Right-click the
Relationship
line, then select Select Undo in Click the Delete
Double click the Delete from the the Relationships Relationships button
Relationship line
That there are shortcut menu pull-down menu on the toolbar B
several
customers That some of That there are That records can be
associated with the data is notrecords in a added by clicking on
that ID viewable related table the plus sign C
They cannot be
They must both They cannot be AutoNumber data They must be the
be numbers text fields types
The customer’s same data type D
ID is deleted
from the
The customer’s Customers table,
Nothing, Access ID is deleted and all the
ignores the from the related loans are
attempted Customers deleted from the An error message is
command. table. Loans table. displayed. D
The subform is an
object on the form
The subform is The subform is and can be moved or
The subform is displayed in displayed in Form sized like any other
not visible. Datasheet view. view. object. D
A one-to-many A one-to-many A one-to-many
relationship relationship relationship A many-to-many
between teams between teams between coaches relationship between
and players and coaches and teams players and teams C

# M ¥ * C
The Customers
table only when
there are Loan
records
Either table at associated with The Loans table
any time that customer at any time Neither table C
prompt, title bar prompt, icon, title bar text, title bar text, icon,
text, icon. title bar text. prompt, icon. prompt. B
Dim CreateList. Sub CreateList. CreateList. Sub. B
A check box A text field
enables the form enables the A drop-down list
user to choose form user to enables the user
from one of choose from one to choose from A drop-down list
several existing of several one of several enables the user to
entries. existing entries. existing entries. enter text. C
must be set for must be set for does not have to must be set for two
one word. multiple words. be set. words. C
create tables of maintain data on
help people keep store data in rows and different things in
track of things. tables. columns. different tables. A
data. relationships. metadata. all of the above D
facts. figures. information. a and b D
single-user multiuser e-commerce
database database database
application application application a or b A
single-user multiuser e-commerce
database database database
application application application None of above B
Structured
Sequential Query Question Structured Query Relational Question
Language (SQL) Language (SQL) Language (SQL) Language (RQL) C
Database
Database Management Data Business Relational Model
Modeling System System Model System Manager B
Jet SQL Server Oracle a and b D
The database
The database management
The user application system (DBMS) All of the above. D
the database
application(s) the DBMS
interact(s) with accesses the
the DBMS database data None of above All of above A
creates queries creates form creates reports b and c D
the database
the database management
the user application system (DBMS) the database B
it contains a
all the users' data it reduces data description of its
is in one place duplication own structure All of the above. C
holds user data holds metadata stored
holds indexes All of the above. D
tables metadata procedures All of the above. D
as a new
systems as a redesign of
from existing development an existing
data project database a and b A
as a new
from existing systems as a redesign of
non-database development an existing
data project database a and b B
as a new
systems as a redesign of
from existing development an existing
data project database a and b C
entity-relationship
data marts normalization data models data modeling A
entity-relationship
data marts normalization data models data modeling B
entity-relationship
data marts normalization data models
entity- data modeling D
relationship data
data marts normalization modeling data migration D
hierarchical
file managers models network models relational data model A
entities in a the order of the the order of the more than one column
column vary as to columns is rows is can use the same
kind important unimportant name C
table relation row field D
record field key tuple C

record field composite key foreign key C


record field foreign key candidate key D

composite key primary key foreign key surrogate key B

Insertion anomaly Update anomaly Deletion anomaly All of above D


assess the
existing tables' design the
structure and database create one or move the data into
content structure more new tables the new database A
are supplied by
several well- were essentially
established killed off by MS have poor are not true DBMS
manufacturers Access response time products B
Their report
delivery is more
They use difficult than
sophisticated report delivery
mathematical for reporting Nonintegrated
techniques. systems. data None of the above A

inconsistent nonintegrated a "wrong format"


dirty data data data problem B

inconsistent nonintegrated a "wrong format"


dirty data data data problem D
data warehouse
data warehouse databases do data warehouse
data are not not have data are often
stored in tables. metadata. denormalized. b and c C
Form Table Report Query A
Forms and Queries and
reports tables Macros Spreadsheets D
It will be easier Regardless of how the
It will be easier for the user to objects and tables are
for the user to upgrade it if the It is advisable to stored, the user will
upgrade it if the objects are in put each object have to reenter the
objects and one database and table into a data in the tables
tables are in one and the tables in separate when the application
database. another. database. is upgraded. B
An application
may consist of
multiple
The Link Tables databases, each An application can be
command can be with multiple All objects in an created in such a way
used to associate objects, linked application, that it objects such as
the tables in one to yet another including the forms and reports can
database with the database tables, must be changed without
objects in another containing only reside within the disturbing the existing
database. tables. same database. data. C

Import Link Merge Join A


It contains
tables, reports, It contains a user
It contains more queries, and interface, or
than one table forms switchboard It contains macros C
Interface Design
Menu Wizard Build Menu Wizard Switchboard Manager D
put key business
create backups information into
for mission centralize the the hands or store all corporate
critical corporate manageability of more decision transaction data in
data. data collection. makers. one single location. C
Digital
Digital Sign Certificate Digital Signature None of the above C
Hash Function Digital Signature Digital Certificate Private Key A

Hash Function Hash Value Hash Result Either B or C D


Digital Signature Digital Signature
creation
Institutional Verification Both A and B Either A or B C
Overhead and
Subscriber Subscriber
Relying Party Relying Party Institutional
Cost Cost Overhead None of the above A
Certification Certified Certificate
Authority Authority Authority None of the above A

True False A

True False B
Developer Personal Digital
Server Certificate Certificate Certificate None of the above A
Developer Personal Digital
Server Certificate Certificate certificate None of the above C

Private Certificate Repositories Public Key none of the above B


Evidence, Efficiency and Evidence, Ceremony,
Ceremony, Approval, logistics, Approval, Efficiency
Approval Evidence Evidence and Logistics D
True False A

True False A
Certificate Certificate certificate
Revocation List Resource List Revocation Letter None Of The Above A
Private Key, Public key, Private Key,
Subscriber Recipient Recipient None Of The Above A
Internal Format External Format
File File Transmission File None of the above C

ANSI UN/EBCDIC UNESCO UN/EDIFACT D

batch files interchange sets functions functional groups D


Smart Card Embedded cards SET None of the above A

E-cash Digital Cash Smart Cards Electronic cheques D


Online Catalog and
Billboards and Online Catalog Broadcast and Customer
Junk Mail and Billboards Junk Mail Endorsements C
EDI E-mail EFT All of the above D

True False B
Login_Id and Primary Key and Public Key and Public Key and Private
Password Private Key Password Key D
Satellite Area
Global Network Private Network Network None of the above B
Passive or pull- Glow sign or
Active or push based hoarding
based advertising advertising strategies All of the above D

Broadcast Junk mail Billboard Endorsements A


E-mail Bulk-mail Direct-mail Junk mail D

Catalog Endorsement Billboard Broadcast C


Low cost of
Error checking Data Integration operation Quality management B
Competitive Corporate Industrial
espionage espionage espionage Economic espionage C
Contact
A list of numbers of the
competitor’s management A competitor’s new
clients group Research data project B
single-user multi-user e-commerce
database database database
application application application None of above C
Replying Keeping Including the Using all capital
promptly messages
Message short Subject letters D
authentication
Removable drives in EDI systems Encryption
that can be performs the performed by a Security at the
locked up at night same function physically secure transaction phase in
provide adequate as segregation hardware device EDI systems is not
security when the of duties in is more secure necessary because
confidentiality of other than encryption problems at that level
data is the information performed by will be identified by
primary risk. systems. software. the service provider. C
text import convert text to
wizard columns wizard tip wizard function wizard A
cell reference row reference column reference none of the above A
quattropro or
text files Lotus 1-2-3 xbase files class files D
serial values domain values range values reference values D
=today() =date() =currentdate() none of the above A

dollar sign ' = ' sign # sign none of the above A


AutoSum AutoFill function wizard none of the above C

variables arguments parameters none of the above B

text logical numeric Boolean D


concatenate pmt merge none of the above A
countif vlookup pmt count A
convert text to
pivot table wizard chart wizard columns wizard tip wizard B
sumif pmt countif none of the above B
average sum sumif countif C

page setup print area print none of the above A


none of the
autoformat AutoFill above A

bordering formatting shading none of the above B


page setup print area print print preview B
filtering searching sorting none of the above A

all option blanks all blanks none A


www.encybrit.co
www.ency.in www.eb.com m none of the above B
URL DNS FTP none of the above B
network of intermediate
internal network network network none of the above B
application layer transport layer physical layer session layer D
finger service ping service ftp service none of the above A
FTP TELNET ARCHIE none of the above C
uniform research uniform unlimited restore
locator resource locator locator none of the above A
name of the
host computer resource scheme none of the above C
message scheme command line none of the above C
Delphi Microsoft sears general electric C
net web browser editor B
read the Usenet search for
browser news database none of the above C
CompuServe wincim or
internet dialer spy mosaic maccim none of the above C
gophering gopherspace cyberspace none of the above C
Alta vista open text excite none of the above B
finger server ftp server web server none of the above A
list directories image list none of the above C
no maximum of five one many B
middle lower top middle and lower D
hotlist directory index glossary C
directory index menu
search,index search,menu search,item item search,index
search search search search C
infoseek excite lycos all the above D
netshark cello lynx all the above C
lynx mosaic Lycos navigator gold 2.0 C
Microsoft internet IBM CompuServe D
Usenet finger service ftp telnet D
Hyper text
Higher text transmission Hyper text Hyper text transfer
transfer protocol port transfer protocol port C
iccp ftp uucp none of the above C
yahoo ftp telnet none of the above C
transmission transfer
control communication
transfer control protocol/internet protocol/internet
protocol/internet protocol protocol none of the above B
one two three none of the above C
domain name
ftp servers servers web servers none of the above B
the internet the internet the internet
adapter administration access none of the above A

browser protocol site organization B


hotlink text hyper text higher type
transfer protocol transfer protocol transfer protocol none of the above B
universal uniform uniform resource
resource locator resource locator label name of the above B
frequent asked frequently asked frantically asked
query question question none of the above B

