You are on page 1of 249

OPTIONS

QUESTIONS A
TALLY
The ------ key can be used to select an existing
1 company from list of companies. F1

Import and Export of data between Tally and other


2 programs is possible only through ---------- Program. Tally ODBC
The re-order point is the inventory quantity that
3 trigger a stock replishment activity. TRUE
A created company's detail can be modified through
4 keys F3
A/An ------------- is the official notice that the firm
sends to its customers to advise then to the amount
5 of money that is owed. Invoice
6 In tally,all masters have ________main options Two
In tally,to create a new column in balance sheet
7 press _______ Ctrl+C
In tally,the use of group behaves like a sub-ledger,
option is that we can summarize many ledger
8 accounts into one line statements TRUE
In tally, we can alter ledger details using either
single or multiple modes but not alble to delete a
9 ledger from multiple modes. TRUE
In tally,a group company is marked with an
10 ______________ *

The systems that work together to order,receive, Puchasing and


11 and pay for replenishment of stock are --------------- Accounts payable
Tally allows to delete a ledger from ---------
12 alteration mode. Single
--------------------- is/are useful for management in the Cash Flow
13 decision making. Statements
In tally,the group company must contain at least
14 _____________ members Two
To cancel a vourcher entry in Tally, short-cut key is
15 ----------- Alt+D

The accounting masters and inventory masters Create


16 related to Information
We press ------------- function key to display the age-
wise analysis of Bills Receivable or Bills Payable
17 report F4
18 In Tally, we press ------------, to print report . Alt+P
In Tally, Types of Accounts and Types of Vouchers
passed during the period, can be seen in -------------
19 report. Tally Audit
In the Tally Software, the ------------ directory stores
20 all data entered by the user. Bin
The Ledger Accounts are unique in Financial
21 Accounting Packages True

Customers can be permitted to enter their own data


into the firm’s computer using the firm’s wide area Enterprise Data
22 network is an example of Interchange
In Tally, we can customize the Vouchers as per our
23 requirements TRUE

24 The number of steps in Accounts Compilation are 2


Each action/transaction of a firm is described by a
25 ----------------. data element

26 Tally is based on mercantile accounting system FALSE

Display stock
27 Ctrl + N is used to ----------- valuation method
------------- in Tally classify the accounts under
different heads so that summarised information is
28 possible. Ledgers

29 Revenue Account also known as -------------- Account Personal

30 Method of Voucher Numbering is/are Manual

31 Accounts Receivable are displayed in Balance Sheet


To assemble a product from different items
32 -------------- entry is used Journal
A --------- purchase orders data flow is directed to
the purchasing system for use in closing out the
outstanding purchase orders in the receiving
33 system diagram. Filled
Tally provides at least --------- predefined voucher
34 formats 11

The value of the inventory is included in a ledger


35 accounts as an asset on the balance sheet FALSE
" The buyers can follow up with the suppliers to
determine the reasons " is an example of management by
36 ----------------- objective

From voucher entry mode , if we press __________


37 then we get payment voucher in tally F4

38 Default Cost Category in Tally is/are -------------- Main Location


A Group Company is simply a name and an identify
given to the merged accounts member companies
39 of the group. True
A ----------- is a primary document for recording all
40 financial transactions. Ledgers
The field can have a value between ________________
41 in FA Package. 0 to 9
The _______ file maintains data that describes the
supplier past transaction with the firm in terms of
42 material quality in AIS Supplier
It is necessary to manipulate data to transform it
43 into ---------------- Report
In tally, to change the date of the voucher press
44 ______ F2

45 Tally can maintain budgets on ---------------- Net Transactions


The value of the inventory is included as an asset
46 on the balance sheet True

In ratio analysis report of Tally FA packagewe we


press ________________ function key to the display of
47 bills receivable , bills payables report F6 function key
The accounts payable system is responsible for
48 paying the suppliers for the ----------------- Sales
What is the default financial year in Tally6.3 1-4-1995 to 31-3-
49 _________________ 1996
Tally encrypts and stores TALLY DATA at the data
50 directory True
The Profit & Loss statement can be displayed in
51 ---------------- format(s). Horizontal
Balance sheet &
profit & loss profit
& loss and trial
52 Default ledger accounts in tally are ______ balance

53 Default 'godown' name in tally is ____________ Primary


Security
54 'Tally vault' is a _________________ mechanism
To create a sales voucher in tally , you have to
55 press _______ F5
A Group Company is ------------------------- given to the
merged accounts of member companies of the
56 group. a name
In tally,"credit note" voucher type records entry for
57 ________________ Sales return
In tally you get currency symbol option from _______ Company
58 menu creation
------------------ gives the balance for each day for the
59 voucher type has been selected. Trial Balance
For 'stock journal' entry we press ______________ in
60 tally F7
Tally provides the capability to the Changes in
administrator/auditor to track changes in the areas transactions or
61 is/are vouchers
62 In tally, types of users are _______________ 2
By pressing -------- key, a list of inventory reports
can be displayed straightaway from the balace
63 sheet report F9
Projected approximation of income or expenses is
64 called ______________ . Balance sheet
"Administrator" type user is also called 'Auditor' of a
65 company in Tally TRUE
You will get company information , if you press
66 __________ from gateway of tally F3
A constituent(member) company can be a member
67 of more than one group. TRUE
68 Default stock category in tally is ______ Main location
To create a log of the import activity in a file
_____________ is located in the same directory as an
69 executable program in tally Tally.imp
In Tally,inventory valuation method option is
70 available from _______ Stock summary

Tally audit feature is available in a company By pressing F11


71 __________________ function key
In tally, a group company can also be a
72 constituent(member) of another group company TRUE
73 Default number of groups in tally are ________ 128
Ledger
74 During voucher entry ------------- are used. Accounts

75 User designated as --------------- can view audit list. Administrator

One company to
another company
created withon
76 Tally supports Importing of data from ---------------- Tally Package
In an accounting information system, which of the
following types of computer files most likely would Inventory
77 be a master file? subsidiary.

Does not require


Which of the following is an advantage of a as stringent a set
computer-based system for transaction processing of internal
78 over a manual system? A computer-based system: controls.

data to be
transferred to
79 The memory address register is used to store memory

FUNDAMENTALS OF COMPUTER

Inefficient usage of excess computer equipment can Contingency


80 be controlled by Planning
Which of the following is not the component of a
81 CPU NIC Card
A trailer label is used on a magnetic tape file, it is
the last record and summarises the file. The
following is an information not found in the trailer
82 label Record Count

Writing on a hard
83 Hard copy is a term used to describe...? board
Voice activated
84 What do the abbreviations VAB stand for broadcasting

What control would prevent the accidental erasure


85 of customer information from a magnetic tape Validity check
What are the individual dots which make up a
86 picture on the monitor screen called? Coloured spots
Header label normally include all the following
87 except the File Name

88 A daisy wheel is a type of...? Printer


Which approach or technique is a control usually
89 associated with microcomputers System Logs

Electrically
90 An impact printer creates characters by using...? charged ink

The best security control in a microcomputer Restrict


91 environment is to physical access
92 What would you NOT use with a flatbed plotter? A pen
93 What do you need for an ink jet printer? A cartridge

The greatest control exposure in a microcomputer Separation of


94 environment is the lack of duties

95 A laser printer does NOT use? A print head


The amount of data that a disk may contain is
96 known as the disks...? Volume

97 You can ________ protect a floppy disk. Read


Information on a hard disk is usually backed-up
98 using a...? Magnetic tape

Serial access
99 Magnetic tape is a...? medium
Hard disks can have a storage capacity in the region
100 of...? 1.44MB
Which storage device has the largest capacity in
101 Mb? A CD-ROM

102 Which storage device cannot be erased? A CD-ROM


By a sunny
103 Where should floppy disks be stored? window
The contents of these chips are lost when the
104 computer is switched off? ROM chips
What are responsible for storing permanent data
105 and instructions? RAM chips
Which parts of the computer perform arithmetic
106 calculations? ALU
What are small high speed memory units used for
107 storing temporary results? CPUs
How many bits of information can each memory cell
108 in a computer chip hold? 0 bits

109 What type of computer chips are said to be volatile? RAM chips

Network software
and security
110 Software can be divided into two areas: software
Travel agents use this computer system when
111 reserving flights Supercomputer

Which computers are used in the weather Notebook


112 forecasting industry? computers
First
113 Vacuum tube based electronic computers are...? generation
Which generation of computer was developed from Second
114 microchips? generation
Which generation of computer uses more than one Second
115 microprocessor? generation
Which generation of computer developed using Second
116 integrated circuits? generation
Which generation of computer developed using solid Second
117 state components? generation

DATABASES

Specification,
Name three steps involved in developing an Design, and
118 information system Testing
119 _______ is used for CAAT as database Oracle
Generalized audit software perform auditors to
undertake any past records and not concurrent
120 auditing TRUE
Generalized audit software is a file whose
121 capabilities for verifying processing is logic TRUE
CAAT's are computer program and data that auditor
uses as part of the audit procedures to process data
if audit significance contained in an entity
122 information system TRUE
CAAT do not contains package programs, purpose
written program, utility programs or system
123 management programs yes
Embedded audit routines are sometimes built into
an entity's computer system to provide data for
124 later user by the auditor TRUE
SCARF involves embedding audit software modules
within an application system to provide continuous
125 monitoring TRUE
Concurrent use auditors as the member of the
system TRUE
Regular cross system verification may minimize
frauds true
Computer security is frequently associated with
confidentiality, integrity and authentication true
Data reserve engineering process metadata to
document system and abstract business rules and
relationship true
to determine
the audit
The first step for developing CAAT is_________ objective
Using the open database connectivity feature in ACL can bring the
is ______________ data directly

Computer Assisted Audited Technique involves the


use of computers through "Black Box Approach" True
White Box Approach necessary involves expert
knowledge on the part of Auditor True
change in the
method of
The transition from manual system to CIS recording
environment bring dramatic changes including accounting
________________ transaction

documents driven
Auditing with computer necessarily supports the approach
hardware and
CAAT involves an Auditors' appreciation of software
__________ configuration
Widespread end use computing result in unlimited
errors creeping into system going to accept
handling, thereby increasing audit risks true

For computerized auditing usage of sophisticated


audit software would be a necessity true

the source of
data available
Important knowledge needed to begin planning the to the audit
use of CAAT is _________ organization
The move towards paperless EDI would eliminate
much of the traditional audit trail, radically changing
the nature of audit evidence true

Computer operation controls are designed to the of by all


provide ________________ concerned

Systems development control, apart from others,


include authorization, approval, testing,
implementation and documentation of new systems
software and system software modification true
natural/man-
A system could be _________ made
A system exhibits 'entropy' true
Super computer are the largest and fastest and is
very suitable for commercial application including
audit work true
Assembler language uses Mnemonic symbols true

Operating systems are devised to optimize the


machine capabilities, the function
include_______________ scheduled jobs

General purpose software provides a framework for


highly complex scientific operation true
In batch processing, transactions are processed one
after another true

The use of computer assisted audit techniques is with audit


not gaining popularity not only ________________ departments
On-line processing refers to grouping of transaction
and processing the same in one go from start to
finish true
Real time refers to the technique of updating files
with transaction data immediately after the
occurrence of the event to which it relates true
In OLRT the CPU should process the capability of
program interruption true
Time sharing system allow access to a CPU from
remote terminals true
DSS is defined as a system that provides tools to
managers to assist them in solving structured
problems true

DSS has the following components _________________ databases


Master files contains current records for
identification and summarizing true
Transaction files contain relatively permanent
records take product profile, customer profile,
employee profile etc true

Master file configuration includes ____________ reference files


______ is a file management software package that
lets users and programmers organize data into files
and then process those files filex
to have a
complete
CAATS provide added value to the clients because picture of a
_______________ system
File volatility refers to the number of addition and
deletions to the file in a given period of time true
File activity is the proportion of transaction file
records that are actually used and accessed in a
given processing run: true
File interrogation refers to the _____ of information
from a file back-ups
One -to-one relationship means a single entity to a
single entity in a monogamous structure true
RDBMS is structured to a series of 2 dimensional
tables true

seriously affected
SADB stands for ____________ database
Controls are present over many aspects of the
computer system and its surrounding social
environment true
In framed checking the data entry is checked
against an expected picture or format true

Errors are correlated_________ at the year end


Field check is exclusive to a field true

_________ law basically states that there is a specific


probability of the first digit of a no. being 1,2,3 etc Benfish

Check digit is a group of nos. added to a code for


determining the accuracy of other digits in the code true

consecutive nos.
or alphabets to
Hierarchical code means _________ entities
The validation checks applied to a field depend on
the field's logical inter relationships with other fields
in the record TRUE
The contents of a field could determine _______ sign
for a ______ field valid, numeric
Batch is the process of ______ together _____ that grouping,
bear some type of relationship to one another transaction
Hash totals means meaningless totals true

With OLRT where interactive data entry is available,


the master file associated with a transaction may be
searched for confirming data true
Controls are required for authorization to ensure
data integrity and detect possible breaches in
security true
Data from client application are not stored in the
organization's database through auditables events
and function true
All input records in a batch are normally of different
types true

incremental
design and
IDEA stands for _________________________________ enlarge activity
A transaction file is sorted prior to the update of
master file true
A sequence check on the transaction or master files
by an update program is not required true
Whenever monetary transactions are processed
against master files, the update program should
maintain a correlation account to record such
transaction that does not have a matching master
file record true
Internal tables are stored tables from which certain
values are extracted for further processing and
storing true

For small to medium sized systems, individual


modules are coded and individually tested and then
assembled to be tested as a whole-the testing
strategy is referred to as ___________________ e-brain

In systems testing, test involves_________________ bottom up tests


Recording transactions in a controlled manner may
amount to loss of stored data yes

read data on
Audit software is used by the auditor to _________ client's file
Core image comparison is a software used by the
auditor to compare _______ version of a program executables,
with a secure ________ copy master
Database analyzer is a software which provides
detailed information concerning the operation of the
database true

system analysis
SAS stands for ______________ software
Embedded code is a software used by the auditor to
examine backup data true

Embedded code performs wide variety of audit task yes


Core image comparison is particularly useful where
only executable versions are distributed true
Log analysis is a software used by auditor to detect
virus true

On line testing techniques the auditor ______ data


either _______ or fictitious in order to see that a manipulates,
specific program or sever edit test is doing its work real
Mapping software is used by the auditor to list
unused program instructions true
Mapping software has very objectives yes

can be very
Modeling is a variety of software which powerful
________________ analytical tool
On line testing can be targeted for specific functions
carried out by programs yes

provides detailed
information of
Program code analysis involves _____________ machine uses
__________ is a software of CAAT IDEA

Snapshot is software which takes a picture of a file


or data or a transaction passing though the system true

fictitious data
applied against
the client
Base case system evaluation includes____________ program
While base testing forces on finding if there are any
defective execution policies in a program true
Black box testing seeks to determine whether
application output is what it is supposed to be true
In integrated test facility approach the auditor
should ensure that the impact of test transaction is
subsequently eliminated from the computer files true
Black box testing is _______ based and white box specification,
testing is _______ based program

identifying
Source code review means__________ erroneous code
In formula in flow hypothesis the auditor should
expand the extent of substantive tests to
determine how the defects may impact the
attainment of the program objectives true
All material application oriented events that occur
within the boundary subsystem should be recorded
in the accounting audit trail true

In examination of audit trail the following data start and finish


associated with an event may be ___________- time

job control
JCL means_________________ language
Audit should be periodically analyzed to detect any
control weakness of the system yes
In an accounting audit trail, intrusion detection
system might monitor the amount of processor time
consumed by the user to detect unusual deviation
from the amount processor time requested by the
user in the past true
A sample size calculator program assists auditors in
determining RAND() function true

package
computer
p[program for
performing a
variety of data
processing
Generalized audit software consists ___________ function

prepared by the
Specializes audit program may be___________ auditor

Generalised audit software could be used by the


following in consistencies or significant fluctuations true
file
Generalized audit software function access/organizati
include____________ ons
In the file reorganization merging capabilities are
needed in data from separate file is to be combined
on a separate work file true
Auditors cannot use generalised audit software to
extract the data needed for audit purpose true
Auditors can combine functional capabilities of examining the
generalized audit software to accomplish the task of quality of system
__________________ process

Wide access to
Which of the following is not the feature of GAPs various data base

Which is the example of CAATs ACL

A sample of
In audit procedures, test data is transactions

Tests of details of
Which of the following is not the use of CAATs transactions
Which of the following are called explicitly by
another procedure? Macros
_________ data type is generally used for fields
assigned as primary keys in a table integer

MS access objects can be published in the web true


In code-builder, got_focuse, click,dbl_click,enter are
examples of _______ actions
_______can be used to automate certain actions in
response to events report
In the macro sheet the macro is selected in the
_____field macro

To build complex expressions_____is used calculator

The three list boxes present at the bottom of the


expression builder are called_____ action list
________option is selected from the view menu to
create macros with conditions conditions
_______report can be created with minimum user
input tabular

_______layout of a form displays one record at a time tabular


The table or query name on which we are going to
build our report is selected from the ____ dialogue
box create report
______and_____are the two types of auto reports columnar and
available tabular
There are no wizards for creating a database in
access true
______option from the insert menu option is chosen
to add an embedded chart create fields
In ms-access, while using SQL, references constraint
is used for creating _______ primary key
_______is used to create a mailing label label wizard
______header is present at the beginning of the
report start header
______is present at the bottom of each page in a
report report footer

for ordering
In SQL, having clause is used for _________ records
______field is added to the macro sheet when we
select grouping option from the view menu condition
______can be used to create toolbars VB Modules
_______query is used to add records from one or
more tables into an existing table add
_______window is used to write VB code in access
application report
Values for other tables, queries are maintained in
look up fields data type true
Visual Basic language is a _____ tool RAD

______ function is used to display a message box SysCmd

Other ms-office applications can be accessed from


ms-access using a concept called ________ OLE

object linking
OLE stands for_____ and embedding
The application that supplies data in OLE is called
an _________ OLE object
If any change made on the object from the client
side is reflected on the server then the object is said
to be _____ linked
_______is the file format that works on internet exe
______ is used to convert any ms-access object into
html format form wizard
_______ option in publish to web wizard produces a
page that is static in nature static file
_______query is used to create or change database
objects in a current database append

Currency fields express the amount in _________ dollars


_______is selected from the toolbar to add an OLE
object unbound object
To display an OLE object in the form of an icon ____
option is selected from insert object dialogue box display as icon
_______option from the file menu is selected to run
'publish to the web wizard' create html

_____page in an web application is used to navigate


to the rest of the pages in the application startup
______ is fired when an event is triggered is the
concept based on a Visual Basic language bullet
Ms access is a ___________ DBMS
A collection of data stored in different objects is
known as a _________ data group

A blank database can be created using __________ new dialog box

Text type data can be of _____ characters in ACCESS 255


______is a datatype that assigns values automatic
automatically number

Tables cannot be imported from other databases true


If two tables having same values for the fields are
joined it is called an ______ inner join
Duplication of records in a field won't be allowed if
the fields are declared a________ primary key

Changes from a master table can be reflected on to cascade delete


the child table by selecting _____option related records
To see more than one record at a time in a form we
use _______ columnar

In SQL, delete command is used to remove _________ table or tables

In MS-Access, filter excluding selection will display


only those record(s) which meet the criteria. true
Properties of the fields are managed by _____ in
Dynaset property field
______queries allows us to view data in row by crosstab
column manner queries
The type of queries that can update or delete
record(s) in a table(s) are called __________ action queries
Joining tables without any matching values in the
fields is called ____________ inner join
Primary key uniquely identifies each record true
Which of the following dialog box is/are used in the new form dialog
creation of form ________ box
_______ query wizards are used to generate
summary calculations for a table summary
Properties of a form can be changed by selecting change
______from view menu options properties
Forms that are included in other forms are called
______________ included form
In MS-Access, while using form design view, for
creating a command button for adding a new
record, we should select the _______ category from Record
the command button wizard Navigation

_______ form displays fields in a single horizontal row columnar form


The process of arranging the data in a meaningful
order is known as ___________ filtering
______ are used to select only some particular
records from the table or any other database
objects filter
In MS-Access, user may specify criteria for filter in
form view using _________ filter by form
___wildcard character represents any single
character *
Records cannot be sorted by a primary key true
A control without a data source is known as
___________ bound control
Set of related option buttons, check boxes and
toggle buttons is known as _____________ button group

Which of the following is control types ____________ bound


In MS-Access, the function that gives the current
date is _____________ CURRDATE()
_____is a control that lists set of data text box

