q_id

q_desc

DB62

In MS-Access, while using form design view, for creating a command button for adding
a new record, we should select the _______ category from the command button
wizard

DB63

_______ form displays fields in a single horizontal row

DB64
DB65

The process of arranging the data in a meaningful order is known as ___________
______ are used to select only some particular records from the table or any other
database objects

DB66
DB67
DB68

In MS-Access, user may specify criteria for filter in form view using _________
___wildcard character represents any single character
Records cannot be sorted by a primary key

DB69
DB70

A control without a data source is known as ___________
Set of related option buttons, check boxes and toggle buttons is known as
_____________

DB71

The collection of related data and objects is called a ____________

DB72
DB73
DB74

Which of the following is control types ____________
In MS-Access, the function that gives the current date is _____________
_____is a control that lists set of data

DB75

______is a form that summarize large amount of data

DB76

______allows to create a filter by typing the value in a data sheet

DB77

Wizards for toolbox controls are called a __________
The wild card representation for any 5 letter word that starts with ram is
________________
Look up fields slow up data entry
____is an access object that displays un-editable data

DB78
DB79
DB80
DB81
DB82
DB83
DB84
DB85
DB86
DB87
DB88

_____option from the new object toolbar gives the easiest way of generating a report
______ represents data in a pictorial format
Changes of one table can be carried over to another related table
Hyperlinks are used to jump to any kind of information or data from a file
The memo field can have text upto_____ characters in length
In MS-Access, columnar layout can be used to view multiple records in a form
In MS-Access, alter command may be used in adding a primary key to a table
Update query is used to add records from one or more tables to the end of an existing
table

DB89
DB90
DB91
DB92

In ms-access, datasheet view is available in ___________
______are used to jump to any kind of information from a datasheet or a form
Home page will always be present as a first page of an application
Make table queries create a new table from the records of another table

DB93

In ms-access, to protect a database file from illegal access, we may set database
password. The option of setting database password is available in _______ menu

DB94
DB95

Foreign key is a field that uniquely identifies each record and accept no null values
Data definition queries are used to create or change database objects

DB96
DB97
DB98
DB99

The attributes of a composite key are known as ________
OLE object is a data type in access
Data displayed in forms cannot be edited
A sub form is used to display one to many relationship between tables

DB100
DB101
DB102
DB103
DB104
DB105
DB106

We can switch from datasheet view to form view by selecting view -> form view option
In MS-Access long integer is a datatype
In MS-Access, while designing a table for a particular field, the Required parameter is
set to yes. This validates the field as _______
Sorting is applied to select only some particular records
Filter by form can be created from a forms shortcut menu
Advanced filter uses a filter similar to the query design window to create a filter
? Wildcard character represents any number of characters

DB107
DB108
DB109
DB110

_________ of the following is/are a type of chart
A bound control is tied to a underlying query or table
A calculated control uses expression as a source of data
Text boxes cannot be bound controls

DB111
DB112
DB113
DB114
DB115
DB116
DB117
DB118
DB119
DB120
DB121
DB122

The default query invoked by ms-access is
A control can be bind to a record using row source property
List box is a control that offers a list of choices
If a table is joined to itself it is called a ________________
A picture box combines the activities of both a text box or a list box
Line is a tool box control
Text boxes can be part of a option group
_____ chart exists as a separate object
Filtering data is a way of arranging data in a meaning full order
Wild card characters are used for sorting records
Pivot tables are used to navigate to the other tables in a database
Reports are used to represent un-editable data

DB123
DB124
DB125
DB126
DB127
DB128
DB129

In MS -Access, the records in a table are sorted based on _________
Relationship is an association between _________
Summary options dialog box is used to summarize data
______ queries can be used to delete a group of records that meet some specific
records
Charts can convert numerical data in a easily understandable format
Embedded charts exist separately
The chart which cannot exists as a separate entity are _______________

DB130

From ms - access, if we want to view the records stored in a table in ms - excel
worksheet, we need to

DB131
DB132
DB133
DB134
DB135

Page header is present at the beginning of each record
Detail section has a header and footer
A macro is performed only when the user initiates an event
The macro is selected from the action field of a macro sheet
A macro can be made to execute before the starting of a database

DB1
DB2

_________ data type is generally used for fields assigned as primary keys in a table
MS access objects can be published in the web

DB3
DB4

In code-builder, got_focuse, click,dbl_click,enter are examples of _______
_______can be used to automate certain actions in response to events

DB5

In the macro sheet the macro is selected in the _____field

DB6

To build complex expressions_____is used

DB7

The three list boxes present at the bottom of the expression builder are called_____

DB8
DB9
DB10
DB11

________option is selected from the view menu to create macros with conditions
_______report can be created with minimum user input
_______layout of a form displays one record at a time
The table or query name on which we are going to build our report is selected from the
____ dialogue box

DB12
DB13
DB14

______and_____are the two types of auto reports available
There are no wizards for creating a database in access
______option from the insert menu option is chosen to add an embedded chart

DB15

In ms-access, while using SQL, references constraint is used for creating _______

DB16

_______is used to create a mailing label

DB17

______header is present at the beginning of the report

DB18

______is present at the bottom of each page in a report

DB19
DB20
DB21

In SQL, having clause is used for _________
______field is added to the macro sheet when we select grouping option from the
view menu
______can be used to create toolbars

DB22

_______query is used to add records from one or more tables into an existing table

DB23
DB24

_______window is used to write VB code in access application
Values for other tables, queries are maintained in look up fields data type

DB25

Visual Basic language is a _____ tool

DB26
DB27

______ function is used to display a message box
Other ms-office applications can be accessed from ms-access using a concept called
________

DB28

OLE stands for_____

DB29
DB30
DB31

The application that supplies data in OLE is called an _________
If any change made on the object from the client side is reflected on the server then
the object is said to be _____
_______is the file format that works on internet

DB32

______ is used to convert any ms-access object into html format

DB33

_______ option in publish to web wizard produces a page that is static in nature

DB34
DB35

_______query is used to create or change database objects in a current database
Currency fields express the amount in _________

DB36

_______is selected from the toolbar to add an OLE object
To display an OLE object in the form of an icon ____ option is selected from insert
object dialogue box

DB37
DB38

DB40
DB41

_______option from the file menu is selected to run 'publish to the web wizard'
_____page in an web application is used to navigate to the rest of the pages in the
application
______ is fired when an event is triggered is the concept based on a Visual Basic
language
Ms access is a ___________

DB42

A collection of data stored in different objects is known as a _________

DB43
DB44

A blank database can be created using __________
Text type data can be of _____ characters in ACCESS

DB45
DB46

______is a datatype that assigns values automatically
Tables cannot be imported from other databases

DB47

If two tables having same values for the fields are joined it is called an ______

DB48

Duplication of records in a field won't be allowed if the fields are declared a________

DB49

Changes from a master table can be reflected on to the child table by selecting
_____option

DB50

To see more than one record at a time in a form we use _______

DB39

DB51
DB52

In SQL, delete command is used to remove _________
In MS-Access, filter excluding selection will display only those record(s) which meet
the criteria.

DB53

Properties of the fields are managed by _____ in Dynaset

DB54
DB55
DB56
DB57

______queries allows us to view data in row by column manner
The type of queries that can update or delete record(s) in a table(s) are called
__________
Joining tables without any matching values in the fields is called ____________
Primary key uniquely identifies each record

DB58
DB59

Which of the following dialog box is/are used in the creation of form ________
_______ query wizards are used to generate summary calculations for a table

DB60
DB61

Properties of a form can be changed by selecting ______from view menu options
Forms that are included in other forms are called ______________
In MS-Access. While appending records, the source and the target table must have
similar structure and fields
We can add our own functions to the expression elements list box of the expression
builder
_______is the wildcard character which represents the presence of any number of
characters
Macros can be used to add a menu to a database object
_____ header is a unique feature of reports
Chart can either be a form or a report
Group header will be present at the design view of a report even if the report is not
grouped
We can change from the design view to the form view without being prompted for
saving the changes made
Charts can be produced without the wizard
Macros can be used to create user defined error messages
Between and Not Between is ______ type of operators
The default data type of VB is integer

DB136
DB137
DB138
DB139
DB140
DB141
DB142
DB143
DB144
DB145
DB146
DB147

DB148
DB149
DB150
DB151

Visual Basic is based on __________
_______is the name of the database object that displays data and can be used to edit
data
In access OLE objects cannot be linked
_____ section is present for each record in the report

DB152
DB153
DB154

A ________ sheet lists all the properties that pertain to the form or the controls
Textboxes can also be an example of unbound control
In MS-Access, we may design command buttons for navigating records

DB155
DB156

_______are forms that are included in other forms
_______ are used to represent our data in graphical format

DB157

A field with a _______ uniquely identifies each record

DB158

Large amount of data can be summarized using ______ tables

DB159

_______ are employed to select only some particular records from a database object

DB160
DB161
DB162

______ control need not have a data source
______ control combines the functionality of both a text box and a drop down list
MS access is a DBMS

DB163

A form can be bind to a record source using _____ property of the form

DB164

______ forms displays field in single row

DB165

______ forms are usually used for tables with one to many relationship

DB166
DB167

_______ control uses an expression as a source of control
_______ control is tied to field

DB168

_______is the form that can be created with minimum input from the user

DB169

______option from the tool menu is selected for setting relationships between tables

DB170

______,______and_____are the buttons belonging to the options group

DB171

_________allows us to create a filter from a field short cut menu

DB172
DB173

________is a database object which displays data but cannot be used to edit data
What term applies to a collection of related records in a database?

DB174

All of the following terms are related to computerized databases except which one?

DB175

What is a database?

DB176

What does a record contain?

DB177

An RDBMS is a

DB178

Data Warehousing refers to

DB179

Unauthorised alteration of on-line records can be prevented by employing

DB180

What is a database?

DB181

What does a record contain?

DB182

What is a report?

DB183

What is the best way to analyse and change data

DB184

What are some popular office orientated software applications?

DB185

Which of the following constraints can be used to enforce the uniqueness of rows in a
table?

DB186

Which of the following commands is used to change the structure of table?

DB187

An RDBMS is a

DB188

Data Warehousing refers to

DB189

You are creating a client application that calls ActiveX DLLs. Which of the following
properties of the Err object provides the name of a component that sends an error
back to the client application?

DB190
DB191

This database holds personal information. The user can help to keep it confidential by
If the database holds customer names and addresses, personalised letters can be
created automatically using

DB192
DB193
DB194

Application software suited to storing the survey information obtained in the table
would be
The characters * and ? are sometimes used in search criteria as
Which of the following field types will generate the primary key automatically?

DB195

Referential integrity ensures that the:

DB196

Tables are related to one another through a:

DB197

A foreign key is:

DB198
DB199

You are creating a banking database to track customer loans. The bank will, of course,
have many customers, each of whom may take out one or more loans, while each
loan may be associated with only one customer (there are no joint accounts). What is
the re
In a one-to-many relationship between Companies and Employees, which field is
found in both tables?

DB200

Which of the following ensures that records in related tables are consistent with one
another? For example, it ensures that you cannot add a record with an invalid foreign
key.

DB201

How would you delete a relationship between tables in the Relationships window?

DB202

In a Customers tables, what does a plus sign next to the CustomerID field mean?

DB203

What is required of the fields that join two tables?

DB204

Assume a one-to-many relationship between the Customers table and the Loans
table, with referential integrity in effect. What happens when you attempt to delete a
customer ID from the Customer table that still has entries in the Loans table?

DB205

Which of the following is true when viewing a main form and its associated subform in
the Form Design view?

DB207

Which of the following relationships does not belong in a database based on a
professional sports league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the “many”
side of a one-to-many relationship?

DB208

You have created a one-to-many relationship with referential integrity between a
Customers table and a Loans table. From which table can you delete a record?

DB209

The correct order of the arguments for the MsgBox statement is:

DB210

The first statement in a procedure named CreateList is:

DB211

Which of the following is TRUE related to form fields?

DB206

DB212

A text field:

DB213

The purpose of a database is to:

DB214
DB215

A database stores:
A database records:

DB216

A sales contact manager used by a salesperson is an example of _______________

DB217

A Customer Resource Management (CRM) system is an example of_________

DB218

The industry standard supported by all major DBMSs that allows tables to be joined
together is called __________.

DB219
DB220

A program whose job is to create, process and administer databases is called the
_____
Microsoft Access may use which of the following DBMS engines?

DB221

Which of the following are basic components of an enterprise-class database system?

DB222

In an enterprise-class database system ________ .

DB223

In an enterprise-class database system, the database application ___ .

DB224

In an enterprise-class database system, reports are created by
____________________ .

DB225

A database is considered "self-describing" because _______ .

DB226

In an enterprise-class database system, the database _________ .

DB227

A database may contain _________________________ .

DB228

A database designed using spreadsheets from the Sales department is a database
being designed _________________________ .

DB229

A database designed to implement requirements for a reporting application needed by
the Sales department is a database being designed _______ .

DB230

A database designed to combine two databases used by the Sales department is a
database being designed _________________________ .

DB231

Database professionals use ________________ as specific data sources for studies
and analyses.

DB232

Database professionals use a set of principles called ________________ to guide
and assess database design.

DB233

A very popular development technique used by database professionals for database
design is known as _______________________ .

DB234

A very popular development technique used by database professionals to adopt a
database design to new or changing requirement is known as _____ .

DB235

The predecessor(s) of database processing was (were) __________ .

DB236
DB237

In a relation __________________________ .
An attribute is also known as a(n)

DB238

A combination of one or more columns used to identify particular rows in a is___ .
A combination of two or more columns used to identify particular rows in a relation
is________ .

DB239
DB240

.

DB242

A determinant that determines all the other columns in a relation is______ .
When designing a database, one of the candidate keys in a relation is selected as the
_________ .
Normalization is a process used to deal with which of the following modification
anomalies?

DB243

When you are given a set of tables and asked to create a database to store their data,
the first step is to ____ .

DB241

but the only sales figure available is the total sale value for each order. we find 10 that still use an older area code of 567. DB245 Which of the following are true about data mining applications? DB246 We have obtained access to the company's operational data. This is example of_____ DB248 DB249 A data warehouse database differs from an operational database because: Which of the following objects is used to display a menu? DB250 Which of the following objects are NOT found in an Access application? DB251 You are developing an Access application that you expect to upgrade periodically. Which of the following statements is TRUE? . Of these 50 records. We examine 50 records for customers with phone numbers that should use the current area code of 345. This is an example DB247 We have obtained access to the company's operational data. We have been asked to produce a report with an item by item analysis of sales.DB244 Modern microcomputer personal DBMS products______.

DB252 DB253 Which of the following statements regarding Access applications is NOT true? Which of the following brings a copy of the table into the current database and does not maintain a tie to the original table? DB254 What makes a database an application? DB255 What is the Access tool that is used to create the user interface? DB256 The purpose of a data warehouse is to: .

000 form report all of the above hyperlink A C C B A C C B B A A A A A D B A B D D A A .000 64.000 true true report label false false 255 false false true false table table true true query form false false gateways None of the filter by menu above @ ? data less control controls group controlled DATE() combo box B C A A D B B record group none of the above all of the above DAY() static text B main form none of the filter by form above table B data control tabular form option control wizard two of the above ans tool wizard none of the above module bitmap ledger none of the above report 25.op1 op2 op3 op4 Record Navigation columnar form Record Operations Form Operations hierarchical tabular form form None of the above one to many form filtering ordering querying filter sorting sorts filter by filter by form selection * $ true false unbound bound control control option button group group pipes database collection form bound unbound CURRDATE() TODAY() text box list box columnar pivot table form data sheet filter filter by input control button wizard wizard ram* true report ram?? false form autoreport chart true true 60.

Insert Records false false composite alternate keys keys true false true false true false Tools none of the above true true B A candidate keys primary key true true false false null true true true true not null false false false false pie true true true bar false false false update query true true inner join true true true freestanding true true true true the first field of the table forms true select query false false outer join false false false embedded false false false false the last field of the table reports false delete query delete true true freestanding insert false false embedded append add stand alone sub chart use hyperlink use import C C A B A A B zero none of the above none of the both 1 and 2 above self join stand alone primary key field attributes B B B A B C A A B append query B B A table join C B A B sub chart D B B B A none of the above C entities D A use datasheet in forms use export A A B B D .

true
true
true
true
true

false
false
false
false
false

integer
true

number
false

actions
report

events
form
expression
elements

macro
calculator

B
B
B
A
A
primary
number

procedures
chart

comments
expression
code builder builder
expression
elements list
box

action list

macro list

conditions
tabular
tabular

action
columnar
columnar

create report
columnar and
tabular
true
create fields

link report
stable and
unstable
false
add chart

primary key

alternate key foreign key

label wizard

chart wizard

start header

group header page header

report footer

page footer

insert
auto report
datasheet
embedded
report
dynamic and
static
chart

mail wizard

group footer

auto number D
A
none of the
above
B
macros
D
action
expression
elements
none of the
above
none of the
above
embedded
justified
new report
none of the
above
insert chart
none of the
above
none of the
above

C

C
A
C
B
D
A
B
C
C
A

report header D
none of the
above
B

for ordering
records

for updating
records

condition
VB Modules

group
reports

for specifying
conditions
with group by none of the
clause
above
none of the
macro names above
forms
macros

add

append

insert

report
true

macro sheet module
false

RAD

RAP

RAID

D

delete
none of the
above
none of the
above

C

B

C
D

C
A
A

none of the
above
none of the
above

SysCmd

MsgBox

message

OLE

DDE

CME

object linking
and
embedding

on line
execution

none of the
on line editing above

OLE object

OLE client

OLE server

linked
exe

embedded
DLL

connected
BMP

form wizard

report wizard query wizard

static file

static html

append
dollars
unbound
object
display as
icon

add
rupees

display

link

create html

new

save as html

startup

home

end

bullet
DBMS

command
RDBMS
data
collection

data group
new dialog
box
255
automatic
number
true
inner join
primary key

A

A

OLE
communicato
r
C
edited
html
publish to
web wizard
none of the
above
data
definition
yen

A
D

list box

B
A

procedure
front end

create icon
none of the
above
none of the
above
none of the
above
language

database

data storage

C

dynamic file

insert
pesos
command
bound object button

new blank
database
dialog box
64000

new database database
dialog box
dialog box
235
63500
automatic
AutoNumber number
field
false
none of the
outer join
explicit join
above
no duplicate
not null
candidate key key

cascade
cascade
change
delete related related
records
records

cascade
update
related fields

columnar

both a and b

tabular

B

change all
related
records
none of the
above

D
B
D
A

C
B
C
A

A
A
B
B
A
A

C
B

query or
table or tables queries
true

record or
records

none of the
above

false

property field
crosstab
queries

field property
row/column
queries
row/column
action queries queries
inner join
self join
true
false
new form
form create
dialog box
dialog box
summary
sum
change
properties
properties
included form sub form

C
B

Dynaset field
properties
properties
update
select queries queries
change/delete update
queries
queries
no match join outer join
form wizard
dialog
append
form
properties
new form

both 1 and 3
simple
new
properties
child form

B
A
A
D
A
D
D
B
B

true

false

A

true

false

A

&
true
page
true

#
false
detail
false

true

false

B

true
true
true
relational
true

false
false
false
list
false

A
B
A
C
B

action
language

structured
query
language

report
true
group

?

*

group

topic

range

logical

event procedural
based
language

none of the
above

form
false
record

query

table

session

data
true
true

property
false
false

both a and b

detail
none of the
above

sub forms
graphs

child forms
chart

inner form
labels

none of the
above
report

D
A
C
A

C
B
B
D
B
A
A
A
B

number

primary key

index

pivot

create

form

filters

queries

sorts

form
list box
true

bound
combo box
false

form name

control

tabular form

chart form

sub forms

tabular form

calculated
calculated

bound
unbound

sub form

auto form

set relation

connect

identifier
none of the
above

B
A

forms
A
none of the
unbound
above
C
button
option button B
A
none of the
record source above
C
data sheet
none of the
form
above
A
columnar
none of the
form
above
A
none of the
unbound
above
A
bound
static
C
columnar
tabular form form
B
none of the
relationships above
C

command
option, toggle button, check
and command and list
buttons
boxes
filter by
filter by form report

list, check
and combo
boxes
filter by
record

option button,
toggle button
and check
boxes
D

form
clipboard

report
file

macro
field

table
layout

B
B

search

sort

field names

record grab

D

A way to
analyse and
manipulate
numerical
information

A tool to
produce high
quality
documents

An organised
way of storing
information
A way of
about a set of maintaining a
similar things log
C

filter by input D

It contains all
the data
about one
specific item
relative
remote DBMS DBMS

A document
which
contains text
Relational
DBMS

A collection of
files
B
Reliable
DBMS
C

storing data
offline at a
separate site

is related to
data mining

uses tape as
opposed to
disk
C

Information
about certain
programs

backing up
data
regularly

Key
verification

Computer
sequence
checks

Computer
matching

Database
access
controls

A way to
analyse and
manipulate
numerical
information

A tool to
produce high
qualitydocum
ents

An organised
way of storing
information
about a set of None of the
similar things above

Information
about certain
programs

It contains all
the data
A document
about one
which
specific item contains text

Reports allow
users to
extract
information as
hard copy
(printed
output)

Reports
provide a
very flexible
way of
creating and
editing
documents

D

C

None of the
above

B

A tool which
allows text
and graphics
to be placed None of the
in documents above

A

Spreadsheet
Extracting and s make data
analysing
easy to
None of the
data
analyse
Using queries above

C

Word
processors,
spreadsheets,
databases,
None of the
DTP
above

C

Compilers,
interpreters,
editors

Network
software,
backup
systems

DEFAULT and
NOT NULL
constraints
CHANGE
TABLE

FOREIGN
KEY
constraints
MODIFY
TABLE
relative
remote DBMS DBMS

PRIMARY
KEY and
UNIQUE
constraints
ALTER
TABLE
Relational
DBMS

IDENTITY
columns
UPDATE
TABLE
Reliable
DBMS

C
C
C

storing data
offline at a
separate site

backing up
data
regularly

is related to
data mining

uses tape as
opposed to
disk
C

Number

Description

Component

Source

using a
password
the product
code

keeping the
keeping a
original paper
backup copy copy
the primary
mail merge
key

D

saving the file
with different
filenames
A
e-mail

C

A database
bookmarks
Auto Primary

Graphics
operators
Auto ID

browser
wildcards
AutoNumber

e-mail
engines
Auto Key

A
C
C

records in a
dynaset are
consistent
with the
underlying
tables.

related
tables in a
database are
consistent
with one
another.

forms in a
database are
consistent
with the
underlying
tables or
queries.

reports are
consistent
with the
underlying
tables or
queries.

B

foreign key.

main form
and a
subform.

query and its
associated
dynaset.

report and its
related query. A

the primary
the primary a field from
key of both
key of the
an unrelated
related tables. related table. table.

not a primary
key of either
related table. B

EmployeeID

Many-toOne-to-many many
Many-to-one B
EmployeeLas CompanyAdd
CompanyID tName
ress
A

The Tools
menu,
Relationship
window

Referential
integrity

The join line

The one-tomany
relationship

Double click
the
Relationship
line

Right-click
the
Relationship
line, then
select Delete
from the
shortcut
menu

Select Undo
in the
Relationships
pull-down
menu

Click the
Delete
Relationships
button on the
toolbar
B

That there are
several
customers
That some of That there are
associated
the data is
records in a
with that ID
not viewable related table

That records
can be added
by clicking on
the plus sign C

One-to-one

They must
both be
numbers

They cannot
be
They cannot AutoNumber
be text fields data types

B

They must be
the same
data type
D

Nothing,
Access
ignores the
attempted
command.

The
customer’s ID
is deleted
from the
Customers
The
table, and all
customer’s
the related
ID is deleted loans are
from the
deleted from An error
Customers
the Loans
message is
table.
table.
displayed.

The subform
is not visible.

The subform
is an object
on the form
The subform
and can be
is displayed The subform moved or
in Datasheet is displayed in sized like any
view.
Form view.
other object. D

A one-tomany
relationship
between
teams and
players

A one-tomany
relationship
between
teams and
coaches

A one-tomany
relationship
between
coaches and
teams

A many-tomany
relationship
between
players and
teams

C

#

M

¥

*

C

The Loans
table at any
time

Neither table C

The
Customers
table only
when there
are Loan
records
associated
Either table at with that
any time
customer

D

prompt, title
bar text, icon.
Dim
CreateList.

prompt, icon, title bar text, title bar text,
title bar text. prompt, icon. icon, prompt. B
Sub
CreateList.
CreateList.
Sub.
B

A check box
enables the
form user to
choose from
one of several
existing
entries.

A text field
enables the
form user to
choose from
one of
several
existing
entries.

A drop-down
list enables
the user to
choose from
one of several
existing
entries.

A drop-down
list enables
the user to
enter text.

C

must be set
must be set
for multiple
for one word. words.

does not have must be set
to be set.
for two words. C

data.
facts.

maintain data
on different
create tables things in
store data in of rows and
different
tables.
columns.
tables.
A
all of the
relationships. metadata.
above
D
figures.
information. a and b
D

single-user
database
application

multiuser
database
application

e-commerce
database
application

a or b

A

single-user
database
application

multiuser
database
application

e-commerce
database
application

None of
above

B

Sequential
Query
Language
(SQL)

Structured
Question
Language
(SQL)

Structured
Query
Language
(SQL)

Relational
Question
Language
(RQL)

C

Database
Modeling
System
Jet

Database
Management
System
SQL Server

Data
Business
Model
System
Oracle

Relational
Model
Manager
a and b

B
D

The user

The
database
application

The database
management
system
All of the
(DBMS)
above.

the database
application(s)
interact(s)
with the
DBMS
creates
queries

the DBMS
accesses the
database
None of
data
above
creates
creates form reports

the user

the database
management
the database system
application
(DBMS)
the database B

all the users'
data is in one
place
holds user
data

it reduces
data
duplication
holds
metadata

tables

metadata

help people
keep track of
things.

D

All of above

A

b and c

D

it contains a
description of
its own
All of the
structure
above.
All of the
holds indexes above.
stored
All of the
procedures
above.

C
D
D

as a new
systems
as a redesign
development of an existing
project
database
a and b

A

as a new
from existing systems
as a redesign
non-database development of an existing
data
project
database
a and b

B

as a new
systems
as a redesign
development of an existing
project
database
a and b

C

from existing
data

from existing
data

data marts

data marts

data marts

normalization data models

entityrelationship
data
modeling

A

normalization data models

entityrelationship
data
modeling

B

normalization data models

entityrelationship
data
modeling

D

entityrelationship
data marts
normalization data modeling
hierarchical network
file managers models
models

data
migration
relational
data model

entities in a
column vary
as to kind
table

the order of
the columns
is important
relation

the order of
the rows is
unimportant
row

more than
one column
can use the
same name
field

C
D

record

field

tuple

C

record

field

key
composite
key

foreign key

C

record

field

foreign key

candidate key D

composite key primary key
Insertion
Update
anomaly
anomaly

foreign key
Deletion
anomaly

surrogate key B

assess the
existing
tables'
design the
structure and database
content
structure

create one or move the
more new
data into the
tables
new database A

All of above

D
A

D

are supplied
by several
wellestablished
manufacturer
s

were
essentially
killed off by
MS Access

are not true
have poor
DBMS
response time products

B

Their report
delivery is
more difficult
They use
than report
sophisticated delivery for
mathematical reporting
Nonintegrated None of the
techniques.
systems.
data
above

A

dirty data

inconsistent
data

a "wrong
nonintegrated format"
data
problem

B

dirty data

inconsistent
data

a "wrong
nonintegrated format"
data
problem

D

data
warehouse
data are not
stored in
tables.
Form
Forms and
reports

data
warehouse
databases
do not have
metadata.
Table
Queries and
tables

data
warehouse
data are often
denormalized. b and c
Report
Query

C
A

Macros

Spreadsheets D

Regardless of
how the
It will be
objects and
easier for the
tables are
It will be
user to
stored, the
easier for the upgrade it if
user will have
user to
the objects
It is advisable to reenter the
upgrade it if
are in one
to put each
data in the
the objects
database
object and
tables when
and tables are and the
table into a
the
in one
tables in
separate
application is
database.
another.
database.
upgraded.
B

The Link
Tables
command can
be used to
associate the
tables in one
database with
the objects in
another
database.

An
application
may consist
of multiple
databases,
each with
multiple
objects,
linked to yet
another
database
containing
only tables.

All objects in
an
application,
including the
tables, must
reside within
the same
database.

An
application
can be
created in
such a way
that it objects
such as
forms and
reports can
be changed
without
disturbing the
existing data. C

Import

Link

Merge

Join

A

It contains
more than
one table

It contains
tables,
reports,
queries, and
forms

It contains a
user
interface, or
switchboard

It contains
macros

C

Interface
Design
Wizard

Switchboard
Manager

D

store all
corporate
transaction
data in one
single
location.

C

Menu Wizard Build Menu

create
backups for
mission
critical
corporate
data.

put key
business
information
centralize the into the hands
manageabilit or more
y of data
decision
collection.
makers.

q_id CA1 CA2 q_desc Using generalized audit software packages can add a lot of value _______ _______ is used for CAAT as database op1 to an audit department's products & services Oracle CA4 Generalized audit software perform auditors to undertake any past records and not concurrent auditing True Generalized audit software is a file whose capabilities for verifying processing is logic True CA5 CAAT's are computer program and data that auditor uses as part of the audit procedures to process data if audit significance contained in an entity information system True CA6 CAAT do not contains package programs. purpose written program. utility programs or system management programs yes CA7 Embedded audit routines are sometimes built into an entity's computer system to provide data for later user by the auditor true CA8 SCARF involves embedding audit software modules within an application system to provide continuous monitoring true CA9 Concurrent use auditors as the member of the system true CA10 true CA11 Regular cross system verification may minimize frauds Computer security is frequently associated with confidentiality. integrity and authentication CA12 Data reserve engineering process metadata to document system and abstract business rules and relationship CA3 CA13 true true to determine the audit objective can bring the data directly CA16 The first step for developing CAAT is_________ Using the open database connectivity feature in ACL is ______________ Computer Assisted Audited Technique involves the use of computers through "Black Box Approach" True White Box Approach necessary involves expert knowledge on the part of Auditor True CA17 The transition from manual system to CIS environment bring dramatic changes including ________________ CA14 CA15 CA18 CA19 change in the method of recording accounting transaction documents driven Auditing with computer necessarily supports the approach hardware and software CAAT involves an Auditors' appreciation of __________ configuration .

implementation and documentation of new systems software and system software modification true A system could be _________ natural/man-made A system exhibits 'entropy' true CA28 CA29 Super computer are the largest and fastest and is very suitable for commercial application including audit work true Assembler language uses Mnemonic symbols true CA20 the of by all concerned CA33 Operating systems are devised to optimize the machine capabilities. testing. apart from others. the function include_______________ General purpose software provides a framework for highly complex scientific operation In batch processing.CA21 Widespread end use computing result in unlimited errors creeping into system going to accept handling. transactions are processed one after another The use of computer assisted audit techniques is not gaining popularity not only ________________ CA34 On-line processing refers to grouping of transaction and processing the same in one go from start to finish true CA30 CA31 CA32 CA35 CA36 CA37 CA38 CA39 CA40 scheduled jobs true true with audit departments Real time refers to the technique of updating files with transaction data immediately after the occurrence of the event to which it relates true In OLRT the CPU should process the capability of program interruption true Time sharing system allow access to a CPU from remote terminals true DSS is defined as a system that provides tools to managers to assist them in solving structured problems true DSS has the following components _________________ databases Master files contains current records for identification and summarizing true . thereby increasing audit risks true For computerized auditing usage of sophisticated audit software would be a necessity true CA22 the source of data Important knowledge needed to begin planning the use available to the audit of CAAT is _________ organization CA23 The move towards paperless EDI would eliminate much of the traditional audit trail. include authorization. radically changing the nature of audit evidence true CA24 Computer operation controls are designed to provide ________________ CA25 CA26 CA27 Systems development control. approval.

or alphabets to entities 1 valid. the master file associated with a transaction may be searched for confirming data true Controls are required for authorization to ensure data true integrity and detect possible breaches in security .2. transaction true With OLRT where interactive data entry is available. numeric grouping. being 1.CA41 CA42 CA43 CA44 CA45 CA46 CA47 CA48 CA49 CA50 CA51 CA52 CA53 CA54 Transaction files contain relatively permanent records take product profile. customer profile.3 etc Check digit is a group of nos. employee profile etc Master file configuration includes ____________ ______ is a file management software package that lets users and programmers organize data into files and then process those files CAATS provide added value to the clients because _______________ File volatility refers to the number of addition and deletions to the file in a given period of time Controls are present over many aspects of the computer system and its surrounding social environment In framed checking the data entry is checked against an expected picture or format Errors are correlated_________ Field check is exclusive to a field CA57 Hierarchical code means _________ CA59 CA60 CA61 CA62 CA63 true RDBMS is structured to a series of 2 dimensional tables true seriously affected SADB stands for ____________ database CA56 CA58 filex to have a complete picture of a system File activity is the proportion of transaction file records that are actually used and accessed in a given processing run: true File interrogation refers to the _____ of information from a file back-ups One -to-one relationship means a single entity to a single entity in a monogamous structure true _________ law basically states that there is a specific probability of the first digit of a no. added to a code for determining the accuracy of other digits in the code CA55 true reference files The validation checks applied to a field depend on the field's logical inter relationships with other fields in the record The contents of a field could determine _______ sign for a ______ field Batch is the process of ______ together _____ that bear some type of relationship to one another Hash totals means meaningless totals true true at the year end true Benfish true consecutive nos.

the update program should maintain a correlation account to record such transaction that does not have a matching master file record true CA70 Internal tables are stored tables from which certain values are extracted for further processing and storing true CA66 CA67 incremental design and enlarge activity true true CA73 For small to medium sized systems.CA64 CA65 Data from client application are not stored in the organization's database through auditables events and function All input records in a batch are normally of different types true true CA68 IDEA stands for _________________________________ A transaction file is sorted prior to the update of master file A sequence check on the transaction or master files by an update program is not required CA69 Whenever monetary transactions are processed against master files. real true . master CA76 Database analyzer is a software which provides detailed information concerning the operation of the database CA71 CA72 CA77 CA78 CA79 CA80 CA81 CA82 CA83 SAS stands for ______________ Embedded code is a software used by the auditor to examine backup data Embedded code performs wide variety of audit task Core image comparison is particularly useful where only executable versions are distributed Log analysis is a software used by auditor to detect virus On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a specific program or sever edit test is doing its work Mapping software is used by the auditor to list unused program instructions true system analysis software true yes true true manipulates. test involves_________________ bottom up tests Recording transactions in a controlled manner may amount to loss of stored data yes CA74 Audit software is used by the auditor to _________ read data on client's file CA75 Core image comparison is a software used by the auditor to compare _______ version of a program with a secure ________ copy executables. individual modules are coded and individually tested and then assembled to be tested as a whole-the testing strategy is referred to as ___________________ e-brain In systems testing.

CA84 CA85 CA86 CA87 CA88 CA89 CA90 CA91 CA92 Mapping software has very objectives yes Modeling is a variety of software which ________________ On line testing can be targeted for specific functions carried out by programs can be very powerful analytical tool Program code analysis involves _____________ __________ is a software of CAAT Snapshot is software which takes a picture of a file or data or a transaction passing though the system Base case system evaluation includes____________ While base testing forces on finding if there are any defective execution policies in a program Black box testing seeks to determine whether application output is what it is supposed to be yes provides detailed information of machine uses IDEA true fictitious data applied against the client program true true CA94 In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently eliminated from the computer files Black box testing is _______ based and white box testing is _______ based CA95 Source code review means__________ CA96 In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine how the defects may impact the attainment of the program objectives true CA93 CA97 CA98 CA99 CA100 CA101 CA102 true specification. intrusion detection system might monitor the amount of processor time consumed by the user to detect unusual deviation from the amount processor time requested by the user in the past true A sample size calculator program assists auditors in determining RAND() function true . program identifying erroneous code All material application oriented events that occur within the boundary subsystem should be recorded in the accounting audit trail true In examination of audit trail the following data associated with an event may be ___________start and finish time JCL means_________________ Audit should be periodically analyzed to detect any control weakness of the system job control language yes In an accounting audit trail.

CA103 Generalized audit software consists ___________ CA104 Specializes audit program may be___________ Generalised audit software could be used by the following in consistencies or significant fluctuations Generalized audit software function include____________ CA105 CA106 CA108 In the file reorganization merging capabilities are needed in data from separate file is to be combined on a separate work file Auditors cannot use generalised audit software to extract the data needed for audit purpose CA109 Auditors can combine functional capabilities of generalized audit software to accomplish the task of __________________ CA110 CA111 Which of the following is not the feature of GAPs Which is the example of CAATs CA112 In audit procedures. test data is CA113 Which of the following is not the use of CAATs Which of the following are called explicitly by another procedure? CA107 CA114 package computer p[program for performing a variety of data processing function prepared by the auditor true file access/organizations true true examining the quality of system process Wide access to various data base ACL A sample of transactions Tests of details of transactions Macros .

op2 to add customers ACL op3 all the above JCL op4 none of these none the above ans A A False A False B False A no B false A false A false A false A false A false review and evaluate the to obtain a record types of data layout can bring the data indirectly all the above A extract data from file A none of the above A False B False A use of accounting codes absence of audit trails risk driven approach unique approach processing options. file data structure checks and controls all the above D none of the above B all the above D .

false A false A source of data for material planing all the above none of these false A providing access to computer to all organization personnel use of any programs false open/closed false conceptual/physical none of the above D all of them A D A false false manage hardware & software resources A A A enable multiple user resource sharing all the above D false B false with production departments B all the above none of these A false A false A false A false A false B planning language false model base all the above D B .

events false none of the above all the above A A false A false A . to the primary attribute of the random placement of the entity component none of the above false D A invalid.false table files report files file-o-man file manager decentralized picture of a system all the above none of the above B D filepet C none of the above A false A false B retrieval deletion addition B false A false A subject area database software and database safety and database B false A false immediately false on quarterly basis none of the above B B A Benford Benjamin none of the above B false B blocks of nos. alphabetic none of the above all the above A regrouping.

false B false B interactive data extraction and analysis interactive data innumerable analysis none of the above B false A false A false B false A bouncing ball top-down tests big-bang hybrid tests stub all the above no C D B provide information to the audit re-perform procedures carried out by the clients programs all the above D deleted. hard none of these all the above A false system advanced software A all the above none of the above A false no B A false A false B create. false false none of these all the above A A .

no can enable the auditor to execute provisions on a number of different bases A can provide the auditors with useful information with trend s and patterns all of the above D no A examination of source code of a identifies program code program with advice which may be there for to following the logic fraudulent reason of a program none of the above ACL ALC ACLL C B false A comparison of source version of a programmed analyzing the picture of a file or data all the above A false A false A false A file. hardware identifying ineffective code none of the above identifying nonstandard code all the above A all the above D false A false authentication of information support job connectivity language A resource requested all the above D all the above none of the above A no A false A false B .

mathematical concept master list of transactions administered questionnaire A prepared by the entity prepared by an outside programmer engaged by the auditor all the above D false statistical/arithmetic operation stratification and frequency analysis A all the above D false B false B carrying analytical review Can extract and analyse data IDEA A utility software programme Analytical review procedures examining the quality of data Can aid in simple selection High End CAATs A special purpose written program Compliance tests of general EDP controls Action Procedures Event Procedures all the above Can define the audit objectives All of the above D None of the above A All of the above D General Procedures D D D .

test involves _______ All input records in a batch are normally of different types In the planning phase gathering information and risk assessment will be done Information collection encompasses logging the selected auditable events Input controls are designed to ensure processing safety CA114 Integrated test facility is a facility of ________ Internal tables are stored tables from which certain values are extracted for further processing and storing CA115 Log analysers are _______ required by the auditor CA116 CA117 Log analyzers is ________ Log analyzer is a software used by auditor to detect virus Mapping software is used by the auditor to list unused program instruction has veryspecific objectives CA118 CA119 CA12 CA120 CA121 BOTTOM UP TESTS TRUE TRUE TRUE TRUE PARALLE L PROCES SING TRUE HARDWA RE AUDIT TOOL TRUE TRUE REFERE Master file configuration includes ______ NCE FILE All material application -oriented events that occur within the boundary sub-system should be recorded in the accounting audit trail TRUE Master file contains current records for identification and summarising TRUE Metadata approach is _______ APPROA CH TO THE SYSTEM DATA ONLY .Field0 CA107 CA108 CA109 CA11 CA110 CA111 CA112 CA113 Field1 Field2 In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently eliminated from the computer files TRUE In olrt the cpu should posses the capability of program interrupt interrupts TRUE In system testing.

investigation and reaction are the ______ of an auditor CA13 Any audit enable software may include _______ FUNCTIO N COMPLE TENESS Procedure driven approach of auditing is __________ Processing controls can be grouped into general controls TRADITI ONAL APPROA CH TRUE CA123 CA130 CA131 TRUE TRUE TRUE .detection.CA122 CAN BE VERY POWERF UL ANALYTI CAL TOOL CA124 CA125 Modeling is a variety of software which _________ One-to-one relationship means a single entity to a single entity in a monogenus structure On-line processing refers to grouping of transaction processing the same in one go from start to finish On-line testing can be targeted for specific function carried out by programs CA126 Operating systems are devised to optimise the machine capabilities-the function include: SCHEDU LE JOBS CA127 Parallel processing is a concept associated with _______ and ________ OS AND RAM CA128 Parallelsimulation is there to authenticate the _______ system REEL SYSTEM CA129 Prevention.

CA132 Program code analysis involves ______ PROVIDE S DETAILE D INFORMA TION ON MACHINE USAGE CA133 Programme code analysis is being implemented by the _________ COMPAN Y CA134 CA135 CA136 Public audit trail is an important control in system that use __________ for authentication purposes Rdbms is a structured into a series of 2-dimensional table Real time refers to the technique of updating files with transaction data immediately after the occurrence of the event to which it vrelates PUBLIC KEY TRUE TRUE CA137 Reasonableness checking is TYPE OF RECORD CHECK CA138 CA139 CA14 CA140 Recording transactions in a controlled manner may amount to loss of stored data Regular cross-system validation may minimise frauds Application controls can be categorized into _______ types Risk assessment is a phase of an audit TRUE TRUE 4 TRUE CA141 Risk assessment is the phase of ______ Scarf involves embedding audit software modules within an application system to provide continuous monitoring Security audit can be done through oracle database AUDIT CA142 CA143 CA144 CA145 CA146 Security can be broken into ________ areas Sign test is a type of field checks on processed data Snapshot is a software which takes a "picture" of a file or data or a transaction processing through the system TRUE TRUE RISK AVOIDAN CE TRUE TRUE .

testing.include authorisation.approval.implementation and documentation of new systems software and system software modification TRUE System privilege can be checked by auditor TRUE System security audit is an on site inspection . apart from others.CA147 CA148 Snapshot is a technique of __________ which is a part of audit software AUDIT ROUTINE Source code review means _______ IDENTIFY ING ENORMO US CODE CA149 Specialised audit programs may be _______ CA15 Application controls grouped into Super computer are the largest and fastest and is very suitablefor commercial applicationincluding audit work CA150 CA151 CA152 CA153 CA154 PREPAR ED BY THE AUDITOR TWO GROUPS TRUE System development control.which identifies potential securityvulnerabilities within an organization TRUE Test data can be defined as __________ SAMPLE OF DATA USED FOR THE PURPOS E OF TESTING THE SYSTEM SOFTWA RE .

employee profile etc.STREAM OF DATA CA155 Test data pack is ________ CA156 CA157 The contents of a field could determine _______ sign for ______ field The move towards paperless edi would eliminate much of the traditional audit trail. TRUE Transactions are not lost .radically changing the nature of audit evidence CA158 TEST The stream of data that are generated by these tools is called as the __________ DATA CA159 CA16 CA160 CA161 CA162 CA163 CA164 CA165 CA166 CA167 CA168 CA169 CA17 CA170 CA171 The transition from manual system to cis environment bring dramatic changes including Ar=ir*cr*dr The validation checks applied to a field depend on the fields logical interrelationships with other fields in the record There are ______ types of approaches of test data techniques There are ______ types of control totals There are _______ types of audits of the systems development process There are ________ types of checks that can run when data is input through a terminal There are _____types of checks frequently used in validating the data There are 13 system development phases while audit of the system development processes There are four type of audit risks INVALID TRUE CHANGE IN THE METHOD OF RECORDI NG ACCOUN TING TRANSA CTION TRUE TRUE ONE 2 THREE FIVE 4 TRUE TRUE INTER TABLE TEST TRUE TRUE Top down tests.bottom up tests and hybrid tests are under the _______ category Tracing helps to analyse the change caused by viruses Assembler language uses mnemonic symbols Transaction file contain relatively permanent records take product profile.added.duplicated or improperly changed is called as TRUE control over input .customer profile.

CA172 CA173 CA174 CA175 CA176 CA18 Validation checks is applied to a field depend on the field's logical interrelationships with other fields in the records Whenever monetary transaction are processed against master files.control risk and detection risk CA2 CA20 White box approach necessarily involves expert knowledge on the part of auditor TRUE Audit software is a type of audit technique TRUE TRUE READ DATA ON CLIENT'S FILES 2 CA21 CA22 Audit software is used by the auditor to ________ Audit software can be categorized under ______ heads CA23 CA24 Audit software can be divided into ________ categories TWO Audit through can be done using simulation TRUE Audit trail should be periodically analysed to detect any control weaknesses of the system TRUE CA25 CA26 CA27 CA28 CA29 Audit with networking and database help is called _______ Auditing is a form of attestation Auditor can also check default roles in oracle database software WHITE BOX APPROA CH TRUE TRUE Auditor can combine functional capabilities of generalized audit software to accomplish the task of ________ EXAMINE THE THE QUALITY OF SYSTEM PROCES S .the master file associated with a transaction may be searched for confirming data TRUE TRUE TRUE TRUE TRUE BLACK BOX APPROA CH CA19 Audit around the computer is called Audit risk cannot be viewed as a joint probability of inherent risk.the update program should maintain a correlation account to record such transaction that does not have a matching master file record White box testing focuses on finding if there are any defective execution paths in a program White box approach is program based With olrt where interactive data entry is available .

utility program or system management program CA39 Caat's are computer program and data the auditor uses as part of audit procedures to process data of audit significance contained in an entity's information system CA37 CA4 CA40 CA41 CA42 CA43 CA44 CA45 CA46 A sample size calculator program assists auditors in determining rand() function Caat's are computer programs and data the auditor uses as a part of the audit procedures FILE TRUE TRUE TRUE TRUE FICTITIO US DATA APPLIED AGAINST THE CLIENT PROGRA M TRUE BOTH C &D TRUE TRUE TRUE TRUE TRUE COMPUT ER AIDED SOFTWA RE EDITOR Case-is ________ Check digit is a group of numbers added to a code for determining the accuracy of other digits with code TRUE Check digit is a tool under field checks TRUE Check digit is a type of ___________ Codd's rule are being implemented on database Computer assisted audit technique involves the use of computer through "black box " approach FIELD CHECKS TRUE TRUE . purpose written programmes.CA3 CA30 CA31 CA32 CA33 _________ Is the file management software package that lets users and programmers organise data into files and then process those files Auditors can issue the sql commands to audit Auditors can use profiles in their white-box approach of auditing Auditors cannot use generalised audit software to extract the data needed for audit purposes Auditors has to take care of the fact to link between multiple databases with one application CA34 CA35 Base case system evaluation includes _______ Black box approach is specification based CA36 CA38 Black box testing is ______ based and white box testing is _____ based Black box testing seeks to determine whether application output is what it is supposed to be Caat do not contain package programs.

integrity and availability are the major security attributes to the auditor Control total is under batch checks Controls are present over many aspects of the computer system and its surrounding social environments Controls are required for authorisation.accountingand internal organizational controls.digitised image processors etc.integrity and authentication Concurrent audit include auditors as members of s.to ensure data integration and to detect possible breachesin security Conventional data entry giving way to scanner.CA47 CA48 CA49 CA5 CA50 CA51 CA52 CA53 CA54 CA55 CA56 CA57 CA58 CA59 CA6 CA60 CA61 CA62 CA63 CA64 CA65 Computer operation controls are designed to provide ________ Computer security is frequently associated with confidentiality . A system could be ________ Cryptographic techniques are the part of security audit Data communication and networking would introduce new audit risk Data from client application are not stored in the organisations database through auditable events and functions Data integrity can be imposed on the database through dbms Data reverse engineering process metadata to document system and abstract business rules and relationships Data security in audit techniques can be done through three ways THE USE OF COMPUT ERS BY ALL CONCER NED TRUE TRUE TRUE PREVIOU S DATA TRUE TRUE TRUE TRUE TRUE TYPE OF NETWOR K TRUE TRUE TRUE NATURAL /MAN MADE TRUE TRUE TRUE TRUE TRUE TRUE . For auditing in cis environment Core image comparison is a ________ used by the auditor Core image comparison is a type of audit technique Core image comparison is particularly useful where only executable versions are distributed Critical review of the system of book-keeping.d team A sequence check on the transaction or master file by an update program is not required Concurrent audit is taking care of the ______ data that is being transacted Confidentiality.

usage of sophisticated audit software would be a necessity CA87 For small to medium sized systems.the testing strategy is referred to as: C-BRAIN CA85 TRUE TRUE .dcl-statements can be exercised in rdbms TRUE TRUE TRUE CA69 CA7 Deterrenece meance _______ A system ehibit entropy THREAT TRUE CA70 Dss has the following components Dss is defined as a system that provides tools to managers to assist them in solving structural problem Embedded audit routines are sometimes built into an entity's computer system to provide data for later use by the auditor Embedded code is a software used by the auditor to examine backup Embedded code performs a wide variety of audit tasks CA71 CA72 CA73 CA74 CA75 CA76 CA77 CA78 CA79 CA8 CA80 CA81 CA82 CA83 CA84 DATABAS E TRUE TRUE TRUE TRUE Errors are corrected :_______ Event detection is an audit procedure Event detection is the audit procedures Examine the quality of data is not the task of generalized audit software AT THE YEAR END TRUE TRUE TRUE Examine the quality of system processes is _________ A system means -totality Field check is exclusive to a field AUDIT TASK OF THE AUDITOR TRUE TRUE File access is a function of _________ software File access will be the functional capabilities of generalized audit software File activity is the proportion of transaction file records that are actually used or accssed in a given processing run GENERA LIZED AUDIT TRUE TRUE BACKUP S CA86 File integration refers to the ________ of information from a file File volatility refers to the number of additions and deletions to the file in a given period of time For computerised auditing.individual modules are coded and individually tested and then assembled to be tested as a whole.dml.CA66 CA67 CA68 Database analyser is a software which provides detailed information concerning the operation of the database Databases are a key element in most business-related information systems Ddl.

CA88 CA89 CA9 CA90 CA91 CA92 CA93 General purpose software provides a framework for highly complex scientific operations Generalised audit software could be used by the auditor for identifying inconsistencies or significant fluctuations A transaction file is sorted prior to the update of master file Generalised audit software function include _______ Generalised audit software never allow several files to be read simultaneously _______ TRUE TRUE TRUE FILE ACCESS/ ORGANIZ ATION TRUE PACKAG E COMPUT ER PROGRA M FOR PERFOR MING A VARIETY OF DATA PROCES SING FUNCTIO N TRUE CA95 CA96 Generalized audit software consists _______ Generalized audit software has infile capabilities for verifying processing logic Generalized audit software has only limited capabilities for verifying processing logic TRUE Generalized audit software permits auditors to undertake only expost auditing and not concurrent auditing TRUE Generalized audit software provides the full set of arithmetic operators TRUE CA97 CA98 Hash total is a type of _________ Hash totals falls under control totals CA94 CONTRO L TOTAL TRUE .

Field3 Field4 Field5 FALSE FALSE TOP DOWN TESTS FALSE FALSE FALSE FALSE Field6 A A HYBRID TESTS ALL THE ABOVE D B A A B TEST SOURCE DATA CODE APPROA NONE OF REVIEW CH THESE C FALSE A SOFTWA NETWOR NONE OF RE K THESE B SOFTWA RE USED TO READ AND ANALYZE RECORD S OF MACHIN SOFTWA MACHINE E RE ACTIVITY ACTIVITY D FALSE B FALSE A TABLE FILES NONE OF REPORT THE FILE ABOVE D FALSE FALSE A B APPROA CH TO THE APPLICA TION DATA ONLY IT IS DATA ABOUT SOME OTHER DATA ALL THE ABOVE C .

CAN ENABLE THE AUDITOR TO EXAMINE PROVISI ON ON A NUMBER OF DIFFERE NT BASES CAN PROVIDE THE AUDITOR WITH USEFUL INFORMA TION ON TRENDS AND ALL THE PATTERN ABOVE D FALSE A FALSE FALSE B A MANAGE HARDWA RE AND SOFTWA RE RESOUR CES ENABLE MULTI USER RESOUR CE ALL THE SHARING ABOVE D OS AND ROM OS AND MICROP NONE OF ROCESS THE OR ABOVE C DATABAS REAL BOTH (A) E SYSTEM AND (B) SYSTEM B BOTH (A) ROLE AND (B) ACCURA AVAILABI CY LITY NONE OF THESE B ALL THE ABOVE D LATEST NONE OF APPROA BOTH (A) THE CH AND (B) ABOVE A FALSE B .

IDENTIFI ES PROGRA M CODES WHICH MAY BE THERE FOR FRAUDU LENT REASON EXAMINA TION OF SOURCE CODE OF A PROGRA M WITH A VIEW TO FOLLOWI NG THE LOGIC OF A NONE OF PROGRA THE M ABOVE C DATABAS E ADMINIS TRATOR AUDITOR AUDITOR USING COMPUT ERS D DIGITAL PRIVATE SIGNATU NONE OF KEY RE THESE C FALSE A FALSE A TYPE OF TYPE OF RANGE SIGN NONE OF CHECKS TEST THESE A FALSE FALSE 2 FALSE 5 AUDIT THROUG H COMPUT ALL THE ERS ABOVE FALSE FALSE 3 B A D A NONE OF THE ABOVE B A A DETERR PREVEN ALL THE ENCE TION ABOVE D FALSE A FALSE A .

AUDIT TECHNIQ AUDITIN UE G IDENTIFY ING INEFFEC TIVE CODE NONE OF THESE A IDENTIFY ING NONSTANDA ALL THE RD CODE ABOVE D PREPAR ED BY AN OUTSIDE PROGRA PREPAR MMER ED BY ENGAGE THE D BY THE ENTITY AUDITOR THREE FOUR GROUPS GROUPS ALL THE ABOVE D ALL THE ABOVE B FALSE A FALSE FALSE A A FALSE A SAMPLE OF DATA USED FOR THE PURPOS E OF CHECKIN G LOG FILES SAMPLE OF DATA USED FOR TESTING THE APPLICA TION PROGRA MME PROGAR ALL THE MME ABOVE C .

STREAM OF DATA THAT ARE GENERA TED BY TEST DATA TECHNIQ UE BOTH (A) TOOLS AND (B) BOTH C &D VALID NONE OF THESE B NUMERI C B FALSE A TEST DATA TEST APPROA DATA CH PACK USE OF ACCOUN TING CODES FALSE NONE OF THE ABOVE C ABSENC E OF AUDIT ALL THE TRAIL ABOVE D A FALSE TWO 4 FOUR THREE 3 TWO FOUR 5 ONE A B B A THREE 2 FOUR 5 ONE 3 C A FALSE FALSE TABLE SYSTEM LEVEL TEST TESTS FALSE FALSE A B NONE OF THESE B A A FALSE B FALSE A .

FALSE A FALSE B FALSE FALSE A B FALSE A WHITE BOX APPROA BOTH (A) NONE OF CH AND (B) THESE A FALSE B FALSE FALSE A A REPERF ORM PROCED URES CARRIED PROVIDE OUT BY INFORMA THE TION TO CLIENT'S THE PROGRA ALL THE AUDIT MS ABOVE 4 5 3 D D FOUR FALSE THREE NONE OF THESE C A FALSE A BLACK BOX APPROA ALL THE CH ABOVE FALSE FALSE CARRYIN G ANALYSI NG REVIEW NONE OF THE ABOVE A A A EXAMINI NG THE QUALITY ALL THE OF DATA ABOVE D .

FILE-OMAN FALSE FALSE THE FILE MANAGE R FILEPET C A A FALSE B FALSE A COMPARI SON OF SOURCE VERSION OF A PROGRA M FALSE HARDWA RE ANALYSI NG THE PICTURE OF A FILE ALL THE OR DATA ABOVE A A SPECIFIC PROGRA ATION M A FALSE A FALSE B FALSE A FALSE B FALSE A COMPUT ER AIDED SOFTWA RE EMBEDD ED FALSE FALSE COMPUT ER AIDED SOFTWA RE ENGINEE NONE OF RING THESE C B A RECORD BOTH (A) NONE OF CHECKS AND (B) THESE A FALSE B FALSE B .

PROVIDI NG ACCESS TO COMPUT ER TO ALL ORGANIZ ATION PERSON EL USE OF ANY NONE OF PROGRA THE MS ABOVE D FALSE FALSE A A FALSE A ALL THE ABOVE CURREN NONE OF NONE OF T DATA THESE THESE B FALSE FALSE A A FALSE A FALSE A FALSE A TYPE OF TYPE OF SOFTWA HARDWA NONE OF RE RE THESE B FALSE A FALSE A FALSE A CONCEP OPEN/CL TUAL/PH ALL THE OSED YSICAL ABOVE FALSE FALSE D A A FALSE FALSE B A FALSE FALSE A A .

FALSE FALSE FALSE A A A BROADC NETWOR NONE OF ASTING K THESE A FALSE A PLANNIN G LANGUA MODEL GE BASE ALL THE ABOVE D FALSE B FALSE FALSE FALSE A B A ON QUARTE NONE OF IMMEDIA RLY THE TELY BASIS ABOVE FALSE FALSE FALSE B A A B AUDIT TASK OF THE AUDITOR S USING COMPUT ERS FALSE FALSE AUDIT TASK OF THE GENERA LIZED AUDIT SOFTWA ALL THE RE ABOVE C A A SPECIALI UTILITY ZED PROGRA NONE OF AUDIT M THESE A FALSE A FALSE B RETRIEV DELETIO ADDITIO AL N N B FALSE A FALSE A BIG BANG STUB BOUNCIN G BALL B .

FALSE B FALSE FALSE A A STATISTI CAL/ARIT HMETICA L OPERATI ON STRATIFI CATION AND FREQUE NCY ANALYSE ALL THE S ABOVE FALSE MATHEM ATICAL CONCEP TS FALSE D B A MASTER LIST TRANSA CTION ADMINIS TERED QUESTIO NNAIRE A A FALSE A FALSE FALSE A A TRANSA BATCH SEQUEN CTION SERIAL CE TYPE NUMBER CHECK A FALSE A .

q_id q_desc The -----. AC19 can be seen in ------------. Single Cash Flow Statements AC14 In tally.directory stores all data entered by the AC20 user. Import and Export of data between Tally and other programs is possible only AC2 through ---------. AC6 In tally.Program.receive. AC26 Tally is based on mercantile accounting system Create Information AC27 Ctrl + N is used to ----------------------. we press ------------. we can alter ledger details using either single or multiple modes but AC9 not alble to delete a ledger from multiple modes. AC4 A created company's detail can be modified through keys A/An ------------.alteration mode. AC10 In tally.is the official notice that the firm sends to its customers to AC5 advise then to the amount of money that is owed. the -----------. AC13 --------------------. The re-order point is the inventory quantity that trigger a stock replishment AC3 activity.the group company must contain at least _____________ members AC15 To cancel a vourcher entry in Tally. to print report .key can be used to select an existing company from list of AC1 companies. AC21 The Ledger Accounts are unique in Financial Accounting Packages Customers can be permitted to enter their own data into the firm’s computer AC22 using the firm’s wide area network is an example of AC23 In Tally.all masters have ________main options AC7 In tally.the use of group behaves like a sub-ledger. In the Tally Software. AC29 Revenue Account also known as -------------. short-cut key is ----------- Two Alt+D AC16 The accounting masters and inventory masters related to We press ------------. In Tally. we can customize the Vouchers as per our requirements AC24 The number of steps in Accounts Compilation are AC25 Each action/transaction of a firm is described by a ----------------.Account AC30 Method of Voucher Numbering is/are F4 Alt+P Tally Audit Bin True Enterprise Data Interchange TRUE 2 data element FALSE Display stock valuation method Ledgers Personal Manual . option is that we can AC8 summarize many ledger accounts into one line statements In tally.in Tally classify the accounts under different heads so that AC28 summarised information is possible.is/are useful for management in the decision making. and pay for replenishment of Puchasing and AC11 stock are --------------Accounts payable AC12 Tally allows to delete a ledger from --------.to create a new column in balance sheet press _______ In tally.a group company is marked with an ______________ op1 F1 Tally ODBC TRUE F3 Invoice Two Ctrl+C TRUE TRUE * The systems that work together to order.function key to display the age-wise analysis of Bills AC17 Receivable or Bills Payable report AC18 In Tally.report. Types of Accounts and Types of Vouchers passed during the period.

predefined voucher formats The value of the inventory is included in a ledger accounts as an asset on the balance sheet " The buyers can follow up with the suppliers to determine the reasons " is an example of ----------------From voucher entry mode .given to the merged accounts of AC56 member companies of the group.gives the balance for each day for the voucher type has been AC59 selected. if we press __________ then we get payment voucher in tally AC38 Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged AC39 accounts member companies of the group. AC60 For 'stock journal' entry we press ______________ in tally Filled 11 FALSE management by objective F4 Main Location True Ledgers 0 to 9 Supplier Report F2 Net Transactions True F6 function key Sales 1-4-1995 to 31-31996 True Horizontal Balance sheet & profit & loss profit & loss and trial balance Primary Security mechanism F5 a name Sales return Company creation Trial Balance F7 . AC52 Default ledger accounts in tally are ______ AC53 Default 'godown' name in tally is ____________ AC54 'Tally vault' is a _________________ AC55 To create a sales voucher in tally .purchase orders data flow is directed to the purchasing system for use in closing out the outstanding purchase orders in the receiving system diagram. AC57 In tally.3 _________________ AC50 Tally encrypts and stores TALLY DATA at the data directory AC51 The Profit & Loss statement can be displayed in ---------------.AC31 Accounts Receivable are displayed in Balance Sheet AC32 To assemble a product from different items -------------.entry is used Journal AC33 AC34 AC35 AC36 AC37 A --------."credit note" voucher type records entry for ________________ AC58 In tally you get currency symbol option from _______ menu -----------------. you have to press _______ A Group Company is ------------------------. Tally provides at least --------. AC41 The field can have a value between ________________ in FA Package. AC40 A ----------. bills payables report The accounts payable system is responsible for paying the suppliers for the AC48 ----------------AC49 What is the default financial year in Tally6. to change the date of the voucher press ______ AC45 Tally can maintain budgets on ---------------AC46 The value of the inventory is included as an asset on the balance sheet In ratio analysis report of Tally FA packagewe we press ________________ AC47 function key to the display of bills receivable . The _______ file maintains data that describes the supplier past transaction AC42 with the firm in terms of material quality in AIS AC43 It is necessary to manipulate data to transform it into ---------------AC44 In tally.is a primary document for recording all financial transactions.format(s).

