Вы находитесь на странице: 1из 18

1.

BBS stands for______(bulletin board system)


2. USENET is a BBS on ____ scale(large)
3. Internet can be defined as _______(network of network)
4. _________is a program that displays information about a host connected to the
net(finger service)
5. _______ is a program or a tool that helps in locating a file anywhere on the
net(ARCHIE)
6. URL stands for ____________(uniform research locator)
7. A ______ always begins with a slash(command line)
8. The World Wide Web is referred to shortly as the _______(web)
9. ______ is a program that helps us to log on to other networks(telnet)
10.HTTP is the acronym for __________(Hyper text transfer protocol)
11.______is used to transfer and copy files over the internet(uucp)
12._____ is a program that helps us to log on to other networks(telnet)
13.TCP/IP stands for ________________(transmission control protocol/internet
protocol)
14.HTTP stands for______(hyper text transfer protocol)
15.Two of the important browsers are_____ and_____(netscape,ie)
16.________ are defined as ways of communication amongst networks(protocols)
17.HTML stands for_____(hyper textmarkup language)
18.The system of interlinked documents is known as_______(hyperlink)
19.The small programmes that create animation,multimedia,real-time games and
multi user games are called______(applets)
20.The information displayed on the web page includes______,_____
and_____(graphics,videos,audio)
21.The web pages that represent online home of their author are called______(home
page)
22._____ is the most popular internet service(electronic mail)
23._______ is a program or a tool that helps us find a file anywhere on the
net(archive)
24.Yahoo,lycos,excite and webcrawlers are _____(web directories)
25.GIF is the acronym for ____________(Graphical interchange Format)
26.JPEG is the acronym for ___________(Joint Pictures Expert Group)
27.The World Wide Web consists of _________(web pages)
28.A hyperlink can be on ___________(text or image)
29.Web is a collection of ___________(web sites)
30.The two major browsers used to surf the Internet are ________,_______(MS
Internet Explorer and Netscape Navigator)
31.The internet is also called as _______________(the net)
32.The internet is similar to _________________(peer-to-peer connectivity)
33.The net transfers______ from one place to another(data)
34.The net provides interesting services like______,______
and______(email,fileretrived,internet tools)
35.________ is the ancestors of the internet(arpanet)
36.DARPA stands for
_______________________________________________(defensive advanced
research projects administration net)
37.DARPA is broken into ________ and _______(milnet,smallerarpanet)
38.NSFNET is the united states provides service to _____
and_____(education,research)
39.HTML stands for ______________________________________(Hyper textmarkup
Language)
40.The first international IP network connections were established in 1973 with
_____ and_____(england,norway)
41.A_____ is a set of computers interconnected by transmission paths to exchange
information in internet(network)
42.A computer that provides a service usable by other computers is
called______(servers)
43._____ can be owed by multiple organisation(WAN)
44.Data is transmitted in the form of_____ signals(digital)
45.Modem stands for __________________(Modulation/demodulation)
46.______ is the process of the digital signals being converted into a form suitable for
analog transmission(Modulation)
47.________ and______ are two basic ways of getting connected to the
internet(Dedicated access and dial up access)
48.SLIP stands for ________________(Serial line protocol)
49.PPP stands for _____(Point to point protocol)
50.Identify the need for controls and auditing in a computerised environment.(All of
the above)
BASIC FUNDAMENTAL

1. 1024 Megabyte is equivalent to:(1 GB)


