Professional Documents
Culture Documents
QUESTIONS A
TALLY
The ------ key can be used to select an existing
1 company from list of companies. F1
Display stock
27 Ctrl + N is used to ----------- valuation method
------------- in Tally classify the accounts under
different heads so that summarised information is
28 possible. Ledgers
One company to
another company
created withon
76 Tally supports Importing of data from ---------------- Tally Package
In an accounting information system, which of the
following types of computer files most likely would Inventory
77 be a master file? subsidiary.
data to be
transferred to
79 The memory address register is used to store memory
FUNDAMENTALS OF COMPUTER
Writing on a hard
83 Hard copy is a term used to describe...? board
Voice activated
84 What do the abbreviations VAB stand for broadcasting
Electrically
90 An impact printer creates characters by using...? charged ink
Serial access
99 Magnetic tape is a...? medium
Hard disks can have a storage capacity in the region
100 of...? 1.44MB
Which storage device has the largest capacity in
101 Mb? A CD-ROM
109 What type of computer chips are said to be volatile? RAM chips
Network software
and security
110 Software can be divided into two areas: software
Travel agents use this computer system when
111 reserving flights Supercomputer
DATABASES
Specification,
Name three steps involved in developing an Design, and
118 information system Testing
119 _______ is used for CAAT as database Oracle
Generalized audit software perform auditors to
undertake any past records and not concurrent
120 auditing TRUE
Generalized audit software is a file whose
121 capabilities for verifying processing is logic TRUE
CAAT's are computer program and data that auditor
uses as part of the audit procedures to process data
if audit significance contained in an entity
122 information system TRUE
CAAT do not contains package programs, purpose
written program, utility programs or system
123 management programs yes
Embedded audit routines are sometimes built into
an entity's computer system to provide data for
124 later user by the auditor TRUE
SCARF involves embedding audit software modules
within an application system to provide continuous
125 monitoring TRUE
Concurrent use auditors as the member of the
system TRUE
Regular cross system verification may minimize
frauds true
Computer security is frequently associated with
confidentiality, integrity and authentication true
Data reserve engineering process metadata to
document system and abstract business rules and
relationship true
to determine
the audit
The first step for developing CAAT is_________ objective
Using the open database connectivity feature in ACL can bring the
is ______________ data directly
documents driven
Auditing with computer necessarily supports the approach
hardware and
CAAT involves an Auditors' appreciation of software
__________ configuration
Widespread end use computing result in unlimited
errors creeping into system going to accept
handling, thereby increasing audit risks true
the source of
data available
Important knowledge needed to begin planning the to the audit
use of CAAT is _________ organization
The move towards paperless EDI would eliminate
much of the traditional audit trail, radically changing
the nature of audit evidence true
seriously affected
SADB stands for ____________ database
Controls are present over many aspects of the
computer system and its surrounding social
environment true
In framed checking the data entry is checked
against an expected picture or format true
consecutive nos.
or alphabets to
Hierarchical code means _________ entities
The validation checks applied to a field depend on
the field's logical inter relationships with other fields
in the record TRUE
The contents of a field could determine _______ sign
for a ______ field valid, numeric
Batch is the process of ______ together _____ that grouping,
bear some type of relationship to one another transaction
Hash totals means meaningless totals true
incremental
design and
IDEA stands for _________________________________ enlarge activity
A transaction file is sorted prior to the update of
master file true
A sequence check on the transaction or master files
by an update program is not required true
Whenever monetary transactions are processed
against master files, the update program should
maintain a correlation account to record such
transaction that does not have a matching master
file record true
Internal tables are stored tables from which certain
values are extracted for further processing and
storing true
read data on
Audit software is used by the auditor to _________ client's file
Core image comparison is a software used by the
auditor to compare _______ version of a program executables,
with a secure ________ copy master
Database analyzer is a software which provides
detailed information concerning the operation of the
database true
system analysis
SAS stands for ______________ software
Embedded code is a software used by the auditor to
examine backup data true
can be very
Modeling is a variety of software which powerful
________________ analytical tool
On line testing can be targeted for specific functions
carried out by programs yes
provides detailed
information of
Program code analysis involves _____________ machine uses
__________ is a software of CAAT IDEA
fictitious data
applied against
the client
Base case system evaluation includes____________ program
While base testing forces on finding if there are any
defective execution policies in a program true
Black box testing seeks to determine whether
application output is what it is supposed to be true
In integrated test facility approach the auditor
should ensure that the impact of test transaction is
subsequently eliminated from the computer files true
Black box testing is _______ based and white box specification,
testing is _______ based program
identifying
Source code review means__________ erroneous code
In formula in flow hypothesis the auditor should
expand the extent of substantive tests to
determine how the defects may impact the
attainment of the program objectives true
All material application oriented events that occur
within the boundary subsystem should be recorded
in the accounting audit trail true
job control
JCL means_________________ language
Audit should be periodically analyzed to detect any
control weakness of the system yes
In an accounting audit trail, intrusion detection
system might monitor the amount of processor time
consumed by the user to detect unusual deviation
from the amount processor time requested by the
user in the past true
A sample size calculator program assists auditors in
determining RAND() function true
package
computer
p[program for
performing a
variety of data
processing
Generalized audit software consists ___________ function
prepared by the
Specializes audit program may be___________ auditor
Wide access to
Which of the following is not the feature of GAPs various data base
A sample of
In audit procedures, test data is transactions
Tests of details of
Which of the following is not the use of CAATs transactions
Which of the following are called explicitly by
another procedure? Macros
_________ data type is generally used for fields
assigned as primary keys in a table integer
for ordering
In SQL, having clause is used for _________ records
______field is added to the macro sheet when we
select grouping option from the view menu condition
______can be used to create toolbars VB Modules
_______query is used to add records from one or
more tables into an existing table add
_______window is used to write VB code in access
application report
Values for other tables, queries are maintained in
look up fields data type true
Visual Basic language is a _____ tool RAD
object linking
OLE stands for_____ and embedding
The application that supplies data in OLE is called
an _________ OLE object
If any change made on the object from the client
side is reflected on the server then the object is said
to be _____ linked
_______is the file format that works on internet exe
______ is used to convert any ms-access object into
html format form wizard
_______ option in publish to web wizard produces a
page that is static in nature static file
_______query is used to create or change database
objects in a current database append
A way to analyse
and manipulate
numerical
What is a database? information
Information about
What does a record contain? certain programs
Reports allow
users to extract
information as
hard copy
What is a report? (printed output)
Extracting and
What is the best way to analyse and change data analysing data
Compilers,
What are some popular office orientated software interpreters,
applications? editors
DEFAULT and
Which of the following constraints can be used to NOT NULL
enforce the uniqueness of rows in a table? constraints
Which of the following commands is used to change
the structure of table? CHANGE TABLE
records in a
dynaset are
consistent with
the underlying
Referential integrity ensures that the: tables.