Which of the following is an advantage of a computer-based system for AC78 transaction processing over a manual system? A computer-based system: Does not require as stringent a set of internal controls.key. a group company can also be a constituent(member) of another group AC72 company TRUE AC73 Default number of groups in tally erp are ________ 128 AC74 During voucher entry ------------. a list of inventory reports can be displayed AC63 straightaway from the balace sheet report Changes in transactions or vouchers 2 F9 AC64 Projected approximation of income or expenses is called ______________ .inventory valuation method option is available from _______ TRUE Main location F3 Tally.Tally provides the capability to the administrator/auditor to track changes in the AC61 areas is/are AC62 In tally. AC68 Default stock category in tally is ______ To create a log of the import activity in a file _____________ is located in the AC69 same directory as an executable program in tally AC70 In Tally. . AC65 "Administrator" type user is also called 'Auditor' of a company in Tally You will get company information . types of users are _______________ By pressing -------. which of the following types of computer Inventory AC77 files most likely would be a master file? subsidiary.can view audit list. AC75 User designated as --------------.imp Stock summary By pressing F11 AC71 Tally audit feature is available in a company __________________ function key In tally. Ledger Accounts Administrator One company to another company created withon AC76 Tally supports Importing of data from ---------------Tally Package In an accounting information system. if you press __________ from gateway of AC66 tally Balance sheet TRUE AC67 A constituent(member) company can be a member of more than one group.are used.

Receiving and Accounts payable Accounts and Receiving payable ^ D Multiple Fund Flow Statements A or B Mone of the above A Ratio Analysis All of the above D Three Alt+X One Ctrl+D A B Alter Information Four Ctrl+T Display Information All of the above D F5 Ctrl+P F6 Shift+P F7 C None of the above A Statistics Day Book Journal Book Data False Enterprise Data Information FALSE 3 data record TRUE Sub None of the above B A B Electronic Data Interchange.op2 op3 op4 ans ALT+F1 CTRL+F1 None of the above A Tally IMP Tally INI None of the above A false ALT+F3 CTRL+F3 A None of the above B Bill Three Alt+C A or B Four Alt+Ctrl+C None of the above C Five B None of the above B FALSE A FALSE $ & A A Puchasing and Receiving Puchasing. All of the above 4 Field 5 All of the above Open Calculator Change Period None of the above B Groups Nominal Automatic Journals Real None None of the above B None of the above B All of the above B C A C B B .

Profit & Loss All of the above Stock Journal Journal Book Physical Stock Transfer Receipt 16 Issue 18 None of the above A 21 B TRUE management by exception F5 A Reversing Journal B B electronic data analysis All of the above B Alt+f5 B All of the above C Primary F6 Primary Cost Category False Reports 1 to 100 Vouchers 10 to 60 A None of the above C None A Order Information Ctrl+f2 A and B All of the above None of the above Ctrl+f4 None of the above F7 function key None of the above A Purchases 1-4-1996 to 31-31997 False Vertical A or B 1-4-1997 to 31-31998 None of the above B Profit & loss and trial balance Main location Cash and profit & loss Cash and bank C A or b None of the above B Ledger a/c F7 Cost category F8 None of the above A F9 D an identity Purchase return A and B a or b None of the above C None of the above A Stock items units Regional setting None of the above A Daybook Alt + F7 Balance Sheet F10 None of the above B F11 B Suspense Output F4 Closing Balance False Alt + f6 function key A or B A C A C A None of the above B A None of the above C .

Will produce a more accurate set of financial statements.ini Stock journal A or b Stock analysis None A None of the above A During the creation of a company In 'comp info -> security control' option None B FALSE 228 34 16 A C Groups Owner Sub-Groups Data Entry B or C TallyVault A A Other programs . Both A and B Cash disbursements.Changes in Ledger Masters Both A and B 3 4 None of the above C 1 B F10 F11 F12 A Profit & loss a/c FALSE Budget None C A Ctrl+F3 Alt+F3 None of the above C FALSE Primary Symbol None of them Tally. A B None of the above C Payroll transactions. Cash receipts. Will be more efficient at producing financial statements.a spreadsheet or a database file. A Eliminates the need to reconcile control accounts and subsidiary ledgers. C .

_______ is a method to convert a string into integer. ________ is a property of a recordset object which counts the number of rows in a recordsourse object In visual basic. the explorer view of a project is displayed in ___________ In visual basic. _______ method is used to add an item in a combobox In visual basic. the interval property of a timer control is given in ________ VB22 In visual basic. In visual basic. In visual basic. In visual basic. VB2 VB3 In visual basic. a timer event is only available in timer control. VB21 In visual basic. In visual basic. _______ property of a recordset object is automatically set to ______ In visual basic. ________ is a function which displays a message and it also allows the user to enter values in a form object VB24 VB25 . when a record pointer reaches to the last record. vbcritical. when a record pointer reaches to the first record. _______ property of a textbox control is set to _______ to underline a text VB20 In visual basic. to populate a directory list box with a file list box ________ statement is used In visual basic. in a shape control.Shape = 2. _______ property of a textbox control is used to change the size of text. _______ property of a recordset object is automatically set to ______ In visual basic. to display a message in the run time _________ function is used In visual basic. Adding a new record is only possible using _______ method of a recordset object. _______ property of listbox control counts the number of items in the list VB23 In visual basic. In visual basic. a record is saved to a recordsource object using _______ method of a recordset object. using a data control. using a data control. vbinformation.q_id VB1 q_desc Microsoft visual basic project file has _______ file extension. What type of shape should we get? In visual basic. a record can only be added from the last record. _______ is a property of a textbox control to set a color of a text. In visual basic. vbexclaimation are the values of _______ in a messagebox function. to populate a drive list box with a directory list box __________ statement is used VB5 VB6 VB7 VB8 VB9 VB10 VB11 VB12 VB13 VB14 VB15 VB16 VB17 VB18 In visual basic. vbred or vbgreen or vbblue are the property values of a backcolor of any object VB19 In visual basic. using a data control. the properties of various controls can be set using __________ In visual basic. to navigate to the previous record ________ method of a recordset object is used. _______ method is used to load picture during runtime in an image control VB4 In visual basic. a vb statement gives Shape1. In visual basic.

_______ keyword is used to declare a variable What is the extension of the Visual Basic project file that stores the design of a user control. a method RGB(255. VB26 VB27 VB36 VB37 VB38 VB39 VB40 In visual basic.255. if a user uses a function key F4 _________ becomes visible. if a user uses a shortcut key ctrl+R _________ becomes visible. _______ object is used to access the database and also to manage the data in the database. VB41 In visual basic. Microsoft visual basic is a Rapid Application Development tool.0) will generate _______ color In visual basic.0. a form is a ________ object. a method RGB(255. In visual basic. when a textbox control receives the focus ________ event is triggered. while closing a form _______ event of a form object is triggered earlier to terminate event. VB34 VB35 In visual basic. when a form object appears on the screen _________ event is triggered. In visual basic. VB42 Which event of a text box would you use for validating the data entered by the user? VB43 VB44 Which of the following statements forces inline error handling? The _______ method resets the contents of bound controls to their original values when the user clicks on the cancel button. VB45 To deactivate the Form UnLoad event.255) will generate _______ color VB31 In visual basic.VB28 VB29 VB30 In visual basic. VB32 In visual basic. using a data control. ________ is a recordset type which allows to add a new record and also to update existing record in a recordsourse object In visual basic. VB33 In visual basic. when a checkbox control is checked _______ property is automatically assigned with 1. to give a backcolor or to bring in a picture to a command button can only be done if we set the style property to ______ In visual basic. In visual basic. you make the following change in the function definiton: VB46 How many root nodes can a TreeView control have? VB47 A project group is a Project which: . to display text on a label object _________ property is used In visual basic.

VB64 The caption and the name properties of the command button: VB61 VB62 .bat or . To change it dynamically (i.e. we use the ‘Send To Back’ or ‘Bring To Front’ option from the Edit menu. .com.VB48 VB49 Procedures declared in a _____ are local whereas procedures declared in a ______ are available to the whole application.exe. VB50 How can you keep the user from exiting a form by clicking the Close button? The _______ property enables Visual Basic to draw complete images in memory before displaying them on the Screen.during program execution) we need to change: Which property of the ProgressBar determines how much of the bar is filled? The ______ function can be used to run any . VB51 You want to display the code and the description of an error. . you have to open file in: VB59 VB60 Visual Basic displays information depending upon the current value of two properties of the form. called: Which of the following procedure types will execute when you assign a value to a property of an object? VB63 In order to overlap the controls (say a command button) during design time. What would be the correct syntax? VB52 VB53 VB54 What is the purpose of the Image List Control? Which method would you use to get a free or unused File identifier while opening any file: Which property procedure is used to retrieve the value of a property? VB55 VB56 Which of the following can be shown to the user using the Common Dialog control in VB? Which of the following are not properties of Command Button: VB57 Which events enable you to determine which key was pressed by the user? VB58 In order to access a file in Non-textual format.pif file from a Visual Basic program.

you will set the: .VB65 You try to initialize a new Object variable with the following line but receive an error. What could be the possible cause? Set MyVar = New Classname VB66 Which of the following will perform a direct execution of a Command object? VB67 The vb Critical symbol displays: VB68 vbYesNo is an example of a(n): VB69 The primary difference between the MsgBox statement and the InputBox function is the: VB70 Which of the following is TRUE about a protected form (i.e.. you make the following change in the function definiton:Private Sub Query_Unload(Cancel as Integer. a form where the Protect Form button on the Forms toolbar is toggled on and is assumed to remain in that position)? VB71 Which event is triggered when the user moves to another open form? VB72 To deactivate the Form UnLoad event.UnloadMode as Integer) To prevent the Form from closing.

vbp .false value() movelast movelast.op1 op2 op3 op4 .false D toolbox eof.millionth hundredth of one-thousandth of a of a second a second second fontsize D one-ten thousandth of a second C count form layout window recordcount itemcount prperties window project explorer listcount D B title prompt vbmsgboxstyle toolbox none of the above msgbox() textbox label inputbox() D C .path C recordcount count C update append addnew additem C append update additem addnew B movenext moveprevious movefirst C movelast.Path message() Dir1.Path = Drive1.frm add additem loaditem load loadpicture addpicture Drive1.frx none of the above none of the above ans .pattern= Dir1.true textsize none of the above none of the above C B size foresize oneone.Path=Fil e1.Path = Dir1.true e.Drive Dir1.true textunderline.Path messagebox( ) Dir1.Drive opendatabas e msgbox() File1.Path none of the above B none of the C above File1.tru e int() movefirst.tru e form layout window movefirst.Path = File1.Drive= Dir1.true val() D D circle true rectangle false square oval D A true false eof.false properties window B B B D A fontcolor color forecolor fontunderlin underline.false number() bof.true project explorer bof.Path = Drive1.Path openrecordse t Dir1.vbg .

opensnapsh opendynaset ot dbopensnapshot dbopendyna set D load activate unload initialze C standard blue red opaque red green transparent green blue graphical black white D B D properties window form layout window toolbox project explorer window D properties window form layout window toolbox project explorer window A change lostfocus text child true parent false container load unload initialize gotfocus none of the above D activate none of the above none of the above D C C A text name opendatabas e dbengine caption enabled visible value dime dim var style none of the above .ctr .ctl .ocx B Validate Validation Check Audit A openrecordset On Error GoTo On Error linelabel GoTo Inline On Error Stop UpdateContr ols PaintPicture Refresh Cancel parameter to Cancel UnloadMode a non-zero parameter to parameter to a nonvalue 0 zero value 1 2 3 Consists of several Programs Consists of Consists of Various several Forms And Code Applications Modules C B B On Error Resume Next D Resize A UnloadMode parameter to a zero value None of the above A Consists of several Projects D D .ctx .

no & err.descrip err.number Msgbox & err.number error. standard or code module Project window. KeyUp and KeyDown D Output mode B ScaleHeight and ScaleTop x and y A Property Let Property Set C Background Caption color property property Min Max ZOrder property Value AutoRedraw property CurrentVal C B Shell Substr SetAttr CStr A Are one and the same Can be different at times Are actually not properties None of the above B Click and KeyPress Ascii Format Click. view Class module.text tion D To display To help in images to the creating a user ToolBar None of the above A None of the above B PaintPicture A To provide a repository for images used by To allow the editing of other icons controls D FreeFile Retrieve GetFileNum GetFile Get GetProperty GetBytes Value A B Common messages passed to Windows Caption Open dialog box Windows explorer Visible Multi-Line Input box Font D C KeyPress.Form window. code code window module Place code in the Terminate event AutoRedraw = True Place code in the Unload Place code in the event Deactivate event AutoRedraw = False Refresh Msgbox err. KeyUp and KeyDown KeyUp and KeyDown Binary Format Input Mode CurrentX and CurrentY ScaleLeft and ScaleTop Property Property Get Assign .number & Msgbox error.text Msgbox error.text & error.

None of the above built-in procedure.You do not need to use the Set command here The Open method You do not have the permission to access the class The Exec method MyVar has not been declared The ExecProcedure method A warning query icon A critical message icon An exclamation icon statement. MsgBox statement can be created with the macro recorder. while the MsgBox statement cannot. while the MsgBox statement does not. while the InputBox function cannot. InputBox function returns a value. variable. intrinsic constant. B MsgBox statement returns a value. C Terminate C UnloadMode parameter to a zero value A . while the InputBox function does not. QueryUnloa Unload d Deactivate Cancel parameter to Cancel UnloadMode a non-zero parameter to parameter to a nonvalue 0 zero value None of the above None of the above C D B C A new check box can be added. modified. Data cannot The form be entered can be Data can be into the form. InputBox function can be created with the macro recorder. entered.

in URL IN11 Internet can be defined as _______ internal network .gif Service.yahoo and infoseek IN4 IN5 IN6 IN7 BBS stands for______ USENET is a BBS on ____ scale WINSOCKS is expanded as______ IETF Level 2 HTML DTD supports graphical browsers like _______ bulletin board system small windows socks Mosaic IN8 IN9 IN10 The space used by Netscape to store the retrieved page is called______ The URL for encyclopedia Britannica is_________ _______ maps IP addresses with the domain names of the sites buffer www. IN96 The components of a URL are ___________ IN92 IN97 IN98 The mail we send has a mailing address and most of them correspond to_____. The image format supported by most browsers is________________.bmp and .mail clients and alternate services <center> communication generated information Server arpanet IN99 IN100 IN101 CGI stands for ____________ Host name indicates the domain name of the web ________ The internet is also called as _______________ IN102 IN103 IN1 The internet is similar to _________________ The net drivers______ from one place to another The World Wide Web was devised by _________ IN2 The useful URL schemes are_____ and______ LAN data CERN yahoo and infoseek IN3 The other ways of getting connected to the net are_____ news groups._____ and Which of the following is not supported by internet explorer _______________ op1 MS Internet Explorer and Mosaic text hyperlink in random order first . hostname and directory path mail servers._______ IN91 IN93 IN94 IN95 Special characters allow browsers to display _________________ The keyword for providing links within or across documents is____________ Stringing pages together using hypertext technology helps view pages _______________ The initial web pages present in a web site is the ________ page.q_id q_desc IN90 The two major browsers used to surf the Internet are ________.ency.

IN12 IN15 The most important service of the ______ is to manage traffic control application layer _________is a program that displays information about a host connected to the net finger service _______ is a program or a tool that helps in locating a file anywhere on the net FTP uniform research URL stands for ____________ locator IN16 IN17 IN18 IN19 IN an URL the word before the color refers to _______ A ______ always begins with a slash Prodigy is run by IBM and ______ The World Wide Web is referred to shortly as the _______ host computer message Delphi net IN20 Gopher and WAIS enables the user to ______ IN21 ______ is the program used to run CompuServe's regular services browser CompuServe internet dialer IN22 Navigating through the menu of gopher is called moving around _______ gophering IN23 IN24 IN25 The directories that come with built-in engines are yahoo.SLIP users must run a programme called______ finger server The web maps are called _______ list IN26 IN27 IN28 Directories consists of _______ levels The _____ level gives the broadcast overview of the net The huge list of keywords from important items is called ______ no middle hotlist IN29 IN30 The two types of search in veronica are _____ and ______ _______ searches by keywords directory search.lycos and ______ Alta vista To use the finger command.index search infoseek IN31 IN32 IN33 IN34 Mosaic displays links in color whereas _____ does not display links in color ______ supports one button publish SPY MOSAIC is distributed by_______ ______ is a program that helps us to log on to other networks IN35 IN36 IN37 HTTP is the acronym for __________ ______is used to transfer and copy files over the internet _____ is a program that helps us to log on to other networks IN13 IN14 IN38 IN39 IN40 IN41 netshark lynx Microsoft Usenet Higher text transfer protocol iccp yahoo transfer control TCP/IP stands for ________________ protocol/internet Archie servers can be accessed in_______ different ways in internet one _______is the computer on the internet that translates between the internet domain names and the internet numeric address ftp servers the internet TIA stands for_____ in internet adapter .

a udio IN63 IN64 The web pages that represent online home of their author are called______ first page global network GNN stands for______ news _____ is the most popular internet service yahoo service IN65 The online service offered by navigator gold 2.multimedia.real-time games and multi user games are called______ The information displayed on the web page includes______.videos. present on the other end of the link.winsocks allsrc IN58 IN59 HTML stands for_____ The system of interlinked documents is known as_______ The small programmes that create animation.minx world wide web server glossary VERONICA is an acronym for _______________ very easy and rodent oriented net wide index to computerized archives The first freenet is created at the_____ and is called______ ________ are defined as ways of communication amongst networks university of berkeley.berkeley freenet protocols IN55 IN56 IN57 ______and_____ are web searching features WINWAIS has two source lists namely____ and______ ________ is also called as WAIS manager search engines._____ and_____ IN52 IN53 IN54 IN60 IN61 IN62 higher text medium language hot links images graphics. IN43 HTTP stands for______ IN44 ________ is used to link pages in the world wide web IN45 FAQ stands for ______ The internet adapter is a programme that makes our connection act like a _____or a ____ account SLIP.0 are _______ and_____ email and net conference .IN42 Service indicates the name of the ________ used to access data.PPP The step involved in Communicating between the web clients and servers is ______________ connection IN46 IN47 browser hotlink text transfer protocol universal resource locator frequent asked query IN48 IN49 WSIRC stands for______ Two of the important browsers are_____ and_____ IN50 IN51 Lynx is a _______ programme that works with terminals The huge list of keywords from important items is called an_____ wide search for information and research lynx.directori es allsrc.

excite and webcrawlers are _____ computer related abbreviations and acronym encyclopedia Britannica search engines IN72 GIF is the acronym for ____________ Graphical interpreter formatting IN73 IN74 JPEG is the acronym for ___________ The Web aids users to explore the ________ IN75 The three most popular mailer are_____.infoseek.encyclopaedias. the color of the text can be specified using _________ attribute of the font tag.alt avista BACKGROUND Current web page Internet equipment training faculty .IN66 _______ is a program or a tool that helps us find a file anywhere on the net newsgroup IN67 IN68 The databases to enable keyword search using Lycos are a2z.government and other references are found in ______ Yahoo. information Communication gateway interface Network IN80 The interface that provides effective communication between the web browsers and servers is _________ CGI is the _________ between web browsers and servers CGI programs are invoked based on the information provided by the _________ IN81 A CGI program is usually called after a request made by the _________ Browser/user IN82 URL stands for ________ Unknown resonance language IN83 IN84 IN85 A hyperlink can be on ___________ HTML was derived from _________ SGML is a _________ text only SQL alphalanguage IN86 IN87 IN88 PINE stands for _____________ palm is not eatable The application that confirms whether a document is compliant to its DTD is _________ SGML Processor Web is a collection of ___________ web sites IN89 IETF stands for ________ IN69 IN70 IN71 IN77 IN78 IN79 Joint Pictures Expert Group mails yahoo.lycos._____ and______ IN76 The World Wide Web consists of _________ In Microsoft Internet Explorer._______ ______ is a large worldwide bulletin board service network Lycos catalog apple link BABEL consists a glossary of _____ Dictionaries.

______ and______ ________ is in between LAN and WAN _____ can be owed by multiple organisation Data is transmitted in the form of_____ signals PAN.windows95.researc h Higher text manipulation HTML stands for ______________________________________ language The first international IP network connections were established in 1973 with united states and _____ and_____ UK A_____ is a set of computers interconnected by transmission paths to exchange information in internet server A computer that provides a service usable by other computers is called______ client A_______ is the representation of physical connectivity of the computers in internet network card DTE stands for ____________________ The basic function of the ______ is transmitting the bits over a channel detailed transaction explanation application layer IN118 IN119 The point to point channel network is also called as _____ and_____ Accessing files using FTP servers is called_____ point to point network and broadcast channel network file access IN120 IN121 IN122 IN123 The three most commonly used networks are______._______.IN104 IN105 IN106 The net provides interesting services like______.parsing and compiling nt.ie.smaller arpanet education.AAN VAN LAN analog IN124 DTD stands for __________ IN125 Modem stands for __________________ ______ is the process of the digital signals being converted into a form suitable for analog transmission Data type definition Moralize/demoraliz e IN116 IN117 IN126 Mapping .NAN.________ and______ ________ is the ancestors of the internet IN107 IN108 DARPA stands for _______________________________________________ The uuencode files start with a _______ IN109 DARPA is broken into ________ and _______ IN110 NSFNET is the united states provides service to _____ and_____ IN111 IN112 IN113 IN114 IN115 scripting.wi nzip dnet defensive administrative rank administration network start milnet.______ and______ The windows internet software available are______.

Loss IN140 IN141 IN142 IN143 According to information Technology Act. that permits entities to exchange information. semantic and syntactic.IN127 ________ and______ are two basic ways of getting connected to the internet IN128 SLIP stands for ________________ IN129 PPP stands for _____ Satellite link and digital signals Standard long internet protocol Prime prolonged protocol IN130 Which of the following best describes uploading information? storing data on a disk drive IN131 IN132 IN133 A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time. LAN hyper terminal The term HTTP stands for tracing program National A NIC is considered as Informatics Center IN150 A hub is a device that can connect IN147 IN148 Only Computers . Bandwidth Find Photography IN137 A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt an decrypt messages and conversations. The principles. None the person who is known as father of Internet This website is the biggest bookstore on the earth. The means of communicating between networks Key User-id Penetration Acts Sales . Protected/private character string used to authenticate an identity or to authorize access to data. To investigate contraventions the controller of certifying authority shall exercise the like powers to that of Malicious software. 2000. expressed in bits per second. means and methods for rendering information unintelligible and for restoring encrypted information to intelligible form. The act of searching through storage to locate information without necessarily knowing of the existence of the information being sought.com Automated Tailor Machine Acts Router IN149 A group of computers and other devices dispersed over a relatively limited area and connected by communication links that enable a device to interact with any other on the network. then ATM stands for A sequence of bits or characters that identifies the destination and the source of a transmission. A set of rules and formats.tax authorities Utility Tim Berner Lee Etrade. IN134 IN135 IN136 IN144 IN145 IN146 When we talk of Data Transmission modes. IN138 IN139 An attempt to get access to a system by posing to be an authorised person. The successful act of bypassing security mechanisms of the system. Spoofing An action or event that might prejudice security.

......... you would connect them with ______connect them IN160 What happens to data that is ruined before reaching to receiver IN161 IN162 IN163 IN164 Bluetooth is Which is not one of the recognized IEEE sub layers? The most preferred number system to represent a IP address is A MAC address is of Data return to the sender Wireless technology Physical Layer Binary 48 Bits IN165 Protocol is software that facilitates connection to the internet IN166 A . the cable system forms a loop with workstations attached at various intervals around the loop Physical address A cable There isn't one Physiology Bus Linear Parallel Ring Ring Star Ring ........... .......... is a LAN-based computer with software that acts as a controlling device for controlling access to at least part..... what kind of cable would be used to connect them? IN155 IN156 IN157 IN158 Concentrates connectivity Bridges and Repeaters......... how many IP addresses are required for these 5 devices? Which of the following in an OSI layer When creating a network from just two PCs..... ..... each workstation attaches to a common backplane via its own physical cable that terminates at the hub In a . of a local area network and its available resources..... if not all...IN151 Which of the following is true concerning the function of a switch? IN152 IN153 IN154 What do routers connect? What does a router route? Software which prevents external access to a system is termed If four computers are connected to a hub and then to the internet.... bits firewall One Physical Layer RG7U IN159 An IP address is a To construct a simple LAN of 4 computers.... Novell PC IN167 IN168 IN169 IN170 IN171 IN172 IN173 IN174 IN175 What is the biggest disadvantage of the Ring topology? The ..... each work station is directly connected to a common communications channel Which one of the following is NOT a network topology? In a ... of the network concerns how network devices are physically (or optically) interconnected.... The principal topologies used with LANs are: What are the various types of bus architecture? What are the various types of ring architecture? In a ...

IN176 The Media Access Control (MAC) is a sub layer of the: IN177 IN178 IN179 What are the most common LAN technologies used in networking today? Modem speeds are measured in LAN speeds are measured in Network Layer Ethernet. the user should use a IN197 An ISP hardware scanner provides access to the Internet . you must use the World Wide Web IN183 The worldwide web server uses the following standard interface to act as the middleware: key gateway interface IN184 IN185 IN186 An NIC Accessing the Internet from a typical home PC requires the use of The most widely used network operating system on PC LANs is a Novell Interface Controller CD-ROM drive Linux IN187 JPEG and MPEG have to do with compression of graphics and video IN188 To use the Internet you must use the World Wide Web IN189 A multiplexer is a form of IN190 An ISP Printer provides access to the Internet IN191 FTP is used to send email IN192 Telnet used to send email IN193 IN194 A firewall is A proxy server is used to protect a computer room from fires and floods a backup server IN195 IN196 A search engine is To look for information about interest areas on the internet. token ring. DecNET bps bps IN180 IN181 WAN speeds are Accessing the Internet from a typical home PC requires the use of usually higher than LAN speeds CD-ROM drive IN182 To use the Internet.

IN210 To secure communication network against wire-tapping the most effective control is Use of identifiers IN211 IN212 IN213 One way that a virus CANNOT spread throughout a network is: Which of the following is NOT a means of monitoring employee use of company technology? ____________ would be used by parents to monitor their children on their home system. Password cracking A firewall is Which of the following is NOT an example of a DoS attack that is popular among hackers? A ____________ attack is when a hacker sends a continuous flow of packets to a system.IN198 FTP is used to send email IN199 Telnet used to send email Which of the following is a true statement about the OSI model layers? The layers cannot communicate with one another. by attaching to an e-mail. Phone A Trojan horse . IN200 IN201 IN202 IN203 IN204 IN205 IN206 IN207 It is one large Which of the following is NOT true about the Internet? network. used to protect a computer room from fires and floods IP flood hack firewall IN208 A proxy server is Which of the following would be performed on a network server and not normally on individual workstations? a backup server Apply security patches IN209 What can be said about the safety of the Internet? All sites are safe and reliable. One defense option on a large network is to configure a ____________ to disallow any external traffic. The traditional intent and impact of this common type of attack is to prevent or impair the legitimate use of network resources.

The advantage to set its prices very the customer is that the company can high Which of the following is an easy-to-use service to get information on People Search someone? Name of your Which of the following pieces of information would NOT be found online? bank Which of the following is the most common danger on the Internet? Virus IN227 The famous Nigerian Fraud scam offered victims the opportunity to: The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called _________________. as in the 1930s IN219 An organisation is upgrading its telecommunication lines. IN216 Which of the following would NOT be considered an example of cyber terrorism? An attack on a system for personal gain IN217 Which of the following would be a form of cyber terrorism? Economic damage IN218 Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life? Crashing the stock market. Which is the least To carry more important objective while upgradation network capacity IN220 IN221 IN222 IN223 IN224 A company posts a price list of its products on its website. Use a fake e-mail address. Shill bidding Internet stalking. pop-ups. harass. or contact another in an unsolicited fashion is called: Setting your privacy settings in Internet Explorer to medium is one way to block: IN228 What is the best means of protection from cyber stalking? IN225 IN226 IN229 IN230 IN231 Which of the following is not an appropriate control over telecommunications software Encryption techniques can be implemented in Hardware-Software Which protocol would be used to download a free anti-virus program from the Internet? buy stocks. Encryption I only irc . Using the Internet to pursue.IN214 The formal rules and parameters which are established to permit a microcomputer to communicate with the mainframe computer as though it was a terminal of the mainframe are called IN215 The two most common tools used to help with extracting information are: Modems cookies and Trojan horses.

A very common abbreviation used include: Web query. A system that uses the Internet for business-to-business interaction is called a(n): extranet. IN235 IN236 IN237 XML. you find a useful website. IN246 A block of text automatically added to the end of an outgoing email is called an attachment. VoIP IN247 IN248 Most client/server applications operate on a three-tiered architecture consisting of which of the following layers? Which do you NOT need to connect to the Internet? IN249 What does FTP stand for? Desktop client.IN232 The major advantage of the checksum program is when it Adds more bytes to programs IN233 Which of the following is a Web browser? HTML IN234 A Web page is another name for ----------Domain names must contain a description of the type of organisation that the domain represents. a screensaver. After desired site is turning on his computer how would he do this? found IN240 Which of the following is used to update a Web query? IN241 You download from the internet. _________ refers to the use of Internet technologies for placing telephone calls.com is used for company A standard language for creating and formatting Web documents is: The Web page format in which all elements of a Web page are saved as one file is called: round trip HTML. You also add a hyperlink. using Internet Explorer to view a Web page that is stored on the hard drive on your computer IN238 Which of the following requires an Internet connection? IN239 Click on the Back arrow until the Mr Rao wants to find a website that he briefly browsed over yesterday. Save it to a floppy What is the most efficient way to access the site at a later time? disk. Which of the media elements has the greatest effect on the file size? Hyperlink When saving a photograph for use on a website. application. Modem File Transfer Program . and database. which format should you choose? BMP IN242 IN243 IN244 IN245 the Refresh command While researching the Direct taxes assignment. . a ten-second sound file and a ten-second music video clip.

. uk The US government IN254 What does IRC stand for? Internet Relay Chat IN255 If you do not pick up your email for a week.? IN256 What does HTML stand for? It will be deleted Hyper Textual Mark-up Lingo What is a disadvantage of joining a mailing list? Receiving messages automatically from anyone in the group IN257 .2. org.trigg @ domain.1.3 paul .So computers can be referenced by a name IN250 What is the purpose of DNS? IN251 Which of the following is NOT a properly formatted IP address? IN252 Which of the following is a properly formatted email address? IN253 The Internet is controlled by whom? 193..

encybrit.mails call and wireless system application servers.com DNS network of network built-in www.jpeg hotlink B service.port.bmp C service.jpeg op3 op4 ans MS Internet Explorer and Netscape Navigator None of the above C symbols video C hotword in user-defined order home .mail identification and password mailing lists.gif and .hostname and port B mail vendors.op2 Netscape Navigator and Mosaic data from a database hypertext in sequential order start .port and path directory path none of the above B none of the above C .bmp and .com FTP intermediate network none of the above B A B B A none of the above B none of the above B none of the above B none of the above B .directoryservice.proxy servers and web servers none of the above B business broadcasting system large windows sockets Yahoo bulletin broadcasting system very small windows stocks PINE none of the above none of the above none of the above Lynx cache www.mail server robots and gateways to other services none of the above C <font size=n> <hr size=n> <l1 type=shape> common gateway interface Client the net peer-to-peer connectivity parcel ECRN classified general instructions Browser intranet none of the above B User A none of the above B D mailto and files wan packets CARN newsgroups and search engines none of the above B none of the above A NET A bulletin boards.eb.wmf and .hostname .

transport layer physical layer session layer D ping service ftp service none of the above A TELNET uniform resource locator name of the resource scheme Microsoft web read the Usenet news ARCHIE unlimited restore locator none of the above C none of the above none of the above general electric editor spy mosaic scheme command line sears browser search for database wincim or maccim gopherspace cyberspace none of the above C open text excite none of the above B ftp server directories web server image list none of the above A none of the above C maximum of five lower directory one top index many middle and lower glossary B D C index search.item item search.0 CompuServe telnet Hyper text transfer port none of the above none of the above C C D D transmission control protocol/internet protocol two domain name servers the internet administration transfer communication protocol/internet protocol three none of the above B none of the above C web servers none of the above B C C C the internet access none of the above A .menu menu search.index search search search excite lycos all the above C D none of the above B C C C B none of the above C none of the above C cello mosaic internet finger service Hyper text transmission port ftp ftp lynx Lycos IBM ftp Hyper text transfer protocol uucp telnet all the above navigator gold 2.

text xecutables none of the above A home page global networks navigator electronic mail welcome page grand network news search engines none of the above B Netscape page starter site.protocol hyper text transfer protocol uniform resource locator frequently asked question site higher type transfer protocol uniform resource label frantically asked question organization TCP.netscape page wizard yahoo and altavista none of the above B none of the above B none of the above B .ie world wide web client index world search for information and research council mosaic.clevela university of nd freenet California net IP address dns none of the above B none of the above A ftp and finger wais.gopher none of the above B none of the above B interface hotwords none of the above B none of the above B very organised network integration and communication application B none of the above B name of the above B none of the above B A verification on network integration and communication none of the above A university of cleveland.images animation.scripts.UDP none of the above A response request close windows sockets internets relay chat netscape.allsrc waisman none of the above A none of the above B none of the above B telnet and ftp wais.winsocks winsock hyper transfer hyper text markup markup language language hyper text books marks none of the above C none of the above B applets animation none of the above B programms.IP IP.e .

ie.netscape and pine network connections mails B COLOR FCOLOR FONTCOLOR B netscape.telnet ftp archive point review bitnet all the above Delphi none of the above D fidonet A bookstores none the above D more information database galenet channel A B biographical information on-line reference works web directories Graphical interchange Format Jumbled pictures expert graph documents D Graphical interface Graphical Interface format format B Joint pictures experimental group A browsers C web pages Joint pictures expert graph net eudora.lynx none of the above C Common graphical Communication Common Interface graphical interface Gateway Interface D Interface Communication Connection B Browser Client None of the above B Server Web Channel Uniform resource locator United relay limited None of the above neither text nor image only text or image image PLSQL SGML CGI betalanguage metalanguage none of the above pancake is not palm is not elm edible none of the above SGML Preprocessor SGML Parser SGML Composer images applets documents A B C C C B C A International Internet Engineering Engineering Task trainers and faculty Force None of the above C .

VAN MAN MAN digital none of the above B none of the above B LAN.ly nx.news.extranet none of the above A music and dance cooking and dining none of the above A Hotlink text markup Hyper transfer language meta language united states & england.WAN.inet intranet.ie.winsock all of the above B ARPANET none of the above B defensive advanced dedicated and research projects registered projects administration administration net none of the above C begin first none of the above B mailnet.gopher.trumpnet arpanet email.eu dora.MAN TAN WAN non-digital Document type Define type of data definition Modulation/demo Manipulate/demani dulation pulate none of the above none of t he above none of the above none of the above Document type data Modulation none of the above B Manipulation C B C B C none of the above B .store and forward network anonymous ftp smart network and dumb network none of the above B file transfer none of the above B KAN.cooking and fine arts mosaic.internet tools none of the above C communicator.file retrived.RAN.norway Russia Hyper text markup Language D client network none of the above C stand-alone servers none of the above C none of the above B network topology network redirectors none of the above B data terminal equipment physical layer data target equipment network layer packet switching.

com Judge of a civil court Virus Charles Bubbage Dell . Cracker Howard Aiken Msn .Dedicated access and dial up access Stream line internet protocol Point to point protocol Cable and wires Serial line protocol Pillar to pillar protocol sending information to a host computer receiving storing data on the information from a hard drive host computer B Speed Size Channel A Save Browse Retrieve C Digital Signature Cryptography Message Digest C Lock Hash Function Formula A Password Retrieval Name Cryptography Address B Password Cracker A Regulations Address Protocols D Imposting Threat Unauthorising Exposure Approving Hacking A B Income .com B C A B Any Time Money Asynchronous Transmission mode None of above C Regulations Gateway Address Port Protocols Pin C B WAN hypertext tracing program Network Interface card CAN hypertext transfer protocol New Information Card PAN hypertext tracing protocol A Can not computers Only printers none of the above B none of the above C none of the above B C None of the above B None of the above D .com Police officer of IPS rank.tax authorities Pirated software Hoffman Amazon .

None of the above B None of the above All of the above None of the above 48 MB A D A A . All of Above B Bridges and Hubs Packets router Hubs and nodes B None of the above C virus checker A Two Data-Link Layer Four Network Layer None of the above C All of the above D Coaxial cable Fiber Twisted pair Logical address A memory address None of the above B Hub Router B None of the above B Wired Technology Data Link Layer ASCII 48 Bytes It continue on to target device with corrupt data Ultra violet technology Network Layer Octal 48 KB a list of rules for transferring data over a network a gateway calling software that program for allows file copying internet bridging B Client Server Network PC C If one node goes down.Combines connectivity of a hub with the traffic regulation of a bridge Two or more networks frames gateway Switches data from incoming ports to outgoing ports. it brings down the entire ring If the hub goes down. it brings down all of the nodes on all of the rings B Topology Star Parallel Circular Both A and B Ring Both A and B Linear None of the above All of above None Both A and B B D A B Bus Star Mesh C Bus Bus Star Linear Mesh Ring B C Bus Star Mesh A It gets destroyed bit by bit. it brings down all of the nodes on that section If the hub goes down.

DecNET. token ring. FDDI kbps Kbps Physical Layer Ethernet. token ring.Transport Layer Ethernet. ARCnet mips Mips D B B C depend on the measured in bytes transmission per second medium a modem Windows 95 limited by modem speeds Netscape C B must use electronic mail must have a LAN account All of the above A uniform resource locator common gateway application interface protocol interface used to control a printer a modem Novell Netware interfaces a modem to a computer Windows package Windows NT connects a computer to a network D Netscape B None of the above C have to do with Web pages the Internet none of the previous must use electronic mail must have a LAN account modem bridge is a CPU functional unit is a CPU register use appropriate communications software none of the previous used to browse the Web is part of Netscape uses wireless communication medium is part of Netscape None of the above a screen saver program a poor file server none of the previous none none of the previous CD-ROM is a CPU register browser A A D make of processor A is a protocol for the transfer of files between computers a form of virus an email server IR system for the Internet C D D D D C clip-art file search engine D is a CPU functional unit make of processor A . FDDI mbps Mbps Data Link Layer Ethernet.

It works the same way as a local network. Individual computers can connect to it using an ISP. E-mail Adware ActiveX-enabled sites are safe. C It is made up of many networks connected into transmission lines called backbones. Use of passwords Use of logical access methods through an FTP port. Application updates A worm Spyware D D .is a protocol for the transfer of used to browse the files between Web is part of Netscape computers D uses telephone lines is a protocol that allows for remote is part of Netscape login D Any layer can communicate directly with any other layer. by attaching itself to a document. Any layer can communicate only with the layer directly above or below it. Any layer can communicate only with the layer above it. A System intrusion Denial of Service Port sniffing C a form of virus a screen saver program none of the previous D Flood a Web server with requests Virus that initiates a ping flood UDP flood A packet flood traffic C router switch hub B an email server Update virus definitions a poor file server none of the above D Backup data on a Limit logging on daily basis access C Only large nameThere are safe recognizable sites and unsafe sites. are safe. B Use of encryption methods D B Web traffic by scanning the computer for a connection.

loggers. bank account. Web stalking. Never use your real identity. viruses. D Phishing Siphoning Hoaxing B cyber stalking.Protocols Multiplexors Trojan horses and cookies and key key loggers. LAN key loggers and worms. B An attack with the purpose of gaining publicity Disruption in communication Giving out disinformation Disruption in supply lines Changing the content of a Web page D All of the above are correct. spam. property. D Shutdown of military security systems Contaminating water systems Shutdown of nuclear plant safety systems D To improve network services To obtain an accurate inventory of network related equipment and To improve system parts and response time network nodes D limit access to computer owners only Yahoo People Search stop its competitors seeing their prices USA People Search update its prices as soon as they are changed D Lycos Search B Date of birth Fraud Personal assets Adware Criminal records Spyware A B C make large amounts of money by parking purchase off-shore funds in their invest without risk. B B Message Physical Security sequence number controls checking II only Both I & II Logical access controls Neither I or II B C ftp telnet C www . software. Use anti-spyware Use a proxy server. virtual stalking. B cookies.

B B None of the above A one way HTML. C intranet.Verifies integrity of files Increases boot up time Internet Explorer Microsoft Excel round trip HTML HTML document. an encryption. and hardware. CD-ROM File Transmission Protocol Desktop server. HTML. B IPT IPP PoIP A Desktop client.co in used for . and hardware. Telephone line File Transfer Protocol Desktop server. a footer. clicking a hyperlink that references a updating the document that is values that are stored in the floppy obtained through drive on your a Web query computer Click on ‘Go to’ or ‘Search’ in the browser Misleads a program recompilation both HTML and Internet Explorer B Web browser. ‘Bookmarks’. C MHTML D viewing an Excel worksheet that you have saved as a Web page. . software. Cut and paste it to a word processor document. software. DHTML. privileged network. application.con is used for company companies the World Wide Web Consortium HTML. A None of the above B None of the above B . document. network topology A a signature. and database. B Go to the History Go to the page and look for Bookmarks or the site Favorites page C the Insert Hyperlink the Update command command the External Data command A Screensaver Sound Video C GIF JPEG TIFF C Add it to Write it down on a ‘Favourites’ or piece of paper.

So IP addresses can be shorter So email is delivered faster 45.domain.215.1.19 paul.uk paul.1.12.uk Scientists in Switzerland No-one International Relay Internet Remote of Characters Conversations It will be waiting for you to collect it Hyperlink Text Marking Language None of the above A None of the above D None of the above B None of the above C None of the above A A letter will be sent to you in the post None of the above A Hyper Text Markup Language None of the above C People discussing a topic of interest High volumes of globally email None of the above C .trigg@domai n.1 143.org.

transforming the data into transmittable form.q_id EC1 EC2 EC3 EC4 EC5 EC6 EC7 EC8 q_desc The acronym for B2B is ___________ The _____________ model is the least intrusive model but requires active search on the part of the customer __________ is / are a form of advertisement where people relate their experience with products and services The _________ are software agents who communicate with the business merchants on behalf of the customers The Pre-purchase preparation phase includes _______________ for a set of products The _________ phase includes customer service and support to address customer complaints . transmitting the data and downloading the data are the operations employed in _________ Compiler EC12 EC13 The _________ commerce assists in integrating the customers and suppliers of the company directly into the organisation E-cash means______________________ EC14 EC15 EC16 EC17 EC18 E-commerce is a tool that addresses the desire of firms to cut services cost and improving the quality of goods. data extraction. the translation service receives _________ as incoming files from the communication service The EDI standardisation for International Trade and Commerce is introduced by __________ Business-to-Business Emergency Cash Communication Perspective Microcash Decryption Internal Format File ANSI EC20 In EDI. Commerce and Transaction EC10 The __________ allows for protocol conversion and communicates with the bank using the banks private network or the Internet EDI EC11 In Ecommerce. It is a definition of e-commerce from _________ The small denomination digital tokens are called _________ The ____________ is the process of encoding information to prevent it from being read by unauthorized parties In EDI interface. product returns and products defects The ________ allow companies to bypass the need for costly printed catalogs A ________________ is a basket on the Net that is used to place the items that are being purchased op1 Business-toBusiness Billboard Customer Endorsements Intermediaries Order Placement Post purchase interaction Billboard model of marketing Online Catalog EC9 EDIFACT is an abbreviation of ________ EDI For Administration. the transmission files are composed of different sets of external format files which are grouped into multiple sets under the name of ________ batch files The ________________ are pre-paid credit cards that include an embedded cards Smart Card EC21 ________________ are another form of credit payment that lets customers use digital online cheques to pay Web merchants directly EC19 E-cash .

com is an example of_______ Which of the following is an example of unacceptable online ‘netiquette’? Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system? True Login_Id and Password Broadcast E-mail single-user database application Replying promptly Removable drives that can be locked up at night provide adequate security when the confidentiality of data is the primary risk.In Active advertisement. . in active based advertisement. there are two types of models. They are _____ and ________ The network based technology is/are ____________ Decryption is a process employed for scrambling of plain text for web based transactions Asymmetric cryptosystem is based on __________ and ____________ Billboards and Junk Mail EDI Global Network Active or push based advertising EC29 Value Added Network is an example of _________ The advertising strategies emerging in the on-line world are ____________ The _________ model use direct mail. spot television or cable television. The ________ is a form of mail that is not targeted to a specific audience EC30 The __________ model refers to information that is placed at a point where it will be noticed by customers in the course of other activities and does not require active search Catalog EC32 The most beneficial advantage of ERP system is What is the term that describes spying on one’s business rivals to gain a competitive advantage? Error checking Competitive espionage EC33 A list of competitor’s What would you NOT be looking for when spying on a competitor? clients EC22 EC23 EC24 EC25 EC26 EC27 EC28 EC31 EC34 EC35 EC36 An online drugstore such as Drugstore.

COM Search and discovery Domains A None of the above C Service Purchase consummation Online catalog Pre-purchase preparation Endorsement model of marketing Shopping cart Search and discovery A None of the above B Billboard Pulling cart B EDI For Administration.op2 op3 op4 ans Business-to-Backend Backend-to-Business Business. Consumer and Transport EDI For Administration.to-Billboard A On-line Catalog Endorsements Broadcast B Billboard Catalog Broadcast A portals . Commerce and Transport None of the above C TCP/IP EFT Gateway D Interpreter Assembler EDI D Business-toConsumer Electronic Cash Consumer-toBusiness Euro Cash Customer-toCompany Endorsed Cash B B Business Process Perspective Micro Transactions Service Perspective None of the above TT(Tiny token) E-token C A SSL Encryption Subscription C External Format File Transmission File None of the above C UN/EBCDIC UNESCO UN/EDIFACT D interchange sets functions functional groups D Embedded cards SET None of the above A Digital Cash Smart Cards Electronic cheques D .

Security at the transaction phase in EDI systems is not necessary because problems at that level will be identified by the service provider. e-commerce database application A competitor’s new project B Including the Subject None of above Using all capital letters C Encryption performed by a physically secure hardware device is more secure than encryption performed by software. C D .Online Catalog and Billboards E-mail Online Catalog and Broadcast and Junk Customer Mail Endorsements EFT All of the above False Primary Key and Private Key Public Key and Password C D B Public Key and Private Key D Private Network Satellite Area Network None of the above Passive or pull-based Glow sign or hoarding advertising strategies All of the above B Junk mail Billboard Endorsements A Bulk-mail Direct-mail Junk mail D Endorsement Billboard Broadcast C Data Integration Low cost of operation Quality management D B Corporate espionage Industrial espionage Economic espionage C Contact numbers of the management group Research data multi-user database application Keeping messages short Message authentication in EDI systems performs the same function as segregation of duties in other information systems.

Ceremony._______. __________ is of standard length which is usually much smaller than the message but nevertheless substantially unique to it. DS1 DS2 op1 Digital Sign Hash Function Hash Function Digital Signature creation Institutional Overhead and Subscriber Relying Party Cost Certification Authority DS5 The Costs of Digital Signature consists mainly of the following DS6 DS8 CA stands for ________________ A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key A Digital Certificate does contain Owner's Public Key. True Server Certificate ______________ are used by individuals when they exchange messages with other users or online services._______ and _______ The most widely accepted format for Digital Certificate is defined by the CCITT X. ______________ are on-line databases of certificates and other information available for retrieval and use in verifying digital signatures. DS4 Digital Signature involves two processes.509 A certificate may prove to be unreliable. Serial number of the digital certificate DS9 ______________ enable web servers to operate in a secure mode. Expiration date of the Private Key. Owner's name. __________ is an algorithm which creates a digital representation or "fingerprint" in the form of a "hash result". They are ___________ and __________. Subscriber DS17 A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named in the certificate is called the ____________ Recipient Party DS15 DS18 DS19 The Relying Party can use the ___________ listed in the certificate to verify that the digital signature was created with the corresponding _________ Digital Signatures are used for a variety of Electronic Transactions like ________________________ Public Key E-mail . such as in situations where the subscriber misrepresents his identity to the certification authority True Evidence. Server Certificate Private Certificate DS7 DS10 DS11 DS12 DS13 DS14 Signing Writings serve the following general purposes______.q_id DS3 q_desc ___________ means the result of applying to specific information certain specific technical processes. Approval True True DS16 CRL stands for The prospective signer identified in the digital certificate holds the_________ and is called the ___________ Certificate Revocation List Private Key.

Cryptography The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily termed as _________. or to protect the recipient against false denial by the sender that the Nonrepudiation data was sent. DS35 Which of the following risks can be minimized by requiring all employees accessing the information system to use passwords? Collision.DS20 To associate with a key pair with a prospective signer. DS33 A digital signature is used primarily to determine that a message is: Unaltered in transmission. Decryption DS32 Which of the following activities would most likely detect computer-related fraud? Using data encryption. Service ___________ serves the ceremonial and approval functions of a signature and establishes the sense of having legally consummated a transaction. DS34 What is a major disadvantage to using a private key to encrypt data? Both sender and receiver must have the private key before this encryption method will work. and ____________ Private Key DS31 _______ is known only to the signer and is used to create the digital signature. a Certification Authority issues Digital Certificate Not False DS21 Digital Signatures. Private Key _______ is ordinarily more widely known and is used by a relying party to verify the digital signature. __________ and _____________ Closed System. DS30 . Digital Signature. Private Key ____________ is the art of protecting information by transforming it into an unreadable format. if properly implemented and utilized offer promising solutions to the problems of Imposters. Affirmative Act ________ is a branch of applied mathematics concerns itself with transforming messages into seemingly unintelligible forms and back again. Message Integrity.Formal Legal requirements In. _____________ perform the "ceremonial" function of alerting the signer to the fact that the signer is consummating a transaction with legal consequences A Digital Signature must have the following attributes ________________ and _____________ "Hash Function" is used in both creating and verifying Digital Signature Affirmative Act Signer Authentication Not True DS22 DS23 DS24 DS25 DS26 DS27 DS28 DS29 ___________ provides assurance of the origin or delivery of data in order to protect the sender against false denial by the recipient that the data has been received.

Efficiency and Logistics A C B D False A False A Certificate Resource List Public key.op2 op3 Digital Digital Certificate Signature op4 None of the above C Digital Signature Digital Certificate Private Key A Hash Value Both B and A D Digital Signature Verification Both A and B Either A or B C Subscriber Relying Party Cost Certified Authority None of the above None of the above Hash Result Institutional Overhead Certificate Authority ans A A False A False Developer Certificate B Developer Certificate Repositories Approval. Recipient certificate Revocation Letter Private Key. Recipient None Of The Above None Of The Above Relying Party Either A or B Neither A nor B B Private Key Electronic Commerce Both A and B Electronic Fund Transfers Both B and A C All The Above D A A . Evidence Personal Digital Certificate None of the above Personal Digital None of the certificate above none of the Public Key above Efficiency and logistics. Ceremony. Evidence Evidence. Approval.

vulnerability. Received by the intended Sent to the recipient. The private key is used by the receiver for decryption but not by the sender for encryption. The private key is used by the sender for encryption but not by the receiver for decryption. A The private key cannot be broken into fragments and distributed to the receiver.Not True Formal Legal Requirements Efficiency Document Authentication Not False A Open System Formal Legal Requirements. log. D Not intercepted en route. Conducting Reviewing the fraud-awareness systems-access training. A Public Key Private Key None of the above A Public Key Both A and B Either A or B C Public Key Both A and B Either A or B A Public Key Both A and B Either A or B B Cipher Encryption Cryptography C Performing validity checks. A D . Open System D Signer authentication None of the above A Both A and B Neither A nor B C B Digital signature Digital certificate Private Key A Efficiency Either A or B Neither A nor B. Failure of server duplicating Firewall function. correct address. Data entry errors.

q_id AC1 AC2 AC3 AC4 AC5 AC6 AC7 AC8 AC9 AC10 AC11 AC12 AC13 AC14 AC15 AC16 AC17 AC18 AC19 AC20 AC21 AC22 AC23 AC24 .

AC25 AC26 AC27 AC28 AC29 AC30 AC31 AC32 AC33 AC34 AC35 AC36 AC37 AC38 AC39 AC40 AC41 AC42 AC43 AC44 AC45 AC46 AC47 AC48 .

AC49 AC50 AC51 AC52 AC53 AC54 AC55 AC56 AC57 AC58 AC59 AC60 AC61 AC62 AC63 AC64 AC65 AC66 AC67 AC68 AC69 AC70 .

AC71 AC72 AC73 AC74 AC75 AC76 AC77 AC78 BC1 BC2 BC3 BC4 .

BC5 BC6 BC7 BC8 BC9 BC10 BC11 BC12 BC13 BC14 BC15 BC16 BC17 BC18 BC19 BC20 BC21 .

CA1 CA2 CA3 CA4 BC22 BC23 BC24 BC25 BC26 BC27 BC28 BC29 BC30 BC31 BC32 BC33 BC34 BC35 .

BC36 BC37 BC38 BC39 BC40 BC41 BC42 BC43 CA5 CA6 CA7 CA8 CA9 CA10 CA11 CA12 CA13 CA14 .

CA15 CA16 CA17 CA18 CA19 CA20 CA21 CA22 CA23 CA24 CA25 CA26 CA27 CA28 CA29 .

CA30 CA31 CA32 CA33 CA34 CA35 CA36 CA37 CA38 CA39 CA40 CA41 CA42 CA43 CA44 CA45 CA46 CA47 CA48 CA49 CA50 CA51 CA52 CA53 CA54 .

CA55 CA56 CA57 CA58 CA59 CA60 CA61 CA62 CA63 CA64 CA65 CA66 CA67 CA68 CA69 CA70 CA71 CA72 CA73 .

CA74 CA75 CA76 CA77 CA78 CA79 CA80 CA81 CA82 CA83 CA84 CA85 CA86 CA87 CA88 CA89 .

CA90 CA91 CA92 CA93 CA94 CA95 CA96 CA97 CA98 CA99 CA100 CA101 CA102 CA103 .

CA104 CA105 CA106 CA107 CA108 CA109 CA110 CA111 CA112 CA113 CA114 DB1 DB2 DB3 DB4 DB5 .

DB6 DB7 DB8 DB9 DB10 DB11 DB12 DB13 DB14 DB15 DB16 DB17 DB18 DB19 DB20 DB21 DB22 DB23 DB24 DB25 DB26 DB27 .

DB28 DB29 DB30 DB31 DB32 DB33 DB34 DB35 DB36 DB37 DB38 DB39 DB40 DB41 DB42 DB43 DB44 DB45 DB46 DB47 DB48 DB49 .

DB50 DB51 DB52 DB53 DB54 DB55 DB56 DB57 DB58 DB59 DB60 DB61 DB62 DB63 DB64 DB65 DB66 DB67 DB68 DB69 DB70 DB71 DB72 DB73 .

DB74 DB75 DB76 DB77 DB78 DB79 DB80 DB81 DB82 DB83 DB84 DB85 DB86 DB87 DB88 DB89 DB90 DB91 DB92 DB93 DB94 DB95 DB96 DB97 DB98 DB99 DB100 DB101 DB102 DB103 DB104 DB105 DB106 DB107 DB108 DB109 DB110 .

DB111 DB112 DB113 DB114 DB115 DB116 DB117 DB118 DB119 DB120 DB121 DB122 DB123 DB124 DB125 DB126 DB127 DB128 DB129 DB130 DB131 DB132 DB133 DB134 DB135 DB136 DB137 DB138 DB139 DB140 DB141 DB142 DB143 DB144 DB145 DB146 DB147 DB148 .

DB149 DB150 DB151 DB152 DB153 DB154 DB155 DB156 DB157 DB158 DB159 DB160 DB161 DB162 DB163 DB164 DB165 DB166 DB167 DB168 DB169 DB170 DB171 DB172 DB173 DB174 .

DB175 DB176 DB177 DB178 DB179 DB180 DB181 .

DB182 DB183 DB184 DB185 DB186 DB187 DB188 DB189 DB190 DB191 .

DB192 DB193 DB194 DB195 DB196 DB197 DB198 DB199 DB200 DB201 .

DB202 DB203 DB204 DB205 DB206 DB207 .

DB208 DB209 DB210 DB211 DB212 DB213 DB214 DB215 DB216 .

DB217 DB218 DB219 DB220 DB221 DB222 DB223 DB224 DB225 DB226 DB227 .

DB228 DB229 DB230 DB231 DB232 DB233 DB234 DB235 DB236 DB237 DB238 DB239 DB240 DB241 DB242 .

DB243 DB244 DB245 DB246 DB247 DB248 DB249 DB250 .

DB251 DB252 DB253 DB254 DB255 .

DB256 DS1 DS2 DS3 DS4 DS5 DS6 DS7 DS8 DS9 DS10 DS11 .

DS12 DS13 DS14 DS15 DS16 EC17 EC18 EC19 EC20 EC21 EC22 EC23 EC24 EC25 EC26 .

EC27 EC28 EC29 EC30 EC31 EC32 EC33 EC34 EC35 EC36 .

EX1 EX2 EX3 EX4 EX5 EX6 EX7 EX8 EX9 EX10 EX11 EX12 EX13 EX14 EX15 EX16 EX17 EX18 EX19 EX20 IN9 IN10 .

IN11 IN12 IN13 IN14 IN15 IN16 IN17 IN18 IN19 IN20 IN21 IN22 IN23 IN24 IN25 IN26 IN27 IN28 IN29 IN30 IN31 IN32 .

IN33 IN34 IN35 IN36 IN37 IN38 IN39 IN40 IN41 IN42 IN43 IN44 IN45 IN46 IN47 IN48 .

IN49 IN50 IN51 IN52 IN53 IN54 IN55 IN56 IN57 IN58 IN59 IN60 IN61 IN62 IN63 IN64 .

IN65 IN66 IN67 IN68 IN69 IN70 IN71 IN72 IN73 IN74 IN75 IN76 IN77 IN78 IN79 IN80 .

IN81 IN82 IN83 IN84 IN85 IN86 IN87 IN88 IN89 IN90 IN91 IN92 IN93 IN94 IN95 IN96 .

IN97 IN98 IN99 IN100 IN101 IN102 IN103 IN104 IN105 IN106 IN107 IN108 IN109 IN110 .

IN111 IN112 IN113 IN114 IN115 IN116 IN117 IN118 IN119 IN120 IN121 IN122 IN123 IN124 IN125 IN126 .

IN127 IN128 IN129 IN130 IN131 IN132 DS17 DS18 DS19 DS20 DS21 DS22 DS23 DS24 DS25 DS26 .

DS27 DS28 DS29 DS30 DS31 DS32 DS33 DS34 DS35 EC1 EC2 EC3 EC4 EC5 .

EC6 EC7 EC8 EC9 EC10 EC11 EC12 EC13 EC14 EC15 EC16 EX21 EX22 EX23 EX24 EX25 EX26 .

EX27 EX28 EX29 EX30 EX31 EX32 EX33 EX34 EX35 EX36 EX37 EX38 EX39 EX40 EX41 EX42 EX43 EX44 EX45 .

EX46 EX47 EX48 EX49 EX50 EX51 EX52 EX53 EX54 EX55 EX56 .

EX57 EX58 EX59 EX60 EX61 EX62 EX63 EX64 EX65 EX66 EX67 EX68 .

EX69 EX70 EX71 EX72 EX73 EX74 EX75 EX76 EX77 EX78 EX79 .

EX80 EX81 EX82 EX83 EX84 EX85 EX86 EX87 EX88 EX89 EX90 EX91 EX92 EX93 EX94 EX95 EX96 .

EX97 EX98 EX99 EX100 EX101 EX102 EX103 .

EX104 EX105 EX106 EX107 EX108 EX109 EX110 EX111 EX112 EX113 EX114 EX115 .

EX116 EX117 EX118 EX119 EX120 EX121 IN1 IN2 IN3 IN4 IN5 IN6 IN7 IN8 IN133 IN134 IN135 .