______is a form that summarize large amount of data pivot table


______allows to create a filter by typing the value in
a data sheet data sheet filter

Wizards for toolbox controls are called a __________ button wizard


The wild card representation for any 5 letter word
that starts with ram is ________________ ram*
Look up fields slow up data entry true
____is an access object that displays un-editable
data report
_____option from the new object toolbar gives the
easiest way of generating a report autoreport
______ represents data in a pictorial format chart
Changes of one table can be carried over to another
related table true
Hyperlinks are used to jump to any kind of
information or data from a file true
The memo field can have text upto_____ characters
in length 60,000
In MS-Access, columnar layout can be used to view
multiple records in a form true
In MS-Access, alter command may be used in
adding a primary key to a table true
Update query is used to add records from one or
more tables to the end of an existing table true
In ms-access, datasheet view is available in
___________ table
______are used to jump to any kind of information
from a datasheet or a form table
Home page will always be present as a first page of
an application true
Make table queries create a new table from the
records of another table true
In ms-access, to protect a database file from illegal
access, we may set database password. The option
of setting database password is available in _______
menu Insert
Foreign key is a field that uniquely identifies each
record and accept no null values true
Data definition queries are used to create or change
database objects true
The attributes of a composite key are known as
________ alternate keys
OLE object is a data type in access true
Data displayed in forms cannot be edited true
A sub form is used to display one to many
relationship between tables true
We can switch from datasheet view to form view by
selecting view -> form view option true
In MS-Access long integer is a datatype true
In MS-Access, while designing a table for a
particular field, the Required parameter is set to
yes. This validates the field as _______ null
Sorting is applied to select only some particular
records true
Filter by form can be created from a forms shortcut
menu true
Advanced filter uses a filter similar to the query
design window to create a filter true
? Wildcard character represents any number of
characters true
_________ of the following is/are a type of chart pie
A bound control is tied to a underlying query or
table true
A calculated control uses expression as a source of
data true
Text boxes cannot be bound controls true
The default query invoked by ms-access is update query
A control can be bind to a record using row source
property true
List box is a control that offers a list of choices true
If a table is joined to itself it is called a
________________ inner join
A picture box combines the activities of both a text
box or a list box true
Line is a tool box control true
Text boxes can be part of a option group true
_____ chart exists as a separate object freestanding
Filtering data is a way of arranging data in a
meaning full order true

Wild card characters are used for sorting records true


Pivot tables are used to navigate to the other tables
in a database true
Reports are used to represent un-editable data true
In MS -Access, the records in a table are sorted the first field of
based on _________ the table

Relationship is an association between _________ forms


Summary options dialog box is used to summarize
data true
______ queries can be used to delete a group of
records that meet some specific records delete
Charts can convert numerical data in a easily
understandable format true
Embedded charts exist separately true
From ms - access, if we want to view the records
stored in a table in ms - excel worksheet, we need
to use hyperlink
Page header is present at the beginning of each
record true
Detail section has a header and footer true
A macro is performed only when the user initiates
an event true
The macro is selected from the action field of a
macro sheet true
A macro can be made to execute before the starting
of a database true
In MS-Access. While appending records, the source
and the target table must have similar structure and
fields true

We can add our own functions to the expression


elements list box of the expression builder true

_______is the wildcard character which represents


the presence of any number of characters &
Macros can be used to add a menu to a database
object true
_____ header is a unique feature of reports page
Chart can either be a form or a report true
Group header will be present at the design view of a
report even if the report is not grouped true
We can change from the design view to the form
view without being prompted for saving the changes
made true
Charts can be produced without the wizard true
Macros can be used to create user defined error
messages true
Between and Not Between is ______ type of
operators relational
The default data type of VB is integer true

Visual Basic is based on __________ action language


_______is the name of the database object that
displays data and can be used to edit data report
In access OLE objects cannot be linked true

_____ section is present for each record in the report group


A ________ sheet lists all the properties that pertain
to the form or the controls data
Textboxes can also be an example of unbound
control true
In MS-Access, we may design command buttons for
navigating records true

_______are forms that are included in other forms sub forms


_______ are used to represent our data in graphical
format graphs

A field with a _______ uniquely identifies each record number


Large amount of data can be summarized using
______ tables pivot
_______ are employed to select only some particular
records from a database object filters
______ control need not have a data source form
______ control combines the functionality of both a
text box and a drop down list list box
MS access is a DBMS true
A form can be bind to a record source using _____
property of the form form name
______ forms displays field in single row tabular form
______ forms are usually used for tables with one to
many relationship sub forms
_______ control uses an expression as a source of
control calculated
_______ control is tied to field calculated
_______is the form that can be created with
minimum input from the user sub form
______option from the tool menu is selected for
setting relationships between tables set relation
option, toggle
______,______and_____are the buttons belonging to and command
the options group buttons
_________allows us to create a filter from a field
short cut menu filter by form
________is a database object which displays data but
cannot be used to edit data form
What term applies to a collection of related records
in a database? clipboard
All of the following terms are related to
computerized databases except which one? search

A way to analyse
and manipulate
numerical
What is a database? information

Information about
What does a record contain? certain programs

An RDBMS is a remote DBMS


storing data
offline at a
Data Warehousing refers to separate site

Unauthorised alteration of on-line records can be


prevented by employing Key verification

Reports allow
users to extract
information as
hard copy
What is a report? (printed output)

Extracting and
What is the best way to analyse and change data analysing data

Compilers,
What are some popular office orientated software interpreters,
applications? editors
DEFAULT and
Which of the following constraints can be used to NOT NULL
enforce the uniqueness of rows in a table? constraints
Which of the following commands is used to change
the structure of table? CHANGE TABLE

You are creating a client application that calls


ActiveX DLLs. Which of the following properties of
the Err object provides the name of a component
that sends an error back to the client application? Number

This database holds personal information. The user


can help to keep it confidential by using a password
If the database holds customer names and
addresses, personalised letters can be created
automatically using the product code
Application software suited to storing the survey
information obtained in the table would be A database
The characters * and ? are sometimes used in
search criteria as bookmarks
Which of the following field types will generate the
primary key automatically? Auto Primary

records in a
dynaset are
consistent with
the underlying
Referential integrity ensures that the: tables.

Tables are related to one another through a: foreign key.


the primary key
of both related
A foreign key is: tables.
You are creating a banking database to track
customer loans. The bank will, of course, have many
customers, each of whom may take out one or more
loans, while each loan may be associated with only
one customer (there are no joint accounts). What is
the re One-to-one

In a one-to-many relationship between Companies


and Employees, which field is found in both tables? EmployeeID
Which of the following ensures that records in
related tables are consistent with one another? For The Tools menu,
example, it ensures that you cannot add a record Relationship
with an invalid foreign key. window
How would you delete a relationship between tables Double click the
in the Relationships window? Relationship line
That there are
several
customers
In a Customers tables, what does a plus sign next to associated with
the CustomerID field mean? that ID

They must both


What is required of the fields that join two tables? be numbers

Assume a one-to-many relationship between the


Customers table and the Loans table, with
referential integrity in effect. What happens when Nothing, Access
you attempt to delete a customer ID from the ignores the
Customer table that still has entries in the Loans attempted
table? command.

Which of the following is true when viewing a main


form and its associated subform in the Form Design The subform is
view? not visible.

A one-to-many
Which of the following relationships does not belong relationship
in a database based on a professional sports league between teams
such as football or basketball? and players
Which symbol is used at the end of the join line in a
related table to signify the “many” side of a one-to-
many relationship? #

You have created a one-to-many relationship with


referential integrity between a Customers table and
a Loans table. From which table can you delete a Either table at
record? any time
The correct order of the arguments for the MsgBox prompt, title bar
statement is: text, icon.
The first statement in a procedure named CreateList
is: Dim CreateList.
A check box
enables the form
user to choose
from one of
Which of the following is TRUE related to form several existing
fields? entries.
must be set for
A text field: one word.

help people keep


The purpose of a database is to: track of things.
A database stores: data.
A database records: facts.
single-user
A sales contact manager used by a salesperson is database
an example of _______________ application
single-user
A Customer Resource Management (CRM) system is database
an example of_________ application

The industry standard supported by all major DBMSs


that allows tables to be joined together is called Sequential Query
__________. Language (SQL)

A program whose job is to create, process and Database


administer databases is called the _____ Modeling System
Microsoft Access may use which of the following
DBMS engines? Jet

Which of the following are basic components of an


enterprise-class database system? The user
the database
application(s)
interact(s) with
In an enterprise-class database system ________ . the DBMS
In an enterprise-class database system, the
database application ___ . creates queries

In an enterprise-class database system, reports are


created by ____________________ . the user

A database is considered "self-describing" because all the users' data


_______ . is in one place
In an enterprise-class database system, the
database _________ . holds user data

A database designed using spreadsheets from the


Sales department is a database being designed from existing
_________________________ . data
A database designed to implement requirements for from existing
a reporting application needed by the Sales non-database
department is a database being designed _______ . data

A database designed to combine two databases


used by the Sales department is a database being from existing
designed _________________________ . data

Database professionals use ________________ as


specific data sources for studies and analyses. data marts
Database professionals use a set of principles called
________________ to guide and assess database
design. data marts

A very popular development technique used by


database professionals for database design is
known as _______________________ . data marts

A very popular development technique used by


database professionals to adopt a database design
to new or changing requirement is known as _____ . data marts
The predecessor(s) of database processing was
(were) __________ . file managers
entities in a
column vary as to
In a relation __________________________ . kind
An attribute is also known as a(n)
. table
A combination of one or more columns used to
identify particular rows in a is___ . record
A combination of two or more columns used to
identify particular rows in a relation is________ . record
A determinant that determines all the other
columns in a relation is______ . record

When designing a database, one of the candidate


keys in a relation is selected as the _________ . composite key
Normalization is a process used to deal with which
of the following modification anomalies? Insertion anomaly
assess the
When you are given a set of tables and asked to existing tables'
create a database to store their data, the first step structure and
is to ____ . content
are supplied by
several well-
Modern microcomputer personal DBMS established
products______. manufacturers
They use
sophisticated
Which of the following are true about data mining mathematical
applications? techniques.
We have obtained access to the company's
operational data. We examine 50 records for
customers with phone numbers that should use the
current area code of 345. Of these 50 records, we
find 10 that still use an older area code of 567. This
is an example dirty data

We have obtained access to the company's


operational data. We have been asked to produce a
report with an item by item analysis of sales, but
the only sales figure available is the total sale value
for each order. This is example of_____ dirty data

data warehouse
A data warehouse database differs from an data are not
operational database because: stored in tables.
Which of the following objects is used to display a
menu? Form
Which of the following objects are NOT found in an Forms and
Access application? reports

It will be easier
for the user to
upgrade it if the
You are developing an Access application that you objects and
expect to upgrade periodically. Which of the tables are in one
following statements is TRUE? database.

The Link Tables


command can be
used to associate
the tables in one
database with the
Which of the following statements regarding Access objects in another
applications is NOT true? database.
Which of the following brings a copy of the table
into the current database and does not maintain a
tie to the original table? Import
It contains more
What makes a database an application? than one table
What is the Access tool that is used to create the
user interface? Menu Wizard

create backups
for mission
critical corporate
The purpose of a data warehouse is to: data.

___________ means the result of applying to specific


information certain specific technical processes. Digital Sign
__________ is an algorithm which creates a digital
representation or "fingerprint" in the form of a "hash
result". Hash Function
__________ is of standard length which is usually
much smaller than the message but nevertheless
substantially unique to it. Hash Function

Digital Signature involves two processes. They are Digital Signature


___________ and __________. creation
Institutional
Overhead and
Subscriber
The Costs of Digital Signature consists mainly of the Relying Party
following Cost
Certification
CA stands for ________________ Authority

A Digital Certificate is issued by a Certification


Authority and is signed with the CA's Private Key True

A Digital Certificate does contain Owner's Public


Key, Owner's name, Expiration date of the Private
Key, Serial number of the digital certificate True

______________ enable web servers to operate in a


secure mode. Server Certificate
______________ are used by individuals when they
exchange messages with other users or online
services. Server Certificate
______________ are on-line databases of certificates
and other information available for retrieval and use
in verifying digital signatures. Private Certificate
Evidence,
Signing Writings serve the following general Ceremony,
purposes______,_______,_______ and _______ Approval
The most widely accepted format for Digital
Certificate is defined by the CCITT X.509 True

A certificate may prove to be unreliable, such as in


situations where the subscriber misrepresents his
identity to the certification authority True

Certificate
CRL stands for Revocation List
The prospective signer identified in the digital
certificate holds the_________ and is called the Private Key,
___________ Subscriber
In EDI interface, the translation service receives
_________ as incoming files from the communication Internal Format
service File
The EDI standardisation for International Trade and
Commerce is introduced by __________ ANSI
In EDI, the transmission files are composed of
different sets of external format files which are
grouped into multiple sets under the name of
________ batch files
The ________________ are pre-paid credit cards that
include an embedded cards Smart Card
________________ are another form of credit payment
that lets customers use digital online cheques to
pay Web merchants directly E-cash

In Active advertisement, there are two types of Billboards and


models. They are _____ and ________ Junk Mail

The network based technology is/are ____________ EDI

Decryption is a process employed for scrambling of


plain text for web based transactions True

Asymmetric cryptosystem is based on __________ Login_Id and


and ____________ Password

Value Added Network is an example of _________ Global Network

The advertising strategies emerging in the on-line Active or push


world are ____________ based advertising

The _________ model use direct mail, spot television


or cable television, in active based advertisement. Broadcast
The ________ is a form of mail that is not targeted to
a specific audience E-mail
The __________ model refers to information that is
placed at a point where it will be noticed by
customers in the course of other activities and does
not require active search Catalog

The most beneficial advantage of ERP system is Error checking

What is the term that describes spying on one’s Competitive


business rivals to gain a competitive advantage? espionage

A list of
What would you NOT be looking for when spying on competitor’s
a competitor? clients
single-user
An online drugstore such as Drugstore.com is an database
example of_______ application

Which of the following is an example of Replying


unacceptable online ‘netiquette’? promptly

Removable drives
that can be
locked up at night
provide adequate
security when the
Which of the following statements is correct confidentiality of
concerning the security of messages in an data is the
electronic data interchange (EDI) system? primary risk.

The wizard that is used to import text files text import


is_________________ wizard
The alphabet indicating the column followed by the
row number is known an__________ cell reference
Which of the following files could not be opened in
excel _______________ text files
In excel, the dates that are stored as sequential
numbers known as ________________- serial values
The command to display the current date in a cell is
_________________ =today()

In excel, absolute references are represented by a


________ before the column and row addresses dollar sign
The ________ can be used to select the function and
assemble the arguments correctly AutoSum

Specific parts of information required by functions


to perform certain tasks are called as___________ variables
Which of the following do not belong to the formula
category in excel environment__________ text
The function that in used to join cell values together
in a single cell ________ concatenate
The function that is used to count all the values that
meet specific criteria _________ countif
The wizard that is used to create and edit charts
_______________ pivot table wizard
The function that is used to calculate the payment
for specific loan terms ____________ sumif

The function that is used to add together all values


that meet specific criteria is known as ____________ average
The __________ option present in the file menu
options is used to specify major facts of the page to
be printed page setup
The command that is used to apply a format
automatically __________ autoformat
The ____________ makes the information in a
worksheet meaningful and easy to understand bordering
A particular part of a work sheet can be printed by
setting the _________ page setup
The process of finding or selecting information is
known as ____________ filtering
The option that is used to cancel the filter process
for a specific column and display all the records is
________ all option

The URL for encyclopedia Britannica is_________ www.ency.in


_______ maps IP addresses with the domain names
of the sites URL

Internet can be defined as _______ internal network


The most important service of the ______ is to
manage traffic control application layer
_________is a program that displays information
about a host connected to the net finger service
_______ is a program or a tool that helps in locating a
file anywhere on the net FTP

uniform research
URL stands for ____________ locator

IN an URL the word before the color refers to _______ host computer
A ______ always begins with a slash message
Prodigy is run by IBM and ______ Delphi
The World Wide Web is referred to shortly as the
_______ net
Gopher and WAIS enables the user to ______ browser
______ is the program used to run CompuServe's CompuServe
regular services internet dialer
Navigating through the menu of gopher is called
moving around _______ gophering
The directories that come with built-in engines are
yahoo,lycos and ______ Alta vista
To use the finger command,SLIP users must run a
programme called______ finger server
The web maps are called _______ list

Directories consists of _______ levels no


The _____ level gives the broadcast overview of the
net middle
The huge list of keywords from important items is
called ______ hotlist
directory
The two types of search in veronica are _____ and search,index
______ search
_______ searches by keywords infoseek
Mosaic displays links in color whereas _____ does not
display links in color netshark
______ supports one button publish lynx
SPY MOSAIC is distributed by_______ Microsoft
______ is a program that helps us to log on to other
networks Usenet

Higher text
HTTP is the acronym for __________ transfer protocol
______is used to transfer and copy files over the
internet iccp
_____ is a program that helps us to log on to other
networks yahoo

transfer control
TCP/IP stands for ________________ protocol/internet
Archie servers can be accessed in_______ different
ways in internet one
_______is the computer on the internet that
translates between the internet domain names and
the internet numeric address ftp servers
the internet
TIA stands for_____ in internet adapter

Service indicates the name of the ________ used to


access data, present on the other end of the link. browser
universal
________ is used to link pages in the world wide web resource locator

frequent asked
FAQ stands for ______ query

The internet adapter is a programme that makes


our connection act like a _____or a ____ account SLIP,PPP
The step involved in Communicating between the
web clients and servers is ______________ connection

wide search for


information and
WSIRC stands for______ research

Two of the important browsers are_____ and_____ lynx,minx


Lynx is a _______ programme that works with world wide web
terminals server
The huge list of keywords from important items is
called an_____ glossary
very easy and
rodent oriented
net wide index to
computerized
VERONICA is an acronym for _______________ archives
university of
The first freenet is created at the_____ and is berkeley,berkeley
called______ freenet
________ are defined as ways of communication
amongst networks protocols
search
engines,directorie
______and_____ are web searching features s

WINWAIS has two source lists namely____ and______ allsrc,winsocks


________ is also called as WAIS manager allsrc
The system of interlinked documents is known
as_______ hot links
The small programmes that create
animation,multimedia,real-time games and multi
user games are called______ images
The information displayed on the web page graphics,videos,a
includes______,_____ and_____ udio
The web pages that represent online home of their
author are called______ first page

global network
GNN stands for______ news
_____ is the most popular internet service yahoo service
The online service offered by navigator gold 2.0 are email and net
_______ and_____ conference
_______ is a program or a tool that helps us find a file
anywhere on the net newsgroup
The databases to enable keyword search using
Lycos are a2z,_______ Lycos catalog
______ is a large worldwide bulletin board service
network apple link

computer related
abbreviations and
BABEL consists a glossary of _____ acronym

Dictionaries,encyclopaedias,government and other encyclopedia


references are found in ______ Britannica

Yahoo,lycos,excite and webcrawlers are _____ search engines


Graphical
interpreter
GIF is the acronym for ____________ formatting

Joint Pictures
JPEG is the acronym for ___________ Expert Group
The Web aids users to explore the ________ mails
The three most popular mailer are_____,_____ yahoo,infoseek,al
and______ tavista

The World Wide Web consists of _________ information


In Microsoft Internet Explorer, the color of the text
can be specified using _________ attribute of the font
tag. BACKGROUND

The interface that provides effective communication Communication


between the web browsers and servers is _________ gateway interface
CGI is the _________ between web browsers and
servers Network
CGI programs are invoked based on the information
provided by the _________ Current web page
A CGI program is usually called after a request
made by the _________ Browser/user

A hyperlink can be on ___________ text only


HTML was derived from _________ SQL
SGML is a _________ alphalanguage
palm is not
PINE stands for _____________ eatable
The application that confirms whether a document
is compliant to its DTD is _________ SGML Processor
Web is a collection of ___________ web sites

Internet
equipment
IETF stands for ________ training faculty

MS Internet
The two major browsers used to surf the Internet Explorer and
are ________,_______ Mosaic
Special characters allow browsers to display
_________________ text
The keyword for providing links within or across
documents is____________ hyperlink

Stringing pages together using hypertext


technology helps view pages _______________ in random order
The initial web pages present in a web site is the
________ page. first
The image format supported by most browsers
is________________. .bmp and .gif
Service,
hostname and
The components of a URL are ___________ directory path

mail servers,mail
The mail we send has a mailing address and most of clients and
them correspond to_____,_____ and alternate services
Which of the following is not supported by internet
explorer _______________ <center>
communication
generated
CGI stands for ____________ information
Host name indicates the domain name of the web
________ Server
The internet is also called as _______________ arpanet

The internet is similar to _________________ LAN

The net drivers______ from one place to another data

The net provides interesting services scripting,parsing


like______,______ and______ and compiling

The windows internet software available nt,windows95,ie,


are______,_______,________ and______ winzip
________ is the ancestors of the internet dnet
defensive
administrative
rank
DARPA stands for administration
_______________________________________________ network
The uuencode files start with a _______ start
milnet,smaller
DARPA is broken into ________ and _______ arpanet
NSFNET is the united states provides service to education,researc
_____ and_____ h
The first international IP network connections were united states and
established in 1973 with _____ and_____ UK
A_____ is a set of computers interconnected by
transmission paths to exchange information in
internet server
A computer that provides a service usable by other
computers is called______ client
A_______ is the representation of physical
connectivity of the computers in internet network card
detailed
transaction
DTE stands for ____________________ explanation
The basic function of the ______ is transmitting the
bits over a channel application layer

point to point
network and
The point to point channel network is also called as broadcast
_____ and_____ channel network

Accessing files using FTP servers is called_____ file access


The three most commonly used networks
are______,______ and______ PAN,NAN,AAN
________ is in between LAN and WAN VAN
_____ can be owed by multiple organisation LAN
Data is transmitted in the form of_____ signals analog
Data type
DTD stands for __________ definition
Moralize/demorali
Modem stands for __________________ ze
______ is the process of the digital signals being
converted into a form suitable for analog
transmission Mapping

________ and______ are two basic ways of getting Satellite link and
connected to the internet digital signals

Standard long
SLIP stands for ________________ internet protocol
Prime prolonged
PPP stands for _____ protocol

Which of the following best describes uploading storing data on a


information? disk drive
A characteristic of a communication channel that is
the amount of information that can be passed
through it in a given amount of time, expressed in
bits per second. Bandwidth
The act of searching through storage to locate
information without necessarily knowing of the
existence of the information being sought. Find

A "recipient" of the certificate desiring to rely upon


a Digital Signature created by the subscriber named
in the certificate is called the ____________ Recipient Party

The Relying Party can use the ___________ listed in


the certificate to verify that the digital signature
was created with the corresponding _________ Public Key

Digital Signatures are used for a variety of


Electronic Transactions like ________________________ E-mail
To associate with a key pair with a prospective
signer, a Certification Authority issues Digital
Certificate Not False
Digital Signatures, if properly implemented and Closed
utilized offer promising solutions to the problems of System,Formal
Imposters, Message Integrity, __________ and Legal
_____________ requirements
In, Digital Signature, _____________ perform the
"ceremonial" function of alerting the signer to the
fact that the signer is consummating a transaction
with legal consequences Affirmative Act

A Digital Signature must have the following Signer


attributes ________________ and _____________ Authentication
"Hash Function" is used in both creating and
verifying Digital Signature Not True
___________ provides assurance of the origin or
delivery of data in order to protect the sender
against false denial by the recipient that the data
has been received, or to protect the recipient
against false denial by the sender that the data was Nonrepudiation
sent. Service
________ is a branch of applied mathematics
concerns itself with transforming messages into
seemingly unintelligible forms and back again. Cryptography
The complementary keys of an asymmetric
cryptosystem for Digital Signatures are arbitarily
termed as _________, and ____________ Private Key
_______ is known only to the signer and is used to
create the digital signature. Private Key

_______ is ordinarily more widely known and is used


by a relying party to verify the digital signature. Private Key
____________ is the art of protecting information by
transforming it into an unreadable format. Decryption

Which of the following activities would most likely Using data


detect computer-related fraud? encryption.