A one-to-many
Which of the following relationships does not belong relationship
in a database based on a professional sports league between teams
such as football or basketball? and players
Which symbol is used at the end of the join line in a
related table to signify the “many” side of a one-to-
many relationship? #
data warehouse
A data warehouse database differs from an data are not
operational database because: stored in tables.
Which of the following objects is used to display a
menu? Form
Which of the following objects are NOT found in an Forms and
Access application? reports
It will be easier
for the user to
upgrade it if the
You are developing an Access application that you objects and
expect to upgrade periodically. Which of the tables are in one
following statements is TRUE? database.
create backups
for mission
critical corporate
The purpose of a data warehouse is to: data.
Certificate
CRL stands for Revocation List
The prospective signer identified in the digital
certificate holds the_________ and is called the Private Key,
___________ Subscriber
In EDI interface, the translation service receives
_________ as incoming files from the communication Internal Format
service File
The EDI standardisation for International Trade and
Commerce is introduced by __________ ANSI
In EDI, the transmission files are composed of
different sets of external format files which are
grouped into multiple sets under the name of
________ batch files
The ________________ are pre-paid credit cards that
include an embedded cards Smart Card
________________ are another form of credit payment
that lets customers use digital online cheques to
pay Web merchants directly E-cash
A list of
What would you NOT be looking for when spying on competitor’s
a competitor? clients
single-user
An online drugstore such as Drugstore.com is an database
example of_______ application
Removable drives
that can be
locked up at night
provide adequate
security when the
Which of the following statements is correct confidentiality of
concerning the security of messages in an data is the
electronic data interchange (EDI) system? primary risk.
uniform research
URL stands for ____________ locator
IN an URL the word before the color refers to _______ host computer
A ______ always begins with a slash message
Prodigy is run by IBM and ______ Delphi
The World Wide Web is referred to shortly as the
_______ net
Gopher and WAIS enables the user to ______ browser
______ is the program used to run CompuServe's CompuServe
regular services internet dialer
Navigating through the menu of gopher is called
moving around _______ gophering
The directories that come with built-in engines are
yahoo,lycos and ______ Alta vista
To use the finger command,SLIP users must run a
programme called______ finger server
The web maps are called _______ list
Higher text
HTTP is the acronym for __________ transfer protocol
______is used to transfer and copy files over the
internet iccp
_____ is a program that helps us to log on to other
networks yahoo
transfer control
TCP/IP stands for ________________ protocol/internet
Archie servers can be accessed in_______ different
ways in internet one
_______is the computer on the internet that
translates between the internet domain names and
the internet numeric address ftp servers
the internet
TIA stands for_____ in internet adapter
frequent asked
FAQ stands for ______ query
global network
GNN stands for______ news
_____ is the most popular internet service yahoo service
The online service offered by navigator gold 2.0 are email and net
_______ and_____ conference
_______ is a program or a tool that helps us find a file
anywhere on the net newsgroup
The databases to enable keyword search using
Lycos are a2z,_______ Lycos catalog
______ is a large worldwide bulletin board service
network apple link
computer related
abbreviations and
BABEL consists a glossary of _____ acronym
Joint Pictures
JPEG is the acronym for ___________ Expert Group
The Web aids users to explore the ________ mails
The three most popular mailer are_____,_____ yahoo,infoseek,al
and______ tavista
Internet
equipment
IETF stands for ________ training faculty
MS Internet
The two major browsers used to surf the Internet Explorer and
are ________,_______ Mosaic
Special characters allow browsers to display
_________________ text
The keyword for providing links within or across
documents is____________ hyperlink
mail servers,mail
The mail we send has a mailing address and most of clients and
them correspond to_____,_____ and alternate services
Which of the following is not supported by internet
explorer _______________ <center>
communication
generated
CGI stands for ____________ information
Host name indicates the domain name of the web
________ Server
The internet is also called as _______________ arpanet
point to point
network and
The point to point channel network is also called as broadcast
_____ and_____ channel network
________ and______ are two basic ways of getting Satellite link and
connected to the internet digital signals
Standard long
SLIP stands for ________________ internet protocol
Prime prolonged
PPP stands for _____ protocol
The ________ allow companies to bypass the need for Billboard model
costly printed catalogs of marketing
A ________________ is a basket on the Net that is
used to place the items that are being purchased Online Catalog
EDI For
Administration,
Commerce and
EDIFACT is an abbreviation of ________ Transaction
The __________ allows for protocol conversion and
communicates with the bank using the banks
private network or the Internet EDI
In Ecommerce, data extraction, transforming the
data into transmittable form, transmitting the data
and downloading the data are the operations
employed in _________ Compiler
The _________ commerce assists in integrating the
customers and suppliers of the company directly Business-to-
into the organisation Business
The chart that holds the column chart is _________ column chart
The chart that display two or more data series on a
surface is _________ column chart
The chart that is used to display discrete data column chart
It is also called as
Which one of the following statements related to high-low-close
stock chart is NOT TRUE ? chart
The state government needs to finalize a five years
plan to implement 100% literacy in the state. Which
one of the following will be the best tool that should
be used to work out the plan ? Pivot table
Forecast'99 is a group working on exit poll. It wants
to know how many seat ABC party needs to won in
totality to obtain majority to form the government.
Which one of the following will be the tool that will
help the team ? Goal seek
Which one of the following will be the tool that
provides a way to view and compare the results of
all the different variations together on the
worksheet ? Goal seek
A ___________ is an excel file where the user stores
his data Workbook
Performing
Spreadsheets are useful for _______________ calculations.