SLIP,PPP TCP,IP IP,UDP none of the above A

connection response request close A


wide search for windows sockets world search for
information and internets relay information and
research chat research council none of the above B
lynx,minx netscape,ie mosaic,gopher none of the above B
world wide web world wide web
server client interface none of the above B
glossary index hotwords none of the above B
very easy and very organised
rodent oriented network verification on
net wide index to integration and network
computerized communication integration and
archives application communication none of the above A
university of university of
berkeley,berkeley cleveland,clevel university of
freenet and freenet California net none of the above B
protocols IP address dns none of the above A
search
engines,directorie
s ftp and finger telnet and ftp none of the above A
allsrc,winsocks wais,allsrc wais,winsocks none of the above B
allsrc waisman
hyper transfer winsock none of the above B
higher text markup hyper text
medium language language markup language none of the above C
hot links hyper text books marks none of the above B

images applets animation none of the above B


graphics,videos,a programms,ima animation,scripts
udio ges,text ,executables none of the above A
first page home page welcome page none of the above B
global network global networks grand network
news navigator news none of the above B
yahoo service electronic mail search engines none of the above B
Netscape page
starter
email and net site,netscape yahoo and
conference page wizard altavista none of the above B
newsgroup telnet ftp archive D
Lycos catalog point review all the above none of the above D
apple link bitnet Delphi fidonet A
computer related
abbreviations and biographical
acronym information bookstores none the above D
encyclopedia on-line
Britannica reference works more information galenet A
search engines web directories database channel B
Graphical Graphical
interpreter interchange Graphical Graphical Interface
formatting Format interface format format B
Joint Pictures Jumbled pictures Joint pictures Joint pictures
Expert Group expert graph expert graph experimental group A
mails documents net browsers C
yahoo,infoseek,al eudora,netscape
tavista netscape,ie,lynx and pine none of the above C
network
information web pages connections mails B

BACKGROUND COLOR FCOLOR FONTCOLOR B


Common Communication
Communication graphical graphical Common Gateway
gateway interface Interface interface Interface D
Network Interface Communication Connection B
Current web page Browser Client None of the above B
Browser/user Server Web Channel A
Unknown
resonance Uniform United relay
language resource locator limited None of the above B
text only image only text or image neither text nor image C
SQL PLSQL SGML CGI C
alphalanguage betalanguage metalanguage none of the above C
palm is not pancake is not
eatable palm is not elm edible none of the above B
SGML
SGML Processor Preprocessor SGML Parser SGML Composer C
web sites images applets documents A
International
Internet Engineering Internet
equipment trainers and Engineering Task
training faculty faculty Force None of the above C
MS Internet
MS Internet Netscape Explorer and
Explorer and Navigator and Netscape
Mosaic Mosaic Navigator None of the above C
data from a
text database symbols video C
hyperlink hypertext hotword hotlink B
in sequential in user-defined
in random order order order none of the above B
first start home none of the above C
.bmp and .gif .bmp and .jpeg .gif and .jpeg .wmf and .bmp C
Service, service,hostnam
hostname and e,port,directory- service,port and service,hostname and
directory path path directory path port B
mail mailing lists,mail
mail servers,mail vendors,mail server robots and
clients and identification gateways to
alternate services and password other services none of the above C
<center> <font size=n> <hr size=n> <l1 type=shape> D
communication common
generated gateway classified general
information interface instructions none of the above B
Server Client Browser User A
arpanet the net intranet none of the above B
peer-to-peer
LAN connectivity wan none of the above B
data parcel packets none of the above A
email,file
scripting,parsing news,cooking retrived,internet
and compiling and fine arts tools none of the above C
nt,windows95,ie, mosaic,gopher,e communicator,ie,
winzip udora,trumpnet lynx,winsock all of the above B
dnet arpanet ARPANET none of the above B
defensive defensive
administrative dedicated and advanced
rank registered research projects
administration projects administration
network administration net none of the above C
start begin first none of the above B
milnet,smaller
arpanet mailnet,inet intranet,extranet none of the above A
education,researc music and cooking and
h dance dining none of the above A
Higher text Hotlink text
manipulation markup Hyper transfer Hyper text markup
language language meta language Language D
united states and united states &
UK england,norway Russia none of the above B

server client network none of the above C


client stand-alone servers none of the above C
network network
network card topology redirectors none of the above B
detailed
transaction data terminal data target
explanation equipment equipment none of the above B
application layer physical layer network layer none of the above B
point to point packet
network and switching,store smart network
broadcast and forward and dumb
channel network network network none of the above B
file access anonymous ftp file transfer none of the above B
PAN,NAN,AAN KAN,RAN,VAN LAN,WAN,MAN none of the above C
VAN MAN TAN none of t he above B
LAN MAN WAN none of the above C
analog digital non-digital none of the above B
Data type Define type of Document type
definition data definition Document type data C
Moralize/demorali Modulation/dem Manipulate/dema
ze odulation nipulate none of the above B

Mapping Modulation Manipulation none of the above B


Dedicated
Satellite link and access and dial
digital signals up access Cable and wires none of the above B
Standard long Stream line Serial line
internet protocol internet protocol protocol none of the above C
Prime prolonged Point to point Pillar to pillar
protocol protocol protocol none of the above B
sending
storing data on a information to a storing data on receiving information
disk drive host computer the hard drive from a host computer B

Bandwidth Speed Size Channel A

Find Save Browse Retrieve C

Recipient Party Relying Party Either A or B Neither A nor B B

Public Key Private Key Both A and B Both B and A C


Electronic Electronic Fund
E-mail Commerce Transfers All The Above D

Not False Not True A


Closed
System,Formal Formal Legal
Legal Formal Legal Requirements, Open
requirements Requirements Open System System D

Signer
Affirmative Act Efficiency authentication None of the above A
Signer Document
Authentication Authentication Both A and B Neither A nor B C
Not True Not False B

Nonrepudiation
Service Digital signature Digital certificate Private Key A

Affirmative Act Efficiency Either A or B Neither A nor B. A

Cryptography Public Key Private Key None of the above A

Private Key Public Key Both A and B Either A or B C


Private Key Public Key Both A and B Either A or B A

Private Key Public Key Both A and B Either A or B B

Decryption Cipher Encryption Cryptography C


Conducting
Using data Performing fraud-awareness Reviewing the
encryption. validity checks. training.
Received by the systems-access log. D
Unaltered in Not intercepted intended Sent to the correct
transmission. en route. recipient. address. A
The private key
Both sender and The private key is used by the
receiver must cannot be sender for The private key is
have the private broken into encryption but used by the receiver
key before this fragments and not by the for decryption but not
encryption distributed to receiver for by the sender for
method will work. the receiver. decryption. encryption. A
Failure of server
Data entry duplicating
Collision. errors. function. Firewall vulnerability. D
Business-to- Business-to- Backend-to-
Business Backend Business Business- to-Billboard A

Billboard On-line Catalog Endorsements Broadcast B


Customer
Endorsements Billboard Catalog Broadcast A

Intermediaries portals .COM Domains A


Search and
Order Placement Service discovery None of the above C
Post purchase Purchase Pre-purchase
interaction consummation preparation Search and discovery A
Endorsement
Billboard model model of
of marketing Online catalog marketing None of the above B

Online Catalog Shopping cart Billboard Pulling cart B


EDI For EDI For EDI For
Administration, Administration, Administration,
Commerce and Consumer and Commerce and
Transaction Transport Transport None of the above C

EDI TCP/IP EFT Gateway D

Compiler Interpreter Assembler EDI D


Business-to- Business-to- Consumer-to-
Business Consumer Business Customer-to-Company B
Emergency Cash Electronic Cash
Business Euro Cash Endorsed Cash B
Communication Process Service
Perspective Perspective Perspective None of the above C
Micro
Microcash Transactions TT(Tiny token) E-token A