A digital signature is used primarily to determine Unaltered in


that a message is: transmission.

Both sender and


receiver must
have the private
key before this
What is a major disadvantage to using a private key encryption
to encrypt data? method will work.

Which of the following risks can be minimized by


requiring all employees accessing the information
system to use passwords? Collision.
Business-to-
The acronym for B2B is ___________ Business
The _____________ model is the least intrusive model
but requires active search on the part of the
customer Billboard
__________ is / are a form of advertisement where
people relate their experience with products and Customer
services Endorsements
The _________ are software agents who
communicate with the business merchants on
behalf of the customers Intermediaries
The Pre-purchase preparation phase includes
_______________ for a set of products Order Placement

The _________ phase includes customer service and


support to address customer complaints , product Post purchase
returns and products defects interaction

The ________ allow companies to bypass the need for Billboard model
costly printed catalogs of marketing
A ________________ is a basket on the Net that is
used to place the items that are being purchased Online Catalog
EDI For
Administration,
Commerce and
EDIFACT is an abbreviation of ________ Transaction
The __________ allows for protocol conversion and
communicates with the bank using the banks
private network or the Internet EDI
In Ecommerce, data extraction, transforming the
data into transmittable form, transmitting the data
and downloading the data are the operations
employed in _________ Compiler
The _________ commerce assists in integrating the
customers and suppliers of the company directly Business-to-
into the organisation Business

E-cash means______________________ Emergency Cash


E-commerce is a tool that addresses the desire of
firms to cut services cost and improving the quality
of goods. It is a definition of e-commerce from Communication
_________ Perspective
The small denomination digital tokens are called
_________ Microcash
The ____________ is the process of encoding
information to prevent it from being read by
unauthorized parties Decryption
There are _________ types of data tables 1
The tables that allows the user to change or
rearrange the data, summarize the data and
evaluate the data using changing points of view is
known as data table
The wizard that is used to suggest hints for doing a
task pivot table wizard
In a chart Y-axis is known as_________ series or rank
In a chart X-axis is known as_______________ series or rank
_________ is a set of tables that describe each of the
data series series or rank
________ is used to differentiate one data series from
another series or rank
The chart that contains only one data series is
_________ column chart

The chart that holds the column chart is _________ column chart
The chart that display two or more data series on a
surface is _________ column chart
The chart that is used to display discrete data column chart

_________ are not allowed in a macro name spaces


Which of the following tool cannot be used to view
the excel web page_______ excel97
The wizard that used to build an interactive table
from data existing on sheets pivot table wizard
The chart that is used for displaying stock market
information line chart

In excel, the subtotal command also generates


grand total after the last group subtotal_________ true
In advanced filter , the criteria occupying multiple
columns but more than one row, is considered as an
________ criteria. and
The stacked bar graphs can be represented in
__________ 3-dimensions
A pie chart can represent only one data series at a
time true
The ______ generates a summarized report in
tabular form in an interactive manner Data table

It is also called as
Which one of the following statements related to high-low-close
stock chart is NOT TRUE ? chart
The state government needs to finalize a five years
plan to implement 100% literacy in the state. Which
one of the following will be the best tool that should
be used to work out the plan ? Pivot table
Forecast'99 is a group working on exit poll. It wants
to know how many seat ABC party needs to won in
totality to obtain majority to form the government.
Which one of the following will be the tool that will
help the team ? Goal seek
Which one of the following will be the tool that
provides a way to view and compare the results of
all the different variations together on the
worksheet ? Goal seek
A ___________ is an excel file where the user stores
his data Workbook

Performing
Spreadsheets are useful for _______________ calculations.
Which one of the following is NOT the component of
the pivot table ? Column field
Excel allows upto ______ levels of sorting two
Filtering rearranges a list to display the required
records true
The stacked bar graphs can be represented in
_____________ 3-dimensions
The ______ generates a summarised report in
tabular form in an interactive manner Data table
It displays the
data series one
Which one of the following statements related to on top of the
stacked bar chart is NOT TRUE ? other.
Which following function is used in subtotal option ?
______________ Count.
A workbook consists of many ________ databases

It is a tool for
summarizing and
analyzing the
data records in an
Which two of the following statements related to interactive
pivot table are TRUE ? manner.
Which one of the following is NOT a What-if analysis
tool ? Goal seek.

The _________ wizard separates contents in a cell text import


into different cells wizard
A spreadsheet is a grid of rows and columns and is
called as a ________ worksheet
Pick out the window that is not a form of excel application
___________ window
A dark wide
On an Excel sheet the active cell is indicated by… border
Cell A4 =2 and A5 = 4. You select both cells and
drag the fill handle down to A8. The contents of cells
A6, A7, and A8 are _____. 8,16,32

your formula has


If a cell shows  ####### , it means that _____. a syntax error
Which is not an advantage of using computerized ability to
spreadsheets? generate tables

The gym teacher has a new program to calculate


physical fitness in terms of weight and exercise. The
use inputs different weights or amounts of exercise
to determine the related physical fitness. This "What
if" program is most likely which of the followin word processing
The difference between the highest and the lowest
values. Range
Spreadsheets can be used for... Producing graphs

double-click any
To select a column the easiest method is to … cell in the column
If you press _____, the cell accepts your typing as its
contents. ENTER

The contents of cell C15 is =AVERAGE(C3:C14).


AVERAGE(C3:C14) is known as array.
All of the following are considered constants
EXCEPT: 100
Which of the following may NOT be included in a
formula? Cell references
Which of the following is NOT a valid mathematical
operator in Excel? ^
Given the formula =B5*B6+C3/D4^2, which
expression would be evaluated first? B5*B6

Which part of the formula +E12/6+


(G7*SUM(H9:H11) is considered a constant? E12
It is surrounded
How can you tell which cell in a worksheet is the by a heavy
active cell? border.

By clicking in a
How can you change the active cell? different cell

Which of the following would you use to change the The Standard
font size of a cell in Excel? toolbar
the New
The command that will save the current workbook command on the
with a different file type is: File menu.
The command that will print an Excel workbook is
found on the ____________ menu. File
In the Save As and Open dialog boxes, the
___________ view shows the file size as well as the
date and time a file was last modified. Preview

Which of the following commands will automatically


adjust cell references in formulas? Insert
Which of the following commands will remove cells,
rows, or columns from a worksheet? Clear
Orientation
Which of the following options is NOT controlled (portrait or
through the Page Setup command? landscape)
Which command enables you to change the margins
for a printed worksheet? Options
All commands are carried out on a rectangular
groups of cells known as a: worksheet.
Which of the following is a valid cell range? 6
In a copy operation, the cell(s) you are copying from
is called the: copy range.
In a copy operation, the cell(s) you are copying to is
called the: paste range.
Which of the following commands is needed to The Duplicate
duplicate the contents of a cell in another? command
A cell reference that does not change during a copy
operation is known as absolute
Which of the following is considered an absolute cell
reference? B4

Cell E3 contains the function =AVERAGE(A3:D3). If


the contents of cell E3 are copied to cell E4, what
will be the contents of cell E4? #DIV/0!
Cell E3 contains the function
=AVERAGE($A$3:$D$3). If the contents of cell E3
are copied to cell E4, what will be the contents of
cell E4? #DIV/0!

Which of the following commands is needed to The Move


transfer the contents of one cell range to another? command

copy and paste


The F4 key is used to: cells.
Which of the following quickly copies the formatting
of a selected cell to other cells? the Fill Handle

Select the Insert


Hyperlink
Which of the following will insert a hyperlink into an command from
Excel worksheet? the File menu.

whether the cell


Conditional formatting applies formatting to a cell has a formula or
based on: a value in it.

If you enter a date into a cell, Excel stores the date text with a two-
as: digit year.
You created a worksheet on July 30 and entered the
=Today() function in cell E17. You opened that
worksheet again on August 31. What will be
displayed in cell E17 on August 31? Jul-30

subtracting the
The number of days between two cells containing earlier date from
dates can be calculated by: the later one.
The function key that is used to quickly edit the
contents of a cell is: the F4 key.

What will be stored in a cell if 3/4 is entered in it? 03-Apr

A user’s response to the InputBox function can be a cell on a


stored in: worksheet.
The cell reference for a range of cells that starts in
cell B1 and goes over to column G and down to row
10 is _____. B1-G10

The teacher has a spreadsheet showing all Year 10


students and their marks in one Mathematics test.
To find the student with the highest mark, which of
the following functions should be used? AVERAGE
Which chart type best shows proportions of a
whole? Combination

Once a bar chart


is chosen it
cannot be
Which of the following is TRUE regarding chart changed to a
types? column chart.
To select several cells or ranges that are not
touching each other, you would _____ while hold down the
selecting. CTRL key
Your Institute teachers have set an assignment on
‘Studies’. You are required to use a spreadsheet to
record all that you study on each day for four
weeks. You decide to show each week’s data with
an accompanying graph. What is the best way of
doing this Use tables

What would be the best method to quickly copy the


formula from the active cell to each cell below it? Paste

To arrange rows in alphabetical order based on


column A, you need to use the command _____. Tools | Sort
What can you NOT do with a spreadsheet? Analyse data
To print just part of a sheet, you would select what click the Print
you want to print and _____ . button
The formula that will add the value of cell D4 to the
value of C2 and then multiply by the value in B2 is
_____. (D4+C2)*B2
Which of the functions is not valid for performing
addition 0

The default orientation for the printed page is _____. portrait


Which is not a valid cell address? AD213

The World Wide Web was devised by _________ CERN

yahoo and
The useful URL schemes are_____ and______ infoseek

news
The other ways of getting connected to the net groups,yahoo and
are_____ infoseek

bulletin board
BBS stands for______ system
USENET is a BBS on ____ scale small

WINSOCKS is expanded as______ windows socks


IETF Level 2 HTML DTD supports graphical browsers
like _______ Mosaic
The space used by Netscape to store the retrieved
page is called______ buffer

The principles, means and methods for rendering


information unintelligible and for restoring
encrypted information to intelligible form. Photography
A long string of seemingly random bits used with
cryptographic algorithms to create or verify digital
signatures and encrypt an decrypt messages and
conversations. Key
Protected/private character string used to
authenticate an identity or to authorize access to
data. User-id
The successful act of bypassing security
mechanisms of the system. Penetration

A set of rules and formats, semantic and syntactic,


that permits entities to exchange information. Acts
An attempt to get access to a system by posing to
be an authorised person. Spoofing
An action or event that might prejudice security. Loss
According to information Technology Act, 2000, To
investigate contraventions the controller of
certifying authority shall exercise the like powers to Sales - tax
that of authorities

Malicious software. Utility

None the person who is known as father of Internet Tim Berner Lee

This website is the biggest bookstore on the earth. Etrade.com

When we talk of Data Transmission modes, then Automated Tailor


ATM stands for Machine

A sequence of bits or characters that identifies the


destination and the source of a transmission. Acts

The means of communicating between networks Router

A group of computers and other devices dispersed


over a relatively limited area and connected by
communication links that enable a device to interact
with any other on the network. LAN

hyper terminal
The term HTTP stands for tracing program
National
Informatics
A NIC is considered as Center

A hub is a device that can connect Only Computers

Which of the following is true concerning the Concentrates


function of a switch? connectivity
Bridges and
What do routers connect? Repeaters.
What does a router route? bits
Software which prevents external access to a
system is termed firewall
If four computers are connected to a hub and then
to the internet, how many IP addresses are required
for these 5 devices? One

Which of the following in an OSI layer Physical Layer


When creating a network from just two PCs, what
kind of cable would be used to connect them? RG7U

An IP address is a Physical address


To construct a simple LAN of 4 computers, you
would connect them with ______connect them A cable

What happens to data that is ruined before reaching Data return to the
to receiver sender
Wireless
Bluetooth is technology

Which is not one of the recognized IEEE sub layers? Physical Layer
The most preferred number system to represent a
IP address is Binary
A MAC address is of 48 Bits
software that
facilitates
connection to the
Protocol is internet
A ............... is a LAN-based computer with software
that acts as a controlling device for controlling
access to at least part, if not all, of a local area
network and its available resources. Novell PC

What is the biggest disadvantage of the Ring


topology? There isn't one

The .............. of the network concerns how network


devices are physically (or optically) interconnected. Physiology
The principal topologies used with LANs are: Bus
What are the various types of bus architecture? Linear
What are the various types of ring architecture? Parallel
In a ................., each workstation attaches to a
common backplane via its own physical cable that
terminates at the hub Ring

In a ............... , each work station is directly


connected to a common communications channel Ring
Which one of the following is NOT a network
topology? Star
In a .............. , the cable system forms a loop with
workstations attached at various intervals around
the loop Ring
The Media Access Control (MAC) is a sub layer of
the: Network Layer
What are the most common LAN technologies used Ethernet, token
in networking today? ring, DecNET
Modem speeds are measured in bps
LAN speeds are measured in bps

usually higher
WAN speeds are than LAN speeds
Accessing the Internet from a typical home PC
requires the use of CD-ROM drive

must use the


To use the Internet, you World Wide Web

The worldwide web server uses the following key gateway


standard interface to act as the middleware: interface

a Novell Interface
An NIC Controller
Accessing the Internet from a typical home PC
requires the use of CD-ROM drive
The most widely used network operating system on
PC LANs is Linux
have to do with
compression of
graphics and
JPEG and MPEG video

A multiplexer is a form of Printer

provides access
An ISP to the Internet

used to send
FTP is email

used to send
Telnet email
used to protect a
computer room
from fires and
A firewall is floods

A proxy server is a backup server

A search engine is hardware


To look for information about interest areas on the
internet, the user should use a scanner

provides access
An ISP to the Internet
used to send
FTP is email

used to send
Telnet email

The layers cannot


Which of the following is a true statement about the communicate
OSI model layers? with one another.

Which of the following is NOT true about the It is one large


Internet? network.
The traditional intent and impact of this common
type of attack is to prevent or impair the legitimate Password
use of network resources. cracking

Which of the following is NOT an example of a DoS


attack that is popular among hackers? IP flood
A ____________ attack is when a hacker sends a
continuous flow of packets to a system. hack
One defense option on a large network is to
configure a ____________ to disallow any external
traffic. firewall

A proxy server is a backup server


Which of the following would be performed on a
network server and not normally on individual Apply security
workstations? patches

All sites are safe


What can be said about the safety of the Internet? and reliable.

To secure communication network against wire-


tapping the most effective control is Use of identifiers

One way that a virus CANNOT spread throughout a by attaching to


network is: an e-mail.

Which of the following is NOT a means of monitoring


employee use of company technology? Phone
____________ would be used by parents to monitor
their children on their home system. A Trojan horse
The formal rules and parameters which are
established to permit a microcomputer to
communicate with the mainframe computer as
though it was a terminal of the mainframe are
called Modems

The two most common tools used to help with cookies and
extracting information are: Trojan horses.

An attack on a
Which of the following would NOT be considered an system for
example of cyber terrorism? personal gain
Which of the following would be a form of cyber Economic
terrorism? damage

Crashing the
Which of the following is a likely target of a cyber stock market, as
terrorist that would cause considerable loss of life? in the 1930s

An organisation is upgrading its telecommunication


lines. Which is the least important objective while To carry more
upgradation network capacity

A company posts a price list of its products on its


website. The advantage to the customer is that the set its prices very
company can high
Which of the following is an easy-to-use service to
get information on someone? People Search
Which of the following pieces of information would Name of your
NOT be found online? bank
Which of the following is the most common danger
on the Internet? Virus

The famous Nigerian Fraud scam offered victims the


opportunity to: buy stocks.

The fraud type that sends e-mails that claim to be


from legitimate sites in order to obtain sensitive
information is called _________________. Shill bidding
Using the Internet to pursue, harass, or contact
another in an unsolicited fashion is called: Internet stalking.
Setting your privacy settings in Internet Explorer to
medium is one way to block: pop-ups.

What is the best means of protection from cyber Use a fake e-mail
stalking? address.
Which of the following is not an appropriate control
over telecommunications software Encryption
Encryption techniques can be implemented in
Hardware-Software I only
Which protocol would be used to download a free
anti-virus program from the Internet? irc

The major advantage of the checksum program is Adds more bytes


when it to programs

Which of the following is a Web browser? HTML

A Web page is another name for ----------- Web query.

Domain names must contain a description of the


type of organisation that the domain represents. A .com is used for
very common abbreviation used include: company

A standard language for creating and formatting


Web documents is: round trip HTML.
The Web page format in which all elements of a
Web page are saved as one file is called: XML.

using Internet
Explorer to view a
Web page that is
stored on the
Which of the following requires an Internet hard drive on
connection? your computer
Click on the Back
Mr Rao wants to find a website that he briefly arrow until the
browsed over yesterday. After turning on his desired site is
computer how would he do this? found

Which of the following is used to update a Web the Refresh


query? command

You download from the internet, a screensaver, a


ten-second sound file and a ten-second music video
clip. You also add a hyperlink. Which of the media
elements has the greatest effect on the file size? Hyperlink
When saving a photograph for use on a website,
which format should you choose? BMP
While researching the Direct taxes assignment, you
find a useful website. What is the most efficient way Save it to a floppy
to access the site at a later time? disk.
A system that uses the Internet for business-to-
business interaction is called a(n): extranet.
A block of text automatically added to the end of an
outgoing email is called an attachment.
_________ refers to the use of Internet technologies
for placing telephone calls. VoIP

Most client/server applications operate on a three- Desktop client,


tiered architecture consisting of which of the application, and
following layers? database.

