Академический Документы
Профессиональный Документы
Культура Документы
QUESTIONS A B C D
TALLY
The ------ key can be used to select an
existing company from list of None of the
companies. F1 ALT+F1 CTRL+F1 above
Import and Export of data between
Tally and other programs is possible None of the
only through ---------- Program. Tally ODBC Tally IMP Tally INI above
The re-order point is the inventory
quantity that trigger a stock
replishment activity. TRUE false
A created company's detail can be None of the
modified through keys F3 ALT+F3 CTRL+F3 above
A/An ------------- is the official notice that
the firm sends to its customers to
advise then to the amount of money None of the
that
In is owed.
tally,all masters have ________main Invoice Bill A or B above
options Two Three Four Five
In tally,to create a new column in None of the
balance sheet press _______ Ctrl+C Alt+C Alt+Ctrl+C above
In tally,the use of group behaves like a
sub-ledger, option is that we can
summarize many ledger accounts into
one line statements TRUE FALSE
In tally, we can alter ledger details
using either single or multiple modes
but not alble to delete a ledger from
multiple modes. TRUE FALSE
In tally,a group company is marked with
an ______________ * $ & ^
Puchasing,
The systems that work together to Puchasing Puchasing Accounts Receiving and
order,receive, and pay for and Accounts and payable and Accounts
replenishment of stock are --------------- payable Receiving Receiving payable
Tally allows to delete a ledger from Mone of the
--------- alteration mode. Single Multiple A or B above
--------------------- is/are useful for Cash Flow Fund Flow Ratio All of the
management in the decision making. Statements Statements Analysis above
In tally,the group company must
contain at least _____________ members Two Three Four One
To cancel a vourcher entry in Tally,
short-cut key is ----------- Alt+D Alt+X Ctrl+T Ctrl+D
The accounting masters and inventory Create Alter Display All of the
masters related to Information Information Information above
We press ------------- function key to
display the age-wise analysis of Bills
Receivable
In Tally, we or Bills------------,
press Payable report
to print F4 F5 F6 F7
None of the
report . Alt+P Ctrl+P Shift+P above
In Tally, Types of Accounts and Types of
Vouchers passed during the period, can
be seen in ------------- report. Tally Audit Statistics Day Book Journal Book
In the Tally Software, the ------------
directory stores all data entered by the None of the
user. Bin Data Sub above
The Ledger Accounts are unique in
Financial Accounting Packages True False
Customers can be permitted to enter Electronic
their own data into the firm’s computer Enterprise Enterprise Data
using the firm’s wide area network is an Data Data - Interchang
example of Interchange Information e. All of the above
In Tally, we can customize the Vouchers
as per our requirements TRUE FALSE
The number of steps in Accounts
Compilation are 2 3 4 5
Each action/transaction of a firm is
described by a ----------------. data element data record Field All of the above
Tally is based on mercantile accounting
system FALSE TRUE
Display stock
valuation Open Change None of the
Ctrl + N is used to ----------- method Calculator Period above
------------- in Tally classify the accounts
under different heads so that None of the
summarised information is possible. Ledgers Groups Journals above
Revenue Account also known as None of the
-------------- Account Personal Nominal Real above
All of the
Method of Voucher Numbering is/are Manual Automatic None above
Balance
Accounts Receivable are displayed in Sheet Profit & Loss Journal Book All of the above
Physical
To assemble a product from different Stock Stock Reversing
items -------------- entry is used Journal Journal Transfer Journal
A --------- purchase orders data flow is
directed to the purchasing system for
use in closing out the outstanding
purchase orders in the receiving None of the
system diagram. Filled Receipt Issue above
Tally provides at least ---------
predefined voucher formats 11 16 18 21
The value of the inventory is included
in a ledger accounts as an asset on the
balance sheet FALSE TRUE
" The buyers can follow up with the manageme
suppliers to determine the reasons " is management nt by electronic
an example of ----------------- by objective exception data analysis All of the above
From voucher entry mode , if we press
__________ then we get payment
voucher in tally F4 F5 F6 Alt+f5
Primary
Default Cost Category in Tally is/are Main Cost
-------------- Location Primary Category All of the above
A Group Company is simply a name and
an identify given to the merged
accounts member companies of the
group. True False
A ----------- is a primary document for None of the
recording all financial transactions. Ledgers Reports Vouchers above
The field can have a value between
________________ in FA Package. 0 to 9 1 to 100 10 to 60 None
The _______ file maintains data that
describes the supplier past transaction
with the firm in terms of material
quality in AIS Supplier Suspense Order All of the above
It is necessary to manipulate data to None of the
transform it into ---------------- Report Output Information above
In tally, to change the date of the
voucher press ______ F2 F4 Ctrl+f2 Ctrl+f4
Tally can maintain budgets on Net Closing None of the
---------------- Transactions Balance A and B above
The value of the inventory is included
as an asset on the balance sheet True False
In ratio analysis report of Tally FA
packagewe we press ________________
function key to the display of bills F6 function Alt + f6 F7 function None of the
receivable , bills payables report key function key key above
The accounts payable system is
responsible for paying the suppliers for None of the
the ----------------- Sales Purchases A or B above
What is the default financial year in 1-4-1995 to 1-4-1996 to 1-4-1997 to None of the
Tally6.3 _________________ 31-3-1996 31-3-1997 31-3-1998 above
Tally encrypts and stores TALLY DATA
at the data directory True False
The Profit & Loss statement can be None of the
displayed in ---------------- format(s). Horizontal Vertical A or B above
Balance
sheet & profit
& loss profit Profit & loss Cash and
Default ledger accounts in tally are & loss and and trial profit &
______ trial balance balance loss Cash and bank
Default 'godown' name in tally is Main None of the
____________ Primary location A or b above
Security Cost None of the
'Tally vault' is a _________________ mechanism Ledger a/c category above
To create a sales voucher in tally , you
have to press _______ F5 F7 F8 F9
A Group Company is -------------------------
given to the merged accounts of None of the
member companies of the group. a name an identity A and B above
In tally,"credit note" voucher type Purchase None of the
records entry for ________________ Sales return return a or b above
In tally you get currency symbol option Company Stock items Regional None of the
from _______ menu creation units setting above
------------------ gives the balance for each
day for the voucher type has been Balance None of the
selected. Trial Balance Daybook Sheet above
For 'stock journal' entry we press
______________ in tally F7 Alt + F7 F10 F11
Tally provides the capability to the Changes in Changes in
administrator/auditor to track changes transactions Ledger Both A and None of the
in the
In tally,areas
types is/are
of users are or vouchers Masters B above
_______________ 2 3 4 1
By pressing -------- key, a list of
inventory reports can be displayed
straightaway from the balace sheet
report F9 F10 F11 F12
Projected approximation of income or Balance Profit & loss
expenses is called ______________ . sheet a/c Budget None
"Administrator" type user is also called
'Auditor' of a company in Tally TRUE FALSE
You will get company information , if
you press __________ from gateway of None of the
tally F3 Ctrl+F3 Alt+F3 above
A constituent(member) company can
be a member of more than one group. TRUE FALSE
Default stock category in tally is ______ Main location Primary Symbol None of them
To create a log of the import
activity in a file _____________ is
located in the same directory as an
executable program in tally Tally.imp Tally.ini A or b None
In Tally,inventory valuation method Stock Stock None of the
option is available from _______ summary Stock journal analysis above
In 'comp info
By pressing During the -> security
Tally audit feature is available in a F11 function creation of control'
company __________________ key a company option None
In tally, a group company can also be a
constituent(member) of another group
company
Default number of groups in tally are TRUE FALSE
________ 128 228 28 16
During voucher entry ------------- are Ledger
used. Accounts Groups Sub-Groups B or C
User designated as --------------- can view Administrat
audit list. or Owner Data Entry TallyVault
One
company to Other
another programs - a
company spreadsheet
created or a
Tally supports Importing of data from withon Tally database Both A and None of the
---------------- Package file. B above
In an accounting information system,
which of the following types of Cash
computer files most likely would be a Inventory disbursemen Cash Payroll
master file? subsidiary. ts. receipts. transactions.