Decryption SSL Encryption Subscription C


1 2 3 4 B

data table filtered table index table pivot table D


convert text to
pivot table wizard chart wizard columns wizard tip wizard D
series or rank category legend data marker A
series or rank category legend data marker B
series or rank category legend data marker C
series or rank category legend data marker D
column chart bar chart pie chart surface chart C
column chart bar chart pie chart surface chart B
column chart bar chart pie chart surface chart D
column chart bar chart pie chart surface chart A
wild card
spaces characters symbols none of the above A
excel97 internet explorer Netscape word 2000 A
convert text to
pivot table wizard chart wizard columns wizard tip wizard A
line chart bar chart stock chart pie chart C

true false A

and or B
3-dimensions 4-dimensions Multi-dimensions A
true false A
Data table Pivot table B
It is often used to
display share It is also used for
It is also called as market prices indicating fluctuations
high-low-close It shows trends over a period of in temperature
chart over time time changes B
Scenario
Pivot table manager Solver Data table. C

Scenario
Goal seek manager Pivot table Data table. A

Goal seek Pivot table Solver Data table. D


Workbook Worksheet Spreadsheet none of the above A
Performing
Performing database Performing text
calculations. operations formatting. All of the above D
Source table
Column field Row field. name. Pivot table item. C
two three N B
true false B
3-dimensions 4-dimensions Multi-dimensions A
Data table Pivot
It table when
is useful B
several
components are
changing and
It displays the the user is
data series one interested in the It can be
on top of the sum of the represented in 3-
other. components. dimensions B

Scenario
Pivot table. manager Solver Data table C

Scenario
Goal seek manager Pivot table Data table A
Standard
Count. deviation SumIf A
databases records tables worksheets D
It is a tool that
provides a way
to view and
It is a tool for compare the
summarizing and results of all the
analyzing the different It summarizes
data records in an variations the data by using
interactive together on the analytical
manner. worksheet functions. A
Scenario
Goal seek. manager solver Pivot table D
text import convert text to
wizard columns wizard tip wizard function wizard B
worksheet workbook tables database A
application document
window window modal window C
A dark wide
border A dotted border No border A blinking border A

8,16,32 2,4,2 2,2,2 6,8,10 D


the row is too
short to show the column is too
the number at narrow to show
your formula has the current font all the digits of
a syntax error size the number either b or c C
ability to speed of flexibility of
generate tables calculation moving entries cost of initial set-up D

word processing graphical database spreadsheet D


Range Address Gap Rows A
Producing graphs Writing letters Drawing pictures Document filing A
drag from the
top cell in the
column to the
double-click any last cell in the click the column
cell in the column column heading click the column label C
ENTER CTRL + ENTER TAB INSERT A
array. function. constant. formula. B
100 (201)555-1212. #VALUE! Tom McKenzie. C
Numeric
Cell references Functions constants Text constants D
^ / * \ D
It is impossible to
B5*B6 C3/D4 D4^2 determine. C
E12 6 SUM(H9:H11) G7*SUM(H9:H11) B
It is surrounded The phrase “active
by a heavy It is displayed in cell” appears in the
border. It is blinking. reverse
By eithervideo.
clicking Status bar. A
in a different cell
By using the or using the By typing the
arrow keys to arrow keys to reference of the cell
By clicking in a move to a move to a you want to move to
different cell different cell different cell in the formula bar C
The Cell Format The Font Size
The Standard The Formatting command on the command on the
toolbar toolbar Edit menu Tools menu. B
the New the Save the Save As the File Type
command on the command on command on the command on the File
File menu. the File menu. File menu. menu. C
File Edit View Window A

Preview Details List Properties B


Both Insert and
Insert Delete Delete Clear C
Both Clear and
Clear Delete Delete Remove B
Orientation
(portrait or Headers and
landscape) footers Fonts Margins C
Options Page Setup View Edit B
worksheet. range. group. cell group. B
6 D12, G25 D12:G25 D C
destination
copy range. range. clipboard. source range. D
destination
paste range. range. clipboard. source range. B
The Duplicate The Copy The Paste Both the Copy and
command command command Paste commands D
absolute relative mixed constant A
B4 $B4 B$4 $B$4 D

#DIV/0! #DIV/0! #DIV/0! #DIV/0! B

#DIV/0! #DIV/0! #DIV/0! #DIV/0! C


The Move The Cut The Paste Both the Cut and
command command command
cycle through Paste commands D
absolute,
relative, and
copy and paste mixed cell cycle through open
cells. edit cells. references. applications. C
the Format the Formatting
the Fill Handle Painter toolbar Conditional formatting B
Select the Insert Click the Insert Right-click a cell
Hyperlink Hyperlink button and click the Edit Double-click a cell and
command from on the Standard Hyperlink click the Insert
the File menu. toolbar. command. Hyperlink command. B
whether the cell
whether the cell has an absolute
has a formula or or a relative cell
a value in it. the cell address. reference. the value in the cell D
text with either a two-
digit or four-digit year,
text with a two- text with a four- depending on the
digit year. digit year. an integer. format. C
It is impossible to
determine from the
Jul-30 Aug-31 29/03/2008 information given. B
subtracting the adding the subtracting the
earlier date from earlier date to later date from adding the later date
the later one. the later one. the earlier one. to the earlier one. A
the F4 key. the F2 key. the Esc key. the F1 key. B
Either 3/4 or .75,
March 4 of the depending on the cell
03-Apr 0.75 current year formatting C
either a cell on a
a cell on a worksheet or a
worksheet. a variable. a constant. variable. D
B1-G10 B1.G10 B1;G10 B1:G10 D

AVERAGE COUNT MAX SUM C


Combination Line Pie Scatter C
Once a bar chart Once a column Once a pie chart
is chosen it chart is chosen has been chosen Once a line chart has
cannot be it cannot be it cannot be been chosen it can be
changed to a changed to a changed to line changed to a pie
column chart. bar chart. chart. chart. D
hold down the hold down the hold down the hold down CTRL +
CTRL key SHIFT key ALT key SHIFT A

Transfer
Create four information to a
Use tables separate files database Use multiple sheets D

Paste Fill Down Fill Right Paste Special B

Tools | Sort Data | Sort Edit | Data | Sort none of the choices B
Analyse data Calculate dataCreate forms None of the above C
select Print
selection on
 Page Setup  | select Print selection
click the Print press the PRINT  Sheet  and then in the Print dialog and
button SCREEN key print then print D
producing graphs writing letters drawing pictures None of the above A

(D4+C2)*B2 D4+C2*B2 #VALUE! =(B2*(D4+C2) C


=A3SUM:B3SUM
0 :C3SUM REF! None of the above B
whatever was
portrait landscape last used vertical A
AD213 ZA1 A0 None of the above C
CERN ECRN CARN NET A
yahoo and newsgroups and
infoseek mailto and files search engines none of the above B
bulletin application
news boards,mails call servers,proxy
groups,yahoo and and wireless servers and web
infoseek system servers none of the above B
business bulletin
bulletin board broadcasting broadcasting
system system system none of the above A
small large very small none of the above B
windows socks windows sockets windows stocks none of the above B
Mosaic Yahoo PINE Lynx A
buffer cache built-in none of the above B

Photography Digital Signature Cryptography Message Digest C


Key Lock Hash Function Formula A

User-id Password Name Address B


Penetration Retrieval Cryptography Password Cracker A

Acts Regulations Address Protocols D


Spoofing Imposting Unauthorising Approving A
Loss Threat Exposure Hacking B
Sales - tax Income - tax Judge of a civil Police officer of IPS
authorities authorities court rank. B
Utility Pirated software
Virus Cracker C
Tim Berner Lee Hoffman Charles Bubbage Howard Aiken A
Etrade.com Amazon .com Dell .com Msn .com B
Asynchronous
Automated Tailor Transmission
Machine Any Time Money mode None of above C

Acts Regulations Address Protocols C


Router Gateway Port Pin B

LAN WAN CAN PAN A


hyper terminal hypertext hypertext hypertext tracing
tracing
Nationalprogram tracing program transfer protocol protocol C
Informatics Network New Information
Center Interface card Card None of the above B
Can not
Only Computers computers Only printers None of the above D
Combines
connectivity of a Switches data
hub with the from incoming
Concentrates traffic regulation ports to outgoing
connectivity of a bridge ports. All of Above B
Bridges and Two or more
Repeaters. networks Bridges and Hubs Hubs and nodes B
bits frames Packets None of the above C
firewall gateway router virus checker A

One Two Four None of the above C


Physical Layer Data-Link Layer Network Layer All of the above D

RG7U Coaxial cable Fiber Twisted pair B


A memory
Physical address Logical address address None of the above B

A cable Hub Router None of the above B


It gets It continue on to
Data return to the destroyed bit by target device
sender bit. with corrupt data None of the above B
Wireless Wired Ultra violet
technology Technology technology None of the above A
Physical Layer Data Link Layer Network Layer All of the above D
Binary ASCII Octal None of the above A
48 Bits 48 Bytes 48 KB 48 MB A
software that
facilitates a list of rules for software that a gateway calling
connection to the transferring data allows file program for internet
internet over a network copying bridging B

Novell PC Client Server Network PC C


If the hub goes
If one node goes down, it brings If the hub goes down,
down, it brings down all of the it brings down all of
down the entire nodes on that the nodes on all of the
There isn't one ring section rings B

Physiology Topology Both A and B None of the above B


Bus Star Ring All of above D
Linear Parallel Both A and B None A
Parallel Circular Linear Both A and B B