Which one of the following is NOT the component of
the pivot table ? Column field
Excel allows upto ______ levels of sorting two
Filtering rearranges a list to display the required
records true
The stacked bar graphs can be represented in
_____________ 3-dimensions
The ______ generates a summarised report in
tabular form in an interactive manner Data table
It displays the
data series one
Which one of the following statements related to on top of the
stacked bar chart is NOT TRUE ? other.
Which following function is used in subtotal option ?
______________ Count.
A workbook consists of many ________ databases
It is a tool for
summarizing and
analyzing the
data records in an
Which two of the following statements related to interactive
pivot table are TRUE ? manner.
Which one of the following is NOT a What-if analysis
tool ? Goal seek.
double-click any
To select a column the easiest method is to … cell in the column
If you press _____, the cell accepts your typing as its
contents. ENTER
By clicking in a
How can you change the active cell? different cell
Which of the following would you use to change the The Standard
font size of a cell in Excel? toolbar
the New
The command that will save the current workbook command on the
with a different file type is: File menu.
The command that will print an Excel workbook is
found on the ____________ menu. File
In the Save As and Open dialog boxes, the
___________ view shows the file size as well as the
date and time a file was last modified. Preview
If you enter a date into a cell, Excel stores the date text with a two-
as: digit year.
You created a worksheet on July 30 and entered the
=Today() function in cell E17. You opened that
worksheet again on August 31. What will be
displayed in cell E17 on August 31? Jul-30
subtracting the
The number of days between two cells containing earlier date from
dates can be calculated by: the later one.
The function key that is used to quickly edit the
contents of a cell is: the F4 key.
yahoo and
The useful URL schemes are_____ and______ infoseek
news
The other ways of getting connected to the net groups,yahoo and
are_____ infoseek
bulletin board
BBS stands for______ system
USENET is a BBS on ____ scale small
None the person who is known as father of Internet Tim Berner Lee
hyper terminal
The term HTTP stands for tracing program
National
Informatics
A NIC is considered as Center
What happens to data that is ruined before reaching Data return to the
to receiver sender
Wireless
Bluetooth is technology
Which is not one of the recognized IEEE sub layers? Physical Layer
The most preferred number system to represent a
IP address is Binary
A MAC address is of 48 Bits
software that
facilitates
connection to the
Protocol is internet
A ............... is a LAN-based computer with software
that acts as a controlling device for controlling
access to at least part, if not all, of a local area
network and its available resources. Novell PC
usually higher
WAN speeds are than LAN speeds
Accessing the Internet from a typical home PC
requires the use of CD-ROM drive
a Novell Interface
An NIC Controller
Accessing the Internet from a typical home PC
requires the use of CD-ROM drive
The most widely used network operating system on
PC LANs is Linux
have to do with
compression of
graphics and
JPEG and MPEG video
provides access
An ISP to the Internet
used to send
FTP is email
used to send
Telnet email
used to protect a
computer room
from fires and
A firewall is floods
provides access
An ISP to the Internet
used to send
FTP is email
used to send
Telnet email
The two most common tools used to help with cookies and
extracting information are: Trojan horses.
An attack on a
Which of the following would NOT be considered an system for
example of cyber terrorism? personal gain
Which of the following would be a form of cyber Economic
terrorism? damage
Crashing the
Which of the following is a likely target of a cyber stock market, as
terrorist that would cause considerable loss of life? in the 1930s
What is the best means of protection from cyber Use a fake e-mail
stalking? address.
Which of the following is not an appropriate control
over telecommunications software Encryption
Encryption techniques can be implemented in
Hardware-Software I only
Which protocol would be used to download a free
anti-virus program from the Internet? irc
using Internet
Explorer to view a
Web page that is
stored on the
Which of the following requires an Internet hard drive on
connection? your computer
Click on the Back
Mr Rao wants to find a website that he briefly arrow until the
browsed over yesterday. After turning on his desired site is
computer how would he do this? found
File Transfer
What does FTP stand for? Program
So computers can
be referenced by
What is the purpose of DNS? a name
Which of the following is NOT a properly formatted
IP address? 193.1.2.3
Which of the following is a properly formatted email paul .trigg @
address? domain. org. uk
The US
The Internet is controlled by whom? government
Internet Relay
What does IRC stand for? Chat
Consists of
A project group is a Project which: several Programs
Procedures declared in a _____ are local whereas Form window,
procedures declared in a ______ are available to the standard or code
whole application. module
How can you keep the user from exiting a form by Place code in the
clicking the Close button? Terminate event
The _______ property enables Visual Basic to draw
complete images in memory before displaying them AutoRedraw =
on the Screen. True
You want to display the code and the description of Msgbox err.no &
an error. What would be the correct syntax? err.text
To display images
What is the purpose of the Image List Control? to the user
Which method would you use to get a free or
unused File identifier while opening any file: FreeFile
Which property procedure is used to retrieve the
value of a property? Retrieve
Common
Which of the following can be shown to the user messages passed
using the Common Dialog control in VB? to Windows
Which of the following are not properties of
Command Button: Caption
Which events enable you to determine which key Click and
was pressed by the user? KeyPress
In order to access a file in Non-textual format, you
have to open file in: Ascii Format
Visual Basic displays information depending upon
the current value of two properties of the form, CurrentX and
called: CurrentY
The caption and the name properties of the Are one and the
command button: same
You try to initialize a new Object variable with the You do not need
following line but receive an error. What could be to use the Set
the possible cause? Set MyVar = New Classname command here
Which of the following will perform a direct
execution of a Command object? The Open method
A warning query
The vb Critical symbol displays: icon
MsgBox
statement returns
a value, while the
The primary difference between the MsgBox InputBox function
statement and the InputBox function is the: does not.
Which of the following is TRUE about a protected
form (i.e., a form where the Protect Form button on Data cannot be
the Forms toolbar is toggled on and is assumed to entered into the
remain in that position)? form.