Will be
Does not more Eliminates the
require as Will produce efficient at need to
Which of the following is an advantage stringent a a more producing reconcile control
of a computer-based system for set of accurate set financial accounts and
transaction processing over a manual internal of financial statements subsidiary
system? A computer-based system: controls. statements. . ledgers.
data that
has been the address an instruction
data to be transferred of a that has been
The memory address register is used to transferred to from memory transferred from
store memory memory location memory
FUNDAMENTALS OF COMPUTER
System
Inefficient usage of excess computer Contingency feasibility Capacity Exception
equipment can be controlled by Planning report Planning reporting
Which of the following is not the
component of a CPU NIC Card VSAT RAM AGP Card
DATABASES
Analysis,
System
Specificatio Programmin Design, and
Name three steps involved in n, Design, g, Design, Implementati
developing an information system and Testing and Testing on None of above
_______ is used for CAAT as database Oracle ACL JCL none the above
Generalized audit software perform
auditors to undertake any past records
and not concurrent auditing TRUE FALSE
Generalized audit software is a file
whose capabilities for verifying
processing is logic TRUE FALSE
CAAT's are computer program and data
that auditor uses as part of the audit
procedures to process data if audit
significance contained in an entity
information system TRUE FALSE
CAAT do not contains package
programs, purpose written program,
utility programs or system
management programs yes no
Embedded audit routines are
sometimes built into an entity's
computer system to provide data for
later user by the auditor TRUE FALSE
SCARF involves embedding audit
software modules within an application
system to provide continuous
monitoring TRUE FALSE
Concurrent use auditors as the member
of the system TRUE false
Regular cross system verification may
minimize frauds true false
Computer security is frequently
associated with confidentiality, integrity
and authentication true false
manage enable
Operating systems are devised to hardware & multiple user
optimize the machine capabilities, the scheduled software resource
function include_______________ jobs resources sharing all the above
General purpose software provides a
framework for highly complex scientific
operation true false
In batch processing, transactions are
processed one after another true false
re-perform
procedures
provide carried out
Audit software is used by the auditor to read data on information by the clients
_________ client's file to the audit programs all the above
Core image comparison is a software
used by the auditor to compare _______
version of a program with a secure executables deleted, none of
________ copy , master hard these all the above
Database analyzer is a software which
provides detailed information
concerning the operation of the
database true false
system system
analysis advanced none of the
SAS stands for ______________ software software all the above above
Embedded code is a software used by
the auditor to examine backup data true false
Embedded code performs wide variety
of audit task yes no
Core image comparison is particularly
useful where only executable versions
are distributed true false
Log analysis is a software used by
auditor to detect virus true false
On line testing techniques the auditor
______ data either _______ or fictitious in
order to see that a specific program or manipulate none of
sever edit test is doing its work s, real create, false these all the above
can enable
the auditor can provide
to execute the auditors
can be very provisions with useful
powerful on a number information
Modeling is a variety of software which analytical of different with trend s all of the
________________ tool bases and patterns above
On line testing can be targeted for
specific functions carried out by
programs yes no
examinatio
identifies n of source
program code of a
provides code which program
detailed may be with advice
information there for to following
Program code analysis involves of machine fraudulent the logic of none of the
_____________ uses reason a program above
__________ is a software of CAAT IDEA ACL ALC ACLL
Snapshot is software which takes a
picture of a file or data or a transaction
passing though the system true false
fictitious
data
applied comparison
against the of source analyzing the
Base case system evaluation client version of a picture of a
includes____________ program programmed file or data all the above
While base testing forces on finding if
there are any defective execution
policies in a program true false
Black box testing seeks to determine
whether application output is what it is
supposed to be true false
In integrated test facility approach the
auditor should ensure that the impact
of test transaction is subsequently
eliminated from the computer files true false
Black box testing is _______ based and specificatio file, none of the
white box testing is _______ based n, program hardware above all the above
Which of the following dialog box is/are new form form create form wizard
used in the creation of form ________ dialog box dialog box dialog both 1 and 3
_______ query wizards are used to
generate summary calculations for a
table summary sum append simple
An organised
way of
A way to storing
analyse and A tool to information
manipulate produce high about a set A way of
numerical quality of similar maintaining a
What is a database? information documents things log
It contains
Information all the data A document
about certain about one which A collection of
What does a record contain? programs specific item contains text files
relative Relational
An RDBMS is a remote DBMS DBMS DBMS Reliable DBMS
storing data backing up
offline at a data is related to uses tape as
Data Warehousing refers to separate site regularly data mining opposed to disk
Computer
Unauthorised alteration of on-line Key sequence Computer Database access
records can be prevented by employing verification checks matching controls
Reports allow Reports
users to provide a
extract very flexible A tool which
information way of allows text
as hard copy creating and and graphics
(printed editing to be placed None of the
What is a report? output) documents in documents above
Extracting Spreadsheet
and s make data
What is the best way to analyse and analysing easy to Using None of the
change data data analyse queries above
Word
Network processors,
Compilers, software, spreadsheets
What are some popular office interpreters, backup , databases, None of the
orientated software applications? editors systems DTP above
Which of the following constraints can DEFAULT and FOREIGN PRIMARY KEY
be used to enforce the uniqueness of NOT NULL KEY and UNIQUE IDENTITY
rows in a table? constraints constraints constraints columns
Which of the following commands is CHANGE MODIFY
used to change the structure of table? TABLE TABLE ALTER TABLE UPDATE TABLE
You are creating a client application
that calls ActiveX DLLs. Which of the
following properties of the Err object
provides the name of a component that
sends an error back to the client
application? Number Description Component Source
This database holds personal keeping the saving the file
information. The user can help to keep using a keeping a original with different
it confidential by password backup copy paper copy filenames
If the database holds customer names
and addresses, personalised letters can the product the primary
be created automatically using code key mail merge e-mail
Application software suited to storing
the survey information obtained in the
table would be A database Graphics browser e-mail
The characters * and ? are sometimes
used in search criteria as bookmarks operators wildcards engines
Which of the following field types will
generate the primary key
automatically? Auto Primary Auto ID AutoNumber Auto Key
forms in a
records in a related database are
dynaset are tables in a consistent reports are
consistent database are with the consistent with
with the consistent underlying the underlying
underlying with one tables or tables or
Referential integrity ensures that the: tables. another. queries. queries.
main form query and its
Tables are related to one another and a associated report and its
through a: foreign key. subform. dynaset. related query.
the primary the primary
key of both key of the a field from not a primary
related related an unrelated key of either
A foreign key is: tables. table. table. related table.
the database
In an enterprise-class database system, management
reports are created by the database system
____________________ . the user application (DBMS) the database
it contains a
all the users' it reduces description
A database is considered "self- data is in one data of its own
describing" because _______ . place duplication structure All of the above.
In an enterprise-class database system, holds user holds holds
the database _________ . data metadata indexes All of the above.