Ring Bus Star Mesh C

Ring Bus Star Mesh B


Star Bus Linear Ring C

Ring Bus Star Mesh A


Network Layer Transport Layer Physical Layer Data Link Layer D
Ethernet, token Ethernet, token Ethernet, Ethernet, token ring,
ring, DecNET ring, FDDI DecNET, FDDI ARCnet B
bps kbps mbps mips B
bps Kbps Mbps Mips C
measured in depend on the
usually higher bytes per transmission limited by modem
than LAN speeds second medium speeds C
CD-ROM drive a modem Windows 95 Netscape B
must use the must use must have a LAN
World Wide Web electronic mail account
common All of the above A
key gateway uniform gateway application protocol
interface resource locator interface interface C
interfaces a
a Novell Interface used to control a modem to a connects a computer
Controller printer computer
Windows to a network D
CD-ROM drive a modem package Netscape B
Linux Novell Netware Windows NT None of the above C
have to do with
compression of
graphics and have to do with
video Web pages the Internet none of the previous A
use appropriate
must use the must use must have a LAN communications
World Wide Web electronic mail account software A
Printer modem bridge none of the previous D
provides access is a CPU
to the Internet is a CPU register functional unit make of processor A
is a protocol for the
used to send used to browse is part of transfer of files
email the Web Netscape between computers D
uses wireless
used to send communication is part of
email medium Netscape None of the above D
used to protect a
computer room
from fires and a screen saver
floods a form of virus program none of the previous D
a backup server an email server a poor file server none D
IR system for
hardware the Internet browser none of the previous C
scanner CD-ROM clip-art file search engine D
provides access is a CPU
to the Internet is a CPU register functional unit make of processor A
is a protocol for the
used to send used to browse is part of transfer of files
email the Web Netscape between
is computers
a protocol that D
used to send uses telephone is part of allows for remote
email lines Netscape
Any layer can login D
communicate
Any layer can only with the Any layer can
The layers cannot communicate layer directly communicate only
communicate directly with any above or below with the layer above
with one another. other layer. it. it. C
It is made up of
many networks
connected into
transmission It works the Individual computers
It is one large lines called same way as a can connect to it
network. backbones. local network. using an ISP. A
Password
cracking System intrusion Denial of Service Port sniffing C
used to protect a
computer room
from fires and a screen saver
floods a form of virus program none of the previous D
Flood a Web Virus that
server with initiates a ping
IP flood requests flood UDP flood A
hack packet flood traffic C

firewall router switch hub B


a backup server an email server a poor file server none of the above D
Apply security Update virus Backup data on a Limit logging on
patches definitions daily basis access C
There are safe Only large name-
All sites are safe and unsafe recognizable ActiveX-enabled sites
and reliable. sites. sites are safe. are safe. B
Use of Use of logical Use of encryption
Use of identifiers passwords access methods methods D
by attaching by scanning the
by attaching to through an FTP itself to a computer for a
an e-mail. port. document. connection. B

Phone E-mail Web traffic Application updates D

A Trojan horse Adware A worm Spyware D

Modems Protocols Multiplexors LAN B


cookies and Trojan horses cookies and key key loggers and
Trojan horses. and key loggers. loggers. worms. C
An attack on a An attack with
system for the purpose of Giving out Changing the content
personal gain gaining publicity disinformation of a Web page D
Economic Disruption in Disruption in All of the above are
damage communication supply lines correct. D
Crashing the Shutdown of
stock market, as military security Contaminating Shutdown of nuclear
in the 1930s systems water systems plant safety systems D
To obtain an accurate
inventory of network
To improve To improve related equipment
To carry more network system response and parts and network
network capacity services time its
stop nodes D
limit access to competitors update its prices as
set its prices very computer seeing their soon as they are
high owners only prices changed D
Yahoo People USA People
People Search Search Search Lycos Search B
Name of your
bank Date of birth Personal assets Criminal records A
Virus Fraud Adware Spyware B
make large amounts
of money by parking
invest without purchase off- funds in their bank
buy stocks. risk. shore property. account. D

Shill bidding Phishing Siphoning Hoaxing B


Internet stalking. cyber stalking. virtual stalking. Web stalking. B
pop-ups. cookies. spam. viruses. B
Use a fake e-mail Never use your Use a proxy Use anti-spyware
address. real identity. server. software. B
Message
Physical sequence Logical access
Encryption Security controls number checking controls B
I only II only Both I & II Neither I or II C

irc ftp www telnet C


Adds more bytes Verifies integrity
Increases boot up Misleads a program
to programs of files time recompilation B
Internet both HTML and
HTML Explorer Microsoft Excel Internet Explorer B
round trip HTML
Web query. HTML document. document. Web browser. B
.com is used for .co in used for .con is used for
company company companies None of the above A
the World Wide
round trip HTML. Web Consortium HTML. one way HTML. C

XML. HTML. DHTML. MHTML D


clicking a
using Internet hyperlink that
Explorer to view a updating the references a
Web page that is values that are document that is viewing an Excel
stored on the obtained stored in the worksheet that you
hard drive on through a Web floppy drive on have saved as a Web
your computer query your computer page. B
Click on the Back
arrow until the Click on ‘Go to’ Go to the History
desired site is or ‘Search’ in page and look for Go to the Bookmarks
found the browser the site or Favorites page C
the Insert
the Refresh Hyperlink the Update the External Data
command command command command A

Hyperlink Screensaver Sound Video C


BMP GIF JPEG TIFF C
Add it to Cut and paste it to a
Save it to a floppy Write it down on ‘Favourites’ or word processor
disk. a piece of paper. ‘Bookmarks’. document. C
privileged
extranet. intranet. network. network topology A
an attachment. a signature. a footer. an encryption. B
VoIP IPT IPP PoIP A
Desktop client, Desktop client, Desktop server, Desktop server,
application, and software, and application, and software, and
database. hardware. database. hardware. A
Modem CD-ROM
File Telephone line None of the above B
File Transfer Transmission File Transfer
Program Protocol Protocol None of the above B
So computers can
be referenced by So IP addresses So email is
a name can be shorter delivered faster None of the above A
193.1.2.3 45.1.1.1 143.215.12.19 None of the above D
paul .trigg @ paul.trigg@dom
domain. org. uk ain.org.uk paul.domain.uk None of the above B
The US Scientists in
government Switzerland No-one None of the above C
International
Internet Relay Relay of Internet Remote
Chat Characters Conversations None of the above A
It will be waiting A letter will be
for you to collect sent to you in the
It will be deleted it post None of the above A
Hyperlink Text
Hyper Textual Marking Hyper Text Mark-
Mark-up Lingo Language up Language None of the above C
Receiving
messages People
automatically discussing a
from anyone in topic of interest High volumes of
the group globally email None of the above C
autolayouts and
clipart & auto presentation slide view &
shapes templates outline view none of the above B

circles points squares icons C

square image grid guide C

tool bars short cut menus auto shapes all the above B
clip gallery & slide show &
word art view show fonts & images none the above A
wave file media clip .video file all the above B

eof,false movelast,true movelast,false eof,true D


properties form layout
window window toolbox project explorer D

bof,false movefirst,true movefirst,false bof,true D


value() int() number() val() D

circle rectangle square oval D


true false A

true false A
fontcolor color forecolor none of the above C
fontunderline,tru textunderline,tru
underline,true e e none of the above B
textsize size foresize fontsize D
one- millionth of a one-hundredth one-thousandth one-ten thousandth of
second of a second of a second a second C

count recordcount itemcount listcount D


form layout prperties
window window project explorer toolbox B

title prompt vbmsgboxstyle none of the above C

msgbox() textbox label inputbox() D

opendynaset opensnapshot dbopensnapshot dbopendynaset D

load activate unload initialze C

standard opaque transparent graphical D


blue red green black B
red green blue white D
properties form layout project explorer
window window toolbox window D
properties form layout project explorer
window window toolbox window A
change lostfocus text gotfocus D
child parent container none of the above C
true false A
load unload initialize activate D
text name caption none of the above C

opendatabase dbengine openrecordset none of the above B

enabled visible value style C


dime dim var none of the above B

.ctx .ctl .ctr .ocx B


Validate Validation Check Audit A
On Error GoTo On Error GoTo
linelabel Inline On Error Stop On Error Resume Next D

UpdateControls PaintPicture Refresh Resize A


Cancel parameter UnloadMode UnloadMode
to a non-zero Cancel parameter to a parameter to a zero
value parameter to 0 non-zero value value A
1 2 3 None of the above D
Consists of
Consists of Various Forms
Consists of several And Code Consists of several
several Programs Applications Modules Projects D
Form window, Project window,
standard or code view code Class module,
module window
Place code in code module None of the above A
Place code in the the Unload Place code in the
Terminate event event Deactivate event None of the above B
AutoRedraw = AutoRedraw =
True False Refresh PaintPicture A
Msgbox Msgbox
Msgbox err.no & err.number & error.number & Msgbox error.number
err.text err.text error.text & error.description D
To help in To provide a
To display images creating a To allow the repository for images
to the user ToolBar editing of icons used by other controls D

FreeFile GetFileNum GetFile GetBytes A


Retrieve Get GetProperty Value B
Common
messages passed Windows
to Windows Open dialog box explorer Input box D
Caption Visible Multi-Line Font C
Click and Click, KeyUp and KeyUp and KeyPress, KeyUp and
KeyPress KeyDown KeyDown KeyDown D
Ascii Format Binary Format Input Mode Output mode B
CurrentX and ScaleLeft and ScaleHeight and
CurrentY ScaleTop ScaleTop x and y A