2. The software used for layout of newsletters and magazines along with text and
images is called……(Desktop publishing)
3. The model used to describe the relationship between data and information is
called(System model)
4. A super computer uses a bus width of……(64 bits)
5. When a processor executes one billion floating-point arithmetic operations per
second, is called…..(Gigaflops)
6. The processor responsible for communication to and from all the remote
terminals connected is termed as ………(Front-end processor)
7. The processors used for speed-critical graphics applications are……(RISC)
8. The plastic cards with embedded microprocessor and memory are called…..(Smart
card)
9. VLSI stands for…..(Very large scale Integration)
10.The data width of a Pentium 4 computer is ……(32 bits)
11.The unit which executes addition, subtraction, multiplication and division
operations is ……(ALU)
12.The instructions to be executed by the processor are loaded from memory into
the(Instruction register)
13.The results of a process are stored into ………(Accumulator)
14.The memory that stores data as a series of memory cells that can be accessed
sequentially is……(SAM)
15.The technology used to accelerate the processing of a computer is ………(Cache
memory)
16.The memory used in a computer's BIOS chip is……..(Flash memory)
17.The process of swapping information between the RAM and hard disk can
cause(Thrashing)
18.The standard system bus was replaced by frontside and backside bus
called…….(Dual independent bus)
19.The DSP,DAC,ADC,and ROM are parts of the ……(Sound card)
20.The bus whose widths are 32 or 64 bits is called……(PCI)
21.The maximum resolution of a standard SVGA adapter is ……(1280*1024)
22.…………. synthesis method uses recordings of actual instruments.(Wavetable)
23.The instrument that can produce continuous lines is…..(Plotter)
24.PPM , CPS are units used to measure the printer's …..(Speed)
25.The PCL and postscript are defacto standards for……(Page description languages)
26.A laser printer has RAM for downloading fonts called the…….(Soft fonts)
27.The characteristic which refers to how sharply a pixel appears on the monitor is
called…..(Convergence)
28.The faster the refresh rate, the lesser the monitor…..(Flickers)
29.The number of bits used to represent a pixel in a monitor decides the …….(Colors
and shades of gray that can be displayed)
30.The input device that utilizes a light-sensitive detector to select objects on a
display screen is called…..(Light pen)
31.The most commonly used scanner technology is….(Charge-coupled device)
32.Identify the type of mice that uses optical sensors to detect motion of the
ball.(Optomechanical)
33.Identify the input device that consists the puck and the stylus.(Tablet)
34.Identify the disk which has an access time of 30ms.(Winchester disk)
35.A set of tracks across a set of platters in a hard disk is called a……(Cylinder)
36.The bus used to connect a CD-ROM to your computer is…..(SCSI)
37.The digital audio tape with the capacity of 24GB of data uses the technology called
…..(Helical scan)
38.The floppy disks that support 400k-1.2 MB belong to……(Macintosh)
39.The backward compatible disk that has high density-120MB is called….(SuperDisk)
40.The maximum capacity of an optical disk is ……(6 GB)
41.Which of the auxiliary storage devices uses the constant angular velocity access
technology?(CD-ROM)
42.The……..is an auxiliary sequential access non-volatile storage device.(Magnetic
tape)
43.The portable device that optimizes the features of the floppy and the CD-ROM
is….(MO drives)
44.The important central module of an operating system is the…..(Kernel module)
45.Identify the function of the operating system that manages the tasks waiting to be
processed.(Job management)
46.This function of the OS manages allocation of a minimum main memory to
tasks.(Virtual memory storage)
47.Identify the multitasking type that slices CPU time to each program.(Preemptive)
48.The OS which allows different parts of a single program to run concurrently
is…..(Multithreading)
49.The OS that monitors external activities with timing constraints is….(Real-time)
50.The 32bit operating system for desktop version that replaces Win 9x is…..(Win
2000 professional)
51.The high-level logical disk structure which defines the way the entire disk is
organised is …..(File allocation table)
52.A collection of sectors on a hard disk is a(Cluster)
53.The FAT system that provides long filename support and was written using
protected-mode code .(VFAT)
54.Identify the file system that provides networking,security,compression, large file
support….(NTFS)
55.The logical directory structure has a base of the tree called the……(Root directory)
56.The process used to optimize the disk space by arranging files contiguously is
…..(Defragmentation)
57.Choose the level of RAID that offers disk mirroring for fault tolerance.(Level 1)
58.Identify the archive formats found on Unix-based Internet sites.(Tar, gz, taz)
59.Identify the window screen part that indicates the name of the window,
application or document.(Title bar)
60.The button on the title bar of a window that displays the menu to control the size
of the window is…..(Control box)
61.The mouse operation that is used to move windows and icons to different
locations is …..(Dragging)
62.The start button,tray and shortcuts are important features of the …….(Task bar)
63.The start menu option that keeps track of your important websites is
…..(Favorites)
64.If you want the recycle bin capacity to be distributed across partitions, you must
use the option ……(Configure drives independently)
65.The feature to retrieve deleted files from the recycle bin is …..(Restore)
66.The feature which enables to synchronize files between a floppy and disk is
…..(My Briefcase)
67.A file with the pdf extension can be viewed with the application…..(Adobe Acrobat
Reader)
68.The remote administration access to view shared resources on the network
is…..(Net Watcher)
69.The utility used to access the directory structure, create files and folders etc
is….(Windows Explorer)
70.The font, color, background settings are saved in the …..(Desktop themes)
71.The Notepad utility saves files in the …… format.(ASCII)
INTERENT