Which do you NOT need to connect to the Internet? Modem

File Transfer
What does FTP stand for? Program

So computers can
be referenced by
What is the purpose of DNS? a name
Which of the following is NOT a properly formatted
IP address? 193.1.2.3
Which of the following is a properly formatted email paul .trigg @
address? domain. org. uk
The US
The Internet is controlled by whom? government

Internet Relay
What does IRC stand for? Chat

If you do not pick up your email for a week...? It will be deleted


Receiving
messages
automatically
from anyone in
What is a disadvantage of joining a mailing list? the group

In Powerpoint2000 ,the built-in professional design clipart & auto


elements are shapes
Selection handles are the 8 small ___________ that
appear around the object, when an object is
selected circles
The _______ is an invisible matrix of vertical and
horizontal lines that covers the entire slide
workspace square

_______ are drop-down menus that appear when the


right mouse button is clicked on the screen element tool bars
________ and ______ have the ability to add a lot of clip gallery &
visual impact into the PowerPoint presentation word art
_______ is a motion picture or any animation file wave file
In visual basic, when a record pointer reaches to the
last record, _______ property of a recordset object is
automatically set to ______ eof,false
In visual basic, the explorer view of a project is properties
displayed in ___________ window
In visual basic, when a record pointer reaches to the
first record, _______ property of a recordset object is
automatically set to ______ bof,false
In visual basic, _______ is a method to convert a
string into integer. value()
In visual basic, in a shape control, a vb statement
gives Shape1.Shape = 2. What type of shape should
we get? circle
In visual basic, a timer event is only available in
timer control. true

In visual basic, vbred or vbgreen or vbblue are the


property values of a backcolor of any object true
In visual basic, _______ is a property of a textbox
control to set a color of a text. fontcolor
In visual basic, _______ property of a textbox control
is set to _______ to underline a text underline,true
In visual basic, _______ property of a textbox control
is used to change the size of text. textsize
In visual basic, the interval property of a timer one- millionth of a
control is given in ________ second
In visual basic, _______ property of listbox control
counts the number of items in the list count
In visual basic, the properties of various controls form layout
can be set using __________ window
In visual basic, vbinformation, vbcritical,
vbexclaimation are the values of _______ in a
messagebox function. title
In visual basic, ________ is a function which displays
a message and it also allows the user to enter
values in a form object msgbox()
In visual basic, using a data control, ________ is a
recordset type which allows to add a new record
and also to update existing record in a recordsourse
object opendynaset

In visual basic, while closing a form _______ event of


a form object is triggered earlier to terminate event. load
In visual basic, to give a backcolor or to bring in a
picture to a command button can only be done if we
set the style property to ______ standard
In visual basic, a method RGB(255,0,0) will generate
_______ color blue
In visual basic, a method RGB(255,255,255) will
generate _______ color red
In visual basic, if a user uses a shortcut key ctrl+R properties
_________ becomes visible. window
In visual basic, if a user uses a function key F4 properties
_________ becomes visible. window
In visual basic, when a textbox control receives the
focus ________ event is triggered. change
In visual basic, a form is a ________ object. child
Microsoft visual basic is a Rapid Application
Development tool. true
In visual basic, when a form object appears on the
screen _________ event is triggered. load
In visual basic, to display text on a label object
_________ property is used text
In visual basic, _______ object is used to access the
database and also to manage the data in the
database. opendatabase

In visual basic, when a checkbox control is checked


_______ property is automatically assigned with 1. enabled
In visual basic, _______ keyword is used to declare a
variable dime

What is the extension of the Visual Basic project file


that stores the design of a user control. .ctx
Which event of a text box would you use for
validating the data entered by the user? Validate
Which of the following statements forces inline error On Error GoTo
handling? linelabel
The _______ method resets the contents of bound
controls to their original values when the user clicks
on the cancel button. UpdateControls
Cancel parameter
To deactivate the Form UnLoad event, you make to a non-zero
the following change in the function definiton: value

How many root nodes can a TreeView control have? 1

Consists of
A project group is a Project which: several Programs
Procedures declared in a _____ are local whereas Form window,
procedures declared in a ______ are available to the standard or code
whole application. module

How can you keep the user from exiting a form by Place code in the
clicking the Close button? Terminate event
The _______ property enables Visual Basic to draw
complete images in memory before displaying them AutoRedraw =
on the Screen. True

You want to display the code and the description of Msgbox err.no &
an error. What would be the correct syntax? err.text

To display images
What is the purpose of the Image List Control? to the user
Which method would you use to get a free or
unused File identifier while opening any file: FreeFile
Which property procedure is used to retrieve the
value of a property? Retrieve

Common
Which of the following can be shown to the user messages passed
using the Common Dialog control in VB? to Windows
Which of the following are not properties of
Command Button: Caption
Which events enable you to determine which key Click and
was pressed by the user? KeyPress
In order to access a file in Non-textual format, you
have to open file in: Ascii Format
Visual Basic displays information depending upon
the current value of two properties of the form, CurrentX and
called: CurrentY

Which of the following procedure types will execute


when you assign a value to a property of an object? Property Get

In order to overlap the controls (say a command


button) during design time, we use the ‘Send To
Back’ or ‘Bring To Front’ option from the Edit menu.
To change it dynamically (i.e.during program Background color
execution) we need to change: property
Which property of the ProgressBar determines how
much of the bar is filled? Min

The ______ function can be used to run any .com,


.exe, .bat or .pif file from a Visual Basic program. Shell

The caption and the name properties of the Are one and the
command button: same

You try to initialize a new Object variable with the You do not need
following line but receive an error. What could be to use the Set
the possible cause? Set MyVar = New Classname command here
Which of the following will perform a direct
execution of a Command object? The Open method
A warning query
The vb Critical symbol displays: icon

vbYesNo is an example of a(n): statement.

MsgBox
statement returns
a value, while the
The primary difference between the MsgBox InputBox function
statement and the InputBox function is the: does not.
Which of the following is TRUE about a protected
form (i.e., a form where the Protect Form button on Data cannot be
the Forms toolbar is toggled on and is assumed to entered into the
remain in that position)? form.
Which event is triggered when the user moves to
another open form? Unload
The user can use ______ to remove the undesirable
part of the image clipping tool
The power presentation has a _____ for a set of
compatible colors color palette
The set three colors used for graphs and for
secondary slide items is called as ascent
There are ______ types of charts available in
PowerPoint 10
_______ charts are useful while showing variations
over a period of time column

_______ are the individual pages of a presentation images


A PIE Chart is a ____ diagram that depicts the
relationship between a whole and its parts circular
Each individual piece of data in a series is
called a/an entity
Microsoft
PowerPoint launches an OLE-compatible application organization
called chart

When the user double-clicks on an organization the organization


chart object in PowerPoint chart is expanded
The _____ are used for selecting, editing and viewing
objects in the chart box tools

used to mange
organizational
Manager box tool in organizational chart window is chart
The custom drawing tools are _______ by default turned on

Click on the box tool ______ to draw three boxes once


There are ____ default fields available in all boxes of
the organizational chart two
The _____ tool is used in the same way as we use a
pen to draw a table native tool
A/An _______ consists of smaller printed version of
the slides autolayouts
The size of the object can be changed using the
______ tool zoom
_______ is the process through which the slides in
the current presentation are included in another
presentation or application importing
________ can be used to create charts as well as
worksheets Microsoft excel
PowerPoint can import text files that have been
saved in ______ format .ppt(PowerPoint)

PowerPoint outlines can have _____ outline levels nine


When a file is saved with _____ extension, the
graphics and text are also saved along with the .rtf(rich text
slide format)
not displayed
during the slide
The hidden slide is show
____ effect is used to introduce a slide during a slide DTS(digital track
show sound)
A _____ is a special effect that determines how the
objects appear on the slide build
The notes page is formatted based on the notes master
Pick the odd man out of the following outline view

When a new presentation is opened ,powerpoint


creates slides that have a width of _____ and a 15 inches,10
height of ______ with the landscape orientation inches
The default orientation for notes ,handouts and
outlines is ____ orientation portrait
Build effect is also called as ______ animation
Graphics for web pages are automatically stored in
____ format gif
A _______ is used to jump to any slide in the
presentation hyperlink
The ______ language has been incorporated into
PowerPoint visual c++
In PowerPoint _____ is a series of commands that are
executed in sequence macro
while creating
The macro will be activated a .exe file
Developers can easily add ____ to PowerPoint 2000
by using the programming interface virus checkers

______ determines the order in which order in which


the slides will be displayed during the show slide show
_______ is used to organize and develop the contents
of a presentation slide pane
If we save the presentation file as a metafile, it can
be opened using internet explorer

PowerPoint
creates a sample
presentation to
With reference to autocontent wizard for creating a which user can
new presentation, which of the following statements add words and
are not true pictures

user can insert


objects like clip-
arts, pictures
stored in a
separate files to
Which of the following statement is not TRUE the slides
in outline view,
drag the slide
With reference to changing the order of slides, icon to a new
which of the following statement is not true location

the slide that


holds the
formatted
placeholders for
the titles, main
text and any
background items
that user wants
to appear on the
slides is called a
Which of the following definitions are not true master templates

with notes pages


view user can
prepare speaker
notes and
Which of the following statements are not true handouts
the slide that
holds the
formatted
placeholders for
the titles, main
text and any
background items
that user wants
to appear on the
slides is called a
Which of the following definitions are not true master template
The options available in the common task toolbar
does not include slide layout

data to be
graphed resides
With reference to chart, which of the following in a datasheet
statements are not true window
The format of the text entered in a title, subtitle, or
bulleted-list object is determined by the format
settings in a special slide called -------- the master slide
PowerPoint provides a _________ that searches the
entire presentation i.e., all the text objects in all the
slides, outlines, notes and handouts for spelling
errors office assistant
PowerPoint's drawing toolbar contains _______
drawing tools 10
Click _______ on the rectangle drawing tools enables
us to draw multiple rectangles once

An example of the components of a multimedia text, graphics and


presentation could include email address.
Which of the following formatting elements can be
applied to a PowerPoint diagram using the
AutoFormat tool? the Line style
Which of the following formatting elements can be
applied to a PowerPoint diagram using the Format
AutoShape command? Fill color

Excel is started
What happens when you double click a blank graph so that you can
placeholder in a PowerPoint presentation? create a chart.
always taken
from the first row
of data in the
The legend in a Microsoft Graph chart is: datasheet.
Suppose you are creating a Microsoft Graph of
quarterly sales by region. Which would be the best
chart type if you want to emphasize the total sales Side-by-side
of each region? column

Pull down the


Which of the following actions will enable you to Insert menu and
insert a graph into a PowerPoint presentation? select Chart.

If you are editing a slide containing a Microsoft It automatically


Graph, how do you display the underlying displays in Slide
datasheet? view.
How do you deselect a chart that has been placed
onto a PowerPoint slide after you have finished Single click the
creating the chart? chart.

A dialog box is
displayed
allowing you to
enter the name of
the Excel
worksheet that
should be linked
What happens when you click the Datasheet button to the PowerPoint
on the Microsoft Graph toolbar? presentation.

What happens if you single click a chart that is not The chart is
currently active? selected.
What happens if you double click a chart that is not The chart is
currently active? selected.
a slide one bullet
Using custom animation effects, you can build: item at a time.
Which of the following animation effects can be
added to a slide? Subtle

Which of the following animations effects can be


added to a slide? Enter and exit
Which keyboard key is used to select more than one
picture on a slide? Enter

the way objects


Custom animation can be used to affect ONLY: appear on a slide.

The advanced
timeline shows
the sequence in
which objects will
Which of the following best describes the appear on the
information that appears on the advanced timeline? slide.
Which of the following objects can contain custom
animation effects? Clips

What type of program allows an object within an


image to be edited without affecting other objects? Paint program
Which of the following animation effects can be
added to a slide? Fly in

Once data is
Which of the following is TRUE regarding the entered it cannot
Datasheet? be changed.
Graphical software tools that provide complex
analysis of stored data are: OLTP.
You can change
the appearance
of a whole
diagram, but not
Which of the following statements is TRUE regarding individual shapes
PowerPoint diagrams? of a diagram.
Which keyboard key combination is used to undo
the previous command(s)? [Enter+A]
Microsoft visual basic project file has _______ file
extension. .vbg
In visual basic, _______ method is used to add an
item in a combobox add
In visual basic, _______ method is used to load
picture during runtime in an image control load

In visual basic, to populate a drive list box with a Drive1.Drive=Dir


directory list box __________ statement is used 1.Path
In visual basic, to display a message in the run time
_________ function is used messagebox()
In visual basic, to populate a directory list box with Dir1.Path=File1.P
a file list box ________ statement is used ath
In visual basic, ________ is a property of a recordset
object which counts the number of rows in a
recordsourse object openrecordset
In visual basic, using a data control, a record can
only be added from the last record. Adding a new
record is only possible using _______ method of a
recordset object. update
In visual basic, using a data control, a record is
saved to a recordsource object using _______
method of a recordset object. append
In visual basic, using a data control, to navigate to
the previous record ________ method of a recordset
object is used. movenext
To deactivate the Form UnLoad event, you make
the following change in the function
definiton:Private Sub Query_Unload(Cancel as Cancel parameter
Integer,UnloadMode as Integer) To prevent the to a non-zero
Form from closing, you will set the: value
_______ is a word processing that is a member of the
office 2000 family Word 2000
The feature that enables user to type anywhere in a
document without pressing or tab click-n-type

The______ feature allows the user to copy and paste


upto 12 items at the same time in an application office clipboard
______ and _____ key combination will extend the shift+end and
selection by one character on the left and right shift+home
web layout,
_____and_____ are improved layout in Word 2000 printlayout

The easiest way to create a document in word is wizard


In Office2000 environment the tool that makes work
easier for us is_____ office assistant

A short description of a tool bar button called the


______ is displayed when the mouse pointer is
allowed to stay for a second on the button Screen Tip
The _____ helps us to keep track of the margin of
the page tab stop
The keys that are used to navigate between up arrow keys
headers and footers are only
Pick out the element from the following that does
not form the type of tabs for the Word 2000 left
_______are blueprints or patterns for documents of a
certain type template
The______ is used for quickly setting paragraph
indention using the mouse increase indent
Word art is text with special effect
AutoShapes in word can be created by accessing
the _____ drawing toolbar

By default, a document consists of_____ section 1

The dialog box that is used to determine the page setup from
documents margins is the file
________ is a box surrounding a page on all slides or
a line that sets off a paragraph on one or more
slides border
The key that is used to perform a task to select all t
he text in the documents is ctrl+a
The key that is used to indent a paragraph is ctrl+a
The key that is used to change the font from the
current positioned in a document is CTRL+SHIFT+F
The key that is used to change the style of the
document that is from that normal to heading1 or
heading1 to other document styles. ctrl+shift+f
Set mapping' Check control that follows a text-type
validation, we use ----------------- application for data
analysis. Excel
Excel can import data from other databases for the
data analysis. TRUE
A System Auditor can uses CAAT tools to analyze
data FALSE

In the case of the ---------- control, it is ensured that


the data in combination with other fields are
reasonable as per standard set by an organisation. Valid Signs
--------------- function searches for a value in the
leftmost column of a table and then returns a value
in the same row from a column that we specify in a
table HLOOKUP

Most of the tools use in Data Analysis depends on DDE

Analysis
translates
program code of
a high level
How do you define analysis of an information language to
system? machine code

What areas need to be considered in the SOFTWARE Only hardware


design process? and software

What is the function of systems software? To collect data


Deleted from the
Formatting a disk results in all the data being...? disk

Users operate the


manual system
and computer
system at the
What is Direct Implementation? same time

The new system


is introduced
alongside the
What is parallel running? existing system
Instructions and
What documents are produced during the technical
development of a system? documentation

For technical
What are User Guides are used for? support
Operating
systems and
Systems software can be categorised into: system services
Magnetic tape
Which storage device cannot be erased? storage

To maintain a
backup copy of all
Application software are programs that are written the information
Which bus carries information between processors
and peripherals? Data bus

Convert the decimal number 2989 to Hexadecimal FDDI


Which bus controls the sequencing of read/write
operations? Data bus

Peripherals that
are connected to
What are utilities? a computer.
Numbers are stored and transmitted inside a
computer in binary form

The original ASCII codes were 7 bits


A Nibble corresponds to 4 bits
More than 1000
A gigabyte represents mega bytes

A 32-bit processor has 32 registers

used to indicate
A parity bit is uppercase letters
the contents of these chips are lost when the
computer is switched off? ROM
Clock speed is measured in bits per second

Cache memory enhances memory capacity


have fewer
instructions than
CISC machines RISC machines

Every data from the primary memory will be erased Power is switched
if off
a parallel
An RS-232 interface is interface
For print quality you would expect best results from line printer

is faster to access
ROM than RAM

increased the
storage capacity
of a computer
A UPS system

is a form of ATM
smart card card

Laptop computers use CRT displays

having several
programs in RAM
Multiprogramming refers to at the same time

having several
softwares running
Multitasking refers to at the same time
What are small high speed memory units used for
storing temporary results? ALU
A good way to exchange information that changes
rapidly is through brochures

Multiprogramming is a prerequisite for multitasking

Timesharing is the same as multitasking


______ is the default view in Word used for typing
Editing and Formatting the Text NORMAL
The short-cut-key that is used to indent a paragraph
spacing in the documents is ctrl+m
The short-cut-key that is used to paste the selected
text ctrl+v or ins
The short-cut-key that is used for paragraph
spacing(1.5) ctrl+2
The box that separate text from the document and
allows it to behave like an independent object is
known as Text Box
The object that is used to provide information like
the title of the book, name of the chapter, page Header and
number etc. Footer
The object that helps us analyzing data statistically
is known as Chart
To highlight certain parts of a page to set it apart
from the rest of the page we make use of the
following features Borders
To clear all the tabs in a document the option that is
clicked from the tabs dialog clear

The dialog box that is used to incorporate picture picture bullets


bullets into our documents or web pages is dialog box
The object that composes of set of tools which helps
to create and work on different shapes like
rectangles, circles, flowcharts etc. charts
When word is opened a new document called_____ is
displayed, where the user starts typing the content
right way doc1
______ is an online dictionary maintained by word to
obtain synonyms for words thesaurus

The thesaurus is invoked by pressing_______ shift+f7


When a new table is created the insertion point
flashes in the _____ first
By pressing the _____ key inserts a blank row after
the last row in the table tab
The ______ option enables us to convert text into a convert text to
table format table
A table consists of ______ that contain text or
graphics row
The _______ option in word allows the user to
automatically correct misspell words as and when
they are typed AutoCorrect
______ is a facility that enables recording and
replaying of a sequence of keystroke Mail Merging
In Word Macros are written in _____ basic
In Word 2000 the macro dialog box is activated with
the help of ____ key combination shift+f8

________shows how a document would look like


when published on the web or on an intranet web layout view
______ is a software for sending and receiving e-mail
messages email client
________is the coding system used to create web
pages html
The network that makes information easily
accessible across various networks is _______ internet
field name must
be listed in the
same order as
the
Which of the following statements are false with corresponding
reference to the use of a header row source for a information in the
mail merge data source

it is not possible
to change the
height of only
With reference TO TABLE WHICH OF THE selected rows of
FOLLOWING STATEMENT ARE false a table

The alignment available for tabs does not include left

A new section is
created in order
to change
properties like
Which of the following statements related to a number of
Section Break are True columns
The user can set a spelling checker to skip the
marked part of the next true
New option under the file menu of word creates a
new blank document that is based on the normal
templates true
The user can split the screen only into two parts true
The features that enables the user to type text
graphics tables anywhere in the document without
pressing enter or tab drag & drop
The user can modify the picture from the clip art true

automatically
corrects common
With reference to auto correct which of the typing, spelling
following statements are false errors
With the reference to password protected
documents which of the following statements are password can not
false include spaces

The alignment available for tabs does not include left

a .ppt file can not


not be inserted at
specified position
in the current
Which of the following statements are False document
Drop Cap tool does not work for the contents in the
table format true
The special symbols that are inserted using "insert
symbol" option of the word can not be printed by
the printer as they are not standard keyboard
symbols true
The "format columns" option allows to create
columnar text up 12 columns only. true
The document that makes the user to organize and
maintain a long document, such as multipart report
or a book consisting of chapters Master Document
The view that enables us to view how objects will be
positioned on the page when it is printed Print Layout View

The mode that is initialized or toggled to if the user


is in a position to overwrite the text in the word Insert Mode
Veena is entering a paragraph in a word processing
program. When the cursor gets to the end of a line,
what is the best way to get the cursor to the next press the return
line? key

How are data organized in a spreadsheet? layers and planes


Which key moves the cursor to the beginning of the
next line of text? tab
Veena typed the following sentence: "The girl was
very beautiful." In which word processing utility
could she find a synonym for "beautiful"? grammar checker

send a public
message to
Using an electronic bulletin board, Seema can do all friends interested
of the following except which one? in one topic
Aryan has created a ten-page story, but only wants
to print the first two pages. What printer command
should he select? Print all
What process should be used to recall a document
saved previously? Enter
Which is used to indent text within a document? closing
Desktop publishing is a more sophisticated form of
which of the following types of software? database

To analyse
What is a Word Processor used for? figures
What is a picture that is saved on a diskette and can
be pasted into a document? subscript

What basic tools would you find in the Edit menu of Clear, replace
a word processor and select

Text at the
bottom of every
What is a header in a document? page
Mouse, printer
and processing
system
What hardware is essential for a word? keyboard?
The user could take a picture from a magazine and
insert it into the document by using a Browser
Assume you are creating a two-column newsletter.
Which type size is the most reasonable for the text
in the columns? 6 point
Given the default left and right margins, and ½-inch
spacing between columns, the width of each column
in a two-column document will be: 2½ inches.

Assume you have made all appropriate selections in


the Columns dialog box in Word, but cannot see any
columns on the screen. What is the most likely You are not in
cause? Print Layout view.

While word processing, in which of the following to store a file on


situations would Tom use the "Copy" command? the hard drive

Data about a set


What does a document contain? of similar things
Before submitting your work you want to find any
words spelt incorrectly. Which of the following would
you use? Thesaurus
What command in a word-processing program can
be used to change the word ‘him’ to ‘her’, and also
the word ‘he’ to ‘she’ in the given phrase? “On a
cold and still night, the only sound that could be
heard was the owl that had ade its home in the nest
outs Paste
What edit commands would you use to insert a
paragraph from one document into another
document, while still keeping the paragraph in the
first document? Copy, then paste

To give the
original author a
chance to accept
suggested
changes from the
Which of the following statements would NOT be a person who
reason for showing suggested revisions in a Word entered the
document without changing the original document? revisions

A line appears
Which statement is NOT true regarding revisions through text that
made in a Word document? is to be deleted.