A database designed using as a new
spreadsheets from the Sales systems as a redesign
department is a database being from existing developmen of an existing
designed _________________________ . data t project database a and b
Value Added Network is an example of Global Private Satellite Area None of the
_________ Network Network Network above
Active or Passive or Glow sign or
The advertising strategies emerging in push based pull-based hoarding
the on-line world are ____________ advertising advertising strategies All of the above
The _________ model use direct mail,
spot television or cable television, in
active based advertisement. Broadcast Junk mail Billboard Endorsements
The ________ is a form of mail that is not
targeted to a specific audience E-mail Bulk-mail Direct-mail Junk mail
The __________ model refers to
information that is placed at a point
where it will be noticed by customers in
the course of other activities and does Endorsemen
not require active search Catalog t Billboard Broadcast
The most beneficial advantage of ERP Error Data Low cost of Quality
system is checking Integration operation management
What is the term that describes spying
on one’s business rivals to gain a Competitive Corporate Industrial Economic
competitive advantage? espionage espionage espionage espionage
Contact
numbers of
A list of the
What would you NOT be looking for competitor’s managemen Research A competitor’s
when spying on a competitor? clients t group data new project
single-user multi-user e-commerce
An online drugstore such as database database database
Drugstore.com is an example of_______ application application application None of above
Keeping
Which of the following is an example of Replying messages Including the Using all capital
unacceptable online ‘netiquette’? promptly short Subject letters
Removable Message Encryption
drives that authenticati performed
can be on in EDI by a Security at the
locked up at systems physically transaction
night provide performs the secure phase in EDI
adequate same hardware systems is not
security function as device is necessary
when the segregation more secure because
Which of the following statements is confidentialit of duties in than problems at that
correct concerning the security of y of data is other encryption level will be
messages in an electronic data the primary information performed identified by the
interchange (EDI) system? risk. systems. by software. service provider.
convert text
The wizard that is used to import text text import to columns
files is_________________ wizard wizard tip wizard function wizard
The alphabet indicating the column
followed by the row number is known row column none of the
an__________ cell reference reference reference above
world search
wide search windows for
for sockets information
information internets and research none of the
WSIRC stands for______ and research relay chat council above
Two of the important browsers are_____ mosaic,goph none of the
and_____ lynx,minx netscape,ie er above
Lynx is a _______ programme that works world wide world wide none of the
with terminals web server web client interface above
The huge list of keywords from none ofthe
important items is called an_____ glossary index hotwords above
very
organised
very easy network verification
and rodent integration on network
oriented net and integration
wide index to communicati and
VERONICA is an acronym for computerized on communicati none of the
_______________ archives application on above
university of
university of cleveland,cle
The first freenet is created at the_____ berkeley,berk veland university of none of the
and is called______ eley freenet freenet California net above
________ are defined as ways of none of the
communication amongst networks protocols IP address dns above
search
______and_____ are web searching engines,direc ftp and telnet and none of the
features tories finger ftp above
WINWAIS has two source lists allsrc,winsoc wais,winsocknone of the
namely____ and______ ks wais,allsrc s above
none of the
________ is also called as WAIS manager allsrc waisman winsock above
The system of interlinked documents is none of the
known as_______ hot links hyper text books marks above
The small programmes that create
animation,multimedia,real-time games none of the
and multi user games are called______ images applets animation above
animation,sc
The information displayed on the web graphics,vide programms,i ripts,executa none of the
page includes______,_____ and_____ os,audio mages,text bles above
The web pages that represent online welcome none of the
home of their author are called______ first page home page page above
global global grand
network networks network none of the
GNN is
_____ stands for______
the most popular internet news
yahoo navigator
electronic news
search aboveof the
none
service service mail engines above
Netscape
page starter
site,netscap
The online service offered by navigator email and net e page yahoo and none of the
gold 2.0 are _______ and_____ conference wizard altavista above
_______ is a program or a tool that helps
us find a file anywhere on the net newsgroup telnet ftp archive
The databases to enable keyword none of the
search using Lycos are a2z,_______ Lycos catalog point review all the above above
______ is a large worldwide bulletin
board service network apple link bitnet Delphi fidonet
computer
related
abbreviations biographical
BABEL consists a glossary of _____ and acronym information bookstores none the above
Dictionaries,encyclopaedias,governmen on-line
t and other references are found in encyclopedia reference more
______ Britannica works information galenet
Yahoo,lycos,excite and webcrawlers are search web
_____ engines directories database channel
Graphical Graphical Graphical
interpreter interchange interface Graphical
GIF is the acronym for ____________ formatting Format format Interface format
The three most popular mailer yahoo,infose netscape,ie,l eudora,netsc none of the
are_____,_____ and______ ek,altavista ynx ape and pine above
The World Wide Web consists of network
_________ information web pages connections mails
In Microsoft Internet Explorer, the color
of the text can be specified using BACKGROUN
_________ attribute of the font tag. D COLOR FCOLOR FONTCOLOR
CGI programs are invoked based on the Current web None of the
information provided by the _________ page Browser Client above
A CGI program is usually called after a
request made by the _________ Browser/user Server Web Channel
neither text nor
A hyperlink can be on ___________ text only image only text or image image
HTML was derived from _________ SQL
alphalanguag PLSQL
betalanguag SGML
metalanguag CGI
none of the
SGML is a _________ e e e above
palm is not palm is not pancake is none of the
PINE stands for _____________ eatable elm not edible above
The application that confirms whether a
document is compliant to its DTD is SGML SGML
_________ Processor Preprocessor SGML Parser SGML Composer
Web is a collection of ___________ web sites images applets documents
Internet International
equipment Engineering Internet
training trainers and Engineering None of the
IETF stands for ________ faculty faculty Task Force above
MS Internet
MS Internet Netscape Explorer and
The two major browsers used to surf Explorer and Navigator Netscape None of the
the Internet are ________,_______ Mosaic and Mosaic Navigator above
Special characters allow browsers to data from a
display _________________ text database symbols video
The keyword for providing links within
or across documents is____________ hyperlink hypertext hotword hotlink
Stringing pages together using
hypertext technology helps view pages in random in sequential in user- none of the
_______________ order order defined order above
The initial web pages present in a web none of the
site is the ________ page. first start home above
The image format supported by most .bmp and
browsers is________________. .bmp and .gif .jpeg .gif and .jpeg .wmf and .bmp
Service,
hostname service,host service,port
The components of a URL are and directory name,port,di and directory service,hostnam
___________ path rectory-path path e and port
mailing
lists,mail
mail mail server robots
servers,mail vendors,mail and
The mail we send has a mailing address clients and identification gateways to
and most of them correspond alternate and other none of the
to_____,_____ and services password services above
Which of the following is not supported <font <l1
by internet explorer _______________ <center> size=n> <hr size=n> type=shape>
It is often
used to
display share It is also used for
It is also market indicating
called as It shows prices over a fluctuations in
Which one of the following statements high-low- trends over period of temperature
related to stock chart is NOT TRUE ? close chart time time changes
The state government needs to finalize
a five years plan to implement 100%
literacy in the state. Which one of the
following will be the best tool that Scenario
should be used to work out the plan ? Pivot table manager Solver Data table.
It is a tool
that
provides a
way to view
It is a tool for and
summarizing compare the
and results of all It
analyzing the the different summarizes
data records variations the data by
in an together on using
Which two of the following statements interactive the analytical
related to pivot table are TRUE ? manner. worksheet functions.