1. The IRC II client program command begins with a ….(Slash)


2. The IRC conversations are organized into….(Channels)
3. Identify the output of the IRC command " /list -min 10" .(Display channels with at
least ten users)
4. Lynx text browser is a web client in which users can login with …..(Shell accounts)
5. A web browser provides this hotlist for a user.(Bookmarks)
6. The tool to obtain information on the web by menus and more flexible than Archie
is….(Gopher)
7. These servers help in searching for words from a list of databases or
documents.(WINWAIS and WAISMAN)
8. This scripting language is an object based language and is developed by
Netscape.(JavaScript)
9. The one-way broadcast of live events is called….(Cybercast)
10.This is a system of thousands of distributed bulletin boards and read by a
newsreader.(Newsgroup)
11.Unix shell provides mailing programs called ….(Pine and Elm)
12.The Unix to Unix copy mail system separates parts of the mail address with the
symbol...…..(!)
13.The Netlauncher (TCP/IP) software consists of these programs that can run under
Windows.(Both A and B)
14.The parts of the WSIRC server (net tool) window are…..(Server message,command
line and channels)
15.These are small java programs that create games, multimedia etc. These are
downloaded over the Net and executed by a web browser.(Java applets)
16.The World Wide Web is a collection of…..(Web pages)
17.It is a link which helps in retrieving information from the WWW easily.(Hyperlink)
18.…………..directories deliver information on all the topics on the Internet.(Web
maps)
19.This browser does not display links in color.(Cello)
20.The Mosaic browser stores information about the configuration in a/an ….(Ini file)
21.This is an indexer that crawls around the web cataloging.(Webcrawler)
22.The option by which the browser window in Navigator Gold 2.0 can be shifted to
editor window is ….(New/Edit Document)
23.This toolbar button displays information about web creation.(Web page starter)
24.This window in Navigator Gold does not support frame display.(Editor window)
25.The different ways of communication on the Web are…..(Both A and B)
26.This download tool provides multi-server connection, can search for mirror sites
and provides a file leecher.(Download Accelerator Plus)
27.The…………button provides HTML tags for font style, alignments, and colour
options.(Character Format)
28.Identify the search engine that helps in concept based searching.(Excite)
29.This is a text only browser.(Lynx)
30.The multithreading feature of Netscape is facilitated with a storage space
named…..(Cache)
31.The distributed uploading of web pages through Navigator Gold is called…..(Web
publish)
32.The method of presenting information on the web through highlighted items is
called……(Hypertext)
33.The a2z directory is an alphabetical list of pages used by the search
engine…..(Lycos)
34.Netscape browser can display context links on an image called…..(Image maps)
35.Name the download tool which highlights an area of a page and gets all the links
that are within the highlighted area.(Webcow)
36.………...helps in business transactions, generating revenue and demand on the
information highway.(Both A and B)
37.The transfer of structured data for processing from computer to computer using
agreed formats and protocols is called…..(Electronic Data Interchange)
38.This system involves electronic transfer of funds between financial
institutions.(Electronic Fund Transfer)
39.A …… electronic mailbox stores EDI transactions for later retrieval.(Value Added
Networks)
40.The mutual satisfaction of price, terms and conditions, delivery and evaluation
criteria in a marketplace is….(Negotiation and Bargaining)
41.The type of advertising, the Broadcast and Junk Mail models are of…..(Push)
42.Identify the models of passive advertising.(Both A and B)
43.This layer is responsible for transmitting data as frames.(Data Link Layer)
44.This layer is responsible for encoding of data.(Presentation Layer)
45.This layer of the TCP/IP suite includes the device driver and network interface
card.(Link Layer)
46.This protocol is used for flow control, echo and flow redirection.(Internet Control
Message Protocol)
47.The software components that integrates different hardware devices with the