Through the Edit


menu by
choosing Track
How are suggested changes entered for review on Changes
an initial Word document? command

The Versions
command will
allow you to save
multiple versions
of a document,
including any
changes that may
Which of the following is TRUE about saving a have been made
document using the Versions command? to that document.
All versions are
What happens when you open a document that has opened
been saved using the Versions command? automatically.

You have used the word ‘discover’ four times in an


English essay you have created using a word
processing program. You would like to find another
word of similar meaning to use instead of ‘discover’.
Which of the following would you use to do this? Dictionary

Word displays a
When opening and working with multiple versions of list of the dates
a document, how can you tell which is the most and times each
recent version? file was saved.
Various fields are added to a regular document to
create a special document called a form through the
____________ toolbar. Fields
Which of the following types of fields CANNOT be
inserted into a form? Check boxes

Which of the following is TRUE related to editing Comments


comments in a Word document? cannot be edited.

Text at the
bottom of every
What is a header in a document? page

In your English essay you notice that the paragraph


at the bottom of page 1 continues on to page 2. You
would like to make this paragraph start on page
2.What would be the best way to do this? Press tab.
Tables in a document help you to easily arrange all
of the following EXCEPT: text.
To identify a document, it is helpful to include the
file name on each page as a header/footer.
Which of the following tools will copy the formatting
of selected text to other places? Copy button
What is the name of the process of determining the
cause of errors in a macro? Fault Finding
Drop caps are added to a Word document using the
___________ menu. Insert
a section of white
text on a black
A reverse in a newsletter is: background.

setting it in larger
A pull quote is best emphasized by: type or font size.

The reverse
technique means
to add dark text
on a light
Which of the following definitions is CORRECT? background.
Pertaining to newsletters, which of the following
cannot be changed using the Columns command The width of each
dialog box? column
As related to type size, how many points are there
to the inch? 6
Assume you are working on a newsletter in which
the masthead extends across the top of the entire
first page. The rest of the newsletter has two
columns. What is the minimum number of sections
in the newsletter? One

Press Ctrl+Enter
Which of the following is NOT correct with respect to to create a page
page, column, and section breaks? break.

Which of the following would be the most A serif font at 10


appropriate font for a newsletter headline? points

Which of the following is the default Word column


width? 2 inches

Sequence Check is a --------------- level control check. Field


Analyse data over two or more periods is called
----------------------- analysis Horizontal
We use Hash Total to identify ------------ within a
series where there is a definite relation between
items Duplicate Value
Analyse fields by arranging them into rows and
columns is called Cross Tabulate
--------------------- function searches for a value in the
leftmost column of a table and then returns a value
in the same row from a column that we specify in
the table. RAND()

To import data from Access to Excel ,it is not


possible to link between Access and Excel sheet TRUE
The GAP detection options can be used to test for
completeness of data. TRUE
Exception testing can be used to identify
----------------- items Unusual

Data validity test represents exception testing

Year end ledger, inventory files or transaction files


can be tested for cut-off , to ensure that the data
has been provided is for the correct audit period True
In Range Check , the data may not be in proper
sequence but should be within a predetermined
range True

In ---------------- Check data entry follow a particular


sequence and also a predetermined range. Limit
related to virtual
Virtual memory is reality

same as
Multiprocessing is multitasking
To help keep sensitive computer-based information
confidential, the user should save the file

to calculate
What is the function of a disk drive? numbers

A 4GL is Uses Cobol


A nanosecond is 106 sec
What small, hand-held device is used to move the
cursor to a specific location on the screen? a keypad

data to be
transferred to
The memory address register is used to store memory

data to be
transferred to or
The memory data register is used to store from memory
an instruction
that has been
The instruction register stores decoded
Which of the following is used to indicate the
location on the computer monitor? a cursor
A mathematical procedure that can be explicitly
coded in a set of computer language instructions
that manipulate data. Formula
Which of the following translates a program written
in high-level language into machine language for
execution? Assembler
Memory
Detecting errors in real memory is a function of protection

To find where a file has been saved on disk, the use the directory
user should search tools
A series of instructions telling the computer how to
process data or files is defined as a Network
save copies of
the file with the
To ensure that data is not lost if a computer system same name on
fails, the user should the system
Having a single CPU alternatively process tasks
entered from multiple terminals is called Multiprocessing
The place in the CPU where the data and programs
are temporarily stored during processing is called
the ROM

All are examples of computer software except Firmware


Computer manufactures are now installing software
programs permanently inside the computer. It is
known as Firmware
Which of the following file organisation forms most
efficiently allows access to a record Sequential
The part of the computer system controlling data
manipulation is called the Operating System
For direct access storage devices the recording area Tracks and
is divided into Sectors

The data hierarchy from the largest to the smallest Character, field,
is database
Which of the following hardware or software system
controls provides a detailed record of all activities Valid character
performed by a computer system check
Which one of the following parts of a computer is
necessary to enable it to play music? Sound card.
An educational CD-ROM on Indian Poets contains
1000 pages of text, 500 colour pictures, 15 minutes
of sound and 1 minute of video. Which of the four
different media listed takes up most space on the
CD-ROM? Text
Which one of the following printers is suitable for
printing sprocket fed carbon copies? Laser

viewing an
Multimedia software can be most productively used encyclopaedia
for CD-ROM.
replaced
To be effective a virus checker should be regularly

Which one of the following software applications


would be the MOST appropriate for performing
numerical and statistical calculations? Database

get into the


Passwords enable users to system quickly
How many bytes do 4 Kilobytes represent? 512
loss of
Back up of the data files will help to prevent confidentiality
Which one of the following is the MOST common
internet protocol? TCP/IP
access to the
internet is
The advantage of a PC network is that quicker

The term A:\ refers to a file name

universal port
UPS stands for serial

orphan files can


The main problem associated with uninstalling be left on the
software is that system

You are conducting research for a Income Tax


assignment. The raw facts you collect are called data.
Graphical
representation of
A flow chart is the logic
Purchase, sales,
receipt, payments
A voucher entry in Tally is done for etc.
assist in
Passwords are applied to files in order to maintenance

Each of the following is an enabler of IT-business senior executive


alignment except: support for IT.
The basic systems model is used to describe
virtually all information systems and it consists of
the following elements: input.

The use of
computers to
design state-of-
the-art, high-
What is a computer-aided design system? quality products.

A(n) __________ offers a solution package for an specialist or


entire industry. functional

File extensions are used in order to name the file


Information systems controls include all of the preventive
following EXCEPT: controls.

Hashing for disk files is called external hashing


Components of expert systems include: a) inference
engine; b) user interface; c) knowledge base; d)
fuzzy logic A: (a) , (b), (d)
corrective
Black box testing and white box testing are part of: controls
What is the term used to describe the point of
interaction between a computer and any other
entity, such as a printer or human operator? Component

The advantages of CASE tools are: a) reusability; b)


maintainability; c) portability; d) flexibility (a), (c), (d)

Which of the following is an acceptable way to shut Press the reset


down the computer? button.
Yesterday, in your music class you saved your
compositions as MP3 files. Today, you cannot
remember where you saved them. Which is the best Create the files
way to locate the files? again.
Components of an information system model are: a)
applications architecture; b) functional architecture;
c) technology architecture; d) information
architecture (a), (c), (d)
Benchmarks form part of: detective controls
Continuity controls include: a) record counts; b)
date checks; c) label checks; d) run-to-run totals (a), (c), (d)

Which is not part of help desk documentation: problem logging


Testing of individual modules is known as: unit testing

Design phase of CASE tools includes: a) data


architecture; b) decision architecture; c) interface
architecture; d) presentation architecture (b), (c), (d)
benchmark
Which is part of installation testing: testing
The computer operating system performs
scheduling, resource allocation, and data retrieval
functions based on a set of instructions provided by
the: Multiplexer.
Which of the following falls under multimedia data:
a) text; b) images; c) video; d) audio (a) to (d)
Replacement
personal
Which of the following procedures should be computers for
included in the disaster recovery plan for an user
Information Technology department? departments.
Designing relationships among components is part architectural
of: design

Several Computers connected together is called: Client-server


Which network topology uses a Hub? Star
Which of the following topologies is used for
Ethernet? Star

To maintain a
backup copy of
are written all the
Application software are programs information
Which type of file search method requires a
computer first read all locations preceding the
desired one Direct

Which of the following areas of responsibility are Systems analysis


normally assigned to a systems programmer in a and applications
computer system environment? programming.
Which of the following is recommended when many A sequential file
searches for data are required on a disk
Tapes can only be
It is unlikely that a magnetic tape containing several read by the
thousand blocked records can be used on two machine on which
machines of different architecture directly because they are written
Which component of the CPU has the most influence
on its cost versus performance Data path part
Which of the following terms applies to network
used to connect computers with other computers,
peripherals and workstations that are in fairly close Distributed
proximity systems

Can send data to


a computer and
Intelligent terminals differ from dumb terminals in receive data from
that they a computer

A computer is to be linked to 8 terminals using a


single communication link. To permit simultaneous
terminal operations, communication path will
require which of the following Mixer

Allows computer
signals to be send
over a telephone
A modem is a device that line

A LAN includes 20 PCs, each directly connected to


the central shared pool of disk drives and printers. Planetary
This type of network is called a network

A computer based system for sending, forwarding,


receiving and storing messages is called an Office Automation
If a workstation contains a processor, monitor,
screen manipulation device, printer, storage and A dumb
communication capabilities, it is said to be workstation
Time of day
Terminal hardware controls include control locks

RS-232 is a Type of cable

A compiler does a
conversion line
by line as the
What is a compiler? program is run
Feasibility study,
system design,
What are the stages in the compilation process? and testing
Which of the following is not a data transmission
coding scheme CRC

An interpreter
does the
conversion line
by line as the
What is the definition of an interpreter? program is run
A device used in data communications to divide a
transmission signal into several sub-bands is known
as a Modem
Third generation languages such as COBOL, C, and High-level
FORTRAN are referred to as languages
It is faster than
Serial Communication is used over long distance parallel
because it communication

In what areas is the COBOL programming language Financial sector


used? and engineering

Communicate
with the console
The primary function of a front-end processor is to operator
Specification and
What is the first stage in program development? design
Which of the following is not used for data
transmission within a local area network Fiber Optics

The design of the


screen the user
will see and use
to enter or
What is System Analysis? display data
A device to device hardware communication link is
called A cache

The different
types of network
What will a good software provider consider? to be used
The topology of a network can be each of the
following except Star
What is the 8-bit binary value of the decimal
number 85? 10101010
Which is the most common data transmission error
checking method Parity
What is the decimal value of the binary number
1111? 15
Which of the following devices merges
communication signals onto a single line Port

What is the decimal value of the octal number 215? 327

Which tool is used to help an organization build and


use business intelligence? Data warehouse

Cache memory enhances memory capacity


What is the decimal value of the hexadecimal
number FF? 30
Numbers are stored and transmitted inside a
computer in binary form
What is the hexadecimal value of the decimal
number 1476? 4C5
A byte corresponds to 4 bits
Basic Coding
What does EBCDIC coding of numbers mean? Description
A Kb corresponds to 1024 bits
What is the binary sum of 01011 and 00101? 10000
Information is stored and transmitted inside a
computer in binary form

used to indicate
A parity bit is uppercase letters
Because it
squeaks when
How did the computer mouse get its name? moved
What are you most likely to use when playing a
computer game? Touch screen
CPU performance may be measured in BPS

A digitising tablet can be used for? Printing letters


In processing cheques which of the following I/O
techniques have banks traditionally used OCR
Which of the following is a pointing device used for
computer input? Touch screen

What does a light pen contain? Refillable ink


The capacity of a 3.5” floppy is around 100K
What general term describes the physical
equipment of a computer system, such as its video
screen, keyboard, and storage devices? hardware

Where would you find the letters QUERTY? Mouse


What input device could tell you the price of a
product Mouse
Where would you find a magnetic strip? Credit card
What are the individual dots which make up a
picture on the monitor screen Called Coloured spots
What input device can be used for marking a
multiple-choice test? Mouse

QWERTY is used with reference to screen layout


What input device could tell you the price of a bar of
chocolate? Mouse

A GUI is hardware

First - generation
UNIVAC Computer belongs to the computers.
Name the first Indian Super Computer? Vishwajeet

Disk fragmentation is caused by wear

The technology which is used to check answer


sheets of multiple-choice questions in civil services Bar code Reader
or similar examinations is: - Technology

A compiler is a fast interpreter

Which printer among the following is fastest Drum Printer


“Zipping” a file means encrypting it

Very important
reader user
What does acronym VIRUS stands for sequence
Electrically
An impact printer creates characters by using...? charged ink
mainframe
A client-server system is based on technology
A nanosecond is 10-6 sec
A procedural control used to minimize the possibility
of data or program file destruction through operator
error is the use of Limit checks
_______ software enables users to send and receive
data to/from remote computers application
A _____ is a running instance of an application project
Splitting of CPU's time for different tasks _______
prevents time slicing multiprocessing

______ computers are used in large organizations for


large scale jobs which have large storage capacities mainframes

_______ is responsible for all calculations and logical


operations that have to be performed on the data control unit

______ printer use laser light band printer


______ software enhances the user to enter ,store, data
manipulate and print any text management
______ software enables users to send and receive integrated
data to/from remote computers software
_______ is the temporary storage place for deleted
files my computer
_____ is a collection of related fields field
assembly
_____ language consists of strings of binary numbers language

______ symbol is used to represent processes like terminator


assigning a value to a variable or adding a number symbol

_______ is an example for micro computer PC-at


_________capability supports concurrent users doing
different tasks multiprocessing
The ______ do not have processing power of their
own and has only a screen, keyboard and the
necessary hardware to communicate with the host.
For this reason, the terminals are referred
as_______________ "dumb terminals"

A______is nothing but a PC with a network operating


system wan
_____system is responsible for handling the screen
and user I/O processing host
The______ handles data processing and disk access
in a Client/Server architecture host
Both the DBMS and the application resides on the
same component in a ____system PC

When all the processing is done by the mainframe


itself, the type of processing is sometimes called as server processing

DBMS models can be grouped under____ categories four

file management
______is the most advantageous database system system
A new user initiates a new process of execution at
the background,while the user can continue his
query process as usual in the foreground. This
situation is referred to as ______ multiprocessing

The process of data being automatically written to a


duplicate database is called______ repairing

Modem stands for __________ . Code/De-code


Multiple changes to the same record or a field are
prevented by the DBMS through______ fixes
_________allows an application to multitask within
itself multiprocessing
Linear area
LAN stands for __________ . networks

New process of execution is referred to as______ task

Integrated
system dynamic
ISDN stands for _______. networks.
_____________ is the Worlds largest computer
network . Ethernet
_______is/are a popular front end tool visual basic
When LAN connected together ,it is called __________
. MAN

Data is broken into small unit called __________ . Cells

System
modulation
SMTP stands for __________ . transfer protocol
The __________ protocol is a network protocol to be
built for the World Wide Web . Transfer Protocol

The computer which can receive data from other


computers on the network and print it is _______ File server
The hardware and the software requirements
together form the_____ platform
ATM, Asynchronous transfer mode is a __________
technology. MAN and WAN
__________ is designed telephone system ISDN
Web based
Expansion of WBT is ______________ Training
_________ connects LANs. Bridges
Collection of instruction is called a _____ procedure
Combination of alphabetic and numeric data is
called _____ data alpha numeric
space occupied,
Computers can be classified based on price, no. of users
______,______and _______ allowed
_______ is responsible for feeding data into the
computer input
_______ is the capability of the o/s to run numerous
applications simultaneously multiprocessing
_______ involves conversion of raw data into some
meaningful information interpreter
_______ is responsible for obtaining the processed
data from the computer input

_______ printers use light to produce the dots


needed to form pages of characters impact printers

operating system,
Hardware components in a computer are bootstrap, kernel,
_____,____,_____,______ shell
_______ software are programs that are complex and
can be developed or purchased operating system
_______ is a set of special instructions used to
communicate effectively with the computer batch
_______ converts a high level language into machine
language processor
_______ translates assembly language program into
machine language instructions compiler
OPTIONS
B C D ANS

ALT+F1 CTRL+F1 None of the above A f1

Tally IMP Tally INI None of the above A ODBC

false A TRUE

ALT+F3 CTRL+F3 None of the above B ALT+F3

INVOICE OR
Bill A or B None of the above C BILL
Three Four Five B THREE

Alt+C Alt+Ctrl+C None of the above B ALT+C

FALSE A TRUE

FALSE A TRUE

$ & ^ A *

Puchasing, ORDER
Puchasing and Accounts payable Receiving and RECEIVE AND
Receiving and Receiving Accounts payable D PAYABLE

Multiple A or B Mone of the above A SINGLE


Fund Flow CASH, FUND
Statements Ratio Analysis All of the above D ND RATIO

Three Four One A 2

Alt+X Ctrl+T Ctrl+D B ALT+X

Display CREATE,ALTER,
Alter Information Information All of the above D AND DISPLAY

F5 F6 F7 C F6
Ctrl+P Shift+P None of the above A ALT+P

Statistics Day Book Journal Book B STATISTICS

Data Sub None of the above B DATA


False A TRUE

ELECTRONIC
Enterprise Data - Electronic Data DATA
Information Interchange. All of the above C INTERCHANGE

FALSE A TRUE

3 4 5C 4

data record Field All of the above B DATA RECORD

TRUE B TRUE

Open OPEN
Calculator Change Period None of the above B CALCULATOR

Groups Journals None of the above B GROUP

Nominal Real None of the above B NOMINAL


MANUAL,
AUTOMATIC
Automatic None All of the above D AND NONE

Profit & Loss Journal Book All of the above A BAL SH


Physical Stock
Stock Journal Transfer Reversing Journal B STOCK JNL

Receipt Issue None of the above A FILLED

16 18 21 B 16

TRUE B TRUE

management electronic data MANAGEMENT


by exception analysis All of the above B OF EXCEPTION

F5 F6 Alt+f5 B F5
Primary Cost
Primary Category All of the above C PRIMARY

False A TRUE

Reports Vouchers None of the above C VOUCHER


1 to 100 10 to 60 None A 0-9

Suspense Order All of the above A SUPPLIER

Output Information None of the above C INFORMATION

F4 Ctrl+f2 Ctrl+f4 A F2

Closing Balance A and B None of the above C A ND B

False A TRUE

Alt + f6 function
key F7 function key None of the above A F6

Purchases A or B None of the above B PURCHASES


1-4-1996 to 1-4-1997 to 31-3-
31-3-1997 1998 None of the above B 96-97

False A TRUE

Vertical A or B None of the above C BOTH

Profit & loss and Cash and profit PND L AND


trial balance & loss Cash and bank C CASH
MAIN
Main location A or b None of the above B LOCATION

Ledger a/c Cost category None of the above A SECURITY

F7 F8 F9 C F8

NAME ND
an identity A and B None of the above C IDENTITY

Purchase return a or b None of the above A SALES RETURN

Stock items units Regional setting None of the above A CO.CREATION

Daybook Balance Sheet None of the above B DAY BOOK

Alt + F7 F10 F11 B ALT+F7

Changes in
Ledger Masters Both A and B None of the above C TRUE
3 4 1B 3
F10 F11 F12 A F9

Profit & loss a/c Budget None C

FALSE A TRUE

Ctrl+F3 Alt+F3 None of the above C ALT+F3

FALSE A TRUE
Primary Symbol None of them B PRIMARU

Tally.ini A or b None A FILE.IMP

Stock journal Stock analysis None of the above A STOCK SUMM


During the In 'comp info ->
creation of a security control'
company option None B CO.CREATION

FALSE A TRUE
228 28 16 C 28

Groups Sub-Groups B or C A LEDGERS


ADMINISTRATO
Owner Data Entry TallyVault A R

Other programs -
a spreadsheet or
a database file. Both A and B None of the above C BOTH

Cash INVENTRY AND


disbursements. Cash receipts. Payroll transactions. A SUBSIDARY
Will be more
Will produce a efficient at Eliminates the need to
more accurate producing reconcile control
set of financial financial accounts and
statements. statements. subsidiary ledgers. C EFFICIENT

data that has the address of an instruction that has


been transferred a memory been transferred from
from memory location memory C ADDRESS

System Capacity
feasibility report Planning Exception reporting C
VSAT RAM AGP Card B VSAT

Control totals for


Identification one or more End-of-file and end-of-
Number fields reel code B
Storing
information on
Printed output the hard disk None of above B PRINTE OUT
Voice answer Visual audio VISUAL AUDIO
back board None of above C BASIS

Boundary File protection


protection ring Limited access files C

Pixels Pixies None of above B PIXEL


Identification
number Reel Number Batch Total D

Storage device Pointing device None of above A PRINTER


Physical
Security Console Log Data Dictionary B
An inked
ribbon and
An ink pen print head None of above C
Use only
unremovable Require user Make duplicate copies
media passwords of files A
Paper Eraser None of above C ERASER
A drum A ribbon A cassette A CARTREGE
Centralised Centralised
function for PC function for PC Distributed policies or
acquisition Disposition procedures A