Which one of the following is NOT a Scenario
What-if analysis tool ? Goal seek. manager solver Pivot table
convert text
The _________ wizard separates contents text import to columns
in a cell into different cells wizard wizard tip wizard function wizard
A spreadsheet is a grid of rows and
columns and is called as a ________ worksheet workbook tables database
Pick out the window that is not a form application document modal
of excel ___________ window window window
On an Excel sheet the active cell is A dark wide A dotted
indicated by… border border No border A blinking border
Cell A4 =2 and A5 = 4. You select both
cells and drag the fill handle down to
A8. The contents of cells A6, A7, and A8
are _____. 8,16,32 2,4,2 2,2,2 6,8,10
the row is
too short to the column is
show the too narrow to
your formula number at show all the
If a cell shows ####### , it means has a syntax the current digits of the
that _____. error font size number either b or c
ability to flexibility of
Which is not an advantage of using generate speed of moving cost of initial set-
computerized spreadsheets? tables calculation entries up
The gym teacher has a new program to
calculate physical fitness in terms of
weight and exercise. The use inputs
different weights or amounts of
exercise to determine the related
physical fitness. This "What if" program word
is most likely which of the followin processing graphical database spreadsheet
The difference between the highest and
the lowest values. Range Address Gap Rows
Producing Writing Drawing
Spreadsheets can be used for... graphs letters pictures Document filing
drag from
the top cell
in the
column to
double-click the last cell click the
To select a column the easiest method any cell in in the column click the column
is to … the column column heading label
If you press _____, the cell accepts your CTRL +
typing as its contents. ENTER ENTER TAB INSERT
The contents of cell C15 is
=AVERAGE(C3:C14). AVERAGE(C3:C14)
is known as array. function. constant. formula.
All of the following are considered (201)555-
constants EXCEPT: 100 1212. #VALUE! Tom McKenzie.
Which of the following may NOT be Cell Numeric
included in a formula? references Functions constants Text constants
Which of the following is NOT a valid
mathematical operator in Excel? ^ / * \
Given the formula =B5*B6+C3/D4^2,
which expression would be evaluated It is impossible
first? B5*B6 C3/D4 D4^2 to determine.
Which part of the formula +E12/6+
(G7*SUM(H9:H11) is considered a G7*SUM(H9:H11
constant? E12 6 SUM(H9:H11) )
It is It is The phrase
surrounded displayed in “active cell”
How can you tell which cell in a by a heavy reverse appears in the
worksheet is the active cell? border. It is blinking. video. Status bar.
By either
clicking in a
different cell By typing the
By using the or using the reference of the
By clicking in arrow keys arrow keys cell you want to
a different to move to a to move to a move to in the
How can you change the active cell? cell different cell different cell formula bar
The Cell
Format
The command on The Font Size
Which of the following would you use to The Standard Formatting the Edit command on the
change the font size of a cell in Excel? toolbar toolbar menu Tools menu.
the New the Save the Save As
command on command on command on the File Type
The command that will save the current the File the File the File command on the
workbook with a different file type is: menu. menu. menu. File menu.
The command that will print an Excel
workbook is found on the ____________
menu. File Edit View Window
In the Save As and Open dialog boxes,
the ___________ view shows the file size
as well as the date and time a file was
last modified. Preview Details List Properties
Which of the following commands will
automatically adjust cell references in Both Insert
formulas? Insert Delete and Delete Clear
Which of the following commands will
remove cells, rows, or columns from a Both Clear
worksheet? Clear Delete and Delete Remove
Which of the following options is NOT Orientation
controlled through the Page Setup (portrait or Headers and
command? landscape) footers Fonts Margins
whether the
whether the cell has an
cell has a absolute or a
Conditional formatting applies formula or a the cell relative cell the value in the
formatting to a cell based on: value in it. address. reference. cell
text with either a
two-digit or four-
text with a text with a digit year,
If you enter a date into a cell, Excel two-digit four-digit depending on
stores the date as: year. year. an integer. the format.
You created a worksheet on July 30 and It is impossible
entered the =Today() function in cell to determine
E17. You opened that worksheet again from the
on August 31. What will be displayed in information
cell E17 on August 31? Jul-30 Aug-31 29/03/2008 given.
subtracting
subtracting adding the the later
the earlier earlier date date from adding the later
The number of days between two cells date from the to the later the earlier date to the
containing dates can be calculated by: later one. one. one. earlier one.
The function key that is used to quickly
edit the contents of a cell is: the F4 key. the F2 key. the Esc key. the F1 key.
Either 3/4 or .75,
March 4 of depending on
What will be stored in a cell if 3/4 is the current the cell
entered in it? 03-Apr 0.75 year formatting
either a cell on a
A user’s response to the InputBox a cell on a worksheet or a
function can be stored in: worksheet. a variable. a constant. variable.
The cell reference for a range of cells
that starts in cell B1 and goes over to
column G and down to row 10 is _____. B1-G10 B1.G10 B1;G10 B1:G10
It is made up
of many
networks
connected
into It works the Individual
transmission same way as computers can
Which of the following is NOT true It is one large lines called a local connect to it
about the Internet? network. backbones. network. using an ISP.
The traditional intent and impact of this
common type of attack is to prevent or
impair the legitimate use of network Password System Denial of
resources. cracking intrusion Service Port sniffing
Which of the following is NOT an Flood a Web Virus that
example of a DoS attack that is popular server with initiates a
among hackers? IP flood requests ping flood UDP flood
A ____________ attack is when a hacker
sends a continuous flow of packets to a
system. hack packet flood traffic
One defense option on a large network
is to configure a ____________ to disallow
any external traffic. firewall router switch hub
a backup an email a poor file none of the
A proxy server is server server server above
Disruption in
Which of the following would be a form Economic communicati Disruption in All of the above
of cyber terrorism? damage on supply lines are correct.
Crashing the Shutdown of
Which of the following is a likely target stock market, military Contaminatin Shutdown of
of a cyber terrorist that would cause as in the security g water nuclear plant
considerable loss of life? 1930s systems systems safety systems
To obtain an
accurate
inventory of
An organisation is upgrading its To carry To improve network related
telecommunication lines. Which is the more To improve system equipment and
least important objective while network network response parts and
upgradation capacity services time network nodes
A company posts a price list of its stop its
products on its website. The advantage limit access competitors update its prices
to the customer is that the company set its prices to computer seeing their as soon as they
can very high owners only prices are changed
Yahoo
Which of the following is an easy-to-use People People USA People
service to get information on someone? Search Search Search Lycos Search
using clicking a
Internet hyperlink
Explorer to that
view a Web references a
page that is updating the document
stored on the values that that is stored viewing an Excel
hard drive on are obtained in the floppy worksheet that
Which of the following requires an your through a drive on your you have saved
Internet connection? computer Web query computer as a Web page.
Click on the
Mr Rao wants to find a website that he Back arrow Click on ‘Go Go to the
briefly browsed over yesterday. After until the to’ or History page Go to the
turning on his computer how would he desired site ‘Search’ in and look for Bookmarks or
do this? is found the browser the site Favorites page
the Insert
Which of the following is used to update the Refresh Hyperlink the Update the External
a Web query? command command command Data command
You download from the internet, a
screensaver, a ten-second sound file
and a ten-second music video clip. You
also add a hyperlink. Which of the
media elements has the greatest effect
on the file size? Hyperlink Screensaver Sound Video
When saving a photograph for use on a
website, which format should you
choose? BMP GIF JPEG TIFF
While researching the Direct taxes Write it Add it to Cut and paste it
assignment, you find a useful website. down on a ‘Favourites’ to a word
What is the most efficient way to Save it to a piece of or processor
access the site at a later time? floppy disk. paper. ‘Bookmarks’. document.
A system that uses the Internet for
business-to-business interaction is privileged network
called a(n): extranet. intranet. network. topology
A block of text automatically added to an
the end of an outgoing email is called attachment. a signature. a footer. an encryption.
_________ refers to the use of Internet
technologies for placing telephone
calls. VoIP IPT IPP PoIP
Desktop Desktop Desktop
Most client/server applications operate client, client, server,
on a three-tiered architecture application, software, application, Desktop server,
consisting of which of the following and and and software, and
layers? database. hardware. database. hardware.