IN136 IN137 IN138 IN139 IN140 IN141 IN142 IN143 IN144 IN145 IN146 IN147 IN148 IN149 IN150 IN151 .

IN152 IN153 IN154 IN155 IN156 IN157 IN158 IN159 IN160 IN161 IN162 IN163 IN164 IN165 IN166 .

IN167 IN168 IN169 IN170 IN171 IN172 IN173 IN174 IN175 IN176 IN177 IN178 IN179 IN180 IN181 IN182 IN183 IN184 .

IN185 IN186 IN187 IN188 IN189 IN190 IN191 IN192 IN193 IN194 IN195 .

IN196 IN197 IN198 IN199 IN200 IN201 IN202 IN203 .

IN204 IN205 IN206 IN207 IN208 IN209 IN210 IN211 IN212 IN213 IN214 IN215 IN216 .

IN217 IN218 IN219 IN220 IN221 IN222 IN223 IN224 IN225 IN226 IN227 IN228 .

IN229 IN230 IN231 IN232 IN233 IN234 IN235 IN236 IN237 IN238 IN239 .

IN240 IN241 IN242 IN243 IN244 IN245 IN246 IN247 IN248 IN249 IN250 IN251 IN252 IN253 .

IN254 IN255 IN256 IN257 PP1 PP2 PP3 PP4 PP5 PP6 VB11 VB12 VB13 VB14 VB15 VB16 VB17 .

VB18 VB19 VB20 VB21 VB22 VB23 VB24 VB25 VB26 VB27 VB28 VB29 VB30 VB31 VB32 VB33 VB34 VB35 VB36 VB37 VB38 VB39 VB40 VB41 VB42 VB43 .

VB44 VB45 VB46 VB47 VB48 VB49 VB50 VB51 VB52 VB53 VB54 .

VB55 VB56 VB57 VB58 VB59 VB60 VB61 VB62 VB63 VB64 VB65 VB66 VB67 VB68 .

VB69 VB70 VB71 PP7 PP8 PP9 PP10 PP11 PP12 PP13 PP14 PP15 PP16 PP17 .

PP18 PP19 PP20 PP21 PP22 PP23 PP24 PP25 PP26 PP27 PP28 PP29 PP30 PP31 PP32 PP33 PP34 PP35 .

PP36 PP37 PP38 PP39 PP40 PP41 PP42 PP43 PP44 PP45 PP46 PP47 .

PP48 PP49 PP50 .

PP51 PP52 PP53 PP54 PP55 PP56 PP57 PP58 .

PP59 PP60 PP61 PP62 PP63 PP64 .

PP65 PP66 PP67 PP68 .

PP69 PP70 PP71 PP72 PP73 PP74 .

PP75 PP76 PP77 PP78 .

PP79 PP80 PP81 PP82 PP83 VB1 VB2 VB3 VB4 VB5 VB6 VB7 VB8 VB9 VB10 .

VB72 WO1 WO2 WO3 WO4 WO5 WO6 WO7 WO8 WO9 WO10 WO11 WO12 WO13 WO14 WO15 WO16 WO17 .

WO18 WO19 WO20 WO21 WO22 DA13 DA14 DA15 DA16 DA17 DA18 BC44 BC45 BC46 BC47 .

BC48 BC49 BC50 BC51 BC52 BC53 BC54 .

BC55 BC56 BC57 BC58 BC59 BC60 BC61 BC62 BC63 BC64 BC65 BC66 BC67 BC68 BC69 .

BC70 BC71 BC72 BC73 BC74 BC75 BC76 BC77 BC78 BC79 BC80 .

BC81 BC82 WO23 WO24 WO25 WO26 WO27 WO28 WO29 WO30 WO31 WO32 WO33 WO34 WO35 WO36 WO37 WO38 .

WO39 WO40 WO41 WO42 WO43 WO44 WO45 WO46 WO47 WO48 WO49 WO50 WO51 .

WO52 WO53 WO54 WO55 WO56 WO57 WO58 WO59 WO60 .

WO61 WO62 WO63 WO64 WO65 WO66 WO67 WO68 WO69 WO70 WO71 WO72 WO73 WO74 WO75 WO76 WO77 .

WO78 WO79 WO80 WO81 WO82 WO83 WO84 WO85 WO86 WO87 .

WO88 WO89 WO90 WO91 WO92 WO93 .

WO94 WO95 WO96 .

WO97 WO98 WO99 WO100 WO101 WO102 .

WO103 WO104 WO105 WO106 WO107 WO108 WO109 WO110 WO111 WO112 .

WO113 WO114 WO115 WO116 WO117 WO118 WO119 DA1 DA2 .

DA3 DA4 DA5 DA6 DA7 DA8 DA9 DA10 DA11 DA12 BC83 BC84 BC85 BC86 BC87 BC88 BC89 .

BC90 BC91 BC92 BC93 BC94 BC95 BC96 BC97 BC98 BC99 BC100 BC101 BC102 .

BC103 BC104 BC105 BC106 BC107 BC108 BC109 BC110 BC111 BC112 BC113 BC114 BC115 BC116 BC117 .

BC118 BC119 BC120 BC121 BC122 BC123 BC124 BC125 BC126 BC127 BC128 .

BC129 BC130 BC131 BC132 BC133 BC134 BC135 BC136 BC137 BC138 BC139 BC140 BC141 .

BC142 BC143 BC144 BC145 BC146 BC147 BC148 BC149 BC150 BC151 BC152 BC153 BC154 BC155 BC156 .

BC157 BC158 BC159 BC160 BC161 BC162 BC163 BC164 BC165 BC166 .

BC167 BC168 BC169 BC170 BC171 BC172 BC173 BC174 .

BC175 BC176 BC177 BC178 BC179 BC180 BC181 BC182 BC183 BC184 BC185 BC186 .

BC187 BC188 BC189 BC190 BC191 BC192 BC193 BC194 BC195 BC196 BC197 BC198 BC199 BC200 BC201 BC202 BC203 BC204 BC205 BC206 .

BC207 BC208 BC209 BC210 BC211 BC212 BC213 BC214 BC215 BC216 BC217 BC218 BC219 BC220 BC221 BC222 BC223 BC224 .

BC225 BC226 BC227 BC228 BC229 BC230 BC231 BC232 BC233 BC234 .

BC235 BC236 BC237 BC238 BC239 BC240 BC241 BC242 BC243 BC244 BC245 BC246 BC247 BC248 BC249 BC250 .

BC251 BC252 BC253 BC254 BC255 BC256 BC257 BC258 BC259 BC260 BC261 BC262 BC263 BC264 BC265 BC266 BC267 BC268 BC269 BC270 .

BC271 BC272 BC273 BC274 BC275 BC276 BC277 BC278 BC279 BC280 BC281 BC282 BC283 BC284 BC285 .

BC286 BC287 BC288 BC289 BC290 BC291 BC292 BC293 BC294 BC295 BC296 BC297 BC298 BC299 BC300 BC301 .

key can be used to select an existing company from list of companies.is the official notice that the firm sends to its customers to advise then to the amount of money that is owed. the -----------. --------------------. The Ledger Accounts are unique in Financial Accounting Packages Customers can be permitted to enter their own data into the firm’s computer using the firm’s wide area network is an example of In Tally.alteration mode. The re-order point is the inventory quantity that trigger a stock replishment activity.is/are useful for management in the decision making. option is that we can summarize many ledger accounts into one line statements In tally. and pay for replenishment of stock are --------------Tally allows to delete a ledger from --------.the group company must contain at least _____________ members To cancel a vourcher entry in Tally.q_desc The -----.all masters have ________main options In tally. we press ------------. we can customize the Vouchers as per our requirements The number of steps in Accounts Compilation are . we can alter ledger details using either single or multiple modes but not alble to delete a ledger from multiple modes.receive.directory stores all data entered by the user.a group company is marked with an ______________ The systems that work together to order. In tally. can be seen in ------------report. to print report . In the Tally Software. In tally. In tally. Import and Export of data between Tally and other programs is possible only through ---------Program. Types of Accounts and Types of Vouchers passed during the period. In Tally.the use of group behaves like a sub-ledger.function key to display the age-wise analysis of Bills Receivable or Bills Payable report In Tally. A created company's detail can be modified through keys A/An ------------. short-cut key is ----------- The accounting masters and inventory masters related to We press ------------.to create a new column in balance sheet press _______ In tally.

Revenue Account also known as -------------. The field can have a value between ________________ in FA Package.Account Method of Voucher Numbering is/are Accounts Receivable are displayed in To assemble a product from different items -------------. Tally provides at least --------. A ----------.entry is used A --------. if we press __________ then we get payment voucher in tally Default Cost Category in Tally is/are -------------A Group Company is simply a name and an identify given to the merged accounts member companies of the group.predefined voucher formats The value of the inventory is included in a ledger accounts as an asset on the balance sheet " The buyers can follow up with the suppliers to determine the reasons " is an example of ----------------From voucher entry mode .in Tally classify the accounts under different heads so that summarised information is possible. bills payables report The accounts payable system is responsible for paying the suppliers for the ----------------- .purchase orders data flow is directed to the purchasing system for use in closing out the outstanding purchase orders in the receiving system diagram. to change the date of the voucher press ______ Tally can maintain budgets on ---------------The value of the inventory is included as an asset on the balance sheet In ratio analysis report of Tally FA packagewe we press ________________ function key to the display of bills receivable .Each action/transaction of a firm is described by a ----------------.is a primary document for recording all financial transactions. The _______ file maintains data that describes the supplier past transaction with the firm in terms of material quality in AIS It is necessary to manipulate data to transform it into ---------------In tally. Tally is based on mercantile accounting system Ctrl + N is used to ----------------------.

Default stock category in tally is ______ To create a log of the import activity in a file _____________ is located in the same directory as an executable program in tally In Tally.given to the merged accounts of member companies of the group. if you press __________ from gateway of tally A constituent(member) company can be a member of more than one group. In tally.3 _________________ Tally encrypts and stores TALLY DATA at the data directory The Profit & Loss statement can be displayed in ---------------. Default ledger accounts in tally are ______ Default 'godown' name in tally is ____________ 'Tally vault' is a _________________ To create a sales voucher in tally . you have to press _______ A Group Company is ------------------------.inventory valuation method option is available from _______ .key."credit note" voucher type records entry for ________________ In tally you get currency symbol option from _______ menu -----------------.format(s).gives the balance for each day for the voucher type has been selected. "Administrator" type user is also called 'Auditor' of a company in Tally You will get company information . a list of inventory reports can be displayed straightaway from the balace sheet report Projected approximation of income or expenses is called ______________ . For 'stock journal' entry we press ______________ in tally Tally provides the capability to the administrator/auditor to track changes in the areas is/are In tally.What is the default financial year in Tally6. types of users are _______________ By pressing -------.

are used. User designated as --------------. Tally supports Importing of data from ---------------In an accounting information system. a group company can also be a constituent(member) of another group company Default number of groups in tally are ________ During voucher entry ------------.can view audit list.Tally audit feature is available in a company __________________ In tally. which of the following types of computer files most likely would be a master file? Which of the following is an advantage of a computer-based system for transaction processing over a manual system? A computer-based system: The memory address register is used to store Inefficient usage of excess computer equipment can be controlled by Which of the following is not the component of a CPU A trailer label is used on a magnetic tape file. it is the last record and summarises the file. The following is an information not found in the trailer label .

? Which approach or technique is a control usually associated with microcomputers An impact printer creates characters by using.....Hard copy is a term used to describe.? .....? The best security control in a microcomputer environment is to What would you NOT use with a flatbed plotter? What do you need for an ink jet printer? The greatest control exposure in a microcomputer environment is the lack of What do you need for an ink jet printer? A laser printer does NOT use? The amount of data that a disk may contain is known as the disks. Information on a hard disk is usually backed-up using a.? You can ________ protect a floppy disk.? What do the abbreviations VAB stand for What control would prevent the accidental erasure of customer information from a magnetic tape What are the individual dots which make up a picture on the monitor screen called? Header label normally include all the following except the A daisy wheel is a type of...

Using generalized audit software packages can add a lot of value _______ _______ is used for CAAT as database Generalized audit software perform auditors to undertake any past records and not concurrent auditing Generalized audit software is a file whose capabilities for verifying processing is logic Magnetic tape is a...? Which storage device has the largest capacity in Mb? Which storage device cannot be erased? You can ________ protect a floppy disk Where should floppy disks be stored? The contents of these chips are lost when the computer is switched off? What are responsible for storing permanent data and instructions? Which parts of the computer perform arithmetic calculations? What are small high speed memory units used for storing temporary results? How many bits of information can each memory cell in a computer chip hold? What type of computer chips are said to be volatile? Magnetic tape is a...? Software can be divided into two areas: .? Hard disks can have a storage capacity in the region of...

? Which generation of computer was developed from microchips? Which generation of computer uses more than one microprocessor? Which generation of computer developed using integrated circuits? Which generation of computer developed using solid state components? Name three steps involved in developing an information system CAAT's are computer program and data that auditor uses as part of the audit procedures to process data if audit significance contained in an entity information system CAAT do not contains package programs.. purpose written program. utility programs or system management programs Embedded audit routines are sometimes built into an entity's computer system to provide data for later user by the auditor SCARF involves embedding audit software modules within an application system to provide continuous monitoring Concurrent use auditors as the member of the system Regular cross system verification may minimize frauds Computer security is frequently associated with confidentiality. integrity and authentication Data reserve engineering process metadata to document system and abstract business rules and relationship The first step for developing CAAT is_________ Using the open database connectivity feature in ACL is ______________ .Travel agents use this computer system when reserving flights Which computers are used in the weather forecasting industry? Vacuum tube based electronic computers are..

radically changing the nature of audit evidence Computer operation controls are designed to provide ________________ Systems development control. testing.Computer Assisted Audited Technique involves the use of computers through "Black Box Approach" White Box Approach necessary involves expert knowledge on the part of Auditor The transition from manual system to CIS environment bring dramatic changes including ________________ Auditing with computer necessarily supports the CAAT involves an Auditors' appreciation of __________ Widespread end use computing result in unlimited errors creeping into system going to accept handling. approval. implementation and documentation of new systems software and system software modification A system could be _________ A system exhibits 'entropy' Super computer are the largest and fastest and is very suitable for commercial application including audit work Assembler language uses Mnemonic symbols . include authorization. thereby increasing audit risks For computerized auditing usage of sophisticated audit software would be a necessity Important knowledge needed to begin planning the use of CAAT is _________ The move towards paperless EDI would eliminate much of the traditional audit trail. apart from others.

customer profile. transactions are processed one after another The use of computer assisted audit techniques is not gaining popularity not only ________________ On-line processing refers to grouping of transaction and processing the same in one go from start to finish Real time refers to the technique of updating files with transaction data immediately after the occurrence of the event to which it relates In OLRT the CPU should process the capability of program interruption Time sharing system allow access to a CPU from remote terminals DSS is defined as a system that provides tools to managers to assist them in solving structured problems DSS has the following components _________________ Master files contains current records for identification and summarizing Transaction files contain relatively permanent records take product profile. employee profile etc Master file configuration includes ____________ ______ is a file management software package that lets users and programmers organize data into files and then process those files CAATS provide added value to the clients because _______________ File volatility refers to the number of addition and deletions to the file in a given period of time File activity is the proportion of transaction file records that are actually used and accessed in a given processing run: File interrogation refers to the _____ of information from a file One -to-one relationship means a single entity to a single entity in a monogamous structure RDBMS is structured to a series of 2 dimensional tables SADB stands for ____________ Controls are present over many aspects of the computer system and its surrounding social environment In framed checking the data entry is checked against an expected picture or format Errors are correlated_________ Field check is exclusive to a field . the function include_______________ General purpose software provides a framework for highly complex scientific operation In batch processing.Operating systems are devised to optimize the machine capabilities.

added to a code for determining the accuracy of other digits in the code Hierarchical code means _________ The validation checks applied to a field depend on the field's logical inter relationships with other fields in the record The contents of a field could determine _______ sign for a ______ field Batch is the process of ______ together _____ that bear some type of relationship to one another Hash totals means meaningless totals With OLRT where interactive data entry is available._________ law basically states that there is a specific probability of the first digit of a no. test involves_________________ Recording transactions in a controlled manner may amount to loss of stored data . being 1.2. individual modules are coded and individually tested and then assembled to be tested as a whole-the testing strategy is referred to as ___________________ In systems testing. the master file associated with a transaction may be searched for confirming data Controls are required for authorization to ensure data integrity and detect possible breaches in security Data from client application are not stored in the organization's database through auditables events and function All input records in a batch are normally of different types IDEA stands for _________________________________ A transaction file is sorted prior to the update of master file A sequence check on the transaction or master files by an update program is not required Whenever monetary transactions are processed against master files.3 etc Check digit is a group of nos. the update program should maintain a correlation account to record such transaction that does not have a matching master file record Internal tables are stored tables from which certain values are extracted for further processing and storing For small to medium sized systems.

Audit software is used by the auditor to _________ Core image comparison is a software used by the auditor to compare _______ version of a program with a secure ________ copy Database analyzer is a software which provides detailed information concerning the operation of the database SAS stands for ______________ Embedded code is a software used by the auditor to examine backup data Embedded code performs wide variety of audit task Core image comparison is particularly useful where only executable versions are distributed Log analysis is a software used by auditor to detect virus On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a specific program or sever edit test is doing its work Mapping software is used by the auditor to list unused program instructions Mapping software has very objectives Modeling is a variety of software which ________________ On line testing can be targeted for specific functions carried out by programs Program code analysis involves _____________ __________ is a software of CAAT Snapshot is software which takes a picture of a file or data or a transaction passing though the system .

Base case system evaluation includes____________ While base testing forces on finding if there are any defective execution policies in a program Black box testing seeks to determine whether application output is what it is supposed to be In integrated test facility approach the auditor should ensure that the impact of test transaction is subsequently eliminated from the computer files Black box testing is _______ based and white box testing is _______ based Source code review means__________ In formula in flow hypothesis the auditor should expand the extent of substantive tests to determine how the defects may impact the attainment of the program objectives All material application oriented events that occur within the boundary subsystem should be recorded in the accounting audit trail In examination of audit trail the following data associated with an event may be ___________- JCL means_________________ Audit should be periodically analyzed to detect any control weakness of the system In an accounting audit trail. intrusion detection system might monitor the amount of processor time consumed by the user to detect unusual deviation from the amount processor time requested by the user in the past A sample size calculator program assists auditors in determining RAND() function Generalized audit software consists ___________ .

dbl_click. test data is Which of the following is not the use of CAATs Which of the following are called explicitly by another procedure? _________ data type is generally used for fields assigned as primary keys in a table MS access objects can be published in the web In code-builder.Specializes audit program may be___________ Generalised audit software could be used by the following in consistencies or significant fluctuations Generalized audit software function include____________ In the file reorganization merging capabilities are needed in data from separate file is to be combined on a separate work file Auditors cannot use generalised audit software to extract the data needed for audit purpose Auditors can combine functional capabilities of generalized audit software to accomplish the task of __________________ Which of the following is not the feature of GAPs Which is the example of CAATs In audit procedures. got_focuse.enter are examples of _______ _______can be used to automate certain actions in response to events In the macro sheet the macro is selected in the _____field . click.

while using SQL. queries are maintained in look up fields data type Visual Basic language is a _____ tool ______ function is used to display a message box Other ms-office applications can be accessed from ms-access using a concept called ________ .To build complex expressions_____is used The three list boxes present at the bottom of the expression builder are called_____ ________option is selected from the view menu to create macros with conditions _______report can be created with minimum user input _______layout of a form displays one record at a time The table or query name on which we are going to build our report is selected from the ____ dialogue box ______and_____are the two types of auto reports available There are no wizards for creating a database in access ______option from the insert menu option is chosen to add an embedded chart In ms-access. having clause is used for _________ ______field is added to the macro sheet when we select grouping option from the view menu ______can be used to create toolbars _______query is used to add records from one or more tables into an existing table _______window is used to write VB code in access application Values for other tables. references constraint is used for creating _______ _______is used to create a mailing label ______header is present at the beginning of the report ______is present at the bottom of each page in a report In SQL.

OLE stands for_____ The application that supplies data in OLE is called an _________ If any change made on the object from the client side is reflected on the server then the object is said to be _____ _______is the file format that works on internet ______ is used to convert any ms-access object into html format _______ option in publish to web wizard produces a page that is static in nature _______query is used to create or change database objects in a current database Currency fields express the amount in _________ _______is selected from the toolbar to add an OLE object To display an OLE object in the form of an icon ____ option is selected from insert object dialogue box _______option from the file menu is selected to run 'publish to the web wizard' _____page in an web application is used to navigate to the rest of the pages in the application ______ is fired when an event is triggered is the concept based on a Visual Basic language Ms access is a ___________ A collection of data stored in different objects is known as a _________ A blank database can be created using __________ Text type data can be of _____ characters in ACCESS ______is a datatype that assigns values automatically Tables cannot be imported from other databases If two tables having same values for the fields are joined it is called an ______ Duplication of records in a field won't be allowed if the fields are declared a________ Changes from a master table can be reflected on to the child table by selecting _____option .

for creating a command button for adding a new record. filter excluding selection will display only those record(s) which meet the criteria. while using form design view.To see more than one record at a time in a form we use _______ In SQL. we should select the _______ category from the command button wizard _______ form displays fields in a single horizontal row The process of arranging the data in a meaningful order is known as ___________ ______ are used to select only some particular records from the table or any other database objects In MS-Access. the function that gives the current date is _____________ . Properties of the fields are managed by _____ in Dynaset ______queries allows us to view data in row by column manner The type of queries that can update or delete record(s) in a table(s) are called __________ Joining tables without any matching values in the fields is called ____________ Primary key uniquely identifies each record Which of the following dialog box is/are used in the creation of form ________ _______ query wizards are used to generate summary calculations for a table Properties of a form can be changed by selecting ______from view menu options Forms that are included in other forms are called ______________ In MS-Access. user may specify criteria for filter in form view using _________ ___wildcard character represents any single character Records cannot be sorted by a primary key A control without a data source is known as ___________ Set of related option buttons. delete command is used to remove _________ In MS-Access. check boxes and toggle buttons is known as _____________ The collection of related data and objects is called a ____________ Which of the following is control types ____________ In MS-Access.

The option of setting database password is available in _______ menu Foreign key is a field that uniquely identifies each record and accept no null values Data definition queries are used to create or change database objects The attributes of a composite key are known as ________ OLE object is a data type in access Data displayed in forms cannot be edited A sub form is used to display one to many relationship between tables We can switch from datasheet view to form view by selecting view -> form view option In MS-Access long integer is a datatype In MS-Access. to protect a database file from illegal access. alter command may be used in adding a primary key to a table Update query is used to add records from one or more tables to the end of an existing table In ms-access. we may set database password. This validates the field as _______ Sorting is applied to select only some particular records Filter by form can be created from a forms shortcut menu Advanced filter uses a filter similar to the query design window to create a filter ? Wildcard character represents any number of characters _________ of the following is/are a type of chart A bound control is tied to a underlying query or table A calculated control uses expression as a source of data Text boxes cannot be bound controls . datasheet view is available in ___________ ______are used to jump to any kind of information from a datasheet or a form Home page will always be present as a first page of an application Make table queries create a new table from the records of another table In ms-access. columnar layout can be used to view multiple records in a form In MS-Access. while designing a table for a particular field._____is a control that lists set of data ______is a form that summarize large amount of data ______allows to create a filter by typing the value in a data sheet Wizards for toolbox controls are called a __________ The wild card representation for any 5 letter word that starts with ram is ________________ Look up fields slow up data entry ____is an access object that displays un-editable data _____option from the new object toolbar gives the easiest way of generating a report ______ represents data in a pictorial format Changes of one table can be carried over to another related table Hyperlinks are used to jump to any kind of information or data from a file The memo field can have text upto_____ characters in length In MS-Access. the Required parameter is set to yes.

While appending records. the source and the target table must have similar structure and fields We can add our own functions to the expression elements list box of the expression builder _______is the wildcard character which represents the presence of any number of characters Macros can be used to add a menu to a database object _____ header is a unique feature of reports Chart can either be a form or a report Group header will be present at the design view of a report even if the report is not grouped We can change from the design view to the form view without being prompted for saving the changes made Charts can be produced without the wizard Macros can be used to create user defined error messages Between and Not Between is ______ type of operators The default data type of VB is integer Visual Basic is based on __________ . we need to Page header is present at the beginning of each record Detail section has a header and footer A macro is performed only when the user initiates an event The macro is selected from the action field of a macro sheet A macro can be made to execute before the starting of a database In MS-Access.access. the records in a table are sorted based on _________ Relationship is an association between _________ Summary options dialog box is used to summarize data ______ queries can be used to delete a group of records that meet some specific records Charts can convert numerical data in a easily understandable format Embedded charts exist separately The chart which cannot exists as a separate entity are _______________ From ms . if we want to view the records stored in a table in ms .The default query invoked by ms-access is A control can be bind to a record using row source property List box is a control that offers a list of choices If a table is joined to itself it is called a ________________ A picture box combines the activities of both a text box or a list box Line is a tool box control Text boxes can be part of a option group _____ chart exists as a separate object Filtering data is a way of arranging data in a meaning full order Wild card characters are used for sorting records Pivot tables are used to navigate to the other tables in a database Reports are used to represent un-editable data In MS -Access.excel worksheet.

we may design command buttons for navigating records _______are forms that are included in other forms _______ are used to represent our data in graphical format A field with a _______ uniquely identifies each record Large amount of data can be summarized using ______ tables _______ are employed to select only some particular records from a database object ______ control need not have a data source ______ control combines the functionality of both a text box and a drop down list MS access is a DBMS A form can be bind to a record source using _____ property of the form ______ forms displays field in single row ______ forms are usually used for tables with one to many relationship _______ control uses an expression as a source of control _______ control is tied to field _______is the form that can be created with minimum input from the user ______option from the tool menu is selected for setting relationships between tables ______._______is the name of the database object that displays data and can be used to edit data In access OLE objects cannot be linked _____ section is present for each record in the report A ________ sheet lists all the properties that pertain to the form or the controls Textboxes can also be an example of unbound control In MS-Access.______and_____are the buttons belonging to the options group _________allows us to create a filter from a field short cut menu ________is a database object which displays data but cannot be used to edit data What term applies to a collection of related records in a database? All of the following terms are related to computerized databases except which one? .

What is a database? What does a record contain? An RDBMS is a Data Warehousing refers to Unauthorised alteration of on-line records can be prevented by employing What is a database? What does a record contain? .

Which of the following properties of the Err object provides the name of a component that sends an error back to the client application? This database holds personal information. personalised letters can be created automatically using . The user can help to keep it confidential by If the database holds customer names and addresses.What is a report? What is the best way to analyse and change data What are some popular office orientated software applications? Which of the following constraints can be used to enforce the uniqueness of rows in a table? Which of the following commands is used to change the structure of table? An RDBMS is a Data Warehousing refers to You are creating a client application that calls ActiveX DLLs.

of course. each of whom may take out one or more loans. which field is found in both tables? Which of the following ensures that records in related tables are consistent with one another? For example. while each loan may be associated with only one customer (there are no joint accounts). it ensures that you cannot add a record with an invalid foreign key. How would you delete a relationship between tables in the Relationships window? . The bank will.Application software suited to storing the survey information obtained in the table would be The characters * and ? are sometimes used in search criteria as Which of the following field types will generate the primary key automatically? Referential integrity ensures that the: Tables are related to one another through a: A foreign key is: You are creating a banking database to track customer loans. What is the re In a one-to-many relationship between Companies and Employees. have many customers.

What happens when you attempt to delete a customer ID from the Customer table that still has entries in the Loans table? Which of the following is true when viewing a main form and its associated subform in the Form Design view? Which of the following relationships does not belong in a database based on a professional sports league such as football or basketball? Which symbol is used at the end of the join line in a related table to signify the “many” side of a oneto-many relationship? . with referential integrity in effect. what does a plus sign next to the CustomerID field mean? What is required of the fields that join two tables? Assume a one-to-many relationship between the Customers table and the Loans table.In a Customers tables.

From which table can you delete a record? The correct order of the arguments for the MsgBox statement is: The first statement in a procedure named CreateList is: Which of the following is TRUE related to form fields? A text field: The purpose of a database is to: A database stores: A database records: A sales contact manager used by a salesperson is an example of _______________ .You have created a one-to-many relationship with referential integrity between a Customers table and a Loans table.

process and administer databases is called the _____ Microsoft Access may use which of the following DBMS engines? Which of the following are basic components of an enterprise-class database system? In an enterprise-class database system ________ . A program whose job is to create. A database may contain _________________________ .A Customer Resource Management (CRM) system is an example of_________ The industry standard supported by all major DBMSs that allows tables to be joined together is called __________. A database is considered "self-describing" because _______ . In an enterprise-class database system. In an enterprise-class database system. the database application ___ . In an enterprise-class database system. the database _________ . reports are created by ____________________ . .

Database professionals use a set of principles called ________________ to guide and assess database design. A database designed to implement requirements for a reporting application needed by the Sales department is a database being designed _______ .A database designed using spreadsheets from the Sales department is a database being designed _________________________ . In a relation __________________________ . Normalization is a process used to deal with which of the following modification anomalies? . An attribute is also known as a(n) . one of the candidate keys in a relation is selected as the _________ . When designing a database. A database designed to combine two databases used by the Sales department is a database being designed _________________________ . A very popular development technique used by database professionals for database design is known as _______________________ . A determinant that determines all the other columns in a relation is______ . Database professionals use ________________ as specific data sources for studies and analyses. A combination of two or more columns used to identify particular rows in a relation is________ . A combination of one or more columns used to identify particular rows in a is___ . A very popular development technique used by database professionals to adopt a database design to new or changing requirement is known as _____ . The predecessor(s) of database processing was (were) __________ .

Which of the following are true about data mining applications? We have obtained access to the company's operational data. We have been asked to produce a report with an item by item analysis of sales. We examine 50 records for customers with phone numbers that should use the current area code of 345. This is example of_____ A data warehouse database differs from an operational database because: Which of the following objects is used to display a menu? Which of the following objects are NOT found in an Access application? . but the only sales figure available is the total sale value for each order. the first step is to ____ . we find 10 that still use an older area code of 567.When you are given a set of tables and asked to create a database to store their data. Modern microcomputer personal DBMS products______. This is an example We have obtained access to the company's operational data. Of these 50 records.

Which of the following statements is TRUE? Which of the following statements regarding Access applications is NOT true? Which of the following brings a copy of the table into the current database and does not maintain a tie to the original table? What makes a database an application? What is the Access tool that is used to create the user interface? .You are developing an Access application that you expect to upgrade periodically.

Serial number of the digital certificate ______________ enable web servers to operate in a secure mode. ______________ are used by individuals when they exchange messages with other users or online services. Digital Signature involves two processes. The Costs of Digital Signature consists mainly of the following CA stands for ________________ A Digital Certificate is issued by a Certification Authority and is signed with the CA's Private Key A Digital Certificate does contain Owner's Public Key. Owner's name. ______________ are on-line databases of certificates and other information available for retrieval and use in verifying digital signatures.The purpose of a data warehouse is to: ___________ means the result of applying to specific information certain specific technical processes. . __________ is of standard length which is usually much smaller than the message but nevertheless substantially unique to it. Expiration date of the Private Key. They are ___________ and __________. __________ is an algorithm which creates a digital representation or "fingerprint" in the form of a "hash result".

the transmission files are composed of different sets of external format files which are grouped into multiple sets under the name of ________ The ________________ are pre-paid credit cards that include an embedded cards ________________ are another form of credit payment that lets customers use digital online cheques to pay Web merchants directly In Active advertisement. there are two types of models._______ and _______ The most widely accepted format for Digital Certificate is defined by the CCITT X. such as in situations where the subscriber misrepresents his identity to the certification authority CRL stands for The prospective signer identified in the digital certificate holds the_________ and is called the ___________ In EDI interface. They are _____ and ________ The network based technology is/are ____________ Decryption is a process employed for scrambling of plain text for web based transactions Asymmetric cryptosystem is based on __________ and ____________ Value Added Network is an example of _________ ._______.509 A certificate may prove to be unreliable.Signing Writings serve the following general purposes______. the translation service receives _________ as incoming files from the communication service The EDI standardisation for International Trade and Commerce is introduced by __________ In EDI.

The advertising strategies emerging in the on-line world are ____________ The _________ model use direct mail. The ________ is a form of mail that is not targeted to a specific audience The __________ model refers to information that is placed at a point where it will be noticed by customers in the course of other activities and does not require active search The most beneficial advantage of ERP system is What is the term that describes spying on one’s business rivals to gain a competitive advantage? What would you NOT be looking for when spying on a competitor? An online drugstore such as Drugstore.com is an example of_______ Which of the following is an example of unacceptable online ‘netiquette’? Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system? . spot television or cable television. in active based advertisement.

absolute references are represented by a ________ before the column and row addresses The ________ can be used to select the function and assemble the arguments correctly Specific parts of information required by functions to perform certain tasks are called as___________ Which of the following do not belong to the formula category in excel environment__________ The function that in used to join cell values together in a single cell ________ The function that is used to count all the values that meet specific criteria _________ The wizard that is used to create and edit charts _______________ The function that is used to calculate the payment for specific loan terms ____________ The function that is used to add together all values that meet specific criteria is known as ____________ The __________ option present in the file menu options is used to specify major facts of the page to be printed The command that is used to apply a format automatically __________ The ____________ makes the information in a worksheet meaningful and easy to understand A particular part of a work sheet can be printed by setting the _________ The process of finding or selecting information is known as ____________ The option that is used to cancel the filter process for a specific column and display all the records is ________ The URL for encyclopedia Britannica is_________ _______ maps IP addresses with the domain names of the sites .The wizard that is used to import text files is_________________ The alphabet indicating the column followed by the row number is known an__________ Which of the following files could not be opened in excel _______________ In excel. the dates that are stored as sequential numbers known as ________________The command to display the current date in a cell is _________________ In excel.

Internet can be defined as _______ The most important service of the ______ is to manage traffic control _________is a program that displays information about a host connected to the net _______ is a program or a tool that helps in locating a file anywhere on the net URL stands for ____________ IN an URL the word before the color refers to _______ A ______ always begins with a slash Prodigy is run by IBM and ______ The World Wide Web is referred to shortly as the _______ Gopher and WAIS enables the user to ______ ______ is the program used to run CompuServe's regular services Navigating through the menu of gopher is called moving around _______ The directories that come with built-in engines are yahoo.lycos and ______ To use the finger command.SLIP users must run a programme called______ The web maps are called _______ Directories consists of _______ levels The _____ level gives the broadcast overview of the net The huge list of keywords from important items is called ______ The two types of search in veronica are _____ and ______ _______ searches by keywords Mosaic displays links in color whereas _____ does not display links in color ______ supports one button publish .

present on the other end of the link. HTTP stands for______ ________ is used to link pages in the world wide web FAQ stands for ______ The internet adapter is a programme that makes our connection act like a _____or a ____ account The step involved in Communicating between the web clients and servers is ______________ WSIRC stands for______ .SPY MOSAIC is distributed by_______ ______ is a program that helps us to log on to other networks HTTP is the acronym for __________ ______is used to transfer and copy files over the internet _____ is a program that helps us to log on to other networks TCP/IP stands for ________________ Archie servers can be accessed in_______ different ways in internet _______is the computer on the internet that translates between the internet domain names and the internet numeric address TIA stands for_____ in internet Service indicates the name of the ________ used to access data.

Two of the important browsers are_____ and_____ Lynx is a _______ programme that works with terminals The huge list of keywords from important items is called an_____ VERONICA is an acronym for _______________ The first freenet is created at the_____ and is called______ ________ are defined as ways of communication amongst networks ______and_____ are web searching features WINWAIS has two source lists namely____ and______ ________ is also called as WAIS manager HTML stands for_____ The system of interlinked documents is known as_______ The small programmes that create animation.multimedia._____ and_____ The web pages that represent online home of their author are called______ GNN stands for______ _____ is the most popular internet service .real-time games and multi user games are called______ The information displayed on the web page includes______.

The online service offered by navigator gold 2. The interface that provides effective communication between the web browsers and servers is _________ CGI is the _________ between web browsers and servers CGI programs are invoked based on the information provided by the _________ .encyclopaedias._____ and______ The World Wide Web consists of _________ In Microsoft Internet Explorer.lycos._______ ______ is a large worldwide bulletin board service network BABEL consists a glossary of _____ Dictionaries. the color of the text can be specified using _________ attribute of the font tag.0 are _______ and_____ _______ is a program or a tool that helps us find a file anywhere on the net The databases to enable keyword search using Lycos are a2z.government and other references are found in ______ Yahoo.excite and webcrawlers are _____ GIF is the acronym for ____________ JPEG is the acronym for ___________ The Web aids users to explore the ________ The three most popular mailer are_____.

_______ Special characters allow browsers to display _________________ The keyword for providing links within or across documents is____________ Stringing pages together using hypertext technology helps view pages _______________ The initial web pages present in a web site is the ________ page.A CGI program is usually called after a request made by the _________ URL stands for ________ A hyperlink can be on ___________ HTML was derived from _________ SGML is a _________ PINE stands for _____________ The application that confirms whether a document is compliant to its DTD is _________ Web is a collection of ___________ IETF stands for ________ The two major browsers used to surf the Internet are ________. The components of a URL are ___________ . The image format supported by most browsers is________________.

______ and______ The windows internet software available are______.The mail we send has a mailing address and most of them correspond to_____.________ and______ ________ is the ancestors of the internet DARPA stands for _______________________________________________ The uuencode files start with a _______ DARPA is broken into ________ and _______ NSFNET is the united states provides service to _____ and_____ ._____ and Which of the following is not supported by internet explorer _______________ CGI stands for ____________ Host name indicates the domain name of the web ________ The internet is also called as _______________ The internet is similar to _________________ The net drivers______ from one place to another The net provides interesting services like______._______.

HTML stands for ______________________________________ The first international IP network connections were established in 1973 with _____ and_____ A_____ is a set of computers interconnected by transmission paths to exchange information in internet A computer that provides a service usable by other computers is called______ A_______ is the representation of physical connectivity of the computers in internet DTE stands for ____________________ The basic function of the ______ is transmitting the bits over a channel The point to point channel network is also called as _____ and_____ Accessing files using FTP servers is called_____ The three most commonly used networks are______.______ and______ ________ is in between LAN and WAN _____ can be owed by multiple organisation Data is transmitted in the form of_____ signals DTD stands for __________ Modem stands for __________________ ______ is the process of the digital signals being converted into a form suitable for analog transmission .

_____________ perform the "ceremonial" function of alerting the signer to the fact that the signer is consummating a transaction with legal consequences A Digital Signature must have the following attributes ________________ and _____________ "Hash Function" is used in both creating and verifying Digital Signature ___________ provides assurance of the origin or delivery of data in order to protect the sender against false denial by the recipient that the data has been received. __________ and _____________ In. . a Certification Authority issues Digital Certificate Digital Signatures. The act of searching through storage to locate information without necessarily knowing of the existence of the information being sought. expressed in bits per second. ___________ serves the ceremonial and approval functions of a signature and establishes the sense of having legally consummated a transaction. Digital Signature. Message Integrity. or to protect the recipient against false denial by the sender that the data was sent. if properly implemented and utilized offer promising solutions to the problems of Imposters. A "recipient" of the certificate desiring to rely upon a Digital Signature created by the subscriber named in the certificate is called the ____________ The Relying Party can use the ___________ listed in the certificate to verify that the digital signature was created with the corresponding _________ Digital Signatures are used for a variety of Electronic Transactions like ________________________ To associate with a key pair with a prospective signer.________ and______ are two basic ways of getting connected to the internet SLIP stands for ________________ PPP stands for _____ Which of the following best describes uploading information? A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time.

_______ is ordinarily more widely known and is used by a relying party to verify the digital signature. and ____________ _______ is known only to the signer and is used to create the digital signature.________ is a branch of applied mathematics concerns itself with transforming messages into seemingly unintelligible forms and back again. Which of the following activities would most likely detect computer-related fraud? A digital signature is used primarily to determine that a message is: What is a major disadvantage to using a private key to encrypt data? Which of the following risks can be minimized by requiring all employees accessing the information system to use passwords? The acronym for B2B is ___________ The _____________ model is the least intrusive model but requires active search on the part of the customer __________ is / are a form of advertisement where people relate their experience with products and services The _________ are software agents who communicate with the business merchants on behalf of the customers The Pre-purchase preparation phase includes _______________ for a set of products . ____________ is the art of protecting information by transforming it into an unreadable format. The complementary keys of an asymmetric cryptosystem for Digital Signatures are arbitarily termed as _________.

data extraction. summarize the data and evaluate the data using changing points of view is known as The wizard that is used to suggest hints for doing a task In a chart Y-axis is known as_________ In a chart X-axis is known as_______________ _________ is a set of tables that describe each of the data series . product returns and products defects The ________ allow companies to bypass the need for costly printed catalogs A ________________ is a basket on the Net that is used to place the items that are being purchased EDIFACT is an abbreviation of ________ The __________ allows for protocol conversion and communicates with the bank using the banks private network or the Internet In Ecommerce. It is a definition of e-commerce from _________ The small denomination digital tokens are called _________ The ____________ is the process of encoding information to prevent it from being read by unauthorized parties There are _________ types of data tables The tables that allows the user to change or rearrange the data. transforming the data into transmittable form. transmitting the data and downloading the data are the operations employed in _________ The _________ commerce assists in integrating the customers and suppliers of the company directly into the organisation E-cash means______________________ E-commerce is a tool that addresses the desire of firms to cut services cost and improving the quality of goods.The _________ phase includes customer service and support to address customer complaints .

the criteria occupying multiple columns but more than one row. The stacked bar graphs can be represented in __________ A pie chart can represent only one data series at a time The ______ generates a summarized report in tabular form in an interactive manner Which one of the following statements related to stock chart is NOT TRUE ? The state government needs to finalize a five years plan to implement 100% literacy in the state. Which one of the following will be the tool that will help the team ? Which one of the following will be the tool that provides a way to view and compare the results of all the different variations together on the worksheet ? A ___________ is an excel file where the user stores his data . Which one of the following will be the best tool that should be used to work out the plan ? Forecast'99 is a group working on exit poll. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. is considered as an ________ criteria.________ is used to differentiate one data series from another The chart that contains only one data series is _________ The chart that holds the column chart is _________ The chart that display two or more data series on a surface is _________ The chart that is used to display discrete data _________ are not allowed in a macro name Which of the following tool cannot be used to view the excel web page_______ The wizard that used to build an interactive table from data existing on sheets The chart that is used for displaying stock market information In excel. the subtotal command also generates grand total after the last group subtotal_________ In advanced filter .

It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government.Spreadsheets are useful for _______________ Which one of the following is NOT the component of the pivot table ? Excel allows upto ______ levels of sorting Filtering rearranges a list to display the required records The stacked bar graphs can be represented in _____________ The ______ generates a summarised report in tabular form in an interactive manner Which one of the following statements related to stacked bar chart is NOT TRUE ? The state government needs to finalize a five years plan to implement 100% literacy in the state. Which one of the following will be the tool that will help the team ? Which following function is used in subtotal option ?______________ A workbook consists of many ________ . Which one of the following will be the best tool that should be used to work out the plan ? Forecast'99 is a group working on exit poll.

Which two of the following statements related to pivot table are TRUE ? Which one of the following is NOT a What-if analysis tool ? The _________ wizard separates contents in a cell into different cells A spreadsheet is a grid of rows and columns and is called as a ________ Pick out the window that is not a form of excel ___________ On an Excel sheet the active cell is indicated by… Cell A4 =2 and A5 = 4.. and A8 are _____. it means that _____. You select both cells and drag the fill handle down to A8. Spreadsheets can be used for. The contents of cells A6. Which is not an advantage of using computerized spreadsheets? The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. A7. This "What if" program is most likely which of the followin The difference between the highest and the lowest values.. If a cell shows ####### . The use inputs different weights or amounts of exercise to determine the related physical fitness. .

The contents of cell C15 is =AVERAGE(C3:C14). which expression would be evaluated first? Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant? How can you tell which cell in a worksheet is the active cell? How can you change the active cell? Which of the following would you use to change the font size of a cell in Excel? . AVERAGE(C3:C14) is known as All of the following are considered constants EXCEPT: Which of the following may NOT be included in a formula? Which of the following is NOT a valid mathematical operator in Excel? Given the formula =B5*B6+C3/D4^2.To select a column the easiest method is to … If you press _____. the cell accepts your typing as its contents.

what will be the contents of cell E4? Cell E3 contains the function =AVERAGE($A$3:$D$3). what will be the contents of cell E4? Which of the following commands is needed to transfer the contents of one cell range to another? . or columns from a worksheet? Which of the following options is NOT controlled through the Page Setup command? Which command enables you to change the margins for a printed worksheet? All commands are carried out on a rectangular groups of cells known as a: Which of the following is a valid cell range? In a copy operation. rows. the cell(s) you are copying to is called the: Which of the following commands is needed to duplicate the contents of a cell in another? A cell reference that does not change during a copy operation is known as Which of the following is considered an absolute cell reference? Cell E3 contains the function =AVERAGE(A3:D3). the ___________ view shows the file size as well as the date and time a file was last modified. Which of the following commands will automatically adjust cell references in formulas? Which of the following commands will remove cells. In the Save As and Open dialog boxes. the cell(s) you are copying from is called the: In a copy operation. If the contents of cell E3 are copied to cell E4. If the contents of cell E3 are copied to cell E4.The command that will save the current workbook with a different file type is: The command that will print an Excel workbook is found on the ____________ menu.

Excel stores the date as: You created a worksheet on July 30 and entered the =Today() function in cell E17. What will be displayed in cell E17 on August 31? The number of days between two cells containing dates can be calculated by: .The F4 key is used to: Which of the following quickly copies the formatting of a selected cell to other cells? Which of the following will insert a hyperlink into an Excel worksheet? Conditional formatting applies formatting to a cell based on: If you enter a date into a cell. You opened that worksheet again on August 31.

What is the best way of doing this What would be the best method to quickly copy the formula from the active cell to each cell below it? To arrange rows in alphabetical order based on column A. you need to use the command _____. The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test. You decide to show each week’s data with an accompanying graph.The function key that is used to quickly edit the contents of a cell is: What will be stored in a cell if 3/4 is entered in it? A user’s response to the InputBox function can be stored in: The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is _____. you would _____ while selecting. What can you NOT do with a spreadsheet? . To find the student with the highest mark. You are required to use a spreadsheet to record all that you study on each day for four weeks. Your Institute teachers have set an assignment on ‘Studies’. which of the following functions should be used? Which chart type best shows proportions of a whole? Which of the following is TRUE regarding chart types? To select several cells or ranges that are not touching each other.

To print just part of a sheet. . you would select what you want to print and _____ . Spreadsheets can be used for. means and methods for rendering information unintelligible and for restoring encrypted information to intelligible form. Protected/private character string used to authenticate an identity or to authorize access to data.. Which is not a valid cell address? The World Wide Web was devised by _________ The useful URL schemes are_____ and______ The other ways of getting connected to the net are_____ BBS stands for______ USENET is a BBS on ____ scale WINSOCKS is expanded as______ IETF Level 2 HTML DTD supports graphical browsers like _______ The space used by Netscape to store the retrieved page is called______ The principles.. A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt an decrypt messages and conversations. The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is _____. Which of the functions is not valid for performing addition The default orientation for the printed page is _____.

then ATM stands for A sequence of bits or characters that identifies the destination and the source of a transmission. To investigate contraventions the controller of certifying authority shall exercise the like powers to that of Malicious software. semantic and syntactic.The successful act of bypassing security mechanisms of the system. According to information Technology Act. The means of communicating between networks A group of computers and other devices dispersed over a relatively limited area and connected by communication links that enable a device to interact with any other on the network. A set of rules and formats. 2000. that permits entities to exchange information. An action or event that might prejudice security. When we talk of Data Transmission modes. The term HTTP stands for A NIC is considered as A hub is a device that can connect Which of the following is true concerning the function of a switch? . An attempt to get access to a system by posing to be an authorised person. None the person who is known as father of Internet This website is the biggest bookstore on the earth.

. what kind of cable would be used to connect them? An IP address is a To construct a simple LAN of 4 computers. is a LAN-based computer with software that acts as a controlling device for controlling access to at least part. . if not all.... how many IP addresses are required for these 5 devices? Which of the following in an OSI layer When creating a network from just two PCs....What do routers connect? What does a router route? Software which prevents external access to a system is termed If four computers are connected to a hub and then to the internet.. you would connect them with ______connect them What happens to data that is ruined before reaching to receiver Bluetooth is Which is not one of the recognized IEEE sub layers? The most preferred number system to represent a IP address is A MAC address is of Protocol is A ..... of a local area network and its available resources...

...... The principal topologies used with LANs are: What are the various types of bus architecture? What are the various types of ring architecture? In a .... you The worldwide web server uses the following standard interface to act as the middleware: An NIC ...... the cable system forms a loop with workstations attached at various intervals around the loop The Media Access Control (MAC) is a sub layer of the: What are the most common LAN technologies used in networking today? Modem speeds are measured in LAN speeds are measured in WAN speeds are Accessing the Internet from a typical home PC requires the use of To use the Internet. each workstation attaches to a common backplane via its own physical cable that terminates at the hub In a .. ....... each work station is directly connected to a common communications channel Which one of the following is NOT a network topology? In a ...............What is the biggest disadvantage of the Ring topology? The ..... ................... of the network concerns how network devices are physically (or optically) interconnected.

Accessing the Internet from a typical home PC requires the use of The most widely used network operating system on PC LANs is JPEG and MPEG To use the Internet you A multiplexer is a form of An ISP FTP is Telnet A firewall is A proxy server is A search engine is .

A firewall is . the user should use a An ISP FTP is Telnet Which of the following is a true statement about the OSI model layers? Which of the following is NOT true about the Internet? The traditional intent and impact of this common type of attack is to prevent or impair the legitimate use of network resources.To look for information about interest areas on the internet.

A proxy server is Which of the following would be performed on a network server and not normally on individual workstations? What can be said about the safety of the Internet? To secure communication network against wire-tapping the most effective control is One way that a virus CANNOT spread throughout a network is: Which of the following is NOT a means of monitoring employee use of company technology? ____________ would be used by parents to monitor their children on their home system.Which of the following is NOT an example of a DoS attack that is popular among hackers? A ____________ attack is when a hacker sends a continuous flow of packets to a system. One defense option on a large network is to configure a ____________ to disallow any external traffic. The formal rules and parameters which are established to permit a microcomputer to communicate with the mainframe computer as though it was a terminal of the mainframe are called The two most common tools used to help with extracting information are: Which of the following would NOT be considered an example of cyber terrorism? .

Which of the following would be a form of cyber terrorism? Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life? An organisation is upgrading its telecommunication lines. or contact another in an unsolicited fashion is called: Setting your privacy settings in Internet Explorer to medium is one way to block: What is the best means of protection from cyber stalking? . harass. The advantage to the customer is that the company can Which of the following is an easy-to-use service to get information on someone? Which of the following pieces of information would NOT be found online? Which of the following is the most common danger on the Internet? The famous Nigerian Fraud scam offered victims the opportunity to: The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called _________________. Which is the least important objective while upgradation A company posts a price list of its products on its website. Using the Internet to pursue.

A very common abbreviation used include: A standard language for creating and formatting Web documents is: The Web page format in which all elements of a Web page are saved as one file is called: Which of the following requires an Internet connection? Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his computer how would he do this? .Which of the following is not an appropriate control over telecommunications software Encryption techniques can be implemented in Hardware-Software Which protocol would be used to download a free anti-virus program from the Internet? The major advantage of the checksum program is when it Which of the following is a Web browser? A Web page is another name for ----------- Domain names must contain a description of the type of organisation that the domain represents.

you find a useful website. What is the most efficient way to access the site at a later time? A system that uses the Internet for business-to-business interaction is called a(n): A block of text automatically added to the end of an outgoing email is called _________ refers to the use of Internet technologies for placing telephone calls. a screensaver. Most client/server applications operate on a three-tiered architecture consisting of which of the following layers? Which do you NOT need to connect to the Internet? What does FTP stand for? What is the purpose of DNS? Which of the following is NOT a properly formatted IP address? Which of the following is a properly formatted email address? The Internet is controlled by whom? . You also add a hyperlink. a ten-second sound file and a ten-second music video clip.Which of the following is used to update a Web query? You download from the internet. which format should you choose? While researching the Direct taxes assignment. Which of the media elements has the greatest effect on the file size? When saving a photograph for use on a website.

_______ is a method to convert a string into integer. What type of shape should we get? In visual basic. the explorer view of a project is displayed in ___________ In visual basic.? What does HTML stand for? What is a disadvantage of joining a mailing list? In Powerpoint2000 . _______ property of a recordset object is automatically set to ______ In visual basic. In visual basic. when a record pointer reaches to the last record.What does IRC stand for? If you do not pick up your email for a week. _______ property of a recordset object is automatically set to ______ In visual basic. in a shape control..the built-in professional design elements are Selection handles are the 8 small ___________ that appear around the object. vbred or vbgreen or vbblue are the property values of a backcolor of any object .. a timer event is only available in timer control. a vb statement gives Shape1. when a record pointer reaches to the first record.Shape = 2. when an object is selected The _______ is an invisible matrix of vertical and horizontal lines that covers the entire slide workspace _______ are drop-down menus that appear when the right mouse button is clicked on the screen element ________ and ______ have the ability to add a lot of visual impact into the PowerPoint presentation _______ is a motion picture or any animation file In visual basic. In visual basic.

_______ object is used to access the database and also to manage the data in the database. In visual basic. In visual basic. if a user uses a function key F4 _________ becomes visible.0) will generate _______ color In visual basic.255) will generate _______ color In visual basic. _______ property of a textbox control is used to change the size of text. _______ property of listbox control counts the number of items in the list In visual basic. Which event of a text box would you use for validating the data entered by the user? Which of the following statements forces inline error handling? . In visual basic. vbcritical. _______ is a property of a textbox control to set a color of a text. a form is a ________ object. when a checkbox control is checked _______ property is automatically assigned with 1. to display text on a label object _________ property is used In visual basic. to give a backcolor or to bring in a picture to a command button can only be done if we set the style property to ______ In visual basic. In visual basic. In visual basic. a method RGB(255. In visual basic.In visual basic. while closing a form _______ event of a form object is triggered earlier to terminate event. In visual basic. if a user uses a shortcut key ctrl+R _________ becomes visible. Microsoft visual basic is a Rapid Application Development tool. vbinformation. In visual basic. In visual basic. vbexclaimation are the values of _______ in a messagebox function. a method RGB(255. ________ is a recordset type which allows to add a new record and also to update existing record in a recordsourse object In visual basic. _______ keyword is used to declare a variable What is the extension of the Visual Basic project file that stores the design of a user control. _______ property of a textbox control is set to _______ to underline a text In visual basic. ________ is a function which displays a message and it also allows the user to enter values in a form object In visual basic. the properties of various controls can be set using __________ In visual basic. using a data control.0.255. the interval property of a timer control is given in ________ In visual basic. In visual basic. when a textbox control receives the focus ________ event is triggered. In visual basic. when a form object appears on the screen _________ event is triggered.

To deactivate the Form UnLoad event. How can you keep the user from exiting a form by clicking the Close button? The _______ property enables Visual Basic to draw complete images in memory before displaying them on the Screen.The _______ method resets the contents of bound controls to their original values when the user clicks on the cancel button. You want to display the code and the description of an error. you make the following change in the function definiton: How many root nodes can a TreeView control have? A project group is a Project which: Procedures declared in a _____ are local whereas procedures declared in a ______ are available to the whole application. What would be the correct syntax? What is the purpose of the Image List Control? Which method would you use to get a free or unused File identifier while opening any file: Which property procedure is used to retrieve the value of a property? .

called: Which of the following procedure types will execute when you assign a value to a property of an object? In order to overlap the controls (say a command button) during design time.exe. . The caption and the name properties of the command button: You try to initialize a new Object variable with the following line but receive an error. To change it dynamically (i.e. What could be the possible cause? Set MyVar = New Classname Which of the following will perform a direct execution of a Command object? The vb Critical symbol displays: vbYesNo is an example of a(n): . .com. you have to open file in: Visual Basic displays information depending upon the current value of two properties of the form.Which of the following can be shown to the user using the Common Dialog control in VB? Which of the following are not properties of Command Button: Which events enable you to determine which key was pressed by the user? In order to access a file in Non-textual format.during program execution) we need to change: Which property of the ProgressBar determines how much of the bar is filled? The ______ function can be used to run any . we use the ‘Send To Back’ or ‘Bring To Front’ option from the Edit menu.bat or .pif file from a Visual Basic program.

.e. editing and viewing objects in the chart .The primary difference between the MsgBox statement and the InputBox function is the: Which of the following is TRUE about a protected form (i. a form where the Protect Form button on the Forms toolbar is toggled on and is assumed to remain in that position)? Which event is triggered when the user moves to another open form? The user can use ______ to remove the undesirable part of the image The power presentation has a _____ for a set of compatible colors The set three colors used for graphs and for secondary slide items is called as There are ______ types of charts available in PowerPoint _______ charts are useful while showing variations over a period of time _______ are the individual pages of a presentation A PIE Chart is a ____ diagram that depicts the relationship between a whole and its parts Each individual piece of data in a series is called a/an PowerPoint launches an OLE-compatible application called When the user double-clicks on an organization chart object in PowerPoint The _____ are used for selecting.

the graphics and text are also saved along with the slide The hidden slide is ____ effect is used to introduce a slide during a slide show A _____ is a special effect that determines how the objects appear on the slide The notes page is formatted based on the Pick the odd man out of the following When a new presentation is opened .powerpoint creates slides that have a width of _____ and a height of ______ with the landscape orientation .Manager box tool in organizational chart window is The custom drawing tools are _______ by default Click on the box tool ______ to draw three boxes There are ____ default fields available in all boxes of the organizational chart The _____ tool is used in the same way as we use a pen to draw a table A/An _______ consists of smaller printed version of the slides The size of the object can be changed using the ______ tool _______ is the process through which the slides in the current presentation are included in another presentation or application ________ can be used to create charts as well as worksheets PowerPoint can import text files that have been saved in ______ format PowerPoint outlines can have _____ outline levels When a file is saved with _____ extension.

handouts and outlines is ____ orientation Build effect is also called as ______ Graphics for web pages are automatically stored in ____ format A _______ is used to jump to any slide in the presentation The ______ language has been incorporated into PowerPoint In PowerPoint _____ is a series of commands that are executed in sequence The macro will be activated Developers can easily add ____ to PowerPoint 2000 by using the programming interface ______ determines the order in which order in which the slides will be displayed during the show _______ is used to organize and develop the contents of a presentation If we save the presentation file as a metafile.The default orientation for notes . which of the following statements are not true . it can be opened using With reference to autocontent wizard for creating a new presentation.

which of the following statement is not true Which of the following definitions are not true .Which of the following statement is not TRUE With reference to changing the order of slides.

which of the following statements are not true The format of the text entered in a title. subtitle. notes and handouts for spelling errors PowerPoint's drawing toolbar contains _______ drawing tools Click _______ on the rectangle drawing tools enables us to draw multiple rectangles . all the text objects in all the slides..Which of the following statements are not true Which of the following definitions are not true The options available in the common task toolbar does not include With reference to chart. or bulleted-list object is determined by the format settings in a special slide called -------PowerPoint provides a _________ that searches the entire presentation i. outlines.e.

An example of the components of a multimedia presentation could include Which of the following formatting elements can be applied to a PowerPoint diagram using the AutoFormat tool? Which of the following formatting elements can be applied to a PowerPoint diagram using the Format AutoShape command? What happens when you double click a blank graph placeholder in a PowerPoint presentation? The legend in a Microsoft Graph chart is: Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the best chart type if you want to emphasize the total sales of each region? .

how do you display the underlying datasheet? How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished creating the chart? What happens when you click the Datasheet button on the Microsoft Graph toolbar? .Which of the following actions will enable you to insert a graph into a PowerPoint presentation? If you are editing a slide containing a Microsoft Graph.

you can build: Which of the following animation effects can be added to a slide? Which of the following animations effects can be added to a slide? Which keyboard key is used to select more than one picture on a slide? .What happens if you single click a chart that is not currently active? What happens if you double click a chart that is not currently active? Using custom animation effects.

Custom animation can be used to affect ONLY: Which of the following best describes the information that appears on the advanced timeline? Which of the following objects can contain custom animation effects? What type of program allows an object within an image to be edited without affecting other objects? .

using a data control. to populate a directory list box with a file list box ________ statement is used In visual basic. ________ is a property of a recordset object which counts the number of rows in a recordsourse object In visual basic. . In visual basic. a record can only be added from the last record. Adding a new record is only possible using _______ method of a recordset object. In visual basic. to populate a drive list box with a directory list box __________ statement is used In visual basic. a record is saved to a recordsource object using _______ method of a recordset object. _______ method is used to add an item in a combobox In visual basic. to navigate to the previous record ________ method of a recordset object is used. In visual basic. _______ method is used to load picture during runtime in an image control In visual basic. to display a message in the run time _________ function is used In visual basic.Which of the following animation effects can be added to a slide? Which of the following is TRUE regarding the Datasheet? Graphical software tools that provide complex analysis of stored data are: Which of the following statements is TRUE regarding PowerPoint diagrams? Which keyboard key combination is used to undo the previous command(s)? Microsoft visual basic project file has _______ file extension. using a data control. using a data control.

you will set the: _______ is a word processing that is a member of the office 2000 family The feature that enables user to type anywhere in a document without pressing or tab The______ feature allows the user to copy and paste upto 12 items at the same time in an application ______ and _____ key combination will extend the selection by one character on the left and right _____and_____ are improved layout in Word 2000 The easiest way to create a document in word is In Office2000 environment the tool that makes work easier for us is_____ A short description of a tool bar button called the ______ is displayed when the mouse pointer is allowed to stay for a second on the button The _____ helps us to keep track of the margin of the page The keys that are used to navigate between headers and footers are Pick out the element from the following that dose not form the type of tabs for the Word 2000 _______are blueprints or patterns for documents of a certain type The______ is used for quickly setting paragraph indention using the mouse Word art is text with AutoShapes in word can be created by accessing the _____ By default. a document consists of_____ section The dialog box that is used to determine the documents margins is .UnloadMode as Integer) To prevent the Form from closing. you make the following change in the function definiton:Private Sub Query_Unload(Cancel as Integer.To deactivate the Form UnLoad event.

it is ensured that the data in combination with other fields are reasonable as per standard set by an organisation. --------------.application for data analysis.function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in a table Most of the tools use in Data Analysis depends on How do you define analysis of an information system? What areas need to be considered in the SOFTWARE design process? What is the function of systems software? Formatting a disk results in all the data being.? . we use ----------------. A System Auditor can uses CAAT tools to analyze data In the case of the ---------.control... Excel can import data from other databases for the data analysis. 'Set mapping' Check control that follows a text-type validation.________ is a box surrounding a page on all slides or a line that sets off a paragraph on one or more slides The key that is used to perform a task to select all t he text in the documents is The key that is used to indent a paragraph is The key that is used to change the font from the current positioned in a document is The key that is used to change the style of the document that is from that normal to heading1 or heading1 to other document styles.