Which event is triggered when the user moves to
another open form? Unload
The user can use ______ to remove the undesirable
part of the image clipping tool
The power presentation has a _____ for a set of
compatible colors color palette
The set three colors used for graphs and for
secondary slide items is called as ascent
There are ______ types of charts available in
PowerPoint 10
_______ charts are useful while showing variations
over a period of time column
used to mange
organizational
Manager box tool in organizational chart window is chart
The custom drawing tools are _______ by default turned on
PowerPoint
creates a sample
presentation to
With reference to autocontent wizard for creating a which user can
new presentation, which of the following statements add words and
are not true pictures
data to be
graphed resides
With reference to chart, which of the following in a datasheet
statements are not true window
The format of the text entered in a title, subtitle, or
bulleted-list object is determined by the format
settings in a special slide called -------- the master slide
PowerPoint provides a _________ that searches the
entire presentation i.e., all the text objects in all the
slides, outlines, notes and handouts for spelling
errors office assistant
PowerPoint's drawing toolbar contains _______
drawing tools 10
Click _______ on the rectangle drawing tools enables
us to draw multiple rectangles once
Excel is started
What happens when you double click a blank graph so that you can
placeholder in a PowerPoint presentation? create a chart.
always taken
from the first row
of data in the
The legend in a Microsoft Graph chart is: datasheet.
Suppose you are creating a Microsoft Graph of
quarterly sales by region. Which would be the best
chart type if you want to emphasize the total sales Side-by-side
of each region? column
A dialog box is
displayed
allowing you to
enter the name of
the Excel
worksheet that
should be linked
What happens when you click the Datasheet button to the PowerPoint
on the Microsoft Graph toolbar? presentation.
What happens if you single click a chart that is not The chart is
currently active? selected.
What happens if you double click a chart that is not The chart is
currently active? selected.
a slide one bullet
Using custom animation effects, you can build: item at a time.
Which of the following animation effects can be
added to a slide? Subtle
The advanced
timeline shows
the sequence in
which objects will
Which of the following best describes the appear on the
information that appears on the advanced timeline? slide.
Which of the following objects can contain custom
animation effects? Clips
Once data is
Which of the following is TRUE regarding the entered it cannot
Datasheet? be changed.
Graphical software tools that provide complex
analysis of stored data are: OLTP.
You can change
the appearance
of a whole
diagram, but not
Which of the following statements is TRUE regarding individual shapes
PowerPoint diagrams? of a diagram.
Which keyboard key combination is used to undo
the previous command(s)? [Enter+A]
Microsoft visual basic project file has _______ file
extension. .vbg
In visual basic, _______ method is used to add an
item in a combobox add
In visual basic, _______ method is used to load
picture during runtime in an image control load
The dialog box that is used to determine the page setup from
documents margins is the file
________ is a box surrounding a page on all slides or
a line that sets off a paragraph on one or more
slides border
The key that is used to perform a task to select all t
he text in the documents is ctrl+a
The key that is used to indent a paragraph is ctrl+a
The key that is used to change the font from the
current positioned in a document is CTRL+SHIFT+F
The key that is used to change the style of the
document that is from that normal to heading1 or
heading1 to other document styles. ctrl+shift+f
Set mapping' Check control that follows a text-type
validation, we use ----------------- application for data
analysis. Excel
Excel can import data from other databases for the
data analysis. TRUE
A System Auditor can uses CAAT tools to analyze
data FALSE
Analysis
translates
program code of
a high level
How do you define analysis of an information language to
system? machine code
For technical
What are User Guides are used for? support
Operating
systems and
Systems software can be categorised into: system services
Magnetic tape
Which storage device cannot be erased? storage
To maintain a
backup copy of all
Application software are programs that are written the information
Which bus carries information between processors
and peripherals? Data bus
Peripherals that
are connected to
What are utilities? a computer.
Numbers are stored and transmitted inside a
computer in binary form
used to indicate
A parity bit is uppercase letters
the contents of these chips are lost when the
computer is switched off? ROM
Clock speed is measured in bits per second
Every data from the primary memory will be erased Power is switched
if off
a parallel
An RS-232 interface is interface
For print quality you would expect best results from line printer
is faster to access
ROM than RAM
increased the
storage capacity
of a computer
A UPS system
is a form of ATM
smart card card
having several
programs in RAM
Multiprogramming refers to at the same time
having several
softwares running
Multitasking refers to at the same time
What are small high speed memory units used for
storing temporary results? ALU
A good way to exchange information that changes
rapidly is through brochures
it is not possible
to change the
height of only
With reference TO TABLE WHICH OF THE selected rows of
FOLLOWING STATEMENT ARE false a table
A new section is
created in order
to change
properties like
Which of the following statements related to a number of
Section Break are True columns
The user can set a spelling checker to skip the
marked part of the next true
New option under the file menu of word creates a
new blank document that is based on the normal
templates true
The user can split the screen only into two parts true
The features that enables the user to type text
graphics tables anywhere in the document without
pressing enter or tab drag & drop
The user can modify the picture from the clip art true
automatically
corrects common
With reference to auto correct which of the typing, spelling
following statements are false errors
With the reference to password protected
documents which of the following statements are password can not
false include spaces
send a public
message to
Using an electronic bulletin board, Seema can do all friends interested
of the following except which one? in one topic
Aryan has created a ten-page story, but only wants
to print the first two pages. What printer command
should he select? Print all
What process should be used to recall a document
saved previously? Enter
Which is used to indent text within a document? closing
Desktop publishing is a more sophisticated form of
which of the following types of software? database
To analyse
What is a Word Processor used for? figures
What is a picture that is saved on a diskette and can
be pasted into a document? subscript
What basic tools would you find in the Edit menu of Clear, replace
a word processor and select
Text at the
bottom of every
What is a header in a document? page
Mouse, printer
and processing
system
What hardware is essential for a word? keyboard?
The user could take a picture from a magazine and
insert it into the document by using a Browser
Assume you are creating a two-column newsletter.
Which type size is the most reasonable for the text
in the columns? 6 point
Given the default left and right margins, and ½-inch
spacing between columns, the width of each column
in a two-column document will be: 2½ inches.
To give the
original author a
chance to accept
suggested
changes from the
Which of the following statements would NOT be a person who
reason for showing suggested revisions in a Word entered the
document without changing the original document? revisions
A line appears
Which statement is NOT true regarding revisions through text that
made in a Word document? is to be deleted.
The Versions
command will
allow you to save
multiple versions
of a document,
including any
changes that may
Which of the following is TRUE about saving a have been made
document using the Versions command? to that document.
All versions are
What happens when you open a document that has opened
been saved using the Versions command? automatically.
Word displays a
When opening and working with multiple versions of list of the dates
a document, how can you tell which is the most and times each
recent version? file was saved.