Property Get Property Assign Property Let Property Set C

Background color
property Caption property ZOrder property AutoRedraw property C
Min Max Value CurrentVal B

Shell Substr SetAttr CStr A


Are one and the Can be different Are actually not
same at times properties None of the above B
You do not have
You do not need the permission
to use the Set to access the MyVar has not
command here class been declared None of the above C
The
The Exec ExecProcedure
The Open method method method None of the above D
A warning query A critical An exclamation
icon message icon icon
intrinsic None of the above B
statement. variable. constant. built-in procedure. C
InputBox function
InputBox can be created
MsgBox function returns with the macro MsgBox statement
statement returns a value, while recorder, while can be created with
a value, while the the MsgBox the MsgBox the macro recorder,
InputBox function statement does statement while the InputBox
does not. not. cannot. function cannot. B
Data cannot be
entered into the The form can be Data can be A new check box can
form. modified. entered. be added. C
Unload QueryUnload Deactivate Terminate C
clipping tool cropping tool cutting tool scribble drawing tool A
color palette color box color scheme color guide C
ascent tricolor scheme color palette primary color scheme A
10 28 18 36 C
column bar pie linear A
images images and text slides slide sorter views C

circular radar doughnut all the above A


entity
Microsoft data point data stream B
organization
chart clip art auto shapes track changes A
the chart is the chart window
the organization made available opens displaying
chart is expanded for editing a chart template none of the above C
general purpose custom drawing standard drawing
box tools tools tools tools C
used to mange used to create a used to store the
organizational accessed only manager box for other tools of the
chart by manager an existing box organizational chart C
not available in available in the tool
turned on turned off the tool bar bar B
once twice thrice any of the above C
two four five eight B
native tool draw tool standard tool all the above B
autolayouts handlayouts slide view none of these B
zoom reduce/enlarge preview none of the above B

importing exporting copying moving B


Microsoft excel auto shapes clip art drawing tools A
.rtf(rich text .html(hypertext
.ppt(PowerPoint) format) .doc(document) format) B
nine only one six twelve C
.rtf(rich text .wmf(windows
format) metafile) .txt(plain text) .doc(document) B
not displayed displayed only
during the slide during the slide displayed only in
show show outline view none of the above A
DTS(digital track
sound) 3D(3 dimension) both a and b transition D
build transition slide show view show A
notes master slide master master slide master notes A
outline view slide view view show slide sorter view C
15 inches,10 10 inches,7.5 7.5 inches,5
inches inches inches none the above B
portrait landscape a or b none of the above A
animation view show transition b or c A
gif jpeg png none of the above D
hyperlink hypertext action button all the above D
visual basic for Microsoft visual
visual c++ application interdev all the above B
macro batch file templates add-ins A
while creating during slide when the slide
a .exe file transition show is run none of the above C

virus checkers spell checkers header files all the above A

slide show custom show both a and b none of the above B


slide pane notes pane properties pane outline pane D
internet explorer paint shop pro paint shop pro power point 2000 D
PowerPoint
creates a sample
presentation to contains sample
which user can it is the quickest presentations for
add words and way to create a a variety of provides suggested
pictures presentation topics content and design D
user can insert user can insert
user can insert only pre-drawn, picture to the
objects like clip- pre-colored master slide user can insert picture
arts, pictures graphic images which gets to the title slide which
stored in a reflected in a reflected in all gets reflected in all
separate files to clip arts to the the slides using the slides using that
the slides slides that master slide title slide B
in outline view, in slide sorter in notes pages
drag the slide view, drag the view, drag the I slide view, drag the
icon to a new slide to a new slide icon to a slide icon to a new
location location new location location C
the slide that
holds the
formatted
placeholders for
the titles, main
text and any transition means design templates the slide that holds
background items applying special is the template the formatted
that user wants effects to the whose format placeholders for the
to appear on the crossover and color scheme title and sub-title for
slides is called a between the user applies to a the presentation is
master templates slides presentation called a title template D
in outline view,
user can see the
miniatures of all
with notes pages slides in a
view user can presentation, user should
prepare speaker complete with select the slide the slides can be
notes and text and view to add the reordered in the
handouts graphics text to the slide outline view B
the slide that
holds the
formatted
placeholders for
the titles, main
text and any transition means design template the slide that holds
background items applying special is the template the formatted
that user wants effects to the whose format placeholders for the
to appear on the crossover and color scheme title and subtitle for
slides is called a between the user applies to a the presentation is
master template slides presentation called a title template D
slide layout customize
by default, new slide set up show B
doughnut chart
data to be is displayed
graphed resides based on the user can add data
in a datasheet data in the data is plotted in labels and gridlines to
window datasheet a chart window the chart B

the master slide the slide master the header slide the format slide B

office assistant spell checker grammar checker none of the above B


10 12 102 22 B
once twice three four times B
CD-ROM, digital text, hypertext, Power
text, graphics and text, hypertext camera and Point, video and
email address. and Power Point. sound. sound. D
Line style, Line color,
the Font and the text font, and text
the Line style the Line color text alignment alignment D
Fill color, Line color,
Fill color Line colorbox
A popup Line thickness and Line thickness D
prompts you for Microsoft Graph
Excel is started an existing is started so that
so that you can Excel chart to you can create a The graph placeholder
create a chart. insert. graph. is deleted. C
taken from the
first column or
row of data in the
always taken datasheet,
always taken from the first depending on
from the first row column of data whether the data
of data in the in the series are in rows
datasheet. datasheet. or columns. entered by the user. C
Side-by-side
column Stacked column Pie chart Line chart B
Pull down the Insert
menu and select
Chart, click the Insert
Pull down the Chart button on the
Click the Insert Insert menu and Standard toolbar, or
Pull down the Chart button on select the pull down the Insert
Insert menu and the Standard appropriate menu and select the
select Chart. toolbar.
Click the chart Object. appropriate Object. D
object, then
click the View
Datasheet You cannot display
It automatically button on the Pull down the the underlying
displays in Slide Standard Edit menu, then datasheet once the
view. toolbar. select Object. slide is finished. B
Single click the Double click the Click outside the Change to Slide Sorter
chart. chart. chart. view. C
A dialog box is
A dialog box is displayed
displayed allowing you to
allowing you to enter the name
enter the name of of the Excel
the Excel worksheet that
worksheet that should be The datasheet window
should be linked embedded in The datasheet is is toggled from closed
to the PowerPoint the PowerPoint saved as a to open (or from open
presentation. presentation. separate file. to closed). D
The application that
The chart is The chart is The chart is created the chart is
selected. deleted. doubled in size. started. A
The chart is The chart is The chart is Microsoft Graph will
selected. deleted. doubled in size. restart.
a slide one bullet item D
at a time, build bullet
items a letter at a
time, and build bullet
a slide one bullet bullet items one bullet items one items a word at a
item at a time. letter at a time. word at a time. time. D
Subtle, Moderate, or
Subtle Moderate Exciting Exciting D
Both enter and
exit, and fly in Neither enter nor exit;
Fly in from top from top or neither fly in from top
Enter and exit or bottom bottom nor bottom C
Enter Shift Alt Ctrl B
Custom animation can
be used to affect the
way objects appear on
a slide, to what
what objects do objects do after they
after they appear on a slide, and
the way objects appear on a the way objects to the way objects
appear on a slide. slide. exit a slide. exit a slide. D
The advanced
timeline shows The advanced
the sequence in timeline shows
The advanced The advanced which objects will neither the sequence
timeline shows timeline shows appear on the in which objects will
the sequence in the duration of slide and the appear on the slide,
which objects will the effect duration of the nor the duration of the
appear on the applied to each effect applied to effect applied to each
slide. object. each object. object. C
Organization Clips, organization
Clips charts Text charts, and text D

Paint program Draw program Filtering program Animation program A


Fly in, From top, and
Fly in From top Dissolve in Dissolve in D
Once data is Once data is Data cannot be
entered it cannot entered it can entered into There is no such thing
be changed. be changed. Datasheet. as a Datasheet. B
OLTP. OLAP.
You can change OLST. OLIP. B
both the
You can change appearance of a You cannot
the appearance whole diagram change the style
of a whole and the of the connecting You cannot change
diagram, but not individual lines in an the color of the boxes
individual shapes shapes of a Organization in an Organization
of a diagram. diagram. chart. chart. B
[Enter+A] [Shift+Z] [Alt+Z] [Ctrl+Z] D
.vbg .vbp .frm .frx B
add additem loaditem none of the above B

load loadpicture addpicture none of the above B


Drive1.Drive=Dir Dir1.Path = File1.Path =
1.Path Drive1.Drive Dir1.Path none of the above B
messagebox() message() msgbox() none of the above C
Dir1.Path=File1.P Dir1.Path = File1.Path = File1.pattern=Dir1.pat
ath Drive1.Drive Dir1.Path h C

openrecordset opendatabase recordcount count C

update append addnew additem C

append update additem addnew B

movenext movelast moveprevious movefirst C


Cancel parameter UnloadMode UnloadMode
to a non-zero Cancel parameter to a parameter to a zero
value parameter to 0 non-zero value value A
Word 2000 Office 2000 Office 97 Back Office A
click-n-type double click drag & drop none of the above A

office clipboard cut select none of the above A


shift+end and shift+left and ctr+end and
shift+home shift+right ctr+home none of the above B
web layout, normal layout, web layout, page
printlayout web layout layout none of the above A
click from start
program,
MSWord from the
wizard templates task menu none of the above A
document
office assistant inbox assistant assistant none of the above A