What is Direct Implementation? What is parallel running? What documents are produced during the development of a system? What are User Guides are used for? Systems software can be categorised into: Which storage device cannot be erased? Application software are programs that are written .

Which bus carries information between processors and peripherals? Convert the decimal number 2989 to Hexadecimal Which bus controls the sequencing of read/write operations? What are utilities? Numbers are stored and transmitted inside a computer in The original ASCII codes A Nibble corresponds to A gigabyte represents A 32-bit processor has A parity bit is he contents of these chips are lost when the computer is switched off? Clock speed is measured in Cache memory enhances CISC machines Which parts of the computer perform arithmetic calculations? .

Every data from the primary memory will be erased if An RS-232 interface is For print quality you would expect best results from ROM A UPS smart card Laptop computers use Multiprogramming refers to Multitasking refers to What are small high speed memory units used for storing temporary results? A good way to exchange information that changes rapidly is through .

name of the chapter. When word is opened a new document called_____ is displayed. The object that helps us analyzing data statistically is known as To highlight certain parts of a page to set it apart from the rest of the page we make use of the following features To clear all the tabs in a document the option that is clicked from the tabs dialog The dialog box that is used to incorporate picture bullets into our documents or web pages is The object that composes of set of tools which helps to create and work on different shapes like rectangles. page number etc. circles.Multiprogramming is a prerequisite for Timesharing is the same as ______ is the default view in Word used for typing Editing and Formatting the Text The short-cut-key that is used to indent a paragraph spacing in the documents is The short-cut-key that is used to paste the selected text The short-cut-key that is used for paragraph spacing(1.5) The box that separate text from the document and allows it to behave like an independent object is known as The object that is used to provide information like the title of the book. flowcharts etc. where the user starts typing the content right way ______ is an online dictionary maintained by word to obtain synonyms for words The thesaurus is invoked by pressing_______ When a new table is created the insertion point flashes in the _____ By pressing the _____ key inserts a blank row after the last row in the table .

The ______ option enables us to convert text into a table format A table consists of ______ that contain text or graphics The _______ option in word allows the user to automatically correct misspell words as and when they are typed ______ is a facility that enables recording and replaying of a sequence of keystroke In Word Macros are written in _____ In Word 2000 the macro dialog box is activated with the help of ____ key combination ________shows how a document would look like when published on the web or on an intranet ______ is a software for sending and receiving e-mail messages ________is the coding system used to create web pages The network that makes information easily accessible across various networks is _______ Which of the following statements are false with reference to the use of a header row source for a mail merge With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false The alignment available for tabs does not include .

Which of the following statements related to a Section Break are True The user can set a spelling checker to skip the marked part of the next New option under the file menu of word creates a new blank document that is based on the normal templates The user can split the screen only into two parts The features that enables the user to type text graphics tables anywhere in the document without pressing enter or tab The user can modify the picture from the clip art With reference to auto correct which of the following statements are false With the reference to password protected documents which of the following statements are false The alignment available for tabs does not include .

what is the best way to get the cursor to the next line? How are data organized in a spreadsheet? Which key moves the cursor to the beginning of the next line of text? Veena typed the following sentence: "The girl was very beautiful. The document that makes the user to organize and maintain a long document. When the cursor gets to the end of a line." In which word processing utility could she find a synonym for "beautiful"? Using an electronic bulletin board.Which of the following statements are False Drop Cap tool does not work for the contents in the table format The user can split the screen only into two parts in MS-Word The special symbols that are inserted using "insert symbol" option of the word can not be printed by the printer as they are not standard keyboard symbols The "format columns" option allows to create columnar text up 12 columns only. such as multipart report or a book consisting of chapters The view that enables us to view how objects will be positioned on the page when it is printed The mode that is initialized or toggled to if the user is in a position to overwrite the text in the word Veena is entering a paragraph in a word processing program. but only wants to print the first two pages. What printer command should he select? What process should be used to recall a document saved previously? Which is used to indent text within a document? Desktop publishing is a more sophisticated form of which of the following types of software? . Seema can do all of the following except which one? Aryan has created a ten-page story.

Which type size is the most reasonable for the text in the columns? Given the default left and right margins. the width of each column in a two-column document will be: . and ½-inch spacing between columns.What is a Word Processor used for? What is a picture that is saved on a diskette and can be pasted into a document? What is a Word Processor used for? What basic tools would you find in the Edit menu of a word processor What is a header in a document? What hardware is essential for a word? The user could take a picture from a magazine and insert it into the document by using a What basic tools would you find in the Edit Assume you are creating a two-column newsletter.

while still keeping the paragraph in the first document? . and also the word ‘he’ to ‘she’ in the given phrase? “On a cold and still night. but cannot see any columns on the screen.Assume you have made all appropriate selections in the Columns dialog box in Word. in which of the following situations would Tom use the "Copy" command? What does a document contain? Before submitting your work you want to find any words spelt incorrectly. What is the most likely cause? While word processing. Which of the following would you use? What command in a word-processing program can be used to change the word ‘him’ to ‘her’. the only sound that could be heard was the owl that had ade its home in the nest outs What edit commands would you use to insert a paragraph from one document into another document.

Which of the following statements would NOT be a reason for showing suggested revisions in a Word document without changing the original document? Which statement is NOT true regarding revisions made in a Word document? How are suggested changes entered for review on an initial Word document? .

how can you tell which is the most recent version? Various fields are added to a regular document to create a special document called a form through the ____________ toolbar. You would like to find another word of similar meaning to use instead of ‘discover’. Which of the following types of fields CANNOT be inserted into a form? . Which of the following would you use to do this? When opening and working with multiple versions of a document.Which of the following is TRUE about saving a document using the Versions command? What happens when you open a document that has been saved using the Versions command? You have used the word ‘discover’ four times in an English essay you have created using a word processing program.

You would like to make this paragraph start on page 2. it is helpful to include the file name on each page as a Which of the following tools will copy the formatting of selected text to other places? What is the name of the process of determining the cause of errors in a macro? Drop caps are added to a Word document using the ___________ menu.Which of the following is TRUE related to editing comments in a Word document? What is a header in a document? In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2. A reverse in a newsletter is: A pull quote is best emphasized by: .What would be the best way to do this? Tables in a document help you to easily arrange all of the following EXCEPT: To identify a document.

The rest of the newsletter has two columns. Analyse data over two or more periods is called ----------------------. how many points are there to the inch? Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. What is the minimum number of sections in the newsletter? Which of the following is NOT correct with respect to page.Which of the following definitions is CORRECT? Pertaining to newsletters. and section breaks? Which of the following would be the most appropriate font for a newsletter headline? Which of the following is the default Word column width? Sequence Check is a --------------. column. which of the following cannot be changed using the Columns command dialog box? As related to type size.analysis .level control check.

Check data entry follow a particular sequence and also a predetermined range.We use Hash Total to identify -----------. Virtual memory is Multiprocessing is To help keep sensitive computer-based information confidential. the data may not be in proper sequence but should be within a predetermined range In ---------------. To import data from Access to Excel .it is not possible to link between Access and Excel sheet The GAP detection options can be used to test for completeness of data.function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in the table. to ensure that the data has been provided is for the correct audit period In Range Check . inventory files or transaction files can be tested for cut-off . hand-held device is used to move the cursor to a specific location on the screen? . the user should What is the function of a disk drive? A 4GL is A nanosecond is What small.items Data validity test represents Year end ledger. Exception testing can be used to identify ----------------.within a series where there is a definite relation between items Analyse fields by arranging them into rows and columns is called --------------------.

the user should A series of instructions telling the computer how to process data or files is defined as a To ensure that data is not lost if a computer system fails.The memory address register is used to store The memory data register is used to store The instruction register stores Which of the following is used to indicate the location on the computer monitor? A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate data. the user should Having a single CPU alternatively process tasks entered from multiple terminals is called The place in the CPU where the data and programs are temporarily stored during processing is called the All are examples of computer software except . Which of the following translates a program written in high-level language into machine language for execution? Detecting errors in real memory is a function of To find where a file has been saved on disk.

Which of the four different media listed takes up most space on the CD-ROM? Which one of the following printers is suitable for printing sprocket fed carbon copies? Multimedia software can be most productively used for To be effective a virus checker should be Which one of the following software applications would be the MOST appropriate for performing numerical and statistical calculations? Passwords enable users to How many bytes do 4 Kilobytes represent? Back up of the data files will help to prevent .Computer manufactures are now installing software programs permanently inside the computer. 15 minutes of sound and 1 minute of video. It is known as Which of the following file organisation forms most efficiently allows access to a record The part of the computer system controlling data manipulation is called the For direct access storage devices the recording area is divided into The data hierarchy from the largest to the smallest is Which of the following hardware or software system controls provides a detailed record of all activities performed by a computer system Which one of the following parts of a computer is necessary to enable it to play music? An educational CD-ROM on Indian Poets contains 1000 pages of text. 500 colour pictures.

The raw facts you collect are called A flow chart is the A voucher entry in Tally is done for Passwords are applied to files in order to Each of the following is an enabler of IT-business alignment except: The basic systems model is used to describe virtually all information systems and it consists of the following elements: .Which one of the following is the MOST common internet protocol? The advantage of a PC network is that The term A:\ refers to UPS stands for The main problem associated with uninstalling software is that You are conducting research for a Income Tax assignment.

d) fuzzy logic Black box testing and white box testing are part of: What is the term used to describe the point of interaction between a computer and any other entity. d) information architecture Benchmarks form part of: . b) maintainability. c) technology architecture. c) portability. b) functional architecture. File extensions are used in order to Information systems controls include all of the following EXCEPT: Hashing for disk files is called Components of expert systems include: a) inference engine. c) knowledge base. Which is the best way to locate the files? Components of an information system model are: a) applications architecture.What is a computer-aided design system? A(n) __________ offers a solution package for an entire industry. such as a printer or human operator? The advantages of CASE tools are: a) reusability. d) flexibility Which of the following is an acceptable way to shut down the computer? Yesterday. in your music class you saved your compositions as MP3 files. b) user interface. Today. you cannot remember where you saved them.

d) run-to-run totals Which is not part of help desk documentation: Testing of individual modules is known as: Design phase of CASE tools includes: a) data architecture.Continuity controls include: a) record counts. c) video. d) audio Which of the following procedures should be included in the disaster recovery plan for an Information Technology department? Designing relationships among components is part of: Several Computers connected together is called: Which network topology uses a Hub? Which of the following topologies is used for Ethernet? Application software are programs Which type of file search method requires a computer first read all locations preceding the desired one Which of the following areas of responsibility are normally assigned to a systems programmer in a computer system environment? . b) images. b) decision architecture. and data retrieval functions based on a set of instructions provided by the: Which of the following falls under multimedia data: a) text. d) presentation architecture Which is part of installation testing: The computer operating system performs scheduling. b) date checks. c) interface architecture. c) label checks. resource allocation.

peripherals and workstations that are in fairly close proximity Intelligent terminals differ from dumb terminals in that they A computer is to be linked to 8 terminals using a single communication link. This type of network is called a A computer based system for sending. receiving and storing messages is called an If a workstation contains a processor. storage and communication capabilities. communication path will require which of the following A modem is a device that A LAN includes 20 PCs. screen manipulation device. it is said to be .Which of the following is recommended when many searches for data are required It is unlikely that a magnetic tape containing several thousand blocked records can be used on two machines of different architecture directly because Which component of the CPU has the most influence on its cost versus performance Which of the following terms applies to network used to connect computers with other computers. each directly connected to the central shared pool of disk drives and printers. To permit simultaneous terminal operations. monitor. printer. forwarding.

Terminal hardware controls include RS-232 is a What is a compiler? What are the stages in the compilation process? Which of the following is not a data transmission coding scheme What is the definition of an interpreter? A device used in data communications to divide a transmission signal into several sub-bands is known as a Third generation languages such as COBOL. C. and FORTRAN are referred to as .

Serial Communication is used over long distance because it In what areas is the COBOL programming language used? The primary function of a front-end processor is to What is the first stage in program development? Which of the following is not used for data transmission within a local area network What is System Analysis? A device to device hardware communication link is called What will a good software provider consider? The topology of a network can be each of the following except What is the 8-bit binary value of the decimal number 85? Which is the most common data transmission error checking method What is the decimal value of the binary number 1111? .

Which of the following devices merges communication signals onto a single line What is the decimal value of the octal number 215? Which tool is used to help an organization build and use business intelligence? Cache memory enhances What is the decimal value of the hexadecimal number FF? Numbers are stored and transmitted inside a computer in What is the hexadecimal value of the decimal number 1476? A byte corresponds to What does EBCDIC coding of numbers mean? A Kb corresponds to What is the binary sum of 01011 and 00101? Information is stored and transmitted inside a computer in Where would you find the letters QWERTY? A parity bit is How did the computer mouse get its name? Clock speed is measured in What are you most likely to use when playing a computer game? CPU performance may be measured in A digitising tablet can be used for? In processing cheques which of the following I/O techniques have banks traditionally used .

? What are the individual dots which make up a picture on the monitor screen Called A daisy wheel is a type of... such as its video screen. keyboard. and storage devices? Where would you find the letters QUERTY? What are you most likely to use when playing a computer game? A digitising tablet can be used for? Which of the following is a pointing device used for computer input? What input device could tell you the price of a product Where would you find a magnetic strip? Hard copy is a term used to describe.? What input device can be used for marking a multiple-choice test? Laptop computers use QWERTY is used with reference to What input device could tell you the price of a bar of chocolate? ...5” floppy is around What general term describes the physical equipment of a computer system.Which of the following is a pointing device used for computer input? A UPS What does a light pen contain? The capacity of a 3.

A GUI is Where would you find a magnetic strip? Multiprogramming refers to Multitasking refers to Multiprogramming is a prerequisite for UNIVAC Computer belongs to the Timesharing is the same as Name the first Indian Super Computer? Disk fragmentation The technology which is used to check answer sheets of multiple-choice questions in civil services or similar examinations is: - .

A compiler is Which printer among the following is fastest “Zipping” a file means What does acronym VIRUS stands for An impact printer creates characters by using...? A client-server system is based on A nanosecond is A procedural control used to minimize the possibility of data or program file destruction through operator error is the use of _______ software enables users to send and receive data to/from remote computers A _____ is a running instance of an application Splitting of CPU's time for different tasks _______ prevents time slicing ______ computers are used in large organizations for large scale jobs which have large storage capacities _______ is responsible for all calculations and logical operations that have to be performed on the data ______ printer use laser light ______ software enhances the user to enter .store. manipulate and print any text ______ software enables users to send and receive data to/from remote computers .

This situation is referred to as ______ The process of data being automatically written to a duplicate database is called______ Modem stands for __________ . the type of processing is sometimes called as DBMS models can be grouped under____ categories ______is the most advantageous database system A new user initiates a new process of execution at the background. Multiple changes to the same record or a field are prevented by the DBMS through______ _________allows an application to multitask within itself LAN stands for __________ ._______ is the temporary storage place for deleted files _____ is a collection of related fields _____ language consists of strings of binary numbers ______ symbol is used to represent processes like assigning a value to a variable or adding a number _______ is an example for micro computer _________capability supports concurrent users doing different tasks The ______ do not have processing power of their own and has only a screen.while the user can continue his query process as usual in the foreground. . the terminals are referred as_______________ A______is nothing but a PC with a network operating system _____system is responsible for handling the screen and user I/O processing The______ handles data processing and disk access in a Client/Server architecture Both the DBMS and the application resides on the same component in a ____system When all the processing is done by the mainframe itself. keyboard and the necessary hardware to communicate with the host. For this reason.

New process of execution is referred to as______ ISDN stands for _______. Asynchronous transfer mode is a __________ technology. The __________ protocol is a network protocol to be built for the World Wide Web . SMTP stands for __________ . _______is/are a popular front end tool When LAN connected together . Data is broken into small unit called __________ . __________ is designed telephone system Expansion of ISDN is ________ . ATM stands for __________ . The computer which can receive data from other computers on the network and print it is _______ The hardware and the software requirements together form the_____ ATM. TCP/IP stands for _________ .it is called __________ . _____________ is the Worlds largest computer network .

______and _______ _________ are used in large organizations for large scale jobs _______ is responsible for feeding data into the computer _______ is the capability of the o/s to run numerous applications simultaneously _______ involves conversion of raw data into some meaningful information _______ is responsible for obtaining the processed data from the computer _______ printers use light to produce the dots needed to form pages of characters Hardware components in a computer are _____._____.____. Collection of instruction is called a _____ Combination of alphabetic and numeric data is called _____ data Computers can be classified based on ______.Expansion of WBT is ______________ _________ connects LANs.______ _______ software are programs that are complex and can be developed or purchased _______ is a set of special instructions used to communicate effectively with the computer _______ converts a high level language into machine language _______ translates assembly language program into machine language instructions .

op1 Ctrl+C op4 ans None of ALT+F1 CTRL+F1 the above A None of Tally IMP Tally INI the above A false A None of ALT+F3 CTRL+F3 the above B None of Bill A or B the above C Three Four Five B None of Alt+C Alt+Ctrl+C the above B TRUE FALSE TRUE * FALSE $ F1 Tally ODBC TRUE F3 Invoice Two op2 op3 A & ^ A A Puchasin g. Puchasin Accounts Receiving g and Puchasin payable and Accounts g and and Accounts payable Receiving Receiving payable D Mone of Single Multiple A or B the above A Cash Flow Statement s Two Alt+D Fund Flow Statement s Three Alt+X All of the above One Ctrl+D D A B Create Alter Display Informatio Informatio Informatio All of the n n n above D F4 F5 C Alt+P Ctrl+P Tally Audit Statistics Bin True Data False Enterprise Data Interchan ge TRUE 2 Enterprise Data Informatio n FALSE 3 Ratio Analysis Four Ctrl+T F6 F7 None of Shift+P the above Journal Day Book Book None of Sub the above Electronic Data Interchan All of the ge. above 4 5 A B B A C A C .

data element FALSE data record TRUE Display stock valuation method Open Change Calculator Period Ledgers Groups Journals Personal Nominal Real Manual Balance Sheet Automatic None Profit & Journal Loss Book Journal Stock Journal Filled 11 FALSE Receipt 16 TRUE Issue 18 managem ent by objective F4 managem ent by exception F5 electronic data All of the analysis above F6 Alt+f5 B B Main Location Primary Primary Cost All of the Category above C True False Ledgers 0 to 9 Reports 1 to 100 Supplier Report F2 Field Physical Stock Transfer None of the above None of the above None of the above All of the above All of the above B B B D A Reversing Journal B None of the above A 21 B B None of Vouchers the above 10 to 60 None All of the Suspense Order above Informatio None of Output n the above F4 Ctrl+f2 Ctrl+f4 A and B F6 function key F7 function key Alt + f6 function key Purchase s B B A Net Transacti Closing ons Balance True False Sales All of the above A or B C A A C A None of the above C A None of the above A None of the above B .

1-4-1995 to 31-31996 True 1-4-1996 to 31-31997 False Horizontal Vertical Balance sheet & profit & loss profit & loss and trial balance Primary Profit & loss and trial balance Main location Security mechanis Ledger m a/c F5 F7 a name Sales return Company creation Trial Balance F7 1-4-1997 to 31-31998 A or B Cash and profit & Cash and loss bank C None of A or b the above B Cost category F8 an identity A and B Purchase return a or b Stock items units Daybook Alt + F7 None of the above B A None of the above C Regional setting Balance Sheet F10 None of the above F9 None of the above None of the above A D C A None of the above A None of the above B F11 B Changes in transactio ns or vouchers 2 Changes in Ledger Both A Masters and B 3 4 F9 Balance sheet TRUE F10 Profit & loss a/c FALSE F11 F12 A Budget None C A F3 TRUE Main location Ctrl+F3 FALSE Alt+F3 Primary Symbol None of the above C A None of them B Tally.ini Stock Stock summary journal A or b Stock analysis None A None of the above A None of the above C 1 B .imp Tally.

and B None 16 B A C B or C A TallyVault A None of the above C Inventory Cash subsidiary disburse . Cash receipts.By pressing F11 function key TRUE 128 Ledger Accounts Administr ator One company to another company created withon Tally Package During the creation of a company FALSE 228 Groups Owner In 'comp info -> security control' option 28 SubGroups Data Entry Other programs -a spreadsh eet or a database Both A file. Will produce a Does not more require as accurate stringent set of a set of financial internal statement controls. Eliminate s the Will be need to more reconcile efficient at control producing accounts financial and statement subsidiary s. ledgers. s. ments. C data that has been transferre d from memory the address of a memory location an instruction that has been transferre d from memory C Contingen System cy feasibility Capacity Planning report Planning Exception reporting C NIC Card VSAT AGP Card B data to be transferre d to memory Record Count RAM Control totals for Identificati one or on more Number fields Payroll transactio ns. A End-of-file and endof-reel code B .

Writing on a hard Printed board output Storing informatio n on the None of hard disk above B Voice activated Voice broadcast answer ing back Visual audio board C None of above File Validity Boundary protection check protection ring Coloured spots Pixels Pixies Limited access files None of above Identificati on File Name number Storage Printer device Reel Number Pointing device Batch Total None of above System Logs Console Log Data Dictionary B An inked ribbon and print head None of above Physical Security Electricall y charged An ink ink pen Restrict physical access A pen A cartridge Require Use only user unremova password ble media s C B D A C Paper Eraser Make duplicate copies of files None of above A drum A ribbon A cassette A Centralise d function Separatio for PC n of acquisitio duties n A cartridge A drum A print A laser head beam Centralise d function for PC Dispositio n Distribute d policies or procedure s None of A ribbon above An INK None of RIBBON above Storage None of Volume Size capacity above Read and None of Read Write Write above Magnetic Floppy None of tape PAN drive disk above A C A A C C B A .

to an audit departme nt's to add products customer all the & services s above JCL none of these none the above Oracle ACL True True False False Serial access medium Random access medium 1.44MB 20 GB A parallel access None of medium above None of 700MB above A CDROM A floppy disk Magnetic tape None of storage above A CDROM A floppy disk Read Write Magnetic tape None of storage above Read and Write Not By a sunny window ROM chips RAM chips By magnet objects RAM chips ROM chips In a drawer CDROM chips DRAM chips A A A B A B C A B 0 bits RAM chips None of above None of above None of above None of Registers Logic bus above Control None of Registers unit above None of 1 bit 8 bits above ROM None of chips CACHE above Serial access medium Random access medium A A parallel selective access access medium medium Network software and security software Systems software and applicatio n software Business software and games None of software the above B ALU CPUs C B B A B B A A .

System Design. Design. Design. and Testing True False A yes no B true false A true true true true false false false false A A A A true false A to determine the audit objective review and evaluate to obtain the types a record of data layout can bring can bring the data the data all the directly indirectly above extract data from file A none of the above A . and Implemen None of tation above A Specificati on. and Testing Program ming.Mainfram Supercom Personal e None of puter computer computer above B Jon Von Notebook Neumann computer Supercom computer None of s puters s above B First Second Hoover generatio generatio generatio None of n n n above A Second First Fourth generatio generatio generatio None of n n n above C Second Third Fifth generatio generatio generatio None of n n n above C Second Third Fifth generatio generatio generatio None of n n n above B Second Third Fifth generatio generatio generatio None of n n n above A Analysis.

checks file data and structure controls true true false false the source of data available to the audit organizati on source of data for material all the planing above true false all the above D A A none of these A A providing access to computer the of by to all all organizati use of concerne on any none of d personnel programs the above D true false A conceptu natural/m open/clos al/physica all of an-made ed l them true false D A true true A A false false .True True False False change in the method of recording accountin g use of absence transactio accountin of audit n g codes trails B A all the above D document s driven risk driven unique none of approach approach approach the above B hardware and software configurat ion processin g options.

manage hardware & scheduled software jobs resources true false true false enable multiple user resource sharing with productio with audit n departme departme all the nts nts above all the above none of these D B B A true false A true true true false false false A A A true database s true false planning model language base false B all the above D B true false reference report files table files files file filex file-o-man manager filepet to have a complete picture of a system true decentrali zed picture of all the a system above false none of the above A A true back-ups true true false retrieval false false deletion B none of the above D addition C B B A A seriously subject software safety affected area and and database database database database B true true false false at the year end true on immediat quarterly ely basis false A B none of the above B A .

events the above above true false A A true false A true false A true true false false B B increment al design and enlarge activity true true interactive data extraction and analysis false false true false B true false A e-brain bottom up tests yes bouncing ball big-bang top-down hybrid tests tests no B random placemen t of compone none of nt the above D interactive data innumera ble none of analysis the above B A A stub all the above C D B . numeric invalid. none of all the alphabetic the above above A grouping. transactio regroupin none of all the n g.none of Benjamin the above B Benfish Benford true false consecuti ve nos. or alphabets to entities blocks of nos. to the primary attribute of the the entity true false A valid.

master hard A true false system analysis software true yes true true manipulat es.reperform procedure provide s carried read data informatio out by the on client's n to the clients all the file audit programs above D executabl es. deleted. real true yes system advanced software false no false false create. false false no can enable the auditor to execute can be provisions very on a powerful number of analytical different tool bases yes no none of these all the above A all the above none of these none of the above A B A A B all the above A A A can provide the auditors with useful informatio n with trend s and all of the patterns above D A examinati on of source identifies code of a program program provides code with detailed which advice to informatio may be following n of there for the logic machine fraudulent of a none of uses reason program the above C IDEA ACL ALC ACLL B true false A .

none of all the program hardware the above above A identifying identifying identifying nonerroneous ineffective standard all the code code code above D true false A true false A authentic ation of start and informatio resource all the finish time n support requested above job control language yes job connectivi ty all the language above no true true false false D none of the above A A A B package computer p[program for performin g a variety master list administe of data mathemat of red processin ical transactio questionn g function concept ns aire A .fictitious data applied against the client program true true comparis on of source version of a programm ed false false true false analyzing the picture of a file or all the data above A A A A specificati on. file.

prepared by the auditor prepared by the entity true false prepared by an outside programm er engaged by the all the auditor above D A file stratificati access/or statistical/ on and ganization arithmetic frequency all the s operation analysis above D true true B B false false examining the quality carrying examining of system analytical the quality all the process review of data above Wide access to various data base Can extract and analyse data ACL D IDEA Can aid in simple selection High End CAATs Can define the audit objectives D All of the above D A sample of transactio ns A utility software programm e A special purpose written program None of the above A Tests of details of transactio ns Analytical review procedure s Complian ce tests of general EDP All of the controls above actions report Action Event Procedur Procedur es es primary number number false procedure events s form chart macro expressio n comment elements s action Macros integer true D General Procedur es D auto number D A none of the above B macros D D .

code calculator builder expressio expressio n n builder elements C expressio n elements none of action list macro list list box the above none of conditions action insert the above auto embedde tabular columnar report d tabular columnar datasheet justified create embedde new report link report d report report columnar and tabular true create fields primary key label wizard start header report footer C A C B D stable and unstable false dynamic none of and static the above A B insert add chart chart chart C alternate foreign none of key key the above C chart mail none of wizard wizard the above A group page report header header header D page group none of footer footer the above B for ordering records for updating records condition VB Modules add group report true reports append macro sheet false RAD RAP SysCmd MsgBox OLE DDE for specifying conditions with group by clause macro names forms insert none of the above C none of the above C macros D delete B none of module the above C A none of RAID the above A none of message the above B none of CME the above A .

object linking and embeddin on line on line g execution editing none of the above A OLE object OLE communic ator C linked exe OLE OLE client server embedde connecte d d DLL BMP form wizard report wizard static file append dollars unbound object display as icon create html startup bullet DBMS data group query wizard dynamic static html file add rupees bound object edited html publish to web wizard none of the above data definition yen insert pesos command button list box create display link icon save as none of new html the above none of home end the above none of command procedure the above RDBMS front end language data data collection database storage A D D B D A B A C B C A C new database database dialog box dialog box A 235 63500 A automatic number field B B explicit none of inner join outer join join the above A new dialog box 255 automatic number true new blank database dialog box 64000 AutoNum ber false primary key not null no candidate duplicate key key cascade delete related records cascade change related records cascade update related fields A change all related records C .

columnar tabular table or query or tables queries true both a and b record or records none of the above B none of the above C false B Dynaset field properties properties B property field field property crosstab queries row/colum select n queries queries update queries A change/d row/colum elete update n queries queries queries A no match inner join self join join outer join D true false A action queries new form dialog box summary change properties included form form create dialog box sum form wizard dialog append form properties properties sub form both 1 and 3 D simple D new properties B new form child form B Record Record Form Navigatio Operation Operation None of n s s the above B columnar tabular form form filtering ordering filter filter by form * true bound control button group sorts filter by selection $ false unbound control option group database form bound unbound CURRDA TE() TODAY() one to hierarchic many al form form sorting querying B C pipes filter by menu @ gateways A None of the above A ? D B data less data control control B controls record group group B none of collection the above A all of the controlled above C DATE() DAY() C .

000 D true false B true false A true false B all of the table query form D above table form report hyperlink D true false A true false A none of Insert Records Tools the above C true false B true false A alternate composite candidate primary keys keys keys key C true false A true false B true false A true false A true false B none of null not null zero the above B true false B true false B true false A true false B both 1 none of pie bar and 2 the above C true false A true false A true false B .combo list box box columnar tabular pivot table form form text box data sheet filter filter by input button wizard control wizard filter by form option control wizard two of the above static text B main form A none of the above C tool wizard C none of ram* ram?? the above B true false B report form table ledger A none of autoreport report module the above A chart label bitmap report A true false A true false A 60.000 255 25.000 64.

update query true true inner join true true true freestandi ng true true true true select query false false outer join false false false embedde d false false false false the first field of the table forms true delete true true freestandi ng the last field of the table reports false insert false false embedde d use hyperlink true true true true true use import false false false false false true true & true page true true false false # false detail false false true true true relational true false false false list false delete query append query self join table join stand alone B B A C B A B sub chart D B B B A primary none of key field the above C attributes entities D A append add A A B stand alone sub chart B use datasheet use in forms export ? * group topic range logical D B B B A A A A D A C A B A B A C B event structured procedura action query l based none of language language language the above C .

check toggle button. toggle and command buttons filter by form form clipboard search B B D detail none of the above B A A none of inner form the above A labels report B pivot filters list box true form name table unbound bound tabular auto form form relationshi connect ps B A A C B A none of the above A none of the above A none of the above A static C columnar form B none of the above C option button. and button check and combo and check list boxes boxes boxes filter by filter by filter by report record input report macro table file field layout field record sort names grab D D B B D . command list.report true group form false record data true true property false false child sub forms forms graphs chart primary number key query session both a and b index button identifier none of the above forms none of the above option button record source none of the above C create queries form sorts form bound combo box false unbound control data sheet chart form form tabular columnar sub forms form form tabular form calculated bound calculated unbound sub form set relation option.

A way to analyse and manipulat e numerical informatio n An organised way of A tool to storing produce informatio high n about a quality set of A way of document similar maintainin s things g a log C It contains all the Informatio data n about about one certain specific programs item remote relative DBMS DBMS A document which contains text Relational DBMS storing data offline at a separate site uses tape is related as to data opposed mining to disk C backing up data regularly A collection of files B Reliable DBMS C Key Computer Database verificatio sequence Computer access n checks matching controls D A way to analyse and manipulat e numerical informatio n An organised way of storing A tool to informatio produce n about a high set of qualitydoc similar None of uments things the above C It contains all the Informatio data n about about one certain specific programs item A document which contains None of text the above B .

Compilers Network spreadsh . eets. DTP the above C DEFAULT and NOT NULL constraint s CHANGE TABLE remote DBMS FOREIGN KEY constraint s MODIFY TABLE relative DBMS PRIMARY KEY and UNIQUE constraint s ALTER TABLE Relational DBMS storing data offline at a separate site backing up data regularly uses is related tape as to data opposed mining to disk Number Descriptio Compone n nt Source IDENTITY columns C UPDATE TABLE C Reliable DBMS C C D keeping the keeping a original using a backup paper password copy copy saving the file with different filenames A the product code e-mail the primary key mail merge C . interpreter backup database None of s. software. editors systems s.Reports allow users to extract informatio n as hard copy (printed output) Reports provide a very flexible way of creating and editing document s Extracting and analysing data Spreadsh eets make data easy Using to analyse queries A tool which allows text and graphics to be placed in document None of s the above A None of the above C Word processor s.

B foreign key. query and its main form associate report and and a d its related subform. Relations hip Referenti The join window al integrity line The oneto-many relationshi p B Right-click the Relations hip line.A database Graphics bookmark s operators Auto Primary Auto ID browser e-mail A wildcards engines C AutoNum ber Auto Key C forms in a database are consistent with the underlying tables or queries. the primary key of the related table. query. not a primary a field key of from an either unrelated related table. B One-toone One-tomany Many-tomany B Many-toone Employee CompanyI Employee Company ID D LastName Address A The Tools menu. reports are consistent with the underlying tables or queries. table. records in a dynaset are consistent with the underlying tables. related tables in a database are consistent with one another. A the primary key of both related tables. then select Double Delete click the from the Relations shortcut hip line menu Click the Delete Relations hips button on the toolbar B Select Undo in the Relations hips pulldown menu . dynaset.

and all Nothing. object. D A one-tomany relationshi p between teams and players A one-tomany relationshi p between teams and coaches A one-tomany relationshi p between coaches and teams A manyto-many relationshi p between players and teams C # M ¥ * C . The subform is an object on The the form subform The and can is subform be moved displayed is or sized in displayed like any Datasheet in Form other view. D They must both They be cannot be numbers text fields The subform is not visible.That there are several customer s associate d with that ID That some of the data is not viewable That records That there can be are added by records in clicking a related on the table plus sign C They cannot be AutoNum ber data types They must be the same data type D The customer’ s ID is deleted from the Customer s table. s table. An error message is displayed. view. The the Access customer’ related ignores s ID is loans are the deleted deleted attempted from the from the command Customer Loans . table.

prompt. metadata. C does not have to be set. icon. . A dropdown list enables the user to enter text. A D D A . A dropdown list enables the user to choose from one of several existing entries. maintain data on create different tables of things in store data rows and different in tables. B C Dim Sub CreateList CreateList CreateList . title bar icon. relationshi all of the ps.Either table at any time The Customer s table only when there are Loan records associate d with that customer prompt. above informatio figures. C facts. B A check box enables the form user to choose from one of several existing entries. icon. tables. columns. icon. A text field enables the form user to choose from one of several existing entries. . data. title bar text. bar text. title text. must be set for two words. prompt. prompt. singleuser database applicatio n ecommerc multiuser e database database applicatio applicatio n n a or b help people keep track of things. Sub. a and b n. words. The Loans table at any time Neither table title bar text. must be must be set for set for multiple one word.

All of the above. stored procedure All of the metadata s above.singleuser database applicatio n ecommerc multiuser e database database applicatio applicatio None of n n above Sequentia l Query Language (SQL) Structure d Question Language (SQL) Structure d Query Language (SQL) Database Data Database Managem Business Modeling ent Model System System System SQL Jet Server Oracle B Relational Question Language (RQL) C Relational Model Manager B a and b D The user The database The managem database ent applicatio system All of the n (DBMS) above. the database applicatio n(s) interact(s) with the DBMS creates queries the DBMS accesses the database data creates form the user the database the managem database ent applicatio system the n (DBMS) database B None of above creates reports it contains a all the it reduces descriptio users' data n of its data is in duplicatio own one place n structure holds holds holds user data metadata indexes tables D All of above A b and c D All of the above. C D D .

from existing data as a new systems developm ent project as a redesign of an existing database a and b A from existing nondatabase data as a new systems developm ent project as a redesign of an existing database a and b B from existing data as a new systems developm ent project as a redesign of an existing database a and b C normalizat data ion models entityrelationshi p data modeling A normalizat data ion models entityrelationshi p data modeling B data marts normalizat data ion models entityrelationshi p data modeling D data marts entityrelationshi normalizat p data data ion modeling migration D data marts data marts file hierarchic network managers al models models the order entities in of the a column columns vary as to is kind important table relation record field record field record composite key Insertion anomaly field primary key Update anomaly the order of the rows is unimporta nt row key composite key foreign key foreign key Deletion anomaly relational data model A more than one column can use the same name field tuple foreign key candidate key surrogate key All of above C D C C D B D .

Their report delivery is more difficult than report delivery for reporting Nonintegr None of systems.assess the existing tables' structure and content design the database structure are supplied by several wellestablishe d manufact urers were essentiall y killed off have poor by MS response Access time They use sophistica ted mathemat ical technique s. b and c Report Query C A Forms and reports Macros Queries and tables Spreadsh eets D . Form Table data warehous e data are often denormali zed. metadata. ated data the above A create one or more new tables move the data into the new database A are not true DBMS products B a "wrong inconsiste nonintegr format" dirty data nt data ated data problem B a "wrong inconsiste nonintegr format" dirty data nt data ated data problem D data warehous data e warehous database e data are s do not not stored have in tables.

easier for the user the user the user to It is will have to upgrade it advisable to reenter upgrade it if the to put the data if the objects each in the objects are in one object tables and database and table when the tables are and the into a applicatio in one tables in separate n is database. B The Link Tables command can be used to associate the tables in one database with the objects in another database. C Import Link Merge Join A It contains tables. each with multiple objects. or switchboa It contains rd macros C Menu Wizard Interface Design Wizard Build Menu Switchboa rd Manager D . another. more than queries. must reside within the same database. including the tables. An applicatio n may consist of multiple database s. upgraded. It contains reports.Regardles s of how the objects and It will be tables are It will be easier for stored. An applicatio n can be created in such a way that it objects such as forms and reports can be changed without disturbing the existing data. All objects in an applicatio n. linked to yet another database containing only tables. database. one table and forms It contains a user interface.

makers. C Private Key Either B or C A D Either A or B C Subscribe r Relying Institution Party al None of Cost Overhead the above A Certificati on Certified Authority Authority Certificate None of Authority the above A True False A True False B Personal Server Developer Digital None of Certificate Certificate Certificate the above A Personal Server Developer Digital None of Certificate Certificate certificate the above C Private Repositori Public Certificate es Key none of the above B . put key business centralize informatio the n into the managea hands or bility of more data decision collection.create backups for mission critical corporate data. Digital Sign Digital Digital None of Certificate Signature the above C Hash Function Hash Function Digital Signature Hash Value Digital Certificate Hash Result Digital Digital Signature Signature Verificatio Both A creation n and B Institution al Overhead and Subscribe r Relying Party Cost store all corporate transactio n data in one single location.

Key.Evidence. logistics. Efficiency Approval. Public Private None Of Subscribe key. The r Recipient Recipient Above A Internal Format File C External Format File UN/EBCD ANSI IC interchan batch files ge sets Smart Embedde Card d cards E-cash Digital Cash Transmiss None of ion File the above UN/EDIFA UNESCO CT functional functions groups None of SET the above Smart Cards D D A Electronic cheques D Online Catalog Online and Billboards Catalog Broadcast Customer and Junk and and Junk Endorsem Mail Billboards Mail ents C All of the EDI E-mail EFT above D True False B Primary Login_Id Key and and Private Password Key Public Public Key and Key and Private Password Key Global Network Satellite Area Network Private Network D None of the above B . Approval Evidence Evidence Logistics D True False A True False A Certificate Certificate certificate None Of Revocatio Resource Revocatio The n List List n Letter Above A Private Key. Evidence. Ceremony . and Efficiency Ceremony Approval. and .

Encryptio n performed by a physically secure hardware device is more secure than encryption performed by software.Active or push based advertisin g Passive or pullbased advertisin g Error checking Data Low cost Quality Integratio of managem n operation ent B Glow sign or hoarding All of the strategies above D Endorsem Broadcast Junk mail Billboard ents A DirectE-mail Bulk-mail mail Junk mail D Endorsem Catalog ent Billboard Broadcast C Competiti ve Corporate Industrial Economic espionag espionag espionag espionag e e e e C Contact numbers A A list of of the competito competito managem Research r’s new r’s clients ent group data project B singleuser database applicatio n ecommerc multi-user e database database applicatio applicatio None of n n above C Keeping Including Replying messages the promptly short Subject Using all capital letters Removabl e drives that can be locked up at night provide adequate security when the confidenti ality of data is the primary risk. D . C Message authentic ation in EDI systems performs the same function as segregati on of duties in other informatio n systems. Security at the transactio n phase in EDI systems is not necessary because problems at that level will be identified by the service provider.

ency none of .text import wizard cell reference convert text to columns wizard tip wizard row column reference reference text files serial values Lotus 1-23 domain values function wizard A none of the above A quattropro or xbase files range values =currentd ate() class files reference values none of =today() =date() the above none of dollar sign ' = ' sign # sign the above function none of AutoSum AutoFill wizard the above argument parameter none of variables s s the above text logical numeric Boolean concaten none of ate pmt merge the above countif vlookup pmt count pivot table chart wizard wizard convert text to columns wizard sumif countif pmt D D A A C B D A A tip wizard B none of the above B average sum sumif countif page none of setup print area print the above autoforma none of t AutoFill the above none of bordering formatting shading the above page print setup print area print preview none of filtering searching sorting the above C A A B B A all option blanks all blanks none A www.com the above B none of URL DNS FTP the above B .c www.in om brit.eb.ency www.

0 C C B A C B D C C D C C .in dex search index search.ite search m search infoseek excite lycos netshark cello lynx lynx mosaic Lycos item search.internal network applicatio n layer finger service network of network transport layer ping service intermedi ate network physical layer FTP TELNET none of the above session layer none of ftp service the above none of ARCHIE the above uniform research locator uniform resource locator unlimited restore locator none of scheme the above command none of message scheme line the above general Delphi Microsoft sears electric net web browser editor browser CompuSe rve internet spy dialer mosaic gophersp gophering ace D A C none of the above A name of host the computer resource read the Usenet news B C C C B search for none of database the above C wincim or maccim cyberspac e none of the above none of the above none of Alta vista open text excite the above finger web none of server ftp server server the above none of list directories image list the above maximum no of five one many middle middle lower top and lower hotlist directory index glossary directory search.in dex search all the above all the above navigator gold 2.m menu enu search.

Microsoft internet finger Usenet service Higher text transfer protocol iccp yahoo IBM CompuSe rve D ftp telnet D Hyper text Hyper text Hyper text transmissi transfer transfer on port protocol port C none of ftp uucp the above C none of ftp telnet the above C one two transfer communic ation protocol/i nternet none of protocol the above B none of three the above C ftp servers domain name servers web servers the internet adapter the internet the administr internet ation access browser protocol hotlink text transfer protocol higher hyper text type transfer transfer protocol protocol none of the above B universal resource locator uniform resource locator name of the above B transmissi transfer on control control protocol/i protocol/i nternet nternet protocol site uniform resource label none of the above B none of the above A organizati on B frequent asked query frequently frantically asked asked none of question question the above B none of SLIP.IP IP.PPP TCP.UDP the above A connectio n response request close A wide search for informatio n and research world search for windows informatio sockets n and internets research none of relay chat council the above B .

go none of lynx.t .scripts.allsrc telnet and ftp wais.b erkeley freenet none of the above A none of the above B none of the above B none of the above C none of the above B none of animation the above B graphics.images.wins ocks allsrc waisman winsock higher text medium language hot links hyper transfer hyper text markup markup language language books hyper text marks images applets university of berkeley.i mosaic.netscape.wins ocks wais.audi s.di ftp and rectories finger allsrc.minx e pher the above B world world wide web wide web server client interface glossary index none of the above B none of hotwords the above B very easy and rodent oriented net wide index to computeri zed archives very organised network integratio n and communic ation applicatio n verificatio n on network integratio n and communic none of ation the above A university of cleveland. cleveland freenet IP protocols address university of California none of net the above B none of dns the above A search engines.v programm animation ideos.ex none of o ext ecutables the above A home welcome none of first page page page the above B global network news yahoo service global networks navigator electronic mail grand network news search engines none of the above B none of the above B .

inf eudora.ne oseek.alta netscape.Netscape page email and starter net site.i tscape none of vista e.netsc yahoo conferenc ape page and e wizard altavista newsgrou p telnet ftp Lycos point all the catalog review above apple link bitnet Delphi computer related abbreviati ons and acronym none of the above B archive D none of the above D fidonet A biographic al informatio bookstore none the n s above D encyclope on-line more dia reference informatio Britannica works n galenet A search engines B web directories database channel Graphical Graphical Graphical Graphical interpreter interchan interface Interface formatting ge Format format format B Joint Pictures Expert Group mails Jumbled pictures expert graph document s Joint pictures expert graph Joint pictures experime ntal group A net browsers C yahoo.lynx and pine the above C informatio web n pages BACKGR OUND COLOR network connectio ns mails B FONTCO FCOLOR LOR B Communi Communi cation Common cation Common gateway graphical graphical Gateway interface Interface interface Interface D Communi Connectio Network Interface cation n B Current None of web page Browser Client the above B .

directo ry-path video hotlink C B none of the above B none of the above C .gif and and . hostname and directory path service.ho directory stname path and port B .gif start home .wmf and .po rt and service.Browser/u ser Server Web Channel Unknown resonanc Uniform e resource language locator United relay limited None of the above B image text only only SQL PLSQL alphalang betalangu uage age text or image SGML metalang uage neither text nor image C CGI C none of the above C palm is not eatable pancake is not edible none of the above B palm is not elm SGML SGML Preproces SGML Processor sor Parser A SGML Compose r C document s A web sites images applets Internatio nal Engineeri Internet ng equipmen trainers t training and faculty faculty Internet Engineeri ng Task None of Force the above C MS Internet Explorer and Mosaic MS Internet Netscape Explorer Navigator and and Netscape None of Mosaic Navigator the above C text hyperlink data from a database symbols hypertext hotword in in userin random sequential defined order order order first .ho stname.p ort.bmp C service.bmp .bmp and .jpeg Service.jpeg .

window pher.m vendors.winsock above B ARPANE none of dnet arpanet T the above B defensive administr ative rank administr ation network dedicated and registered projects administr ation start begin defensive advanced research projects administr none of ation net the above C none of first the above B milnet.sm aller mailnet.mail mail mail server servers.trumpn ator.research dance dining none of the above A .file arsing news. robots ail clients mail and and identificati gateways alternate on and to other none of services password services the above C <center> <font size=n> <hr size=n> communic ation generated informatio n Server common gateway interface Client arpanet the net LAN peer-topeer connectivi ty wan data parcel <l1 type=sha pe> D classified general instruction none of s the above B Browser User A none of intranet the above B packets none of the above B none of the above A scripting.coo retrived.in intranet.win ra.in and king and ternet none of compiling fine arts tools the above C mosaic.go nt.ie.ie.e none of arpanet et xtranet the above A cooking education music and and .mailing lists.p email.eudo communic s95.lyn all of the zip et x.

VAN smart network and dumb network file transfer LAN.AAN packet switching. store and forward network anonymo us ftp KAN.WAN .n states & orway Russia server client client standalone network card network topology network redirector none of s the above B detailed transactio n explanatio n applicatio n layer data terminal equipmen t physical layer data target equipmen t network layer point to point network and broadcast channel network file access PAN.Higher text manipulati on language Hotlink text markup language united states and UK united england.MAN VAN MAN LAN MAN analog digital Define Data type type of definition data Hyper transfer Hyper text meta markup language Language D network servers none of the above B none of the above C none of the above C none of the above B none of the above B none of the above none of the above none of the above none of t TAN he above none of WAN the above none of non-digital the above B B C B C B Document type Document definition type data C Modulatio Manipulat Moralize/d n/demodu e/demani emoralize lation pulate Modulatio Manipulati Mapping n on none of the above B none of the above B .RAN .NAN .

F ormal Legal requireme nts A D A Formal Legal Requirem Open ents System Formal Legal Requirem ents. Open System D Signer Affirmativ authentic None of e Act Efficiency ation the above A Signer Authentic ation Not True Document Authentic Both A ation and B Not False Nonrepud iation Digital Service signature Affirmativ e Act Efficiency Digital certificate Either A or B Neither A nor B C B Private Key A Neither A nor B. A .Satellite link and digital signals Dedicated access and dial Cable and none of up access wires the above B Standard long internet protocol Stream line internet protocol Prime Point to prolonged point protocol protocol sending informatio storing n to a data on a host disk drive computer Bandwidt h Speed Serial line none of protocol the above C Pillar to pillar protocol none of the above B storing data on the hard drive receiving informatio n from a host computer B Size Channel Browse Either A or B Both A and B Retrieve C Neither A nor B B Both B and A C Find Recipient Party Public Key Save Relying Party Private Key E-mail Electronic Electronic Commerc Fund All The e Transfers Above Not False Not True Closed System.

D Business. A The private key is used by the receiver for decryption but not by the sender for encryption . Received by the intended recipient. errors.Cryptogra phy Private Key Private Key Private Key Decryptio n Public Key Public Key Public Key Public Key Cipher Private Key Both A and B Both A and B Both A and B Encryptio n None of the above Either A or B Either A or B Either A or B Cryptogra phy A C A B C Reviewing Using Conductin the data Performin g fraudsystemsencryption g validity awarenes access . s training. Not intercepte d en route. function. A Failure of server duplicatin Firewall Data entry g vulnerabili Collision.BackendtototoBusiness Backend Business On-line Endorsem Billboard Catalog ents BusinesstoBillboard A Broadcast B Customer Endorsem ents Billboard Intermedi aries portals Catalog Broadcast A . checks. D Unaltered in transmissi on. The private The key is private used by key the cannot be sender for broken encryption into but not by fragments the and receiver distribute for d to the decryption receiver. ty. log.COM Domains Order Placemen t Service Search and None of discovery the above C A . Both sender and receiver must have the private key before this encryption method will work.Business. . Sent to the correct address.

Commerc e and Transacti on EDI For Administr ation.Post Prepurchase Purchase purchase Search interactio consumm preparatio and n ation n discovery A Billboard model of marketing Online Catalog Endorsem ent model Online of None of catalog marketing the above B Shopping Pulling cart Billboard cart B EDI For Administr ation. Commerc e and None of Transport the above C Compiler EFT Gateway Assemble Interpreter r EDI BusinesstoBusiness Emergenc y Cash BusinesstoConsume r Electronic Cash Communi cation Perspecti ve Business Process Service Perspecti Perspecti None of ve ve the above C Consume r-toBusiness Euro Cash Micro Transacti TT(Tiny Microcash ons token) Decryptio Encryptio n SSL n 1 2 3 filtered index data table table table pivot table wizard series or rank series or rank series or rank chart wizard convert text to columns wizard category legend category legend category legend D D Customer -toCompany B Endorsed Cash B E-token A Subscripti on C 4 B pivot table D tip wizard data marker data marker data marker D A B C . Consume r and Transport EDI TCP/IP EDI For Administr ation.

It shows over a close trends period of chart over time time Pivot Scenario table manager Solver Scenario Goal seek manager Pivot Goal seek table Workshee Workbook t Pivot table B It is also used for indicating fluctuation s in temperatu re changes B Data table. D Spreadsh none of eet the above A . C Data table.series or rank column chart column chart column chart column chart spaces excel97 category legend bar chart pie chart bar chart pie chart bar chart pie chart bar chart pie chart wild card character s symbols internet explorer Netscape pivot table chart wizard wizard line chart bar chart convert text to columns wizard stock chart data marker surface chart surface chart surface chart surface chart D C B D A none of the above A word A 2000 tip wizard A pie chart C true false A and or B 3dimension s true Data table 4Multidimension dimension s s false Pivot table A A It is often used to display share It is also market called as prices high-low. A Data Solver table.

Performin g database operation s Column field two true Source table Row field. D C B B A B B Solver Data table C Pivot table Data table A SumIf A tables worksheet s D . nts. manager Scenario Goal seek manager Standard Count. above 34Multidimension dimension dimension s s s Pivot Data table table It is useful when several compone nts are changing and the user is It displays interested the data in the series sum of one on the top of the compone other. Pivot Scenario table. deviation database s records It can be represent ed in 3dimension s Pivot table item.Performin g calculatio ns. name. three N false Performin g text formatting All of the .

2.4.10 D spreadsh eet D Rows A Document filing A .2 2. solver A Pivot table function tip wizard wizard worksheet workbook tables applicatio document modal n window window window D B database A C A dark wide border A dotted border A blinking No border border A 8.8.32 2. Goal seek.It is a tool for summarizi ng and analyzing the data records in an interactive manner.16.2 your formula has a syntax error the row is too short to show the number at the current font size the column is too narrow to show all the digits of the either b or number c C ability to generate tables speed of flexibility cost of calculatio of moving initial setn entries up D word processin g Range Producing graphs graphical Address Writing letters database Gap Drawing pictures 6. It is a tool that provides a way to view and compare the results of all the different variations together on the worksheet Scenario manager text import wizard convert text to columns wizard It summariz es the data by using analytical functions.

C SUM(H9: G7*SUM( H11) H9:H11) B The phrase “active cell” It is appears displayed in the in reverse Status video. 100 click the column heading click the column label C TAB INSERT constant. function. C Cell reference Numeric Text s Functions constants constants D ^ / * \ D B5*B6 C3/D4 E12 6 It is surrounde d by a heavy It is border. A B Tom (201)555McKenzie 1212. bar. blinking. It is impossibl e to determine D4^2 .drag from the top cell in the doublecolumn to click any the last cell in the cell in the column column CTRL + ENTER ENTER array. A By either clicking in a different cell or By using using the the arrow arrow By keys to keys to clicking in move to a move to a a different different different cell cell cell By typing the reference of the cell you want to move to in the formula bar C The Cell Format The The command Standard Formattin on the toolbar g toolbar Edit menu The Font Size command on the Tools menu. #VALUE! . formula. B .

range. n range. D12:G25 cell group. range.the New command on the File menu. paste destinatio range. group. G25 copy destinatio range. D source clipboard. 6 D12. C Window A Preview Details List Properties B Delete Both Insert and Delete Clear C Delete Both Clear and Delete Remove B Fonts Margins C View Edit B Insert Clear Orientatio n (portrait or Headers landscape and ) footers Page Options Setup worksheet . n range. range. File the Save command on the File menu. source clipboard. Edit the Save As command on the File menu. B C D B Both the Copy and The Paste Duplicate The Copy The Paste command command command command s D absolute relative mixed constant A B4 $B4 B$4 $B$4 D #DIV/0! #DIV/0! #DIV/0! #DIV/0! B #DIV/0! #DIV/0! #DIV/0! #DIV/0! C Both the Cut and Paste The Move The Cut The Paste command command command command s D . View the File Type command on the File menu.

integer. cycle through open applicatio ns. address. Right-click a cell and click the Edit Hyperlink command . in the cell D text with a text with a two-digit four-digit an year. text with either a two-digit or fourdigit year. dependin g on the format. A . edit cells. adding the earlier date to the later one. B whether the cell has an absolute or a relative cell the value reference. B subtractin g the earlier date from the later one. adding the later date to the earlier one. whether the cell has a formula or a value in the cell it. year.cycle through absolute. Doubleclick a cell and click the Insert Hyperlink command . s. relative. C the Fill Handle the Format Painter the Condition Formattin al g toolbar formatting B Select the Insert Hyperlink command from the File menu. C Jul-30 Aug-31 It is impossibl e to determine from the 29/03/200 informatio 8 n given. Click the Insert Hyperlink button on the Standard toolbar. subtractin g the later date from the earlier one. and copy and mixed cell paste reference cells.

Once a line chart has been chosen it can be changed to a pie chart. 03-Apr the F2 key.G10 B1. constant. variable. D Once a column chart is chosen it cannot be changed to a bar chart. D B1-G10 B1.75.G10 B1:G10 D AVERAG E COUNT MAX SUM C Combinati on Line Pie Scatter C Once a bar chart is chosen it cannot be changed to a column chart.the F4 key. a variable. 0. dependin g on the cell formatting C B either a cell on a a cell on a worksheet worksheet a or a . March 4 of the current year Either 3/4 or . Once a pie chart has been chosen it cannot be changed to line chart. hold down hold down hold down hold down the CTRL the SHIFT the ALT CTRL + key key key SHIFT A Paste Transfer informatio Use n to a multiple database sheets Paste Fill Down Fill Right Special Tools | Sort Analyse data Data | Sort Calculate data Use tables Create four separate files Edit | Data | Sort Create forms D B none of the choices B None of the above C . the F1 key.75 the Esc key.

select Print selection on Page press the Setup | click the PRINT Sheet Print SCREEN and then button key print producing writing drawing graphs letters pictures (D4+C2)* D4+C2*B B2 2 #VALUE! 0 portrait AD213 CERN yahoo and infoseek =A3SUM: B3SUM:C 3SUM REF! select Print selection in the Print dialog and then print D None of the above A =(B2*(D4 +C2) C None of the above B whatever was last landscape used vertical A None of ZA1 A0 the above C ECRN CARN NET A mailto and files newsgrou ps and search none of engines the above B bulletin boards.ya and hoo and wireless infoseek system applicatio n servers.pr oxy servers and web none of servers the above B business broadcast ing system A bulletin broadcast ing none of system the above none of small large very small the above windows windows windows none of socks sockets stocks the above Mosaic Yahoo PINE Lynx none of buffer cache built-in the above Photogra Digital Cryptogra Message phy Signature phy Digest Hash Key Lock Function Formula bulletin board system User-id Password Name Address B B A B C A B .m news ails call groups.

Above B .co Amazon . m com Dell .Penetratio Cryptogra Password n Retrieval phy Cracker Regulatio Acts ns Address Protocols Unauthori Spoofing Imposting sing Approving Loss Threat Exposure Hacking Sales tax authoritie s Utility Income tax authoritie s Pirated software A D A B Judge of a civil court Police officer of IPS rank.com B Automate d Tailor Any Time Machine Money Regulatio Acts ns Router Gateway Asynchro nous Transmiss None of ion mode above C Address Port Protocols C Pin B CAN PAN LAN WAN hyper terminal tracing program hypertext hypertext hypertext tracing transfer tracing program protocol protocol C National Network Informatic Interface s Center card New Informatio None of n Card the above B Only Can not Computer computer Only s s printers Combines connectivi ty of a hub with Concentr the traffic ates regulation connectivi of a ty bridge A None of the above D Switches data from incoming ports to outgoing All of ports. B Virus Cracker C Tim Berner Charles Howard Lee Hoffman Bubbage Aiken A Etrade.com Msn .

networks B bits C RG7U Bridges Hubs and and Hubs nodes None of frames Packets the above virus gateway router checker None of Two Four the above Data-Link Network All of the Layer Layer above Coaxial Twisted cable Fiber pair Physical address Logical address A cable Hub Data return to the sender It continue on to target device It gets with destroyed corrupt bit by bit.Bridges and Two or Repeater more s. data Wireless technolog y Physical Layer Wired Technolog y Data Link Layer Ultra violet technolog y Network Layer Binary 48 Bits ASCII 48 Bytes Octal 48 KB software that facilitates connectio n to the internet a list of rules for transferrin g data over a network a gateway calling software program that for allows file internet copying bridging B Network Server C PC firewall One Physical Layer Novell PC Client A C D B A memory None of address the above B None of Router the above B None of the above B None of the above All of the above None of the above 48 MB A D A A .

it node brings goes down all down. FDDI kbps Kbps Ethernet. token ring. token ring.If the hub goes If one down. DecNET. DecNET bps bps Ethernet. it brings down all of the nodes on all of the rings B None of the above B All of above D Bus Star Linear Parallel Ring Both A and B Parallel Circular Ring Ring Star Bus Bus Bus Ring Network Layer Bus Star Transport Physical Layer Layer Mesh A Data Link Layer D Ethernet. token ring. ARCnet B mips B Mips C usually higher than LAN speeds CD-ROM drive A Linear None Both A and B Star Star Linear Mesh Mesh Ring C B C Ethernet. it of the brings nodes on There down the that isn't one entire ring section Physiolog Both A y Topology and B If the hub goes down. FDDI mbps Mbps depend on the transmissi on medium Windows a modem 95 measured in bytes per second B limited by modem speeds C Netscape B must use the World must use Wide electronic Web mail must have a LAN account All of the above key gateway interface common gateway interface applicatio n protocol interface C interfaces a modem to a computer connects a computer to a network D uniform resource locator a Novell used to Interface control a Controller printer A .