Various fields are added to a regular document to
create a special document called a form through the
____________ toolbar. Fields
Which of the following types of fields CANNOT be
inserted into a form? Check boxes
Text at the
bottom of every
What is a header in a document? page
setting it in larger
A pull quote is best emphasized by: type or font size.
The reverse
technique means
to add dark text
on a light
Which of the following definitions is CORRECT? background.
Pertaining to newsletters, which of the following
cannot be changed using the Columns command The width of each
dialog box? column
As related to type size, how many points are there
to the inch? 6
Assume you are working on a newsletter in which
the masthead extends across the top of the entire
first page. The rest of the newsletter has two
columns. What is the minimum number of sections
in the newsletter? One
Press Ctrl+Enter
Which of the following is NOT correct with respect to to create a page
page, column, and section breaks? break.
same as
Multiprocessing is multitasking
To help keep sensitive computer-based information
confidential, the user should save the file
to calculate
What is the function of a disk drive? numbers
data to be
transferred to
The memory address register is used to store memory
data to be
transferred to or
The memory data register is used to store from memory
an instruction
that has been
The instruction register stores decoded
Which of the following is used to indicate the
location on the computer monitor? a cursor
A mathematical procedure that can be explicitly
coded in a set of computer language instructions
that manipulate data. Formula
Which of the following translates a program written
in high-level language into machine language for
execution? Assembler
Memory
Detecting errors in real memory is a function of protection
To find where a file has been saved on disk, the use the directory
user should search tools
A series of instructions telling the computer how to
process data or files is defined as a Network
save copies of
the file with the
To ensure that data is not lost if a computer system same name on
fails, the user should the system
Having a single CPU alternatively process tasks
entered from multiple terminals is called Multiprocessing
The place in the CPU where the data and programs
are temporarily stored during processing is called
the ROM
The data hierarchy from the largest to the smallest Character, field,
is database
Which of the following hardware or software system
controls provides a detailed record of all activities Valid character
performed by a computer system check
Which one of the following parts of a computer is
necessary to enable it to play music? Sound card.
An educational CD-ROM on Indian Poets contains
1000 pages of text, 500 colour pictures, 15 minutes
of sound and 1 minute of video. Which of the four
different media listed takes up most space on the
CD-ROM? Text
Which one of the following printers is suitable for
printing sprocket fed carbon copies? Laser
viewing an
Multimedia software can be most productively used encyclopaedia
for CD-ROM.
replaced
To be effective a virus checker should be regularly
universal port
UPS stands for serial
The use of
computers to
design state-of-
the-art, high-
What is a computer-aided design system? quality products.
To maintain a
backup copy of
are written all the
Application software are programs information
Which type of file search method requires a
computer first read all locations preceding the
desired one Direct
Allows computer
signals to be send
over a telephone
A modem is a device that line
A compiler does a
conversion line
by line as the
What is a compiler? program is run
Feasibility study,
system design,
What are the stages in the compilation process? and testing
Which of the following is not a data transmission
coding scheme CRC
An interpreter
does the
conversion line
by line as the
What is the definition of an interpreter? program is run
A device used in data communications to divide a
transmission signal into several sub-bands is known
as a Modem
Third generation languages such as COBOL, C, and High-level
FORTRAN are referred to as languages
It is faster than
Serial Communication is used over long distance parallel
because it communication
Communicate
with the console
The primary function of a front-end processor is to operator
Specification and
What is the first stage in program development? design
Which of the following is not used for data
transmission within a local area network Fiber Optics
The different
types of network
What will a good software provider consider? to be used
The topology of a network can be each of the
following except Star
What is the 8-bit binary value of the decimal
number 85? 10101010
Which is the most common data transmission error
checking method Parity
What is the decimal value of the binary number
1111? 15
Which of the following devices merges
communication signals onto a single line Port
used to indicate
A parity bit is uppercase letters
Because it
squeaks when
How did the computer mouse get its name? moved
What are you most likely to use when playing a
computer game? Touch screen
CPU performance may be measured in BPS
A GUI is hardware
First - generation
UNIVAC Computer belongs to the computers.
Name the first Indian Super Computer? Vishwajeet
Very important
reader user
What does acronym VIRUS stands for sequence
Electrically
An impact printer creates characters by using...? charged ink
mainframe
A client-server system is based on technology
A nanosecond is 10-6 sec
A procedural control used to minimize the possibility
of data or program file destruction through operator
error is the use of Limit checks
_______ software enables users to send and receive
data to/from remote computers application
A _____ is a running instance of an application project
Splitting of CPU's time for different tasks _______
prevents time slicing multiprocessing
file management
______is the most advantageous database system system
A new user initiates a new process of execution at
the background,while the user can continue his
query process as usual in the foreground. This
situation is referred to as ______ multiprocessing
Integrated
system dynamic
ISDN stands for _______. networks.