Screen Tip Tool Tip Icon Tip Document Tip A


tab stop marginal stop ruler none of the above B
up arrow keys page up keys home and end
only only keys only up and down arrow D

left center decimal rotation D


template model dialogs/alerts none of the above B
increase indent decrease indent both A and B none of the above C
special effect control tool box design wizard pictures A
drawing toolbar control box database forms A
1 2 0 11 A
printer setup
page setup from from the file print preview
the file menu from the file none of the above A

border shading style box none of the above A


ctrl+a Del ctrl+f ctrl+m A
ctrl+a Del ctrl+f ctrl+m D
CTRL+SHIFT+F CTRL+O CTRL+SHIFT+S CTRL+SHIFT+P A

ctrl+shift+f ctrl+o ctrl+shift+s ctrl+shift+p C

Excel Access Both None of the above B


True False A
False True B

Valid Signs Transaction type Limit Check Reasonableness D

HLOOKUP VLOOKUP A or B None of the above B


DDE OLE ODBC All of the above C
Analysis is the
Analysis loading of This involves
translates programs that looking at a
program code of perform routines system and
a high level to control finding out how
language to peripheral information is
machine code devices being handled None of above C
Inputs, outputs,
file design Maintenance,
Only hardware hardware, and reliability, and
and software software upgradeability None of above B
To execute any To maintain
To collect data programs security None of the above D
Deleted from the Copied from the Transferred from the
disk disk Saved to the disk disk A
Users operate the
manual system Users operate
and computer the computer Users operate
system at the system from a the manual
same time given date system None of above B
The new system The new system
is introduced is introduced Users continue
alongside the and users start operating the old
existing system operating it system None of above A
Instructions and User Guide and
technical Log files and technical
documentation temporary files documentation None of above C
User guides
To enable any cover how to run
printer to be the system, enter
For technical connected to data, save, print,
support the network etc. None of above C
Network
Operating systems and Database
systems and communication systems and
system services services backup services None of the above A
Magnetic tape
storage CD-ROM floppy disk Hard disk B
To maintain a To help someone
backup copy of all To do a who is applying
the information particular task. for employment None of the above B
Data bus Auto bus Address bus Control Bus A
FDDI BAD TED MAD B
Data bus Auto bus Address bus Control Bus D
Operating Data structures
system routines that are part of
Peripherals that that execute in the kernel of an Shells, compilers and
are connected to supervisor operating other useful system
a computer. mode. system. programs. D
binary form ASCII code form decimal form alphanumeric form A
represented 256 represented 127
were 7 bits 8 bits characters characters A
4 bits 8 bits 16 bits 32 bits A
More than 1000
mega bytes 1000 kilobytes 230 bytes 1024 bytes A
a 32-bit bus or 32-bit
32 registers 32 I/O devices 32 Mb of RAM registers D
used to indicate used to detect is the first bit in a
uppercase letters errors byte is the last bit in a byte B
ROM RAM DRAM CROM A
bits per second baud bytes Hertz D
memory access secondary secondary storage
memory capacity time storage capacity access time B
have fewer use more RAM
instructions than than RISC have medium use variable size
RISC machines machines clock speeds instructions D
ALU Registers Variables Logic Bus A
Computer is Data is not saved
Power is switched improperly shut before computer
offparallel
a down is shut down All of the above D
interface a serial interface printer interface a modem interface B
dot matrix
line printer printer ink-jet printer laser printer. D
stores more
is faster to access information than is used for cache
than RAM is non-volatile RAM memory B
increased the provides backup
storage capacity power in the
of a computer increases the event of a power
system process
has more speed cut none of the previous C
storage capacity is an access card
is a form of ATM than an ATM for a security contains a
card card system microprocessor C
CRT displays LCD displays SSGA displays none of the previous B
having several writing programs
programs in RAM in multiple
at the same time multitasking languages none of the previous A
the ability to run
having several 2 or more writing programs
softwares running programs in multiple
at the same time concurrently languages none of the previous D
ALU Registers Variables Logic Bus B
brochures magazines CD-ROM e-mail D
to run more than
an operating one program at
multitasking system the same time none of the above C
multiprogrammi
multitasking ng multiuser none of the previous C
NORMAL ONLINE LAYOUT PAGELAYOUT ONLINE DOCUMENT A
ctrl+m ctrl+2 ctrl+end ctrl+home B
ctrl+v or ins ctrl+c or ins ctrl+x or ins ctrl+v or Del A
ctrl+2 ctrl+5 ctrl+1 none of the above B

Text Box Frame AutoShape Border A


Header and
Footer Screen Tips Page Layout none of the above A
Chart WordArt Auto Shapes File A
Borders Shading WordArt Bullets D
clear remove all remove clear all D
picture bullets arrow bullet circle bullet
dialog box dialog box dialog box none dialog box A

charts WordArt AutoShapes files C

doc1 document1 new document default document B


thesaurus hyphenation mail merge none of t he above A
shift+f7 thesaurus menu shift+f8 tools+spelling menu A
first second first row last cell of the t able A
tab end enter none of the above A
convert text to convert data to table auto format
table table option none of the above A
row rows & columns records none of the above B

AutoCorrect AutoFormat style gallery none of the above A


Mail Merging Macro Data Source none of the above B
basic visual basic vj++ visual FoxPro B
shift+f8 shift+f7 alt+f8 alt+f5 A
online layout
web layout view view browser none of the above A
micro soft
email client outlook express outlook hotmail A
html xml sgml vb script A

internet intranet arpanet LAN A


field name must the field field names in
be listed in the separators in a the header the number of fields
same order as header source source must names in the header
the and the data match any merge source must be the
corresponding source can not fields you've same as the number
information in the be set as inserted in the of data fields in the
data source paragraph main document data source B
auto format by default cell
option applies to height and
it is not possible the entire table weight option delete cells option
to change the and not only to applies to all the allows to delete the
height of only the selected rows and entire row or a
selected rows of rows or columns columns of a column or shift cells
a table of a table table up or shifts cells left C
left decimal justified top A
In order to type If a header is
A new section is a header from inserted in the
created in order the third page of second section A section is a portion
to change the document a then the same of a document in
properties like section break is header is which certain page
number of inserted after t applicable to the formatting option can
columns he third page first section be set D
true false A
true false A
true false A

drag & drop click -n-type Double Click none of the above B
true false A
with t he caps lock
key accidentally
prohibits the turned on reverses
automatically user from automatically the case of the letters
corrects common renaming an corrects the that were capitalized
typing, spelling auto correct grammatically incorrectly and then
errors entry
password errors turns off the caps lock B
protected
document can
be opened
without
password can not password as password are not password can be upto
include spaces read only case sensitive 15 characters long B
left justified
a document file hanging top A
a .ppt file can not can be inserted a multiple
not be inserted at in the current documents files an .xls data can not
specified position document at can be inserted be inserted at
in the current specified in the single specified position in
document position document the current document B
true false A
true false A

true false B
true false A
Hyperlink
Master Document Child Document Document none of the above A

Print Layout View Page Layout Outline Layout none of the above B

Insert Mode Type Over mode Remove none of the above A


press the return press the tab press the escape
key key key just keep typing D
layers and planes lines and spaces height and width
backspace/ rows and columns D
tab enter/return delete shift B

grammar checker spell checker thesaurus outliner C


send a public
message to send private
friends interested send pictures to messages to a send a package to a
in one topic a friend friend friend D

Print all From ___ To ____ Page setup Print preview B


Enter Copy Retrieve Save C
closing tabbing spacing sorting B
database graphing word processing spreadsheet C
Creating and
To analyse editing Storing
figures documents information None of the above B
subscript annotation clip art clipboard C
Creating and
To analyse editing Storing
figures documents information Making Calculations B
Spelling,
Clear, replace grammar and Cut, copy, paste Font, Paragraph,
and select autocorrect and clear Bullet and Numbering C
Text at the Numbers which Text which
bottom of every appear on every appear at the top Designated area on
page
Mouse, printer page of every page the document C
and processing Keyboard, Monitor,
system Mouse, monitor keyboard and
keyboard? and printer mouse None of the above B

Browser clip-art file microphone digital scanner D


Spelling,
Clear, replace grammar and Cut, copy, paste
and Toolbars autocorrect and clear None of the above C

6 point 10 point 15 point 25 point B


impossible to
2½ inches. 2¾ inches. 3 inches. determine. B
Word cannot display
You have not You have not columns during
inserted a specified editing; you will see
You are not in column section continuous them only when you
Print Layout view. break.. section breaks. print the document. A
to move a
section of text to leave an original
from the original section of text in
to store a file on to store a file on location to place while pasting a
the hard drive a diskette another location copy elsewhere D
Data about a set A set of different
of similar things Mainly text graphics None of the above B
Grammar
Thesaurus Spell Checker Checker Find and Replace B