CD-ROM drive a modem Novell Linux Netware Windows package Netscape B Windows None of NT the above C have to do with compressi on of graphics and video the Internet none of the previous must have a LAN account use appropriat e communic ations software A bridge none of the previous have to do with Web pages must use the World must use Wide electronic Web mail Printer modem A D provides access to is a CPU the is a CPU functional make of Internet register unit processor A is a protocol for the transfer of files between is part of computer Netscape s D used to send email used to browse the Web used to send email uses wireless communic ation is part of None of medium Netscape the above D used to protect a computer room from fires and floods a backup server a screen a form of saver virus program an email a poor server file server IR system for the hardware Internet browser none of the previous D none D none of the previous C .

Denial of Service Individual computer s can connect to it using an ISP. layer. Any layer can communic ate only with the layer above it. A Port sniffing C used to protect a computer room from fires and a form of floods virus a screen saver program none of the previous D .scanner search CD-ROM clip-art file engine D provides access to the is a CPU Internet register is a CPU functional make of unit processor A used to send email used to browse the Web is a protocol for the transfer of files between is part of computer Netscape s D used to send email is a protocol that uses allows for telephone is part of remote lines Netscape login D Any layer The can layers communic cannot ate communic directly ate with with any one other another. C It is made up of many networks connecte d into transmissi on lines It is one called large backbone network. s. Any layer can communic ate only with the layer directly above or below it. Password System cracking intrusion It works the same way as a local network.

Trojan horses and key loggers. port. Spyware D Modems Multiplexo Protocols rs LAN B cookies and Trojan horses. Phone A Trojan horse ActiveXenabled sites are safe. B Web Applicatio traffic n updates D Adware A worm by attaching through to an ean FTP mail. Changing the content of a Web page D . Only large namerecogniza ble sites are safe.Flood a Web server with requests packet Virus that initiates a ping flood UDP flood A flood traffic C firewall router a backup an email server server switch hub B a poor file none of server the above D IP flood hack Apply security patches Backup Update data on a Limit virus daily logging on definitions basis access C All sites are safe and reliable. Use of Use of logical Use of password access identifiers s methods B Use of encryption methods D E-mail by scanning by the attaching computer itself to a for a document connectio . There are safe and unsafe sites. C An attack on a system for personal gain An attack with the purpose Giving out of gaining disinform publicity ation cookies and key loggers. key loggers and worms. n.

D Phishing cyber stalking. Shutdown of nuclear plant safety systems D Shutdown of military security systems stop its competito rs seeing their prices update its prices as soon as they are changed D Yahoo People Search Date of birth Fraud USA People Search Personal assets Adware Lycos Search Criminal records Spyware invest without risk. cookies. viruses. account.Disruption in Disruption All of the Economic communic in supply above are damage ation lines correct. pop-ups. Shill bidding Internet stalking. make large amounts of money by parking purchase funds in off-shore their bank property. Use a fake email address. B . server. B A B B B B Use antispyware software. as in the 1930s To carry more network capacity Contamin ating water systems To improve network services To obtain an accurate inventory of network related To equipmen improve t and system parts and response network time nodes D limit access to set its computer prices owners very high only People Search Name of your bank Virus buy stocks. D Crashing the stock market. spam. Siphoning virtual stalking. Hoaxing Web stalking. Never use Use a your real proxy identity.

co in used for used for used for companie None of company company s the above A the World Wide Web round trip Consortiu HTML.Physical Encryptio Security n controls I only irc II only ftp Message sequence Logical number access checking controls Neither I Both I & II or II www telnet Adds more Verifies Increases bytes to integrity of boot up programs files time B C C Misleads a program recompila tion B HTML Internet Explorer both HTML and Microsoft Internet Excel Explorer B Web query. B . browser. . XML. HTML.con is . B Click on the Back arrow until the desired site is found Click on ‘Go to’ or ‘Search’ in the browser Go to the Bookmark s or Favorites page C Go to the History page and look for the site . round trip HTML HTML document document Web . m HTML.com is . DHTML. MHTML C D using Internet Explorer to view a Web page that is stored on the hard drive on your computer clicking a hyperlink that reference sa updating document the values that is that are stored in obtained the floppy through a drive on Web your query computer viewing an Excel worksheet that you have saved as a Web page. one way HTML.

VoIP IPT IPP an encryption . paper.1 So email is delivered faster 143. signature. a footer. C network topology A an attachme a nt. A None of the above B File Transfer Program File Transmiss File ion Transfer Protocol Protocol None of the above B So computer s can be reference d by a name So IP addresse s can be shorter Desktop client.1. applicatio n. and hardware.1. network. uk org.215. Cut and paste it to a word processor document . software. @domain.3 45. and database.1.trigg @ paul. and database.dom None of org. Telephon CD-ROM e line Desktop server. intranet. B PoIP A Desktop client. applicatio n.the the the Insert the External Refresh Hyperlink Update Data command command command command A Screensa Hyperlink ver Sound BMP GIF JPEG Video TIFF Add it to Write it ‘Favourite Save it to down on s’ or a floppy a piece of ‘Bookmar disk.19 C C None of the above A None of the above D paul .trigg domain. and hardware. ks’.uk ain. privileged extranet. paul.uk the above B Scientists The US in governme Switzerlan nt d No-one None of the above C . Modem Desktop server. 193.2. software.1 2.

t movelast. bof.false none the above all the media clip .true form properties layout window window movefirst.true false number() val() rectangle square false false oval B A B D D D D D A A . bof.video file above movelast.f rue alse eof.false true value() int() circle true true None of the above C project toolbox explorer movefirst.Internet Relay Chat Internatio nal Relay of Character s Internet Remote Conversat None of ions the above A It will be deleted It will be waiting for you to collect it A letter will be sent to you in the None of post the above A Hyper Textual Mark-up Lingo Hyperlink Text Marking Language Hyper Text Mark-up None of Language the above C Receiving messages automatic ally from anyone in the group People discussin g a topic High of interest volumes globally of email clipart & auto shapes autolayou ts and presentati slide view on & outline none of templates view the above B circles points squares icons C square grid auto shapes guide all the above C tool bars image short cut menus clip gallery & word art slide show & fonts & view show images wave file eof.

true foresize none of the above C none of the above B fontsize D onemillionth of a second onethousandt h of a second one-ten thousandt h of a second C count onehundredth of a second recordcou nt form layout window prperties window title prompt project explorer toolbox B vbmsgbox none of style the above C itemcount listcount D msgbox() textbox label inputbox() D opendyna opensnap dbopensn dbopendy set shot apshot naset D load activate standard blue red opaque red green form properties layout window window unload transpare nt green blue toolbox initialze C graphical D black B white D project explorer window D form properties layout window window change lostfocus project explorer toolbox window A text gotfocus D none of child parent container the above C true false A load unload initialize activate D none of text name caption the above C opendata openrecor none of base dbengine dset the above B enabled visible value dime .ctl .ctr Validation Check style none of the above .true size forecolor textunderli ne.fontcolor underline.ctx Validate dim var . true textsize color fontunderl ine.ocx Audit On Error GoTo linelabel On Error GoTo Inline On Error Resume Next On Error Stop C B B A D .

text Msgbox Msgbox error.desc ription D To provide a repository for To allow images To display To help in the used by images to creating a editing of other the user ToolBar icons controls D GetFileNu FreeFile m GetFile GetBytes A GetPrope Retrieve Get rty Value B .UpdateCo PaintPictu ntrols re Refresh Cancel parameter Cancel to a non.parameter zero value to 0 UnloadMo de parameter to a nonzero value 1 3 2 Resize A UnloadMo de parameter to a zero value A None of the above D Consists Consists of several of several Applicatio Programs ns Consists of Various Forms Consists And Code of several Modules Projects D Form window. view code window Class module.text None of the above A PaintPictu re A Msgbox error. standard or code module Project window.num ber & error.text error. code module Place code in the Terminate event Place code in the Unload event Place code in the Deactivat None of e event the above B AutoRedr AutoRedr aw = aw = True False Refresh Msgbox err.numbe ber & r & err.num err.no & err.

KeyUp Click and and KeyPress KeyDown Ascii Binary Format Format KeyUp and KeyDown Input Mode CurrentX and CurrentY Property Get ScaleHeig ht and ScaleTop x and y Property Property Let Set ScaleLeft and ScaleTop Property Assign KeyPress. built-in intrinsic procedure constant. variable.Common messages passed to Open Windows Windows dialog box explorer Input box D Caption Visible Multi-Line Font C Click. . KeyUp and KeyDown D Output mode B A C Backgrou nd color Caption property property ZOrder property Min Max Value AutoRedr aw property C CurrentVa l B Shell Substr SetAttr CStr Are one and the same Can be different at times Are actually not None of properties the above B You do not need to use the Set command here You do not have the permissio n to access the class MyVar has not been declared A None of the above C The ExecProc The Open The Exec edure None of method method method the above D A critical An A warning message exclamati None of query icon icon on icon the above B statement . C .

while the InputBox function cannot. does not. cannot. B A new check box can be added. modified. value. Deactivat e MsgBox statement can be created with the macro recorder.InputBox function can be MsgBox InputBox created statement function with the returns a returns a macro value. recorder. while the while the while the InputBox MsgBox MsgBox function statement statement does not. QueryUnl Unload oad Data can be entered. Data cannot be entered The form into the can be form. C Terminate C cutting tool color color box scheme scribble drawing tool color guide ascent 10 column tricolor scheme 28 bar primary color scheme 36 linear images images and text clipping tool color palette circular entity cropping tool color palette 18 pie slide sorter slides views all the radar doughnut above data point data stream Microsoft organizati on chart clip art auto shapes track changes A C A C A C A B A the organizati on chart is expanded the chart window the chart opens is made displaying available a chart none of for editing template the above C box tools general purpose tools custom drawing tools standard drawing tools C .

ppt(Power Point) nine .5 inches.used to create a used to manager mange accessed box for an organizati only by existing onal chart manager box used to store the other tools of the organizati onal chart C not available available in the tool in the tool turned on turned off bar bar any of the once twice thrice above two four five eight standard all the native tool draw tool tool above autolayou handlayo none of ts uts slide view these reduce/en none of zoom large preview the above B C B B B B importing exporting copying Microsoft auto excel shapes clip art moving drawing tools .10 inches.5 inches.txt(plain metafile) text) not displayed during the slide show displayed only during the slide show .7. doc(docu ment) B displayed only in outline none of view the above A DTS(digit 3D(3 al track dimension both a sound) ) and b slide build transition show notes slide master master master slide outline view B transition D view show A master notes A slide sorter slide view view show view 15 10 7.rtf(rich text format) wmf(wind ows . . html(hype rtext format) B twelve C .5 inches inches inches none the above C B .rtf(rich text format) only one . doc(docu ment) six A .

portrait landscape a or b none of the above A animation view show transition b or c A none of gif jpeg png the above D action all the hyperlink hypertext button D above visual basic for applicatio visual c++ n macro batch file Microsoft visual all the interdev above templates add-ins B A during slide transition spell checkers custom show notes slide pane pane when the slide show is run header files both a and b properties pane none of the above all the above none of the above outline pane internet explorer paint shop pro paint shop pro power point 2000 PowerPoi nt creates a sample presentati on to which user can add words and pictures it is the quickest way to create a presentati on contains sample presentati ons for a variety of topics provides suggested content and design D while creating a .exe file virus checkers slide show C A B D D .

user can insert user can picture to user can insert only the insert premaster objects drawn. drag the slide icon to a new location I slide view.prewhich arts. drag the slide to a new location in notes pages view. main text and any backgrou nd items that user wants to appear on the slides is called a master templates . drag the slide icon to a new location C transition means applying special effects to the crossover between the slides design templates is the template whose format and color scheme user applies to a presentati on the slide that holds the formatted placehold ers for the title and sub-title for the presentati on is called a title template D in outline view. slide like clip. colored gets pictures graphic reflected stored in images in all the a reflected slides separate in a clip using that files to the arts to the master slides slides slide user can insert picture to the title slide which gets reflected in all the slides using that title slide B in slide sorter view. drag the slide icon to a new location the slide that holds the formatted placehold ers for the titles.

user can see the miniature s of all slides in a presentati on. complete with text and graphics user should select the slide view to add the text to the slide transition means applying special effects to the crossover between the slides design template is the template whose format and color scheme user applies to a presentati on the slides can be reordered in the outline view B customize the slide that holds the formatted placehold ers for the title and subtitle for the presentati on is called a title template D set up new slide show B by default.with notes pages view user can prepare speaker notes and handouts the slide that holds the formatted placehold ers for the titles. main text and any backgrou nd items that user wants to appear on the slides is called a master template slide layout in outline view. doughnut data to be chart is graphed displayed resides in based on a the data datasheet in the window datasheet user can add data data is labels and plotted in gridlines a chart to the window chart B the master slide office assistant 10 once the header slide grammar checker 102 three the slide master spell checker 12 twice the format slide none of the above 22 four times B B B B .

digital camera and sound. Line and Line Line color thickness thickness D A popup box Excel is prompts started so you for an that you existing can Excel create a chart to chart. text. Point. . and text alignment D Fill color Fill color. hypertext. Power Point. taken from the dependin from the first g on first row column of whether of data in data in the data the the series are entered datasheet datasheet in rows or by the . hypertext graphics and and email Power address. The graph placehold er is deleted. columns. Side-byside column Stacked column Pie chart C Line chart B . text font. user.text. Microsoft Graph is started so that you can create a graph. video and sound. C taken from the first column or row of data in the always datasheet always taken . text. Line color. CD-ROM. D the Line style the Line color the Font and the text alignment Line style. insert. Line color.

A dialog box is displayed allowing you to enter the name of the Excel worksheet that should be embedde d in the PowerPoi nt presentati on. or pull down the Insert menu and select the appropriat e Object. datasheet then once the select slide is Object. then click It the View automatic Datasheet ally button on displays the in Slide Standard view. toolbar. D C . Pull down the Insert menu and select the appropriat e Object. You cannot display Pull down the the Edit underlying menu. The datasheet window is toggled The from datasheet closed to is saved open (or as a from open separate to file. finished. Change Click to Slide outside Sorter the chart. Double click the chart. click the Insert Chart button on the Standard toolbar. B Single click the chart. Click the chart object. view. D Click the Insert Pull down Chart the Insert button on menu and the select Standard Chart. A dialog box is displayed allowing you to enter the name of the Excel worksheet that should be linked to the PowerPoi nt presentati on. closed).Pull down the Insert menu and select Chart. toolbar.

in size. D a slide one bullet item at a time. time. is deleted. build bullet items a letter at a time. time.The applicatio n that The chart The chart created is The chart is doubled the chart selected. or Exciting D Neither enter nor exit. neither fly in from top nor bottom C Ctrl B . restart. and build a slide bullet bullet bullet one bullet items one items one items a item at a letter at a word at a word at a time. and Fly in fly in from Enter and from top top or exit or bottom bottom Enter Shift Alt Subtle. in size. Moderate. is started. D Subtle Moderate Exciting Both enter and exit. is deleted. A The chart The chart Microsoft is The chart is doubled Graph will selected. time.

the way objects exit a slide. what objects do after they appear on a slide. and to the way objects exit a slide. C Clips Organizati on charts Text Clips. D The advanced timeline shows neither the sequence in which objects will appear on the slide. object. nor the duration of the effect applied to each object.the way objects appear on a slide. organizati on charts. The advanced timeline shows the sequence in which objects The The will advanced advanced appear on timeline timeline the slide shows the shows the and the sequence duration duration in which of the of the objects effect effect will applied to applied to appear on each each the slide. and text D Paint program Draw program Animation program A Filtering program . object. Custom animation can be used to affect the way objects appear on a slide. to what objects do after they appear on a slide.

Once data is entered it can be changed. OLTP.Pat h openrecor dset Dir1. There is no such thing as a Datasheet . [Alt+Z] .Path = Drive1. path C count C update append addnew additem C append update additem addnew B moveprevi movefirst C ous add movenext movelast B B .frm B D B load You cannot change the color of the boxes in an Organizati on chart.Path the above B none of msgbox() the above C Dir1. but not individual shapes of a diagram.Dri ve=Dir1.Path =File1.Dri ve opendata base File1.Path = none of Dir1.vbp You cannot change the style of the connectin g lines in an Organizati on chart.frx none of additem loaditem the above loadpictur addpictur none of e e the above Drive1.P ath message box() Dir1.Fly in From top Dissolve in Fly in. From top.patt ern=Dir1. B You can change the appearan ce of a whole diagram. and Dissolve in D Once data is entered it cannot be changed. [Shift+Z] .Path recordcou nt File1. [Ctrl+Z] . OLAP.Path = Drive1.Dri ve message( ) File1. B OLIP.vbg You can change both the appearan ce of a whole diagram and the individual shapes of a diagram.Path = Dir1. OLST. Data cannot be entered into Datasheet . [Enter+A] .

layout.Cancel parameter to a nonzero value Word 2000 click-ntype office clipboard UnloadMo de Cancel parameter parameter to a nonto 0 zero value Office 2000 Office 97 double drag & click drop cut select UnloadMo de parameter to a zero value Back Office none of the above none of the above A A A A shift+end and shift+left ctr+end shift+hom and and none of e shift+right ctr+home the above B normal web layout. MSWord from the task templates menu inbox document assistant assistant Tool Tip marginal stop Icon Tip ruler home and up arrow page up end keys keys only keys only only left center decimal dialogs/al template model erts increase decrease both A indent indent and B special control design effect tool box wizard drawing control toolbar box database 1 2 0 page setup from the file printer setup from the file menu print preview from the file none of the above A none of the above none of the above Document Tip none of the above up and down arrow rotation none of the above none of the above A A A B D D B C pictures A forms 11 A A none of the above A . page layout click from start program. web printlayout layout wizard office assistant Screen Tip tab stop web layout.

reliability. outputs. and upgradea None of bility above B Limit Check A or B B A B Reasonab leness D None of the above B All of the above C To execute To To collect any maintain data programs security None of the above D Deleted from the disk Transferre d from the disk A Copied from the disk Saved to the disk . Only file design hardware hardware. and and software software Maintena nce.border ctrl+a ctrl+a CTRL+SH IFT+F shading Del Del CTRL+O ctrl+shift+f ctrl+o style box ctrl+f ctrl+f CTRL+SH IFT+S ctrl+shift+ s none of the above ctrl+m ctrl+m CTRL+SH IFT+P ctrl+shift+ p None of the above A A D A C Excel True False Valid Signs HLOOKU P Access False True Transacti on type VLOOKU P Both DDE OLE ODBC Analysis translates program code of a high level language to machine code Analysis is the loading of programs that perform routines to control peripheral devices This involves looking at a system and finding out how informatio n is being None of handled above C Inputs.

be enter connecte data. above C Operating systems and system services Network systems and communic ation services Database systems and backup None of services the above A Magnetic tape floppy storage CD-ROM disk To maintain a backup copy of all the To do a informatio particular n task. Hard disk B To help someone who is applying for employm None of ent the above B .Users operate the manual system and computer system at the same time Users operate the computer system from a given date Users operate the manual system None of above B The new system is introduce d alongside the existing system The new system is introduce d and users start operating it Users continue operating the old None of system above A Instructio ns and technical document ation User Guide Log files and and technical temporary document None of files ation above C For technical support User guides To enable cover how any to run the printer to system. etc. None of network print. d to the save.

Auto bus Address bus TED Address bus Control Bus MAD Control Bus Operating system routines that execute in supervisor mode. D alphanum eric form A 8 bits 8 bits represent ed 256 character s 16 bits represent ed 127 character s A 32 bits A Data bus FDDI Auto bus BAD Data bus Peripheral s that are connecte d to a computer. compilers and other useful system programs. decimal form Shells. binary form were 7 bits 4 bits More than 1000 mega 1000 bytes kilobytes 1024 230 bytes bytes A B D A 32 I/O devices 32 Mb of RAM a 32-bit bus or 32bit registers D used to detect errors RAM is the first bit in a byte DRAM is the last bit in a byte B CROM A baud bytes Hertz memory capacity memory access time secondary secondary storage storage access capacity time B have fewer instruction s than RISC machines use more RAM than RISC machines have medium clock speeds ALU Registers Variables Logic Bus A 32 registers used to indicate uppercas e letters ROM bits per second D use variable size instruction s D . ASCII code form Data structures that are part of the kernel of an operating system.

Computer is Power is improperl switched y shut off down a parallel a serial interface interface line printer dot matrix ink-jet printer printer is faster to access is nonthan RAM volatile increased the storage capacity of a computer system Data is not saved before computer is shut down printer interface All of the above D a modem interface B laser printer. D stores more informatio is used n than for cache RAM memory B provides backup increases power in the the event none of process of a the speed power cut previous C has more storage is a form capacity of ATM than an card ATM card is an access contains card for a a security microproc system essor C CRT displays SSGA displays none of the previous B having several programs writing in RAM at programs none of the same multitaski in multiple the time ng languages previous A having several softwares running at the same time D ALU LCD displays the ability to run 2 or more programs concurren tly writing programs none of in multiple the languages previous Registers Variables Logic Bus B magazine brochures s CD-ROM e-mail D .

to run more than one program an at the multitaski operating same none of ng system time the above C none of multitaski multiprogr the ng amming multiuser previous C ONLINE NORMAL LAYOUT ONLINE PAGELAY DOCUME OUT NT A ctrl+m ctrl+v or ins ctrl+2 ctrl+c or ins ctrl+end ctrl+x or ins ctrl+2 ctrl+5 Text Box Frame ctrl+1 AutoShap e Border A Header and Footer Screen Tips none of the above A Chart WordArt Page Layout Auto Shapes File A Borders Shading WordArt Bullets D clear remove all remove clear all D picture arrow circle bullets bullet bullet dialog box dialog box dialog box AutoShap charts WordArt es document new doc1 1 document hyphenati mail thesaurus on merge shift+f7 thesaurus menu shift+f8 first second first row tab end enter ctrl+home B ctrl+v or Del A none of the above B none dialog box A files C default document B none of t he above A tools+spel ling menu A last cell of the t able A none of the above A .

convert text to table convert data to table rows & row columns AutoCorre AutoForm ct at Mail Merging Macro visual basic basic shift+f8 shift+f7 table auto format none of option the above none of records the above style none of gallery the above Data none of Source the above visual vj++ FoxPro alt+f8 alt+f5 web layout view email client html internet browser micro soft outlook sgml arpanet online layout view outlook express xml intranet A B A B B A none of the above A hotmail vb script LAN A A A field names in field the name header must be the field source listed in separator must the same s in a match order as header any the source merge correspon and the fields ding data you've informatio source inserted n in the can not in the data be set as main source paragraph document the number of fields names in the header source must be the same as the number of data fields in the data source B auto format option applies to it is not the entire possible table and to change not only the height to the of only selected selected rows or rows of a columns table of a table left decimal delete cells option allows to delete the entire row or a column or shift cells up or shifts cells left C top A by default cell height and weight option applies to all the rows and columns of a table justified .

A new section is created in order to change properties like number of columns true In order to type a header from the third page of the document a section break is inserted after t he third page false true true drag & drop true false false click -ntype false If a header is inserted in the second section then the same header is applicable to the first section A section is a portion of a document in which certain page formatting option can be set D A A A Double Click none of the above B A with t he caps lock key accidental ly turned on reverses the case of the letters that were automatic prohibits automatic capitalize ally the user ally d corrects from corrects incorrectly common renaming the and then typing. an auto grammati turns off spelling correct cally the caps errors entry errors lock B password protected document can be opened password without can not password include as read spaces only left justified password are not case sensitive hanging password can be upto 15 character s long B top A .

a .ppt file can not not be inserted at specified position in the current document true true a document file can be inserted in the current document at specified position false false true true false false a multiple document s files can be inserted in the single document an .xls data can not be inserted at specified position in the current document B A A B A Master Child Hyperlink none of Document Document Document the above A Print Layout View Page Layout Insert Mode Type Over mode Remove Outline Layout none of the above B none of the above A press the press the press the escape just keep return key tab key key typing D layers and lines and planes spaces enter/retu tab rn grammar spell checker checker C height rows and and width columns D backspac e/ delete shift B thesaurus outliner send a public message to friends interested send in one pictures topic to a friend From ___ Print all To ____ Enter Copy closing tabbing send private messages to a friend Page setup Retrieve spacing database graphing word processin spreadsh g eet C send a package to a friend Print preview Save sorting D B C B .

and replace autocorre paste and Numberin and select ct clear g C Text which appear at the top of every page Designate d area on the document C Browser Monitor. replace and Toolbars Spelling. printer and processin g system keyboard ? Keyboard. 15 point 25 point B 3 inches. Paragrap grammar h. monitor and printer 2½ inches. autocorre paste and None of ct clear the above C 6 point 10 point Text at the bottom of every page Numbers which appear on every page Mouse. Mouse. impossibl e to determine . copy. Bullet Clear. Spelling. grammar and Cut. keyboard and mouse micropho clip-art file ne None of the above B digital scanner D Clear. and Cut. 2¾ inches. copy.subscript Creating and editing document s annotatio n To analyse figures Creating and editing Storing Making document informatio Calculatio s n ns B To analyse figures Storing informatio None of n the above B clip art clipboard C Font. B .

You are not in Print Layout view.. then then paste paste Insert. breaks. you will You have You have see them not not only when inserted a specified you print column continuou the section s section document break. . then paste A . Cut. A to move a section of text from the original to store a to store a location to file on the file on a another hard drive diskette location to leave an original section of text in place while pasting a copy elsewhere D Data about a set of similar things Thesauru s Mainly text Spell Checker A set of different graphics Grammar Checker None of the above B Find and Replace B Paste Replace AutoCorre Select all ct B Copy. Word cannot display columns during editing. then paste Delete.

Comment s are enclosed in a text box at the right of the document . D Through the Edit menu by choosing Track Changes command Through the Tools menu by choosing Track Changes command Both through Through the Tools tools on menu and the the Reviewing Reviewing toolbar toolbar D . added.To give the original author a chance to accept suggested changes from the person who entered the revisions To give the original author a chance to reject suggested changes from the person who entered the revisions To complicat e the revision process and to force the author to spend more time making correction s To allow multiple people to work on one document in collaborati on with one another C A vertical line outside the left margin signifies a A red change A line underline has been appears appears made at through beneath that point text that is text that is in the to be to be document deleted. .

The previous version is opened automatic ally. including any changes that may have been made to that document . Forms Word is not able to tell the most recent version of a document .The Versions command will allow you to save only one version of a document without any changes that were just made to the document . A Insert A dropText fields down list C B . The most recent version will appear at the bottom of the list. A The first and All second versions The latest versions are version is are opened opened opened automatic automatic automatic ally. Word displays a list of the dates and times each file was saved. Fields Check boxes Tools Toggle button Word will show the name of the person who saved each version. B Grammar Spell Dictionary check check Thesauru s A The Versions command will allow you to save multiple versions of a document . ally. The Versions command will allow you to save only one version of a document . including any changes that may have been made to that document . The Versions command will allow you to save only two versions of a document : one version of the original and one version of any changes made to the document . ally.

C Text which appear at the top of every None of page the above C Press Press tab. A . text. find/searc h. setting it in larger type or font size. D numbers. A This action is not possible. Copy and paste. Text at the bottom of every page Numbers which appear on every page Comment s can be edited or deleted by left clicking the highlighte d text. the color. forms. an enlarged capital letter at the beginning of a paragraph . hy. e. header/fo bibliograp oter. deleted. d text. graphics. underlinin g the text of the pull changing quote. Return. Copy button Paste button Format Painter button Fault Finding Insert Bug Squashin Error g Injecting Tools Format Insert page break.Comment s can be edited or deleted by right Comment clicking Comment s cannot the s cannot be highlighte be edited. C Debuggin g D Edit C a section of text where the first letter of each sentence a section is of white lowercase text on a and the black rest are backgrou uppercas nd. A typing it all in capital letters. the guidelines used to establish where different elements of the newsletter will go. C macro.

A grid is a set of horizontal and vertical lines that determine the placemen t of elements in a newsletter or other document . D The The width height of of each each column column 6 10 The tab spacing The within number of each columns column 12 72 D D One Two Three Four B Press Ctrl+Enter to create a page break. D None of the above A None of the Above A . . Press Enter to create a section break. and how many columns are specified.A dropped cap is a A pull word that The quote is a starts with reverse quotation a technique taken lowercase means to from letter add dark (pulled) when it text on a from should light another have a backgrou document capital nd. C A sans A serif serif font font at 10 at 10 points points A sans A serif serif font font at 20 at 45 points points 2 inches 3½ inches 4 inches Field Record Horizontal Vertical Both A or B D It depends on the left and right margins. letter. Press Ctrl+Shift +Enter to create a column break. Press Shift+Ent er to force a line break.

Duplicate Combined Value Value Gaps Cross Tabulate Filter Merge VLOOKU HLOOKU RAND() P() P() TRUE TRUE All of the above C None of the above A None of the above B FALSE FALSE A A None of Unusual Strange A or B the above C exception comparis duplicates All of the testing on of data testing above D True False True False A A Both B & C B related to none of virtual a form of a form of the reality ROM VRAM previous D Limit Sequence Range involves using more than one processor same as same as at the multitaski multiprogr same ng amming multiuser time D save the file make a set up a backup password copy use a virus protection program B to calculate numbers to read from or write informatio n to a to print floppy sheets of disk paper to display informatio n or pictures on a screen B Uses Cobol 106 sec uses Java 103 sec a keypad a mouse none of the uses C++ previous. D 1012 sec 109 sec D a frog a message pad B .

C the address of a memory location an instruction that has been transferre d from memory A the address an of the instruction next that has instruction been to be executed executed D a magic a light pen marker A Algorithm Program Data B Assemble r Compiler Memory Parity protection Checking Artificial Intelligenc Parity e Checker B Range checking Validation B use the directory search tools Network search each file in turn Program use the backup facility System use find and replace Modem save copies of the file with the same name on the system Multiproce ssing use different filenames on the system Time sharing ROM RAM keep a record of computer failures Multiprogr amming Floppy Disk backup to a secure medium D Multiplexi ng D Magnetic Disk B A B Word Telephon Sharewar Firmware Processor e modem e C .data to be transferre d to memory data to be transferre d to or from memory data that has been transferre d from memory data to be transferre d to the stack an instruction an that has instruction been that has fetched been from decoded memory a scroll a cursor bar Formula the address of a memory location an instruction that has been transferre d from memory.

database record field Element.building warehous customer ROM. A replaced regularly never updated updated regularly updated once a year C Document Graphics Database processor package Spreadsh eet D get into the system quickly 512 simplify file structures C 8192 C make efficient use of time 1024 retain confidenti ality of files 4096 loss of confidenti duplicatio virus ality n of data infection loss of data D . record. File. e. field. field. design. character. file C Valid character check Sound card. queries. Database. Maintena nce diagnostic Systems program logs MIDI CD-ROM interface Parity check Serial interface Text Pictures Sound Video D Laser Dot matrix Ink-jet Drum B C A recording current presentin stock in a viewing creating g an order supermar an the plans for stock ket and encyclopa for a to a answering edia CD.Word Telephon Firmware Processor e modem Sequentia l Hashed Indexed Operating System ALU CPU Tracks and Sectors Blocks and Sectors Sharewar e A Random Primary Storage C B Schema and Files and subschem Tracks a A Character.

output. To fill the payments log etc. IT managem ent lacks leadershi p. input. register C A Logical Steps in any None of language the above A It is mandator None of y in tally the bove A prevent assist in unauthori maintena speed up sed allow nce access access encryption C senior executive support for IT. Graphical represent ation of logic Rules writte in procedura l language Purchase. receipt. text. IT understan ds the business processin g. sales.TCP/IP HTML access to the internet is files can quicker be shared a file name IPX/SPX NetBEUI printer can do 1000s of pages a day the operating system is easy to use B a subdirect the root ory directory the hard drive A D up-line universal provider port serial service uninterrup table uniform power page supply source the program executabl orphan e may not files can allow it to be left on be the uninstalle system d the system the always system requires a requires a re-boot network and administr defrag ator to afterward uninstall it s A data. document informatio s. n. None of the above B All of the above D .

(c). (d) Create the files again. Use the Find or Search feature. (c). Software that generates Using innovated computer designs s to do and architectu artistic None of re. (b). (c). (a). highquality products. Control (a). Select the ‘Shut Down’ option from a menu. controls. B: (a) to C: (a). the above A specialist Applicatio or n Service functional Provider enterprise local B ensure the name the filename identify file is not lost the file D identify the file type All of the above are preventive detective corrective parts of IS controls. (c) D A C C B C Pull the power cord from the back of the computer. (c). (d) Ask the person next to you. external static dynamic extensible hashing hashing hashing hashing A: (a) . D: (b).The use of computer s to design state-ofthe-art. (b). controls. (d) (d) (a) to (d) Turn the computer Press the off at the reset power button. (c). controls. (b). (d) (d) (c) (d) corrective preventive detective general controls controls controls controls Compone nt Interface Settings (a). (b). (c) detective controls organisati onal preventive corrective controls controls controls C (a) to (d) C C . (a). patterns. C Put your hand up and ask the teacher (b). (b). point.

(d) (c) (a) to (d) (b). B data design A C A D B Operating systems Computer and operation compilers. (d) C resolution procedure s C loop testing A (a) to (d) D specificati parallel system benchmar ons operation walkthrou k testing matching s ghs B Peripheral Multiplexe processor Concentr r. (b). (c). (d) program change call lights requests data thread testing testing (a). (b). C . (c). procedura l design Computer network Mesh Bus Ring Hub Ring All of the above To help someone who is applying for employm ent To Store data in an organised manner B Direct To do a particular job such as editing. s. storing informatio n Sequentia l Binary Indexed Systems analysis and applicatio ns programm ing. interface design Job control language. (b). (a) to (d) (d) (c) Replacem ent personal computer s for user departme nts. (a). (d) (a). architectu ral design Clientserver Star Client Bus Physical security of warehous e facilities. Star To maintain a backup copy of are written all the informatio n Identificati on of critical applicatio ns.(a). s. (c). (a). ator. D (a). (b). (d) A Crosstraining of operating personnel . (c). Data communic ations hardware and software. (c). (b). (c) problem logging unit testing (b).

A sequential file on a disk A sequential file on a tape A direct access file on a disk Tapes can only be Informatio read by n formats the commonly machine vary on which Parity between they are errors will architectu written result res A direct access file on a tape C Data record can never be blocked together C Data path Control part Unit Address Input calculatio output n part channel A Local Distribute Area d systems network Wide area network Protocol B Are required with a microproc essor which permits some data processin g such as input validation D Use the computer to which they are connecte d to perform all processin g operation s Generally require a keyboard for data entry and a CRT for display Mixer Modem Time Multiplexo sharing r computer C Allows computer signals to be send over a telephone line Planetary network Aids in back-up procedure s Ring Network Packs data in a disk file Loop Network Can send data to a computer and receive data from a computer Office Automatio Executor n systems Speeds up online printing A Star Network D Instant Electronic postmailing office C An A dumb intelligent A A workstatio workstatio personal mainfram n n computer e PC B .

and testing CRC C A compiler is a general purpose language providing very efficient None of execution the above B Lexical analysis. CONVER Implemen SION. system design.Time of day control locks Encryptio n Parity algorithms checks Type of cable Device Communi interconn Terminal cation ect Standard protocol standard D A compiler converts the whole A of a compiler higher does a level conversio program n line by code into line as the machine program code in is run one step Feasibility study. tation and and code document generatio None of ation n the above D Baudot ASCII EBCDIC A An An interpreter interpreter is a does the represent conversio ation of n line by the line as the system program being is run designed Modem All of them An interpreter is a general purpose language providing very efficient None of execution the above A Frequenc y division Demodula multiplexo tor r Time Division Multiplexo r C MiddleHigh-level level Low-level None of languages languages languages the above C .

It is faster than parallel It is less communic error ation prone It is less prone to attenuatio Uses only n one path D Financial sector and engineeri ng Accountin g systems. the above B Ring Bus B None of 1010101 the above C Cyclic Retransmi Redunda Hash ssion ncy Count A None of 4 64 the above A . Software and size of None of program. commerci None of al sector the above C Graphic design and education Manage the Communi paging cate with function in the a virtual console environm operator ent Relieve the main CPU of repetitive communic ation tasks Specificati on and design Fiber Optics System Analysis Coaxial Cable None of Testing the above B Common Telephon carrier e Lines C System Analysis defines the format and type of data the program will use An interface System Analysis involves creating a formal model of the problem to be None of solved the above C An online A buffer protocol B The design of the screen the user will see and use to enter or display data A cache Testing to check for The errors different before the types of system is network to introduce be used d Star Packet 10101010 1100101 Parity 15 Reduce competitio n between the input/outp ut devices C Hardware.

Port Modem 327 141 Data Data warehous Mining e tools memory capacity 30 binary form 4C5 4 bits Mouse secondary secondary storage storage access capacity time None of 255 256 the above ASCII decimal alphanum code form form eric form None of 1B7 5C4 the above 8 bits 16 bits 32 bits OCR B A A B 210 bits 210 bytes None of the above alphanum eric form None of the above A A A A is the first is the last bit in a bit in a byte byte B bytes None of the above D Hertz None of Light pen Joystick the above MIPS MHz VLSI Tracing Reading None of diagrams bar codes the above MICR B None of the above D Its moves like a It has mouse ears baud B Bit Code Design 1112 1110 ASCII decimal code form form Numeric Keyboard Keypad used to indicate used to uppercas detect e letters errors Because it squeaks when moved bits per second Touch screen BPS Printing letters Data managem ent All of systems them memory access time Basic Coding Binary Descriptio Coded n Decimal 1000 1024 bits bytes 10000 binary form Multiplexo Acoustic r coupler C None of 97 the above B barcode scanning D C B B voice recognitio n B .

44 Mb C Light sensitive None of elements the above C 5 Mb 1 Gb B hardware software input A Mouse Touch screen output Numeric Keyboard Keypad Printer B Light pen Joystick Scanner C Printing letters Touch screen Mouse Credit card Reading Tracing Bar Diagrams Codes Digital Signature s B CD ROM Hard disk Keyboard Drive A Bar code reader Optical mark reader Mouse Speakers Printer Writing on a hard Printed board output Coloured spots Pixels Storage Printer device Keyboard B A Storing informatio Back-up n on the on a hard disk Cartridge B Pixies Pointing device Pickers B CD-ROM A Mouse Bar code reader Optical mark reader None of the above CRT displays LCD displays SSGA displays none of the previous screen layout mouse button layout word keyboard processin layout g software C Mouse Bar code reader Optical mark reader B None of the above B .Touch screen CD-ROM None of Hard disk drive the above A increased the storage capacity of a computer system provides backup increases power in the the event none of process of a the speed power cut previous Refillable Pencil ink lead 100K 1.

Second generatio n computer s. Fifth generatio n computer s. A multitaski ng Vishwajee t none of multiprogr the amming Multi-user previous Deep Blue Param Arjun A C is due to is caused caused by bad disk by wear overuse blocks none of the previous Magnetic Ink Optical Character Bar code Mark Recogniti Reader Reader on Technolog Technolog Technolog y y y Image Scanning Technolog y B C .language software hardware interpreter interface Credit Smart card Speakers card an operating system C None of the above A having several programs writing in RAM at programs none of the same multitaski in multiple the time ng languages previous A having several programs in RAM at the same time B The ability to run 2 or more programs concurren tly writing programs none of in multiple the languages previous To run more than one program an at the multitaski operating same none of ng system time the above C First generatio n computer s. Third generatio n computer s.

converts a program slower to none of a fast than an machine the interpreter interpreter code previous Dot Drum Matrix Printer Printer encrypting decrypting it it Very important reader user sequence Vital informatio n resource under siege Desk .jet Printer compressi ng it C Thermal Printer A transmitti ng it C Virtual informatio n reader & user None of system above B Electricall y charged Thermal ink Paper An ink pen An inked ribbon and print head mainfram e technolog y 10-6 sec WAN technolog y 10-12 sec Unix operating system B 10-9 sec D LAN technolog y 10-3 sec Limit Control checks figures applicatio n system External file labels operating system pilot project model project multiproc multithrea multiplexi essing ding ng D Cross footing tests C communic ation D process D multitaski ng D super micro mainfram computer computer none of es s s the above A control unit arithmetic central and logic processin none of unit g unit the above B band printer drum printer non impact printer none of the above C data word electronic managem processin spreadsh none of ent g eet the above B communic integrated ation idea none of software software processor the above B .

n/Demod Module/D code ulation e-module constraint fixes locks s multiproc multithrea multiplexi essing ding ng Linear area networks Local area networks D None of the above B traps B none of the above B Local array of None of networks. the above B .my recycle computer bin Microsoft none of exchange the above none of field file record the above assembly machine high level none of language language language the above terminator processe connector input/outp symbol d symbol symbol ut symbol B C B B hp vectra PC-at system multiproc multithrea essing ding fazitsu vp200 series IBM-PC B multiplexi none of ng the above D "dumb dumb terminals" servers dummy dummy terminals servers A distribute d computin g system server server windows NT LAN back end front end back end front end D D C PC LAN distribute d computin centralize g d A server processin g four host processin g one dumb processin g two data processin g B many A file managem ent system multiproc essing hierarchic al database system multithrea ding network database system multiplexi ng relational database system D none of the above B repairing redo logging disk defragme disk ntation mirroring wan host host Modulatio Code/De.

SQL * all of the plus above Ethernet visual basic C C B D None of the above. Internet power builder None of ARPANE the T above. Integrated Symbolic Digital networks. above. C C Cells Bits Packets None of the above. B MAN WAN GAN Transfer control protocol/I nternet protocol Transfer communic ation protocol/I nternet protocol Transmiss ion control protocol/I None of nternet the protocol above. C Asynchro Aggregate nous Area transfer transfer transfer mode mode mode None of the above. System modulatio n transfer protocol Software Mail transmissi on protocol Simple Mail transfer protocol None of the above.clientserver task process thread Integrated system dynamic networks. Integrated Services None of Digital the network. B File server None of the above. C Transfer Protocol Transmiss None of ion the protocol Hyper text above. B system A platform Printer server Receiver configurat ion package MAN and LAN and WAN WAN ISDN ATM LAN and MAN Internet Internal Services Digital Network Integrated Services None of Digital the Network above. Internal Services Design Network LAN WAN and MAN B Intranet A C .

shell control program. compiler monitor. bus D D thermal printers C CPU. no. output D applicatio operating n windows system software 95 batch interpreter B procedure protocols software's s C processor compiler compiler assembler coder B interpreter assembler processor C .Web based Training Web based Web Technolog based y Transport Web based Transacti on A Bridges procedure alpha numeric Routers batch alpha beta Protocol command numerous alpha Repeaters B program D number and alpha A space occupied. memory. performan ce ratios C mini computer s input multiproc essing microproc essors output multithrea ding mainfram es D write A multitaski ng D PCs feed multiplexi ng interpreter compiler converter process input processor ram output impact printers drum printers nonimpact desktop printers operating system. program. cost input. output. kernel. performan size. assembler . input. ce their performan ratio ce. bootstrap. price. of users allowed cost. interpreter . keyboard.

? BC 118 Which approach or technique is a control usually associated with microcomputers BC 118 An impact printer creates characters by using.Q_desc AC64 In an accounting information system.... it is the last record and summarises the file. The following is an information not found in the trailer label BC 114 Hard copy is a term used to describe.? .? BC 119 BC 119 BC 12 The best security control in a microcomputer environment is to What would you NOT use with a flatbed plotter? What do you need for an ink jet printer? BC 120 BC 120 The greatest control exposure in a microcomputer environment is the lack of What do you need for an ink jet printer? BC 121 A laser printer does NOT use? BC 122 The amount of data that a disk may contain is known as the disks.? BC 115 What do the abbreviations VAB stand for BC 116 BC 116 What control would prevent the accidental erasure of customer information from a magnetic tape What are the individual dots which make up a picture on the monitor screen called? BC 117 Header label normally include all the following except the BC 117 A daisy wheel is a type of..... which of the following types of computer files most likely would be a master file? AC65 BC 113 Which of the following is an advantage of a computer-based system for transaction processing over a manual system? A computer-based system: Which of the following is not the component of a CPU BC 114 A trailer label is used on a magnetic tape file..

....? Hard disks can have a storage capacity in the region of..BC 123 BC 124 You can ________ protect a floppy disk.? BC 143 Which generation of computer was developed from microchips? BC 144 Which generation of computer uses more than one microprocessor? BC 145 Which generation of computer developed using integrated circuits? BC 146 Which generation of computer developed using solid state components? BC 147 Name three steps involved in developing an information system ..? BC 128 Which storage device has the largest capacity in Mb? BC 129 Which storage device cannot be erased? BC 13 You can ________ protect a floppy disk BC 130 Where should floppy disks be stored? BC 133 BC 134 BC 135 BC 136 BC 137 BC 138 The contents of these chips are lost when the computer is switched off? What are responsible for storing permanent data and instructions? Which parts of the computer perform arithmetic calculations? What are small high speed memory units used for storing temporary results? How many bits of information can each memory cell in a computer chip hold? What type of computer chips are said to be volatile? BC 14 Magnetic tape is a..? BC 14 Software can be divided into two areas: BC 140 Travel agents use this computer system when reserving flights BC 141 Which computers are used in the weather forecasting industry? BC 142 Vacuum tube based electronic computers are..? BC 125 BC 126 Magnetic tape is a... Information on a hard disk is usually backed-up using a.

.BC 148 How do you define analysis of an information system? BC 149 What areas need to be considered in the SOFTWARE design process? BC 15 What is the function of systems software? BC 15 Formatting a disk results in all the data being.? BC 151 What is Direct Implementation? BC 152 What is parallel running? BC 153 What documents are produced during the development of a system? BC 154 What are User Guides are used for? BC 16 Systems software can be categorised into: BC 16 Which storage device cannot be erased? ..

BC 17 BC 17 BC 170 BC 18 Application software are programs that are written Which bus carries information between processors and peripherals? Convert the decimal number 2989 to Hexadecimal Which bus controls the sequencing of read/write operations? BC 183 What are utilities? BC 184 Numbers are stored and transmitted inside a computer in BC 185 BC 186 The original ASCII codes A Nibble corresponds to BC 187 A gigabyte represents BC 188 A 32-bit processor has BC 189 BC 19 BC 190 A parity bit is he contents of these chips are lost when the computer is switched off? Clock speed is measured in BC 191 Cache memory enhances BC 192 BC 20 CISC machines Which parts of the computer perform arithmetic calculations? BC 200 Every data from the primary memory will be erased if BC 201 An RS-232 interface is BC 202 For print quality you would expect best results from BC 203 ROM .

the user should BC 22 What is the function of a disk drive? BC 228 BC 229 A 4GL is A nanosecond is BC 23 What small.BC 204 A UPS BC 206 smart card BC 207 Laptop computers use BC 208 Multiprogramming refers to BC 209 BC 21 BC 21 Multitasking refers to What are small high speed memory units used for storing temporary results? A good way to exchange information that changes rapidly is through BC 210 Multiprogramming is a prerequisite for BC 211 Timesharing is the same as BC 212 Virtual memory is BC 213 Multiprocessing is BC 22 To help keep sensitive computer-based information confidential. hand-held device is used to move the cursor to a specific location on the screen? .

Which of the following translates a program written in high-level language into machine language for execution? BC 27 Detecting errors in real memory is a function of BC 28 BC 28 To find where a file has been saved on disk. It is known as Which of the following file organisation forms most efficiently allows access to a record BC 33 The part of the computer system controlling data manipulation is called the BC 34 For direct access storage devices the recording area is divided into BC 35 The data hierarchy from the largest to the smallest is BC 36 Which of the following hardware or software system controls provides a detailed record of all activities performed by a computer system BC 37 Which one of the following parts of a computer is necessary to enable it to play music? . the user should BC 29 Having a single CPU alternatively process tasks entered from multiple terminals is called The place in the CPU where the data and programs are temporarily stored during processing is called the BC 25 BC 30 BC 31 BC 32 BC 32 All are examples of computer software except Computer manufactures are now installing software programs permanently inside the computer. the user should A series of instructions telling the computer how to process data or files is defined as a BC 29 To ensure that data is not lost if a computer system fails.BC 230 The memory address register is used to store BC 231 The memory data register is used to store BC 232 BC 24 BC 26 The instruction register stores Which of the following is used to indicate the location on the computer monitor? A mathematical procedure that can be explicitly coded in a set of computer language instructions that manipulate data.

BC 37 BC 38 An educational CD-ROM on Indian Poets contains 1000 pages of text. The raw facts you collect are called BC 484 A flow chart is the BC 485 A voucher entry in Tally is done for BC 49 Passwords are applied to files in order to BC 491 Each of the following is an enabler of IT-business alignment except: . 500 colour pictures. 15 minutes of sound and 1 minute of video. How many bytes do 4 Kilobytes represent? BC 43 BC 44 Back up of the data files will help to prevent Which one of the following is the MOST common internet protocol? BC 45 The advantage of a PC network is that BC 46 The term A:\ refers to BC 47 UPS stands for BC 48 The main problem associated with uninstalling software is that BC 48 You are conducting research for a Income Tax assignment. Which of the four different media listed takes up most space on the CD-ROM? Which one of the following printers is suitable for printing sprocket fed carbon copies? BC 38 Multimedia software can be most productively used for BC 39 BC 40 To be effective a virus checker should be Which one of the following software applications would be the MOST appropriate for performing numerical and statistical calculations? BC 41 BC 42 Passwords enable users to 12.

Today. Which is the best way to locate the files? Components of an information system model are: a) applications architecture. b) functional architecture. d) run-to-run totals BC 58 Which is not part of help desk documentation: BC 59 BC 60 Testing of individual modules is known as: Design phase of CASE tools includes: a) data architecture. c) label checks. b) date checks. d) information architecture BC 56 Benchmarks form part of: BC 57 Continuity controls include: a) record counts. in your music class you saved your compositions as MP3 files. you cannot remember where you saved them. c) interface architecture. d) fuzzy logic BC 52 BC 53 BC 53 Black box testing and white box testing are part of: What is the term used to describe the point of interaction between a computer and any other entity. c) portability. b) user interface. d) presentation architecture BC 60 Which is part of installation testing: BC 55 .BC 492 The basic systems model is used to describe virtually all information systems and it consists of the following elements: BC 494 What is a computer-aided design system? BC 499 A(n) __________ offers a solution package for an entire industry. b) decision architecture. b) maintainability. d) flexibility BC 54 Which of the following is an acceptable way to shut down the computer? BC 555 Yesterday. BC 50 File extensions are used in order to BC 506 Information systems controls include all of the following EXCEPT: BC 51 Hashing for disk files is called Components of expert systems include: a) inference engine. c) technology architecture. c) knowledge base. such as a printer or human operator? BC 54 The advantages of CASE tools are: a) reusability.

To permit simultaneous terminal operations. c) video. peripherals and workstations that are in fairly close proximity Intelligent terminals differ from dumb terminals in that they A computer is to be linked to 8 terminals using a single communication link. d) audio BC 61 Which of the following procedures should be included in the disaster recovery plan for an Information Technology department? BC 62 Designing relationships among components is part of: BC 63 BC 64 BC 65 Several Computers connected together is called: Which network topology uses a Hub? Which of the following topologies is used for Ethernet? BC 66 BC 67 Application software are programs Which type of file search method requires a computer first read all locations preceding the desired one BC 67 Which of the following areas of responsibility are normally assigned to a systems programmer in a computer system environment? BC 68 Which of the following is recommended when many searches for data are required BC 69 It is unlikely that a magnetic tape containing several thousand blocked records can be used on two machines of different architecture directly because BC 70 BC 71 BC 72 BC 73 Which component of the CPU has the most influence on its cost versus performance Which of the following terms applies to network used to connect computers with other computers. b) images.BC 60 BC 61 The computer operating system performs scheduling. resource allocation. communication path will require which of the following . and data retrieval functions based on a set of instructions provided by the: Which of the following falls under multimedia data: a) text.

it is said to be BC 78 Terminal hardware controls include BC 79 RS-232 is a BC 79 What is a compiler? BC 80 BC 80 What are the stages in the compilation process? Which of the following is not a data transmission coding scheme BC 81 What is the definition of an interpreter? BC 81 A device used in data communications to divide a transmission signal into several sub-bands is known as a BC 82 Third generation languages such as COBOL. This type of network is called a BC 77 A computer based system for sending. C.BC 74 BC 75 BC 76 A modem is a device that A LAN includes 20 PCs. printer. screen manipulation device. receiving and storing messages is called an If a workstation contains a processor. forwarding. each directly connected to the central shared pool of disk drives and printers. monitor. and FORTRAN are referred to as BC 82 Serial Communication is used over long distance because it . storage and communication capabilities.

BC 83

In what areas is the COBOL programming language used?

BC 83

The primary function of a front-end processor is to

BC 84

What is the first stage in program development?

BC 84

Which of the following is not used for data transmission within a local area network

BC 85

What is System Analysis?

BC 85

A device to device hardware communication link is called

BC 86
BC 86

What will a good software provider consider?
The topology of a network can be each of the following except

BC 87

What is the 8-bit binary value of the decimal number 85?

BC 87

Which is the most common data transmission error checking method

BC 88

What is the decimal value of the binary number 1111?

BC 88

Which of the following devices merges communication signals onto a single line

BC 89

What is the decimal value of the octal number 215?

BC 89

Which tool is used to help an organization build and use business intelligence?

BC 9

Cache memory enhances

BC 90

What is the decimal value of the hexadecimal number FF?

BC 90

Numbers are stored and transmitted inside a computer in

BC 91
BC 91

What is the hexadecimal value of the decimal number 1476?
A byte corresponds to

BC 92
BC 92

What does EBCDIC coding of numbers mean?
A Kb corresponds to

BC 93

What is the binary sum of 01011 and 00101?

BC 93

Information is stored and transmitted inside a computer in

BC 94

Where would you find the letters QWERTY?

BC 94

A parity bit is

BC 95
BC 95

How did the computer mouse get its name?
Clock speed is measured in

BC 96
BC 96

What are you most likely to use when playing a computer game?
CPU performance may be measured in

BC 97

A digitising tablet can be used for?

BC 97

In processing cheques which of the following I/O techniques have banks traditionally used

BC 98

Which of the following is a pointing device used for computer input?

BC 98

A UPS

BC 99
BC 99
BC01

What does a light pen contain?
The capacity of a 3.5” floppy is around
What general term describes the physical equipment of a computer system, such as its video
screen, keyboard, and storage devices?

BC02
BC03

Where would you find the letters QUERTY?
What are you most likely to use when playing a computer game?

BC04
BC05

A digitising tablet can be used for?
Which of the following is a pointing device used for computer input?

BC06
BC07

What input device could tell you the price of a product
Where would you find a magnetic strip?

BC08
BC09

Hard copy is a term used to describe...?
What are the individual dots which make up a picture on the monitor screen Called

BC10

A daisy wheel is a type of...?

BC100

What input device can be used for marking a multiple-choice test?

BC100

Laptop computers use

BC101

QWERTY is used with reference to

BC101

What input device could tell you the price of a bar of chocolate?

BC102

A GUI is

BC102

Where would you find a magnetic strip?

BC103

Multiprogramming refers to

BC104

Multitasking refers to

BC105

Multiprogramming is a prerequisite for

BC105

UNIVAC Computer belongs to the

BC106
BC106

Timesharing is the same as
Name the first Indian Super Computer?

BC107

Disk fragmentation

BC107

The technology which is used to check answer sheets of multiple-choice questions in civil
services or similar examinations is: -

BC108

A compiler is

BC108

Which printer among the following is fastest

BC109

“Zipping” a file means

BC109

What does acronym VIRUS stands for

BC11

An impact printer creates characters by using...?

BC110
BC111

A client-server system is based on
A nanosecond is

BC112

The memory address register is used to store

BC113
BC115
BS 319

Inefficient usage of excess computer equipment can be controlled by
A procedural control used to minimize the possibility of data or program file destruction through
operator error is the use of
A predefined computational task is referred to as a(n):

CA 486

Which of the following is not the feature of GAPs

CA 487

Which is the example of CAATs

CA 488

In audit procedures, test data is

CA 489

Which of the following is not the use of CAATs

CA 490
DB 01
DB 02

Which of the following are called explicitly by another procedure?
What term applies to a collection of related records in a database?
All of the following terms are related to computerized databases except which one?

DB 03

What is a database?

DB 04

What does a record contain?

DB 05

An RDBMS is a

DB 06

Data Warehousing refers to

DB 07

Unauthorised alteration of on-line records can be prevented by employing

DB 10

What is a database?

DB 11

What does a record contain?

DB 12

What is a report?

DB 13

What is the best way to analyse and change data

DB 18

What are some popular office orientated software applications?

DB 19

Which of the following constraints can be used to enforce the uniqueness of rows in a table?

DB 20

Which of the following commands is used to change the structure of table?

DB 226

An RDBMS is a

DB 227

Data Warehousing refers to

DB 235

You are creating a client application that calls ActiveX DLLs. Which of the following properties of
the Err object provides the name of a component that sends an error back to the client
application?

DB 24
DB 26
DB 27
DB 30
DB 365

This database holds personal information. The user can help to keep it confidential by
If the database holds customer names and addresses, personalised letters can be created
automatically using
Application software suited to storing the survey information obtained in the table would be
The characters * and ? are sometimes used in search criteria as
Which of the following field types will generate the primary key automatically?

DB 366

Referential integrity ensures that the:

DB 367

Tables are related to one another through a:

DB 368

A foreign key is:

DB 369
DB 370

You are creating a banking database to track customer loans. The bank will, of course, have
many customers, each of whom may take out one or more loans, while each loan may be
associated with only one customer (there are no joint accounts). What is the re
In a one-to-many relationship between Companies and Employees, which field is found in both
tables?

DB 371

Which of the following ensures that records in related tables are consistent with one another?
For example, it ensures that you cannot add a record with an invalid foreign key.

DB 372

How would you delete a relationship between tables in the Relationships window?

DB 373

In a Customers tables, what does a plus sign next to the CustomerID field mean?

DB 374

What is required of the fields that join two tables?

DB 375

Assume a one-to-many relationship between the Customers table and the Loans table, with
referential integrity in effect. What happens when you attempt to delete a customer ID from the
Customer table that still has entries in the Loans table?

DB 376

Which of the following is true when viewing a main form and its associated subform in the Form
Design view?

DB 378

Which of the following relationships does not belong in a database based on a professional
sports league such as football or basketball?
Which symbol is used at the end of the join line in a related table to signify the “many” side of a
one-to-many relationship?

DB 379

You have created a one-to-many relationship with referential integrity between a Customers
table and a Loans table. From which table can you delete a record?

DB 380

The correct order of the arguments for the MsgBox statement is:

DB 381

The first statement in a procedure named CreateList is:

DB 393

Which of the following is TRUE related to form fields?

DB 394

A text field:

DB 377

DB 401
DB 402
DB 403

The purpose of a database is to:
A database stores:
A database records:

DB 404

A sales contact manager used by a salesperson is an example of _______________

DB 405

A Customer Resource Management (CRM) system is an example of_________

DB 407

The industry standard supported by all major DBMSs that allows tables to be joined together is
called __________.

DB 408
DB 409

A program whose job is to create, process and administer databases is called the _____
Microsoft Access may use which of the following DBMS engines?

DB 410

Which of the following are basic components of an enterprise-class database system?

DB 411

In an enterprise-class database system ________ .

DB 412

In an enterprise-class database system, the database application ___ .

DB 413

In an enterprise-class database system, reports are created by ____________________ .

DB 414

A database is considered "self-describing" because _______ .

DB 415

In an enterprise-class database system, the database _________ .

DB 416

A database may contain _________________________ .

DB 417

A database designed using spreadsheets from the Sales department is a database being
designed _________________________ .

DB 418

A database designed to implement requirements for a reporting application needed by the Sales
department is a database being designed _______ .

DB 419

A database designed to combine two databases used by the Sales department is a database
being designed _________________________ .

DB 420

Database professionals use ________________ as specific data sources for studies and
analyses.

DB 421

Database professionals use a set of principles called ________________ to guide and assess
database design.

DB 422

A very popular development technique used by database professionals for database design is
known as _______________________ .

DB 423

A very popular development technique used by database professionals to adopt a database
design to new or changing requirement is known as _____ .

DB 424

The predecessor(s) of database processing was (were) __________ .

DB 425
DB 426
DB 427

In a relation __________________________ .
An attribute is also known as a(n)
.
A combination of one or more columns used to identify particular rows in a is___ .

DB 428
DB 429
DB 430

A combination of two or more columns used to identify particular rows in a relation is________ .
A determinant that determines all the other columns in a relation is______ .
When designing a database, one of the candidate keys in a relation is selected as the
_________ .

DB 431

Normalization is a process used to deal with which of the following modification anomalies?

DB 432

When you are given a set of tables and asked to create a database to store their data, the first
step is to ____ .

DB 433

Modern microcomputer personal DBMS products______.

DB 434

Which of the following are true about data mining applications?

DB 435

We have obtained access to the company's operational data. We examine 50 records for
customers with phone numbers that should use the current area code of 345. Of these 50
records, we find 10 that still use an older area code of 567. This is an example

DB 436

We have obtained access to the company's operational data. We have been asked to produce
a report with an item by item analysis of sales, but the only sales figure available is the total sale
value for each order. This is example of_____

DB 437
DB 463

A data warehouse database differs from an operational database because:
Which of the following objects is used to display a menu?

DB 464

Which of the following objects are NOT found in an Access application?

DB 465

You are developing an Access application that you expect to upgrade periodically. Which of the
following statements is TRUE?

DB 466
DB 467

Which of the following statements regarding Access applications is NOT true?
Which of the following brings a copy of the table into the current database and does not
maintain a tie to the original table?

DB 469

What makes a database an application?

DB 470

What is the Access tool that is used to create the user interface?

DB 503

The purpose of a data warehouse is to:

DS 279

____________ is the art of protecting information by transforming it into an unreadable format.

DS 59

Which of the following activities would most likely detect computer-related fraud?