_____________ is the Worlds largest computer
network . Ethernet
_______is/are a popular front end tool visual basic
When LAN connected together ,it is called __________
. MAN
System
modulation
SMTP stands for __________ . transfer protocol
The __________ protocol is a network protocol to be
built for the World Wide Web . Transfer Protocol
operating system,
Hardware components in a computer are bootstrap, kernel,
_____,____,_____,______ shell
_______ software are programs that are complex and
can be developed or purchased operating system
_______ is a set of special instructions used to
communicate effectively with the computer batch
_______ converts a high level language into machine
language processor
_______ translates assembly language program into
machine language instructions compiler
OPTIONS
B C D ANS
false A TRUE
INVOICE OR
Bill A or B None of the above C BILL
Three Four Five B THREE
FALSE A TRUE
FALSE A TRUE
$ & ^ A *
Puchasing, ORDER
Puchasing and Accounts payable Receiving and RECEIVE AND
Receiving and Receiving Accounts payable D PAYABLE
Display CREATE,ALTER,
Alter Information Information All of the above D AND DISPLAY
F5 F6 F7 C F6
Ctrl+P Shift+P None of the above A ALT+P
ELECTRONIC
Enterprise Data - Electronic Data DATA
Information Interchange. All of the above C INTERCHANGE
FALSE A TRUE
3 4 5C 4
TRUE B TRUE
Open OPEN
Calculator Change Period None of the above B CALCULATOR
16 18 21 B 16
TRUE B TRUE
F5 F6 Alt+f5 B F5
Primary Cost
Primary Category All of the above C PRIMARY
False A TRUE
F4 Ctrl+f2 Ctrl+f4 A F2
False A TRUE
Alt + f6 function
key F7 function key None of the above A F6
False A TRUE
F7 F8 F9 C F8
NAME ND
an identity A and B None of the above C IDENTITY
Changes in
Ledger Masters Both A and B None of the above C TRUE
3 4 1B 3
F10 F11 F12 A F9
FALSE A TRUE
FALSE A TRUE
Primary Symbol None of them B PRIMARU
FALSE A TRUE
228 28 16 C 28
Other programs -
a spreadsheet or
a database file. Both A and B None of the above C BOTH
System Capacity
feasibility report Planning Exception reporting C
VSAT RAM AGP Card B VSAT
FALSE A
FALSE B
FALSE A
no B
FALSE A
FALSE A
false A
false A
false A
false A
review and
evaluate the to obtain a
types of data record layout extract data from file A
can bring the
data indirectly all the above none of the above A
False B
False A
use of
accounting absence of audit
codes trails all the above D
risk driven
approach unique approach none of the above B
processing
options, file data checks and
structure controls all the above D
false A
false A
source of data
for material
planing all the above none of these A
false A
providing access
to computer to
all organization use of any
personnel programs none of the above D
false A
conceptual/physi
open/closed cal all of them D
false A
false A
false A
manage
hardware & enable multiple
software user resource
resources sharing all the above D
false B
false B
with production
departments all the above none of these A
false A
false A
false A
false A
false B
planning
language model base all the above D
false B
false B
decentralized
picture of a
system all the above none of the above A
false A
false B
false A
false A
false A
false B
on quarterly
immediately basis none of the above B
false A
false B
blocks of nos. to
the primary random
attribute of the placement of
the entity component none of the above D
false A
invalid, none of the
alphabetic above all the above A
regrouping, none of the
events above all the above A
false A
false A
false A
false B
false B
interactive
data interactive data
extraction and innumerable
analysis analysis none of the above B
false A
false A
false B
false A
no B
re-perform
procedures
provide carried out by
information to the clients
the audit programs all the above D
false B
no A
false A
false B
false A
no A
can enable the can provide the
auditor to auditors with
execute useful
provisions on a information with
number of trend s and
different bases patterns all of the above D
no A
examination of
identifies source code of
program code a program with
which may be advice to
there for following the
fraudulent logic of a
reason program none of the above C
ACL ALC ACLL B
false A
false A
false A
false A
none of the
file, hardware above all the above A
false A
false A
authentication of
information resource
support requested all the above D
job connectivity
language all the above none of the above A
no A
false A
false B
false A
stratification and
statistical/arithm frequency
etic operation analysis all the above D
false B
false B
false A
false B
add chart chart insert chart C
for specifying
conditions with
for updating group by
records clause none of the above C
false A
RAP RAID none of the above A
false B
false B
Dynaset field
field property properties properties B
row/column
queries select queries update queries A
row/column change/delete
queries queries update queries A
Record
Operations Form Operations None of the above B
$ @ ? D
false B
unbound
control data less control data control B
option control
control wizard wizard tool wizard C
false A
false A
false A
false B
false A
false A
false B
false A
false A
false A
false B
false B
false B
false A
false B
bar both 1 and 2 none of the above C
false A
false A
false B
select query delete query append query B
false B
false A
false B
false A
false B
embedded stand alone sub chart D
false B
false B
false B
false A
the last field of
the table primary key field none of the above C
false A
false A
false B
use datasheet in
use import forms use export D
false B
false B
false B
false A
false A
false A
false A
# ? * D
false A
detail group topic C
false A
false B
false A
false B
false A
event -
structured query procedural based
language language none of the above C
false A
false A
Spreadsheets
make data easy
to analyse Using queries None of the above C
forms in a
related tables in
database are
a database are consistent with reports are consistent
consistent with the underlying with the underlying
one another. tables or queries. tables or queries. B
query and its
main form and a associated report and its related
subform. dynaset. query. A
the primary key
of the related a field from an not a primary key of
table. unrelated table. either related table. B
EmployeeLastNa
CompanyID me CompanyAddress A
The customer’s
ID is deleted
from the
Customers table,
The customer’s and all the
ID is deleted related loans are
from the deleted from the An error message is
Customers table. Loans table. displayed. D
The subform is an
object on the form
The subform is The subform is and can be moved or
displayed in displayed in Form sized like any other
Datasheet view. view. object. D
A one-to-many A one-to-many
relationship relationship A many-to-many
between teams between coaches relationship between
and coaches and teams players and teams C
M ¥ * C
The Customers
table only when
there are Loan
records
associated with The Loans table
that customer at any time Neither table C
prompt, icon, title bar text, title bar text, icon,
title bar text. prompt, icon. prompt. B
Structured
Question Structured Query Relational Question
Language (SQL) Language (SQL) Language (RQL) C
Database
Management Data Business Relational Model
System Model System Manager B
the DBMS
accesses the
database data None of above All of above A
entity-relationship
normalization data models data modeling A
entity-relationship
normalization data models data modeling B
entity-relationship
normalization data models data modeling D
entity-
relationship data
normalization modeling data migration D
hierarchical
models network models relational data model A
the order of the the order of the more than one column
columns is rows is can use the same
important unimportant name C
design the
database create one or move the data into
structure more new tables the new database A
were essentially
killed off by MS have poor are not true DBMS
Access response time products B
Their report
delivery is more
difficult than
report delivery
for reporting Nonintegrated