Paste Replace Select all AutoCorrect B


Delete, then
Copy, then paste Cut, then paste paste Insert, then paste A
To give the To give the
original author a original author a
To complicate
chance to accept chance to reject
the revision
suggested suggested process and to To allow multiple
changes from the changes from force the author people to work on one
person who the person whoto spend more document in
entered the entered the time making collaboration with one
revisions revisions corrections another C
A vertical line
outside the left
A red underline margin signifies a
appears change has been Comments are
A line appears beneath text made at that enclosed in a text box
through text that that is to be point in the at the right of the
is to be deleted. added. document. document. D
Through the Edit Through the
menu by Tools menu by
choosing Track choosing Track Through tools on Both through the
Changes Changes the Reviewing Tools menu and the
command command toolbar Reviewing toolbar D
The Versions
command will
The Versions allow you to The Versions The Versions
command will save only one command will command will allow
allow you to save version of a allow you to save you to save only two
multiple versions document, only one version versions of a
of a document, including any of a document document: one
including any changes that without any version of the original
changes that may may have been changes that and one version of
have been made made to that were just made any changes made to
to that document. document. to the document. the document. A
The latest The first and
All versions are version is second versions The previous version
opened opened are opened is opened
automatically. automatically. automatically. automatically. B

Dictionary Grammar check Spell check Thesaurus A


The most recent Word will show
Word displays a version will the name of the Word is not able to
list of the dates appear at the person who tell the most recent
and times each bottom of the saved each version of a
file was saved. list. version. document. A

Fields Tools Forms Insert C


Check boxes Toggle button Text fields A drop-down list B
Comments can
be edited or Comments can be
Comments deleted by right edited or deleted by
Comments cannot be clicking the left clicking the
cannot be edited. deleted. highlighted text. highlighted text. C
Text at the Numbers which Text which
bottom of every appear on every appear at the top
page page of every page None of the above C

Press tab. Press Return. Copy and paste. Insert page break. D
text. graphics. forms. numbers. C
header/footer. bibliography. find/search. macro. A
Format Painter This action is not
Copy button Paste button button possible. C
Fault Finding Bug Squashing Error Injecting Debugging D
Insert Tools Format Edit C
a section of text
where the first the guidelines
letter of each used to establish
sentence is where different
a section of white lowercase and elements of the an enlarged capital
text on a black the rest are newsletter will letter at the beginning
background. uppercase. go. of a paragraph. A
underlining the
setting it in larger typing it all in text of the pull
type or font size. capital letters. quote. changing the color. A
A grid is a set of
A dropped cap is horizontal and vertical
The reverse A pull quote is a a word that starts lines that determine
technique means quotation taken with a lowercase the placement of
to add dark text from (pulled) letter when it elements in a
on a light from another should have a newsletter or other
background. document. capital letter. document. D
The width of each The height of The number of The tab spacing within
column each column columns each column D
6 10 12 72 D

One Two Three Four B


Press
Press Ctrl+Enter Ctrl+Shift+Enter Press Enter to
to create a page to create a create a section Press Shift+Enter to
break. column break. break. force a line break. C
A serif font at 10 A sans serif font A serif font at 20 A sans serif font at 45
points at 10 points points points D
It depends on the left
and right margins,
and how many
2 inches 3½ inches 4 inches columns are specified. D
Field Record Both None of the above A
Horizontal Vertical A or B None of the Above A

Duplicate Value Combined Value Gaps All of the above C


Cross Tabulate Filter Merge None of the above A
RAND() VLOOKUP() HLOOKUP() None of the above B

TRUE FALSE A
TRUE FALSE A
Unusual Strange A or B None of the above C
comparison of
exception testing data duplicates testing All of the above D

True False A

True False A

Limit Sequence Range Both B & C B


related to virtual
reality a form of ROM a form of VRAM none of the previous D
same as involves using more
same as multiprogrammi than one processor at
multitasking ng multiuser the same time D
set up a make a backup use a virus protection
save the file password
to read from or copy program B
write to display information
to calculate information to a to print sheets of or pictures on a
numbers floppy disk paper screen B
Uses Cobol uses Java uses C++ none of the previous. D
106 sec 103 sec 1012 sec 109 sec D

a keypad a mouse a frog a message pad B


data to be data that has an instruction that has
transferred to been transferred the address of a been transferred from
memory from memory memory location memory. C
data to be data to be an instruction that has
transferred to or transferred to the address of a been transferred from
from memory the stack memory location memory A
an instruction
an instruction that has been an instruction the address of the
that has been fetched from that has been next instruction to be
decoded memory executed executed D
a cursor a scroll bar a light pen a magic marker A

Formula Algorithm Program Data B


Artificial
Assembler Compiler Intelligence Parity Checker B
Memory
protection Parity Checking Range checking Validation B
use the directory search each file use the backup
search tools in turn facility use find and replace A
Network Program System Modem B
save copies of
the file with the use different
same name on filenames on the keep a record of backup to a secure
the system system computer failures medium D
Multiprogrammin
Multiprocessing Time sharing g Multiplexing D

ROM RAM Floppy Disk Magnetic Disk B


Telephone
Firmware Word Processor modem Shareware C
Telephone
Firmware Word Processor modem Shareware A
Sequential Hashed Indexed Random C
Operating System ALU CPU Primary Storage B
Tracks and Blocks and Schema and
Sectors Sectors
Database, Files and Tracks subschema A
Character, field, character,
database record File, record, field Element, field, file C
Maintenance
Valid character diagnostic
check program Systems logs Parity check C
Sound card. CD-ROM MIDI interface Serial interface A

Text Pictures Sound Video D


Laser Dot matrix Ink-jet Drum
recording current B
stock in a
viewing an creating the presenting an supermarket and
encyclopaedia plans for a order for stock to answering customer
CD-ROM.
replaced building design. a warehouse. queries. A
regularly never updated updated regularly updated once a year C
Document Graphics
Database processor package Spreadsheet D
retain
get into the make efficient confidentiality of
system quickly use of time files simplify file structures C
512 1024 4096 8192 C
loss of duplication of
confidentiality data virus infection loss of data D
TCP/IP HTML IPX/SPX NetBEUI A
access to the printer can do
internet is files can be 1000s of pages a the operating system
quicker shared day is easy to use B
a file name a subdirectory the root directory the hard drive D
universal port up-line provider uninterruptable
serial service power supply uniform page source C
the system
the program requires a
orphan files can executable may network the system always
be left on the not allow it to be administrator to requires a re-boot and
system uninstalled uninstall it defrag afterwards A
data. documents. information. text. A
Graphical Rules writte in
representation of procedural Logical Steps in
logic language any language None of the above A
Purchase, sales,
receipt, payments To fill the log It is mandatory in
etc. register tally None of the bove A
prevent
assist in unauthorised
maintenance speed up access access allow encryption C
senior executive IT management IT understands
support for IT. lacks leadership. the business None of the above B

input. output. processing. All of the above D


The use of Software that
computers to generates
design state-of- Using computers innovated
the-art, high- to do designs and
quality products.architecture. artistic patterns. None of the above A
specialist or Application
functional Service Provider enterprise local B
ensure the
filename is not
name the file lost identify the file identify the file type D
preventive detective corrective All of the above are
controls. controls. controls. parts of IS controls. D
external hashing static hashing dynamic hashing extensible hashing A

A: (a) , (b), (d) B: (a) to (d) C: (a), (b), (c) D: (b), (c), (d) C
corrective preventive detective
controls controls controls general controls C

Component Interface Settings Control B

(a), (c), (d) (b), (c), (d) (a) to (d) (a), (b), (c) C
Turn the Select the ‘Shut Pull the power cord
Press the reset computer off at Down’ option from the back of the
button. the power point. from a menu. computer. C
Create the files Ask the person Use the Find or Put your hand up and
again. next to you. Search feature. ask the teacher C

(a), (c), (d) (a), (b), (c) (a) to (d) (b), (c), (d) C
organisational preventive
detective controls controls controls corrective controls C

(a), (c), (d) (a), (b), (c) (a) to (d) (b), (c), (d) C
program change
problem logging call lights requests resolution procedures C
unit testing data testing thread testing loop testing A
(b), (c), (d) (a), (b), (d) (a), (b), (c) (a) to (d) D
benchmark specifications parallel
testing matching operations system walkthroughs B
Peripheral
Multiplexer. processors. Concentrator. Job control language. D

(a) to (d)
Replacement (b), (c), (d) (a), (b), (c) (a), (c), (d) A
personal
computers for Identification of Physical security
user critical of warehouse Cross-training of
departments. applications. facilities. operating personnel. B
architectural procedural
design interface design design data design A
Computer
Client-server Client network Hub C
Star Bus Mesh Ring A
Star Bus Ring All of the above D
To do a
To maintain a particular job
backup copy of such as editing, To help someone
are written all the storing who is applying To Store data in an
information information for employment organised manner B