A laser beam An INK RIBBON None of above C INK


Storage
Size capacity None of above C STORAGE

Write Read and Write None of above B WRITE

PAN drive Floppy disk None of above A MAGETIC TAPE

Random access A parallel access


medium medium None of above A

20 GB 700MB None of above B


Magnetic tape
A floppy disk storage None of above C
Magnetic tape
A floppy disk storage None of above A
By magnet
objects In a drawer None of above C

RAM chips CDROM chips None of above B

ROM chips DRAM chips None of above B

Registers Logic bus None of above A

Registers Control unit None of above B

1 bit 8 bits None of above B

ROM chips CACHE None of above A


Systems
software and Business
application software and
software games software None of the above B
Personal Mainframe
computer computer None of above B
Jon Von
Supercompute Neumann
rs computers None of above B
Second Hoover
generation generation None of above A
Fourth
First generation generation None of above C
Fifth
Third generation generation None of above C

Third generation Fifth generation None of above B

Third generation Fifth generation None of above A

Programming, Analysis, System


Design, and Design, and
Testing Implementation None of above A
ACL JCL none the above A

FALSE A

FALSE B

FALSE A
no B

FALSE A

FALSE A

false A

false A

false A

false A
review and
evaluate the to obtain a
types of data record layout extract data from file A
can bring the
data indirectly all the above none of the above A

False B

False A

use of
accounting absence of audit
codes trails all the above D

risk driven
approach unique approach none of the above B
processing
options, file data checks and
structure controls all the above D

false A

false A

source of data
for material
planing all the above none of these A
false A

providing access
to computer to
all organization use of any
personnel programs none of the above D

false A
conceptual/physi
open/closed cal all of them D
false A

false A
false A
manage
hardware & enable multiple
software user resource
resources sharing all the above D

false B

false B

with production
departments all the above none of these A

false A

false A

false A

false A

false B
planning
language model base all the above D

false B
false B

table files report files none of the above D

file-o-man file manager filepet C

decentralized
picture of a
system all the above none of the above A

false A

false B

retrieval deletion addition B

false A

false A

subject area software and


database database safety and database B

false A

false B
on quarterly
immediately basis none of the above B
false A

Benford Benjamin none of the above B

false B
blocks of nos. to
the primary random
attribute of the placement of
the entity component none of the above D

false A
invalid, none of the
alphabetic above all the above A
regrouping, none of the
events above all the above A
false A

false A

false A

false B

false B
interactive
data interactive data
extraction and innumerable
analysis analysis none of the above B

false A

false A

false B

false A

bouncing ball big-bang stub C

top-down tests hybrid tests all the above D

no B
re-perform
procedures
provide carried out by
information to the clients
the audit programs all the above D

deleted, hard none of these all the above A


false A
system
advanced
software all the above none of the above A

false B

no A

false A

false B

create, false none of these all the above A

false A
no A
can enable the can provide the
auditor to auditors with
execute useful
provisions on a information with
number of trend s and
different bases patterns all of the above D

no A

examination of
identifies source code of
program code a program with
which may be advice to
there for following the
fraudulent logic of a
reason program none of the above C
ACL ALC ACLL B

false A

comparison of analyzing the


source version of picture of a file or
a programmed data all the above A

false A

false A
false A
none of the
file, hardware above all the above A

identifying identifying non-


ineffective code standard code all the above D

false A

false A
authentication of
information resource
support requested all the above D

job connectivity
language all the above none of the above A

no A

false A

false B

mathematical master list of administered


concept transactions questionnaire A
prepared by an
outside
programmer
prepared by the engaged by the
entity auditor all the above D

false A
stratification and
statistical/arithm frequency
etic operation analysis all the above D
false B

false B

carrying examining the


analytical review quality of data all the above D

Can extract and Can aid in simple Can define the


analyse data selection audit objectives D

IDEA High End CAATs All of the above D

A utility software A special purpose


programme written program None of the above A
Compliance tests
Analytical review of general EDP
procedures controls All of the above D
Action
Procedures Event Procedures General Procedures D

number primary number auto number D

false A

events procedures none of the above B

form chart macros D


expression
elements comments action D
expression
code builder builder expression elements C
expression
elements list
macro list box none of the above C

action insert none of the above A

columnar auto report embedded C

columnar datasheet justified B

link report embedded report new report D


stable and dynamic and
unstable static none of the above A

false B
add chart chart insert chart C

alternate key foreign key none of the above C


chart wizard mail wizard none of the above A

group header page header report header D

page footer group footer none of the above B

for specifying
conditions with
for updating group by
records clause none of the above C

group macro names none of the above C


reports forms macros D

append insert delete B

macro sheet module none of the above C

false A
RAP RAID none of the above A

MsgBox message none of the above B

DDE CME none of the above A

on line execution on line editing none of the above A

OLE client OLE server OLE communicator C

embedded connected edited A


DLL BMP html D
publish to web
report wizard query wizard wizard D

static html dynamic file none of the above B

add insert data definition D

rupees pesos yen A

bound object command button list box B


display link create icon A

new save as html none of the above C

home end none of the above B

command procedure none of the above C


RDBMS front end language A

data collection database data storage C


new blank
database dialog new database
box dialog box database dialog box A

64000 235 63500 A

AutoNumber number automatic field B

false B

outer join explicit join none of the above A

not null candidate key no duplicate key A

cascade change cascade update change all related


related records related fields records C

tabular both a and b none of the above B


record or
query or queries records none of the above C

false B
Dynaset field
field property properties properties B
row/column
queries select queries update queries A
row/column change/delete
queries queries update queries A

self join no match join outer join D


false A
form create form wizard
dialog box dialog both 1 and 3 D

sum append simple D


properties form properties new properties B

sub form new form child form B

Record
Operations Form Operations None of the above B

tabular form hierarchical form one to many form B

ordering sorting querying C

sorts pipes gateways A


filter by
selection filter by menu None of the above A

$ @ ? D
false B
unbound
control data less control data control B

option group controls group record group B

unbound controlled all of the above C

TODAY() DATE() DAY() C


list box combo box static text B

columnar form tabular form main form A

filter by input filter by form none of the above C

option control
control wizard wizard tool wizard C

ram?? two of the above none of the above B


false B

form table ledger A

report module none of the above A


label bitmap report A

false A

false A

255 25,000 64,000 D


false B

false A

false B

query form all of the above D

form report hyperlink D

false A

false A

Records Tools none of the above C

false B

false A

composite keys candidate keys primary key C


false A
false B

false A

false A
false B

not null zero none of the above B

false B

false B

false A

false B
bar both 1 and 2 none of the above C

false A

false A
false B
select query delete query append query B
false B
false A

outer join self join table join C

false B
false A
false B
embedded stand alone sub chart D

false B

false B

false B
false A
the last field of
the table primary key field none of the above C

reports attributes entities D

false A

insert append add A

false A
false B

use datasheet in
use import forms use export D

false B
false B

false B

false A

false A

false A

false A

# ? * D
false A
detail group topic C
false A

false B

false A
false B

false A

list range logical C


false B

event -
structured query procedural based
language language none of the above C

form query table B


false B

record session detail D

property both a and b none of the above B

false A

false A

child forms inner form none of the above A

chart labels report B

primary key index identifier B

create form none of the above A

queries sorts forms A


bound unbound none of the above C

combo box button option button B


false A

control record source none of the above C


chart form data sheet form none of the above A

tabular form columnar form none of the above A


bound unbound none of the above A
unbound bound static C

auto form tabular form columnar form B

connect relationships none of the above C


command option button, toggle
button, check list, check and button and check
and list boxes combo boxes boxes D

filter by report filter by record filter by input D

report macro table B

file field layout B

sort field names record grab D


An organised way
of storing
A tool to produce information
high quality about a set of A way of maintaining
documents similar things a log C

It contains all A document


the data about which contains
one specific item text A collection of files B

relative DBMS Relational DBMS Reliable DBMS C

backing up data is related to data uses tape as opposed


regularly mining to disk C

Computer Computer Database access


sequence checks matching controls D

Reports provide A tool which


a very flexible allows text and
way of creating graphics to be
and editing placed in
documents documents None of the above A

Spreadsheets
make data easy
to analyse Using queries None of the above C

Network Word processors,


software, backup spreadsheets,
systems databases, DTP None of the above C
PRIMARY KEY and
FOREIGN KEY UNIQUE
constraints constraints IDENTITY columns C

MODIFY TABLE ALTER TABLE UPDATE TABLE C

Description Component Source D


keeping the
keeping a original paper saving the file with
backup copy copy different filenames A

the primary key mail merge e-mail C

Graphics browser e-mail A

operators wildcards engines C

Auto ID AutoNumber Auto Key C

forms in a
related tables in
database are
a database are consistent with reports are consistent
consistent with the underlying with the underlying
one another. tables or queries. tables or queries. B
query and its
main form and a associated report and its related
subform. dynaset. query. A
the primary key
of the related a field from an not a primary key of
table. unrelated table. either related table. B

One-to-many Many-to-many Many-to-one B

EmployeeLastNa
CompanyID me CompanyAddress A

Referential The one-to-many


integrity The join line relationship B
Right-click the
Relationship line,
then select Select Undo in Click the Delete
Delete from the the Relationships Relationships button
shortcut menu pull-down menu on the toolbar B

That some of the That there are That records can be


data is not records in a added by clicking on
viewable related table the plus sign C
They cannot be
They cannot be AutoNumber data They must be the
text fields types same data type D

The customer’s
ID is deleted
from the
Customers table,
The customer’s and all the
ID is deleted related loans are
from the deleted from the An error message is
Customers table. Loans table. displayed. D
The subform is an
object on the form
The subform is The subform is and can be moved or
displayed in displayed in Form sized like any other
Datasheet view. view. object. D

A one-to-many A one-to-many
relationship relationship A many-to-many
between teams between coaches relationship between
and coaches and teams players and teams C

M ¥ * C

The Customers
table only when
there are Loan
records
associated with The Loans table
that customer at any time Neither table C
prompt, icon, title bar text, title bar text, icon,
title bar text. prompt, icon. prompt. B

Sub CreateList. CreateList. Sub. B


A text field
enables the form A drop-down list
user to choose enables the user
from one of to choose from A drop-down list
several existing one of several enables the user to
entries. existing entries. enter text. C
must be set for does not have to must be set for two
multiple words. be set. words. C
create tables of maintain data on
store data in rows and different things in
tables. columns. different tables. A
relationships. metadata. all of the above D
figures. information. a and b D
multiuser e-commerce
database database
application application a or b A
multiuser e-commerce
database database
application application None of above B

Structured
Question Structured Query Relational Question
Language (SQL) Language (SQL) Language (RQL) C
Database
Management Data Business Relational Model
System Model System Manager B

SQL Server Oracle a and b D


The database
The database management
application system (DBMS) All of the above. D

the DBMS
accesses the
database data None of above All of above A

creates form creates reports b and c D


the database
the database management
application system (DBMS) the database B
it contains a
it reduces data description of its
duplication own structure All of the above. C

holds metadata holds indexes All of the above. D


as a new
systems as a redesign of
development an existing
project database a and b A
as a new
systems as a redesign of
development an existing
project database a and b B
as a new
systems as a redesign of
development an existing
project database a and b C

entity-relationship
normalization data models data modeling A

entity-relationship
normalization data models data modeling B

entity-relationship
normalization data models data modeling D

entity-
relationship data
normalization modeling data migration D
hierarchical
models network models relational data model A
the order of the the order of the more than one column
columns is rows is can use the same
important unimportant name C

relation row field D

field key tuple C

field composite key foreign key C

field foreign key candidate key D

primary key foreign key surrogate key B

Update anomaly Deletion anomaly All of above D

design the
database create one or move the data into
structure more new tables the new database A

were essentially
killed off by MS have poor are not true DBMS
Access response time products B
Their report
delivery is more
difficult than
report delivery
for reporting Nonintegrated
systems. data None of the above A

nonintegrated a "wrong format"


inconsistent data data problem B

nonintegrated a "wrong format"


inconsistent data data problem D

data warehouse data warehouse


databases do not data are often
have metadata. denormalized. b and c C

Table Report Query A


Queries and
tables Macros Spreadsheets D

It will be easier Regardless of how the


for the user to objects and tables are
upgrade it if the It is advisable to stored, the user will
objects are in put each object have to reenter the
one database and table into a data in the tables
and the tables in separate when the application
another. database. is upgraded. B

An application
may consist of
multiple
databases, each An application can be
with multiple All objects in an created in such a way
objects, linked to application, that it objects such as
yet another including the forms and reports can
database tables, must be changed without
containing only reside within the disturbing the existing
tables. same database. data. C

Link Merge Join A


It contains
tables, reports, It contains a user
queries, and interface, or
forms switchboard It contains macros C
Interface Design
Build Menu Wizard Switchboard Manager D

put key business


information into
centralize the the hands or store all corporate
manageability of more decision transaction data in
data collection. makers. one single location. C

Digital
Certificate Digital Signature None of the above C

Digital Signature Digital Certificate Private Key A

Hash Value Hash Result Either B or C D

Digital Signature
Verification Both A and B Either A or B C

Subscriber
Relying Party Institutional
Cost Overhead None of the above A
Certified Certificate
Authority Authority None of the above A

False A

False B

Developer Personal Digital


Certificate Certificate None of the above A

Developer Personal Digital


Certificate certificate None of the above C

Repositories Public Key none of the above B


Efficiency and Evidence, Ceremony,
Approval, logistics, Approval, Efficiency
Evidence Evidence and Logistics D

False A

False A

Certificate certificate
Resource List Revocation Letter None Of The Above A

Public key, Private Key,


Recipient Recipient None Of The Above A

External Format
File Transmission File None of the above C

UN/EBCDIC UNESCO UN/EDIFACT D

interchange sets functions functional groups D

Embedded cards SET None of the above A

Digital Cash Smart Cards Electronic cheques D


Online Catalog and
Online Catalog Broadcast and Customer
and Billboards Junk Mail Endorsements C

E-mail EFT All of the above D

False B

Primary Key and Public Key and Public Key and Private
Private Key Password Key D
Satellite Area
Private Network Network None of the above B
Passive or pull- Glow sign or
based hoarding
advertising strategies All of the above D

Junk mail Billboard Endorsements A


Bulk-mail Direct-mail Junk mail D

Endorsement Billboard Broadcast C


Low cost of
Data Integration operation Quality management B

Corporate Industrial
espionage espionage Economic espionage C
Contact numbers
of the
management A competitor’s new
group Research data project B
multi-user e-commerce
database database
application application None of above C

Keeping Including the Using all capital


messages short Subject letters D

Message
authentication in Encryption
EDI systems performed by a Security at the
performs the physically secure transaction phase in
same function as hardware device EDI systems is not
segregation of is more secure necessary because
duties in other than encryption problems at that level
information performed by will be identified by
systems. software. the service provider. C

convert text to
columns wizard tip wizard function wizard A

row reference column reference none of the above A


quattropro or
Lotus 1-2-3 xbase files class files D

domain values range values reference values D

=date() =currentdate() none of the above A

' = ' sign # sign none of the above A

AutoFill function wizard none of the above C

arguments parameters none of the above B


logical numeric Boolean D

pmt merge none of the above A

vlookup pmt count A


convert text to
chart wizard columns wizard tip wizard B

pmt countif none of the above B

sum sumif countif C

print area print none of the above A


none of the
AutoFill above A

formatting shading none of the above B

print area print print preview B

searching sorting none of the above A

blanks all blanks none A


www.encybrit.co
www.eb.com m none of the above B

DNS FTP none of the above B


network of intermediate
network network none of the above B

transport layer physical layer session layer D

ping service ftp service none of the above A

TELNET ARCHIE none of the above C

uniform resource unlimited restore


locator locator none of the above A
name of the
resource scheme none of the above C
scheme command line none of the above C
Microsoft sears general electric C

web browser editor B


read the Usenet search for
news database none of the above C
wincim or
spy mosaic maccim none of the above C

gopherspace cyberspace none of the above C

open text excite none of the above B

ftp server web server none of the above A


directories image list none of the above C

maximum of five one many B

lower top middle and lower D

directory index glossary C


index menu
search,menu search,item item search,index
search search search C
excite lycos all the above D

cello lynx all the above C


mosaic Lycos navigator gold 2.0 C
internet IBM CompuServe D

finger service ftp telnet D


Hyper text
transmission Hyper text Hyper text transfer
port transfer protocol port C

ftp uucp none of the above C

ftp telnet none of the above C


transmission transfer
control communication
protocol/internet protocol/internet
protocol protocol none of the above B

two three none of the above C

domain name
servers web servers none of the above B
the internet the internet
administration access none of the above A

protocol site organization B


uniform resource uniform resource
locator label name of the above B

frequently asked frantically asked


question question none of the above B

TCP,IP IP,UDP none of the above A

response request close A

windows sockets world search for


internets relay information and
chat research council none of the above B

netscape,ie mosaic,gopher none of the above B


world wide web
client interface none of the above B

index hotwords none of the above B


very organised
network verification on
integration and network
communication integration and
application communication none of the above A
university of
cleveland,clevel university of
and freenet California net none of the above B

IP address dns none of the above A

ftp and finger telnet and ftp none of the above A

wais,allsrc wais,winsocks none of the above B


waisman winsock none of the above B

hyper text books marks none of the above B

applets animation none of the above B


programms,imag animation,scripts
es,text ,executables none of the above A

home page welcome page none of the above B

global networks grand network


navigator news none of the above B
electronic mail search engines none of the above B
Netscape page
starter
site,netscape yahoo and
page wizard altavista none of the above B

telnet ftp archive D

point review all the above none of the above D

bitnet Delphi fidonet A

biographical
information bookstores none the above A

on-line reference
works more information galenet A

web directories database channel B


Graphical
interchange Graphical Graphical Interface
Format interface format format B

Jumbled pictures Joint pictures Joint pictures


expert graph expert graph experimental group A
documents net browsers C
eudora,netscape
netscape,ie,lynx and pine none of the above C
network
web pages connections mails B

COLOR FCOLOR FONTCOLOR B


Common Communication
graphical graphical Common Gateway
Interface interface Interface D

Interface Communication Connection B

Browser Client None of the above B

Server Web Channel A

image only text or image neither text nor image C


PLSQL SGML CGI C
betalanguage metalanguage none of the above C
pancake is not
palm is not elm edible none of the above B
SGML
Preprocessor SGML Parser SGML Composer C
images applets documents A
International
Engineering Internet
trainers and Engineering Task
faculty Force None of the above C
MS Internet
Netscape Explorer and
Navigator and Netscape
Mosaic Navigator None of the above C
data from a
database symbols video C

hypertext hotword hotlink B

in sequential in user-defined
order order none of the above B

start home none of the above C

.bmp and .jpeg .gif and .jpeg .wmf and .bmp C


service,hostnam
e,port,directory- service,port and service,hostname and
path directory path port B

mail mailing lists,mail


vendors,mail server robots and
identification gateways to
and password other services none of the above C

<font size=n> <hr size=n> <l1 type=shape> D


common
gateway classified general
interface instructions none of the above B

Client Browser User A


the net intranet none of the above B
peer-to-peer
connectivity wan none of the above B

parcel packets none of the above A


email,file
news,cooking retrived,internet
and fine arts tools none of the above C

mosaic,gopher,e communicator,ie,
udora,trumpnet lynx,winsock all of the above B
arpanet ARPANET none of the above B
defensive
dedicated and advanced
registered research projects
projects administration
administration net none of the above C
begin first none of the above B

mailnet,inet intranet,extranet none of the above A


cooking and
music and dance dining none of the above A
united states &
england,norway Russia none of the above B

client network none of the above C

stand-alone servers none of the above C


network network
topology redirectors none of the above B

data terminal data target


equipment equipment none of the above B

physical layer network layer none of the above B

packet
switching,store smart network
and forward and dumb
network network none of the above B

anonymous ftp file transfer none of the above B

KAN,RAN,VAN LAN,WAN,MAN none of the above C


MAN TAN none of t he above B
MAN WAN none of the above C
digital non-digital none of the above B
Define type of Document type
data definition Document type data C
Modulation/dem Manipulate/dema
odulation nipulate none of the above B

Modulation Manipulation none of the above B


Dedicated
access and dial
up access Cable and wires none of the above B

Stream line Serial line


internet protocol protocol none of the above C
Point to point Pillar to pillar
protocol protocol none of the above B
sending
information to a storing data on receiving information
host computer the hard drive from a host computer B

Speed Size Channel A

Save Browse Retrieve C

Relying Party Either A or B Neither A nor B B

Private Key Both A and B Both B and A C

Electronic Electronic Fund


Commerce Transfers All The Above D

Not True A

Formal Legal
Formal Legal Requirements, Open
Requirements Open System System D

Signer
Efficiency authentication None of the above A

Document
Authentication Both A and B Neither A nor B C

Not False B

Digital signature Digital certificate Private Key A

Public Key Private Key None of the above A


Public Key Both A and B Either A or B C

Public Key Both A and B Either A or B A

Public Key Both A and B Either A or B B

Cipher Encryption Cryptography C

Conducting
Performing fraud-awareness Reviewing the
validity checks. training. systems-access log. D
Received by the
Not intercepted intended Sent to the correct
en route. recipient. address. A