DS 62

A digital signature is used primarily to determine that a message is:

DS 63

What is a major disadvantage to using a private key to encrypt data?

DS 66

Which of the following risks can be minimized by requiring all employees accessing the
information system to use passwords?

EC 103
EC 301

The most beneficial advantage of ERP system is
What is the term that describes spying on one’s business rivals to gain a competitive
advantage?

EC 302

What would you NOT be looking for when spying on a competitor?

EC 406

An online drugstore such as Drugstore.com is an example of_______

EC 51

Which of the following is an example of unacceptable online ‘netiquette’?

EX 11 If a cell shows ####### . EX 15 Spreadsheets can be used for. This "What if" program is most likely which of the followin The difference between the highest and the lowest values. The contents of cell C15 is =AVERAGE(C3:C14). the cell accepts your typing as its contents. and A8 are _____.. which expression would be evaluated first? EX 325 Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant? EX 326 How can you tell which cell in a worksheet is the active cell? . EX 2 To select a column the easiest method is to … EX 3 EX 320 EX 321 If you press _____. The use inputs different weights or amounts of exercise to determine the related physical fitness. EX 12 Which is not an advantage of using computerized spreadsheets? EX 13 EX 14 The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. it means that _____. The contents of cells A6. A7. You select both cells and drag the fill handle down to A8..EC 58 EX 1 Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system? EX 10 On an Excel sheet the active cell is indicated by… Cell A4 =2 and A5 = 4. AVERAGE(C3:C14) is known as All of the following are considered constants EXCEPT: EX 322 EX 323 Which of the following may NOT be included in a formula? Which of the following is NOT a valid mathematical operator in Excel? EX 324 Given the formula =B5*B6+C3/D4^2.

or columns from a worksheet? EX 335 EX 336 EX 337 EX 338 Which of the following options is NOT controlled through the Page Setup command? Which command enables you to change the margins for a printed worksheet? All commands are carried out on a rectangular groups of cells known as a: Which of the following is a valid cell range? EX 339 In a copy operation. the cell(s) you are copying from is called the: EX 340 In a copy operation. the cell(s) you are copying to is called the: EX 341 EX 342 EX 343 EX 345 Which of the following commands is needed to duplicate the contents of a cell in another? A cell reference that does not change during a copy operation is known as Which of the following is considered an absolute cell reference? Cell E3 contains the function =AVERAGE(A3:D3). what will be the contents of cell E4? Cell E3 contains the function =AVERAGE($A$3:$D$3). If the contents of cell E3 are copied to cell E4.EX 327 How can you change the active cell? EX 328 Which of the following would you use to change the font size of a cell in Excel? EX 330 EX 331 EX 332 The command that will save the current workbook with a different file type is: The command that will print an Excel workbook is found on the ____________ menu. In the Save As and Open dialog boxes. rows. the ___________ view shows the file size as well as the date and time a file was last modified. If the contents of cell E3 are copied to cell E4. EX 333 Which of the following commands will automatically adjust cell references in formulas? EX 334 Which of the following commands will remove cells. what will be the contents of cell E4? EX 346 Which of the following commands is needed to transfer the contents of one cell range to another? EX 344 .

EX 347 The F4 key is used to: EX 352 Which of the following quickly copies the formatting of a selected cell to other cells? EX 353 Which of the following will insert a hyperlink into an Excel worksheet? EX 354 Conditional formatting applies formatting to a cell based on: EX 358 If you enter a date into a cell. To find the student with the highest mark. You opened that worksheet again on August 31. EX 42 EX 43 The teacher has a spreadsheet showing all Year 10 students and their marks in one Mathematics test. which of the following functions should be used? Which chart type best shows proportions of a whole? . Excel stores the date as: EX 361 You created a worksheet on July 30 and entered the =Today() function in cell E17. What will be displayed in cell E17 on August 31? EX 362 EX 363 The number of days between two cells containing dates can be calculated by: The function key that is used to quickly edit the contents of a cell is: EX 364 What will be stored in a cell if 3/4 is entered in it? EX 384 EX 4 A user’s response to the InputBox function can be stored in: The cell reference for a range of cells that starts in cell B1 and goes over to column G and down to row 10 is _____.

The formula that will add the value of cell D4 to the value of C2 and then multiply by the value in B2 is _____. EX 52 IN 02 IN 03 IN 04 .EX 462 EX 5 Which of the following is TRUE regarding chart types? To select several cells or ranges that are not touching each other. EX 7 EX 8 Spreadsheets can be used for. EX9. EX 6 What can you NOT do with a spreadsheet? EX 7 To print just part of a sheet. IN 07 The successful act of bypassing security mechanisms of the system. IN 06 Protected/private character string used to authenticate an identity or to authorize access to data. A long string of seemingly random bits used with cryptographic algorithms to create or verify digital signatures and encrypt an decrypt messages and conversations. The act of searching through storage to locate information without necessarily knowing of the existence of the information being sought. EX 8 Which of the functions is not valid for performing addition EX 9 The default orientation for the printed page is _____.. You are required to use a spreadsheet to record all that you study on each day for four weeks. You decide to show each week’s data with an accompanying graph. you would _____ while selecting. EX 57 Your Institute teachers have set an assignment on ‘Studies’. Which is not a valid cell address? IN 01 IN 05 Which of the following best describes uploading information? A characteristic of a communication channel that is the amount of information that can be passed through it in a given amount of time. you would select what you want to print and _____ . The principles. you need to use the command _____.. expressed in bits per second. means and methods for rendering information unintelligible and for restoring encrypted information to intelligible form. What is the best way of doing this What would be the best method to quickly copy the formula from the active cell to each cell below it? EX 6 To arrange rows in alphabetical order based on column A.

IN 110 IN 111 None the person who is known as father of Internet This website is the biggest bookstore on the earth. IN 112 When we talk of Data Transmission modes. IN 15 The term HTTP stands for IN 155 A NIC is considered as IN 156 A hub is a device that can connect IN 157 Which of the following is true concerning the function of a switch? IN 158 What do routers connect? IN 159 IN 16 IN 160 What does a router route? Software which prevents external access to a system is termed If four computers are connected to a hub and then to the internet. how many IP addresses are required for these 5 devices? IN 161 Which of the following in an OSI layer IN 162 When creating a network from just two PCs. IN 104 An attempt to get access to a system by posing to be an authorised person. The means of communicating between networks IN 14 A group of computers and other devices dispersed over a relatively limited area and connected by communication links that enable a device to interact with any other on the network. semantic and syntactic. An action or event that might prejudice security. what kind of cable would be used to connect them? IN 163 An IP address is a .IN 08 IN 09 IN 10 A set of rules and formats. that permits entities to exchange information. According to information Technology Act. 2000. then ATM stands for IN 12 IN 13 A sequence of bits or characters that identifies the destination and the source of a transmission. To investigate contraventions the controller of certifying authority shall exercise the like powers to that of IN 11 Malicious software.

...IN 164 To construct a simple LAN of 4 computers. .... of the network concerns how network devices are physically (or optically) interconnected.... the cable system forms a loop with workstations attached at various intervals around the loop IN 181 The Media Access Control (MAC) is a sub layer of the: IN 182 IN 194 IN 195 What are the most common LAN technologies used in networking today? Modem speeds are measured in LAN speeds are measured in IN 196 WAN speeds are . IN 173 IN 174 IN 175 IN 176 IN 177 IN 178 IN 179 IN 18 What is the biggest disadvantage of the Ring topology? The .... you would connect them with ______connect them IN 165 What happens to data that is ruined before reaching to receiver IN 166 Bluetooth is IN 167 Which is not one of the recognized IEEE sub layers? IN 168 IN 169 The most preferred number system to represent a IP address is A MAC address is of IN 17 Protocol is IN 172 A ....... if not all........ The principal topologies used with LANs are: What are the various types of bus architecture? What are the various types of ring architecture? In a .......... ............ each work station is directly connected to a common communications channel Which one of the following is NOT a network topology? In a .. is a LAN-based computer with software that acts as a controlling device for controlling access to at least part......... each workstation attaches to a common backplane via its own physical cable that terminates at the hub IN 180 In a ............... of a local area network and its available resources....

IN 197

Accessing the Internet from a typical home PC requires the use of

IN 198

To use the Internet, you

IN 20

The worldwide web server uses the following standard interface to act as the middleware:

IN 205

An NIC

IN 21

Accessing the Internet from a typical home PC requires the use of

IN 214

The most widely used network operating system on PC LANs is

IN 218

JPEG and MPEG

IN 22

To use the Internet you

IN 220

A multiplexer is a form of

IN 221

An ISP

IN 222

FTP is

IN 223

Telnet

IN 224

A firewall is

IN 225

A proxy server is

IN 23
IN 23

A search engine is
To look for information about interest areas on the internet, the user should use a

IN 24

An ISP

IN 25

FTP is

IN 26

Telnet

IN 267

Which of the following is a true statement about the OSI model layers?

IN 268
IN 269

Which of the following is NOT true about the Internet?
The traditional intent and impact of this common type of attack is to prevent or impair the
legitimate use of network resources.

IN 27

A firewall is

IN 270
IN 272
IN 273

Which of the following is NOT an example of a DoS attack that is popular among hackers?
A ____________ attack is when a hacker sends a continuous flow of packets to a system.
One defense option on a large network is to configure a ____________ to disallow any external
traffic.

IN 28

A proxy server is

IN 285

Which of the following would be performed on a network server and not normally on individual
workstations?

IN 288

What can be said about the safety of the Internet?

IN 29

To secure communication network against wire-tapping the most effective control is

IN 290

One way that a virus CANNOT spread throughout a network is:

IN 297
IN 298

Which of the following is NOT a means of monitoring employee use of company technology?
____________ would be used by parents to monitor their children on their home system.

IN 30

The formal rules and parameters which are established to permit a microcomputer to
communicate with the mainframe computer as though it was a terminal of the mainframe are
called

IN 304

The two most common tools used to help with extracting information are:

IN 306

Which of the following would NOT be considered an example of cyber terrorism?

IN 307

Which of the following would be a form of cyber terrorism?

IN 308

Which of the following is a likely target of a cyber terrorist that would cause considerable loss of
life?

IN 31

An organisation is upgrading its telecommunication lines. Which is the least important objective
while upgradation

IN 31

A company posts a price list of its products on its website. The advantage to the customer is that
the company can

IN 310

Which of the following is an easy-to-use service to get information on someone?

IN 312
IN 313

Which of the following pieces of information would NOT be found online?
Which of the following is the most common danger on the Internet?

IN 314
IN 315

The famous Nigerian Fraud scam offered victims the opportunity to:
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain
sensitive information is called _________________.

IN 316
IN 317

Using the Internet to pursue, harass, or contact another in an unsolicited fashion is called:
Setting your privacy settings in Internet Explorer to medium is one way to block:

IN 318

What is the best means of protection from cyber stalking?

IN 32
IN 33
IN 33

Which of the following is not an appropriate control over telecommunications software
Encryption techniques can be implemented in Hardware-Software
Which protocol would be used to download a free anti-virus program from the Internet?

IN 34

The major advantage of the checksum program is when it

IN 348

Which of the following is a Web browser?

IN 349

A Web page is another name for -----------

IN 35

Domain names must contain a description of the type of organisation that the domain
represents. A very common abbreviation used include:

IN 350
IN 351

A standard language for creating and formatting Web documents is:
The Web page format in which all elements of a Web page are saved as one file is called:

IN 359

Which of the following requires an Internet connection?

IN 36

Mr Rao wants to find a website that he briefly browsed over yesterday. After turning on his
computer how would he do this?

IN 360

Which of the following is used to update a Web query?

IN 45
IN 47

You download from the internet, a screensaver, a ten-second sound file and a ten-second music
video clip. You also add a hyperlink. Which of the media elements has the greatest effect on the
file size?
When saving a photograph for use on a website, which format should you choose?

IN 49

While researching the Direct taxes assignment, you find a useful website. What is the most
efficient way to access the site at a later time?

IN 493
IN 50
IN 501

A system that uses the Internet for business-to-business interaction is called a(n):
A block of text automatically added to the end of an outgoing email is called
_________ refers to the use of Internet technologies for placing telephone calls.

IN 68

Most client/server applications operate on a three-tiered architecture consisting of which of the
following layers?

IN 69

Which do you NOT need to connect to the Internet?

IN 70

What does FTP stand for?

IN 71

What is the purpose of DNS?

IN 72.

Which of the following is NOT a properly formatted IP address?

IN 73.

Which of the following is a properly formatted email address?

IN 74.

The Internet is controlled by whom?

IN 75.

What does IRC stand for?

IN 76

If you do not pick up your email for a week...?

IN 77

What does HTML stand for?

IN 78

What is a disadvantage of joining a mailing list?

OS 01

Which of the following computer software is designed to direct and assist the execution of
application programs

OS 127
OS 131
OS 132

Formatting a disk results in all the data being...?
Which bus carries information between processors and peripherals?
Which bus controls the sequencing of read/write operations?

OS 139
OS 193

Which computers use single chip processors?
CPU performance may be measured in

OS 199

In processing cheques which of the following I/O techniques have banks traditionally used

OS 215

Disk fragmentation

OS 216

A compiler is

OS 217

An interpreter is

OS 219

“Zipping” a file means

OS 233

An assembly language program is translated to machine code by

OS 234

Which of the following is not part of the processor

OS 236

If the Cancel Error Property of the CommonDialog Box is set to true then which of the following
statement is true:

OS 238

OS 276
OS 277

__________ control defaults to displaying the files in the current directory:
A ____________ occurs any time a program writes more information into the temporary space it
has allocated in the memory.
Assessing a system requires certain common tools. Which of the following is NOT a tool used to
assess a system?
The ____________________ Web site has a utility that will tell you what software and operating
system a Web server is running.
When software vendors discover flaws in their software, they usually will write corrections to
their code, known as:
All ____________ have the option of blocking ports.

OS 278

Which of the following is NOT a characteristic of a firewall?

OS 280

Before shutting a service on an individual machine, which of the following would you always
check?

OS 281

At a minimum, which of the following should be implemented under the protection phase?

OS 282

Attacks on your system may be prevented or trapped through the use of:

OS 271
OS 274
OS 275

OS 283

Setting restrictions as to the number of unique passwords to use before a user can recycle them
is called a password:

OS 284

Which of the following is NOT a step to take in securing a workstation?

OS 286

To prevent a hacker from unauthorized access, what should you do with the administrator
account?

OS 287
OS 289

What should be done with old backup tapes and CDs?
Which of the following is NOT an example of malware?

OS 291

One step you can take to reduce the risk of being infected by a virus is to:

OS 292

Which of the following is NOT a sign that a virus has infected your system?

OS 293
OS 294
OS 295

Which of the following is the safest way to protect yourself from e-mail viruses?
A ____________ attack causes too much information to be placed into temporary memory
space.
____________ gathers user information with the user’s knowledge.

OS 296

Which of the following is the most common function of spyware?

OS 299

Which of the following is NOT a virus-scanning technique?

OS 300

Which of the following would NOT be a way to protect your system from spyware?

OS 309

For which of the following positions would it be advisable to conduct an extensive background
check?

OS 329
OS 355

Which of the following would you use to open an existing file?
The ability to have multiple applications open at the same time is known as:

OS 356
OS 357

Which of the following can be changed using the Options command?
Which of the following leaves an application open but shrinks the window to a button on the
Windows taskbar?

OS 396

Which of the following actions would move a floating toolbar to dock it in a different place?

OS 397

To display a missing or needed toolbar, click the:

OS 399

Which of the following is NOT a true statement regarding password protection?

OS 495

The Linux operating systems is an example of:

OS 496

The Windows operating systems is:

OS 497

Application service providers offer:

OS 498

A(n) _________ offers on-demand software on an as-needed basis to its clients over the web.

OS 502

_________ are systems used to interact with customers and run a business in real time.

OS 504
OS 505
OS239

The most common cause(s) of disaster is (are):
A _______ backup site is backup facility consisting of an empty warehouse with all necessary
connections for power and communication, but nothing else.
To destroy an object and free the memory space occupied by it, the keyword used is:

PP 44

An example of the components of a multimedia presentation could include

PP 442

Which of the following formatting elements can be applied to a PowerPoint diagram using the
AutoFormat tool?

PP 443

Which of the following formatting elements can be applied to a PowerPoint diagram using the
Format AutoShape command?

PP 444

What happens when you double click a blank graph placeholder in a PowerPoint presentation?

PP 445

The legend in a Microsoft Graph chart is:
Suppose you are creating a Microsoft Graph of quarterly sales by region. Which would be the
best chart type if you want to emphasize the total sales of each region?

PP 446

PP 447

Which of the following actions will enable you to insert a graph into a PowerPoint presentation?

PP 449

If you are editing a slide containing a Microsoft Graph, how do you display the underlying
datasheet?
How do you deselect a chart that has been placed onto a PowerPoint slide after you have
finished creating the chart?

PP 450

What happens when you click the Datasheet button on the Microsoft Graph toolbar?

PP 451

What happens if you single click a chart that is not currently active?

PP 452

What happens if you double click a chart that is not currently active?

PP 453

Using custom animation effects, you can build:

PP 454

Which of the following animation effects can be added to a slide?

PP 448

PP 455
PP 456

Which of the following animations effects can be added to a slide?
Which keyboard key is used to select more than one picture on a slide?

PP 457

Custom animation can be used to affect ONLY:

PP 458

Which of the following best describes the information that appears on the advanced timeline?

PP 459
PP 46

Which of the following objects can contain custom animation effects?
What type of program allows an object within an image to be edited without affecting other
objects?

PP 460

Which of the following animation effects can be added to a slide?

PP 461
PP 500

Which of the following is TRUE regarding the Datasheet?
Graphical software tools that provide complex analysis of stored data are:

you make the following change in the function definiton:Private Sub Query_Unload(Cancel as Integer. VB 247 VB 248 How can you keep the user from exiting a form by clicking the Close button? The _______ property enables Visual Basic to draw complete images in memory before displaying them on the Screen. VB 249 You want to display the code and the description of an error. What would be the correct syntax? VB 250 VB 251 VB 252 What is the purpose of the Image List Control? Which method would you use to get a free or unused File identifier while opening any file: Which property procedure is used to retrieve the value of a property? . you will set the: VB 244 How many root nodes can a TreeView control have? VB 245 A project group is a Project which: VB 246 Procedures declared in a _____ are local whereas procedures declared in a ______ are available to the whole application. Which event of a text box would you use for validating the data entered by the user? VB 241 VB 242 Which of the following statements forces inline error handling? The _______ method resets the contents of bound controls to their original values when the user clicks on the cancel button. VB 243 To deactivate the Form UnLoad event.UnloadMode as Integer) To prevent the Form from closing. you make the following change in the function definiton: VB 243 To deactivate the Form UnLoad event.PP438 PP439 Which of the following statements is TRUE regarding PowerPoint diagrams? Which keyboard key combination is used to undo the previous command(s)? VB 237 VB 240 What is the extension of the Visual Basic project file that stores the design of a user control.

VB 253 VB 255 Which of the following can be shown to the user using the Common Dialog control in VB? Which of the following are not properties of Command Button: VB 256 VB 257 Which events enable you to determine which key was pressed by the user? In order to access a file in Non-textual format..during program execution) we need to change: Which property of the ProgressBar determines how much of the bar is filled? The ______ function can be used to run any . What could be the possible cause? Set MyVar = New Classname VB 265 Which of the following will perform a direct execution of a Command object? VB 266 The vb Critical symbol displays: VB 382 vbYesNo is an example of a(n): VB 383 The primary difference between the MsgBox statement and the InputBox function is the: VB 395 VB254 Which of the following is TRUE about a protected form (i.e. you have to open file in: VB 258 VB 259 Visual Basic displays information depending upon the current value of two properties of the form.pif file from a Visual Basic program.e. .com. VB 263 The caption and the name properties of the command button: VB 264 You try to initialize a new Object variable with the following line but receive an error. called: Which of the following procedure types will execute when you assign a value to a property of an object? VB 262 In order to overlap the controls (say a command button) during design time.bat or . we use the ‘Send To Back’ or ‘Bring To Front’ option from the Edit menu. a form where the Protect Form button on the Forms toolbar is toggled on and is assumed to remain in that position)? Which event is triggered when the user moves to another open form? VB 260 VB 261 . To change it dynamically (i.exe. .

" In which word processing utility could she find a synonym for "beautiful"? WO 04 WO 05 WO 06 WO 07 WO 08 Using an electronic bulletin board. When the cursor gets to the end of a line. while still keeping the paragraph in the first document? WO 34 . and also the word ‘he’ to ‘she’ in the given phrase? “On a cold and still night.WO 01 Veena is entering a paragraph in a word processing program. What printer command should he select? What process should be used to recall a document saved previously? Which is used to indent text within a document? WO 09 Desktop publishing is a more sophisticated form of which of the following types of software? WO 1 WO 10 What is a Word Processor used for? What is a picture that is saved on a diskette and can be pasted into a document? WO 11 What is a Word Processor used for? WO 12 What basic tools would you find in the Edit menu of a word processor WO 13 What is a header in a document? WO 2 WO 25 What hardware is essential for a word? The user could take a picture from a magazine and insert it into the document by using a WO 3 What basic tools would you find in the Edit WO 32 What command in a word-processing program can be used to change the word ‘him’ to ‘her’. the only sound that could be heard was the owl that had ade its home in the nest outs What edit commands would you use to insert a paragraph from one document into another document. what is the best way to get the cursor to the next line? WO 02 How are data organized in a spreadsheet? WO 03 Which key moves the cursor to the beginning of the next line of text? Veena typed the following sentence: "The girl was very beautiful. Seema can do all of the following except which one? Aryan has created a ten-page story. but only wants to print the first two pages.

WO 385 Which of the following statements would NOT be a reason for showing suggested revisions in a Word document without changing the original document? WO 386 Which statement is NOT true regarding revisions made in a Word document? WO 387 How are suggested changes entered for review on an initial Word document? WO 388 Which of the following is TRUE about saving a document using the Versions command? WO 389 What happens when you open a document that has been saved using the Versions command? WO 39 You have used the word ‘discover’ four times in an English essay you have created using a word processing program. Which of the following would you use to do this? . You would like to find another word of similar meaning to use instead of ‘discover’.

WO 472 A reverse in a newsletter is: WO 473 A pull quote is best emphasized by: WO 390 . You would like to make this paragraph start on page 2.What would be the best way to do this? Tables in a document help you to easily arrange all of the following EXCEPT: To identify a document. it is helpful to include the file name on each page as a WO 440 Which of the following tools will copy the formatting of selected text to other places? WO 468 WO 471 What is the name of the process of determining the cause of errors in a macro? Drop caps are added to a Word document using the ___________ menu. how can you tell which is the most recent version? Various fields are added to a regular document to create a special document called a form through the ____________ toolbar. WO 392 Which of the following types of fields CANNOT be inserted into a form? WO 398 Which of the following is TRUE related to editing comments in a Word document? WO 4 What is a header in a document? WO 40 WO 400 WO 41 In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2.WO 391 When opening and working with multiple versions of a document.

in which of the following situations would Tom use the "Copy" command? WO 481 . how many points are there to the inch? WO 477 Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. What is the most likely cause? WO 484 While word processing. but cannot see any columns on the screen. What is the minimum number of sections in the newsletter? WO 478 Which of the following is NOT correct with respect to page. the width of each column in a two-column document will be: WO 483 Assume you have made all appropriate selections in the Columns dialog box in Word. and section breaks? WO 479 Which of the following would be the most appropriate font for a newsletter headline? WO 480 WO 482 Which of the following is the default Word column width? Assume you are creating a two-column newsletter. column. The rest of the newsletter has two columns. and ½-inch spacing between columns. Which type size is the most reasonable for the text in the columns? Given the default left and right margins.WO 474 Which of the following definitions is CORRECT? WO 475 WO 476 Pertaining to newsletters. which of the following cannot be changed using the Columns command dialog box? As related to type size.

WO 5 WO 56 What does a document contain? Before submitting your work you want to find any words spelt incorrectly. Which of the following would you use? .

Ans A Eliminates the need to reconcile control accounts and subsidiary ledgers. C AGP Card B None of above B None of above C Limited access files None of above C B Reel Number Batch Total Pointing Storage device device None of above Physical Security Console Log Data Dictionary D A B An ink pen An inked ribbon and print head None of above C Restrict physical access A pen A cartridge Use only unremovable media Paper A drum Require user passwords Eraser A ribbon Make duplicate copies of files None of above A cassette A C A Separation of duties A cartridge Centralised function for PC acquisition A drum Distributed policies or procedures None of above A A A print head A laser beam None of above C Volume Size None of above C Electrically charged ink Centralised function for PC Disposition A ribbon An INK RIBBON Storage capacity . NIC Card Will produce a more accurate set of financial statements. receipts. Cash Cash disbursements. VSAT Will be more efficient at producing financial statements.Op1 Op2 Op3 Op4 Inventory subsidiary. Does not require as stringent a set of internal controls. RAM Record Count Identification Number Control totals for one or End-of-file and more fields end-of-reel code B Writing on a hard board Printed output Voice activated Voice answer broadcasting back Validity check Coloured spots File Name Printer System Logs Boundary protection Pixels Identification number Storing information on the hard disk Visual audio board File protection ring Pixies Payroll transactions.

Design.44MB A CD-ROM A CD-ROM Read By a sunny window Systems Network software and software and application security software software Personal Supercomputer computer Notebook computers First generation Second generation Second generation Second generation Second generation Specification. Design. System Design. and Testing B A None of above None of above A B None of above C None of above A Not B None of above C None of above None of above None of above None of above None of above None of above B B A B B A A selective access medium A Business software and games None of the software above Mainframe computer None of above Jon Von Neumann computers Hoover generation Fourth First generation generation Third Fifth generation generation Third Fifth generation generation Third Fifth generation generation Supercomputer s Second generation None of above None of above B B None of above B None of above A None of above C None of above C None of above B None of above A Analysis. and Implementati on None of above A . and Testing Programming.Read Magnetic tape Write PAN drive Read and Write Floppy disk ROM chips RAM chips ALU CPUs 0 bits RAM chips A parallel Random access access medium medium 20 GB 700MB Magnetic A floppy disk tape storage Magnetic A floppy disk tape storage Read and Write Write By magnet objects In a drawer CDROM RAM chips chips ROM chips DRAM chips Registers Logic bus Registers Control unit 1 bit 8 bits ROM chips CACHE Serial access medium A parallel Random access access medium medium Serial access medium 1.

save. reliability.Analysis is the loading of Analysis programs that translates perform program code of routines to a high level control language to peripheral machine code devices This involves looking at a system and finding out how information is being handled None of above Inputs. None of above C Network systems and communication services Database systems and backup None of the services above A CD-ROM floppy disk B For technical support Operating systems and system services Magnetic tape storage Hard disk C . outputs. and upgradeabilit y To maintain security Saved to the disk None of above B None of the above D Transferred from the disk A Users operate the manual system and computer system at the same time Users operate the computer system from a given date Users operate the manual system None of above B The new system is introduced alongside the existing system The new system is introduced and users start operating it Users continue operating the old system None of above A Instructions and technical documentation User Guide and technical Log files and documentatio temporary files n None of above C To enable any printer to be connected to the network User guides cover how to run the system. print. and and software software To execute any To collect data programs Deleted from the Copied from disk the disk Maintenance. etc. enter data. file design Only hardware hardware.

To maintain a backup copy of all the information Data bus FDDI Data bus To help someone who is To do a applying for particular task. compilers and other useful system programs. D alphanumeric form A represented 127 characters A 32 bits A 8 bits 8 bits have fewer instructions than RISC machines ALU B A B D represented 256 characters 16 bits were 7 bits 4 bits More than 1000 mega bytes 1000 kilobytes None of the above Control Bus MAD Control Bus secondary storage access time A D B use more RAM than RISC have medium use variable size machines clock speeds instructions D Registers Variables Logic Bus A Computer is improperly shut down a serial interface dot matrix printer is non-volatile Data is not saved before computer is shut down All of the above printer a modem interface interface D ink-jet printer laser printer. employment Auto bus Address bus BAD TED Auto bus Address bus Data structures Operating that are part system routines of the kernel Peripherals that that execute in of an are connected to supervisor operating a computer. D stores more information than RAM B is used for cache memory B . system. ASCII code binary form form decimal form 1024 bytes a 32-bit bus or 32-bit registers is the last bit in a byte B CROM A Hertz D 32 registers 32 I/O devices 230 bytes 32 Mb of RAM used to indicate uppercase letters ROM bits per second used to detect errors RAM baud is the first bit in a byte DRAM bytes secondary memory access storage memory capacity time capacity Power is switched off a parallel interface line printer is faster to access than RAM Shells. mode.

increased the storage capacity of a computer increases the system process speed has more storage is a form of ATM capacity than card an ATM card provides backup power in the event of a power cut none of the previous C LCD displays is an access card for a security contains a system microprocessor SSGA none of the displays previous having several programs in RAM at the same time multitasking writing programs in multiple languages none of the previous A having several softwares running at the same time ALU brochures the ability to run 2 or more programs concurrently Registers magazines writing programs in multiple languages Variables CD-ROM none of the previous Logic Bus e-mail D B D an operating system to run more than one program at the same time none of the above C CRT displays multitasking multiprogrammi multitasking ng multiuser related to virtual a form of reality a form of ROM VRAM same as multitasking same as multiprogrammi ng multiuser save the file set up a password to calculate numbers to read from or write to print information to a sheets of floppy disk paper Uses Cobol 106 sec uses Java 103 sec a keypad a mouse none of the previous none of the previous C B C D involves using more than one processor at the same time D use a virus make a protection backup copy program B B uses C++ 1012 sec to display information or pictures on a screen none of the previous. 109 sec a frog a message pad B D D .

field Element. field. CD-ROM Firmware Firmware Sequential Operating System Tracks and Sectors Systems logs Parity check MIDI Serial interface interface D D C C A . C data to be data to be transferred to or transferred to from memory the stack an instruction the address that has been of a memory transferred from location memory A data to be transferred to memory an instruction that has been decoded a cursor an instruction that has been fetched from memory a scroll bar Formula Algorithm Assembler Memory protection an instruction that has been executed a light pen Program Artificial Compiler Intelligence Range Parity Checking checking use the use the directory search each file backup search tools in turn facility Network Program System the address of the next instruction to be executed a magic marker D A Data B Parity Checker B Validation B use find and replace Modem A B save copies of the file with the same name on the system use different filenames on the system Multiprocessing Time sharing keep a record of computer backup to a failures secure medium Multiprogram Multiplexing ming ROM RAM Word Processor Word Processor Hashed Floppy Disk Telephone modem Telephone modem Indexed Magnetic Disk B Shareware C Shareware Random A C ALU Blocks and Sectors CPU Files and Tracks Primary Storage B Schema and subschema A Character.data that has been transferred from memory an instruction the address that has been of a memory transferred from location memory. field. database Database. file Valid character check Maintenance diagnostic program Sound card. record File. character. record.

warehouse. To fill the log payments etc. sales. replaced regularly Database recording current stock in a presenting an supermarket and creating the order for answering plans for a stock to a customer building design. register It is mandatory in tally None of the bove A assist in maintenance prevent unauthorised access allow encryption C speed up access IT management IT senior executive lacks understands None of the support for IT. information.Text Laser Pictures Dot matrix Sound Ink-jet Video Drum D B viewing an encyclopaedia CD-ROM. leadership. text. A documents. queries. A updated updated once a never updated regularly year C Document Graphics processor package Spreadsheet D get into the system quickly 512 loss of confidentiality TCP/IP make efficient use of time 1024 duplication of data HTML access to the internet is quicker files can be shared a file name a subdirectory universal port serial retain confidentiality simplify file of files structures 4096 8192 C C virus infection loss of data IPX/SPX NetBEUI D A printer can do 1000s of pages a day the root directory the hard drive D uninterruptabl up-line provider e power uniform page service supply source C the operating system is easy to use B the program orphan files can executable may be left on the not allow it to system be uninstalled the system requires a network administrator to uninstall it the system always requires a re-boot and defrag afterwards A data. receipt. Graphical Rules writte in representation of procedural logic language Logical Steps in any None of the language above Purchase. the business above A B .

(c). (c) organisational controls (a) to (d) preventive controls (b). extensible hashing external hashing static hashing corrective controls. Use the Find Put your hand up Ask the person or Search and ask the next to you. The use of computers to design state-of. teacher C (a). do architecture. (c) (a) to (d) (b). (c). (c) parallel operations D (a) to (d) system walkthroughs D A C B . (c). All of the above are parts of IS controls. (c). (c). (b). (c) D: (b). detective controls.Using the-art. (b). (b). All of the above D Software that generates innovated designs and artistic None of the patterns. (d) specifications matching (a). (d) corrective controls C (a). (d) (a). above A enterprise local B identify the file type D specialist or functional Application Service Provider name the file ensure the filename is not identify the lost file preventive controls. C Create the files again. (d) benchmark testing (a). (b). (c). (c). (d) C detective controls general controls C Component Interface Settings Control B (a). dynamic hashing A: (a) . (d) detective controls (a). (d) (a) to (d) (a). (d) C problem logging call lights program change requests resolution procedures C unit testing data testing thread testing loop testing A (b). highcomputers to quality products. feature. processing.input. (d) (b). Select the ‘Shut Down’ option from a menu. Pull the power cord from the back of the computer. Turn the computer off at the power point. (b). (b). (c) C Press the reset button. (c). (b). output. (d) corrective controls B: (a) to (d) preventive controls C: (a).

(a) to (d) Peripheral processors. storing information Direct Sequential Systems analysis and applications programming. (b). B data design A Hub Ring All of the above C A D To help someone who is applying for employment To Store data in an organised manner B Binary Indexed B Parity errors will result Information formats commonly Data record can vary between never be blocked architectures together C Control Unit Local Area network Address calculation part Wide area network Use the computer to which they are Can send data to connected to a computer and perform all receive data processing from a computer operations Generally require a keyboard for data entry and a CRT for display Mixer Multiplexor Modem Input output channel A Protocol B Are required with a microprocessor which permits some data processing such as input validation D Time sharing computer C . (d) Replacement personal computers for user departments.Multiplexer. (d) D A Cross-training of operating personnel. (c). C A sequential file on a disk A direct A sequential file access file on A direct access on a tape a disk file on a tape C Tapes can only be read by the machine on which they are written Data path part Distributed systems Job control Concentrator. compilers. (c) (a). interface design Client-server Star Star Client Bus Bus Physical security of warehouse facilities. procedural design Computer network Mesh Ring To maintain a backup copy of are written all the information To do a particular job such as editing. operations. (b). (a). language. architectural design Identification of critical applications. Data communication Operating s hardware and systems and Computer software. (c).

Feasibility study. and code None of the and testing documentation generation above CRC Baudot ASCII EBCDIC D A An interpreter is a general An interpreter purpose is a language representation providing of the system very efficient None of the being designed execution above A Type of cable Terminal Standard A compiler converts the whole of a higher level A compiler does program code a conversion line into machine by line as the code in one program is run step An interpreter does the conversion line by line as the program is run Modem High-level languages Demodulator Middle-level languages Frequency division multiplexor Low-level languages It is faster than parallel communication It is less error prone It is less prone to attenuation Time Division Multiplexor None of the above Uses only one path C C D .Allows computer signals to be send over a telephone line Planetary network Office Automation A dumb workstation Time of day control locks Aids in back-up Packs data in Speeds up procedures a disk file online printing Ring Network Executor systems An intelligent workstation Encryption algorithms Loop Network Electronic mailing A personal computer Star Network Instant postoffice A D C A mainframe PC B Parity checks All of them C Device Communicati interconnect on protocol standard D A compiler is a general purpose language providing very efficient None of the execution above B Lexical analysis. and N. Implementation CONVERSIO system design.

above Ring Bus None of the 1100101 1010101 above Cyclic Retransmission Redundancy Hash Count None of the 4 64 above Port Modem Multiplexor 327 141 97 Parity Data Mining Data warehouse tools A A Acoustic coupler C None of the above B Data management systems All of them secondary memory access storage memory capacity time capacity B 30 B binary form 255 ASCII code form secondary storage access time None of the 256 above alphanumeric decimal form form B A .Accounting systems. Software and size of None of the program. Financial sector Graphic design commercial and engineering and education sector Manage the Communicate paging function with the console in a virtual operator environment Specification and System design Analysis Fiber Optics Coaxial Cable System Analysis The design of defines the the screen the format and type user will see and of data the use to enter or program will display data use A cache An interface Relieve the main CPU of repetitive communicati on tasks Testing Common carrier None of the above Reduce competition between the input/output devices None of the above C C B Telephone Lines C System Analysis involves creating a formal model of the problem to be None of the solved above An online A buffer protocol C B Testing to check for errors The different before the types of network system is to be used introduced Star Packet B B 10101010 C 15 Hardware.

4C5 4 bits Basic Coding Description 1024 bits 1B7 8 bits Binary Coded Decimal 1000 bytes 10000 binary form 1112 ASCII code form Mouse Keyboard None of the above 32 bits None of the above 210 bytes None of the 1110 above alphanumeric decimal form form Numeric None of the Keypad above used to indicate uppercase letters used to detect errors is the first bit is the last bit in a in a byte byte B Because it squeaks when moved bits per second Its moves like a mouse It has ears baud bytes Touch screen BPS Printing letters Light pen MIPS Tracing diagrams OCR MICR Touch screen Hard disk 5C4 16 bits Bit Code Design 210 bits Joystick MHz Reading bar codes barcode scanning CD-ROM drive None of the above Hertz None of the above VLSI None of the above A B D A A A A D D C B B voice recognition B None of the A above increased the storage capacity of a computer increases the system process speed provides backup power in the event of a power cut none of the previous C Refillable ink 100K Pencil lead 1.44 Mb Light sensitive elements 5 Mb None of the above 1 Gb C B hardware software input A Mouse Touch screen Keyboard Light pen Tracing Diagrams Hard disk Bar code reader Mouse Printer Scanner Digital Signatures CD ROM Drive B C Keyboard Printer B A Printing letters Touch screen Mouse Credit card output Numeric Keypad Joystick Reading Bar Codes Keyboard Optical mark reader Speakers B A .

Storing information Writing on a hard on the hard board Printed output disk Coloured spots Pixels Pixies Pointing Printer Storage device device Bar code Optical mark Mouse reader reader SSGA CRT displays LCD displays displays mouse button keyboard screen layout layout layout Bar code Optical mark Mouse reader reader language software hardware interpreter interface Back-up on a Cartridge Pickers B B Speakers Smart card CD-ROM None of the above none of the previous word processing software None of the above an operating system None of the above having several programs in RAM at the same time multitasking writing programs in multiple languages none of the previous A having several programs in RAM at the same time The ability to run 2 or more programs concurrently writing programs in multiple languages none of the previous B an operating system To run more than one program at the same time none of the above C Credit card multitasking Second First .generation generation computers.generation computers. computers. none of the Multi-user previous Param Arjun is due to bad none of the disk blocks previous A B C B C A A A C C Magnetic Ink Character Recognition Image Scanning Technology Technology B converts a program to slower than an machine a fast interpreter interpreter code Dot .jet Drum Printer Printer Printer none of the previous C Thermal Printer A .Matrix Desk . Fifth . multiprogrammi multitasking ng Vishwajeet Deep Blue is caused by caused by wear overuse Optical Mark Bar code Reader Reader Technology Technology Third generation computers.

Exception reporting Cross footing tests formula. function. System Capacity feasibility report Planning External file Control figures labels constant. Wide access to various data base Can extract and analyse data Can define the audit objectives D ACL IDEA Can aid in simple selection High End CAATs All of the above D A sample of transactions A utility software programme A special purpose written program None of the above A Macros clipboard search Analytical review procedures Action Procedures file sort Compliance tests of general EDP controls Event Procedures field field names All of the above General Procedures layout record grab A way to analyse and manipulate numerical information A tool to produce high quality documents An organised way of storing information about a set of A way of similar things maintaining a log C Information about certain programs It contains all the data about one specific item A document which A collection of contains text files Tests of details of transactions C C C D D B D B .encrypting it Very important reader user sequence Electrically charged ink mainframe technology 10-6 sec data to be transferred to memory Contingency Planning decrypting it compressing it transmitting it Vital information resource under siege Virtual information reader & user system None of above An inked ribbon Thermal Paper An ink pen and print head LAN WAN Unix operating technology technology system 10-3 sec 10-12 sec 10-9 sec data that has been transferred from memory C B D B D an instruction the address that has been of a memory transferred from location memory C Limit checks array.

backup systems Word processors. interpreters. None of the DTP above C PRIMARY KEY and FOREIGN KEY UNIQUE constraints constraints MODIFY ALTER CHANGE TABLE TABLE TABLE Relational remote DBMS relative DBMS DBMS DEFAULT and NOT NULL constraints IDENTITY columns C UPDATE TABLE C Reliable DBMS C storing data offline at a separate site backing up data regularly is related to data mining uses tape as opposed to disk C Number Description Component Source D . databases. editors Network software. spreadsheets .remote DBMS relative DBMS Relational DBMS Reliable DBMS C storing data offline at a separate site backing up data regularly is related to data mining uses tape as opposed to disk C Key verification Computer sequence checks Computer matching Database access controls D A way to analyse and manipulate numerical information A tool to produce high qualitydocumen ts An organised way of storing information about a set of None of the similar things above C Information about certain programs It contains all the data about one specific item A document which None of the contains text above B Reports allow users to extract information as hard copy (printed output) Reports provide a very flexible way of creating and editing documents A tool which allows text and graphics to be placed None of the in documents above A Extracting and analysing data Spreadsheets make data None of the easy to analyse Using queries above C Compilers.

B Many-tomany Many-to-one B EmployeeLas CompanyAddres A tName s The Tools menu. the primary key of both related tables. One-to-one One-to-many EmployeeID CompanyID A not a primary key of either related table. related tables in a database are consistent with one another. B foreign key. then select Double click the Delete from the Relationship line shortcut menu Select Undo in the Relationships pull-down menu Click the Delete Relationships button on the toolbar That there are several customers associated with that ID That some of the data is not viewable That there are records in a related table That records can be added by clicking on the plus sign C They must both be numbers They cannot be They must be They cannot be AutoNumber the same data text fields data types type B D .using a password keeping a backup copy keeping the saving the file original paper with different copy filenames A the product code A database bookmarks Auto Primary the primary key Graphics operators Auto ID mail merge browser wildcards AutoNumber e-mail e-mail engines Auto Key C A C C records in a dynaset are consistent with the underlying tables. the primary key a field from of the related an unrelated table. table. related query. Relationship Referential window integrity The join line The one-to-many relationship B Right-click the Relationship line. main form and a subform. reports are consistent with the underlying tables or queries. query and its associated report and its dynaset. forms in a database are consistent with the underlying tables or queries.

icon. object. in Form view. existing entries. Access ID is deleted loans are ignores the from the deleted from An error attempted Customers the Loans message is command. and all The customer’s the related Nothing. Dim CreateList. title bar text. title bar text. The subform is an object on the The subform is form and can be displayed in The subform moved or sized Datasheet is displayed like any other view.The customer’s ID is deleted from the Customers table. table. Sub CreateList. icon. icon. title bar text. does not must be set for have to be multiple words. CreateList. C must be set for one word. D The subform is not visible. The Loans table at any time Neither table title bar text. Sub. icon. The Customers table only when there are Loan records associated with that customer prompt. C C B B A drop-down list enables A check box A text field the user to enables the form enables the choose from user to choose form user to one of from one of choose from several A drop-down list several existing one of several existing enables the user entries. set. C . prompt. prompt. displayed. table. entries. D A one-to-many relationship between teams and players A one-tomany A one-to-many relationship relationship between between teams coaches and and coaches teams A many-to-many relationship between players and teams C # M ¥ * Either table at any time prompt. to enter text. must be set for two words.

store data in tables. D stored metadata procedures All of the above. maintain data on different things in different tables. data. metadata. D from existing data as a new systems development project as a redesign of an existing database a and b A .help people keep track of things. C holds user data All of above A b and c D B tables holds metadata holds indexes All of the above. create tables of rows and columns. facts. A all of the above D a and b D single-user database application multiuser database application e-commerce database application a or b A single-user database application multiuser database application e-commerce database application None of above B Structured Sequential Question Query Language Language (SQL) (SQL) Structured Query Language (SQL) Relational Question Language (RQL) C Database Database Management Modeling System System Jet SQL Server Data Business Model System Oracle Relational Model Manager B a and b D The database management system (DBMS) All of the above. figures. information. D The user The database application the database application(s) interact(s) with the DBMS the DBMS accesses the database data creates queries creates form None of above creates reports the user the database application the database management system (DBMS) the database all the users' data is in one place it contains a description of it reduces data its own duplication structure All of the above. relationships.

Their report delivery is more difficult than report delivery for reporting Nonintegrate None of the systems.from existing non-database data as a new systems development project as a redesign of an existing database a and b B from existing data as a new systems development project as a redesign of an existing database a and b C data models entityrelationship data modeling A data models entityrelationship data modeling B normalization data models entityrelationship data modeling D file managers normalization hierarchical models entityrelationship data modeling network models data migration relational data model entities in a column vary as to kind table record the order of the columns is important relation field record record data marts data marts data marts data marts normalization normalization D A more than one column can use the same name field tuple C D C field field the order of the rows is unimportant row key composite key foreign key foreign key candidate key C D composite key Insertion anomaly primary key Update anomaly foreign key Deletion anomaly surrogate key B All of above D assess the existing tables' structure and content design the database structure create one or move the data more new into the new tables database are supplied by several wellestablished manufacturers were essentially have poor killed off by MS response Access time They use sophisticated mathematical techniques. d data above are not true DBMS products A B A .

b and c Report Query C A Macros D Spreadsheets Regardless of how the objects and tables are It will be easier stored. the user It will be easier for the user to It is advisable will have to for the user to upgrade it if the to put each reenter the data upgrade it if the objects are in object and in the tables objects and one database table into a when the tables are in one and the tables separate application is database. and than one table forms It contains a user interface. metadata. linked to yet another database containing only tables. such as forms including the and reports can tables. B The Link Tables command can be used to associate the tables in one database with the objects in another database. existing data. in another. C Import Link Merge Join A It contains tables. reports. must be changed reside within without the same disturbing the database. upgraded. or switchboard It contains macros C Menu Wizard Interface Design Wizard Switchboard Manager D Build Menu . An application can be created All objects in in such a way an that it objects application. database. It contains more queries. An application may consist of multiple databases.dirty data inconsistent data nonintegrated a "wrong format" data problem B dirty data inconsistent data nonintegrated a "wrong format" data problem D data warehouse data warehouse databases do data are not not have stored in tables. Form Table Forms and Queries and reports tables data warehouse data are often denormalized . each with multiple objects.

Sent to the correct address. Error checking Competitive espionage Data entry errors. A Both sender and receiver must have the private key before this encryption method will work. recipient. centralize the manageability of data collection. Low cost of operation Industrial espionage Firewall vulnerability. Data Integration Corporate espionage Failure of server duplicating function.create backups for mission critical corporate data. The private key is used by the receiver for decryption but not by the sender for encryption. training. Quality management Economic espionage A list of competitor’s clients Contact numbers of the management Research group data A competitor’s new project B single-user database application multi-user database application e-commerce database application None of above C Replying promptly Keeping messages short Including the Using all capital Subject letters Collision. put key business information into the hands or more decision makers. The private key cannot be broken into fragments and distributed to the receiver. Conducting fraudPerforming awareness validity checks. Reviewing the systems-access log. store all corporate transaction data in one single location. The private key is used by the sender for encryption but not by the receiver for decryption. D Unaltered in transmission. Decryption Cipher Encryption Using data encryption. Received by Not intercepted the intended en route. C Cryptography C A D B C D .

2.16. SUM(H9:H11 G7*SUM(H9:H11 ) ) It is blinking. Cell references ^ Functions / B5*B6 C3/D4 E12 6 Text constants \ It is impossible D4^2 to determine. C the row is too short to show the number at your formula has the current font a syntax error size the column is too narrow to show all the digits of the number either b or c ability to generate tables flexibility of moving entries speed of calculation word processing graphical Range Address Producing graphs Writing letters drag from the top cell in the double-click any column to the cell in the last cell in the column column CTRL + ENTER ENTER array. database Gap Drawing pictures click the column heading TAB constant. 100 (201)555-1212.32 2. The phrase It is displayed “active cell” in reverse appears in the video. #VALUE! Numeric constants * C cost of initial setup D spreadsheet Rows D A Document filing A click the column label C INSERT formula.2 6. It is surrounded by a heavy border. Tom McKenzie. Status bar. D A B C D D C B A .2 Security at the transaction phase in EDI systems is not necessary because problems at that level will be identified by the service provider.10 2.4. function.Encryption performed by a physically secure hardware device is more secure than encryption performed by software.8. Removable drives that can be locked up at night provide adequate security when the confidentiality of data is the primary risk. A dark wide border Message authentication in EDI systems performs the same function as segregation of duties in other information systems. A dotted border No border A blinking border A 8.

Headers and footers Page Setup range. paste range. source range. source range. D12. the Save As command on the File menu. D12:G25 Margins Edit cell group. D clipboard. B the New command on the File menu. File the Save command on the File menu. B D A D The Duplicate command absolute B4 The Copy command relative $B4 The Paste command mixed B$4 Both the Copy and Paste commands constant $B$4 #DIV/0! #DIV/0! #DIV/0! #DIV/0! B #DIV/0! #DIV/0! #DIV/0! #DIV/0! C The Move command The Cut command The Paste command Both the Cut and Paste commands D .By either clicking in a different cell or using the arrow keys to move to a different cell By typing the reference of the cell you want to move to in the formula bar By clicking in a different cell By using the arrow keys to move to a different cell The Standard toolbar The Cell Format command on The Font Size The Formatting the Edit command on the toolbar menu Tools menu. 6 copy range. destination range. C Window A List Both Insert and Delete Both Clear and Delete Properties B Clear C Remove B Fonts View group. G25 destination range. View C the File Type command on the File menu. Edit Preview Details Insert Delete Clear Delete Orientation (portrait or landscape) Options worksheet. D C B B C clipboard.

cycle through absolute. applications. subtracting the later date from the earlier one. adding the later date to the earlier one. C the Fill Handle the Format Painter the Formatting toolbar Conditional formatting B Select the Insert Hyperlink command from the File menu. relative.G10 B1. the Esc key. a variable. and cycle through mixed cell open references. text with either a two-digit or fourdigit year. whether the cell has a formula or the cell a value in it. a constant. A B 0.75 March 4 of the current year Either 3/4 or . 03-Apr a cell on a worksheet. Click the Insert Hyperlink button on the Standard toolbar. the F1 key. C Jul-30 Aug-31 29/03/2008 It is impossible to determine from the information given. either a cell on a worksheet or a variable. the F4 key. B copy and paste cells. B subtracting the earlier date from the later one.75. adding the earlier date to the later one.G10 B1:G10 D AVERAGE Combination COUNT Line MAX Pie SUM Scatter C C . an integer. cell D text with a fourdigit year. depending on the cell formatting C text with a twodigit year. D B1-G10 B1. depending on the format. Right-click a cell and click the Edit Hyperlink command. address.edit cells. the F2 key. Double-click a cell and click the Insert Hyperlink command. whether the cell has an absolute or a relative cell the value in the reference.

Once a bar chart is chosen it cannot be changed to a column chart. hold down the SHIFT key Once a pie chart has been chosen it cannot be changed to line chart. D hold down CTRL + SHIFT A Fill Right Edit | Data | Sort Paste Special none of the choices None of the Create forms above select Print selection on Page Setup | Sheet and then print drawing pictures 0 D4+C2*B2 #VALUE! =A3SUM:B3SU M:C3SUM REF! portrait landscape AD213 ZA1 select Print selection in the Print dialog and then print None of the above =(B2*(D4+C2) None of the above whatever was last used vertical None of the A0 above D B B C D A C B A C sending storing data storing data on a information to a on the hard disk drive host computer drive receiving information from a host computer B Bandwidth Speed Size Channel A Find Browse Retrieve C Photography Save Digital Signature Key Lock Cryptography Message Digest C Hash Function Formula A User-id Password Name Penetration Retrieval Address Password Cryptography Cracker B A . hold down the ALT key Use tables Create four separate files Transfer information to Use multiple a database sheets Paste Fill Down Tools | Sort Data | Sort Analyse data Calculate data click the Print button producing graphs (D4+C2)*B2 press the PRINT SCREEN key writing letters Once a line chart has been chosen it can be changed to a pie chart. hold down the CTRL key Once a column chart is chosen it cannot be changed to a bar chart.

Combines connectivity of a hub with the traffic regulation of a bridge Two or more networks Switches data from incoming ports to outgoing ports.tax authorities Unauthorising Exposure Judge of a civil court Approving Hacking Police officer of IPS rank. Bridges and Hubs bits firewall frames gateway Packets router One Physical Layer Two Data-Link Layer Four Network Layer RG7U Coaxial cable Fiber A memory Physical address Logical address address B D All of Above B Hubs and nodes None of the above virus checker None of the above B All of the above D Twisted pair None of the above B C A C B .com Howard Aiken Msn .com Virus Charles Bubbage Dell .com Hoffman Amazon . A B Utility Imposting Threat Income .tax authorities Pirated software Cracker C Tim Berner Lee Etrade.Acts Regulations Address Protocols D Spoofing Loss Sales .com A B B Automated Tailor Any Time Machine Money Asynchronou s Transmission mode None of above C Acts Router Regulations Gateway Address Port Protocols Pin C B LAN WAN CAN PAN A hyper terminal tracing program hypertext hypertext transfer tracing program protocol National Informatics Center Network Interface card Can not Only Computers computers hypertext tracing protocol C New Information Card None of the above None of the Only printers above Concentrates connectivity Bridges and Repeaters.

DecNET. FDDI kbps Kbps Ethernet. Wired Technology None of the above None of the above Physical Layer It continue on to target device with corrupt data Ultra violet technology Network Data Link Layer Layer Binary 48 Bits ASCII 48 Bytes All of the above None of the above 48 MB software that facilitates connection to the internet a list of rules for transferring software that a gateway calling data over a allows file program for network copying internet bridging B Novell PC Client Server There isn't one If one node goes down. it brings down the entire ring If the hub goes down. ARCnet mips Mips B B C usually higher than LAN speeds measured in bytes per second depend on the transmission limited by medium modem speeds C . token ring. DecNET bps bps Ethernet. it brings down all of the nodes on that section Physiology Bus Octal 48 KB Network PC B B A D A A C B Topology Star If the hub goes down. it brings down all of the nodes on all of the rings None of the Both A and B above Ring All of above Linear Parallel Parallel Circular Both A and B None Linear Both A and B A B Ring Bus Star Mesh C Ring Star Bus Bus Star Linear Mesh Ring B C Ring Bus Mesh A Data Link Layer D B D Network Layer Star Physical Transport Layer Layer Ethernet. token ring. FDDI mbps Mbps Ethernet. token ring.Router None of the above A cable Hub Data return to the sender Wireless technology It gets destroyed bit by bit.

CD-ROM drive a modem must use the must use World Wide Web electronic mail key gateway interface a Novell Interface Controller CD-ROM drive uniform resource locator Windows 95 Netscape must have a LAN account All of the above A common gateway interface application protocol interface C connects a computer to a network D interfaces a used to control modem to a a printer computer Windows a modem package Linux Netscape None of the Novell Netware Windows NT above have to do with compression of graphics and video have to do with Web pages the Internet must use the must use World Wide Web electronic mail Printer modem provides access is a CPU to the Internet register A make of processor is part of Netscape is a protocol for the transfer of files between computers D used to send email uses wireless communication is part of medium Netscape used to send email C is a CPU functional unit used to send email provides access is a CPU to the Internet register none of the previous B use appropriate must have a communications LAN account software A none of the bridge previous D used to browse the Web used to protect a computer room from fires and floods a form of virus an email a backup server server IR system for hardware the Internet scanner CD-ROM B a screen saver program a poor file server A None of the above D none of the previous D browser clip-art file none none of the previous search engine is a CPU functional unit make of processor A is a protocol for the transfer of files between computers D used to browse is part of the Web Netscape D C D .

document. A Port sniffing C a screen saver program none of the previous D Virus that initiates a ping flood flood UDP flood traffic A C hub none of the above B It works the same way as a local network. It is one large network. sites. System intrusion used to protect a computer room from fires and floods a form of virus IP flood hack Flood a Web server with requests packet firewall router Any layer can communicate only with the layer above it. C Individual computers can connect to it using an ISP. Denial of Service switch a poor file a backup server an email server server Apply security patches Update virus definitions is a protocol that allows for remote login D Backup data on a daily basis Limit logging on access D C Only large nameThere are safe recognizable All sites are safe and unsafe sites are ActiveX-enabled and reliable. sites are safe. below it. by attaching through an FTP itself to a port. Application updates Spyware D B D D .used to send email uses telephone is part of lines Netscape Any layer can communicate The layers Any layer can only with the cannot communicate layer directly communicate directly with above or with one another. B Use of Use of identifiers passwords Use of logical Use of access encryption methods methods by attaching to an e-mail. Password cracking It is made up of many networks connected into transmission lines called backbones. safe. any other layer. Phone A Trojan horse E-mail Adware Web traffic A worm by scanning the computer for a connection.

B B Use antispyware software. make large amounts of money by purchase off.Modems Protocols Multiplexors LAN B cookies and Trojan horses. as military security g water nuclear plant in the 1930s systems systems safety systems D To obtain an accurate inventory of network related equipment and parts and network nodes D To improve To carry more network network capacity services To improve system response time Date of birth Fraud stop its competitors seeing their prices USA People Search Personal assets Adware buy stocks. key loggers and worms. invest without risk. server. cookies and key loggers. Never use your Use a proxy real identity. update its prices as soon as they are changed D Lycos Search B Criminal records A Spyware B D Hoaxing B Web stalking. cyber stalking. Shill bidding Phishing set its prices very high People Search Name of your bank Virus limit access to computer owners only Yahoo People Search Internet stalking. account. cookies.parking funds in shore their bank property. Trojan horses and key loggers. Siphoning virtual stalking. D Crashing the Shutdown of Contaminatin Shutdown of stock market. B . C An attack on a system for personal gain An attack with the purpose of gaining publicity Giving out Changing the disinformatio content of a Web n page D Economic damage Disruption in Disruption in communication supply lines All of the above are correct. pop-ups. Use a fake email address. spam. viruses.

VoIP intranet. B PoIP A . XML. IPT Add it to ‘Favourites’ or ‘Bookmarks’. a footer. IPP network topology A an encryption. Web browser. B . round trip HTML document.co in used for company company Click on the Back arrow until Click on ‘Go to’ the desired site or ‘Search’ in is found the browser Go to the History page Go to the and look for Bookmarks or the site Favorites page C the Refresh command the Insert Hyperlink command the Update command the External Data command A Hyperlink BMP Screensaver GIF Sound JPEG Video TIFF C C Save it to a floppy disk. an attachment. Consortium HTML. Cut and paste it to a word processor document.Encryption I only irc Physical Security controls II only ftp Message sequence number checking Both I & II www Adds more bytes Verifies Increases to programs integrity of files boot up time Logical access controls Neither I or II telnet B C C Misleads a program recompilation B HTML Internet Explorer Microsoft Excel both HTML and Internet Explorer B Web query. C extranet. B . HTML. DHTML. MHTML C D clicking a hyperlink that using Internet references a Explorer to view updating the document a Web page that values that are that is stored is stored on the obtained in the floppy hard drive on through a Web drive on your your computer query computer viewing an Excel worksheet that you have saved as a Web page. Write it down on a piece of paper.con is used for companies None of the above A the World Wide Web round trip HTML. privileged network.com is used for . one way HTML. HTML document. a signature.

trigg@do paul. main.domain. and and hardware. and database.12. None of the above File Transfer Program File Transmission Protocol File Transfer Protocol None of the above 193.3 paul .215. org. application.trigg @ domain.1 45. application. uk The US government So IP So email is addresses can delivered be shorter faster 143. and hardware. software. software.1.2. Desktop client.uk uk Scientists in Switzerland No-one None of the above None of the above None of the above None of the above Internet Relay Chat International Relay of Characters Desktop client.1. database. Telephone CD-ROM line Desktop server.1 9 paul.org. So computers can be referenced by a name A B B A D B C Internet Remote Conversation None of the s above A It will be waiting A letter will be for you to sent to you in None of the It will be deleted collect it the post above A Hyper Textual Mark-up Lingo Hyperlink Text Marking Language None of the above C Receiving messages automatically from anyone in the group People discussing a topic of interest High volumes None of the globally of email above C Application Software Deleted from the disk Data bus Data bus Personal computers BPS OCR Hyper Text Mark-up Language Operating Utility Programs system Copied from Saved to the the disk disk Auto bus Address bus Address bus Control bus Parallel Super computers computers MIPS MHz barcode MICR scanning Database management system C None of above None of above None of above A A C None of above VLSI A B voice recognition B .Modem Desktop server.1.

switches updates. software. It is a barrier between your network and the rest of the Internet. or both. A .netcraft. a network prevention system. m m com www.co www.nettools. antivirus software.netstat.co www. hubs upgrades. It hides your network. One of its techniques is packet filtering. scanners B A It can consist of hardware. B That any open applications be exited Dependencies on other services That you also That you are shut down not on the associated Internet services B Antivirus software Intrusiondetection software Firewall Router C an intrusiondetection system.is caused by wear caused by overuse is due to bad none of the disk blocks previous B converts a program to slower than an assembly a fast interpreter interpreter code none of the previous B faster than a compiler translates and executes converts a programs program to statement by machine statement code none of the previous B encrypting it decrypting it an assembler a compiler transmitting it C the CU a linker None of the above A the ALU compressing it an interpreter the power cord A runtime error can result if the user clicks the cancel button The program executes A compile time without any error occurs error You need to carry out conditional compilation File List Box Dir List Box systems memory overflow overload Drive List Box Combo Box RAM overflow buffer overflow C A A D Netcop NetBrute Netcraft NetBIOS D www. firewalls patches. a proxy filtering system.WhoIs.com C code correct.

cycle. D Delete it and change the Delete it from the built-in guest system and use account to a the guest power user account. C Problems with your wireless mouse D Never open an e-mail Turn off the attachment Do not auto-launch unless you know Update antivirus propagate hoax in your e-mail what it is and who sent it. age. software. on a network. renewal. viruses. Create another administrator account to confuse the hacker. Limit user’s ability to Block all configure the incoming traffic workstation. IP spoofing Spyware C C place a router between your ISP and your system. Virus Tapes should be melted and CDs Give them to a broken. D System acts abnormal Files are missing Printing problems virus A virus Trojan horse spyware A Trojan horse Spyware Obtain system IP Check for addresses Obtain cookies open ports E-mail and attachment scanning Download scanning buffer overflow D A buffer overflow C Obtain usernames and passwords D Backup file File scanning scanning D Do not open Use your attachments in browser’s unknown esecurity settings mails Avoid “skins” and “toolbars” Use encryption download software D Administrative assistant to the president Junior accountant D Cook Network administrator . history. and CDs should be kept forever. download files from hone your add spyware to reliable Web programming your system. D Make sure all update and security patches are applied. recycle shop. Trojan horse Tapes and CDs can be thrown away in the trash. sites. client. Disable it and create a nondescript user account with administrator rights. C Tapes can be used over and over. account. skills. Install and keep current antivirus and anti-spyware programs.

software provider protective open source software. button on any and check the right mouse visible box for the button on any toolbar. toolbar. cascading. on-demand computing. You cannot move a floating toolbar. and check the box for the missing toolbar from the Toolbars tab dialog box. left mouse button anywhere on the Word window. it cannot be opened without that password. Passwords can be up to only seven characters long. choose the Customize command from the contextsensitive menu. application service provider B D . on-demand software. The Save command on the File menu A minimizing. utility computing. B All documents are automatically saved with a The password default is casepassword. right mouse button anywhere on the Word window. and missing toolbar visible toolbar. sensitive. A public domain software. D utility software. choose the Customize command from the contextleft mouse sensitive menu. Web service provider proprietary software. Once a document is protected by a password. best-cost provider nonprotective open source software. The Open command on The Formatting the Edit toolbar menu tiling. protective open source software. click on the from the and click on the missing Toolbars tab missing toolbar. nonprotective open source software. drag. proprietary software C public domain software. A the default file location of new files whether the worksheet prints in landscape or portrait orientation the number of windows you have open the margins on the printed DOCUMENT A shrinking multitasking minimizing cascading C Click on the title bar and drag. dialog box. C Click on any Click on any corner and border and drag.The Standard toolbar multitasking.