operating system…..(Device drivers)
48.This is the basic component that connects the computer to the network.(Network
Interface Card)
49.The dumb terminal/node in a network depends on this computer for their basic
functioning.(Server computer)
50.This has an embedded microchip which can both manipulate data and execute
applications.(Combi card)
51.To ensure a reliable communication between the buyer and seller, the protocol
used is….(Secure Sockets Layer Protocol)
52.The financial transactions are to be …………. leading to different steps in Accounts
Compilation.(Grouped and summarized)
53.The basic document where transactions are entered chronologically is….(Journal)
54.These are the basis for analysis by potential investors, banks etc.(P & L Account
and Balance Sheet)
55.The accounts that the business owns is called ….(Asset)
56.The expenditure for running the business for a period is …..(Expense)
57.Identify the account type by the rule: "Debit the receiver and credit the
giver".(Personal accounts)
58.The first document where the transaction is entered is called a …..(Voucher)
59.The document used for posting of accounting transactions is ……....(Journal and
ledger)
60.When the debit total is greater than credit total, the amount appears in the ……..
column.(Debit)
61.The methods LIFO, FIFO, Moving Average are used to ….(Value closing stock)
62.The report prepared taking the asset and liability type accounts from the Trial
Balance is called….(Balance sheet)
63.The report that depicts operating profit/loss for a period is …..(P & L statement)
64.The day book contains transactions relating to ………(Sales or purchase)
65.The Bills Receivable details are maintained in a ……..(Sundry debtors)
66.Creditors ledger has details of your dues to ……..(Suppliers)
67.The sundry debtors are placed in the Balance sheet on the ……(Assets side)
68.The first step in Tally before any transaction is entered or saved is creating a
………(Company)
69.To configure country specific details use the function key……(F12)
70.Identify the security mechanism used in Tally.(Tally Vault)
71.After selecting a company in Tally, you will be in the……(Gateway of Tally)
72.Tally software is based on ……… accounting system.(Mercantile)
73.Identify the primary group of capital nature that uses bank account and cash in
hand as sub groups.(Current assets)
74.All financial entries in Tally are done using…….(Ledgers)
75.The Direct expenses, Purchase account, Direct income are primary groups of
…..(Revenue nature)
76.The option to delete a sub-group is admissible through the menu……(Alter)
77.The behavioural attributes of this group cannot be changed.(Primary-group)
78.Credit limits for personal accounts and branches can be done in the ledger
mode……(Multiple)
79.We are not allowed to delete a ledger from this mode.(Multiple)
80.All account heads except Cash and Bank are placed in the……(General Ledger
master)
81.Identify the primary group of capital nature that has the sub-groups: Bank OD
Account, Bank OCC Account.(Loans)
82.The primary document for recording all financial transactions in Tally is
the……(Voucher)
83.You can customize the voucher entry screen using the function key…….(F12)
84.Identify the voucher type that records fund transfers between cash and bank
accounts.(Contra)
85.This voucher type records adjustments between ledgers.(Journals)
86.The use of classes for payment, receipt and contra vouchers enables data input in
……(List entry mode)
87.The details of a voucher entry can be given in the …….(Narration)
88.The credit note voucher can hold account types: ……..(Sales account, Sales tax
account)
89.The suffix and prefix details for the voucher type can be made applicable only
from the …….(First of a month)
90.The voucher used to record all bank and cash payments is …..(Payment)
91.Tally's age-wise analysis considers the voucher's ……(Effective date)
92.Arrange the steps in generating the books of accounts.
1. Create Trial balance
2. Create new ledgers
3. Generate Day Books
4. Update journals for financial transactions(2, 4, 3, 1)
93.For day-to-day transactions the voucher types used are(Both A and B)
94.Say for example a payment is made to a creditor ABC - Rs.10000 by cash, it can be
entered into the voucher type…..(Payment)
95.Identify the purchase voucher type, the transaction for purchase of 10 CPUs,10