Which do you NOT need to connect to Telephone None of the
the Internet? Modem CD-ROM line above
File
File Transfer Transmissio File Transfer None of the
What does FTP stand for? Program n Protocol Protocol above
So computers So IP
can be addresses So email is
referenced can be delivered None of the
What is the purpose of DNS? by a name shorter faster above
Which of the following is NOT a properly 143.215.12.1 None of the
formatted IP address? 193.1.2.3 45.1.1.1 9 above
paul .trigg @ paul.trigg@d
Which of the following is a properly domain. org. omain.org.u paul.domain. None of the
formatted email address? uk k uk above
The US Scientists in None of the
The Internet is controlled by whom? government Switzerland No-one above
Internet
International Remote
Internet Relay of Conversation None of the
What does IRC stand for? Relay Chat Characters s above
It will be A letter will
waiting for be sent to
If you do not pick up your email for a It will be you to you in the None of the
week...? deleted collect it post above
Receiving People
messages discussing a
automatically topic of High
What is a disadvantage of joining a from anyone interest volumes of None of the
mailing list? in the group globally email above
autolayouts
and
In Powerpoint2000 ,the built-in clipart & auto presentation slide view & none of the
professional design elements are shapes templates outline view above
Selection handles are the 8 small
___________ that appear around the
object, when an object is selected circles points squares icons
The _______ is an invisible matrix of
vertical and horizontal lines that covers
the entire slide workspace square image grid guide
_______ are drop-down menus that
appear when the right mouse button is short cut
clicked on the screen element tool bars menus auto shapes all the above
________ and ______ have the ability to
add a lot of visual impact into the clip gallery & slide show & fonts &
PowerPoint presentation
_______ is a motion picture or any word art view show images none the above
animation file wave file media clip .video file all the above
In visual basic, when a record pointer
reaches to the last record, _______
property of a recordset object is movelast,tru movelast,fals
automatically set to ______ eof,false e e eof,true
In visual basic, the explorer view of a properties form layout
project is displayed in ___________ window window toolbox project explorer
In visual basic, when a record pointer
reaches to the first record, _______
property of a recordset object is movefirst,tru movefirst,fal
automatically set to ______ bof,false e se bof,true
In visual basic, _______ is a method to
convert a string into integer. value() int() number() val()
In visual basic, in a shape control, a vb
statement gives Shape1.Shape = 2.
What type of shape should we get? circle rectangle square oval
In visual basic, a timer event is only
available in timer control. true false
In visual basic, vbred or vbgreen or
vbblue are the property values of a
backcolor of any object true false
You want to display the code and the Msgbox Msgbox Msgbox Msgbox
description of an error. What would be err.no & err.number error.number error.number &
the correct syntax? err.text & err.text & error.text error.description
To provide a
To display To help in To allow the repository for
What is the purpose of the Image List images to the creating a editing of images used by
Control? user ToolBar icons other controls
Which method would you use to get a
free or unused File identifier while
opening any file: FreeFile GetFileNum GetFile GetBytes
Which property procedure is used to
retrieve the value of a property? Retrieve Get GetProperty Value
Common
Which of the following can be shown to messages
the user using the Common Dialog passed to Open dialog Windows
control in VB? Windows box explorer Input box
Which of the following are not
properties of Command Button: Caption Visible Multi-Line Font
Click, KeyUp
Which events enable you to determine Click and and KeyUp and KeyPress, KeyUp
which key was pressed by the user? KeyPress KeyDown KeyDown and KeyDown
In order to access a file in Non-textual Binary
format, you have to open file in: Ascii Format Format Input Mode Output mode
Visual Basic displays information ScaleLeft
depending upon the current value of CurrentX and and ScaleHeight
two properties of the form, called: CurrentY ScaleTop and ScaleTop x and y
Which of the following procedure types
will execute when you assign a value to Property
a property of an object? Property Get Assign Property Let Property Set
in outline
view, user
can see the
with notes miniatures
pages view of all slides
user can in a user should
prepare presentation select the
speaker , complete slide view to the slides can be
Which of the following statements are notes and with text add the text reordered in the
not true handouts and graphics to the slide outline view
the slide that
holds the
formatted
placeholders
for the titles,
main text
and any transition design the slide that
background means template is holds the
items that applying the template formatted
user wants to special whose placeholders for
appear on effects to format and the title and
the slides is the color scheme subtitle for the
called a crossover user applies presentation is
Which of the following definitions are master between the to a called a title
not true template slides presentation template
The options available in the common
task toolbar does not include slide layout customize new slide set up show
by default,
doughnut
data to be chart is
graphed displayed user can add
resides in a based on the data is data labels and
With reference to chart, which of the datasheet data in the plotted in a gridlines to the
following statements are not true window datasheet chart window chart
The format of the text entered in a title,
subtitle, or bulleted-list object is
determined by the format settings in a the master the slide the header
special slide called -------- slide master slide the format slide
PowerPoint provides a _________ that
searches the entire presentation i.e., all
the text objects in all the slides,
outlines, notes and handouts for office spell grammar none of the
spelling errors assistant checker checker above
PowerPoint's drawing toolbar contains
_______ drawing tools 10 12 102 22
Click _______ on the rectangle drawing
tools enables us to draw multiple
rectangles once twice three four times
text, CD-ROM,
text, graphics hypertext digital text, hypertext,
An example of the components of a and email and Power camera and Power Point,
multimedia presentation could include address. Point. sound. video and sound.
Which of the following formatting Line style, Line
elements can be applied to a the Font and color, text font,
PowerPoint diagram using the the Line the text and text
AutoFormat tool? the Line style color alignment alignment
Which of the following formatting
elements can be applied to a Fill color, Line
PowerPoint diagram using the Format Line color, and Line
AutoShape command? Fill color Line color thickness thickness
A popup box Microsoft
Excel is prompts you Graph is
started so for an started so
What happens when you double click a that you can existing that you can The graph
blank graph placeholder in a PowerPoint create a Excel chart create a placeholder is
presentation? chart. to insert. graph. deleted.
taken from
the first
column or
row of data
in the
datasheet,
depending
always taken always taken on whether
from the first from the first the data
row of data in column of series are in
The legend in a Microsoft Graph chart the data in the rows or entered by the
is: datasheet. datasheet. columns. user.
Suppose you are creating a Microsoft
Graph of quarterly sales by region.
Which would be the best chart type if
you want to emphasize the total sales Side-by-side Stacked
of each region? column column Pie chart Line chart
Pull down the
Insert menu and
select Chart,
click the Insert
Chart button on
Pull down the the Standard
Click the Insert menu toolbar, or pull
Pull down the Insert Chart and select down the Insert
Which of the following actions will Insert menu button on the menu and select
enable you to insert a graph into a and select the Standard appropriate the appropriate
PowerPoint presentation? Chart. toolbar. Object. Object.
Click the
chart object,
then click You cannot
the View display the
It Datasheet Pull down the underlying
If you are editing a slide containing a automatically button on Edit menu, datasheet once
Microsoft Graph, how do you display the displays in the Standard then select the slide is
underlying datasheet? Slide view. toolbar. Object. finished.
How do you deselect a chart that has
been placed onto a PowerPoint slide
after you have finished creating the Single click Double click Click outside Change to Slide
chart? the chart. the chart. the chart. Sorter view.
A dialog box
is displayed
A dialog box allowing you
is displayed to enter the
allowing you name of the
to enter the Excel
name of the worksheet
Excel that should
worksheet be The datasheet
that should embedded in window is
be linked to the The toggled from
What happens when you click the the PowerPoint datasheet is closed to open
Datasheet button on the Microsoft PowerPoint presentation saved as a (or from open to
Graph toolbar? presentation. . separate file. closed).