D the Line color Line style. graphics and email address. the text and text alignment alignment D Fill color Line color Line thickness Fill color. C the Line style taken from the first column or row of data in the datasheet. text font. columns. video and sound. hot Delete cold Kill text. hypertext. hypertext digital and Power camera and Point. The graph placeholder is deleted. Side-by-side Stacked column column Pie chart Line chart C B . user. A popup box prompts you for an existing Excel chart to insert. text. CD-ROM. Line the Font and color. Power Point. Line color. datasheet. always taken depending on always taken from the first whether the from the first row column of data data series of data in the in the are in rows or entered by the datasheet. Informational systems hardware failures. Microsoft Graph is started so that you can create a graph. D empty Nothing dormant New power outages. sound. All of the above. and Line thickness D Excel is started so that you can create a chart. A B C text.Operational systems Structured query systems Office automation floods.

toolbar. finished. time. A dialog box is displayed allowing you to enter the name of the Excel worksheet that should be embedded in the PowerPoint presentation. Sorter view. The application that created the chart is started. Microsoft Graph will restart. or Exciting D . The chart is doubled in size. Single click the Double click chart. time. toolbar.Pull down the Insert menu and select Chart. build bullet items a letter at a time. The chart is deleted. click the Insert Chart button on Pull down the the Standard Insert menu toolbar. Moderate. B Click outside Change to Slide the chart. D Subtle Moderate Exciting Subtle. The chart is doubled in size. Object. letter at a time. The chart is selected. The datasheet window is The toggled from datasheet is closed to open saved as a (or from open to separate file. closed). The chart is deleted. bullet items and build bullet a slide one bullet bullet items one one word at a items a word at a item at a time. then click the View Datasheet It automatically button on the displays in Slide Standard view. datasheet once then select the slide is Object. C A dialog box is displayed allowing you to enter the name of the Excel worksheet that should be linked to the PowerPoint presentation. the chart. Object. D A a slide one bullet item at a time. You cannot display the Pull down the underlying Edit menu. D The chart is selected. D Click the chart object. or pull Click the Insert and select down the Insert Pull down the Chart button on the menu and select Insert menu and the Standard appropriate the appropriate select Chart.

From top. organization charts. slide. object. OLAP. OLTP. D The advanced timeline shows the sequence in which objects will appear The advanced The advanced on the slide timeline shows timeline shows and the the sequence in the duration of duration of which objects will the effect the effect appear on the applied to each applied to slide.Both enter and exit. nor the duration of the effect applied to each object. OLST. Data cannot be entered into Datasheet. The advanced timeline shows neither the sequence in which objects will appear on the slide. and fly in from top or bottom Alt Neither enter nor exit. and to the appear on a objects exit a way objects exit slide. a slide. neither fly in from top nor bottom C Ctrl B Enter and exit Enter Fly in from top or bottom Shift the way objects appear on a slide. B Clips Organization charts D A . and Dissolve in D Once data is entered it cannot be changed. Once data is entered it can be changed. and text Animation program Fly in From top Dissolve in Fly in. to what objects do after what objects do they appear on a after they the way slide. There is no such thing as a Datasheet. C Paint program Text Filtering Draw program program Clips. Custom animation can be used to affect the way objects appear on a slide. each object. B OLIP.

B [Ctrl+Z] D .ocx Audit On Error Resume Next B A UpdateControls PaintPicture Refresh Resize A Cancel parameter to a non-zero value UnloadMode parameter to UnloadMode Cancel a non-zero parameter to a parameter to 0 value zero value Cancel parameter to a non-zero value 1 Consists of several Programs UnloadMode parameter to UnloadMode Cancel a non-zero parameter to a parameter to 0 value zero value None of the 2 3 above Consists of several Applications Consists of Various Forms And Code Modules D A A D Consists of several Projects D Form window.ctx Validate On Error GoTo linelabel . [Shift+Z] You cannot change the style of the connecting lines in an Organization chart.text err.number error.text Msgbox Msgbox error. Class standard or code view code module.text error. Project window. but not individual shapes of a diagram.no & err. [Alt+Z] You cannot change the color of the boxes in an Organization chart.ctr Check On Error Stop .description D To display images to the user FreeFile Retrieve To allow the editing of icons GetFile GetProperty To help in creating a ToolBar GetFileNum Get To provide a repository for images used by other controls GetBytes Value D A B . code None of the module window module above A Place code in the Deactivate None of the event above B Refresh A Place code in the Terminate event AutoRedraw = True Place code in the Unload event AutoRedraw = False PaintPicture Msgbox Msgbox err. [Enter+A] You can change both the appearance of a whole diagram and the individual shapes of a diagram.number & & error.You can change the appearance of a whole diagram.number & err.ctl Validation On Error GoTo Inline .

InputBox function can be created with the InputBox macro function returns recorder. variable. KeyUp and KeyDown Output mode D B CurrentX and CurrentY ScaleLeft and ScaleTop ScaleHeight and ScaleTop x and y Property Get Property Assign Property Let Property Set C Background color property Min Caption property Max ZOrder property Value AutoRedraw property CurrentVal C B Shell Substr SetAttr CStr A A Can be Are one and the different at same times Are actually None of the not properties above B You do not have the You do not need permission to to use the Set access the command here class MyVar has not been declared None of the above C The Open method The ExecProcedu None of the re method above D The Exec method A warning query A critical icon message icon An exclamation icon intrinsic constant. while the InputBox function cannot. cannot. a value.Common messages passed to Windows Caption Open dialog box Visible Windows explorer Multi-Line Input box Font D C Click and KeyPress Ascii Format Click. Deactivate C . MsgBox statement can be created with the macro recorder. MsgBox statement returns a value. while the InputBox function does not. C Terminate C Data can be entered. Unload The form can be modified. B Data cannot be entered into the form. while while the the MsgBox MsgBox statement does statement not. None of the above built-in procedure. B statement. QueryUnload A new check box can be added. KeyUp and KeyDown Binary Format KeyUp and KeyDown Input Mode KeyPress.

Bullet and Numbering C Text at the bottom of every page Text which Numbers which appear at appear on the top of every page every page Mouse. keyboard and None of the mouse above microphone digital scanner B D Clear. then paste paste Print preview Save sorting B C B spreadsheet C Designated area on the document C None of the above AutoCorrect Insert. then Cut. grammar and autocorrect Cut. Paragraph. Mouse. paste and clear Font. then paste Replace Select all Delete. replace and select Spelling. replace and Toolbars Spelling. monitor and printer clip-art file Monitor. grammar and autocorrect Cut.press the return key layers and planes press the tab key lines and spaces tab grammar checker enter/return press the escape key height and width backspace/ delete spell checker thesaurus send a public message to friends interested in one send pictures topic to a friend From ___ To Print all ____ Enter Copy closing tabbing just keep typing rows and columns D shift B outliner C D send private messages to send a package a friend to a friend D database graphing Page setup Retrieve spacing word processing To analyse figures subscript Creating and editing documents annotation Storing information clip art None of the above clipboard B C To analyse figures Creating and editing documents Storing information Making Calculations B Clear. copy. paste and clear C Paste Copy. copy. then paste B A . printer and processing system keyboard? Browser Keyboard.

A All versions are opened automatically. The Versions command will allow you to save only two versions of a document: one version of the original and one version of any changes made to the document. document. The first and second versions are opened automatically. The previous version is opened automatically. including any changes that may have been made to that document. added. Through the Edit menu by choosing Track Changes command Through the Tools menu by choosing Track Changes command Through tools on the Reviewing toolbar Both through the Tools menu and the Reviewing toolbar D The Versions command will allow you to save multiple versions of a document. Comments are enclosed in a text box at the right of the document. The Versions command will allow you to save only one version of a document. The latest version is opened automatically. B Dictionary Grammar check Spell check Thesaurus A D . including any changes that may have been made to that document.To give the original author a chance to accept suggested changes from the person who entered the revisions To give the original author a chance to reject suggested changes from the person who entered the revisions To complicate the revision process and to force the author to spend more time making corrections To allow multiple people to work on one document in collaboration with one another C A vertical line outside the left margin signifies a A red underline change has appears been made at A line appears beneath text that point in through text that that is to be the is to be deleted. The Versions command will allow you to save only one version of a document without any changes that were just made to the document.

forms. Text at the bottom of every page Text which Numbers which appear at appear on the top of every page every page None of the above C Press tab. text. Word will show the name of the person who saved each version. the guidelines used to a section of text establish where the first where letter of each different sentence is elements of lowercase and the the rest are newsletter uppercase. will go. header/footer. A . Comments cannot be deleted. D C A Fault Finding Insert Format Painter Paste button button Error Bug Squashing Injecting Tools Format a section of white text on a black background. C A drop-down list B Comments can be edited or deleted by left clicking the highlighted text. typing it all in capital letters. C Comments cannot be edited. graphics. C Debugging Edit D C an enlarged capital letter at the beginning of a paragraph. Copy button This action is not possible. Insert page break. A Fields Tools Forms Insert Check boxes Toggle button Text fields Comments can be edited or deleted by right clicking the highlighted text. the list. find/search. macro.The most Word displays a recent version list of the dates will appear at and times each the bottom of file was saved. A underlining the text of the changing the pull quote. bibliography. Word is not able to tell the most recent version of a document. setting it in larger type or font size. color. Press Return. numbers. Copy and paste.

column break. The width of each column 6 The height of each column 10 The number of columns 12 The tab spacing within each column D 72 D One Two Three Four B Press Shift+Enter to force a line break. 2¾ inches. A sans serif A serif font at 10 font at 10 points points A sans serif A serif font at font at 45 20 points points It depends on the left and right margins. You are not in Print Layout view. Word cannot display columns You have not during editing. A to store a file on to store a file the hard drive on a diskette to move a section of text from the original location to another location 25 point impossible to determine.. You have not specified you will see them inserted a continuous only when you column section section print the break. and how many columns are specified. C Press Press Enter Press Ctrl+Enter Ctrl+Shift+Ente to create a to create a page r to create a section break. D D 2 inches 3½ inches 4 inches 6 point 10 point 15 point 2½ inches. A dropped cap is a word that starts with a lowercase letter when it should have a capital letter. 3 inches. breaks. D B B to leave an original section of text in place while pasting a copy elsewhere D .A grid is a set of horizontal and vertical lines that determine the placement of elements in a newsletter or other document. The reverse technique means to add dark text on a light background. A pull quote is a quotation taken from (pulled) from another document. document. break.

A set of different graphics Grammar Spell Checker Checker Data about a set of similar things Mainly text Thesaurus None of the above Find and Replace B B .

. arch itecture. BC130 A(n) __________ offers a solution package for an entire industry. C BC91 The memory data register is used to store da ta to be transfe rre d data to be tran sfe rred to th e th e add ress of a to or from me mory stack memo ry l ocatio n a n in stru cti on that ha s b een tran sfe rred from memory A D A The instruction register stores an in stru cti on that ha s an in stru cti on tha t ha s b een an in stru cti on that ha s be en de code d fetched fro m me mory be en exe cuted the a ddre ss of the ne xt ins truction to be exe cuted BC93 Which of the following is used to indicate the location on the computer monitor? a cursor a magic marker BC94 A mathe matical p roced ure that can b e expl icitly cod ed in a se t of comp uter l ang uag e instructio ns that mani pul ate da ta . a nd and Testing Testin g Ana lysis.? Which generation of computer was developed from microchips? Which generation of computer uses more than one microprocessor? Which generation of computer developed using integrated circuits? Which generation of computer developed using solid state components? Notebook computers First generation Second generation Second generation Second generation Second generation Jon Von N euma nn comp uters Hoover generation Fourth generation Fifth generation Fifth generation Fifth generation None of above None of above None of above None of above None of above None of above B A C C B A BC43 Name three steps involved in developing an information system Specification. replaced regularly never updated updated regularly updated once a year Database ge t in to the system qu ickly 512 loss of confidentiality TCP/IP Document processor make efficient use of time 1024 duplication of data HTML Graphics package Spreadsheet re tain confidentiality of file s simplify file structures 4096 8192 virus infection loss of data IPX/SPX NetBEUI BC114 To be effective a virus checker should be Wh ich on e of th e fo llo win g softw are ap pli catio ns wou ld be the MOST a ppro pria te for p erformin g nume rical a nd statistica l calcu latio ns? BC115 BC116 BC117 BC118 Passwords enable users to 12. syste m desi gn. BC124 A flow chart is the BC125 A voucher entry in Tally is done for Purchas e. b ) fun ction al arch itecture. Des ign. 15 mi nutes of soun d an d 1 minu te o f vi deo .? Separation of duties A cartridge A print head Volume Read Magnetic tape BC22 BC23 Magnetic tape is a. Today. su ch as a prin ter or huma n ope rator? The adva ntage s o f CASE tool s a re: a) reusa bil ity. (d) (a). (d) A BC149 BC150 BC151 BC152 BC153 Wh ich of the foll owi ng pro cedu res shou ld b e incl ude d in the di saster reco ve ry p lan for a n In fo rmation Techno log y d epa rtm ent? Designing relationships among components is part of: Several Computers connected together is called: Which network topology uses a Hub? Which of the following topologies is used for Ethernet? Re pla cemen t pe rsona l comp uters fo r u ser Ide ntification of c ritic al de partmen ts.. keybo ard. record. (d) general controls C C BC134 BC135 BC136 BC137 Component Interface Settings Control B (a) to (d) (a). Concentrator. pr int. compile rs and othe r useful sys tem progr ams . c) kn owl edg e base . re source a llo catio n. Th e raw facts yo u co lle ct are ca lle d documents. Ope rating sys tem s and compile rs. recei ving a nd storin g messag es i s ca lle d an Office Automation If a workstatio n contai ns a proce ssor.? Deleted from the disk Copied from the disk Saved to the disk None of above None of the above Tra nsferred fro m the disk BC48 What is Direct Implementation? Use rs o pera te the man ual system an d Us ers opera te the comp uter syste m a t the computer sy stem fr om a same time giv en date Use rs o pera te the man ual system None of above BC49 What is parallel running? The new sys tem is The ne w syste m i s intr oduc ed alongside in tro duce d and users start the existing sys tem op eratin g it Instruction s a nd techn ical Log files and temporary files do cumen ta ti on Use rs co ntinu e ope rating None of above the ol d syste m Us er Guide and tec hnical None of above doc um entation BC50 What documents are produced during the development of a system? BC51 What are User Guides are used for? BC52 BC53 Systems software can be categorised into: Which storage device cannot be erased? For technical support Ope rating sys tems and s ystem s er vic es Magnetic tape storage A B B A A C To en abl e an y pri nter to be con nected to the n etwork Ne tw ork syste ms a nd commu nica ti on se rvi ces CD-ROM Us er guides cove r how to r un the s ystem . Lo gica l Ste ps in an y la ngu age D uniform page source universal port serial data. payme nts etc..? You can ________ protect a floppy disk. None of above Da ta base systems an d None of the above ba ckup servi ces floppy disk Hard disk Application software are programs that are written Which bus carries information between processors and peripherals? Convert the decimal number 2989 to Hexadecimal Which bus controls the sequencing of read/write operations? To mai ntain a b ackup cop y o f al l th e in fo rmation Data bus FDDI Data bus To do a particular task. Auto bus BAD Auto bus To he lp some one who is ap plyi ng for empl oymen t None of the above Address bus Control Bus TED MAD Address bus Control Bus B A B D BC58 BC59 What are utilities? Numbers are stored and transmitted inside a computer in Peri phe rals that are con nected to a comp uter. reli abi lity. It is know n as Which of the following file organisation forms most efficiently allows access to a record Sequential The part of the computer system controlling data manipulation is called the Operating System For direct access storage devices the recording area is divided into The data hierarchy from the largest to the smallest is search each file in turn save co pie s o f the fil e with the sa me name o n use d iffe rent file name s o n the system the system BC104 BC105 BC106 D D Formula BC101 BC102 BC107 a light pen Assembler Memory protection use the dire ctory se arc h tools To ensure that data is not lost if a computer system fails. (d) (b). re ceipt. commun icatio n pa th w ill re qui re which o f the fo llo wing Mixer Modem Multiplexor Ti me shari ng comp uter C BC167 Allows computer signa ls to be s end A modem is a device that over a te le phone line A LAN in clud es 20 PC s. A A None of the above A None of the bove A IT ma na ge ment la cks leader ship. (c) C (a). c) po rta bil ity. ea ch dire ctl y co nne cte d to th e central sh ared poo l of d isk Planetary network d rives an d prin te rs. in you r mu sic class you sa ved you r co mpo sition s a s MP3 fil es. (c). hardware .. and stora ge de vices? Where would you find the letters QUERTY? What are you most likely to use when playing a computer game? A digitising tablet can be used for? Which of the following is a pointing device used for computer input? What input device could tell you the price of a product Where would you find a magnetic strip? hardware Mouse Touch screen Printing letters Touch screen Mouse Credit card software Keyboard Light pen Tracing Diagrams Hard disk Bar code reader Mouse output Numeric Keypad Joystick Reading Bar Codes Keyboard Optical mark reader Speakers input Printer Scanner Digital Signatures CD ROM Drive Keyboard Printer A B C B A B A BC218 Hard copy is a term used to describe. binary form Opera ti ng system routin es that execu te i n sup ervisor mod e. (c). (c)..44 Mb Light s ensitiv e elem ents 5 Mb None of the above 1 Gb C B BC211 BC212 BC213 BC214 BC215 BC216 BC217 Wh at g ene ral term de scribe s the p hysica l equ ipme nt of a co mputer system.? Writing on a hard board Printed output Storin g informa ti on on the ha rd disk Back-u p on a Cartrid ge B BC219 BC220 BC221 BC222 What are the individual dots which make up a picture on the monitor screen Called A daisy wheel is a type of. (d) corrective controls B: (a) to (d) preventive controls C: (a). (b). (c). (c).. BC95 BC96 Wh ich of the foll owi ng transl ates a prog ram written in h igh -leve l lan gua ge in to ma chin e la ngu age for exe cution ? Detecting errors in real memory is a function of BC92 BC97 BC98 BC99 To find where a file has been saved on disk. (c). (b). (b). an d Imple mentatio n None of above A BC44 How do you define analysis of an information system? Ana lysis transl ates Ana lysis is the lo adi ng of This involves look ing pro gram cod e of a h igh pro grams that pe rfo rm at a sys tem a nd finding le ve l la ngu age to rou ti nes to con tro l peri phe ral out how informa tion is None of above mach ine co de de vices being ha ndled C BC45 BC46 What areas need to be considered in the SOFTWARE design process? What is the function of systems software? Only ha rdwa re and software To collect data B D B Supercomputers Second generation First generation Third generation Third generation Third generation Inputs.? Serial access medium Random access medium 1. (b).. dynamic hashing All of the above ar e pa rts of IS controls .? What input device can be used for marking a multiple-choice test? Laptop computers use Coloured spots Printer Mouse CRT displays Pixies Pointing device Optical mark reader SSGA displays B A C B C A Pixels Storage device Bar code reader LCD displays BC223 BC224 QWERTY is used with reference to What input device could tell you the price of a bar of chocolate? screen layout Mouse mouse button layout Bar code reader keyboard layout Optical mark reader Pickers CD-ROM None of the above none of the previous word p roces si ng software None of the above BC225 BC226 A GUI is Where would you find a magnetic strip? hardware Credit card language interpreter Speakers software interface Smart card an operating system None of the above C B . Computer operations. architectural design interface design Client-server Client Star Bus Star Bus Physi cal secu rity o f ware ho use facil ities. extensible hashing D A A: (a) . (c).. outputs. external hashing detective controls. and testing CRC BC163 BC164 BC165 BC166 BC170 BC171 Type of cable Aids in back-up procedures Packs data in a disk file Spe eds up o nli ne prin ti ng A Ring Network Loop Network Star Network D Executor systems Electronic mailing An intelligent workstation A personal computer Instant post-office C A mainframe PC B Encryption algorithms Parity checks All of them C Terminal Standard Communication protocol Dev ic e inter conne ct sta ndar d D A compiler c onve rts the whole of a higher leve l progr am code into ma chine code in one s te p A co mpil er is a gen eral pu rpose l ang uag e pro vidi ng very effi cien t exe cution None of the above B Imple menta ti on an d do cumen ta tion Baudot Le xical a nal ysis. To p ermit simu ltane ous termin al op era ti ons. file design Mai ntena nce. d) in fo rmation a rchite ctu re Benchmarks form part of: C ontin uity control s i nclu de : a) reco rd coun ts. This type o f ne tw ork is call ed a A compu ter base d syste m for sen din g. mo nitor. specialist or functional Application Se rvice Provider allow encryption C Software tha t ge nera te s in nova te d desi gns an d artistic pa ttern s... (b). fie ld.. b) mai ntain abi lity. file A Valid character check Mai ntena nce d iagn ostic pro gram Systems logs Parity check C Sound card. Wh ich is the b est w ay to l ocate the fil es? Create the files again. etc . C. option from a me nu. d) prese ntatio n archi te ctu re parallel operations system walkthroughs BC147 The co mpu te r o pera ti ng system perfo rms sch edu lin g. the user should H avin g a sing le CPU a lterna ti vely pro cess ta sks e ntere d fro m mu ltip le termin als is ca lle d The pla ce in the CPU w here the d ata an d prog rams are temp orari ly sto re d du ring p rocessi ng is cal led th e All are examples of computer software except BC100 a scroll bar use the backup facility use find and replace A System Modem B kee p a record o f comp uter fa ilu res ba ck up to a se cure me dium D Multiprocessing Time sharing Multiprogramming Multiplexing D ROM Firmware RAM Word Processor Floppy Disk Telephone modem Magnetic Disk Shareware B C Firmware Word Processor Telephone modem Shareware A Hashed ALU Indexed CPU C B C Tracks and Sectors Ch aracter. (c). Ask the person next to you. It is mandatory in tally preve nt una uthorise d ac ces s IT un derstan ds th e bu sine ss None of the above B output. (c) (a) to (d) D BC140 BC141 BC142 BC143 BC144 BC145 BC146 Which is not part of help desk documentation: problem logging Testing of individual modules is known as: unit testing D esig n pha se of CASE to ols in clud es: a) data arch itecture. b ) user in te rfa ce. procedural design Computer network Mesh Ring Cross-trai nin g of op eratin g perso nne l.? Coloured spots File Name Printer Pixels Identification number Storage device Pixies Reel Number Pointing device None of above Batch Total None of above B D A BC11 Which approach or technique is a control usually associated with microcomputers System Logs Physical Security Data Dictionary B An ink pen Console Log An inked ribbon and print head Use only unremovable media Paper A drum Ce ntrali sed fun cti on for PC acq uisi ti on A drum A laser beam Size Write PAN drive Require user passwords Eraser A ribbon Ce ntrali sed functio n for PC Di sposi ti on A ribbon An INK RIBBON Storage capacity Read and Write Floppy disk BC12 An impact printer creates characters by using. All of the above D speed up access BC129 What is a computer-aided design system? The use of compute rs to des ign s tate-of-thear t. D esig n.. (c) (b). (c) organisational controls (a) to (d) preventive controls (b).. b) da te ch ecks. field. an d ask th e te ache r C BC138 Which of the following is an acceptable way to shut down the computer? Press the reset button. record File. How many bytes do 4 Kilobytes represent? Back up of the data files will help to prevent Which one of the following is the MOST common internet protocol? BC119 BC120 The advantage of a PC network is that The term A:\ refers to acce ss to the in te rnet is files can be shared qu icker a file name a subdirectory BC121 UPS stands for BC122 BC123 The main problem associated with uninstalling software is that You are cond ucting re search for a Inco me Tax assign men t. (c) detective controls D: (b). (d) (a). (d) corrective controls C C (a).... (d) (a). Th e fo llo win g is an in fo rmation not fo und i n the trail er lab el BC5 Hard copy is a term used to describe. s ales. decimal form rep resen te d 256 cha racters 16 bits She lls . C C D A th e op eratin g syste m is ea sy to use the hard drive orpha n file s can be left on the s ystem Graphic al re pr ese nta tion of logic BC128 pri nter can do 1 000 s of pa ges a da y the root directory uninterr uptable power supply text. and FORTRAN are referred to as High-level languages Middle-level languages A C None of the above C Uses only one path D None of the above C BC175 Serial Communication is used over long distance because it BC176 In what areas is the COBOL programming language used? It is faster th an pa ral lel It is le ss p rone to It is less error prone commu nica ti on attenu ation Fina ncia l sector and Acc ounting s yste ms. CD-ROM MIDI interface Serial interface A BC110 Wh ich of the foll owi ng ha rdwa re or softw are system control s p rovid es a de ta ile d re cord of al l activitie s p erformed b y a co mpu te r system Wh ich on e of th e fo llo win g parts of a compu te r i s n ecessa ry to en ab le it to p lay mu sic? An e du cation al CD -ROM o n In dia n Poets con ta ins 10 00 pa ges o f text. (c). Information on a hard disk is usually backed-up using a. i t is sai d to b e A dumb workstation Ti me of day con tro l Terminal hardware controls include lo cks BC168 RS-232 is a BC169 What is a compiler? A co mpil er doe s a con versio n lin e by lin e as the pro gram is run What are the stages in the compilation process? Which of the following is not a data transmission coding scheme Feasi bil ity stud y. None of the above A enterprise local B BC131 File extensions are used in order to name the file ensure the filename is not lost identify the file ide ntify the file type D BC132 BC133 Information systems controls include all of the following EXCEPT: Hashing for disk files is called C ompo ne nts o f exp ert systems in clud e: a) infere nce en gin e. stora ge an d commu nica ti on cap ab ili tie s. Peripheral processors. character. Prog rammin g. 109 sec D D B B BC89 A 4GL is A nanosecond is Wh at sma ll. a nd da ta re tri eval fun cti on s b ased o n a set o f i nstruction s p rovid ed by the: Multiplexer. Da ta co mmun icatio ns ha rdwa re and so ftwa re. s tor ing To he lp some one who is To Store da ta i n an inform ation ap plyi ng for empl oymen t orga nise d man ner B BC155 Application software are programs Wh ich type of file se arch method re qu ires a comp uter fi rst rea d al l loca ti ons p reced ing the desi red on e Direct Sequential BC156 Wh ich of the foll owi ng are as of re spon sib ility are n ormal ly assig ned to a systems p rogra mmer in a co mputer system envi ronme nt? Syste ms ana lysis an d ap pli cation s pro grammi ng.5” floppy is around Refillable ink 100K Pencil lead 1. (c). forw ardi ng. So ftwa re and None of the above intr oduced size o f pro gram. C ompo ne nts o f an i nforma ti on system mode l are : a) ap pli cation s a rchitecture . Syste m De sign . (d) C Us e the Find or Se arc h Put yo ur ha nd up fea tur e. d ) fle xibi lity preventive controls. (d) c) in te rfa ce arch itecture.. prin te r. pre sentin g an ord er fo r stock to a w areh ouse . (d) C call lights data testing (a) to (d) progr am change re ques ts thread testing resolution procedures loop testing C A (a). 50 0 colo ur p ictures. such a s i ts vid eo scree n. enter data . (b). (b). CONVER SION. the user should a form of ROM 32 Mb of RAM provides ba ckup powe r in the eve nt of a powe r none of the previous cut is a n ac ces s ca rd for a co ntai ns a se curity s yste m microp roce ssor SSGA displays writing p rogra ms in mul ti ple l ang uag es writing p rogra ms in mul ti ple l ang uag es Variables CD-ROM to run m or e tha n one progr am at the sam e time multiuser a form of VRAM same as multiprogramming multiuser save the file set up a password make a backup copy to print sheets of paper uses C++ 1012 sec BC86 What is the function of a disk drive? to calculate numbers to r ead from or write inform ation to a floppy dis k BC87 BC88 Uses Cobol 106 sec uses Java 103 sec A D B D C none of the previous B none of the previous A none of the pr evious Logic Bus e-mail D B D none of the above C none of the previous C none of the pr evious involves using more than one pr oc es sor at the sa me time use a viru s pro te cti on pro gram to disp lay in fo rmation or pictu res on a screen none of the pr evious . high-quality Usi ng comp uters to d o products . field Element. static hashing corrective controls. Job c ontrol la nguage. The basi c systems mod el is use d to descri be virtua lly al l informa ti on systems and it input.Q_id Q_desc BC1 BC2 BC3 The memory address register is used to store Inefficient usage of excess computer equipment can be controlled by Which of the following is not the component of a CPU BC4 A tra ile r l abe l is use d on a mag netic tape fi le.44MB 20 GB A parallel access medium None of above 700MB None of above A B BC24 BC25 BC26 BC27 BC28 BC29 BC30 BC31 BC32 BC33 Which storage device has the largest capacity in Mb? Which storage device cannot be erased? You can ________ protect a floppy disk Where should floppy disks be stored? The contents of these chips are lost when the computer is switched off? What are responsible for storing permanent data and instructions? Which parts of the computer perform arithmetic calculations? What are small high speed memory units used for storing temporary results? How many bits of information can each memory cell in a computer chip hold? What type of computer chips are said to be volatile? A CD-ROM A CD-ROM Read By a sunny window ROM chips RAM chips ALU CPUs 0 bits RAM chips Magnetic tape storage Magnetic tape storage Read and Write In a drawer CDROM chips DRAM chips Logic bus Control unit 8 bits CACHE C A B C B B A B B A A floppy disk A floppy disk Write By magnet objects RAM chips ROM chips Registers Registers 1 bit ROM chips None of above Make d upl icate cop ies of fi les None of above A cassette Distrib uted p oli cies or pro cedu res None of above None of above None of above None of above None of above C A C A A A C C B A BC34 Magnetic tape is a. and cod e gen eratio n ASCII None of the above EBCDIC D A BC172 What is the definition of an interpreter? BC173 A devi ce used i n da ta co mmuni catio ns to d ivid e a tra nsmissi on sig nal i nto severa l su b-ba nd s i s kn own a s a An interpre ter doe s An in te rpreter is a the conve rs ion line by An in te rpreter is a ge nera l purp ose line as the progr am is rep resen ta ti on o f the system la ngu age p rovid ing ve ry run be ing d esig ned efficie nt e xecutio n Frequency division Modem Demodulator multiplexor BC174 Third generation languages such as COBOL. scre en man ipu latio n de vice.? BC13 BC14 BC15 The best security control in a microcomputer environment is to What would you NOT use with a flatbed plotter? What do you need for an ink jet printer? Electrically charged ink Re strict phys ic al ac ces s A pen A cartridge BC16 BC17 BC18 BC19 BC20 BC21 The greatest control exposure in a microcomputer environment is the lack of What do you need for an ink jet printer? A laser printer does NOT use? The amount of data that a disk may contain is known as the disks. (b).. is fa ste r to acce ss tha n sto res more in fo rmatio n i s u sed for cach e RAM is non-volatile than R AM memo ry B in crease d th e sto rage cap acity of a co mpute r increases the process speed syste m has more sto ra ge ca paci ty is a form of ATM card than a n ATM ca rd C 32 I/O devices BC64 BC65 BC66 A parity bit is he contents of these chips are lost when the computer is switched off? Clock speed is measured in use d to i ndi cate up perca se letters ROM bits per second BC67 Cache memory enhances memory capacity BC68 BC69 CISC machines Which parts of the computer perform arithmetic calculations? ha ve fe wer in stru cti ons use mo re RAM th an R ISC than R ISC ma chin es mach ine s ALU Registers BC70 BC71 BC72 Every data from the primary memory will be erased if An RS-232 interface is For print quality you would expect best results from BC73 ROM BC74 A UPS BC75 smart card BC76 Laptop computers use BC77 Multiprogramming refers to BC78 BC79 BC80 Multitasking refers to What are small high speed memory units used for storing temporary results? A good way to exchange information that changes rapidly is through CRT displays ha ving s eve ral progr ams in R AM a t the sam e tim e havi ng seve ra l software s ru nni ng at the same time ALU brochures LCD displays multitasking th e abi lity to ru n 2 or more pro grams con curren tl y Registers magazines BC81 Multiprogramming is a prerequisite for multitasking an operating system BC82 Timesharing is the same as multitasking multiprogramming BC83 Virtual memory is BC84 Multiprocessing is same as multitasking related to virtual reality BC85 To help keep sensitive computer-based information confidential.? BC35 BC36 Software can be divided into two areas: Travel agents use this computer system when reserving flights Serial access medium Random access medium Ne two rk so ftw are an d Sys te ms s oftwar e and secu rity so ftwa re applica tion s oftwa re Supercomputer Personal computer None of above None of above Not None of above None of above None of above None of above None of above None of above None of above A sel ective a ccess A parallel access medium med ium Busi ness software a nd None of the above ga mes softw are Mainframe computer None of above BC37 BC38 BC39 BC40 BC41 BC42 Which computers are used in the weather forecasting industry? Vacuum tube based electronic computers are.. ASCII code form BC60 BC61 The original ASCII codes A Nibble corresponds to Da ta structure s tha t are pa rt of th e kerne l of an op eratin g syste m. c) tech nol ogy arch itecture . a nd softwa re an d upg rade abi lity To execute any programs To maintain security BC47 Formatting a disk results in all the data being..? BC6 What do the abbreviations VAB stand for Wh at co ntrol wo uld p reven t the a ccide ntal era sure o f custome r i nforma ti on from a ma gne ti c ta pe BC7 Op1 Op2 da ta to be tran sferred to memory Contingency Planning NIC Card da ta tha t h as bee n transferre d from memory System feasibility report VSAT Record Count Identification Number Writing on a hard board Printed output Voice a cti vated Voice answer back bro adca sti ng Validity check Boundary protection Op3 the addr ess of a me mory loca tion Capacity Planning RAM Co ntrol totals for one or more fie lds Storin g informa ti on on the ha rd disk Op4 Ans an i nstruction tha t ha s b een tran sfe rred from memory Exception reporting AGP Card C C B End -of-fi le an d en dof-ree l code B None of above B Visual audio board None of above C File protection ring Limited access files C BC8 BC9 BC10 What are the individual dots which make up a picture on the monitor screen called? Header label normally include all the following except the A daisy wheel is a type of. record in g cu rren t sto ck in a sup ermarke t an d an swerin g custome r que ries. b ) i mage s. sa ve. crea ti ng the pl ans for a bu ild ing d esig n. Graphic design and education comm erc ia l se ctor en gin eeri ng BC177 The primary function of a front-end processor is to Co mmuni cate with the con sole o pera to r BC178 What is the first stage in program development? Specification and design System Analysis Testing Common carrier Re liev e the m ain CPU Man age the p agi ng fun cti on of r epetitive in a vi rtu al en viron ment comm unication tas ks Coaxial Cable None of the above Ti me Divi sion Multip lexo r Low-level languages BC179 Which of the following is not used for data transmission within a local area network Fiber Optics BC180 BC181 What is System Analysis? A device to device hardware communication link is called The de sign o f the Syste m Ana ly sis scree n th e user wi ll see System An alysi s d efine s th e involves c re ating a an d use to enter o r format an d typ e of d ata th e forma l model of the di spla y d ata pro gram wi ll use problem to be s olve d A cache An interface A buffer BC182 BC183 BC184 BC185 BC186 What will a good software provider consider? The topology of a network can be each of the following except What is the 8-bit binary value of the decimal number 85? Which is the most common data transmission error checking method What is the decimal value of the binary number 1111? BC187 BC188 Which of the following devices merges communication signals onto a single line What is the decimal value of the octal number 215? Red uce co mpetitio n be twe en the inp ut/outpu t de vices C None of the above B Telephone Lines C None of the above An online protocol C B The di ffere nt type s o f ne tw ork to b e used Star 10101010 Parity 15 Te sting to chec k for e rrors before the sys tem is Ha rdwa re . BC139 Yesterda y... To fill the log register Passwords are applied to files in order to assist in maintenance BC126 BC127 B D C up-line provider service th e syste m alw ays the system requ ires a requ ires a re -b oo t the pro gram exe cutab le may ne tw ork admi nistrator to an d defrag no t al low i t to be un in sta lle d un instal l it afterwa rds sen ior exe cutive Each of the following is an enabler of IT-business alignment except: sup port fo r IT. Whi ch of the fo ur differen t me dia l isted take s u p most sp ace o n th e CD-R OM? Text Pictures Sound Video D BC111 Which one of the following printers is suitable for printing sprocket fed carbon copies? Laser Dot matrix Ink-jet Drum B A C BC108 BC109 BC112 Multimedia software can be most productively used for BC113 viewing an encyc lopaedia CD ROM. p erip hera ls and w orkstation s th at a re in fairl y cl ose pro ximity Distributed systems Local Area network Wide area network Protocol B BC161 Intelligent terminals differ from dumb terminals in that they Ca n send d ata to a comp uter and re ceive da ta from a com puter Use the co mpu te r to wh ich they are co nne cte d to pe rfo rm a ll pro cessi ng op eratio ns Gene rall y re qui re a keyb oard for da ta e ntry an d a CRT fo r d ispl ay Are r equire d with a micr oproce ssor which pe rmits some data pr oc es sing such a s input va lidation D BC162 A compu ter is to b e lin ked to 8 te rmin als usi ng a sin gle co mmuni catio n lin k. data design Hub Ring All of the above B A C A D BC154 Which is part of installation testing: benchmark testing To mai ntain a b ackup cop y o f are w ritte n all the in fo rmation specifications matching To do a pa rticula r job s uc h as e diting.. (b). Packet Ring Bus 1100101 1010101 None of the above Retransmission Cyclic Redundancy Hash Count 4 64 None of the above B B C A A Port 327 Modem 141 Multiplexor 97 Acoustic coupler None of the above C B Da ta ma nag emen t syste ms seco nda ry stora ge cap acity 256 decimal form 5C4 16 bits All of them seco nda ry stora ge acce ss time None of the above alphanumeric form None of the above 32 bits B B A A B Bit Code Design 210 bits 1110 decimal form Numeric Keypad None of the above 210 bytes None of the above alphanumeric form None of the above D A A A A BC189 Which tool is used to help an organization build and use business intelligence? Data warehouse Data Mining tools BC190 BC191 BC192 BC193 BC194 Cache memory enhances What is the decimal value of the hexadecimal number FF? Numbers are stored and transmitted inside a computer in What is the hexadecimal value of the decimal number 1476? A byte corresponds to memory capacity 30 binary form 4C5 4 bits memory access time 255 ASCII code form 1B7 8 bits BC195 BC196 BC197 BC198 BC199 What does EBCDIC coding of numbers mean? A Kb corresponds to What is the binary sum of 01011 and 00101? Information is stored and transmitted inside a computer in Where would you find the letters QWERTY? Basic Coding Description Binary Coded Decimal 1024 bits 1000 bytes 10000 1112 binary form ASCII code form Mouse Keyboard BC200 A parity bit is use d to i ndi cate up perca se letters used to detect errors is the first bit in a byte is the last bit in a byte B BC201 BC202 BC203 BC204 BC205 How did the computer mouse get its name? Clock speed is measured in What are you most likely to use when playing a computer game? CPU performance may be measured in A digitising tablet can be used for? In pro cessin g che que s w hich o f the foll owi ng I/O te chn iqu es have b anks trad ition all y u sed Which of the following is a pointing device used for computer input? Beca use it sque aks whe n move d bits per second Touch screen BPS Printing letters Its moves like a mouse baud Light pen MIPS Tracing diagrams It has ears bytes Joystick MHz Reading bar codes None of the above Hertz None of the above VLSI None of the above D D C B B OCR Touch screen MICR Hard disk barcode scanning CD-ROM drive voice recognition None of the above B A BC206 BC207 B BC208 A UPS in crease d th e sto rage cap acity of a co mpute r increases the process speed syste m provides ba ckup powe r in the eve nt of a powe r none of the previous cut C BC209 BC210 What does a light pen contain? The capacity of a 3. ha nd-h eld d evice i s u sed to move the cu rsor to a sp ecific lo catio n on the scre en ? a keypad a mouse a frog a message pad B BC90 The memory address register is used to store data to be transfe rred to memory data that ha s b een transferre d from memory the a ddre ss of a me mory loca tion a n in stru cti on that ha s b een tran sfe rred from memory. BC157 Which of the following is recommended when many searches for data are required A se que ntial fil e on a di sk A sequential file on a tape A direc t acc ess file on a dis k A d irect access file on a tap e C BC158 Tap es can on ly be rea d It i s u nli kely that a mag netic tape co ntain in g severa l th ousa nd bl ocked re cord s ca n by the mach ine o n b e used on two mach ine s o f d iffe rent archi te ctu re dire ctl y b ecau se whi ch they are wri tte n Parity errors will result Inform ation for mats comm only v ary between arc hitec tur es Data re cord can ne ve r b e bl ocked to geth er C Binary Indexed B B C BC159 Which component of the CPU has the most influence on its cost versus performance Data path part Control Unit Address calculation part Input output channel A BC160 Wh ich of the foll owi ng terms app lie s to ne two rk u sed to con nect comp uters with o th er comp uters. Pul l th e pow er cord Turn the comp uter off at the Selec t the ‘Shut Down’ from th e back of the po wer po int. d ) ru n-to-run tota ls (a). yo u cann ot re memb er whe re you save d th em. da ta base Blocks and Sectors Files and Tracks Random Primary Storage Sche ma and sub schema Database. (c) (a). co nsists of th e fo llo win g ele ments: Ru les wri tte in p roced ural la ngu age information.. (d) detective controls (a). processing. b) de cisio n archi te ctu re. c) la bel ch ecks. d ) fuzzy log ic Black box testing and white box testing are part of: Wh at i s the te rm u sed to descri be the p oin t of intera cti on b etwee n a compu te r a nd a ny other en tity. applica tions. it i s the l ast re cord a nd summa rises the fi le. c) vide o. comp uter. the user should A serie s o f i nstruction s tel lin g th e compu ter how to pro cess data or file s is defin ed as a Algorithm Program Data B Compiler Parity Checking Artificial Intelligence Range checking Parity Checker Validation B B Network Program BC103 C ompu te r manu fa ctu res are n ow in sta lli ng software p rogra ms p erman en tl y in side the co mpu te r.? Hard disks can have a storage capacity in the region of. D BC148 Wh ich of the foll owi ng fall s u nde r mu ltime dia d ata: a ) text. alphanumeric form rep re sen te d 127 cha ra cters 32 bits A A 230 bytes 1024 bytes a 32 -bit bus or 32bit registe rs D BC54 BC55 BC56 BC57 were 7 bits 8 bits 4 bits 8 bits Mor e than 1 000 m ega 1000 kilobytes bytes C A B D A BC62 A gigabyte represents BC63 A 32-bit processor has 32 registers used to detect errors RAM baud is the first bit in a byte DRAM bytes is the last bit in a byte CROM Hertz B A D memory access time seco nda ry stora ge cap acity seco nda ry stora ge acce ss time B ha ve medi um clock spe eds Variables us e var ia ble s ize ins tr uc tions Logic Bus D A Co mputer is imp rop erly shu t Da ta i s n ot sa ved be fore Power is switched off All of the above do wn comp uter is shut dow n a parallel interface a serial interface printer interface a modem interface line printer dot matrix printer ink-jet printer laser printer. d) a udi o (a) to (d) (b).

me mory. performance their ratio microprocessors output inp ut. bu s CPU.it is called __________ .store. multitasking Vishwajeet multitasking an operating system Seco nd . mon itor.______and _______ _________ are used in large organizations for large scale jobs _______ is responsible for feeding data into the computer spa ce occup ied . Asynchronous transfer mode is a __________ technology. cost pe rfo rmance ra ti os ARPANET None of the above. BC279 The __________ protocol is a network protocol to be built for the World Wide Web . The co mpu te r w hich ca n recei ve data from othe r co mpute rs o n th e netwo rk a nd p rint it i s _ __ ___ _ The hardware and the software requirements together form the_____ BC281 BC282 disk defragmentation none of the above Area transfer mode disk mirroring D None of the above. ke yboa rd a nd the n ecessa ry h ardw are to commu nica te w ith th e host. _______is/are a popular front end tool When LAN connected together . _____ is a collection of related fields _____ language consists of strings of binary numbers _ ___ __ symb ol is use d to re prese nt proce sses like a ssign ing a va lue to a vari abl e o r a ddi ng a n umbe r _______ is an example for micro computer _________capability supports concurrent users doing different tasks terminator symbol PC-at multiprocessing processed symbol hp vectra system multithreading connector symbol fazitsu vp200 series multiplexing input/output symbol B IBM-PC B none of the above D BC45 The ___ ___ d o not ha ve proce ssing p owe r o f thei r o wn an d ha s o nly a scree n.. performance their ratio Internet microprocessors output inp ut. Ethernet visual basic MAN Integra te d Symbol ic Dig ital ne tw orks. _________ are used in large organizations for large scale jobs _______ is responsible for feeding data into the computer spa ce occup ied . the termi nal s a re referred as__ ___ ___ ___ __ __ "dumb terminals" dumb servers dummy terminals dummy servers A BC258 BC259 A______is nothing but a PC with a network operating system _____system is responsible for handling the screen and user I/O processing wan host distributed computing system windows NT server back end LAN front end D D BC260 The______ handles data processing and disk access in a Client/Server architecture host server front end C back end BC261 Both the DBMS and the application resides on the same component in a ____system PC LAN distributed computing centralized A BC262 BC263 Wh en al l th e pro cessin g is don e by th e main frame itsel f. C BC8 The __________ protocol is a network protocol to be built for the World Wide Web . B Area transfer mode .w hil e th e user ca n contin ue h is que ry p rocess as usu al in th e fo regro und . PCs mainframes feed write C B D A multiplexing converter ram non-impact desk top printe rs multitasking process output D D D thermal printers C BC22 BC23 BC24 BC25 LAN WAN and MAN B Intranet A None of the above. Web ba sed Tra nsactio n Repeaters program number and alpha BC286 BC287 BC288 BC289 Expansion of WBT is ______________ _________ connects LANs. For thi s re ason . pri ce._____. none of the previous Arjun A A C BC229 Multiprogramming is a prerequisite for BC230 BC231 BC232 UNIVAC Computer belongs to the Timesharing is the same as Name the first Indian Super Computer? multitasking Fir st . C File server platform Printer server configuration Receiver package BC278 SMTP stands for __________ . system B A BC10 BC11 application software windows 95 D D D C D B C B C BC12 BC13 ATM. Syste m modu latio n transfer pro to col Software Ma il transmi ssion pro to col Simple Ma il transfe r protoc ol None of the above. Web ba sed Tra nsactio n Repeaters program number and alpha C A B D A _______ is the capability of the o/s to run numerous applications simultaneously _______ involves conversion of raw data into some meaningful information _______ is responsible for obtaining the processed data from the computer multiprocessing interpreter input multithreading compiler processor _______ printers use light to produce the dots needed to form pages of characters impact printers drum printers BC26 Hardware components in a computer are _____. This situa ti on is refe rred to as __ __ __ multiprocessing file management system hierarchical database system multithreading rela tional data ba se network database system sys tem D multiplexing B BC266 The process of data being automatically written to a duplicate database is called______ repairing redo logging BC267 Modem stands for __________ .Matrix Printer decrypting it What does acronym VIRUS stands for Very i mpo rta nt re ade r use r se que nce Vital infor mation re sour ce Virtual i nforma ti on under s ie ge rea der & user system None of above BC238 C none of the previous C Im age Sca nni ng Tech nol ogy B none of the previous Thermal Printer transmitting it C A C B BC239 An impact printer creates characters by using. __________ is designed telephone system BC285 Expansion of ISDN is ________ MAN and WAN LAN and WAN ISDN ATM Interna l Service s D igi ta l Interna l Service s D esig n Ne two rk Ne tw ork LAN and MAN Internet Inte gr ated Serv ic es Digita l Ne twork LAN WAN and MAN Intranet B A None of the above. Collection of instruction is called a _____ Combination of alphabetic and numeric data is called _____ data Web based Training Bridges procedure alpha numeric Web based Technology Routers batch alpha beta Web based Transport Protocol command numerous alpha BC290 BC291 BC292 Computers can be classified based on ______. Internet power builder WAN Inte gr ated Serv ic es Digita l networ k._____. For thi s re ason .______ op eratin g syste m. ke rnel . system B A BC283 BC284 ATM. no . input. no .it is called __________ .____. Tra nsfer con tro l pro to col/Interne t pro to col Cells Syste m modu latio n transfer pro to col Tra nsfer commu nica ti on pro to col/Interne t p rotocol Bits Software Ma il transmi ssion pro to col Tr ansmiss ion c ontrol protoc ol/Inter ne t protoc ol Packets Simple Ma il transfe r protoc ol None of the above. C C None of the above. Mu ltipl e chan ge s to the same re cord or a fie ld are p reven te d by th e DBMS thro ugh __ ___ _ _________allows an application to multitask within itself LAN stands for __________ . input. Integra te d syste m dyn amic ne tw orks. size. performance.______and _______ _____________ is the Worlds largest computer network . None of the above. mon itor.ge nera ti on comp uters. she ll asse mble r. Code/De-code Modulation/Demodulation Module/De-module None of the above B fixes multiprocessing Linear area networks task Cells locks multithreading Local area networks process Bits constraints multiplexing Local array of networks. C Transfer Protocol Aggre gate tran sfe r mod e Transmission protocol Asynchronous tra ns fer mode Hyper text None of the above. Aggre gate tran sfe r mod e Asynchronous tra ns fer mode None of the above. con tro l prog ram. thread Packets traps none of the above None of the above client-server None of the above. i nterp re ter.. assembler Inte gr ated Serv ic es Digita l networ k. comp iler keyb oard . bu s CPU. Data is broken into small unit called __________ . bo otstra p. the termi nal s a re referred as__ ___ ___ ___ __ __ "dumb terminals" dumb servers dummy terminals BC46 BC47 A______is nothing but a PC with a network operating system _____system is responsible for handling the screen and user I/O processing wan host distributed computing system windows NT server back end dummy servers A LAN front end D D BC48 The______ handles data processing and disk access in a Client/Server architecture host server back end front end C BC49 Both the DBMS and the application resides on the same component in a ____system PC LAN distributed computing centralized A BC5 TCP/IP stands for _________ . comp iler keyb oard . The co mpu te r w hich ca n recei ve data from othe r co mpute rs o n th e netwo rk a nd p rint it i s _ __ ___ _ The hardware and the software requirements together form the_____ interpreter Integra te d Symbol ic Dig ital ne tw orks. pro gram. _____________ is the Worlds largest computer network . con tro l prog ram. th e typ e of proce ssing i s so metime s ca lle d as DBMS models can be grouped under____ categories Tra nsfer con tro l pro to col/Interne t pro to col Tra nsfer commu nica ti on pro to col/Interne t p rotocol Tr ansmiss ion c ontrol protoc ol/Inter ne t protoc ol None of the above. performance. New process of execution is referred to as______ Data is broken into small unit called __________ . Mu ltipl e chan ge s to the same re cord or a fie ld are p reven te d by th e DBMS thro ugh __ ___ _ _________allows an application to multitask within itself LAN stands for __________ . Transfer Protocol Transmission protocol Hyper text None of the above. me mory. bo otstra p. pro gram. B B B C C BC56 BC57 BC58 BC59 BC6 none of the above B BC7 SMTP stands for __________ . None of the above. none of the above none of the above B B B C B BC42 BC43 BC44 ______ software enables users to send and receive data to/from remote computers _______ is the temporary storage place for deleted files When LAN connected together . C server processing four host processing one dumb processing two data processing many B A BC50 BC51 BC52 ______is the most advantageous database system BC53 A new u ser ini ti ates a ne w proce ss o f exe cution a t the b ackgro und .jet Printer compressing it BC233 Disk fragmentation is caused by wear caused by overuse BC234 The te chno log y wh ich i s u sed to check an swer she ets of mu ltipl e-cho ice qu estion s i n civil se rvices or simi lar exa mina ti ons is: - Bar cod e Rea der Tech nol ogy Optica l Mar k Rea de r Te chnology BC235 BC236 BC237 A compiler is Which printer among the following is fastest “Zipping” a file means a fast interpreter Drum Printer encrypting it slower than an interpreter Dot .BC227 Multiprogramming refers to having se vera l progr ams in R AM a t the sam e tim e writin g prog rams in mul ti ple l ang uag es none of the previous A BC228 Multitasking refers to ha ving se ve ral pro grams in R AM a t the The a bility to run 2 or more writin g prog rams in same time progr ams c oncurr ently mul ti ple l ang uag es none of the previous B none of the above Fi fth . ke yboa rd a nd the n ecessa ry h ardw are to commu nica te w ith th e host. th e typ e of proce ssing i s so metime s ca lle d as DBMS models can be grouped under____ categories server processing four host processing one dumb processing two data processing many B A BC264 ______is the most advantageous database system BC265 A new u ser ini ti ates a ne w proce ss o f exe cution a t the b ackgro und . __________ is designed telephone system BC14 Expansion of ISDN is ________ MAN and WAN LAN and WAN ISDN ATM Interna l Service s D igi ta l Interna l Service s D esig n Ne two rk Ne tw ork LAN and MAN Internet Inte gr ated Serv ic es Digita l Ne twork BC15 BC16 BC17 BC18 Expansion of WBT is ______________ _________ connects LANs.______ op eratin g syste m.store. multiprogramming Deep Blue To r un more than one progr am at the sam e time Third .w hil e th e user ca n contin ue h is que ry p rocess as usu al in th e fo regro und .? Electrically charged ink Thermal Paper An ink pen An inked ribbon and print hea d D BC240 BC241 A client-server system is based on A nanosecond is A proce du ra l con tro l used to min imize the possi bil ity o f da ta o r p rogra m fi le d estruction th roug h ope rator error is the use of mainframe technology 10-6 sec LAN technology 10-3 sec WAN technology 10-12 sec Unix operating system 10-9 sec B D Limit checks Control figures External file labels Cross footing tests C _______ software enables users to send and receive data to/from remote computers A _____ is a running instance of an application Splitting of CPU's time for different tasks _______ prevents time slicing _ ___ __ co mputers are u sed in large orga niza ti ons for larg e scale j obs wh ich ha ve l arge stora ge cap acitie s _ ___ __ _ is respo nsib le for all ca lcu latio ns and l ogi cal op eratio ns that have to be p erforme d on the da ta ______ printer use laser light application project multiprocessing system model multithreading operating system pilot project multiplexing communication process multitasking D D D BC242 BC243 BC244 BC245 BC246 BC247 BC248 mainframes super computers micro computers none of the above A control unit band printer arithmetic and logic unit drum printer central processing unit non impact printer none of the above none of the above B C BC249 ______ software enhances the user to enter .____. manipulate and print any text data management word processing electronic spreadsheet none of the above B BC250 BC251 BC252 BC253 ______ software enables users to send and receive data to/from remote computers _______ is the temporary storage place for deleted files _____ is a collection of related fields _____ language consists of strings of binary numbers integrated software my computer field assembly language communication software recycle bin file machine language idea processor Microsoft exchange record high level language none of the above none of the above none of the above none of the above B B C B BC254 BC255 BC256 _ ___ __ symb ol is use d to re prese nt proce sses like a ssign ing a va lue to a vari abl e o r a ddi ng a n umbe r _______ is an example for micro computer _________capability supports concurrent users doing different tasks terminator symbol PC-at multiprocessing processed symbol hp vectra system multithreading connector symbol fazitsu vp200 series multiplexing input/output symbol IBM-PC none of the above B B D BC257 The ___ ___ d o not ha ve proce ssing p owe r o f thei r o wn an d ha s o nly a scree n. cost pe rfo rmance ra ti os PCs mainframes feed write C A B D A C D A BC293 BC294 BC295 _______ is the capability of the o/s to run numerous applications simultaneously _______ involves conversion of raw data into some meaningful information _______ is responsible for obtaining the processed data from the computer multiprocessing interpreter input multithreading compiler processor multiplexing converter ram multitasking process output BC296 _______ printers use light to produce the dots needed to form pages of characters impact printers drum printers non-impact desk top printe rs thermal printers BC297 Hardware components in a computer are _____. thread traps none of the above None of the above client-server B B B C BC272 BC273 BC274 BC275 ISDN stands for _______. ARPANET SQL * plus GAN None of the above. processor BC1 compiler Integra te d syste m dyn amic ne tw orks. C File server platform Printer server configuration Receiver package None of the above. all of the above None of the above. ke rnel . New process of execution is referred to as______ Code/De-code Modulation/Demodulation Module/De-module None of the above B BC268 BC269 BC270 BC271 fixes multiprocessing Linear area networks task locks multithreading Local area networks process constraints multiplexing Local array of networks. Collection of instruction is called a _____ Combination of alphabetic and numeric data is called _____ data Web based Training Bridges procedure alpha numeric Web based Technology Routers batch alpha beta Web based Transport Protocol command numerous alpha BC19 BC2 BC20 BC21 Computers can be classified based on ______. o utput. BC280 ATM stands for __________ . o utput.ge nera ti on comp uters. output D BC27 _______ software are programs that are complex and can be developed or purchased operating system application software windows 95 interpreter B BC28 BC29 BC3 _ ___ __ _ is a set o f spe cia l instructio ns used to comm uni cate effe cti vely wi th the co mpute r _______ converts a high level language into machine language _______is/are a popular front end tool batch processor visual basic protocols compiler power builder software's assembler SQL * plus procedures coder all of the above C B D BC30 _______ translates assembly language program into machine language instructions compiler interpreter assembler processor C BC31 BC32 BC33 _______ software enables users to send and receive data to/from remote computers A _____ is a running instance of an application Splitting of CPU's time for different tasks _______ prevents time slicing _ ___ __ co mputers are u sed in large orga niza ti ons for larg e scale j obs wh ich ha ve l arge stora ge cap acitie s _ ___ __ _ is respo nsib le for all ca lcu latio ns and l ogi cal op eratio ns that have to be p erforme d on the da ta ______ printer use laser light application project multiprocessing system model multithreading operating system pilot project multiplexing communication process multitasking D D D BC34 BC35 BC36 mainframes super computers micro computers none of the above A control unit band printer arithmetic and logic unit drum printer central processing unit non impact printer none of the above none of the above B C BC37 ______ software enhances the user to enter . This situa ti on is refe rred multiprocessing to as __ __ __ file management system hierarchical database system rela tional data ba se network database system sys tem D multithreading multiplexing BC54 The process of data being automatically written to a duplicate database is called______ repairing redo logging disk defragmentation disk mirroring D BC55 Modem stands for __________ . Wh en al l th e pro cessin g is don e by th e main frame itsel f. i nterp re ter. C B D B BC276 BC277 TCP/IP stands for _________ . output BC298 operating system interpreter BC299 BC300 _______ software are programs that are complex and can be developed or purchased _ ___ __ _ is a set o f spe cia l instructio ns used to comm uni cate effe cti vely wi th the co mpute r _______ converts a high level language into machine language batch processor protocols compiler software's assembler procedures coder BC301 _______ translates assembly language program into machine language instructions ISDN stands for _______. of users al low ed Ethernet mini computers input cost. pri ce. size. C BC9 ATM stands for __________ . Multi-user Param is due to bad disk block s Mag netic Ink Cha racter Re cogn ition Techno log y conver ts a pr ogra m to ma chine code Desk . of users al low ed mini computers input cost. B None of the above. Asynchronous transfer mode is a __________ technology. manipulate and print any text data management word processing electronic spreadsheet none of the above B BC38 BC39 BC4 BC40 BC41 integrated software my computer MAN field assembly language communication software recycle bin WAN file machine language idea processor Microsoft exchange GAN record high level language none of the above none of the above None of the above.gen eratio n comp uters. None of the above.gener ation computers . she ll asse mble r.