monitors by credit.(Credit Purchases)
96.Identify the voucher type to be chosen for the sale of computers to Anand by cash
@ Rs.210000 per unit.(Stock Journal)
97.A bank overdraft repaid by cheque at Rs.25000 can be made in the
voucher…..(Contra)
98.The financial statement that consolidates ledger balances is …..(Trial balance)
99.The F9 function key in the left side of the Gateway of Tally screen displays
the……(Inventory reports)
100. The option on the Gateway of Tally that will generate the P&L account
statement is…..(Net Profit)
101. This displays the balance daywise for a selected voucher type.(Day book)
102. The feature in Tally to analyze accounts of a company is…..(Ratio analysis)
103. The age-wise statement is displayed based on……(Payables)
104. The ratio analysis of receivables can be done based on……(Bill date)
105. Name the statement that helps the management in the decision making
process.(Funds flow)
106. Identify the budget type which is chosen where transaction amounts are to be
monitored.(On net transactions)
107. Choose the budget type to be used where bank accounts balances are to be
monitored.(On closing balance)
108. The management that needs to consolidate the accounts of its various
enterprises uses ……. in Tally.(Group company)
109. Identify the user who can access audit trails in Tally.(Administrator)
110. Identify the accounting feature in tally that facilitates splitting financial years
for a company data.(Period-less accounting)
111. The tracking of changes in vouchers and ledger masters is done by…..(Tally
Audit)
112. Tally can import data from other programs and creates a log about the activity
in the file…..(Tally.imp)
113. Import and export of data between Tally and other programs is possible with
the help of…..(ODBC)
114. The manual option of voucher numbering leads to…..(Duplicate number)
115. The Tally audit trail tracks changes made to vouchers that are …..(more than 30
Days old)
116. The ratio analysis of Bills Receivables or Bills Payables can be displayed with
the function key…..(F6)
117. A _____________ is a list of instructions for the computer.(Program)
118. Which of the following displays the output?(Monitor)
119. The term ______ refers to the physical parts of the computer.(Hardware)
120. How many bits form a character?(8)
121. System 7 is a/an ____________.(System software)
122. Which of the following is used to create newsletters and magazines?(Desktop
publishing software)
123. A model to describe the relationship between data and information is called
______________.(System model)
124. ________ can customize an application program for a specific task using the
advanced features of application programs.(Power users)
125. Computers are _______________.(All of the above)
126. A _________ is one billion floating-point arithmetic operations per
second.(Gigaflop)
127. The capability to process multiple programs concurrently for multiple users is
called ___________.(Multiprogramming)
128. Which of these is a single-user computer?(Microcomputer)
129. RISC stands for _________________.(Reduced Instruction Set Computer)
130. Which of the following can be used as a server for LAN?(Workstation)
131. The full form of PIM is ______________.(Personal Information Manager)
132. First generation computers use _______________.(Vacuum tubes)
133. ________________ are also called semiconductors.(Integrated circuits)
134. Circuitry used in fourth generation computers is _____.(VLSI)
135. ____ of CPU sends command signals to the other components of the
system.(Control Unit)
136. The opposite of RAM is ________________.(Serial Access Memory)
137. Which of the following is not a type of cache memory?(L4 cache)
138. When operating system has to constantly swap information back and forth
between RAM and hard disk, it is called _____________.(Thrashing)
139. ____ connects the microprocessor and the system memory.(Local bus)
140. The shared bus _________________.(Connects additional components to the
computer)
141. The graphics card in a modern PC can connect in _________ way.(All of the
above)
142. Full form of PCI is ______________________.(Peripheral Component
Interconnect)
143. ______ carry signals and voltages across the motherboard.(Traces)
EXCEL