The chart is The application
What happens if you single click a chart The chart is The chart is doubled in that created the
that is not currently active? selected. deleted. size. chart is started.
The chart is
What happens if you double click a The chart is The chart is doubled in Microsoft Graph
chart that is not currently active? selected. deleted. size. will restart.
printer setup
The dialog box that is used to page setup from the file print preview none of the
determine the documents margins is from the file menu from the file above
________ is a box surrounding a page on
all slides or a line that sets off a none of the
paragraph on one or more slides border shading style box above
The key that is used to perform a task
to select all t he text in the documents
is
The key that is used to indent a ctrl+a Del ctrl+f ctrl+m
paragraph is ctrl+a Del ctrl+f ctrl+m
The key that is used to change the font
from the current positioned in a CTRL+SHIFT CTRL+SHIFT
document is +F CTRL+O +S CTRL+SHIFT+P
The key that is used to change the style
of the document that is from that
normal to heading1 or heading1 to
other document styles. ctrl+shift+f ctrl+o ctrl+shift+s ctrl+shift+p
Set mapping' Check control that follows
a text-type validation, we use
----------------- application for data None of the
analysis. Excel Access Both above
Excel can import data from other
databases for the data analysis. TRUE FALSE
A System Auditor can uses CAAT tools
to analyze data FALSE TRUE
In the case of the ---------- control, it is
ensured that the data in combination
with other fields are reasonable as per Transaction
standard set by an organisation. Valid Signs type Limit Check Reasonableness
--------------- function searches for a
value in the leftmost column of a table
and then returns a value in the same
row from a column that we specify in a None of the
table HLOOKUP VLOOKUP A or B above
Most of the tools use in Data Analysis
depends on DDE OLE ODBC All of the above
Inputs, Maintenance,
outputs, file reliability,
Only design and
What areas need to be considered in hardware hardware, upgradeabilit
the SOFTWARE design process? and software and software y None of above
To execute
What is the function of systems To collect any To maintain None of the
software? data programs security above
Formatting a disk results in all the data Deleted from Copied from Saved to the Transferred from
being...? the disk the disk disk the disk
Users
operate the
manual Users
system and operate the Users
computer computer operate the
system at the system from manual
What is Direct Implementation? same time a given date system None of above
The new The new
system is system is
introduced introduced Users
alongside the and users continue
existing start operating the
What is parallel running? system operating it old system None of above
Data is not
Computer is saved before
Every data from the primary memory Power is improperly computer is
will be erased if switched off shut down shut down All of the above
a parallel a serial printer a modem
An RS-232 interface is interface interface interface interface
For print quality you would expect best dot matrix ink-jet
results from line printer printer printer laser printer.
is faster to stores more
access than is non- information is used for cache
ROM RAM volatile than RAM memory
increased the provides
storage backup
capacity of a increases power in the
computer the process event of a none of the
A UPS system speed power cut previous
has more
storage is an access
capacity card for a
is a form of than an ATM security contains a
smart card ATM card card system microprocessor
SSGA none of the
Laptop computers use CRT displays LCD displays displays previous
having
several writing
programs in programs in
RAM at the multiple none of the
Multiprogramming refers to same time multitasking languages previous
having
several the ability to
softwares run 2 or writing
running at more programs in
the same programs multiple none of the
Multitasking refers to time concurrently languages previous
What are small high speed memory
units used for storing temporary
results? ALU Registers Variables Logic Bus
A good way to exchange information
that changes rapidly is through brochures magazines CD-ROM e-mail
to run more
than one
program at
an operating the same none of the
Multiprogramming is a prerequisite for multitasking system time above
multiprogra none of the
Timesharing is the same as multitasking mming multiuser previous
______ is the default view in Word used
for typing Editing and Formatting the ONLINE ONLINE
Text NORMAL LAYOUT PAGELAYOUT DOCUMENT
The short-cut-key that is used to indent
a paragraph spacing in the documents
is ctrl+m ctrl+2 ctrl+end ctrl+home
The short-cut-key that is used to paste
the selected text ctrl+v or ins ctrl+c or ins ctrl+x or ins ctrl+v or Del
The short-cut-key that is used for none of the
paragraph spacing(1.5) ctrl+2 ctrl+5 ctrl+1 above
The box that separate text from the
document and allows it to behave like
an independent object is known as Text Box Frame AutoShape Border
A dropped
cap is a word A grid is a set of
A pull quote that starts horizontal and
The reverse is a with a vertical lines
technique quotation lowercase that determine
means to add taken from letter when it the placement of
dark text on (pulled) from should have elements in a
Which of the following definitions is a light another a capital newsletter or
CORRECT? background. document. letter. other document.
Pertaining to newsletters, which of the The height The tab spacing
following cannot be changed using the The width of of each The number within each
Columns command dialog box? each column column of columns column
As related to type size, how many
points are there to the inch? 6 10 12 72
Assume you are working on a
newsletter in which the masthead
extends across the top of the entire
first page. The rest of the newsletter
has two columns. What is the minimum
number of sections in the newsletter? One Two Three Four
Press
Ctrl+Shift+E
Press nter to Press Enter Press
Which of the following is NOT correct Ctrl+Enter to create a to create a Shift+Enter to
with respect to page, column, and create a column section force a line
section breaks? page break. break. break. break.
Which of the following would be the A sans serif
most appropriate font for a newsletter A serif font at font at 10 A serif font A sans serif font
headline? 10 points points at 20 points at 45 points
It depends on
the left and right
margins, and
how many
Which of the following is the default columns are
Word column width? 2 inches 3½ inches 4 inches specified.
Sequence Check is a --------------- level None of the
control check. Field Record Both above
Analyse data over two or more periods None of the
is called ----------------------- analysis Horizontal Vertical A or B Above
We use Hash Total to identify ------------
within a series where there is a definite Duplicate Combined
relation between items Value Value Gaps All of the above
Analyse fields by arranging them into Cross None of the
rows and columns is called Tabulate Filter Merge above
--------------------- function searches for a
value in the leftmost column of a table
and then returns a value in the same
row from a column that we specify in None of the
the table. RAND() VLOOKUP() HLOOKUP() above
To import data from Access to Excel ,it
is not possible to link between Access
and Excel sheet TRUE FALSE
The GAP detection options can be used
to test for completeness of data. TRUE FALSE
Exception testing can be used to None of the
identify ----------------- items Unusual Strange A or B above
exception comparison duplicates
Data validity test represents testing of data testing All of the above
Year end ledger, inventory files or
transaction files can be tested for cut-
off , to ensure that the data has been
provided is for the correct audit period True False
In Range Check , the data may not be
in proper sequence but should be within
a predetermined range True False
In ---------------- Check data entry follow a
particular sequence and also a
predetermined range. Limit Sequence Range Both B & C
related to a form of a form of none of the
Virtual memory is virtual reality ROM VRAM previous
involves using
same as more than one
same as multiprogra processor at the
Multiprocessing is multitasking mming multiuser same time
To help keep sensitive computer-based use a virus
information confidential, the user set up a make a protection
should save the file password backup copy program
to read from
or write to display
information to print information or
to calculate to a floppy sheets of pictures on a
What is the function of a disk drive? numbers disk paper screen
none of the
A 4GL is Uses Cobol uses Java uses C++ previous.