The private key


The private key is used by the
cannot be sender for The private key is
broken into encryption but used by the receiver
fragments and not by the for decryption but not
distributed to receiver for by the sender for
the receiver. decryption. encryption. A

Failure of server
Data entry duplicating
errors. function. Firewall vulnerability. D
Business-to- Backend-to-
Backend Business Business- to-Billboard A

On-line Catalog Endorsements Broadcast B

Billboard Catalog Broadcast A

portals .COM Domains A


Search and
Service discovery None of the above C

Purchase Pre-purchase
consummation preparation Search and discovery A
Endorsement
model of
Online catalog marketing None of the above B
Shopping cart Billboard Pulling cart B
EDI For EDI For
Administration, Administration,
Consumer and Commerce and
Transport Transport None of the above C

TCP/IP EFT Gateway D

Interpreter Assembler EDI D

Business-to- Consumer-to-
Consumer Business Customer-to-Company B

Electronic Cash Euro Cash Endorsed Cash B

Business Process Service


Perspective Perspective None of the above C
Micro
Transactions TT(Tiny token) E-token A

SSL Encryption Subscription C


2 3 4B

filtered table index table pivot table D


convert text to
chart wizard columns wizard tip wizard D
category legend data marker A
category legend data marker B

category legend data marker C

category legend data marker D

bar chart pie chart surface chart C

bar chart pie chart surface chart B

bar chart pie chart surface chart D


bar chart pie chart surface chart A
wild card
characters symbols none of the above A
internet explorer Netscape word 2000 A
convert text to
chart wizard columns wizard tip wizard A

bar chart stock chart pie chart C

false A

or B

4-dimensions Multi-dimensions A

false A

Pivot table B
It is often used to
display share It is also used for
market prices indicating fluctuations
It shows trends over a period of in temperature
over time time changes B

Scenario
manager Solver Data table. C

Scenario
manager Pivot table Data table. A

Pivot table Solver Data table. D

Worksheet Spreadsheet none of the above A


Performing
database Performing text
operations formatting. All of the above D
Source table
Row field. name. Pivot table item. C
three N B

false B

4-dimensions Multi-dimensions A

Pivot table B
It is useful when
several
components are
changing and
the user is
interested in the It can be
sum of the represented in 3-
components. dimensions B
Standard
deviation SumIf A
records tables worksheets D

It is a tool that
provides a way
to view and
compare the
results of all the
different It summarizes
variations the data by using
together on the analytical
worksheet functions. A
Scenario
manager solver Pivot table D

convert text to
columns wizard tip wizard function wizard B

workbook tables database A


document
window modal window C

A dotted border No border A blinking border A

2,4,2 2,2,2 6,8,10 D


the row is too
short to show the column is too
the number at narrow to show
the current font all the digits of
size the number either b or c C
speed of flexibility of
calculation moving entries cost of initial set-up D

graphical database spreadsheet D

Address Gap Rows A


Writing letters Drawing pictures Document filing A
drag from the
top cell in the
column to the
last cell in the click the column
column heading click the column label C

CTRL + ENTER TAB INSERT A

function. constant. formula. B

(201)555-1212. #VALUE! Tom McKenzie. C


Numeric
Functions constants Text constants D

/ * \ D
It is impossible to
C3/D4 D4^2 determine. C

6 SUM(H9:H11) G7*SUM(H9:H11) B
The phrase “active
It is displayed in cell” appears in the
It is blinking. reverse video. Status bar. A

By either clicking
in a different cell
By using the or using the By typing the
arrow keys to arrow keys to reference of the cell
move to a move to a you want to move to
different cell different cell in the formula bar C

The Cell Format The Font Size


The Formatting command on the command on the
toolbar Edit menu Tools menu. B
the Save the Save As the File Type
command on the command on the command on the File
File menu. File menu. menu. C

Edit View Window A

Details List Properties B

Both Insert and


Delete Delete Clear C
Both Clear and
Delete Delete Remove B
Headers and
footers Fonts Margins C

Page Setup View Edit B

range. group. cell group. B


D12, G25 D12:G25 D C
destination
range. clipboard. source range. D
destination
range. clipboard. source range. B
The Copy The Paste Both the Copy and
command command Paste commands D

relative mixed constant A

$B4 B$4 $B$4 D

#DIV/0! #DIV/0! #DIV/0! B

#DIV/0! #DIV/0! #DIV/0! C

The Cut The Paste Both the Cut and


command command Paste commands D
cycle through
absolute,
relative, and
mixed cell cycle through open
edit cells. references. applications. C
the Format the Formatting
Painter toolbar Conditional formatting B

Click the Insert Right-click a cell


Hyperlink button and click the Edit Double-click a cell and
on the Standard Hyperlink click the Insert
toolbar. command. Hyperlink command. B

whether the cell


has an absolute
or a relative cell
the cell address. reference. the value in the cell D
text with either a two-
digit or four-digit year,
text with a four- depending on the
digit year. an integer. format. C
It is impossible to
determine from the
Aug-31 29/03/2008 information given. B

adding the subtracting the


earlier date to later date from adding the later date
the later one. the earlier one. to the earlier one. A

the F2 key. the Esc key. the F1 key. B


Either 3/4 or .75,
March 4 of the depending on the cell
0.75 current year formatting C
either a cell on a
worksheet or a
a variable. a constant. variable. D

B1.G10 B1;G10 B1:G10 D

COUNT MAX SUM C

Line Pie Scatter C

Once a column Once a pie chart


chart is chosen it has been chosen Once a line chart has
cannot be it cannot be been chosen it can be
changed to a bar changed to line changed to a pie
chart. chart. chart. D

hold down the hold down the hold down CTRL +


SHIFT key ALT key SHIFT A

Transfer
Create four information to a
separate files database Use multiple sheets D

Fill Down Fill Right Paste Special B

Data | Sort Edit | Data | Sort none of the choices B


Calculate data Create forms None of the above C
select Print
selection on
 Page Setup  | select Print selection
press the PRINT  Sheet  and then in the Print dialog and
SCREEN key print then print D

D4+C2*B2 #VALUE! =(B2*(D4+C2) C


=A3SUM:B3SUM:
C3SUM REF! None of the above B
whatever was
landscape last used vertical A
ZA1 A0 None of the above C

ECRN CARN NET A

newsgroups and
mailto and files search engines none of the above B

bulletin application
boards,mails call servers,proxy
and wireless servers and web
system servers none of the above B
business bulletin
broadcasting broadcasting
system system none of the above A
large very small none of the above B

windows sockets windows stocks none of the above B

Yahoo PINE Lynx A

cache built-in none of the above B

Digital Signature Cryptography Message Digest C

Lock Hash Function Formula A

Password Name Address B

Retrieval Cryptography Password Cracker A

Regulations Address Protocols D


Imposting Unauthorising Approving A
Threat Exposure Hacking B

Income - tax Judge of a civil Police officer of IPS


authorities court rank. B

Pirated software Virus Cracker C

Hoffman Charles Bubbage Howard Aiken A

Amazon .com Dell .com Msn .com B


Asynchronous
Transmission
Any Time Money mode None of above C

Regulations Address Protocols C

Gateway Port Pin B

WAN CAN PAN A

hypertext hypertext hypertext tracing


tracing program transfer protocol protocol C

Network New Information


Interface card Card None of the above B
Can not
computers Only printers None of the above D

Combines
connectivity of a Switches data
hub with the from incoming
traffic regulation ports to outgoing
of a bridge ports. All of Above B
Two or more
networks Bridges and Hubs Hubs and nodes B
frames Packets None of the above C

gateway router virus checker A

Two Four None of the above C

Data-Link Layer Network Layer All of the above D


Coaxial cable Fiber Twisted pair B
A memory
Logical address address None of the above B

Hub Router None of the above B

It continue on to
It gets destroyed target device
bit by bit. with corrupt data None of the above B
Wired Ultra violet
Technology technology None of the above A

Data Link Layer Network Layer All of the above D

ASCII Octal None of the above A


48 Bytes 48 KB 48 MB A

a list of rules for software that a gateway calling


transferring data allows file program for internet
over a network copying bridging B

Client Server Network PC C


If the hub goes
If one node goes down, it brings If the hub goes down,
down, it brings down all of the it brings down all of
down the entire nodes on that the nodes on all of the
ring section rings B

Topology Both A and B None of the above B


Star Ring All of above D
Parallel Both A and B None A
Circular Linear Both A and B B

Bus Star Mesh C

Bus Star Mesh B

Bus Linear Ring C

Bus Star Mesh A

Transport Layer Physical Layer Data Link Layer D


Ethernet, token Ethernet, Ethernet, token ring,
ring, FDDI DecNET, FDDI ARCnet B
kbps mbps mips B
Kbps Mbps Mips C
depend on the
measured in transmission limited by modem
bytes per second medium speeds C

a modem Windows 95 Netscape B

must use must have a LAN


electronic mail account All of the above A
common
uniform resource gateway application protocol
locator interface interface C
interfaces a
used to control a modem to a connects a computer
printer computer to a network D
Windows
a modem package Netscape B

Novell Netware Windows NT None of the above C

have to do with
Web pages the Internet none of the previous A

modem bridge none of the previous D

is a CPU
is a CPU register functional unit make of processor A
is a protocol for the
used to browse is part of transfer of files
the Web Netscape between computers D
uses wireless
communication is part of
medium Netscape None of the above D

a screen saver
a form of virus program none of the previous D

an email server a poor file server none D


IR system for the
Internet browser none of the previous C

CD-ROM clip-art file search engine D

is a CPU
is a CPU register functional unit make of processor A
is a protocol for the
used to browse is part of transfer of files
the Web Netscape between computers D
is a protocol that
uses telephone is part of allows for remote
lines Netscape login D
Any layer can
communicate
Any layer can only with the Any layer can
communicate layer directly communicate only
directly with any above or below with the layer above
other layer. it. it. C
It is made up of
many networks
connected into
transmission It works the Individual computers
lines called same way as a can connect to it
backbones. local network. using an ISP. A

System intrusion Denial of Service Port sniffing C


Flood a Web Virus that
server with initiates a ping
requests flood UDP flood A

packet flood traffic C

router switch hub B

an email server a poor file server none of the above D

Update virus Backup data on a Limit logging on


definitions daily basis access C

Only large name-


There are safe recognizable ActiveX-enabled sites
and unsafe sites. sites are safe. are safe. B

Use of Use of logical Use of encryption


passwords access methods methods D
by attaching by scanning the
through an FTP itself to a computer for a
port. document. connection. B

E-mail Web traffic Application updates D

Adware A worm Spyware D


Protocols Multiplexors LAN B

Trojan horses cookies and key key loggers and


and key loggers. loggers. worms. C

An attack with
the purpose of Giving out Changing the content
gaining publicity disinformation of a Web page D
Disruption in Disruption in All of the above are
communication supply lines correct. D

Shutdown of
military security Contaminating Shutdown of nuclear
systems water systems plant safety systems D

To obtain an accurate
inventory of network
To improve related equipment
To improve system response and parts and network
network services time nodes D
stop its
limit access to competitors update its prices as
computer seeing their soon as they are
owners only prices changed D
Yahoo People USA People
Search Search Lycos Search B

Date of birth Personal assets Criminal records A

Fraud Adware Spyware B


make large amounts
of money by parking
invest without purchase off- funds in their bank
risk. shore property. account. D

Phishing Siphoning Hoaxing B

cyber stalking. virtual stalking. Web stalking. B

cookies. spam. viruses. B

Never use your Use a proxy Use anti-spyware


real identity. server. software. B
Message
Physical Security sequence Logical access
controls number checking controls B

II only Both I & II Neither I or II C

ftp www telnet C

Verifies integrity Increases boot up Misleads a program


of files time recompilation B
both HTML and
Internet Explorer Microsoft Excel Internet Explorer B

round trip HTML


HTML document. document. Web browser. B

.co in used for .con is used for


company companies None of the above A

the World Wide


Web Consortium HTML. one way HTML. C

HTML. DHTML. MHTML D


clicking a
hyperlink that
references a
updating the document that is viewing an Excel
values that are stored in the worksheet that you
obtained through floppy drive on have saved as a Web
a Web query your computer page. B

Click on ‘Go to’ Go to the History


or ‘Search’ in the page and look for Go to the Bookmarks
browser the site or Favorites page C
the Insert
Hyperlink the Update the External Data
command command command A

Screensaver Sound Video C

GIF JPEG TIFF C


Add it to Cut and paste it to a
Write it down on ‘Favourites’ or word processor
a piece of paper. ‘Bookmarks’. document. C
privileged
intranet. network. network topology A

a signature. a footer. an encryption. B

IPT IPP PoIP A

Desktop client, Desktop server, Desktop server,


software, and application, and software, and
hardware. database. hardware. A

CD-ROM Telephone line None of the above B


File
Transmission File Transfer
Protocol Protocol None of the above B

So IP addresses So email is
can be shorter delivered faster None of the above A

45.1.1.1 143.215.12.19 None of the above D


paul.trigg@doma
in.org.uk paul.domain.uk None of the above B
Scientists in
Switzerland No-one None of the above C
International
Relay of Internet Remote
Characters Conversations None of the above A
It will be waiting A letter will be
for you to collect sent to you in the
it post None of the above A

People
discussing a
topic of interest High volumes of
globally email None of the above C

autolayouts and
presentation slide view &
templates outline view none of the above B

points squares icons C

image grid guide C

short cut menus auto shapes all the above B


slide show &
view show fonts & images none the above A
media clip .video file all the above B

movelast,true movelast,false eof,true D


form layout
window toolbox project explorer D

movefirst,true movefirst,false bof,true D

int() number() val() D

rectangle square oval D

false A

false A

color forecolor none of the above C


fontunderline,tru textunderline,tru
e e none of the above B

size foresize fontsize D


one-hundredth one-thousandth one-ten thousandth of
of a second of a second a second C

recordcount itemcount listcount D

prperties window project explorer toolbox B

prompt vbmsgboxstyle none of the above C

textbox label inputbox() D

opensnapshot dbopensnapshot dbopendynaset D

activate unload initialze C

opaque transparent graphical D


red green black B

green blue white D


form layout project explorer
window toolbox window D
form layout project explorer
window toolbox window A

lostfocus text gotfocus D


parent container none of the above C

false A

unload initialize activate D

name caption none of the above C

dbengine openrecordset none of the above B

visible value style C

dim var none of the above B

.ctl .ctr .ocx B

Validation Check Audit A


On Error GoTo
Inline On Error Stop On Error Resume Next D

PaintPicture Refresh Resize A


UnloadMode UnloadMode
Cancel parameter to a parameter to a zero
parameter to 0 non-zero value value A

2 3 None of the above D


Consists of
Consists of Various Forms
several And Code Consists of several
Applications Modules Projects D
Project window,
view code Class module,
window code module None of the above A

Place code in the Place code in the


Unload event Deactivate event None of the above B
AutoRedraw =
False Refresh PaintPicture A
Msgbox Msgbox
err.number & error.number & Msgbox error.number
err.text error.text & error.description D

To help in To provide a
creating a To allow the repository for images
ToolBar editing of icons used by other controls D

GetFileNum GetFile GetBytes A

Get GetProperty Value B

Windows
Open dialog box explorer Input box D

Visible Multi-Line Font C


Click, KeyUp and KeyUp and KeyPress, KeyUp and
KeyDown KeyDown KeyDown D

Binary Format Input Mode Output mode B

ScaleLeft and ScaleHeight and


ScaleTop ScaleTop x and y A

Property Assign Property Let Property Set C

Caption property ZOrder property AutoRedraw property C

Max Value CurrentVal B

Substr SetAttr CStr A

Can be different Are actually not


at times properties None of the above B

You do not have


the permission
to access the MyVar has not
class been declared None of the above C
The
The Exec ExecProcedure
method method None of the above D
A critical An exclamation
message icon icon None of the above B
intrinsic
variable. constant. built-in procedure. C

InputBox function
InputBox can be created
function returns with the macro MsgBox statement
a value, while recorder, while can be created with
the MsgBox the MsgBox the macro recorder,
statement does statement while the InputBox
not. cannot. function cannot. B

The form can be Data can be A new check box can


modified. entered. be added. C

QueryUnload Deactivate Terminate C

cropping tool cutting tool scribble drawing tool A

color box color scheme color guide C

tricolor scheme color palette primary color scheme A

28 18 36 C

bar pie linear A

images and text slides slide sorter views C

radar doughnut all the above A

data point data stream B

clip art auto shapes track changes A

the chart is the chart window


made available opens displaying
for editing a chart template none of the above C
general purpose custom drawing standard drawing
tools tools tools C

used to create a used to store the


accessed only by manager box for other tools of the
manager an existing box organizational chart C
not available in available in the tool
turned off the tool bar bar B

twice thrice any of the above C

four five eight B

draw tool standard tool all the above B

handlayouts slide view none of these B

reduce/enlarge preview none of the above B

exporting copying moving B

auto shapes clip art drawing tools A


.rtf(rich text .html(hypertext
format) .doc(document) format) B

only one six twelve C

.wmf(windows
metafile) .txt(plain text) .doc(document) B
displayed only
during the slide displayed only in
show outline view none of the above A

3D(3 dimension) both a and b transition D

transition slide show view show A


slide master master slide master notes A
slide view view show slide sorter view C

10 inches,7.5 7.5 inches,5


inches inches none the above B

landscape a or b none of the above A


view show transition b or c A

jpeg png none of the above D

hypertext action button all the above D


visual basic for Microsoft visual
application interdev all the above B

batch file templates add-ins A


during slide when the slide
transition show is run none of the above C
spell checkers header files all the above A

custom show both a and b none of the above B

notes pane properties pane outline pane D

paint shop pro paint shop pro power point 2000 D

contains sample
it is the quickest presentations for
way to create a a variety of provides suggested
presentation topics content and design D

user can insert user can insert


only pre-drawn, picture to the
pre-colored master slide user can insert picture
graphic images which gets to the title slide which
reflected in a reflected in all gets reflected in all
clip arts to the the slides using the slides using that
slides that master slide title slide B
in slide sorter in notes pages
view, drag the view, drag the I slide view, drag the
slide to a new slide icon to a slide icon to a new
location new location location C

transition means design templates the slide that holds


applying special is the template the formatted
effects to the whose format placeholders for the
crossover and color scheme title and sub-title for
between the user applies to a the presentation is
slides presentation called a title template D
in outline view,
user can see the
miniatures of all
slides in a
presentation, user should
complete with select the slide the slides can be
text and view to add the reordered in the
graphics text to the slide outline view B
transition means design template the slide that holds
applying special is the template the formatted
effects to the whose format placeholders for the
crossover and color scheme title and subtitle for
between the user applies to a the presentation is
slides presentation called a title template D

customize new slide set up show B


by default,
doughnut chart
is displayed
based on the user can add data
data in the data is plotted in labels and gridlines to
datasheet a chart window the chart B

the slide master the header slide the format slide B

spell checker grammar checker none of the above B

12 102 22 B

twice three four times B


CD-ROM, digital text, hypertext, Power
text, hypertext camera and Point, video and
and Power Point. sound. sound. D
Line style, Line color,
the Font and the text font, and text
the Line color text alignment alignment D

Fill color, Line color,


Line color Line thickness and Line thickness D

A popup box Microsoft Graph


prompts you for is started so that
an existing Excel you can create a The graph placeholder
chart to insert. graph. is deleted. C
taken from the
first column or
row of data in the
datasheet,
always taken depending on
from the first whether the data
column of data series are in rows
in the datasheet. or columns. entered by the user. C

Stacked column Pie chart Line chart B

Pull down the Insert


menu and select
Chart, click the Insert
Pull down the Chart button on the
Click the Insert Insert menu and Standard toolbar, or
Chart button on select the pull down the Insert
the Standard appropriate menu and select the
toolbar. Object. appropriate Object. D
Click the chart
object, then click
the View
Datasheet You cannot display
button on the Pull down the the underlying
Standard Edit menu, then datasheet once the
toolbar. select Object. slide is finished. B

Double click the Click outside the Change to Slide Sorter


chart. chart. view. C

A dialog box is
displayed
allowing you to
enter the name
of the Excel
worksheet that
should be The datasheet window
embedded in the The datasheet is is toggled from closed
PowerPoint saved as a to open (or from open
presentation. separate file. to closed). D
The application that
The chart is The chart is created the chart is
deleted. doubled in size. started. A
The chart is The chart is Microsoft Graph will
deleted. doubled in size. restart. D
a slide one bullet item
at a time, build bullet
items a letter at a
time, and build bullet
bullet items one bullet items one items a word at a
letter at a time. word at a time. time. D
Subtle, Moderate, or
Moderate Exciting Exciting D
Both enter and
exit, and fly in Neither enter nor exit;
Fly in from top or from top or neither fly in from top
bottom bottom nor bottom C

Shift Alt Ctrl B

Custom animation can


be used to affect the
way objects appear on
a slide, to what
what objects do objects do after they
after they appear on a slide, and
appear on a the way objects to the way objects
slide. exit a slide. exit a slide. D

The advanced
timeline shows The advanced
the sequence in timeline shows
The advanced which objects will neither the sequence
timeline shows appear on the in which objects will
the duration of slide and the appear on the slide,
the effect duration of the nor the duration of the
applied to each effect applied to effect applied to each
object. each object. object. C
Organization Clips, organization
charts Text charts, and text D