1. In MS Excel, references to cells in other workbooks are called _____.(Links)


2. In Excel, when E$5 is copied down or across, the _________ reference can
change.(Column)
3. Which of these is a valid range name in Excel?(___A.B)
4. How to name a range in Excel?(All of the above)
5. Which operator is used for exponentiation in Excel?(^)
6. In Excel, ____ are structured programs that calculate a specific result.(Functions)
7. In Excel, FACT(2.9) returns __________.(2)
8. In Excel, LOG function returns the ________________.(Logarithm of a number to
the base specified)
9. In Excel, MROUND(1.3, 0.2) returns _______.(1.4)
10.In Excel, __________ returns the average of the absolute deviations of data points
from their mean.(AVEDEV)
11.In Excel, ___ error message is given if the formula contains a blank cell.(#DIV/0!)
12.In Excel, _________ error message is given if the formula contains text that Excel
doesn't recognize.(#NAME?)
13.To manually calculate all the formulas in a worksheet, press _______.(F9)
14.To have column and row headings visible while scrolling the worksheet,
_______________ feature is used.(Freezing Panes)
15.If a cell is formatted as Accounting in Excel, zero values are shown as
________.(Dashes)
16.By default, MS-Excel aligns error values in the ________.(Center)
17.If cells A2, A3, B2 and B3 in a worksheet are merged, the cell reference for the
merged cell is _______.(A2)
18.Which of the following is not a chart type in Excel?(Row Chart)
19.In MS-Excel, a 3-D column chart uses three axes - a horizontal axis, a vertical axis,
and a ________ axis.(Depth)
20.In which of the following situations, Excel's pie chart should be used?(There are no
more than seven categories.)
21.In a clustered bar chart in Excel, the ___________ are typically organized along the
vertical axis.(Categories)
E-FILING

1. Gopher is a ________________________.(Distributed document search and


retrieval network protocol)
2. Full form of WSIRC is _____________________.(Windows Sockets Internet Relay
Chat)
3. OSI model contains _______ layers.(7)
4. Blog web sites are used to ____________________.(Post online diaries which may
include discussion forums)
5. Which of the following is not a limitation of Navigator Gold?(Drag and drop
capability is not supported.)
6. URL stands for ________________________.(Uniform Resource Locator)
7. _____________ is the basic component that will allow a computer to
communicate over a network.(Network Interface Card)
8. An API _____________________________.(Provides network I/O to remote file
systems)
9. A search engine operates in the following order:(Web crawling, Indexing,
Searching)
10.In case of a static website, __________________.(Web pages stored on the server
are in the same form as the user will view them)
11.Fresh Download is ______________________________.(A download manager that
supports multiple connections, scheduling as well as pausing and resuming of
broken downloads)
12.EFT involves ________________________.(The electronic movement of funds and
fund information between financial institutions)
13.Which of the following is a disadvantage of the catalog model of passive
advertising?(Lack of timeliness)
14.Full form of PDA is ____________________.(Personal Digital Assistant)
15.SET uses _______ to ensure the identities of all parties involved in a
purchase.(Digital certificates)
16._______________ require a smart card reader in order to work.(Contact cards)
17.In a network, clients that do not require the server for their basic functioning are
called ________________.(Smart terminals)
18.Which of the following is a protocol suite?(AppleTalk)
19.Which of these statements is false for OSI reference model?(Presentation layer
provides the interface between the applications and the computer network
services.)
20.____________ is a private network implemented inside the enterprise to facilitate
internal communication.(Intranet)
21.The two companies or groups which exchange information through EDI are called
__________________.(Trading partners)
22.A/An ________ contains one or more documents for the same trading
partner.(Transmission File)
23.EDIFACT stands for _______________________.(EDI for Administration, Commerce
and Transport)
24.Metamediary model of online purchase
______________________________.(Provides services like quality assurance)
25.To protect against merchant fraud while making payment online, use system from
_____________.(Any of the above)
26.JEPI stands for ____________________.(Joint Electronic Payments Initiative)
27._________________ is the transportation foundation that enables the
transmission of content in the e-commerce framework.(Information
Superhighway)
28.EDI stands for _______________________.(Electronic Data Interchange)
29.A typical EDI system converts generic EDI messages in EDI format to ___________
format.(RDBMS)
30.Which of the following external document standards is not supported by an EDI
system?(X10)
31.In EDI, ___________________ define the procedural format and data content
requirements for specified business transactions.(Transaction Set Standards)
32.ITR stands for ____________________.(Income Tax Return)
DATA BASE