systems. data None of the above A
An application
may consist of
multiple
databases, each An application can be
with multiple All objects in an created in such a way
objects, linked to application, that it objects such as
yet another including the forms and reports can
database tables, must be changed without
containing only reside within the disturbing the existing
tables. same database. data. C
Digital
Certificate Digital Signature None of the above C
Digital Signature
Verification Both A and B Either A or B C
Subscriber
Relying Party Institutional
Cost Overhead None of the above A
Certified Certificate
Authority Authority None of the above A
False A
False B
False A
False A
Certificate certificate
Resource List Revocation Letter None Of The Above A
External Format
File Transmission File None of the above C
False B
Primary Key and Public Key and Public Key and Private
Private Key Password Key D
Satellite Area
Private Network Network None of the above B
Passive or pull- Glow sign or
based hoarding
advertising strategies All of the above D
Corporate Industrial
espionage espionage Economic espionage C
Contact numbers
of the
management A competitor’s new
group Research data project B
multi-user e-commerce
database database
application application None of above C
Message
authentication in Encryption
EDI systems performed by a Security at the
performs the physically secure transaction phase in
same function as hardware device EDI systems is not
segregation of is more secure necessary because
duties in other than encryption problems at that level
information performed by will be identified by
systems. software. the service provider. C
convert text to
columns wizard tip wizard function wizard A
domain name
servers web servers none of the above B
the internet the internet
administration access none of the above A
biographical
information bookstores none the above A
on-line reference
works more information galenet A
in sequential in user-defined
order order none of the above B
mosaic,gopher,e communicator,ie,
udora,trumpnet lynx,winsock all of the above B
arpanet ARPANET none of the above B
defensive
dedicated and advanced
registered research projects
projects administration
administration net none of the above C
begin first none of the above B
packet
switching,store smart network
and forward and dumb
network network none of the above B
Not True A
Formal Legal
Formal Legal Requirements, Open
Requirements Open System System D
Signer
Efficiency authentication None of the above A
Document
Authentication Both A and B Neither A nor B C
Not False B
Conducting
Performing fraud-awareness Reviewing the
validity checks. training. systems-access log. D
Received by the
Not intercepted intended Sent to the correct
en route. recipient. address. A
Failure of server
Data entry duplicating
errors. function. Firewall vulnerability. D
Business-to- Backend-to-
Backend Business Business- to-Billboard A
Purchase Pre-purchase
consummation preparation Search and discovery A
Endorsement
model of
Online catalog marketing None of the above B
Shopping cart Billboard Pulling cart B
EDI For EDI For
Administration, Administration,
Consumer and Commerce and
Transport Transport None of the above C
Business-to- Consumer-to-
Consumer Business Customer-to-Company B
false A
or B
4-dimensions Multi-dimensions A
false A
Pivot table B
It is often used to
display share It is also used for
market prices indicating fluctuations
It shows trends over a period of in temperature
over time time changes B
Scenario
manager Solver Data table. C
Scenario
manager Pivot table Data table. A
false B
4-dimensions Multi-dimensions A
Pivot table B
It is useful when
several
components are
changing and
the user is
interested in the It can be
sum of the represented in 3-
components. dimensions B
Standard
deviation SumIf A
records tables worksheets D
It is a tool that
provides a way
to view and
compare the
results of all the
different It summarizes
variations the data by using
together on the analytical
worksheet functions. A
Scenario
manager solver Pivot table D
convert text to
columns wizard tip wizard function wizard B
/ * \ D
It is impossible to
C3/D4 D4^2 determine. C
6 SUM(H9:H11) G7*SUM(H9:H11) B
The phrase “active
It is displayed in cell” appears in the
It is blinking. reverse video. Status bar. A
By either clicking
in a different cell
By using the or using the By typing the
arrow keys to arrow keys to reference of the cell
move to a move to a you want to move to
different cell different cell in the formula bar C
Transfer
Create four information to a
separate files database Use multiple sheets D
newsgroups and
mailto and files search engines none of the above B
bulletin application
boards,mails call servers,proxy
and wireless servers and web
system servers none of the above B
business bulletin
broadcasting broadcasting
system system none of the above A
large very small none of the above B
Combines
connectivity of a Switches data
hub with the from incoming
traffic regulation ports to outgoing
of a bridge ports. All of Above B
Two or more
networks Bridges and Hubs Hubs and nodes B
frames Packets None of the above C
It continue on to
It gets destroyed target device
bit by bit. with corrupt data None of the above B
Wired Ultra violet
Technology technology None of the above A
have to do with
Web pages the Internet none of the previous A
is a CPU
is a CPU register functional unit make of processor A
is a protocol for the
used to browse is part of transfer of files
the Web Netscape between computers D
uses wireless
communication is part of
medium Netscape None of the above D
a screen saver
a form of virus program none of the previous D
is a CPU
is a CPU register functional unit make of processor A
is a protocol for the
used to browse is part of transfer of files
the Web Netscape between computers D
is a protocol that
uses telephone is part of allows for remote
lines Netscape login D
Any layer can
communicate
Any layer can only with the Any layer can
communicate layer directly communicate only
directly with any above or below with the layer above
other layer. it. it. C
It is made up of
many networks
connected into
transmission It works the Individual computers
lines called same way as a can connect to it
backbones. local network. using an ISP. A
An attack with
the purpose of Giving out Changing the content
gaining publicity disinformation of a Web page D
Disruption in Disruption in All of the above are
communication supply lines correct. D
Shutdown of
military security Contaminating Shutdown of nuclear
systems water systems plant safety systems D
To obtain an accurate
inventory of network
To improve related equipment
To improve system response and parts and network
network services time nodes D
stop its
limit access to competitors update its prices as
computer seeing their soon as they are
owners only prices changed D
Yahoo People USA People
Search Search Lycos Search B
So IP addresses So email is
can be shorter delivered faster None of the above A
People
discussing a
topic of interest High volumes of
globally email None of the above C
autolayouts and
presentation slide view &
templates outline view none of the above B
false A
false A
false A
To help in To provide a
creating a To allow the repository for images
ToolBar editing of icons used by other controls D
Windows
Open dialog box explorer Input box D
InputBox function
InputBox can be created
function returns with the macro MsgBox statement
a value, while recorder, while can be created with
the MsgBox the MsgBox the macro recorder,
statement does statement while the InputBox
not. cannot. function cannot. B
28 18 36 C
.wmf(windows
metafile) .txt(plain text) .doc(document) B
displayed only
during the slide displayed only in
show outline view none of the above A
contains sample
it is the quickest presentations for
way to create a a variety of provides suggested
presentation topics content and design D
12 102 22 B