Draw program Filtering program Animation program A


Fly in, From top, and
From top Dissolve in Dissolve in D

Once data is Data cannot be


entered it can be entered into There is no such thing
changed. Datasheet. as a Datasheet. B

OLAP. OLST. OLIP. B


You can change
both the
appearance of a You cannot
whole diagram change the style
and the of the connecting You cannot change
individual lines in an the color of the boxes
shapes of a Organization in an Organization
diagram. chart. chart. B

[Shift+Z] [Alt+Z] [Ctrl+Z] D

.vbp .frm .frx B

additem loaditem none of the above B

loadpicture addpicture none of the above B

Dir1.Path = File1.Path =
Drive1.Drive Dir1.Path none of the above B

message() msgbox() none of the above C


Dir1.Path = File1.Path = File1.pattern=Dir1.pat
Drive1.Drive Dir1.Path h C

opendatabase recordcount count C

append addnew additem C

update additem addnew B

movelast moveprevious movefirst C

UnloadMode UnloadMode
Cancel parameter to a parameter to a zero
parameter to 0 non-zero value value A

Office 2000 Office 97 Back Office A

double click drag & drop none of the above A

cut select none of the above A


shift+left and ctr+end and
shift+right ctr+home none of the above B
normal layout, web layout, page
web layout layout none of the above A
click from start
program,
MSWord from the
templates task menu none of the above A
document
inbox assistant assistant none of the above A

Tool Tip Icon Tip Document Tip A

marginal stop ruler none of the above B


page up keys home and end
only keys only up and down arrow D

center decimal rotation D

model dialogs/alerts none of the above B

decrease indent both A and B none of the above C


control tool box design wizard pictures A

control box database forms A

2 0 11 A
printer setup
from the file print preview
menu from the file none of the above A

shading style box none of the above A

Del ctrl+f ctrl+m A


Del ctrl+f ctrl+m D

CTRL+O CTRL+SHIFT+S CTRL+SHIFT+P A

ctrl+o ctrl+shift+s ctrl+shift+p C

Access Both None of the above B

FALSE A
TRUE B

Transaction type Limit Check Reasonableness D

VLOOKUP A or B None of the above B

OLE ODBC All of the above C

Analysis is the
loading of This involves
programs that looking at a
perform routines system and
to control finding out how
peripheral information is
devices being handled None of above C
Inputs, outputs,
file design Maintenance,
hardware, and reliability, and
software upgradeability None of above B
To execute any To maintain
programs security None of the above D
Copied from the Transferred from the
disk Saved to the disk disk A

Users operate
the computer Users operate
system from a the manual
given date system None of above B

The new system


is introduced Users continue
and users start operating the old
operating it system None of above A
User Guide and
Log files and technical
temporary files documentation None of above C
User guides
To enable any cover how to run
printer to be the system, enter
connected to the data, save, print,
network etc. None of above C
Network systems
and Database
communication systems and
services backup services None of the above A

CD-ROM floppy disk Hard disk B

To help someone
To do a who is applying
particular task. for employment None of the above B

Auto bus Address bus Control Bus A

BAD TED MAD B

Auto bus Address bus Control Bus D

Operating Data structures


system routines that are part of
that execute in the kernel of an Shells, compilers and
supervisor operating other useful system
mode. system. programs. D

ASCII code form decimal form alphanumeric form A


represented 256 represented 127
8 bits characters characters A
8 bits 16 bits 32 bits A

1000 kilobytes 230 bytes 1024 bytes A


a 32-bit bus or 32-bit
32 I/O devices 32 Mb of RAM registers D

used to detect is the first bit in a


errors byte is the last bit in a byte B

RAM DRAM CROM A


baud bytes Hertz D

memory access secondary secondary storage


time storage capacity access time B
use more RAM
than RISC have medium use variable size
machines clock speeds instructions D

Computer is Data is not saved


improperly shut before computer
down is shut down All of the above D

a serial interface printer interface a modem interface B


dot matrix
printer ink-jet printer laser printer. D
stores more
information than is used for cache
is non-volatile RAM memory B

provides backup
power in the
increases the event of a power
process speed cut none of the previous C
has more
storage capacity is an access card
than an ATM for a security contains a
card system microprocessor C

LCD displays SSGA displays none of the previous B

writing programs
in multiple
multitasking languages none of the previous A
the ability to run
2 or more writing programs
programs in multiple
concurrently languages none of the previous D

Registers Variables Logic Bus B

magazines CD-ROM e-mail D

to run more than


an operating one program at
system the same time none of the above C
multiprogrammi
ng multiuser none of the previous C

ONLINE LAYOUT PAGELAYOUT ONLINE DOCUMENT A

ctrl+2 ctrl+end ctrl+home B

ctrl+c or ins ctrl+x or ins ctrl+v or Del A

ctrl+5 ctrl+1 none of the above B

Frame AutoShape Border A

Screen Tips Page Layout none of the above A

WordArt Auto Shapes File A


Shading WordArt Bullets D

remove all remove clear all D

arrow bullet circle bullet


dialog box dialog box none dialog box A

WordArt AutoShapes files C

document1 new document default document B

hyphenation mail merge none of t he above A

thesaurus menu shift+f8 tools+spelling menu A

second first row last cell of the t able A

end enter none of the above A


convert data to table auto format
table option none of the above A

rows & columns records none of the above B

AutoFormat style gallery none of the above A

Macro Data Source none of the above B


visual basic vj++ visual FoxPro B

shift+f7 alt+f8 alt+f5 A

online layout
view browser none of the above A
micro soft
outlook express outlook hotmail A

xml sgml vb script A

intranet arpanet LAN A


the field field names in
separators in a the header the number of fields
header source source must names in the header
and the data match any merge source must be the
source can not fields you've same as the number
be set as inserted in the of data fields in the
paragraph main document data source B

auto format by default cell


option applies to height and
the entire table weight option delete cells option
and not only to applies to all the allows to delete the
the selected rows and entire row or a
rows or columns columns of a column or shift cells
of a table table up or shifts cells left C

decimal justified top A

In order to type If a header is


a header from inserted in the
the third page of second section A section is a portion
the document a then the same of a document in
section break is header is which certain page
inserted after t applicable to the formatting option can
he third page first section be set D

false A

false A
false A

click -n-type Double Click none of the above B


false A

with t he caps lock


key accidentally
prohibits the turned on reverses
user from automatically the case of the letters
renaming an corrects the that were capitalized
auto correct grammatically incorrectly and then
entry errors turns off the caps lock B
password
protected
document can
be opened
without
password as password are not password can be upto
read only case sensitive 15 characters long B

justified hanging top A

a document file
can be inserted a multiple
in the current documents files an .xls data can not
document at can be inserted be inserted at
specified in the single specified position in
position document the current document B

false A

false B

false A

Hyperlink
Child Document Document none of the above A

Page Layout Outline Layout none of the above B

Type Over mode Remove none of the above A

press the tab press the escape


key key just keep typing D

lines and spaces height and width rows and columns D


backspace/
enter/return delete shift B

spell checker thesaurus outliner C

send private
send pictures to messages to a send a package to a
a friend friend friend D
From ___ To ____ Page setup Print preview B

Copy Retrieve Save C


tabbing spacing sorting B

graphing word processing spreadsheet C


Creating and
editing Storing
documents information None of the above B

annotation clip art clipboard C


Spelling,
grammar and Cut, copy, paste Font, Paragraph,
autocorrect and clear Bullet and Numbering C

Numbers which Text which


appear on every appear at the top Designated area on
page of every page the document C

Keyboard, Monitor,
Mouse, monitor keyboard and
and printer mouse None of the above B

clip-art file microphone digital scanner D

10 point 15 point 25 point B

impossible to
2¾ inches. 3 inches. determine. B

Word cannot display


You have not You have not columns during
inserted a specified editing; you will see
column section continuous them only when you
break.. section breaks. print the document. A

to move a
section of text to leave an original
from the original section of text in
to store a file on location to place while pasting a
a diskette another location copy elsewhere D

A set of different
Mainly text graphics None of the above B
Grammar
Spell Checker Checker Find and Replace B

Replace Select all AutoCorrect B

Delete, then
Cut, then paste paste Insert, then paste A

To give the
original author a To complicate
chance to reject the revision
suggested process and to To allow multiple
changes from force the author people to work on one
the person who to spend more document in
entered the time making collaboration with one
revisions corrections another C
A vertical line
outside the left
margin signifies a
A red underline change has been Comments are
appears beneath made at that enclosed in a text box
text that is to be point in the at the right of the
added. document. document. D

Through the
Tools menu by
choosing Track Through tools on Both through the
Changes the Reviewing Tools menu and the
command toolbar Reviewing toolbar D

The Versions
command will
allow you to The Versions The Versions
save only one command will command will allow
version of a allow you to save you to save only two
document, only one version versions of a
including any of a document document: one
changes that without any version of the original
may have been changes that and one version of
made to that were just made any changes made to
document. to the document. the document. A
The latest The first and
version is second versions The previous version
opened are opened is opened
automatically. automatically. automatically. B

Grammar check Spell check Thesaurus A


The most recent Word will show
version will the name of the Word is not able to
appear at the person who tell the most recent
bottom of the saved each version of a
list. version. document. A

Tools Forms Insert C

Toggle button Text fields A drop-down list B


Comments can
be edited or Comments can be
Comments deleted by right edited or deleted by
cannot be clicking the left clicking the
deleted. highlighted text. highlighted text. C

Numbers which Text which


appear on every appear at the top
page of every page None of the above C

Press Return. Copy and paste. Insert page break. D

graphics. forms. numbers. C

bibliography. find/search. macro. A


Format Painter This action is not
Paste button button possible. C

Bug Squashing Error Injecting Debugging D

Tools Format Edit C


a section of text
where the first the guidelines
letter of each used to establish
sentence is where different
lowercase and elements of the an enlarged capital
the rest are newsletter will letter at the beginning
uppercase. go. of a paragraph. A
underlining the
typing it all in text of the pull
capital letters. quote. changing the color. A

A grid is a set of
A dropped cap is horizontal and vertical
A pull quote is a a word that starts lines that determine
quotation taken with a lowercase the placement of
from (pulled) letter when it elements in a
from another should have a newsletter or other
document. capital letter. document. D

The height of The number of The tab spacing within


each column columns each column D

10 12 72 D

Two Three Four B


Press
Ctrl+Shift+Enter Press Enter to
to create a create a section Press Shift+Enter to
column break. break. force a line break. C

A sans serif font A serif font at 20 A sans serif font at 45


at 10 points points points D

It depends on the left


and right margins,
and how many
3½ inches 4 inches columns are specified. D

Record Both None of the above A

Vertical A or B None of the Above A

Combined Value Gaps All of the above C

Filter Merge None of the above A


VLOOKUP() HLOOKUP() None of the above B

FALSE A

FALSE A

Strange A or B None of the above C


comparison of
data duplicates testing All of the above D

False A

False A

Sequence Range Both B & C B

a form of ROM a form of VRAM none of the previous D


same as involves using more
multiprogrammi than one processor at
ng multiuser the same time D
set up a make a backup use a virus protection
password copy program B

to read from or to display information


write information to print sheets of or pictures on a
to a floppy disk paper screen B

uses Java uses C++ none of the previous. D


103 sec 1012 sec 109 sec D

a mouse a frog a message pad B

data that has an instruction that has


been transferred the address of a been transferred from
from memory memory location memory. C

data to be an instruction that has


transferred to the address of a been transferred from
the stack memory location memory A
an instruction
that has been an instruction the address of the
fetched from that has been next instruction to be
memory executed executed D

a scroll bar a light pen a magic marker A

Algorithm Program Data B

Artificial
Compiler Intelligence Parity Checker B

Parity Checking Range checking Validation B

search each file use the backup


in turn facility use find and replace A

Program System Modem B

use different
filenames on the keep a record of backup to a secure
system computer failures medium D
Multiprogrammin
Time sharing g Multiplexing D

RAM Floppy Disk Magnetic Disk B


Telephone
Word Processor modem Shareware C

Telephone
Word Processor modem Shareware A

Hashed Indexed Random C

ALU CPU Primary Storage B


Blocks and Schema and
Sectors Files and Tracks subschema A

Database,
character, record File, record, field Element, field, file C
Maintenance
diagnostic
program Systems logs Parity check C

CD-ROM MIDI interface Serial interface A


Pictures Sound Video D

Dot matrix Ink-jet Drum B


recording current
stock in a
creating the presenting an supermarket and
plans for a order for stock to answering customer
building design. a warehouse. queries. A

never updated updated regularly updated once a year C

Document Graphics
processor package Spreadsheet D
retain
make efficient confidentiality of
use of time files simplify file structures C
1024 4096 8192 C
duplication of
data virus infection loss of data D

HTML IPX/SPX NetBEUI A


printer can do
files can be 1000s of pages a the operating system
shared day is easy to use B

a subdirectory the root directory the hard drive D

up-line provider uninterruptable


service power supply uniform page source C
the system
the program requires a
executable may network the system always
not allow it to be administrator to requires a re-boot and
uninstalled uninstall it defrag afterwards A

documents. information. text. A


Rules writte in
procedural Logical Steps in
language any language None of the above A

To fill the log It is mandatory in


register tally None of the bove A
prevent
unauthorised
speed up access access allow encryption C

IT management IT understands
lacks leadership. the business None of the above B

output. processing. All of the above D

Software that
generates
Using computers innovated
to do designs and
architecture. artistic patterns. None of the above A

Application
Service Provider enterprise local B
ensure the
filename is not
lost identify the file identify the file type D
detective corrective All of the above are
controls. controls. parts of IS controls. D

static hashing dynamic hashing extensible hashing A

B: (a) to (d) C: (a), (b), (c) D: (b), (c), (d) C


preventive detective
controls controls general controls C

Interface Settings Control B

(b), (c), (d) (a) to (d) (a), (b), (c) C

Turn the Select the ‘Shut Pull the power cord


computer off at Down’ option from the back of the
the power point. from a menu. computer. C

Ask the person Use the Find or Put your hand up and
next to you. Search feature. ask the teacher C

(a), (b), (c) (a) to (d) (b), (c), (d) C


organisational preventive
controls controls corrective controls C

(a), (b), (c) (a) to (d) (b), (c), (d) C

program change
call lights requests resolution procedures C
data testing thread testing loop testing A

(a), (b), (d) (a), (b), (c) (a) to (d) D


specifications parallel
matching operations system walkthroughs B

Peripheral
processors. Concentrator. Job control language. D

(b), (c), (d) (a), (b), (c) (a), (c), (d) A

Identification ofPhysical security


critical of warehouse Cross-training of
applications. facilities. operating personnel. B
procedural
interface design design data design A
Computer
Client network Hub C
Bus Mesh Ring A

Bus Ring All of the above D


To do a
particular job
such as editing, To help someone
storing who is applying To Store data in an
information for employment organised manner B

Sequential Binary Indexed B


Data
communications Operating
hardware and systems and
software. compilers. Computer operations. C
A sequential file A direct access A direct access file on
on a tape file on a disk a tape C
Information
formats
commonly vary
Parity errors will between Data record can never
result architectures be blocked together C
Address
Control Unit calculation part Input output channel A

Local Area Wide area


network network Protocol B
Use the
computer to
which they are Are required with a
connected to Generally require microprocessor which
perform all a keyboard for permits some data
processing data entry and a processing such as
operations CRT for display input validation D

Time sharing
Modem Multiplexor computer C

Aids in back-up Packs data in a Speeds up online


procedures disk file printing A

Ring Network Loop Network Star Network D

Executor Electronic
systems mailing Instant post-office C

An intelligent A personal
workstation computer A mainframe PC B
Encryption
algorithms Parity checks All of them C
Terminal Communication Device interconnect
Standard protocol standard D

A compiler
converts the A compiler is a
whole of a general purpose
higher level language
program code providing very
into machine efficient
code in one step execution None of the above B
Lexical analysis,
Implementation CONVERSION,
and and code
documentation generation None of the above D

Baudot ASCII EBCDIC A


An interpreter is
a general
purpose
An interpreter is language
a representation providing very
of the system efficient
being designed execution None of the above A
Frequency
division Time Division
Demodulator multiplexor Multiplexor C
Middle-level Low-level
languages languages None of the above C

It is less error It is less prone to


prone attenuation Uses only one path D
Accounting
systems,
Graphic design commercial
and education sector None of the above C

Manage the Relieve the main


paging function CPU of repetitive Reduce competition
in a virtual communication between the
environment tasks input/output devices C

System Analysis Testing None of the above B

Coaxial Cable Common carrier Telephone Lines C

System Analysis System Analysis


defines the involves creating
format and type a formal model of
of data the the problem to
program will use be solved None of the above C

An interface A buffer An online protocol B

Testing to check
for errors before Hardware,
the system is Software and size
introduced of program. None of the above B
Packet Ring Bus B

1100101 1010101 None of the above C


Cyclic
Retransmission Redundancy Hash Count A

4 64 None of the above A

Modem Multiplexor Acoustic coupler C

141 97 None of the above B


Data
Data Mining management
tools systems All of them B

memory access secondary secondary storage


time storage capacity access time B

255 256 None of the above B

ASCII code form decimal form alphanumeric form A

1B7 5C4 None of the above A


8 bits 16 bits 32 bits B
Binary Coded
Decimal Bit Code Design None of the above D
1000 bytes 210 bits 210 bytes A
1112 1110 None of the above A

ASCII code form decimal form alphanumeric form A

used to detect is the first bit in a


errors byte is the last bit in a byte B

Its moves like a


mouse It has ears None of the above D

Light pen Joystick None of the above C


MIPS MHz VLSI B
Tracing Reading bar
diagrams codes None of the above B

MICR barcode scanning voice recognition B

Hard disk CD-ROM drive None of the above A


Light sensitive
Pencil lead elements None of the above C
1.44 Mb 5 Mb 1 Gb B
software output input A

Keyboard Numeric Keypad Printer B


Optical mark
Bar code reader reader Keyboard B
Mouse Speakers Printer A

Pixels Pixies Pickers B


Optical mark
Bar code reader reader None of the above C
mouse button word processing
layout keyboard layout software C
Optical mark
Bar code reader reader None of the above B
language software
interpreter interface an operating system C
Second - Third -
generation generation Fifth - generation
computers. computers. computers. A
Deep Blue Param Arjun C
caused by is due to bad disk
overuse blocks none of the previous C
Magnetic Ink
Optical Mark Character
Reader Recognition Image Scanning
Technology Technology Technology B
converts a
slower than an program to
interpreter machine code none of the previous C
Dot - Matrix
Printer Desk - jet Printer Thermal Printer A
decrypting it compressing it transmitting it C
Virtual
Vital information information
resource under reader & user
siege system None of above B
An inked ribbon and
Thermal Paper An ink pen print head D

LAN technology WAN technology Unix operating system B


10-3 sec 10-12 sec 10-9 sec D

External file
Control figures labels Cross footing tests C

system operating system communication D


model pilot project process D
multithreading multiplexing multitasking D

super computers micro computers none of the above A

arithmetic and central


logic unit processing unit none of the above B
non impact
drum printer printer none of the above C
electronic
word processing spreadsheet none of the above B
communication
software idea processor none of the above B
Microsoft
recycle bin exchange none of the above B
file record none of the above C
machine high level
language language none of the above B

processed
symbol connector symbol input/output symbol B
hp vectra fazitsu vp200
system series IBM-PC B

multithreading multiplexing none of the above D

dumb servers dummy terminals dummy servers A


distributed
computing
system windows NT LAN D

server back end front end D

server back end front end C


distributed
LAN computing centralized A

host
processing dumb processing data processing B

one two many A

hierarchical network relational database


database system database system system D
multithreading multiplexing none of the above B

disk
redo logging defragmentation disk mirroring D

Modulation/De Module/De-
modulation module None of the above B

locks constraints traps B

multithreading multiplexing none of the above B


Local area Local array of
networks networks. None of the above B

process thread client-server C

Integrated Integrated
Symbolic Digital Services Digital
networks. network. None of the above. C

Internet ARPANET None of the above. B


power builder SQL * plus all of the above D

WAN GAN None of the above. B

Bits Packets None of the above. C

Software Mail Simple Mail


transmission transfer
protocol protocol None of the above. C
Transmission
protocol Hyper text None of the above. C

Printer server Receiver None of the above. B

configuration package system A

LAN and WAN LAN and MAN LAN WAN and MAN B
ATM Internet Intranet A
Web based Web based Web based
Technology Transport Transaction A
Routers Protocol Repeaters B
batch command program D

alpha beta numerous alpha number and alpha A


cost, size,
performance performance, input, output,
their ratio cost performance ratios C

output feed write A

multithreading multiplexing multitasking D

compiler converter process D

processor ram output D


non-impact
desktop
drum printers printers thermal printers C

control program,
interpreter, monitor,
assembler, program, CPU, memory,
compiler keyboard, bus input, output D
application
software windows 95 interpreter B

protocols software's procedures C

compiler assembler coder B

interpreter assembler processor C


*

*
*

*
*

*
*

*
*

*
*
*

*
*

*
*

*
*

*
*
*

You might also like