1. In MS-Access, a view cannot be sorted on ______________ fields.(OLE Object)


2. ___________ queries are useful for summarizing information, calculating statistics,
spotting bad data and looking for trends in a database.(Crosstab)
3. ___________ form in MS-Access, lets the user see the datasheet in the upper
section and a form in the lower section for entering information about the record
selected in the datasheet.(Split)
4. In MS-Access, _____________ controls are also known as memory
variables.(Unbound)
5. In MS-Access, ____________ are used strictly for viewing data and not for entering
data.(Columnar reports)
6. In MS-Access, _______ control lets the user to insert a picture into the form.(Logo)
7. The relationship between a school and students is _______________.(One-to-
many)
8. Variance Analysis Report provides information on __________.(The difference
between the actual vs the budgeted figures)
9. __________ controls are designed to ensure that the integrity of the data entered
into the computer system is maintained.(Input)
10.Which of the following code type has the demerit of low mnemonic value?(Serial
code)
11._____________ is a record level check though applied for a field.(Sign test)
12.______________ are the grand totals calculated for any code on a document in the
batch.(Hash totals)
13.__________ are required to check if correct sequence of commands and update
parameters are passed from the application software to the database.(Data
integrity related controls)
14.___________ tables are stored tables from which certain values are extracted for
further processing and storing.(Internal)
15.In ____________ tests, top-level modules are tested first.(Top-down)
16.Which of the following technique is capable of identifying unusual transactions
passing through the system?(Embedded Code)
17.In ___________________ technique, care must be taken to ensure that live data
does not impact actual results.(On-line Testing)
18._____________ testing is program-based.(White box)
TALLY

1. The methods LIFO, FIFO, Moving Average are used to ….(Value closing stock)
2. The report prepared taking the asset and liability type accounts from the Trial
Balance is called….(Balance sheet)
3. The report that depicts operating profit/loss for a period is …..(P & L statement)
4. The day book contains transactions relating to ………(Sales or purchase)
5. The Bills Receivable details are maintained in a ……..(Sundry debtors)
6. Creditors ledger has details of your dues to ……..(Suppliers)
7. The sundry debtors are placed in the Balance sheet on the ……(Assets side)
8. The first step in Tally before any transaction is entered or saved is creating a
………(Company)
9. To configure country specific details use the function key……(F12)
10.Identify the security mechanism used in Tally.(Tally Vault)
11.After selecting a company in Tally, you will be in the……(Gateway of Tally)
12.Tally software is based on ……… accounting system.(Mercantile)
13.Identify the primary group of capital nature that uses bank account and cash in
hand as sub groups.(Current assets)
14.All financial entries in Tally are done using…….(Ledgers)
15.The Direct expenses, Purchase account, Direct income are primary groups of
…..(Revenue nature)
16.The option to delete a sub-group is admissible through the menu……(Alter)
17.The behavioural attributes of this group cannot be changed.(Primary-group)
18.Credit limits for personal accounts and branches can be done in the ledger
mode……(Multiple)
19.We are not allowed to delete a ledger from this mode.(Multiple)
20.All account heads except Cash and Bank are placed in the……(General Ledger
master)
21.Identify the primary group of capital nature that has the sub-groups: Bank OD
Account, Bank OCC Account.(Loans)
22.The primary document for recording all financial transactions in Tally is
the……(Voucher)
23.You can customize the voucher entry screen using the function key…….(F12)
24.Identify the voucher type that records fund transfers between cash and bank
accounts.(Contra)
25.This voucher type records adjustments between ledgers.(Journals)
DIGITAL SIGNATURE