A nanosecond is 106 sec 103 sec 1012 sec 109 sec
What small, hand-held device is used to
move the cursor to a specific location
on the screen? a keypad a mouse a frog a message pad
data that
has been an instruction
data to be transferred the address that has been
The memory address register is used to transferred to from of a memory transferred from
store memory memory location memory.
data to be an instruction
transferred to data to be the address that has been
The memory data register is used to or from transferred of a memory transferred from
store memory to the stack location memory
an
instruction an
that has instruction the address of
an instruction been that has the next
that has been fetched from been instruction to be
The instruction register stores decoded memory executed executed
Which of the following is used to
indicate the location on the computer
monitor? a cursor a scroll bar a light pen a magic marker
A mathematical procedure that can be
explicitly coded in a set of computer
language instructions that manipulate
data. Formula Algorithm Program Data
Which of the following translates a
program written in high-level language Artificial
into machine language for execution? Assembler Compiler Intelligence Parity Checker
Detecting errors in real memory is a Memory Parity Range
function of protection Checking checking Validation
use the use the
To find where a file has been saved on directory search each backup use find and
disk, the user should search tools file in turn facility replace
A series of instructions telling the
computer how to process data or files is
defined as a Network Program System Modem
save copies
of the file
with the keep a
same name use different record of
To ensure that data is not lost if a on the filenames on computer backup to a
computer system fails, the user should system the system failures secure medium
Having a single CPU alternatively
process tasks entered from multiple Multiprocessi Multiprogram
terminals is called ng Time sharing ming Multiplexing
The place in the CPU where the data
and programs are temporarily stored
during processing is called the ROM RAM Floppy Disk Magnetic Disk
All are examples of computer software Word Telephone
except Firmware Processor modem Shareware
Computer manufactures are now
installing software programs
permanently inside the computer. It is Word Telephone
known as Firmware Processor modem Shareware
Which of the following file organisation
forms most efficiently allows access to
a record Sequential Hashed Indexed Random
The part of the computer system
controlling data manipulation is called Operating
the System ALU CPU Primary Storage
For direct access storage devices the Tracks and Blocks and Files and Schema and
recording area is divided into Sectors Sectors Tracks subschema
Character, Database,
The data hierarchy from the largest to field, character, File, record, Element, field,
the smallest is database record field file
Which of the following hardware or
software system controls provides a Valid Maintenance
detailed record of all activities character diagnostic
performed by a computer system check program Systems logs Parity check
Which one of the following parts of a
computer is necessary to enable it to MIDI
play music? Sound card. CD-ROM interface Serial interface
An educational CD-ROM on Indian Poets
contains 1000 pages of text, 500 colour
pictures, 15 minutes of sound and 1
minute of video. Which of the four
different media listed takes up most
space on the CD-ROM? Text Pictures Sound Video
Which one of the following printers is
suitable for printing sprocket fed carbon
copies? Laser Dot matrix Ink-jet Drum
recording
current stock in
creating the presenting a supermarket
viewing an plans for a an order for and answering
Multimedia software can be most encyclopaedi building stock to a customer
productively used for a CD-ROM. design. warehouse. queries.
To be effective a virus checker should replaced never updated updated once a
be regularly updated regularly year
Which one of the following software
applications would be the MOST
appropriate for performing numerical Document Graphics
and statistical calculations? Database processor package Spreadsheet
get into the make retain
system efficient use confidentialit simplify file
Passwords
How many enable users
bytes do to
4 Kilobytes quickly of time y of files structures
represent? 512 1024 4096 8192
loss of
Back up of the data files will help to confidentialit duplication virus
prevent y of data infection loss of data
Which one of the following is the MOST
common internet protocol? TCP/IP HTML IPX/SPX NetBEUI
access to the printer can the operating
internet is files can be do 1000s of system is easy
The advantage of a PC network is that quicker shared pages a day to use
a the root
The term A:\ refers to a file name subdirectory directory the hard drive
up-line uninterrupta
universal provider ble power uniform page
UPS stands for port serial service supply source
An An An
interpreter interpreter is interpreter is
does the a a general
conversion representati purpose
line by line on of the language
as the system providing
program is being very efficient None of the
What is the definition of an interpreter? run designed execution above
A device used in data communications Frequency
to divide a transmission signal into division Time Division
several sub-bands is known as a Modem Demodulator multiplexor Multiplexor
Third generation languages such as
COBOL, C, and FORTRAN are referred to High-level Middle-level Low-level None of the
as languages languages languages above
It is faster
than parallel It is less
Serial Communication is used over long communicati It is less prone to Uses only one
distance because it on error prone attenuation path
Accounting
Financial Graphic systems,
In what areas is the COBOL sector and design and commercial None of the
programming language used? engineering education sector above
Testing to
The different check for Hardware,
types of errors before Software and
What will a good software provider network to the system size of None of the
consider? be used is introduced program. above
The topology of a network can be each
of the following except Star Packet Ring Bus
What is the 8-bit binary value of the None of the
decimal number 85? 10101010 1100101 1010101 above
Which is the most common data Retransmissi Cyclic
transmission error checking method Parity on Redundancy Hash Count
What is the decimal value of the binary None of the
number 1111? 15 4 64 above
Which of the following devices merges
communication signals onto a single
line Port Modem Multiplexor Acoustic coupler
What is the decimal value of the octal None of the
number 215? 327 141 97 above
Which tool is used to help an Data
organization build and use business Data Data Mining management
intelligence? warehouse tools systems All of them
secondary secondary
memory memory storage storage access
Cache memory enhances capacity access time capacity time
What is the decimal value of the None of the
hexadecimal number FF? 30 255 256 above
Numbers are stored and transmitted ASCII code alphanumeric
inside a computer in binary form form decimal form form
What is the hexadecimal value of the None of the
decimal number 1476? 4C5 1B7 5C4 above
A byte corresponds to 4 bits 8 bits 16 bits 32 bits
Binary
What does EBCDIC coding of numbers Basic Coding Coded Bit Code None of the
mean? Description Decimal Design above
A Kb corresponds
What is the binaryto
sum of 01011 and 1024 bits 1000 bytes 210 bits 210 bytes
None of the
00101? 10000 1112 1110 above
Information is stored and transmitted ASCII code alphanumeric
inside a computer in binary form form decimal form form
used to
indicate
uppercase used to is the first bit is the last bit in
A parity bit is letters detect errors in a byte a byte
Because it
How did the computer mouse get its squeaks Its moves None of the
name? when moved like a mouse It has ears above
What are you most likely to use when None of the
playing a computer game? Touch screen Light pen Joystick above
CPU performance may be measured in BPS MIPS MHz VLSI
Printing Tracing Reading bar None of the
A digitising tablet can be used for? letters diagrams codes above
In processing cheques which of the
following I/O techniques have banks barcode
traditionally used OCR MICR scanning voice recognition
Which of the following is a pointing CD-ROM None of the
device used for computer input? Touch screen Hard disk drive above
Light
sensitive None of the
What does a light pen contain? Refillable ink Pencil lead elements above
The capacity of a 3.5” floppy is around 100K 1.44 Mb 5 Mb 1 Gb
What general term describes the
physical equipment of a computer
system, such as its video screen,
keyboard, and storage devices? hardware software output input
Where would you find the letters Numeric
QUERTY? Mouse Keyboard Keypad Printer
What input device could tell you the Bar code Optical mark
price of a product Mouse reader reader Keyboard
Where would you find a magnetic strip? Credit card Mouse Speakers Printer
What are the individual dots which
make up a picture on the monitor Coloured
screen Called spots Pixels Pixies Pickers
What input device can be used for Bar code Optical mark None of the
marking a multiple-choice test? Mouse reader reader above
mouse
button keyboard word processing
QWERTY is used with reference to screen layout layout layout software
What input device could tell you the Bar code Optical mark None of the
price of a bar of chocolate? Mouse reader reader above
language software an operating
A GUI is hardware interpreter interface system
First - Second - Third - Fifth -
generation generation generation generation
UNIVAC Computer belongs to the computers. computers. computers. computers.