A dialog box is
displayed
allowing you to
enter the name
of the Excel
worksheet that
should be The datasheet window
embedded in the The datasheet is is toggled from closed
PowerPoint saved as a to open (or from open
presentation. separate file. to closed). D
The application that
The chart is The chart is created the chart is
deleted. doubled in size. started. A
The chart is The chart is Microsoft Graph will
deleted. doubled in size. restart. D
a slide one bullet item
at a time, build bullet
items a letter at a
time, and build bullet
bullet items one bullet items one items a word at a
letter at a time. word at a time. time. D
Subtle, Moderate, or
Moderate Exciting Exciting D
Both enter and
exit, and fly in Neither enter nor exit;
Fly in from top or from top or neither fly in from top
bottom bottom nor bottom C
The advanced
timeline shows The advanced
the sequence in timeline shows
The advanced which objects will neither the sequence
timeline shows appear on the in which objects will
the duration of slide and the appear on the slide,
the effect duration of the nor the duration of the
applied to each effect applied to effect applied to each
object. each object. object. C
Organization Clips, organization
charts Text charts, and text D
Dir1.Path = File1.Path =
Drive1.Drive Dir1.Path none of the above B
UnloadMode UnloadMode
Cancel parameter to a parameter to a zero
parameter to 0 non-zero value value A
2 0 11 A
printer setup
from the file print preview
menu from the file none of the above A
FALSE A
TRUE B
Analysis is the
loading of This involves
programs that looking at a
perform routines system and
to control finding out how
peripheral information is
devices being handled None of above C
Inputs, outputs,
file design Maintenance,
hardware, and reliability, and
software upgradeability None of above B
To execute any To maintain
programs security None of the above D
Copied from the Transferred from the
disk Saved to the disk disk A
Users operate
the computer Users operate
system from a the manual
given date system None of above B
To help someone
To do a who is applying
particular task. for employment None of the above B
provides backup
power in the
increases the event of a power
process speed cut none of the previous C
has more
storage capacity is an access card
than an ATM for a security contains a
card system microprocessor C
writing programs
in multiple
multitasking languages none of the previous A
the ability to run
2 or more writing programs
programs in multiple
concurrently languages none of the previous D
online layout
view browser none of the above A
micro soft
outlook express outlook hotmail A
false A
false A
false A
a document file
can be inserted a multiple
in the current documents files an .xls data can not
document at can be inserted be inserted at
specified in the single specified position in
position document the current document B
false A
false B
false A
Hyperlink
Child Document Document none of the above A
send private
send pictures to messages to a send a package to a
a friend friend friend D
From ___ To ____ Page setup Print preview B
Keyboard, Monitor,
Mouse, monitor keyboard and
and printer mouse None of the above B
impossible to
2¾ inches. 3 inches. determine. B
to move a
section of text to leave an original
from the original section of text in
to store a file on location to place while pasting a
a diskette another location copy elsewhere D
A set of different
Mainly text graphics None of the above B
Grammar
Spell Checker Checker Find and Replace B
Delete, then
Cut, then paste paste Insert, then paste A
To give the
original author a To complicate
chance to reject the revision
suggested process and to To allow multiple
changes from force the author people to work on one
the person who to spend more document in
entered the time making collaboration with one
revisions corrections another C
A vertical line
outside the left
margin signifies a
A red underline change has been Comments are
appears beneath made at that enclosed in a text box
text that is to be point in the at the right of the
added. document. document. D
Through the
Tools menu by
choosing Track Through tools on Both through the
Changes the Reviewing Tools menu and the
command toolbar Reviewing toolbar D
The Versions
command will
allow you to The Versions The Versions
save only one command will command will allow
version of a allow you to save you to save only two
document, only one version versions of a
including any of a document document: one
changes that without any version of the original
may have been changes that and one version of
made to that were just made any changes made to
document. to the document. the document. A
The latest The first and
version is second versions The previous version
opened are opened is opened
automatically. automatically. automatically. B
A grid is a set of
A dropped cap is horizontal and vertical
A pull quote is a a word that starts lines that determine
quotation taken with a lowercase the placement of
from (pulled) letter when it elements in a
from another should have a newsletter or other
document. capital letter. document. D
10 12 72 D
FALSE A
FALSE A
False A
False A
Artificial
Compiler Intelligence Parity Checker B
use different
filenames on the keep a record of backup to a secure
system computer failures medium D
Multiprogrammin
Time sharing g Multiplexing D
Telephone
Word Processor modem Shareware A
Database,
character, record File, record, field Element, field, file C
Maintenance
diagnostic
program Systems logs Parity check C
Document Graphics
processor package Spreadsheet D
retain
make efficient confidentiality of
use of time files simplify file structures C
1024 4096 8192 C
duplication of
data virus infection loss of data D
IT management IT understands
lacks leadership. the business None of the above B
Software that
generates
Using computers innovated
to do designs and
architecture. artistic patterns. None of the above A
Application
Service Provider enterprise local B
ensure the
filename is not
lost identify the file identify the file type D
detective corrective All of the above are
controls. controls. parts of IS controls. D
Ask the person Use the Find or Put your hand up and
next to you. Search feature. ask the teacher C
program change
call lights requests resolution procedures C
data testing thread testing loop testing A
Peripheral
processors. Concentrator. Job control language. D
Time sharing
Modem Multiplexor computer C
Executor Electronic
systems mailing Instant post-office C
An intelligent A personal
workstation computer A mainframe PC B
Encryption
algorithms Parity checks All of them C
Terminal Communication Device interconnect
Standard protocol standard D
A compiler
converts the A compiler is a
whole of a general purpose
higher level language
program code providing very
into machine efficient
code in one step execution None of the above B
Lexical analysis,
Implementation CONVERSION,
and and code
documentation generation None of the above D
Testing to check
for errors before Hardware,
the system is Software and size
introduced of program. None of the above B
Packet Ring Bus B
External file
Control figures labels Cross footing tests C
processed
symbol connector symbol input/output symbol B
hp vectra fazitsu vp200
system series IBM-PC B
host
processing dumb processing data processing B
disk
redo logging defragmentation disk mirroring D
Modulation/De Module/De-
modulation module None of the above B
Integrated Integrated
Symbolic Digital Services Digital
networks. network. None of the above. C
LAN and WAN LAN and MAN LAN WAN and MAN B
ATM Internet Intranet A
Web based Web based Web based
Technology Transport Transaction A
Routers Protocol Repeaters B
batch command program D
control program,
interpreter, monitor,
assembler, program, CPU, memory,
compiler keyboard, bus input, output D
application
software windows 95 interpreter B
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*