1. Digital signatures use ________________.(Public key cryptography)


2. While sending signed and encrypted message using digital signatures; one-time
symmetric key used for encryption, is encrypted using
______________________.(Recipient's public key)
3. Certificates can be read or written by any application complying with
_______.(X.509)
4. ______________ are on-line databases of digital certificates.(Repositories)
5. A Digital Certificate is issued by a _______________.(Certification Authority)
6. Document authentication means ______________.(Identifying what is signed)
7. _____________ is used to create the digital signature.(Private key)
8. ARPA stands for ______________________.(Advanced Research Projects Agency)
9. The device used for converting analog signal into digital representation is
______________.(Modem)
10.______________ is also known as shell accounts.(Dial up access)
11.Which of these is not a web browser?(E-Meleon)
12.Status bar ____________________.(Is the place which displays the progress of the
loading page)
13.Mirror servers can be used to ____________________.(Ease the load of data
transfer)
WORD

1. In Word, ____ key is used to update the index.(F9)


2. The Research option is in _____ group of Review Ribbon in Word.(Proofing)
3. In Word, Thesaurus provides the user with a list of _________.(Synonyms for a
selected word)
4. To see what changes have been made to a Word document, one can use
______________ utility.(Track Changes)
5. View Ribbon in MS-Word can be accessed using the keyboard shortcut
______________.(Alt + W)
6. To display our Word document in Draft view, which keyboard shortcut can be
used?(Alt + W, E)
7. In Word, ______________ shows an outline of the document's headings on the left
of the Word 2007 window.(Document Map)
8. In Word, a _________ is a shortcut for performing a series of actions and is useful
for automating complex or repetitive tasks.(Macro)
9. Which of these is a valid macro name in Word 2007?(A67S)
10.For macro to be available whenever we use Word, the macro should be saved as
part of the _____________ template.(Normal.dotx)
11.The data in a ________ file cannot be changed.(PDF)
12.A ___________ is defined as a set of unified design elements that provides a look
for Word document by using color, fonts, and graphics.(Theme)
13.In Word, themes have a palette of _____ colors.(12)
14.In Word, a _________ margin setting adds extra space to the side margin or top
margin of a document that we plan to bind.(Gutter)
15.Which of the following is not a type of Section Break in Page Break options of Page
Setup group in Word 2007?(Last Page)
16.A watermark used in MS-Word, is ___________________________.(A translucent
image that appears behind the primary text in a document)
17.In Word, ____________ a shape is also referred to as Flipping.(Reversing)
18.Address Block option is present in _______________ group of Mailings ribbon in
MS-Word.(Write & Insert Fields)
19._______ file can be used as a data source in Mail Merge.(.csv)
20.While doing Mail Merge, a specific merged document can be previewed by clicking
_______________.(Find Recipient)
21.In Word 2007, ___________ are the graphical equivalents of drop-down
menus.(Galleries)
22.The default extension for Word 2007 document is _____.(.docx)
23.When all Office programs are exited and the computer is restarted, the Office
Clipboard ______________.(Is cleared of all items)
24.In Word, font effect _____________ draws a line through the selected
text.(Strikethrough)
25.In Word, a __________ indent controls the left boundary of every line in a
paragraph except the first one.(Hanging)
26.The Links group of Insert Ribbon in Word, contains options for
_______________.(All of the above)
27.To create a linked object along with existing information in Word, click
_____________.(Paste hyperlink)
28.Macros option is in ___________ Ribbon in MS-Word.(View)

Вам также может понравиться