Direct Sequential Binary Indexed B


Data
Systems analysis communications Operating
and applications hardware and systems and
programming. software. compilers. Computer operations. C
A sequential file A sequential file A direct access A direct access file on
on a disk on a tape file on a disk a tape C
Information
Tapes can only be formats
read by the commonly vary
machine on which Parity errors will between Data record can never
they are written result architectures be blocked together C
Address
Data path part Control Unit calculation part Input output channel A
Distributed Local Area Wide area
systems network network Protocol B
Use the
computer to
which they are Are required with a
Can send data to connected to Generally require microprocessor which
a computer and perform all a keyboard for permits some data
receive data from processing data entry and a processing such as
a computer operations CRT for display input validation D

Time sharing
Mixer Modem Multiplexor computer C
Allows computer
signals to be send
over a telephone Aids in back-up Packs data in a Speeds up online
line procedures disk file printing A
Planetary
network Ring Network Loop Network Star Network D
Executor Electronic
Office Automation systems mailing Instant post-office C
A dumb An intelligent A personal
workstation workstation computer A mainframe PC B
Time of day Encryption
control locks algorithms Parity checks All of them C
Terminal Communication Device interconnect
Type of cable Standard protocol standard D
A compiler
converts the A compiler is a
whole of a general purpose
A compiler does a higher level language
conversion line program code providing very
by line as the into machine efficient
program is run code in one step execution
Lexical analysis, None of the above B
Feasibility study, Implementation CONVERSION,
system design, and and code
and testing documentation generation None of the above D
CRC Baudot ASCII
a general EBCDIC A
An interpreter purpose
does the An interpreter is language
conversion line a representation providing very
by line as the of the system efficient
program is run being designed execution None of the above A
Frequency
division Time Division
Modem Demodulator multiplexor Multiplexor C
High-level Middle-level Low-level
languages languages languages None of the above C
It is faster than
parallel It is less errorIt is less prone to
communication prone attenuation Uses only one path D
Accounting
systems,
Financial sector Graphic design commercial
and engineering and education sector None of the above C
Manage the Relieve the main
Communicate paging function CPU of repetitive Reduce competition
with the console in a virtual communication between the
operator environment tasks input/output devices C
Specification and
design System Analysis Testing None of the above B
Fiber Optics Coaxial Cable Common carrier Telephone Lines C
The design of theSystem Analysis System Analysis
screen the user defines the involves creating
will see and use format and type a formal model of
to enter or of data the the problem to
display data program will use be solved None of the above C
A cache An interface A buffer An online protocol B
Testing to check
The different for errors before Hardware,
types of network the system is Software and size
to be used introduced of program. None of the above B
Star Packet Ring Bus B
10101010 1100101 1010101 None of the above C
Cyclic
Parity Retransmission Redundancy Hash Count A
15 4 64 None of the above A
Port Modem Multiplexor Acoustic coupler C
327 141 97 None of the above B
Data
Data Mining management
Data warehouse tools systems All of them B
memory access secondary secondary storage
memory capacity time storage capacity access time B
30 255 256 None of the above B
binary form ASCII code form decimal form alphanumeric form A
4C5 1B7 5C4 None of the above A
4 bits 8 bits 16 bits 32 bits B
Basic Coding Binary Coded
Description Decimal Bit Code Design None of the above D
1024 bits 1000 bytes 210 bits 210 bytes A
10000 1112 1110 None of the above A
binary form ASCII code form decimal form alphanumeric form A
Mouse Keyboard Numeric Keypad None of the above A
used to indicate used to detect is the first bit in a
uppercase letters errors byte is the last bit in a byte B
Because it
squeaks when Its moves like a
moved mouse It has ears None of the above D
bits per second baud bytes Hertz D
Touch screen Light pen Joystick None of the above C
BPS MIPS MHz VLSI B
Tracing Reading bar
Printing letters diagrams codes None of the above B

OCR MICR barcode scanning voice recognition B


Touch screen Hard disk CD-ROM drive None of the above A
increased the provides backup
storage capacity power in the
of a computer increases the event of a power
system process speed cut none of the previous C
Light sensitive
Refillable ink Pencil lead elements None of the above C
100K 1.44 Mb 5 Mb 1 Gb B

hardware software output input A


Mouse Keyboard Numeric Keypad Printer B
Touch screen Light pen Joystick Scanner C
Tracing Reading Bar
Printing letters Diagrams Codes Digital Signatures B
Touch screen Hard disk Keyboard CD ROM Drive A
Optical mark
Mouse Bar code reader reader Keyboard B
Credit card Mouse Speakers Printer A
Storing
Writing on a hard information on Back-up on a
board Printed output the hard disk Cartridge B
Coloured spots Pixels Pixies Pickers B
Printer Storage device Pointing device CD-ROM A
Optical mark
Mouse Bar code reader reader None of the above
CRT displays LCD displays SSGA displays none of the previous B
mouse button word processing
screen layout layout keyboard layout software C
Optical mark
Mouse Bar code reader reader None of the above B
language software
hardware interpreter interface an operating system C
Credit card Speakers Smart card None of the above A
having several writing programs
programs in RAM in multiple
at the same time multitasking languages none of the previous A
The ability to
having several run 2 or more writing programs
programs in RAM programs in multiple
at the same time concurrently languages none of the previous B
To run more than
an operating one program at
multitasking system the same time none of the above C
Second - Third -
First - generation generation generation Fifth - generation
computers. computers. computers. computers. A
multiprogrammi
multitasking ng Multi-user none of the previous A
Vishwajeet Deep Blue Param Arjun C
caused by is due to bad disk
is caused by wear overuse blocks none of the previous C
Magnetic Ink
Optical Mark Character
Bar code Reader Reader Recognition Image Scanning
Technology Technology Technology Technology B
converts a
slower than an program to
a fast interpreter interpreter machine code none of the previous C
Dot - Matrix
Drum Printer Printer Desk - jet Printer Thermal Printer A
encrypting it decrypting it compressing it transmitting it C
Virtual
Very important Vital information information
reader user resource under reader & user
sequence siege system None of above B
Electrically An inked ribbon and
charged ink Thermal Paper An ink pen print head D
mainframe
technology LAN technology WAN technology Unix operating system B
10-6 sec 10-3 sec 10-12 sec 10-9 sec D
External file
Limit checks Control figures labels Cross footing tests C
application system operating system communication D
project model pilot project process D
multiprocessing multithreading multiplexing multitasking D

mainframes super computers micro computers none of the above A


arithmetic and central
control unit logic unit processing
non impact unit none of the above B
band printer drum printer printer none of the above C
data electronic
management word processing spreadsheet none of the above B
integrated communication
software software idea processor none of the above B
Microsoft
my computer recycle bin exchange none of the above B
field file record none of the above C
assembly machine high level
language language language none of the above B
terminator processed
symbol symbol connector symbol input/output symbol B
hp vectra fazitsu vp200
PC-at system series IBM-PC B
multiprocessing multithreading multiplexing none of the above D

"dumb terminals" dumb servers dummy terminals dummy servers A


distributed
computing
wan system windows NT LAN D
host server back end front end D
host server back end front end C
distributed
PC LAN computing centralized A
server processing host processing dumb processing data processing B
four one
hierarchical two many A
file management database network relational database
system system database system system D

multiprocessing multithreading multiplexing none of the above B


disk
repairing redo logging defragmentation disk mirroring D
Modulation/Dem Module/De-
Code/De-code odulation module None of the above B

fixes locks constraints traps B


multiprocessing multithreading multiplexing none of the above B
Linear area Local area Local array of
networks networks networks. None of the above B
task process thread client-server C
Integrated Integrated Integrated
system dynamic Symbolic Digital Services Digital
networks. networks. network. None of the above. C
Ethernet Internet ARPANET None of the above. B
visual basic power builder SQL * plus all of the above D
MAN WAN GAN None of the above. B
Transfer Transmission
Transfer control communication control
protocol/Internet protocol/Internet protocol/Internet
protocol protocol protocol None of the above. C
Cells Bits Packets None of the above. C
System Software Mail
modulation transmission Simple Mail
transfer protocol protocol transfer protocol None of the above. C
Transmission
Transfer Protocol protocol Hyper text None of the above. C
Aggregate Asynchronous Area transfer
transfer mode transfer mode mode None of the above. B

File server Printer server Receiver None of the above. B


platform configuration package system A
MAN and WAN LAN and WAN LAN and MAN LAN WAN and MAN B
ISDN ATM Internet Intranet A
Integrated
Internal Services Internal Services Services Digital
Digital Network Design Network Network None of the above. C
Web based Web based Web based Web based
Training Technology Transport Transaction A
Bridges Routers Protocol Repeaters B
procedure batch command program D
alpha numeric alpha beta numerous alpha number and alpha A
space occupied, cost, size,
price, no. of users performance performance, input, output,
allowed their ratio cost performance ratios C
mini computers microprocessors PCs mainframes D
input output feed write A
multiprocessing multithreading multiplexing multitasking D
interpreter compiler converter process D
input processor ram output D
non-impact
impact printers drum printers desktop printers thermal printers C
control program,
operating system, interpreter, monitor,
bootstrap, kernel, assembler, program, CPU, memory, input,
shell compiler keyboard, bus output D
application
operating system software windows 95 interpreter B

batch protocols software's procedures C


processor compiler assembler coder B
compiler interpreter assembler processor C

You might also like