Name the first Indian Super Computer? Vishwajeet Deep Blue Param Arjun
is caused by caused by is due to bad none of the
Disk fragmentation wear overuse disk blocks previous
The technology which is used to check Magnetic Ink
answer sheets of multiple-choice Bar code Optical Mark Character
questions in civil services or similar Reader Reader Recognition Image Scanning
examinations is: - Technology Technology Technology Technology
converts a
slower than program to
a fast an machine none of the
A compiler is interpreter interpreter code previous
Which printer among the following is Dot - Matrix Desk - jet
fastest Drum Printer Printer Printer
compressing Thermal Printer
“Zipping” a file means encrypting it decrypting it it transmitting it
Very Vital Virtual
important information information
reader user resource reader &
What does acronym VIRUS stands for sequence under siege user system None of above
An impact printer creates characters by Electrically Thermal An inked ribbon
using...? charged ink Paper An ink pen and print head
mainframe LAN WAN Unix operating
A client-server system is based on technology technology technology system
A nanosecond is 10-6 sec 10-3 sec 10-12 sec 10-9 sec
A procedural control used to minimize
the possibility of data or program file
destruction through operator error is Control External file Cross footing
the use of Limit checks figures labels tests
_______ software enables users to send
and receive data to/from remote operating
computers
A _____ is a running instance of an application system system communication
application project model pilot project process
Splitting of CPU's time for different multiprocessi multithreadi
tasks _______ prevents time slicing ng ng multiplexing multitasking
______ computers are used in large
organizations for large scale jobs which super micro none of the
have large storage capacities mainframes computers computers above
_______ is responsible for all calculations arithmeticcentral
and logical operations that have to be and logic processing none of the
performed on the data control unit unit unit above
non impact none of the
______ printer use laser light band printer drum printer printer above
______ software enhances the user to
enter ,store, manipulate and print any data word electronic none of the
text management processing spreadsheet above
______ software enables users to send
and receive data to/from remote integrated communicati idea none of the
computers software on software processor above
_______ is the temporary storage place Microsoft none of the
for deleted files my computer recycle bin exchange above
none of the
_____ is a collection of related fields field file record above
_____ language consists of strings of assembly machine high level none of the
binary numbers language language language above
______ symbol is used to represent
processes like assigning a value to a terminator processed connector input/output
variable or adding a number symbol symbol symbol symbol
_______ is an example for micro hp vectra fazitsu vp200
computer PC-at system series IBM-PC
_________capability supports concurrent multiprocessi multithreadi none of the
users doing different tasks ng ng multiplexing above
The ______ do not have processing
power of their own and has only a
screen, keyboard and the necessary
hardware to communicate with the
host. For this reason, the terminals are "dumb dumb dummy
referred as_______________ terminals" servers terminals dummy servers
distributed
A______is nothing but a PC with a computing
network operating system wan system windows NT LAN
_____system is responsible for handling
the screen and user I/O processing host server back end front end
The______ handles data processing and
disk access in a Client/Server
architecture host server back end front end
Both the DBMS and the application
resides on the same component in a distributed
____system PC LAN computing centralized
When all the processing is done by the
mainframe itself, the type of processing server host dumb
is sometimes called as processing processing processing data processing
DBMS models can be grouped
under____ categories four one two many
file hierarchical network relational
______is the most advantageous management database database database
database system system system system system
A new user initiates a new process of
execution at the background,while the
user can continue his query process as
usual in the foreground. This situation is multiprocessi multithrea none of the
referred to as ______ ng ding multiplexing above
The process of data being automatically disk
written to a duplicate database is defragmenta
called______ repairing redo logging tion disk mirroring
Modulation
Code/De- /Demodulat Module/De- None of the
Modem stands for __________ . code ion module above
Multiple changes to the same record or
a field are prevented by the DBMS
through______ fixes locks constraints traps
_________allows an application to multiprocessi multithrea none of the
multitask within itself ng ding multiplexing above
Linear area Local area Local array None of the
LAN stands for __________ . networks networks of networks. above
New process of execution is referred to
as______ task process thread client-server
Integrated Integrated Integrated
system Symbolic Services
dynamic Digital Digital None of the
ISDN stands for _______. networks. networks. network. above.
_____________ is the Worlds largest None of the
computer network . Ethernet Internet
power ARPANET above.
all of the
_______is/are a popular front end tool visual basic builder SQL * plus above
When LAN connected together ,it is None of the
called __________ . MAN WAN GAN above.
Data is broken into small unit called None of the
__________ . Cells Bits Packets above.
System Software
modulation Mail Simple Mail
transfer transmission transfer None of the
SMTP stands for __________ . protocol protocol protocol above.
The __________ protocol is a network
protocol to be built for the World Wide Transfer Transmissio None of the
Web . Protocol n protocol Hyper text above.
The computer which can receive data
from other computers on the network Printer None of the
and print it is _______ File server server Receiver above.
The hardware and the software configuratio
requirements together form the_____ platform n package system
ATM, Asynchronous transfer mode is a MAN and LAN and LAN and LAN WAN and
technology.
__________ is designed telephone WAN WAN MAN MAN
system ISDN ATM Internet Intranet
Web based Web based Web based Web based
Expansion of WBT is ______________ Training Technology Transport Transaction
_________ connects LANs. Bridges Routers Protocol Repeaters
Collection of instruction is called a _____ procedure batch command program
Combination of alphabetic and numeric alpha numerous number and
data is called _____ data numeric alpha beta alpha alpha
space
occupied, cost, size, input, output,
Computers can be classified based on price, no. of performance performanc performance
______,______and _______ users allowed their ratio e, cost ratios
_______ is responsible for feeding data
into the computer input output feed write
C
B
C
A
B
A
B
D
A
A
C
B
A
A
B
A
C
C
C
A
C
A
A
B
A
A
A
B
D
A
D
A
A
A
A
A
B
A
B
A
A
A
C
A
A
A
C
B
A
A
D
D
C
A
C
D
B
C
A
A
A
D
C
A
B
A
D
A
A
D
B
C
B
B
B
A
A
A
C
C
A
B
A
B
B
C
A
B
B
B
A
B
A
B
D
B
B
A
A
B
B
B
A
C
A
A
B
C
B
C
B
B
A
C
B
A
C
A
A
C
B
B
D
A
B
C
B
C
A
D
D
D
A
A
B
B
C
A
A
C
D
A
A
B
B
C
C
C
A
C
C
D
C
C
D
C
C
B
A
B
B
B
B
A
C
C
B
C
C
C
C
A
B
C
A
B
B
B
C
B
B
B
C
B
C
B
D
A
A
A
D
B
C
B
D
A
B
D
A
A
B
C
B
B
B
A
D
D
D
C
A
B
C
B
B
D
A
B
C
A
C
A
B
C
A
A
B
D
B
B
C
A
A
B
B
D
A
B
B
B
C
A
D
A
C
D
D
B
A
B
B
A
B
D
D
D
A
D
C
B
A
C
D
C
C
A
A
C
A
A
D
B
C
D
B
B
D
B
B
D
B
B
A
A
C
A
A
D
D
B
A
B
A
A
A
D
D
B
A
A
B
B
A
B
A
A
B
A
B
B
D
B
C
B
B
B
D
A
C
D
B
C
D
B
D
D
D
D
C
C
D
D
D
C
A
A
B
C
A
D
C
C
C
B
B
A
B
D
A
A
C
B
C
B
B
A
C
B
A
C
A
C
B
D
D
D
B
B
C
B
C
B
D
B
A
A
B
D
C
D