Assessing a system requires certain common tools.q_id q_desc OS 01 Which of the following computer software is designed to direct and assist the execution of application programs OS 127 OS 131 OS 132 Formatting a disk results in all the data being. known as: All ____________ have the option of blocking ports. they usually will write corrections to their code. Which of the following is NOT a tool used to assess a system? The ____________________ Web site has a utility that will tell you what software and operating system a Web server is running.? Which bus carries information between processors and peripherals? Which bus controls the sequencing of read/write operations? OS 139 OS 193 Which computers use single chip processors? CPU performance may be measured in OS 199 In processing cheques which of the following I/O techniques have banks traditionally used OS 215 Disk fragmentation OS 216 A compiler is OS 217 An interpreter is OS 219 “Zipping” a file means OS 233 An assembly language program is translated to machine code by OS 234 Which of the following is not part of the processor OS 236 OS 238 OS 271 OS 274 OS 275 OS 276 OS 277 If the Cancel Error Property of the CommonDialog Box is set to true then which of the following statement is true: __________ control defaults to displaying the files in the current directory: A ____________ occurs any time a program writes more information into the temporary space it has allocated in the memory. ... When software vendors discover flaws in their software.

which of the following would you always check? OS 281 At a minimum. which of the following should be implemented under the protection phase? OS 282 OS 283 Attacks on your system may be prevented or trapped through the use of: Setting restrictions as to the number of unique passwords to use before a user can recycle them is called a password: OS 284 Which of the following is NOT a step to take in securing a workstation? OS 286 To prevent a hacker from unauthorized access.OS 278 Which of the following is NOT a characteristic of a firewall? OS 280 Before shutting a service on an individual machine. what should you do with the administrator account? OS 287 OS 289 What should be done with old backup tapes and CDs? Which of the following is NOT an example of malware? OS 291 One step you can take to reduce the risk of being infected by a virus is to: OS 292 Which of the following is NOT a sign that a virus has infected your system? OS 293 Which of the following is the safest way to protect yourself from e-mail viruses? .

OS 295 ____________ gathers user information with the user’s knowledge.OS 294 A ____________ attack causes too much information to be placed into temporary memory space. OS 296 Which of the following is the most common function of spyware? OS 299 Which of the following is NOT a virus-scanning technique? OS 300 Which of the following would NOT be a way to protect your system from spyware? OS 309 For which of the following positions would it be advisable to conduct an extensive background check? OS 329 OS 355 Which of the following would you use to open an existing file? The ability to have multiple applications open at the same time is known as: OS 356 OS 357 Which of the following can be changed using the Options command? Which of the following leaves an application open but shrinks the window to a button on the Windows taskbar? OS 396 Which of the following actions would move a floating toolbar to dock it in a different place? .

but nothing else.OS 397 To display a missing or needed toolbar. click the: OS 399 Which of the following is NOT a true statement regarding password protection? OS 495 The Linux operating systems is an example of: OS 496 The Windows operating systems is: OS 497 Application service providers offer: OS 498 A(n) _________ offers on-demand software on an as-needed basis to its clients over the web. OS 502 _________ are systems used to interact with customers and run a business in real time. OS239 To destroy an object and free the memory space occupied by it. OS 504 OS 505 The most common cause(s) of disaster is (are): A _______ backup site is backup facility consisting of an empty warehouse with all necessary connections for power and communication. the keyword used is: .

co om m om m C code correct. hubs upgrades.netcraft.c www.WhoIs.op1 op2 op3 Database management system Application Software Deleted from the disk Data bus Data bus Personal computers BPS Utility Programs Copied from the disk Auto bus Address bus Parallel computers MIPS OCR is caused by wear MICR caused by overuse a fast interpreter converts a slower than program to none of the an interpreter assembly code previous faster than a compiler encrypting it Operating system Saved to the disk Address bus Control bus Super computers MHz barcode scanning is due to bad disk blocks op4 ans C None of above A None of above A None of above C None of above VLSI voice recognition none of the previous A B B B B translates and executes programs converts a statement by program to none of the statement machine code previous B compressing decrypting it transmitting it C it an assembler a compiler an interpreter a linker the power None of the cord above the ALU the CU A runtime error can result if the user clicks the cancel button File List Box memory overflow The program executes A compile time without any error occurs error Dir List Box Drive List Box systems overload RAM overflow You need to carry out conditional compilation Combo Box buffer overflow A C A A D Netcop NetBrute Netcraft NetBIOS D www.netstat. firewalls patches.c www. scanners B A .co www.nettools. switches updates.

sites. history. D Delete it and change the Delete it from built-in guest the system and account to a use the guest power user account. Disable it and create a nondescript user account with administrator rights. Create another administrator account to confuse the hacker. C IP spoofing Spyware C place a router between your ISP and your system. Install and keep current antivirus and anti-spyware programs. It is a barrier between your One of its network and techniques is the rest of the packet filtering. Block all incoming traffic on a network. hone your programming skills. antivirus software. and CDs should be kept forever. System acts abnormal Update antivirus software. D . sent it. Limit user’s ability to configure the workstation. Never open an e-mail attachment Turn off the unless you auto-launch in know what it your e-mail is and who client. A cycle.It can consist of hardware. It hides your network. software. Internet. or both. a proxy filtering system. D Make sure all update and security patches are applied. C Files are missing Printing problems Problems with your wireless mouse D Do not propagate hoax viruses. Virus Tapes should be melted and Give them to a CDs broken. age. download files from add spyware to reliable Web your system. C Tapes can be used over and over. renewal. Trojan horse Tapes and CDs can be thrown away in the trash. recycle shop. account. B That you also shut down associated services B C That any open Dependencies That you are applications be on other not on the exited services Internet Antivirus software Intrusiondetection software Firewall Router an intrusiondetection system. a network prevention system.

cascading. C A A C . You cannot move a floating toolbar.virus Trojan horse spyware A virus A Trojan horse Spyware buffer overflow A buffer overflow D C Obtain system Check for IP addresses Obtain cookies open ports Obtain usernames and passwords D E-mail and attachment scanning Download scanning File scanning Backup file scanning D Use your browser’s security settings Do not open attachments in Avoid “skins” unknown eand “toolbars” mails download Use encryption software D Administrative assistant to the president Cook Junior accountant Network administrator D The Open The Standard The Formatting command on toolbar toolbar the Edit menu multitasking. tiling. Click on any corner and drag. whether the worksheet prints in the default file landscape or location of portrait new files orientation the number of windows you have open the margins on the printed DOCUMENT A shrinking multitasking minimizing cascading Click on any border and drag. Click on the title bar and drag. The Save command on the File menu minimizing.

D public domain software. nonprotective open source software. toolbar. hot cold empty dormant B Delete Kill Nothing New C utility software. choose the Customize command from the contextsensitive right mouse left mouse menu.right mouse button anywhere on the Word window. and check the box for the missing toolbar from the Toolbars tab dialog box. choose the Customize command from the contextsensitive menu. sensitive. nonprotective open source software. Structured Office query systems automation All of the floods. tab dialog box. B application service provider D A D . utility computing. protective open source software. and button on any button on any check the box visible toolbar. visible toolbar. on-demand software. Passwords can be up to only seven characters long. Informational systems hardware failures. A proprietary software C proprietary software. B All documents are automatically saved with a The password default is casepassword. best-cost provider software provider Web service provider Operational systems power outages. above. for the missing and click on and click on toolbar from the missing the missing the Toolbars toolbar. public domain software. Once a document is protected by a password. on-demand computing. left mouse button anywhere on the Word window. it cannot be opened without that password. protective open source software.

control. Valid Signs Transacti Limit on type Check DA17 --------------. To import data from Access to Excel . it is ensured that the data in combination with other fields are reasonable as per standard set by an organisation. Limit False False Sequenc e Range Excel Access DA14 'Set mapping' Check control that follows a text-type validation. the data may not be in proper sequence but should be within a predetermined range True In ---------------.function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in a table HLOOKU VLOOKU P P A or B DA18 Most of the tools use in Data Analysis depends on DDE DA13 OLE Both ODBC . to ensure that the data has been provided is for the correct audit period True In Range Check .Check data entry follow a particular sequence and also a predetermined range. Exception testing can be used to identify ----------------items DA9 Data validity test represents DA5 DA6 DA7 DA10 DA11 DA12 op2 Record op3 Both Vertical A or B Combined Value Gaps Filter Merge RAND() VLOOKU HLOOKU P() P() TRUE FALSE TRUE FALSE Unusual Strange A or B exception comparis duplicates testing on of data testing Year end ledger.function searches for a value in the leftmost column of a table and then returns a value in the same row from a column that we specify in the table. inventory files or transaction files can be tested for cut-off .application for data analysis.analysis We use Hash Total to identify -----------. Excel can import data from other databases for the data analysis.within a series where there is a definite relation between items Analyse fields by arranging them into rows and columns is called Field Horizonta l Duplicate Value Cross Tabulate DA8 --------------------.q_id DA1 DA2 DA3 DA4 q_desc op1 Sequence Check is a --------------. we use ----------------.level control check.it is not possible to link between Access and Excel sheet The GAP detection options can be used to test for completeness of data. Analyse data over two or more periods is called ----------------------. True False DA15 A System Auditor can uses CAAT tools to analyze data False True DA16 In the case of the ---------.

op4 None of the above None of the Above All of the above None of the above ans A A C A None of the above B A A None of the above C All of the above D A A Both B & C B None of the above B A B Reasona bleness D None of the above B All of the above C .

a document consists of_____ section 1 WO17 The dialog box that is used to determine the documents margins is page setup from the file WO18 ________ is a box surrounding a page on all slides or a line that sets off a paragraph on one or more slides border WO19 The key that is used to perform a task to select all t he text in the documents is ctrl+a WO20 WO21 WO22 The key that is used to indent a paragraph is ctrl+a The key that is used to change the font from the current positioned in a document CTRL+SHIFT+F is The key that is used to change the style of the document that is from that normal ctrl+shift+f to heading1 or heading1 to other document styles. WO23 ______ is the default view in Word used for typing Editing and Formatting the Text NORMAL WO24 The short-cut-key that is used to indent a paragraph spacing in the documents is ctrl+m WO25 The short-cut-key that is used to paste the selected text ctrl+v or ins . _____and_____ are improved layout in Word 2000 printlayout WO6 The easiest way to create a document in word is wizard WO7 In Office2000 environment the tool that makes work easier for us is_____ office assistant WO8 A short description of a tool bar button called the ______ is displayed when the mouse pointer is allowed to stay for a second on the button Screen Tip WO9 The _____ helps us to keep track of the margin of the page tab stop WO10 The keys that are used to navigate between headers and footers are up arrow keys only WO11 Pick out the element from the following that dose not form the type of tabs for the Word 2000 left WO12 _______are blueprints or patterns for documents of a certain type template WO13 The______ is used for quickly setting paragraph indention using the mouse increase indent WO14 Word art is text with special effect WO15 AutoShapes in word can be created by accessing the _____ drawing toolbar WO16 By default.q_id WO1 WO2 WO3 WO4 WO5 q_desc op1 _______ is a word processing that is a member of the office 2000 family Word 2000 The feature that enables user to type anywhere in a document without pressing or click-n-type tab The______ feature allows the user to copy and paste upto 12 items at the same office clipboard time in an application ______ and _____ key combination will extend the selection by one character on shift+end and the left and right shift+home web layout.

circles. When word is opened a new document called_____ is displayed. The object that helps us analyzing data statistically is known as To highlight certain parts of a page to set it apart from the rest of the page we make use of the following features Header and Footer Chart To clear all the tabs in a document the option that is clicked from the tabs dialog clear The dialog box that is used to incorporate picture bullets into our documents or web pages is The object that composes of set of tools which helps to create and work on different shapes like rectangles. page number etc. flowcharts etc.WO26 The short-cut-key that is used for paragraph spacing(1. name of the chapter.5) ctrl+2 The box that separate text from the document and allows it to behave like an independent object is known as The object that is used to provide information like the title of the book. where the user starts typing the content right way picture bullets dialog box WO35 ______ is an online dictionary maintained by word to obtain synonyms for words thesaurus WO36 The thesaurus is invoked by pressing_______ shift+f7 WO37 When a new table is created the insertion point flashes in the _____ first WO38 By pressing the _____ key inserts a blank row after the last row in the table tab WO39 The ______ option enables us to convert text into a table format convert text to table WO40 A table consists of ______ that contain text or graphics row WO27 WO28 WO29 WO30 WO31 WO32 WO33 WO34 WO41 WO42 WO43 WO44 WO45 The _______ option in word allows the user to automatically correct misspell words as and when they are typed ______ is a facility that enables recording and replaying of a sequence of keystroke In Word Macros are written in _____ In Word 2000 the macro dialog box is activated with the help of ____ key combination ________shows how a document would look like when published on the web or on an intranet Text Box Borders charts doc1 AutoCorrect Mail Merging basic shift+f8 web layout view WO46 ______ is a software for sending and receiving e-mail messages email client WO47 ________is the coding system used to create web pages The network that makes information easily accessible across various networks is _______ html WO48 internet .

WO49 WO50 WO51 Which of the following statements are false with reference to the use of a header row source for a mail merge field name must be listed in the same order as the corresponding information in the data source it is not possible to change the With reference TO TABLE WHICH OF THE FOLLOWING STATEMENT ARE false height of only selected rows of a table The alignment available for tabs does not include left WO52 Which of the following statements related to a Section Break are True A new section is created in order to change properties like number of columns WO53 The user can set a spelling checker to skip the marked part of the next New option under the file menu of word creates a new blank document that is based on the normal templates The user can split the screen only into two parts The features that enables the user to type text graphics tables anywhere in the document without pressing enter or tab The user can modify the picture from the clip art WO54 WO55 WO56 WO57 true true true drag & drop true WO58 With reference to auto correct which of the following statements are false automatically corrects common typing. spelling errors WO59 With the reference to password protected documents which of the following statements are false password can not include spaces WO60 The alignment available for tabs does not include left .

What printer command should he select? What process should be used to recall a document saved previously? Which is used to indent text within a document? Desktop publishing is a more sophisticated form of which of the following types of software? What is a Word Processor used for? What is a picture that is saved on a diskette and can be pasted into a document? What is a Word Processor used for? Print all Enter closing database To analyse figures subscript To analyse figures ." In which word processing utility could she find a synonym for "beautiful"? grammar checker WO73 WO74 WO75 WO76 WO77 WO78 WO79 WO80 send a public message to Using an electronic bulletin board. what is the best way to get the cursor to the next line? press the return key WO70 How are data organized in a spreadsheet? layers and planes WO71 Which key moves the cursor to the beginning of the next line of text? tab WO72 Veena typed the following sentence: "The girl was very beautiful. When the cursor gets to the end of a line.ppt file can not not be inserted at specified position in the current document WO62 WO63 Drop Cap tool does not work for the contents in the table format The user can split the screen only into two parts in MS-Word true true WO64 The special symbols that are inserted using "insert symbol" option of the word can not be printed by the printer as they are not standard keyboard symbols true WO65 The "format columns" option allows to create columnar text up 12 columns only. but only wants to print the first two pages. such as multipart report or a book consisting of chapters The view that enables us to view how objects will be positioned on the page when it is printed The mode that is initialized or toggled to if the user is in a position to overwrite the text in the word Master Document Print Layout View WO66 WO67 WO68 Insert Mode WO69 Veena is entering a paragraph in a word processing program. true The document that makes the user to organize and maintain a long document.WO61 Which of the following statements are False a . Seema can do all of the following except which friends one? interested in one topic Aryan has created a ten-page story.

WO89 While word processing. while still keeping the paragraph in the first document? Copy.WO81 What basic tools would you find in the Edit menu of a word processor Clear. but cannot see any columns on the screen. What is the most likely cause? You are not in Print Layout view. replace and select WO82 What is a header in a document? Text at the bottom of every page WO83 What hardware is essential for a word? Mouse. and ½-inch spacing between columns. then paste . Which type size is the most reasonable for the text in the columns? Given the default left and right margins. printer and processing system keyboard? WO84 The user could take a picture from a magazine and insert it into the document by using a Browser WO85 What basic tools would you find in the Edit Clear. in which of the following situations would Tom use the "Copy" command? to store a file on the hard drive WO90 What does a document contain? Data about a set of similar things WO91 Before submitting your work you want to find any words spelt incorrectly. WO88 Assume you have made all appropriate selections in the Columns dialog box in Word. replace and Toolbars WO86 WO87 Assume you are creating a two-column newsletter. the only sound that could be heard was the owl that had ade its home in the nest outs Paste WO93 What edit commands would you use to insert a paragraph from one document into another document. the width of each column in a two-column document will be: 6 point 2½ inches. and also the word ‘he’ to ‘she’ in the given phrase? “On a cold and still night. Which of the following would you use? Thesaurus WO92 What command in a word-processing program can be used to change the word ‘him’ to ‘her’.

how can you tell dates and times which is the most recent version? each file was saved. Which of the following would you use to do this? Dictionary WO100 Word displays a list of the When opening and working with multiple versions of a document. WO98 What happens when you open a document that has been saved using the Versions command? All versions are opened automatically. Which of the following types of fields CANNOT be inserted into a form? Fields Check boxes .WO94 To give the original author a chance to accept Which of the following statements would NOT be a reason for showing suggested suggested revisions in a Word document without changing the original document? changes from the person who entered the revisions Which statement is NOT true regarding revisions made in a Word document? A line appears through text that is to be deleted. WO95 WO96 WO101 WO102 Various fields are added to a regular document to create a special document called a form through the ____________ toolbar. How are suggested changes entered for review on an initial Word document? Through the Edit menu by choosing Track Changes command WO97 Which of the following is TRUE about saving a document using the Versions command? The Versions command will allow you to save multiple versions of a document. including any changes that may have been made to that document. You would like to find another word of similar meaning to use instead of ‘discover’. WO99 You have used the word ‘discover’ four times in an English essay you have created using a word processing program.

The rest of the newsletter has two columns. WO112 A pull quote is best emphasized by: setting it in larger type or font size.WO103 Which of the following is TRUE related to editing comments in a Word document? Comments cannot be edited. WO104 What is a header in a document? Text at the bottom of every page WO106 In your English essay you notice that the paragraph at the bottom of page 1 continues on to page 2. WO114 Pertaining to newsletters. One . Insert WO111 A reverse in a newsletter is: a section of white text on a black background. how many points are there to the inch? Assume you are working on a newsletter in which the masthead extends across the top of the entire first page. WO108 Which of the following tools will copy the formatting of selected text to other places? Copy button WO109 What is the name of the process of determining the cause of errors in a macro? Fault Finding WO110 Drop caps are added to a Word document using the ___________ menu. What is the minimum number of sections in the newsletter? 6 WO105 WO115 WO116 Press tab. WO113 Which of the following definitions is CORRECT? The reverse technique means to add dark text on a light background. You would like to make this paragraph start on page 2. which of the following cannot be changed using the Columns command dialog box? The width of each column As related to type size. it is helpful to include the file name on each page as a header/footer.What would be the best way to do this? Tables in a document help you to easily arrange all of the following EXCEPT: WO107 To identify a document. text.

and section breaks? Press Ctrl+Enter to create a page break.WO117 Which of the following is NOT correct with respect to page. WO118 Which of the following would be the most appropriate font for a newsletter headline? A serif font at 10 points WO119 Which of the following is the default Word column width? 2 inches . column.

MSWord from the task menu none of the above A inbox assistant document assistant none of the above A Tool Tip Icon Tip Document Tip A marginal stop ruler page up keys only home and end keys only none of the above up and down arrow center decimal rotation model dialogs/alerts decrease indent both A and B control tool box design wizard none of the above none of the above pictures control box database forms A 2 printer setup from the file menu 0 11 A print preview from the file none of the above A shading style box none of the above A Del ctrl+f ctrl+m A Del ctrl+f ctrl+m D CTRL+O op4 Back Office none of the above none of the above none of the above none of the above CTRL+SHIFT+S CTRL+SHIFT+P ans A A A B A B D D B C A A ctrl+o ctrl+shift+s ctrl+shift+p C ONLINE LAYOUT PAGELAYOUT ONLINE DOCUMENT A ctrl+2 ctrl+end ctrl+home B ctrl+c or ins ctrl+x or ins ctrl+v or Del A .op2 Office 2000 op3 Office 97 double click drag & drop cut select shift+left and shift+right normal layout. page layout templates click from start program. web layout ctr+end and ctr+home web layout.

ctrl+5 ctrl+1 none of the above B Frame AutoShape Border A Screen Tips Page Layout WordArt Auto Shapes none of the above File Shading WordArt Bullets D remove all remove clear all D arrow bullet dialog box circle bullet dialog box none dialog box A WordArt AutoShapes files C default document none of t he hyphenation mail merge above tools+spelling thesaurus menu shift+f8 menu last cell of the t second first row able none of the end enter above convert data to table auto format none of the table option above rows & none of the records columns above none of the AutoFormat style gallery above none of the Macro Data Source above visual basic vj++ visual FoxPro document1 new document A A B A A A A A B A B B shift+f7 alt+f8 alt+f5 A online layout view browser none of the above A hotmail A xml micro soft outlook sgml vb script A intranet arpanet LAN A outlook express .

field names in the header source must match any merge fields you've inserted in the main document the number of fields names in the header source must be the same as the number of data fields in the data source B auto format by default cell option applies to height and the entire table weight option and not only to applies to all the the selected rows and rows or columns columns of a of a table table delete cells option allows to delete the entire row or a column or shift cells up or shifts cells left C top A the field separators in a header source and the data source can not be set as paragraph decimal justified In order to type a If a header is A section is a header from the inserted in the portion of a third page of the second section document in document a then the same which certain section break is header is page formatting inserted after t applicable to the option can be he third page first section set D false A false A false click -n-type A Double Click none of the above false B A prohibits the user from renaming an auto correct entry automatically corrects the grammatically errors with t he caps lock key accidentally turned on reverses the case of the letters that were capitalized incorrectly and then turns off the caps lock password protected document can be opened without password as read only password are not case sensitive password can be upto 15 B characters long justified hanging top B A .

xls data can not be inserted at specified position in the current document B false false A A false B false A Child Document Hyperlink Document Page Layout Outline Layout Type Over mode Remove press the tab key press the escape key lines and spaces height and width none of the above none of the above none of the above A B A just keep typing D rows and columns D enter/return backspace/ delete shift B spell checker thesaurus outliner C send pictures to a friend send private messages to a friend send a package to a friend D Page setup Print preview B Retrieve spacing word processing Save sorting C B spreadsheet C From ___ To ____ Copy tabbing graphing Creating and editing documents Storing information None of the above B annotation clip art clipboard C Creating and editing documents Storing information Making Calculations B .a document file can be inserted in the current document at specified position a multiple documents files can be inserted in the single document an .

Mouse. then paste Delete.Spelling. keyboard and mouse None of the above B clip-art file microphone digital scanner D Spelling. Font. copy. grammar and autocorrect Cut. you will see them only when you print the document. monitor and printer Monitor. Word cannot display columns during editing. impossible to determine. Bullet and C Numbering Mainly text A set of different graphics None of the above B Spell Checker Grammar Checker Find and Replace B Replace Select all AutoCorrect B Cut. grammar and autocorrect Cut.. then paste A . then paste Insert. copy. Paragraph. paste and clear Numbers which appear on every page Text which appear at the top of every page Designated area on the document C Keyboard. B You have not specified continuous section breaks. paste and clear None of the above C 10 point 15 point 25 point B 2¾ inches. 3 inches. A to move a section of text to store a file on from the original a diskette location to another location to leave an original section of text in place while pasting a copy elsewhere D You have not inserted a column section break.

The first and second versions are opened automatically. document including any without any changes that changes that may have been were just made made to that to the document. The previous version is opened automatically.To give the To complicate original author a the revision To allow multiple chance to reject process and to people to work suggested force the on one changes from author to spend document in the person who more time collaboration entered the making with one another revisions corrections C A vertical line outside the left A red underline margin signifies appears beneath a change has text that is to be been made at added. list. D Through the Both through Tools menu by Through tools on the Tools menu choosing Track the Reviewing and the Changes toolbar Reviewing command toolbar D The Versions The Versions command will command will allow you to allow you to save only one save only one version of a version of a document. A Tools Forms Insert C Toggle button Text fields A drop-down list B . The Versions command will allow you to save only two versions of a document: one version of the original and one version of any changes made to the document. version. A The latest version is opened automatically. that point in the document. Comments are enclosed in a text box at the right of the document. document. B Grammar check Spell check Thesaurus A The most recent Word will show Word is not able version will the name of the to tell the most appear at the person who recent version of bottom of the saved each a document.

The height of each column The number of columns 10 12 The tab spacing within each column 72 Two Three Four D D D B . D graphics. A underlining the text of the pull quote. macro. the rest are go. A typing it all in capital letters. have a capital newsletter or letter. text. A Paste button Format Painter This action is not C button possible. other document. C bibliography. Comments can Comments can be edited or be edited or deleted by right deleted by left clicking the clicking the highlighted highlighted text. changing the color. forms. uppercase. Insert page break. Copy and paste. A grid is a set of horizontal A dropped cap is and vertical A pull quote is a a word that lines that quotation taken starts with a determine the from (pulled) lowercase letter placement of from another when it should elements in a document. C Numbers which appear on every page Text which appear at the top of every page None of the above C Press Return.Comments cannot be deleted. numbers. Bug Squashing Error Injecting Debugging D Tools Format Edit C a section of text the guidelines where the first used to establish an enlarged letter of each where different capital letter at sentence is elements of the the beginning of lowercase and newsletter will a paragraph. find/search.

Press Shift+Enter to force a line break. column break.Press Press Enter to Ctrl+Shift+Enter create a section to create a break. D 3½ inches 4 inches . C A sans serif font A serif font at 20 at 10 points points A sans serif font at 45 points D It depends on the left and right margins. and how many columns are specified.

the dates that are stored as sequential numbers known as ________________- serial values EX5 The command to display the current date in a cell is _________________ =today() EX6 EX7 EX8 EX9 In excel. summarize the data and evaluate the data using changing points of view is known as bordering all option 1 data table EX23 The wizard that is used to suggest hints for doing a task pivot table wizard EX24 In a chart Y-axis is known as_________ series or rank .q_id q_desc op1 EX1 The wizard that is used to import text files is_________________ text import wizard EX2 The alphabet indicating the column followed by the row number is known an__________ cell reference EX3 Which of the following files could not be opened in excel _______________ text files EX4 In excel. absolute references are represented by a ________ before the column and row addresses The ________ can be used to select the function and assemble the arguments correctly Specific parts of information required by functions to perform certain tasks are called as___________ Which of the following do not belong to the formula category in excel environment__________ dollar sign AutoSum variables text EX10 The function that in used to join cell values together in a single cell ________ concatenate EX11 The function that is used to count all the values that meet specific criteria _________ countif EX12 The wizard that is used to create and edit charts _______________ pivot table wizard EX13 EX14 EX15 EX16 The function that is used to calculate the payment for specific loan terms ____________ The function that is used to add together all values that meet specific criteria is known as ____________ The __________ option present in the file menu options is used to specify major facts of the page to be printed The command that is used to apply a format automatically __________ sumif average page setup autoformat EX18 The ____________ makes the information in a worksheet meaningful and easy to understand A particular part of a work sheet can be printed by setting the _________ page setup EX19 The process of finding or selecting information is known as ____________ filtering EX17 EX20 EX21 EX22 The option that is used to cancel the filter process for a specific column and display all the records is ________ There are _________ types of data tables The tables that allows the user to change or rearrange the data.

EX36 EX37 EX38 The stacked bar graphs can be represented in __________ EX39 A pie chart can represent only one data series at a time The ______ generates a summarized report in tabular form in an interactive manner EX40 line chart true and 3dimensions true Data table EX41 Which one of the following statements related to stock chart is NOT TRUE ? It is also called as high-lowclose chart EX42 The state government needs to finalize a five years plan to implement 100% literacy in the state.EX25 In a chart X-axis is known as_______________ series or rank EX26 _________ is a set of tables that describe each of the data series series or rank EX27 ________ is used to differentiate one data series from another series or rank EX28 EX29 The chart that contains only one data series is _________ The chart that holds the column chart is _________ column chart column chart EX30 The chart that display two or more data series on a surface is _________ column chart EX31 The chart that is used to display discrete data column chart EX32 _________ are not allowed in a macro name spaces EX33 Which of the following tool cannot be used to view the excel web page_______ excel97 EX34 The wizard that used to build an interactive table from data existing on sheets pivot table wizard EX35 The chart that is used for displaying stock market information In excel. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. is considered as an ________ criteria. Which one of the following will be the best tool that should be used to work out the plan ? Pivot table EX43 EX44 Forecast'99 is a group working on exit poll. Which one of the following will be the tool that will help the team ? Which one of the following will be the tool that provides a way to view and compare the results of all the different variations together on the worksheet ? Goal seek Goal seek EX45 A ___________ is an excel file where the user stores his data Workbook EX46 Spreadsheets are useful for _______________ Performing calculations. the subtotal command also generates grand total after the last group subtotal_________ In advanced filter . the criteria occupying multiple columns but more than one row. .

EX53 The state government needs to finalize a five years plan to implement 100% literacy in the state. EX59 The _________ wizard separates contents in a cell into different cells text import wizard EX60 A spreadsheet is a grid of rows and columns and is called as a ________ EX61 Pick out the window that is not a form of excel ___________ worksheet application window . Which one of the following will be the tool that will help the team ? Goal seek EX55 Which following function is used in subtotal option ?______________ Count. EX54 Forecast'99 is a group working on exit poll. EX56 A workbook consists of many ________ databases EX57 Which two of the following statements related to pivot table are TRUE ? It is a tool for summarizin g and analyzing the data records in an interactive manner. EX58 Which one of the following is NOT a What-if analysis tool ? Goal seek. It wants to know how many seat ABC party needs to won in totality to obtain majority to form the government. Which one of the following will be the best tool that should be used to work out the plan ? Pivot table.EX47 Which one of the following is NOT the component of the pivot table ? Column field EX48 EX49 Excel allows upto ______ levels of sorting Filtering rearranges a list to display the required records EX50 The stacked bar graphs can be represented in _____________ two true 3dimensions EX51 The ______ generates a summarised report in tabular form in an interactive manner Data table EX52 Which one of the following statements related to stacked bar chart is NOT TRUE ? It displays the data series one on top of the other.

the cell accepts your typing as its contents. ENTER EX71 The contents of cell C15 is =AVERAGE(C3:C14). EX72 All of the following are considered constants EXCEPT: 100 EX73 Which of the following may NOT be included in a formula? EX74 Which of the following is NOT a valid mathematical operator in Excel? Cell references ^ EX75 Given the formula =B5*B6+C3/D4^2.16.. This "What if" program is most likely which of the followin The difference between the highest and the lowest values. it means that _____. EX66 EX77 word processing Range Producing graphs .32 EX64 If a cell shows ####### . AVERAGE(C3:C14) is known as array. You select both cells and drag the fill handle down to A8. and A8 are _____.. The contents of cells A6.EX62 On an Excel sheet the active cell is indicated by… A dark wide border EX63 Cell A4 =2 and A5 = 4. which expression would be evaluated first? B5*B6 EX76 Which part of the formula +E12/6+(G7*SUM(H9:H11) is considered a constant? E12 How can you tell which cell in a worksheet is the active cell? It is surrounded by a heavy border. The use inputs different weights or amounts of exercise to determine the related physical fitness. your formula has a syntax error EX65 Which is not an advantage of using computerized spreadsheets? ability to generate tables EX67 The gym teacher has a new program to calculate physical fitness in terms of weight and exercise. A7. 8. EX68 Spreadsheets can be used for. EX69 To select a column the easiest method is to … double-click any cell in the column EX70 If you press _____.

EX90 In a copy operation. EX91 Which of the following commands is needed to duplicate the contents of a cell in another? The Duplicate command EX92 EX93 EX94 EX95 EX96 A cell reference that does not change during a copy operation is known as Which of the following is considered an absolute cell reference? Cell E3 contains the function =AVERAGE(A3:D3). what will be the contents of cell E4? Cell E3 contains the function =AVERAGE($A$3:$D$3). EX80 EX81 EX82 EX83 EX84 The command that will print an Excel workbook is found on the ____________ menu. Which of the following commands will automatically adjust cell references in formulas? Which of the following commands will remove cells. what will be the contents of cell E4? absolute B4 Which of the following commands is needed to transfer the contents of one cell range to another? The Move command #DIV/0! #DIV/0! . the cell(s) you are copying to is called the: paste range. or columns from a worksheet? File Preview Insert Clear EX85 Which of the following options is NOT controlled through the Page Setup command? Orientation (portrait or landscape) EX86 Which command enables you to change the margins for a printed worksheet? Options EX87 EX88 All commands are carried out on a rectangular groups of cells known as a: Which of the following is a valid cell range? worksheet. If the contents of cell E3 are copied to cell E4. the ___________ view shows the file size as well as the date and time a file was last modified. In the Save As and Open dialog boxes. 6 EX89 In a copy operation. rows. If the contents of cell E3 are copied to cell E4. the cell(s) you are copying from is called the: copy range.EX78 How can you change the active cell? By clicking in a different cell EX79 Which of the following would you use to change the font size of a cell in Excel? The Standard toolbar The command that will save the current workbook with a different file type is: the New command on the File menu.

EX99 .EX97 The F4 key is used to: copy and paste cells. EX104 The function key that is used to quickly edit the contents of a cell is: the F4 key. Excel stores the date as: text with a two-digit year. EX101 If you enter a date into a cell. EX105 What will be stored in a cell if 3/4 is entered in it? 03-Apr EX106 A user’s response to the InputBox function can be stored in: a cell on a worksheet. What will be displayed in cell E17 on August 31? Jul-30 EX103 The number of days between two cells containing dates can be calculated by: subtracting the earlier date from the later one. EX100 Conditional formatting applies formatting to a cell based on: whether the cell has a formula or a value in it. EX98 Which of the following quickly copies the formatting of a selected cell to other cells? the Fill Handle Which of the following will insert a hyperlink into an Excel worksheet? Select the Insert Hyperlink command from the File menu. You opened that worksheet again on August 31. EX102 You created a worksheet on July 30 and entered the =Today() function in cell E17.

EX107
EX108
EX109

The cell reference for a range of cells that starts in cell B1 and goes over to
column G and down to row 10 is _____.
The teacher has a spreadsheet showing all Year 10 students and their marks in
one Mathematics test. To find the student with the highest mark, which of the
following functions should be used?
Which chart type best shows proportions of a whole?

B1-G10
AVERAGE
Combination

EX110

Which of the following is TRUE regarding chart types?

Once a bar
chart is
chosen it
cannot be
changed to a
column chart.

EX111

To select several cells or ranges that are not touching each other, you would
_____ while selecting.

hold down
the CTRL
key

EX112

Your Institute teachers have set an assignment on ‘Studies’. You are required to
use a spreadsheet to record all that you study on each day for four weeks. You
decide to show each week’s data with an accompanying graph. What is the best
way of doing this

Use tables

EX113
EX114

What would be the best method to quickly copy the formula from the active cell to
each cell below it?
To arrange rows in alphabetical order based on column A, you need to use the
command _____.

Paste
Tools | Sort

EX115

What can you NOT do with a spreadsheet?

Analyse data

EX116

To print just part of a sheet, you would select what you want to print and _____ .

click the Print
button

EX117

Spreadsheets can be used for...

producing
graphs

EX118

The formula that will add the value of cell D4 to the value of C2 and then multiply
by the value in B2 is _____.

(D4+C2)*B2

EX119

Which of the functions is not valid for performing addition

0

EX120

The default orientation for the printed page is _____.

portrait

EX121

Which is not a valid cell address?

AD213

op2
convert text to
columns
wizard
row reference
Lotus 1-2-3

op3

op4

ans

tip wizard

function
wizard

A

none of the
above

A

class files

D

column
reference
quattropro or
xbase files

domain
values

range values

reference
values
none of the
above
none of the
above
none of the
above
none of the
above

=date()

=currentdate(
)

' = ' sign

# sign

AutoFill

function
wizard

arguments

parameters

logical

numeric

Boolean

D

pmt

merge

none of the
above

A

vlookup

pmt

count

A

chart wizard

convert text
to columns
wizard

tip wizard

B

pmt

countif

none of the
above

B

sum

sumif

countif

C

print area

print

none of the
above

A

AutoFill

none of the
above

formatting

shading

print area

print

searching

sorting

blanks

all blanks

none

A

2

3

4

B

filtered table

index table

pivot table

D

chart wizard

convert text
to columns
wizard

tip wizard

D

category

legend

data marker

A

D
A
A
C
B

A
none of the
above
print preview
none of the
above

B
B
A

category

legend

data marker

B

category

legend

data marker

C

category

legend

data marker

D

bar chart
bar chart

pie chart
pie chart

surface chart
surface chart

C
B

bar chart

pie chart

surface chart

D

bar chart

pie chart

surface chart

A

symbols

none of the
above

A

Netscape

word 2000

A

tip wizard

A

pie chart

C

wild card
characters
internet
explorer
chart wizard
bar chart

convert text
to columns
wizard
stock chart

false

A

or

B

4-dimensions

Multidimensions

A

false

A

Pivot table

B

It is often
It is also used
used to
It shows
for indicating
display share
trends over
fluctuations in
market prices
time
temperature
over a period
changes
of time

B

Scenario
manager

Solver

Data table.

C

Scenario
manager

Pivot table

Data table.

A

Pivot table

Solver

Data table.

D

Worksheet

Spreadsheet

none of the
above

A

Performing
database
operations

Performing
text
formatting.

All of the
above

D

Row field.
three
false
4-dimensions

Source table
name.
N

Pivot table
item.

C
B
B

Multidimensions

A

Pivot table

B

It is useful
when several
components
It can be
are changing
represented
and the user
in 3is interested
dimensions
in the sum of
the
components.

B

Scenario
manager

Solver

Data table

C

Scenario
manager

Pivot table

Data table

A

Standard
deviation
records

SumIf
tables

A
worksheets

It is a tool that
provides a
way to view
It summarizes
and compare
the data by
the results of
using
all the
analytical
different
functions.
variations
together on
the worksheet
Scenario
manager
convert text
to columns
wizard
workbook
document
window

D

A

solver

Pivot table

D

tip wizard

function
wizard

B

database

A

tables
modal
window

C

A dotted
border

No border

A blinking
border

A

2,4,2

2,2,2

6,8,10

D

either b or c

C

the column
the row is too
is too
short to show
narrow to
the number at
show all the
the current
digits of the
font size
number
speed of
calculation

flexibility of
moving
entries

cost of initial
set-up

D

graphical

database

spreadsheet

D

Address

Gap
Drawing
pictures

Rows
Document
filing

A

drag from the
top cell in the
column to the
last cell in the
column

click the
column
heading

click the
column label

C

CTRL +
ENTER

TAB

INSERT

A

function.

constant.

formula.

B

Writing letters

(201)5551212.
Functions
/
C3/D4
6

Tom
McKenzie.
Numeric
Text
constants
constants
*
\
It is
D4^2
impossible to
determine.
G7*SUM(H9:H
SUM(H9:H11)
11)
#VALUE!

The phrase
It is displayed
“active cell”
It is blinking.
in reverse
appears in the
video.
Status bar.

A

C
D
D
C
B

A

By either
By typing the
clicking in a
By using the
reference of
different cell
arrow keys to
the cell you
or using the
move to a
want to move
arrow keys
different cell
to in the
to move to a
formula bar
different cell

C

The Cell
The Font Size
Format
command on
command on
the Tools
the Edit menu
menu.

B

the Save
the Save As
the File Type
command on command on
command on
the File
the File
the File menu.
menu.
menu.

C

The
Formatting
toolbar

Edit

View

Window

A

Details

List

Properties

B

Clear

C

Remove

B

Delete
Delete

Both Insert
and Delete
Both Clear
and Delete

Headers and
footers

Fonts

Margins

C

Page Setup

View

Edit

B

range.
D12, G25
destination
range.
destination
range.

group.
D12:G25

B
C

clipboard.

cell group.
D
source
range.
source range.

B

The Copy
command

The Paste
command

relative
$B4

mixed
B$4

Both the
Copy and
Paste
commands
constant
$B$4

#DIV/0!

#DIV/0!

#DIV/0!

B

#DIV/0!

#DIV/0!

#DIV/0!

C

The Cut
command

The Paste
command

Both the Cut
and Paste
commands

D

clipboard.

D

D
A
D

edit cells.

the Format
Painter

cycle
through
cycle through
absolute,
open
relative, and
applications.
mixed cell
references.
the
Formatting
toolbar

Conditional
formatting

C

B

Click the
Right-click a Double-click a
Insert
cell and click cell and click
Hyperlink
the Edit
the Insert
button on
Hyperlink
Hyperlink
the Standard
command.
command.
toolbar.

B

whether the
cell has an
absolute or a
relative cell
reference.

the value in
the cell

D

an integer.

text with either
a two-digit or
four-digit year,
depending on
the format.

C

29/03/2008

It is
impossible to
determine
from the
information
given.

B

adding the
later date to
the earlier
one.

A

the cell
address.

text with a
four-digit
year.

Aug-31

subtracting
adding the
the later date
earlier date to
from the
the later one.
earlier one.
the F2 key.

the Esc key.

the F1 key.

B

0.75

March 4 of
the current
year

Either 3/4 or .
75, depending
on the cell
formatting

C

a constant.

either a cell
on a
worksheet or
a variable.

D

a variable.

B1.G10

B1;G10

B1:G10

D

COUNT

MAX

SUM

C

Line

Pie

Scatter

C

Once a
Once a pie
Once a line
column chart
chart has
chart has
is chosen it been chosen been chosen
cannot be
it cannot be
it can be
changed to a changed to changed to a
bar chart.
line chart.
pie chart.
hold down the hold down the
SHIFT key
ALT key

hold down
CTRL +
SHIFT

Transfer
Create four
Use multiple
information to
separate files
sheets
a database
Fill Down

Fill Right

Paste Special

Data | Sort

Edit | Data |
Sort

Calculate
data

Create forms

none of the
choices
None of the
above

select Print
press the
selection on
PRINT
Page Setup
SCREEN key | Sheet and
then print

D

A

D

B
B
C

select Print
selection in
the Print
dialog and
then print

D

writing letters

drawing
pictures

None of the
above

A

D4+C2*B2

#VALUE!

=(B2*(D4+C2)

C

=A3SUM:B3
SUM:C3SUM

REF!

None of the
above

B

landscape

whatever was
last used

vertical

A

ZA1

A0

None of the
above

C

q_id

PP1

q_desc

op1

clipart &
auto
shapes

PP4

In Powerpoint2000 ,the built-in professional design elements are
Selection handles are the 8 small ___________ that appear around the object, when
an object is selected
circles
The _______ is an invisible matrix of vertical and horizontal lines that covers the entire
slide workspace
square
_______ are drop-down menus that appear when the right mouse button is clicked on
the screen element
tool bars

PP5

________ and ______ have the ability to add a lot of visual impact into the
PowerPoint presentation

PP6

_______ is a motion picture or any animation file

PP7

The user can use ______ to remove the undesirable part of the image

PP8

The power presentation has a _____ for a set of compatible colors

wave file
clipping
tool
color
palette

PP9
PP10
PP11

The set three colors used for graphs and for secondary slide items is called as
There are ______ types of charts available in PowerPoint
_______ charts are useful while showing variations over a period of time

ascent
10
column

PP12

images

PP13

_______ are the individual pages of a presentation
A PIE Chart is a ____ diagram that depicts the relationship between a whole and its
parts

PP14

Each individual piece of data in a series is called a/an

entity

PowerPoint launches an OLE-compatible application called

Microsoft
organizat
ion chart

PP16

When the user double-clicks on an organization chart object in PowerPoint

the
organizati
on chart
is
expanded

PP17

The _____ are used for selecting, editing and viewing objects in the chart

box tools

PP2
PP3

PP15

clip
gallery &
word art

circular

PP18

Manager box tool in organizational chart window is

used to
mange
organizati
onal chart

PP19
PP20
PP21

The custom drawing tools are _______ by default
Click on the box tool ______ to draw three boxes
There are ____ default fields available in all boxes of the organizational chart

turned on
once
two

PP22

The _____ tool is used in the same way as we use a pen to draw a table

PP23

A/An _______ consists of smaller printed version of the slides

native tool
autolayou
ts

PP24
PP25

The size of the object can be changed using the ______ tool
_______ is the process through which the slides in the current presentation are
included in another presentation or application

PP26

________ can be used to create charts as well as worksheets

importing
Microsoft
excel

PP27
PP28

PowerPoint can import text files that have been saved in ______ format
PowerPoint outlines can have _____ outline levels

.
ppt(Power
Point)
nine

PP29

.rtf(rich
When a file is saved with _____ extension, the graphics and text are also saved along text
with the slide
format)

zoom

The hidden slide is

not
displayed
during
the slide
show

PP31

____ effect is used to introduce a slide during a slide show

DTS(digit
al track
sound)

PP32

A _____ is a special effect that determines how the objects appear on the slide

PP33

The notes page is formatted based on the

PP34

Pick the odd man out of the following

build
notes
master
outline
view

PP35

When a new presentation is opened ,powerpoint creates slides that have a width of
_____ and a height of ______ with the landscape orientation

15
inches,10
inches

PP36

The default orientation for notes ,handouts and outlines is ____ orientation

portrait

PP30

PP37
PP38

Build effect is also called as ______
Graphics for web pages are automatically stored in ____ format

animatio
n
gif

PP39

A _______ is used to jump to any slide in the presentation

hyperlink

PP40
PP41

The ______ language has been incorporated into PowerPoint
In PowerPoint _____ is a series of commands that are executed in sequence

visual c++
macro

PP44

The macro will be activated
Developers can easily add ____ to PowerPoint 2000 by using the programming
interface
______ determines the order in which order in which the slides will be displayed
during the show

while
creating a
.exe file
virus
checkers
slide
show

PP45

_______ is used to organize and develop the contents of a presentation

PP46

If we save the presentation file as a metafile, it can be opened using

slide pane
internet
explorer

With reference to autocontent wizard for creating a new presentation, which of the
following statements are not true

PowerPoi
nt creates
a sample
presentati
on to
which
user can
add words
and
pictures

Which of the following statement is not TRUE

user can
insert
objects
like cliparts,
pictures
stored in
a
separate
files to the
slides

PP42
PP43

PP47

PP48

which of the following statement is not true in outline view. drag the slide icon to a new location Which of the following definitions are not true the slide that holds the formatted placehold ers for the titles. main text and any backgrou nd items that user wants to appear on the slides is called a master templates Which of the following statements are not true with notes pages view user can prepare speaker notes and handouts .PP49 PP50 PP51 With reference to changing the order of slides.

subtitle.. graphics and email address. all the text objects in all the slides.PP52 Which of the following definitions are not true PP53 The options available in the common task toolbar does not include the slide that holds the formatted placehold ers for the titles. or bulleted-list object is determined by the format settings in a special slide called -------PowerPoint provides a _________ that searches the entire presentation i. PP54 PP55 PP59 PP60 PP61 Which of the following formatting elements can be applied to a PowerPoint diagram using the AutoFormat tool? Which of the following formatting elements can be applied to a PowerPoint diagram using the Format AutoShape command? the Line style Fill color .e. outlines. main text and any backgrou nd items that user wants to appear on the slides is called a master template slide layout With reference to chart. which of the following statements are not true data to be graphed resides in a datasheet window PP56 PP57 The format of the text entered in a title. notes and handouts for spelling errors PowerPoint's drawing toolbar contains _______ drawing tools the master slide office assistant 10 PP58 Click _______ on the rectangle drawing tools enables us to draw multiple rectangles once An example of the components of a multimedia presentation could include text.

What happens when you double click a blank graph placeholder in a PowerPoint presentation? Excel is started so that you can create a chart. Which would side be the best chart type if you want to emphasize the total sales of each region? column PP62 PP65 PP66 Which of the following actions will enable you to insert a graph into a PowerPoint presentation? Pull down the Insert menu and select Chart. . how do you display the underlying datasheet? It automatic ally displays in Slide view. PP64 Side-bySuppose you are creating a Microsoft Graph of quarterly sales by region. If you are editing a slide containing a Microsoft Graph. PP63 The legend in a Microsoft Graph chart is: always taken from the first row of data in the datasheet .

How do you deselect a chart that has been placed onto a PowerPoint slide after you have finished creating the chart? Single click the chart. What happens if you single click a chart that is not currently active? The chart is selected. What happens when you click the Datasheet button on the Microsoft Graph toolbar? A dialog box is displayed allowing you to enter the name of the Excel worksheet that should be linked to the PowerPoi nt presentati on. What happens if you double click a chart that is not currently active? The chart is selected. you can build: a slide one bullet item at a time. PP71 Using custom animation effects. PP72 Which of the following animation effects can be added to a slide? Subtle PP73 PP74 Which of the following animations effects can be added to a slide? Which keyboard key is used to select more than one picture on a slide? Enter and exit Enter PP67 PP68 PP69 PP70 .

PP75 PP76 PP77 PP80 PP81 .Custom animation can be used to affect ONLY: the way objects appear on a slide. PP78 Which of the following objects can contain custom animation effects? What type of program allows an object within an image to be edited without affecting other objects? Clips Paint program PP79 Which of the following animation effects can be added to a slide? Fly in Which of the following is TRUE regarding the Datasheet? Graphical software tools that provide complex analysis of stored data are: Once data is entered it cannot be changed. Which of the following best describes the information that appears on the advanced timeline? The advanced timeline shows the sequence in which objects will appear on the slide. OLTP.

PP82 PP83 Which of the following statements is TRUE regarding PowerPoint diagrams? Which keyboard key combination is used to undo the previous command(s)? You can change the appearan ce of a whole diagram. but not individual shapes of a diagram. [Enter+A] .

op2 op3 op4 ans autolayo uts and presentat ion slide view template & outline s view none of the above B points icons C guide C all the above B none the above A all the above B scribble drawing tool A color guide C primary color scheme 36 linear A C A slide sorter views C squares image grid short cut auto menus shapes slide show & view show media clip cropping tool fonts & images .video file cutting tool color color box scheme tricolor color scheme palette 28 18 bar pie images and text slides radar data point clip art doughnut all the above A data stream B auto shapes track changes A the chart window the chart opens is made displayin available g a chart for editing template none of the above C general purpose tools C custom drawing tools standard drawing tools .

html(hypertext format) six twelve wmf(win dows .5 inches.doc(document) displayed only in outline view none of the above 3D(3 dimension both a ) and b slide transition show slide master master slide view slide view show C B C B A transition D view show A master notes A slide sorter view C 10 7. inches. displayed only during the slide show available in the tool bar any of the above eight B C B all the above B none of these B none of the above B moving B drawing tools A .used to create a manager box for accessed an only by existing used to store the other tools manager box of the organizational chart not available turned in the tool off bar twice thrice four five standard draw tool tool handlayo uts slide view reduce/e preview nlarge exporting copying auto shapes clip art .rtf(rich text format) only one .5 5 inches inches none the above B landscape a or b none of the above A .7. doc(docu ment) .txt(plain metafile) text) .

precolored graphic images reflected in a clip arts to the slides user can insert picture to the master slide which gets reflected in all the slides using that master slide B A none of the above C all the above A none of the above B outline pane D power point 2000 D user can insert picture to the title slide which gets reflected in all the slides using that title slide B .view show transition b or c jpeg png none of the above action hypertext button all the above A D D visual basic for applicati on batch file Microsoft visual interdev all the above templates add-ins during slide transition spell checkers custom show notes pane paint shop pro when the slide show is run header files both a and b properties pane paint shop pro it is the quickest way to create a presentati on contains sample presentati ons for a variety of provides suggested content topics and design D user can insert only predrawn.

in notes pages in slide view. drag the slide icon location location to a new location C transition means applying special effects to the crossover between the slides design templates is the template whose format and color scheme user applies to a presentati on in outline view. sorter drag the view. user can see the miniature s of all slides in a presentati on. drag slide the slide icon to a to a new new I slide view. complete with text and graphics user should select the slide view to add the text to the the slides can be reordered in slide the outline view B the slide that holds the formatted placeholders for the title and sub-title for the presentation is called a title template D .

hypertext and Power Point. Line color.design template is the template whose format and color scheme user applies to a presentati on transition means applying special effects to the crossover between the slides customiz e new slide the slide that holds the formatted placeholders for the title and subtitle for the presentation is called a title template D set up show B by default. Power Point. sound. hypertext. video and sound. doughnut chart is displayed based on the data in the datashee t data is plotted in a chart user can add data labels and window gridlines to the chart the slide master spell checker 12 the header slide grammar checker 102 twice three text. digital camera and text. D the Font and the the Line text color alignment Line Line color thickness B the format slide B none of the above 22 B B four times B Line style. text font. CD-ROM. and Line thickness D D . and text alignment Fill color. Line color.

Pull down the Edit menu. Pull down the Insert menu and select Chart. then click the View Datashee t button on the Standard toolbar. slide is finished. D Click the chart object. C Stacked column Pie chart Line chart B Click the Insert Chart button on the Standard toolbar. Pull down the Insert menu and select the appropriat e Object. Microsoft Graph is started so that you can create a The graph placeholder is graph. then You cannot display the select underlying datasheet once the Object. click the Insert Chart button on the Standard toolbar. deleted. or pull down the Insert menu and select the appropriate Object. entered by the user. B . taken dependin from the g on first whether column of the data data in series the are in datasheet rows or .A popup box prompts you for an existing Excel chart to insert. columns. C taken from the first column or row of data in the datashee always t.

in size. or Exciting D D Both enter and exit. Subtle. and build bullet items a word at a time. D bullet items one letter at a time. bullet items one word at a time. neither or bottom bottom fly in from top nor bottom C Shift Alt Ctrl B . the chart is started. A dialog box is displayed allowing you to enter the name of the Excel worksheet that should be embedde d in the PowerPoi nt presentati on. Microsoft Graph will restart. The datasheet is saved as a The datasheet window is separate toggled from closed to open file. Click outside the chart. (or from open to closed). and fly in Fly in from top from top or Neither enter nor exit. Change to Slide Sorter view. build bullet items a letter at a time.Double click the chart. C A The chart The chart is doubled is deleted. D The chart The chart is doubled The application that created is deleted. Moderate. in size. Moderate Exciting a slide one bullet item at a time.

OLST.what objects do after they appear on a slide. OLAP. and to the way objects exit a slide. the way objects exit a slide. and Dissolve in Data cannot be entered into Datasheet There is no such thing as a . The advanced timeline shows the sequenc e in which objects will The appear advanced on the timeline slide and shows the the duration duration of the of the effect effect applied to applied each to each object. D The advanced timeline shows neither the sequence in which objects will appear on the slide. Datasheet. object. C Clips. Custom animation can be used to affect the way objects appear on a slide. organization charts. Organizati on charts Text Draw Filtering program program Dissolve From top in Once data is entered it can be changed. A D B B . From top. and text D Animation program Fly in. nor the duration of the effect applied to each object. OLIP. to what objects do after they appear on a slide.

[Ctrl+Z] B D .You can change both the appearan ce of a whole diagram and the individual shapes of a diagram. [Alt+Z] You cannot change the color of the boxes in an Organization chart. [Shift+Z] You cannot change the style of the connectin g lines in an Organizati on chart.

BC17 Collection of instruction is called a _____ Combination of alphabetic and numeric data is called BC18 _____ data BC19 BC2 BC20 BC21 BC22 BC23 BC24 BC25 Computers can be classified based on ______. price. __________ is designed telephone system BC14 Expansion of ISDN is ________ BC15 Expansion of WBT is ______________ BC16 _________ connects LANs. _________ are used in large organizations for large scale jobs _______ is responsible for feeding data into the computer _______ is the capability of the o/s to run numerous applications simultaneously _______ involves conversion of raw data into some meaningful information _______ is responsible for obtaining the processed data from the computer _______ printers use light to produce the dots needed to form pages of characters Hardware components in a computer are BC26 _____. assembler.q_id BC1 BC10 BC11 BC12 BC13 q_desc ISDN stands for _______. interpreter. of users allowed cost. networks. no. bootstrap. File server Printer server platform configuration MAN and WAN ISDN Internal Services Digital Network Web based Training Bridges procedure LAN and WAN ATM Internal Services Design Network Web based Technology Routers batch alpha numeric alpha beta space occupied. kernel.____.______and _______ _____________ is the Worlds largest computer network .______ _______ software are programs that are complex and BC27 can be developed or purchased _______ is a set of special instructions used to BC28 communicate effectively with the computer _______ converts a high level language into machine BC29 language BC3 _______is/are a popular front end tool _______ translates assembly language program into BC30 machine language instructions op1 op2 Integrated Integrated system Symbolic Digital dynamic networks. The computer which can receive data from other computers on the network and print it is _______ The hardware and the software requirements together form the_____ ATM. Asynchronous transfer mode is a __________ technology. shell . compiler application software batch protocols processor visual basic compiler power builder compiler interpreter operating system._____. performance their ratio Ethernet Internet mini computers microprocessors input output multiprocessing multithreading interpreter compiler input processor impact printers drum printers operating system control program.

When all the processing is done by the mainframe itself. BC37 manipulate and print any text ______ software enables users to send and receive BC38 data to/from remote computers application project system model multiprocessing multithreading mainframes super computers arithmetic and control unit logic unit band printer drum printer word data management processing communication integrated software software BC39 _______ is the temporary storage place for deleted files my computer When LAN connected together . BC45 the terminals are referred as_______________ "dumb terminals" dumb servers BC46 BC47 BC48 BC49 BC5 A______is nothing but a PC with a network operating system _____system is responsible for handling the screen and user I/O processing The______ handles data processing and disk access in a Client/Server architecture Both the DBMS and the application resides on the same component in a ____system wan distributed computing system host server host server PC LAN Transfer control protocol/Internet protocol Transfer communication protocol/Internet protocol TCP/IP stands for _________ .it is called BC4 __________ .store. MAN BC40 _____ is a collection of related fields field BC41 _____ language consists of strings of binary numbers ______ symbol is used to represent processes like BC42 assigning a value to a variable or adding a number BC43 _______ is an example for micro computer _________capability supports concurrent users doing BC44 different tasks recycle bin WAN file machine assembly language language processed terminator symbol symbol hp vectra PC-at system multiprocessing multithreading The ______ do not have processing power of their own and has only a screen. keyboard and the necessary hardware to communicate with the host. BC50 the type of processing is sometimes called as server processing BC51 DBMS models can be grouped under____ categories four host processing one ._______ software enables users to send and receive BC31 data to/from remote computers BC32 A _____ is a running instance of an application Splitting of CPU's time for different tasks _______ BC33 prevents time slicing ______ computers are used in large organizations for BC34 large scale jobs which have large storage capacities _______ is responsible for all calculations and logical BC35 operations that have to be performed on the data BC36 ______ printer use laser light ______ software enhances the user to enter . For this reason.

This situation is BC53 referred to as ______ The process of data being automatically written to a BC54 duplicate database is called______ BC55 Modem stands for __________ . networks BC59 New process of execution is referred to as______ task BC6 Data is broken into small unit called __________ . Multiple changes to the same record or a field are BC56 prevented by the DBMS through______ file management system hierarchical database system multiprocessing multithreading repairing Code/De-code redo logging Modulation/Dem odulation fixes locks BC57 _________allows an application to multitask within itself multiprocessing Linear area BC58 LAN stands for __________ . The __________ protocol is a network protocol to be built for the World Wide Web . BC9 ATM stands for __________ . Cells BC7 BC8 SMTP stands for __________ . multithreading Local area networks process Bits Software Mail System modulation transmission transfer protocol protocol Transmission Transfer Protocol protocol Aggregate transfer Asynchronous mode transfer mode .while the user can continue his query process as usual in the foreground.BC52 ______is the most advantageous database system A new user initiates a new process of execution at the background.

memory. B PCs mainframes D feed write A multiplexing multitasking D converter process D ram non-impact desktop printers output D thermal printers C monitor. performance. bus CPU. output.op3 op4 ans Integrated Services Digital network. B package system A LAN and MAN Internet Integrated Services Digital Network LAN WAN and MAN B Intranet A C Web based Transport Protocol command None of the above. program. C Receiver None of the above. Web based Transaction Repeaters program numerous alpha number and alpha A size. output D windows 95 interpreter B software's procedures C assembler SQL * plus coder all of the above B D assembler processor C A B D . input. cost input. performance ratios C ARPANET None of the above. None of the above. keyboard.

operating system pilot project communication process D D multiplexing multitasking D micro computers none of the above A central processing unit non impact printer none of the above none of the above B C electronic spreadsheet none of the above B idea processor none of the above B Microsoft exchange none of the above B GAN record None of the above. C dumb processing two B A data processing many . none of the above B C high level language none of the above B connector symbol input/output symbol B fazitsu vp200 series IBM-PC B multiplexing none of the above D dummy terminals dummy servers A windows NT LAN D back end front end D back end front end C distributed computing centralized A Transmission control protocol/Internet protocol None of the above.

C Area transfer mode None of the above. C Hyper text None of the above. thread Packets None of the above client-server None of the above. B C C Simple Mail transfer protocol None of the above. B .network database system relational database system D multiplexing none of the above B disk defragmentation disk mirroring D Module/De-module None of the above B constraints traps B multiplexing none of the above B Local array of networks.